{"category": "common_crawl-adult_content", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-adult_content/part-00-00000.npy", "text": " of this section. They were in huge demand with wives of prominent men who had a liking for the muscled bodies of these fighter men.\n\nThe gladiators were often used for sexual gratification by high class women who paid these men for sessions of lewd acts. One such example can be given of Marcus Aurelius’s wife Faustina who was obsessed with gladiators. She went on to have sex with a gladiator and as per the guidance of the Oracle, when the gladiator was on top of her, he was killed. After this, Faustina had sex with her husband.\n\nAlso Read: 13 Facts about the Ancient Roman Gladiators\n\n11. Rome’s elite class hosted orgies\n\nWere orgies like a ritual in ancient Roman sex life? Orgies existed back then, but, its not how we have always visualized them to be. Most of us have had insane ideas about orgies that were practiced in Rome, but, the truth is that they were not frequently hosted during feasts and gala affairs. It was Rome’s elite class like emperors that often engaged in orgies that were highly unsafe and unpredictable.\n\nMost rich and famous personalities threw gala parties and feasts that seldom culminated into orgies. But, emperors like Caligula and Elagabalus had orgy sessions in their palaces that often resulted in deaths and killings, given the unpredictable nature of these personalities.\n\n12. The Imperial Palace turned into a whorehouse\n\nIt was not once but several times that The Imperial palace turned into a brothel by various Roman emperors who couldn’t just stay away from sex. These depraved men went far by transforming their own palace into a whorehouse. Caligula once turned a wing of his palace into a brothel in order to earn back public funds that he had spent on his own lascivious activities. He also allowed Roman men to visit the whorehouse and pay later. This way, Caligula made lust a business venture.\n\n13. The Stoics of Rome and their take on sex\n\nSex in Ancient Rome\n\nImage Credit: brewminate\n\nThe believers of Stoicism, a Hellenistic Philosophy were known as Stoics who believed in equality of all people and regarded no one lesser in the society. This included slaves as well as women who were treated as second class citizens in ancient Rome. They also preferred social stability over sex and other lustful acts. To them, pleasure seeking activities were not the basis of human life and regarded sex as an activity that bonded people together with bond and affection. The Stoics were not anti sex but regarded it an unnecessary desire that needed to be approached with a rational mind.\n\n14. Prostitution was a legal profession\n\nProstitution was very pivotal to sex in ancient Rome. It attracted hoards of men, both commoners as well as elite that found their lusts satisfied by visiting brothels. The Romans loved sex in every form and prostitution was a legalized activity. No one seemed to be bothered about the prevalence of prostitution, not even the Roman wives. It were usually the freed women or slaves that worked as prostitutes. But, it wasn’t uncommon to find high class women indulging in it just for pleasure. It was a legitimate business in 40 CE and income from it was taxable. Under the reign of Augustus, sex workers were exempted from giving moral penalties, whereas, the usual Roman citizens had to follow very strict moral codes of sexual conduct.\n\n15. The tradition of kissing was spread by Romans\n\nRoman sexuality was not only about lascivious dalliances like those of Caligula and Tiberius. It also included acts of love and passion. One such act was kissing that was considered to spread love and affection between two people. Kissing was an act that Romans loved to indulge in, and they actually helped spread this tradition of kissing all around the world. In fact Roman men were believed to be obsessed with kissing. In their obsession, they would often be found showcasing their kissing prowess in public. It was the Romans that started the tradition of kissing at the time of marriage when the couple would exchange vows and then kiss in front of all.\n\nAlso Read: 18 Weird Victorian Sex Tips\n\n16. There were anal sex experts called Analists\n\nMale sexuality in ancient Rome included all forms of sex as Roman men were fond of lustful activities to the core. They had no inhibitions visiting brothels or having multiple sexual partners. Anal or butt sex was considered okay in Rome but was seen as a lowly act during Biblical times. Anal sex was predominantly practiced by the general Roman man who would hump his partner, either a man or a woman from the back. But, in no circumstance, he were to get humped. Then it would be a case of scandal. Its believed that when Tiberius retired to Capri, he, being a lustful manic, hired ‘analists’, experts in butt sex. These experts would copulate in front of him by forming triple unions so as to arouse him.\n\n17. The divine virgins of Rome were off limits\n\nSex in Ancient Rome\n\nImage Credit: byronsmuse\n\nIts rather surprising when you come to know that in ancient Rome, a group of women were off limits for men! Yes, we are talking about a group of women that were considered to be Vestal Virgins that offered themselves to the worship of Vesta, the Goddess of hearth. These women were the divine virgins no one could touch, and were regarded as the overseers of Rome's security. They lived at the Temple of Vesta and tended to it. The temple had six of these virgins at all times and they continued their services for 30 years.\n\nBeing divine virgins, no one could have sex with them, but, with the exception of Elagabalus, who, in his attempt to produce a divine child, married one of the Vestal Virgins.\n\nThough, its very natural to assume that sex in ancient Rome was all about giant orgies and over the top affairs, reality was pretty different. Romans, no doubt, were masters of sexual acts, but there were many types of moral codes that regulated their acts and dalliances. From being lovers of porn, to being great kissers, Romans did it all!<|endoftext|>six × 5 =<|endoftext|>845<|endoftext|>93\nPage  1 of 93<|endoftext|>Contactez-nous\n247 avenue Gambetta, 75020, Paris, France\ncontact@yanjin.fr\nN° de tel : 07 61 93 48 14\n\nErotic literature has been a part of human culture for centuries, from the ancient Greek texts to modern-day romance novels. However, the topic remains taboo and often misunderstood in many societies. In this article, we will explore the impact of erotic literature on society and its potential benefits.\n\nFirstly, it is essential to define what erotic literature is. Erotic literature, also known as « erotica, » refers to any written work that is intended to arouse or excite the reader sexually. This can include romance novels, short stories, poetry, and more. It is different from pornography, which is visual and often focuses on explicit sexual acts rather than emotional connections.\n\nOne of the primary benefits of erotic literature is its ability to explore complex emotions and relationships. Many erotic works delve into themes of love, desire, and intimacy, providing readers with a deeper understanding of these emotions. This can be especially beneficial for individuals who are shy or inexperienced in romantic relationships, as it allows them to explore these emotions in a safe and controlled environment.\n\nAdditionally, erotic literature can be a powerful tool for sexual education. Many erotic works include accurate and informative descriptions of sexual acts, which can help readers understand their bodies and desires better. This can be especially important for young adults who are just beginning to explore their sexuality.\n\nErotic literature can also be a source of empowerment for women. Many erotic works feature strong, independent female characters who are in control of their sexuality. This can be a refreshing change from traditional media, which xnxx arabic often portrays women as passive objects of desire. By reading erotic literature, women can gain a greater sense of agency and confidence in their own sexuality.\n\nOf course, it is important to note that not all erotic literature is created equal. Some works may perpetuate harmful stereotypes or promote unhealthy sexual behaviors. It is essential for readers to be critical consumers and to seek out works that are respectful and empowering.\n\nIn conclusion, erotic literature has the potential to impact society positively by exploring complex emotions, providing sexual education, and empowering women. However, it is essential for readers to be critical consumers and to seek out works that are respectful and empowering. By doing so, we can harness the power of erotic literature to deepen our understanding of ourselves and our relationships.\n\nhttps://yanjin.fr\n\nLaisser une réponse\n\nVotre adresse e-mail ne sera pas publiée. Les champs obligatoires sont indiqués avec *\n\nRencontrez-nous à la Foire de Bologne du 8 au 11 avril. Notre projet<|endoftext|>9050<|endoftext|>kane hughes<|endoftext|>sözcük ara, mesela sex:\nNamed after the play in basketball, it means to agressively put the moves on, or to hit on someone. To not give up on trying to get someone until you actually get them.\nCould you see if Mike likes me? I don't want to put the full court press on him if he doesn't, because then I'll look like an idiot.\nSerra tarafından 10 Kasım 2003, Pazartesi\nWhen you're constipated so badly that you have to reach out for leverage on the handi-tard bar and shit to press that thing out.\nMy legs were already asleep before I went into the full court press. All I got was some scrogglings", "num_tokens": 2048} {"category": "common_crawl-adult_content", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-adult_content/part-00-00000.npy", "text": " that soft fur. She wanted to stroke it and make that pussycat purr in delight. 'I am so thirsty, I need to drink her, I have to...'\n\nHer train of thought was interrupted by another roar from the girl who now arched her back in orgasm. Her head whipped up and Erika could now see her face and look into her eyes. Those golden eyes with vertical slits that looked exactly like a cat's. The girl's ears twitched and her tail moved showing that they weren't fake. 'She isn't dressed as a cat, she's a real cat-girl.' The shock of that insight doused the inner fire that Erika hadn't even noticed starting.\n\nShe turned around and ran out of the room, not caring which way she turned or where she was going. She just kept running to put as much distance between her and that room. She took a left, a right and a left again until she had to stop and lean against the wall to catch her breath.\n\nInitially she didn't care where she was now as her only concern was getting enough oxygen. But eventually her breathing returned to normal and her mind turned to the task of finding other people, more precisely people who were human and not having sex. At first she thought she had come to a halt next to a clock or closet. But when she moved a little to the center of the hall so she could see the front of it she saw it was neither of those things.\n\nIt was a sarcophagus, complete with a painting on it of a mummy decked out in gold and holding those two scepter-things. Erika vaguely recalled they had put one of those in but she could have sworn it was a lot smaller.\n\n\"Oh God!\" she screamed as she jumped away. Something in the sarcophagus had moved and banged against the wood. As her heart rate slowed down she noticed that it was still rocking. Erika was conflicted on what to do, unsure if she should see if someone was trapped in there or simply leave before she could be surprised like before.\n\n'I can't just go, I need to know if there is somebody in there who needs my help. And if that someone can help me,' she admitted. She wasn't too proud to acknowledge that she was in over her head.\n\nSlowly she approached the elaborate coffin, ready to flee at any moment. She lay one ear on the front of the sarcophagus, once more straining to hear anything that might give her a clue as to who or what was on the other side.\n\n\"Oh, please... I need release... I have to... Please, I need more...\" a woman's voice begged. Erika couldn't hear every word she was saying but it was obvious the woman inside wanted out, was perhaps even running out of air.\n\nHer eyes quickly scanned the seam of the lid, trying to find something that would have prevented the person inside from just pushing the thing open. She quickly found the metal catches and after stepping out of the way she flipped them open. The sarcophagus swung open and Erika eagerly peered in, ready to accept the gratitude from the distraught female inside.\n\nShe was greeted by the sight of a woman wrapped up like a mummy. Those wrappings didn't cover all of her, she could see the woman eyes as well as her breasts capped with rock-hard nipples and a perfectly hairless snatch. Her skin was deeply tanned and had an almost golden sheen to it. The mummy-girl was rocking her hips against the back of the sarcophagus, which puzzled Erika until she caught something on the inside of the lid from the corner of her eyes.\n\nA large dildo had been fastened to it and it was glistening with the woman's juices. She now had a pretty good idea what the woman in the sarcophagus was thrusting into and what she had been doing before that. 'She was fucking herself, getting filled up in both of her entrances.' The mummy-girl was still talking and Erika could hear her perfectly now. \"No, I need more... More inside of me, has to go deeper, harder...\"\n\nThe woman finally opened her dark eyes and they immediately zeroed in on Erika. Without preamble she latched onto Erika's right arm and pulled the pirate-girl to her.\n\nAnother hand caught the back of her head and suddenly Erika found herself kissing the other woman. Their breasts were pressed together and she could feel the other's hard points digging into her soft mounds. Her smell, her arousal filled the sarcophagus and was beginning to do the same thing to Erika's head.\n\nDespite herself Erika began to kiss back, letting her tongue duel its supple opponent as her lips massaged the other's.\n\nShe didn't hear the lid move until she noticed the light in the coffin dim. Panicked Erika wrenched her head from the insisting woman to look over her shoulder. The lid was already halfway and the gap was rapidly getting smaller. She yearned to stay, to drop her trousers and let that big phallus fill her as she rubbed her nub against the mummy's but the fear of being locked up overrode such fantasies.\n\nSurprisingly the girl didn't resist or try to stop her from leaving which was for the best because Erika barely managed to step out before it closed. The latches closed themselves even as a deep moan escaped the closed sarcophagus. Once again, Erika was alone. Once again, she found herself breathing hard. She shivered as a mix of fear and arousal coursed through her system.\n\n'Things are looking up at last,' Erika concluded. She had finally found the stairs to the second floor and those to the third floor hadn't moved so now she just had to find the last flight of steps to the attic and she would be safe. Which was what she was doing at the moment, accompanied by the same music that had greeted her at the entrance. From time to time she found herself swaying in time with its beat, something she felt uncomfortable with but she couldn't tell why.\n\nOnce again a moan beckoned Erika. She already knew there would be no help coming from its source but the voice that had uttered this one sounded distinctly male and she found herself very curious. She peeked around the corner and her eyes tried to fall out of their sockets at her latest discovery even as fear paralyzed her.\n\nA skinny guy was sitting on a chair located next to a door. He had come to the party dressed as Robin Hood and the bow and quiver of arrows were still resting against the wall next to him. His forest green tights however were pooled around his ankles and his impressive hard-on was pointing proudly into the air. His eyes were closed and he had thrown his head back.\n\nSitting on him was the ghost of a noble woman, her hair waving in a non-existent wind. Erika knew it was a ghost because she could see right the woman, witness how the ghost manipulated the member inside of her and apparently derive pleasure from the act if her expression was any indication.\n\nRobin Hood cried out and his hips jerked as he came. Incredibly the ghost became more solid but Erika could still see Robin's dick and that it hadn't wilted. Its foreskin was pulled back and Robin grunted as an invisible force began to manipulate it. Erika slowly pulled her head back and soundlessly moved away, she didn't want to know what the ghost would do to her if she disturbed it.\n\nThe door cracked open just as Erika went by. She stopped and turned halfway, ready for anything. A woman poked her head out who looked relieved when she saw Erika. It was obvious she was dressed as Red Riding Hood, the signature cape was framing her blonde hair and her friendly blue eyes only added to the image.\n\nErika greeted her cautiously, \"hi.\"\n\n\"Oh thank God, I thought I was the only sane one in this madhouse,\" Red began as she opened the door completely. \"I don't know what is going on but I think we'll both be safer in this room than out there.\" And with that she stepped back to let Erika in.\n\nToo relieved to find someone else who wasn't affected she already had a foot on the threshold when it dawned on her that the room was very dark. In fact, Red Riding Hood hadn't turned one single light on. She peered into the darkness and found she could only make out the girl because of her red cape. The darkness was obscuring everything else. \"You're not a member,\" Erika commented as she stood on the threshold, not going any further.\n\nRed Riding Hood shook her head. \"Just a guest, I had heard Phi Beta Pi threw the best Halloween party but I think they went overboard on this one. Could you come inside? I don't want anything else to get in.\"\n\nShe felt her suspicions grow, there was something off. \"Could you turn on the light first? I don't want to trip over anything.\"\n\n\"You don't have to worry about that, the room is very clean. And the light switch is near the door so why don't you step inside and turn the lights on.\"\n\n\"What's your name?\" Erika suddenly asked. She didn't know where that came from but it was a way to stall and that was enough for her right now.\n\n\"I...I...I... Ehm, I really...\" Erika couldn't see clearly but she thought Red looked distressed. 'And why can't she tell me her name? Okay, so there is definitely something going on.'\n\nEven from the doorway she could hear the sigh coming from the girl followed by a click and suddenly the room was bathed in light. There were three beds in the room and Red Riding Hood was standing in front of the center one. There was something underneath the sheets but she couldn't make out what and the things leading away from it drew her attention anyway.\n\nOne purple, organic-looking tube ran from", "num_tokens": 2048} {"category": "common_crawl-adult_content", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-adult_content/part-00-00000.npy", "text": " The rest solidified into a new two-piece cheerleader's outfit made of shiny, gold-and-purple fabric. The top hugged her form all the way up to her neck, though a heart-shaped cleavage window offered a tantalizing glimpse of her breasts. Behind, an ornate bow shaped like a pair of golden, insect-like wings sprouted on her back.\n\nThe bottom was a gold-and-purple miniskirt, behind which trailed a pair of long striped ribbons, attached to a second, larger purple bow. A pair of translucent, shining golden silk veils dropped from the skirt on each side, giving Yumi's strange attire a more regal look. Playfully, the girl lifted her skirt to confirm that she was in fact wearing no underwear at all! She dropped it, and a cute little bee buckle popped into existence on her belt.\n\nWith a few more waves of Yumi's pom-poms, a pair of sneakers, as well as long stockings and gloves striped in her color scheme appeared to complete the outfit. Finally, the pendant on her neck detached to turn into a silver tiara. It landed on her head in a flash of light, causing her hair to explode into countless elegant curls, some of them golden, some remaining purple.\n\nWith full, purple lips, Yumi blew a kiss at an unseen camera, before setting a pom-pom-holding hand behind her head, and another on her hip, posing as she called out her new name in a sultry voice:\n\n\"Bees? Seriously?\" Miharu squeaked out.\n\nReport Story\n\nbyUniracer© 2 comments/ 13564 views/ 6 favorites\n\nShare the love\n\nTags For This Story\n\nReport a Bug\n\n1 Pages:1\n\nPlease Rate This Submission:\n\nPlease Rate This Submission:\n\nPlease wait\nFavorite Author Favorite Story\n\nheartGrayNathan, Gray_nath<|endoftext|>Naked #1: My Sexuality Is Human\n\nI want you to take a deep breath and repeat after me: my sexuality is human.\n\nIt might be a hard pill for most of us to swallow - especially if we've grown up around aunties in tummy-bearing saris (by the way, werk!) telling us to not wear shorts kyunki log kya kahenge? (\"What will people say?\")\n\nBefore I dive into this, let me tell you that I'm not some brown girl living in a first world, sex-positive country. Nope. Nada. I've spent eighteen years right here living my middle-class life in the humid cesspool that is Mumbai. Sure, it might be one of the more liberal areas, especially in comparison to some less fortunate, rural regions of India - I'm not going to discount that. But I've had my fair share of aunties (and parents, uncles, grandmas, the lady at the parlour, et al) telling me that my body and my sexuality is something I should hide. I believed them for waaay too long for it to be healthy, but better late than never, I suppose. Anyway, before I digress...\n\nThis one's for that one girl who probably hit puberty a couple of months ago and is really f$#%kin' confused about her body right now. I want you to know that it's okay to feel what you're feeling. The hair on your body doesn't make you ugly. It's natural. To keep it or get rid of it is your decision. No one else's. That warm, oozy sensation when you see that person you really like? It's not wrong. Wanting to touch yourself isn't inappropriate. It's your body, you might as well explore it. You have every right to. You're not alone, either - we all do it.\n\n11f00c262645623a6a726b70d7e2d455-1\n\nFor a country that is so damn shy of the word 'sex' or 'masturbation', we sure do indulge in a lot of it. For instance, in 2017, PornHub revealed that female viewers of porn in India increased the most out of all countries, skyrocketing up by 129%. The same report also states that the majority of Indian users on PornHub are aged between 18-24, which is a stark change from the website's global average of 35. The point is, we're all having fun in our bedrooms, but for some reason we refuse to talk about it. Conversations matter more than one might think they would. The lack of them is really not helping the girls across the country who are pushed into believing that their bodies and their sexuality is something they should be ashamed of - not only does it keep them from understanding their own bodies, but it also drives them away from educating themselves on how to have safe, enjoyable sexual experiences.\n\n3-pornhub-insights-2017-year-review-gender-demographics\n\nSo ladies, here's my humble request: talk about it. Tell your sister, daughter, friend, girlfriend, or whoever it may be, to embrace it. Love it. Enjoy it.\n\nAnd, for God's sake, don't let anyone tell you to be ashamed of it.\n\nImage Courtesy\nLana Abie\nBen Hopper\n\nA 19 year old chick with an emotional range of a teaspoon. I listen to Weezer, read and play a shit ton of video games.\n\nRead More\nNaked #1: My Sexuality Is Human\nShare this<|endoftext|>3,765 other followers<|endoftext|>40 other followers<|endoftext|>1,078 other followers<|endoftext|>• Name: Sofia\n • 40 years old\n • 59 kg\n\n • Name: Ellie\n • 20 years old\n • 57 kg\n\n • Name: Frida\n • 25 years old\n • 57 kg\n\n • Name: Alexia\n • 39 years old\n • 54 kg\n\n • Name: Amirah\n • 33 years old\n • 57 kg\n\n • Name: Ivanna\n • 28 years old\n • 52 kg\n\nBrothels Coates PE7, City Of Edinburgh\n\nAmidst the bustling Coatesstreets, nestled between a nondescript street, stood your house of Whispers. Just as the sun dipped listed below the horizon, a soft glow originated from its windows with the pledge of fulfillment and satisfaction for those brave enough to venture inside.\n\nAs the large oak door swung open, visitors were greeted with an envigorating mix of scents - the sultry aroma of musk, the warm embrace of spices, and a faint alluring touch of fragrance. The dimly lit room functioned as an entrance to a world brimming with distress, lust, and passion.\n\nMadame Lucille, the raven-haired proprietor of the facility, supervise her domain with a firm hand and unmatched authority. Being a seasoned charmer, she would welcome each guest with an understanding smile and piercing green eyes. Behind her radiant personality, her mind was constantly sorting through countless stories and tricks she had actually concerned discover from her patrons.\n\nKatherine, a young, shapely blonde, captivated everyone who laid their eyes on her. Her sultry, soft-spoken voice echoed the aura of a fallen angel, tempting even the staunchest of hearts. Unbeknownst to the world, her unbreakable spirit was a reaction to a complicated past that had led her to your home of Whispers.\n\nIsabella, a fiery redhead with a strong essence of self-reliance, had been operating at the Coates brothel ever given that her family had actually disowned her. Growing up in a conservative household, her vibrant personality had encountered her family's perfects. In spite of this, your home of Whispers supplied her with a sense of belonging she had never genuinely experienced.\n\nVictor, an aristocrat who frequented the facility, was not thinking about the indulgences of the flesh alone. He longed for the intellectual connection that the majority of stopped working to kindle within him. A poetry lover, he sought the combination of wit and sensuality that just a couple of amongst the ladies might supply.\n\nAs the night commenced, your home of Whispers came alive with laughter, discussion, and amorous glances. Each character moved through the night like gamers in a complex symphony, as fate twisted the strings, pulling them into different acts that held pleasure, pain and an unforeseen love.\n\nIt remained in this whirlwind of passions that Katherine first locked eyes with Victor. As they participated in a conversation sprinkled with wit, intelligence, and a touch of humor, a deep emotional intimacy started to form in between them. Isabella, on the other hand, found herself drawn towards a beginner, a man who appreciated her uniqueness and self-reliance.\n\nThe moon cast its mystic glow on the House of Whispers, covering everyone with its silvery light. That night had actually been the dawn of new starts and unanticipated relationships, for everybody involved had actually seen sparks of their own desires kindled in the depths of another's soul.\n\nAs the very first rays of the sun signaled the end of the bewitching adventure, the clients silently filed out of the Coates brothel, their pleased hearts yearning for more. And within your home of Whispers, the stories of desire, desire, and passion would continue to entwine, emulating the lovely complexity of human connections on the ever-changing canvas of life's unfolding drama.\n\nAs midnight approached, the environment within your house of Whispers started to thicken with sexy tension. Skimpy attire highlighted the sensual curves and flexible skin of the appealing women, and enthusiastic whispers rose above the soft melodies of a concealed pianist.\n\n", "num_tokens": 2048} {"category": "common_crawl-adult_content", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-adult_content/part-00-00000.npy", "text": " for VIP escorts has surged as individuals seek an unparalleled experience marked by luxury, refinement, and the assurance of top-tier companionship. Let's delve into the realm of VIP escorts and explore the elements that make them the choice for those who desire nothing but the best.\n\nVIP escorts are distinguished by their exceptional qualities extending beyond physical beauty. These companions often embody a rare combination of elegance, intelligence, and social grace, making them ideal for high-profile events, exclusive gatherings, and intimate encounters. The allure of VIP Delhi escorts lies not only in their external charm but also in the refinement and poise they bring to every interaction.\n\nExclusivity is a defining feature of VIP escorts, and clients engaging with these companions gain access to a world of bespoke services tailored to their unique desires. Whether attending VIP events, traveling in style, or enjoying personalized experiences, VIP escorts go above and beyond to ensure their clients feel like royalty. The emphasis on exclusivity extends to the level of professionalism and discretion maintained throughout the entire engagement.\n\nThe selection process for VIP escorts is rigorous, often involving comprehensive screening to ensure they meet the highest standards of professionalism and comportment. Reputable agencies and escorts independent prioritize maintaining an impeccable image, guaranteeing that clients engage with elite companions who uphold the values of integrity, sophistication, and discretion.\n\nEngaging the services of VIP escorts is not merely a transaction; it is an investment in an unparalleled experience. The premium associated with VIP companionship reflects the commitment to providing top-notch service, where every detail is meticulously attended to. Clients seeking the company of affordable escorts value the assurance that guarantees an exceptional encounter characterized by luxury, exclusivity, and a seamless blend of sophistication.\n\nElevating the Experience: The Unmatched Allure of VIP Escorts\n\nAs the demand for top escorts continues to soar, it's essential to delve deeper into what sets these elite companions apart. It makes them the preferred choice for those who seek an unmatched level of sophistication and indulgence. The allure of VIP escorts extends beyond the external trappings of luxury; it's about the entire experience, from the initial interaction to the culmination of a memorable encounter.\n\nVIP escorts excel in creating a seamless and indulgent experience for their clients. From the moment of engagement, clients are treated to a level of personalized attention that goes beyond expectations. VIP escorts understand the importance of catering to individual preferences, ensuring each encounter reflects the client's desires and fantasies.\n\nOne of the distinguishing features of VIP escorts is their ability to adapt to various social settings easily. Whether attending high-profile events, business functions, or intimate dinners, VIP escorts carry themselves with poise and grace. Their social understanding allows them to navigate diverse environments, ensuring clients feel accompanied and genuinely proud to have such a captivating companion.\n\nThe exclusivity associated with VIP escorts extends to the breadth of services they offer. Beyond companionship, many VIP escorts provide bespoke services, such as travel companionship, event planning, and personalized experiences tailored to clients' tastes. This comprehensive approach ensures that every moment spent with a VIP escort is a carefully curated and unforgettable experience.<|endoftext|>1. Headline\n 1. Headline<|endoftext|>✨ Fill and validate PDF forms with InstaFill AI. Save an average of 34 minutes on each form, reducing mistakes by 90% and ensuring accuracy. Learn more\n\nBettie Page Images\n\nBettie Page (born April 22, 1923 – December 11, 2008) was an American model and actress who became a cultural icon and sex symbol of the 1950s. She was known for her provocative and risqué pin-up photos, which often featured her in bondage and fetishistic poses.\n\nBorn in Nashville, Tennessee, Page grew up in a strict religious household. After graduating from high school, she moved to New York City to pursue a career in modeling. She began her modeling career in the late 1940s, posing for various photographers and appearing in men's magazines such as \"Pictorial Review\" and \"Bachelor's Boudoir.\"\n\nHowever, it was her work with photographer Irving Klaw in the early 1950s that brought her to widespread attention. Klaw specialized in bondage and fetish photography, and Page's images in his studio became some of the most iconic of the era. She was often dressed in revealing outfits, such as fishnet stockings and leather bondage gear, and was frequently bound and gagged in the photographs.\n\nDespite the controversy surrounding her work, Page's popularity continued to grow. She appeared in several short films, including \"The Story of Bettie Page\" (1952) and \"Teasers\" (1953), and even had a brief stint as a striptease artist.\n\nHowever, by the late 1950s, the public's appetite for bondage and fetish imagery had waned, and Page's career began to decline. She retired from modeling and acting in the late 1950s and lived a quiet life in Tennessee until her death in 2008.\n\nDespite her retirement from the public eye, Bettie Page's influence on popular culture continued to be felt. She was a major influence on the burgeoning fetish and bondage subcultures of the 1960s and 1970s, and her images continue to be celebrated and replicated in various forms of media. She is often referred to as the \"Queen of Pin-ups\" and is remembered as a pioneering figure in the history of erotic photography.\n\nShow More<|endoftext|>four × 3 =<|endoftext|>The Divorced Aunty’s Delight\n\nRomeo, the infamous college-going student from Delhi, had a reputation for his uncanny ability to satisfy women. He had recently been approached by a divorced woman in her early fifties, who had been a regular reader of Romeo’s erotic tales in various platforms.\nHer name was Meera, a 52-year-old divorced woman who had been craving the touch of a man for ten long years. She had stumbled upon Romeo’s story, “The Ecstasy of Married Delhi Woman,” and felt an instant connection to his explicit words.\n\nMeera reached out to Romeo through Gchat, her fingers trembling with anticipation as she typed out her message. She introduced herself as a long-time admirer of his work and expressed her curiosity about his fantasies. Romeo, always eager for new challenges and experiences, agreed to meet with Meera.\n\nTheir first rendezvous took place in a quaint little café in the heart of Delhi. Meera, dressed in a seductive yet sophisticated outfit, caught the attention of Romeo as she entered the café. Her eyes met his, and an unspoken understanding passed between them.\n“So, Meera, you’ve been enjoying my stories, huh?” Romeo began, his eyes never leaving hers.\n“Yes, Romeo. I find them incredibly arousing, but I’ve always wondered – how much of it is fiction and how much is based on real-life experiences?” Meera replied, her gaze never wavering.\n“Well, Meera, a gentleman never kisses and tells, but let’s just say that I’ve had my fair share of adventures. And I’m always willing to explore new territories.” Romeo’s voice was smooth like silk brushing against her skin.\nMeera’s heart raced as she listened to Romeo’s words. She felt a warmth between her legs, a longing that had been suppressed for far too long.\n“I’m curious, Romeo. How do you usually start your encounters? What sort of foreplay do you enjoy?” Meera asked, her voice barely above a whisper.\n\nRomeo leaned in, his voice low and seductive. “It all depends on the woman, Meera. Some enjoy a gentle touch, while others crave a more aggressive approach. I like to tailor my approach to their desires.”\nMeera’s breath hitched at the thought of Romeo’s skilled hands on her body. She could feel the heat rising between them, a palpable tension that threatened to consume her.\n“I’d like to see what you can do, Romeo. Perhaps we could explore each other’s fantasies together?” Meera suggested, her eyes locked onto his.\nRomeo’s lips curved into a smile, a devilish glint in his eyes. “I think that could be arranged, Meera. But first, let’s discuss your desires. What are some of the things you’ve fantasized about?”\n\nMeera hesitated for a moment, her cheeks flushing with embarrassment. “I’ve always been fascinated by the idea of being taken in every possible way. I want to experience the pleasure of being penetrated without any hesitation or mercy.”\nRomeo’s eyes widened with excitement. “Well, Meera, it just so happens that I specialize in fulfilling such fantasies. But let’s not get ahead of ourselves. We should take our time and explore each other’s bodies first.”\n\nMeera nodded eagerly, her anticipation growing with every passing second. She wanted to feel Romeo’s touch, to experience the pleasures he had so vividly described in his stories.\nThey continued to chat for hours, discussing their desires and fantasies in explicit detail. As the night wore on, Meera found herself growing increasingly aroused. She was more than ready to take the next step with Romeo.\n\n“Meera, I think it’s time for us to move this to a more private setting,” Romeo whispered into her ear, his breath hot against her skin.\nShe nodded, her heart pounding in her chest. They made their way to a nearby hotel, their bodies practically vibrating with desire.\nAs soon as they entered the hotel room, Meera felt Romeo’s hands on her, undressing her with a fervor that sent shivers down her spine. His lips found hers, his tongue exploring her mouth with an expertise that left her breathless.\n\nRomeo’s hands roamed her body, caressing her breasts and pinching her nipples, causing her to moan with pleasure. He kissed a trail down her neck, nibbling on her earlobes and eliciting soft gasps of", "num_tokens": 2048} {"category": "common_crawl-adult_content", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-adult_content/part-00-00000.npy", "text": "club main page.\n- Great looking girls and the majority of them do anal and deepthroat (older scenes have more regular, vaginal sex but for the past two years or so almost every scene has some anal action).\n- Scenes look good with varied camera angles, good light, good combination of wide shots and close-ups\n- The last two or three scenes feature a very brief interview and the girl playing with herself before the actual sex, otherwise the action is a bit formulaic with BJ, vagina sex, some anal, back to BJ and cumshot\n- Some very very hot girls, including several that don't show up anywhere else on the network (or even on-line as far as I can tell)\n- Ever scene has very good quality images, although no zip (I recommend using neodownloader to get the images)\nCons: - Just like the entire teencoreclub network this site suffers from simplistic webdesign, very strange update schedule and no search features.\n- Hot models doing anal but pretty much everything else here is a con starting with the price and going all the way to lack of choices when it comes to downloads.\n- This is the only site in the network that for me had strange download speeds. Sometimes it would max my internet connection, sometimes it would go as slow as 20kb or time-out. Not sure why or how.\n- Price is pretty restrictive\nBottom Line: I always find it tough to review a site from the Teencore club network. On one hand they have incredible models often well before they show up anywhere else on the internet (I believe Isabella Clark and Aspen Richardsen started on this network) but at the same time everything else about the network is barely worth mentioning.\n\nThe web design is basic, reminding me of the first porn sites that were available on-line. Customer support is very basic, there are no extras worth mentioning, no different options when downloading a scene (you get WMV and that's it) The pictures don't have zip archives. There is no model search or even content type search. For example on this site about a third of the scenes are only vaginal sex, but there is no way to filter them out.\n\nThe list of complaints can go on and on, but in the end this is a network that has great looking girls and not much else going on for it. Still I find myself coming back for them again and again for brief periods of time. I use image grabbers to get all the images and periodically download the updates but in all honesty I wouldn't stay a member for long periods of times.\n\nNow that being said about the network itself I have a few comments on this site in particular.\n\nThe scenes here seem to run a bit longer than the rest of the network, most of them 30 minutes or a bit more. The angles of the action seem more varied here and the guy goes from anal to vaginal, back to anal pretty often in many different positions. In fact I'd say this is the most varied site on the whole network, aside from HardcoreYouth (which is compete different in vibe and more similar to firstanalquest or 21 sextury).\n\nAnother interesting aspect for me was that many of the scenes seem more realistic with some the girls struggling to accept the male model into their buts. Maybe they film the girls first on this site or the guy is significantly bigger than they experienced before but there are not many massive gapes here, something I was actually pretty pleased with.\n\nOverall, I'd recommend this network to anyone who hasn't been a member before and enjoys young girls doing real hardcore stuff. Try it for a month or two, get all the DRM free content you can get and wait a few months until they get some new content then pay them another visit if you like their type of content.\n\n05-20-12  05:47pm\n\nReplies (0)\nVisit Deep Throat Love\n\nDeep Throat Love\n\nStatus: Was a member approx. 2 months prior to this review.\nPros: - Around 145 scenes now and updating regularly (almost weekly, although they do miss a week or two here and there). Most scenes come in a range of formats including HD (1250x700) as well as standard sizes and small clips. They also have HD images for each set at 3,000px × 2,000px (zip archives available). Older stuff is of course in lower resolutions, but for the most part stuff looks great.\n\n-Download speeds were incredible at around 1 mb per video. No issues with log-out or missing links or anything like that. Overall the technical aspects of the site work well. However, I do wish they had a way to show all models on this site alone as opposed to models in the entire network.\n\n- The scenes have good camerawork, but they tend to focus a bit too much on close-ups. Good light and hot models.\n\n- Although the site is called Deepthroat love I believe all scenes have some regular sex as well, and we even get some threesomes (not too much anal though)\n\n- Overall fun scenes with cute girls\nCons: - I mentioned this in almost every one of my reviews for Porn pros but it's a pretty huge mistake and it's very obvious here: they need a better thumbnail system. Right now as you navigate the site you get to see the scenes name and the models in it, but the picture for it is always hard to make out (you often see more of the cock and the girl's forehead than her actual face.)\n\n- Each scene starts with an interview that can get ridiculous. The camera guy asks the girl to deepthroat a dance wand, or a banana or some candy marshmallows. One one hand it can be funny, but then again it takes 5 minutes away from 30 minute scenes. Depends on you if it's a bonus or a con. For me it got repetitive and the girls weren't interesting enough to make it fun.\n\n- Although they do deepthroat none of the scenes are as anywhere as intense as FacialAbuse or Gagfactor or even Teencoreclub. The girl's make-up doesn't get ruined and they don't end up with spit on their faces.\nBottom Line: It's been a while since I last visited Pornpros and the network has improved in many areas, while maintaining some of the positive stuff that attracted me to them in the first place.\n\nThey still get some good looking models and many of them are exclusive. The girls do hardcore (including some impressive deep throating on this site), but it never feels forced or abusive. In fact the whole vibe of the site and the network is fun, ridiculous and over the top fun.\n\nLet me give you some examples of the kind of scenes you can get inside. In one video the girl tries to stuff 24 marshmallows in her mouth and looks like she's about to explode into laughter at how ridiculous the whole thing is. In another scene the girl tries to deepthroat twizlers and almost gets the hickups. It all feels funny and while it can get a bit repetitive if you like the vibe this site is great. (I think at some point or another you get to see girls try to deepthroat bottles of water, sausages, almost all kinds of candy imaginable, bananas, corn, asparagus and celery, oh and cucumbers, how could I forget cucumbers)\n\nOnce the interview and the attempt at stuffing ridiculous food down your throat is done the girl goes down on the male model with a lot of closeups of the action. This depends a bit from scene to scene but overall I'd say you get too see everything, even a bit too close for my preference. The BJ sessions are interrupted by sex usually at least twice. Most videos have doggy, reverse cow and some sort of missionary with her legs over her head.\n\nWhat I found interesting was that most girls really seem to get into the sex and many of then bounce on the guys cock as opposed to him doing all the work. This can be very hot if you like to see a girls round ass as she bounces on a dude in doggy style. I, personally found it extremely hot and different from a lot of sites where the girl just sits there taking it very passively.\n\nThe content is pretty similar all throughout the site and most models fit the same mold (big breasts, round asses, a lot of them have tattoos and piercings and although they all say they are 18 or 20 they seem to be somewhere in that 25-ish nebulous porn starlet age)\n\nSome of the cons are that it's not as intense as you'd expect from a site named Deepthroatlove and most action feels too mainstream, no DP, no runny make-up, no really gagging or intense face fucking. In fact very much of the content feels like a pretty standard porn DVD. While this is fine, it does feel like they should get at least some scenes with more umph. Right now I felt like half the scenes here could have been on any other one of the sites in the network. Then again if you just want straight sex with good looking very well made-up girls this will be perfect.\n\nAnyhow, combined with the network access (which gives you more scenes than you'll ever be able to watch) the site is a great deal if you're not looking for very niche porn. For anyone that wants to replace DVD's with the convenience of a major network this site is perfect. It offers enough hardcore action to satisfy most people, stays fun and has consistently high quality.\n\nIf they would improve their thumbnail system and get some more unique looking models I'd declare this a perfect site. As it stands this site just didn't fit my personal taste and while I do recommend it, make sure you like their type of content before committing to a membership.\n\n10-23-11  06:59pm\n\n", "num_tokens": 2048} {"category": "common_crawl-adult_content", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-adult_content/part-00-00000.npy", "text": " asked, smiling sweetly.\n\nFUCK! I hadn't actually said that, had I? \"Wh... what?\" I mumbled.\n\n\"You looked at me as if you were about to ask a question,\" you explained, running your fingers through those blonde locks again.\n\nThank God. The words had run through my brain, not my mouth.\n\nBut the way you gave me that Sammi look, your blue eyes staring directly into mine, that twinkling, sexual gaze boring inside me, reaching parts that longed to be reached- I was sure you knew exactly what you were doing. It was a mind fuck, pure and simple.\n\n\"Hey, Alan,\" you said, bringing me out of my reverie again.\n\nIf anything, those blue eyes upped the pace, promising everything. My cock twitched, reacting to those eyes, in just the same way as it would if you had those soft lips wrapped around it, as it would if it was slowly pushing inside you, your long legs spread wide as you welcomed me inside your buttery sex.\n\n\"Hey,\" you repeated.\n\nI swallowed deeply as you leant forward. \"Sorry,\" I mumbled again, trying to regain control of my senses for a moment.\n\n\"That's okay,\" you smiled, while the look in your eyes kept up the pressure. \"Something's on your mind. Want to share those thoughts?\"\n\n\"Want me to?\" I asked, looking for a way out.\n\nThere wasn't any. The way you nodded and said, \"Of course,\" told me that.\n\nI swallowed again. \"I was thinking how it would feel to fuck you,\" I simply said.\n\nI wasn't sure what reaction I'd get. A look of shock? A burst of laughter? An embarrassed smile? It was none of those things. That same 'come-to-bed' Sammi-look continued to search inside my soul as you nodded, just as if I'd asked if you'd enjoyed the meal.\n\n\"Unbelievable,\" you replied, a smile breaking out across your lips. It wasn't just the answer that sent a shiver of excitement through me. Not even the matter-of-fact response, as if fucking you would blow my mind. No, it was the way those eyes said, you never know.\n\nThe spell was broken, albeit temporarily, as the waiter brought our coffees. Waiting until he left us alone, you leant across the table again. \"Well?\"\n\n\"Well what?\" I stupidly responded. My erection twitched again. Surely you weren't suggesting.......\n\n\"You haven't told me what we're going to do after dinner!\"\n\nOh, yes. That! Not an easy question to answer. After all, we'd just eaten. You'd made it clear you didn't enjoy shows. And a nightclub was a naff idea. Shit! That's when the idea hit me.\n\n\"How about?\" I began, smiling at you...\n\nI don't drink red wine very much. That's not because I don't like it, for I do. I prefer the taste, generally and the texture as it slips down my throat is usually lovely. No, I tend to choose white for two reasons. Firstly it doesn't stain your teeth as red wine and strong coffee can. So I take the strong coffee, espresso usually, and pass on the red stuff. As white wine seems to me to be weaker, generally, that creates the other reason why I stay away from the Clarets, the Barollos and Chiantis; I don't get pissed as quickly on the Chardonnay, Chablis or white Burgundies as I do on them.\n\nI had forgotten about those reasons today. I often do that with promises, vows or New Year resolutions; it can very useful having a selective memory, not to mention (natural) blonde hair as well. I had no idea about my teeth as I sat listening to you and wondering where this almost Kafkaesque, certainly surreal and definitely Freudian encounter was leading. I was, though, quite aware of the second reason regarding my avoidance of red wine. Yes I felt slightly pissed. And as those woozy feelings slightly befuddled my head, I wondered if what some say about people being at their most natural when inebriated was true. I wondered that particularly, because I felt so unusually, almost unbelievably and certainly hugely horny. And that just doesn't happen to me, well not very often it doesn't.\n\n'He didn't did he?'\n\n'Did he say that, are my ears working properly?'\n\n'He couldn't have done, but I think he did.'\n\nI was saying those things to myself as we seemed to be staring at each other like two starry eyed teenagers, not like a mature man and a young bird.\n\nI tried using my mind like a computer. Going into storage and retrieving some data so that it may be reviewed again. 'Yep, that's what he said,' the hard drive confirmed.\n\n\"I was thinking how it would feel to fuck you,\"\n\nWas I annoyed, hurt, ashamed or pleased? Did I feel insulted, worried, concerned or scared? Had you abused, demeaned or degraded me? Were you pushing your luck, did you have unattainable aspirations, was it a bloody cheek to try to pull a granddaughter? Were you out of your fucking head asking me such a thing?\n\nI didn't know the answers. Was there any? How does a girl handle such a situation? It was so far outside of anything that had ever happened to me that I had no previous to call upon.\n\nAll I was sure about was that, and I could hardly believe it was the paramount emotion, I was impressed. Yes fucking impressed because an old guy had told me he was wondering what it would be like to fuck me. No one had ever said that to me before, not surprisingly really. Alright wiseguys in clubs had asked questions out of the blue, like 'Do you fuck strangers?' But they didn't count. This did though. This counted a lot.\n\nI had only once, and that was with an 'older' guy as well, had such a conversation. One where the 'nitty gritty' was, mixing metaphors so easily, 'on the table.' Where we, well you at least, was saying what you meant and felt. It takes experience, confidence and a certain amount of gravitas to be able to wonder to a young bird what it would feel like to fuck her. It didn't, as it could so easily, come across as sounding pervy or sleezy, assumptive or pushy. No, to my, perhaps overly impressionable ears, for I am such a sucker for intelligence, a cogently posed argument employing good English is far more likely to get my knickers down than is Bradlike face or body. Being told that someone wondered what it would be like to fuck me, came across as being erotically intellectual, or was intellectually erotic more apt? Fuck knows.\n\nMaybe splitting hairs somewhat, you hadn't said that you would like to fuck me, or that you had been thinking about fucking me, or how much you would like to fuck me, or how excited the idea of fucking me made you. No, you said that you were wondering how it would FEEL to fuck me. I took that to mean, not the feelings you might get from my tight young cunt muscles grabbing your cock, not the feel of my tits on your chest and not the feel on your hand and fingers from caressing my 'tits and ass.' No I took it to mean how you would feel, really feel. How you would feel emotionally, deep down inside? You could go and buy from a hooker or massage girl the other sexually physical feelings, but not the inner feeling that only you could experience from pulling a young bird, chatting her up and impressing her, me, into letting you fuck her. Or more to the point, and probably more what you wanted, for her to fuck you as you fucked her. Isn't that what all men really want, to be fucked as they fuck?\n\nDespite the age gap, which certainly earlier in the meal had seemed to vanish, only to come back when you mentioned about what we should do after dinner, was diminishing again now you had broached the topic that is always there when 'boy meets girl.'\n\n'How would it feel to fuck me?' I wondered suddenly thinking 'How would it feel to be fucked by you? How would your body feel? Would you get fully hard? Would you need help, would you be able to keep it up, and stay hard for how long and when would you be able to do it again? What would your skin feel like to my touch?'\n\nBloody hell my slightly pissed mind was whirling fast. So fast I couldn't multi-task sufficiently to think and talk and that's why I came up with such a pants reply as.\n\nI was surprised you didn't say 'What the fuck does that mean?'\n\nInstead, as I felt the cotton of my blouse rubbing against what I knew without looking were, my hardened nipples, you said. \"How about?\" And then paused.\n\nIt was like those stupid shows on TV when they are eliminating people and they feel that by saying 'And the couple going home this week are...............................\" and then wait almost a week before announcing it, that they are building the tension. I never feel it when watching Celebrity Get Me Out of Here, but by Christ I did as I looked into your eyes searching for a sign of what might be coming next.\n\nI half felt that you would suggest 'A nightcap at my hotel' or maybe going to bar. A little bit of me thought you would suggest a club and some felt you would continue from \"How about\" with \"Us going outside and me fucking you up against a wall in a quiet alleyway.\"\n\nWith the impatience that at times makes me appear to be childlike as I try to find out what my parents have bought me for a birthday or Christmas present I couldn't", "num_tokens": 2048} {"category": "common_crawl-adult_content", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-adult_content/part-00-00000.npy", "text": " SC200))\n\n(SC151 - SC20<|endoftext|>83<|endoftext|>selecteerde transacties<|endoftext|>All the way from Pensacola in Florida, we have a new, thick young wannabe whore, Sissy Jordan.\n\nOnly one cock has ever passed these virginal lips, but the memory of it drives her crazy! She spends those long hot Florida nights dreaming of laying back and opening her legs to Man after Man, feeling their thick throbbing meat invading her fat booty, pounding her, the grunt as they empty their bull-balls deep inside her and then withdraw, pausing only to wipe their sticky cocks across her face before they button up and leave.\n\nThis is her dream, and in the dream, her Blackmailer stands in the corner of the room behind the camera, recording every bit of the action – creating an inescapable web of blackmail humiliation from which she will never be able to escape.\n\nThis is her dream.\n\nCan you help make it come true?\n\nWrite to her! https://twitter.com/sissygurl97<|endoftext|>School Reports 2017: SapientRazorfish<|endoftext|>4,070 other followers<|endoftext|>Best Bricklayers in Oonoonba QLD<|endoftext|>24 May, 2024\n3 mins read<|endoftext|>25th Birthday Gifts for Teens - Media<|endoftext|>Why am I seeing this ad?<|endoftext|>0 }<|endoftext|>CashMoneyGirls has regular updates with hot financial dommes (Videos in German language) - JOIN NOW\n\nFindom July\n\nRating: 6.69\n\nI'll take your money and ignore you\n\nCome on, give me your money - you know it's mine now. And now that I have it I'll just ignore you. You're not worth getting any more attention. Maybe you'll bring some more cash next time - and maybe I'll give you some attention then.\n\nAmber & Jenny\nWank-prohibition for the chastity-slave\nYou want to be Princess Serena's only money slave?\nPiles of banknotes for your mistress!\nAngelina M\nAngelina's facesitting slave<|endoftext|>The Punk Vault\n\n97 other subscribers<|endoftext|>lovelybutterflies<|endoftext|>面部护理\n\n阜阳野香花面部护理\n\n备孕期间能做面部护理吗<|endoftext|>TheFW<|endoftext|>You are hereEurope<|endoftext|>Drilling for the oldest i<|endoftext|>20 − 3 =<|endoftext|>tagAnalChubby Anal Banquet\n\nChubby Anal Banquet\n\nMy girlfriend and I are truly a match made in fetish heaven. Even though our society is supposedly sexually liberated, it is difficult to broach the subject of licking ass, and although I can't know this, it's probably safe to assume that most people who do it aren't open about it because so many people react prudishly, despite what their sexual appetites may be telling them. I haven't met a straight/bi guy yet who can't appreciate the beauty of a woman's ass, but to say \"I'd love to eat that for hours\" is still something that I feel can only be said in select company, at least in my experience.\n\nAll that having been said, my lady's ass is exquisite. She is short (5'4) and thick (155 lbs), and is considered fat by many I'm sure, but I am in lust as well as in love with her. She wears her weight well, with a nice tummy (not a pouch), nice tits (not too big and droopy), and an ass that magnetized me to her when I first met her. It is a perfect apple, with a wonderful crevice that has a circle of hairs peeking out from where they surround her anus. We get along well in most respects, and the physical chemistry is just perfect. I want to relate in detail how one particular afternoon experience of worshipping that gorgeous butt went down.\n\nShe had been out for the day shopping with her mother and had returned around four on a winter afternoon, that time of golden light creeping into dusk. She had showered that morning and just as she was walking out she said, \"Damn, I gotta hit the bathroom before I go.\" She took long enough so that I knew it was number two, and after five or so minutes I heard a flush and out she went, wearing leggings beneath her jeans as it was indeed a cold day. When she returned home about five hours later, I was relaxing on the couch reading. She set her bags down, gave me the rundown of her day, what she could and couldn't find, yada, yada, yada, and how she just wanted to rest. I said I can help with that, and we exchanged that knowing look between us in which we non-vocally acknowledge the nature of my submissive need to worship her body. We are not a dom/sub couple, but our inclinations in that respect work well together.\n\n\"How about lying down on your belly, sweetie, and let me take care of you.\"\n\n\"Mmmm, that sounds wonderful.\"\n\nShe laid herself down on the couch, made vibrant in the late afternoon light. She had already taken off her coat and sweater, leaving a yellow cotton tee shirt and her jeans with all of her glory beneath. Her thick frame was so delicious in its appeal, just waiting for me to enjoy it. I gave a quiet thanks to the Divine and began rubbing her shoulders and back, eventually moving my hands under her shirt. She had taken her bra off before we started, so there wasn't that uncomfortable bit of fabric in the way, just soft, smooth, chubby skin that electrified my senses. After kneading her back for a while I moved to the area just above her waistline, pushing my thumbs under her jeans, leggings, and panties, rubbing the top of her crack. She cooed and I hardened considerably. Reaching around I unbuttoned her jeans and peeled them off, which took some effort.\n\nFinally they were off and her shapely body was there for the licking, framed well by the leggings, which went off right after the jeans. This is the moment when I fight with myself, my instinct being to rip her panties off and go at it, but I do have a fetish for panties, and I just had to enjoy them on her for a bit more. They were cotton tangas, light blue with a dark blue border. I love this style of panties on her, how her ass stretches them, pulling the back into her crack. I rubbed and kissed my way slowly up her legs, sitting on the floor leaning across her. My kisses were alternating thigh to thigh, close to her treasure, when I climbed onto the couch. I was comfy in pajamas and a cotton shirt, which I took off to feel my chest against her legs. A similar situation, in the beginning of our relationship, would cause her to pause and to wash up, as she was conscious about having \"gone\" earlier and being sweaty. Her skin was indeed a little moist, from the layers of clothing, but not really wet. I could tell, however, that her panties had soaked up some sweat throughout the day, and as my face inched upward, her scent filled me. It was strong and lovely, that delicious ass smell that makes men (and many women) so primal in their lust. I continued to kiss upward, making it to her cheeks, and she let out a soft moan and said, \"I love you.\"\n\n\"I love you, and I love this.\"\n\nKissing along the edge of her panties, I slanted along her right cheek and across her waist, then down her left cheek. They were soft, tentative kisses, as I learned long ago that good things are better when you take your time. When I got down to the bottom I was positioned just over her anus and, leaning my nose into her crack, pushing the fabric in further I took a light sniff. It was strong, i.e. oh so natural. I increased the pull into my lungs with my second inhale and was overwhelmed with lust for this woman, this chubby, sexy creature lying belly down, all curves and soft flesh. Her shirt was still on, which I like as it accentuates the fact that I am servicing her, although really we are servicing each other. Her panties had to go at this point as I could no longer prolong it. I snuck my fingers into the waistband at her hips, squeezing into the damp panties as she leaned up into that wanton arch signifying the pleasure to come. I pulled slowly as the panties dragged over her bottom, letting her scent permeate the air much more richly than before. Down her legs and over her feet, she was now bottomless.\n\nI was in full lust mode now. An extra-terrestrial invasion would've caused no alarm in me at this point. Light, passionate licks up and down her crack. The interruption of her hairs in the contact nearly made me cum, so pungent was their taste and scent. After a few passes up and down her crack they were matted against her skin. I placed my hands on her cheeks and with my thumbs slowly pulled them apart. The scent reached its apex as it wafted out, causing me to moan in sexual delirium. She made her own noises. Leaning forward, holding her open, I sniffed and stared. Her asshole is beautiful and certainly not a bleached pink starfish. It was brown and sticky with sweat and hair, many of the hairs sticking to each other in clumps that clearly indicated she had shit this morning. She is a thorough wiper, but sometimes it's inevitable that traces get left behind when one doesn't shave her ass. The scent was overpowering and no, it was not fecal, but pure butt, anal pheromones, and a day's worth of sweat.\n\nMoving back to the top of her crack I kissed downward, pausing to lightly lick, then resuming the kisses. Her anal hair begins just above her asshole and", "num_tokens": 2048} {"category": "common_crawl-adult_content", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-adult_content/part-00-00000.npy", "text": ". On her feet she wore deep, white, leather boots that fitted her legs perfectly and went all the way up to her knee.\n\nOnce all the mistresses and slaves were ready, Cassandra faced Rayla’s balcony.\n\n“House mistress, as you know I am popular in the fetish world as one of the most tolerant mistresses, most of the man who throw themselves at my feet any plan to swim in the shallowest waters of perversion. But that doesn’t mean that I can’t be a cruel, sadistic bitch like Linda, or a power hungry animal like Mira, I made my two little slaves into perfect anal whore, I sodomized them all night to prepare them for the show. I hope you enjoy.” Cassandra talked in a calm but strict tone, that would send shivers down anybody’s spine.\n\nRayla calmly nodded in approval, and as a sight to begin the show. Cassandra clapped her hands twice, the door to the slave pit opened, and two younger man came crawling out. They were both naked, on their hands and knees, with black leather collars around their neck, crawling towards their mistress with their tongue out and panting like dogs. Once they came closer, everyone could see the gaping holes on their asses. They were about the size of a fist. Rayla was pleased when she saw how Cassandra prepared her slaves, while other, more gentile mistresses like Mira were shocked, and everyone in the room was aroused by the scene.\n\n“Hello boys, I see your anuses were loosened beyond all hope last night.” Cassandra admired her work, while both slaves were only panting.\n\nShe turned to Rayla: “They are forbidden to talk, they only serve as animals for anal abuse.” Cassandra explained.\n\nShe walked up to the table with equipment, taking from it a huge strap on dildo. She put in around her waist. Before she turned back to her slaves, they were so excited to see the dildo on her that they started to drip precum out of their hard cocks, they panted deeper and faster.\n\n“This is the only tool I need, you both are going to worship MY cock, and the one that does a better job will have the privilege of being raped by it, while licking the asshole of the loser.” Cassandra explain the rules of her game.\n\nImmediately, both slaves jumped to their knees and started to lick the rubber cock and balls. One of the slaves massaged the cock with his tongue, while the other one sucked on both of the fake balls, spit dripping off his face. They both seemed to be enchanted by their mistress. Rayla looked on, getting turned on more and more, she was delighted to see Cassandra’s ability to wash the minds of her slaves, making them like blank paper on which to write whatever their owner wished, to turned them into what their owner wants them to be.\n\nAfter a while one of the slaves started to swallow Cassandra’s cock whole, deprived of any gag reflex he once may have had. He put the dildo down his throat and didn’t move for minutes, even his own mistress was impressed by this.\n\n“And we have a winner!” She laughed, pushing the slave down on the ground and forcing the cock out of his mouth.\n\nThe slave them immediately got up to his hands and knees, he bowed his head down and pushed his gaping ass up, ready to take his reward. Mistress Cassandra knelt behind his, ramming her dick inside his ass, it fitted perfectly and didn’t even stretch him at all. Cassandra started to fuck him hard, her whole 20cm long dildo rammed in and out of his ass, but the slave stayed silent because of the way he was trained. The first few times the whole mansion could hear his screams, but after a few sessions with Cassandra he accepted his fate, and learned to enjoy the bloody mess she would leave him in. The other slave crawled in front of the first one, spreading his ass wide. The slaves that was being fucked raised his head and without any hesitation inserted his tongue into the other slave’s anus. The both of the slaves in this chain of sodomy were quiet, Cassandra fucked one mercilessly, while he kept pleasuring the other slave. From time to time Cassandra would slap her bitch on his ass making him shiver a little.\n\n“You see house mistress, both of my dogs are silent while I take away their manhood. Once I win and you give them to me, I will castrate them, and make them into my little anal whore for life, they will love me for it!” Cassandra screamed while ramming the slave’s ass.\n\nShe was right, both of the slaves wanted nothing more but that to happen to them, they craved it since as long as they could remember, it was the way nature made them, they only needed to surrender to it, and with the help of mistress Cassandra they will.\n\nAs the show reached the end, and the slaves returned to the slave pit, Cassandra stood before the balcony, waiting eagerly to hear Rayla’s judgment.\n\nRayla stood up from her throne:\n\n“The power and sheer mental control you hold over your dogs is impressive, Cassandra. It’s most noble of you to help those poor souls achieve their ultimate goal. Some men are created to serve, and it’s our job to help them fulfill their deepest desires. Thank you Cassandra for the wonderful show. Tomorrow, mistress Alexandra will show us her way of guiding the slaves to their destiny. I hope yours are as well trained as Cassandra's, mistress Alexandra.” Rayla smiled, it was obvious she was impressed by Cassandra’s show the most.\n\nDay 4\n\nThe fourth day was very uneventful, after Cassandra’s presentation most mistresses thought it was impossible for Alexandra to give them a better show, and instead decided to spend the day training their slaves further. When the time finally came for the show to begin, only Cassandra and Rea were present with their slaves, while other mistresses were all training in their private dungeons. Mistress Alexandra was determined not to be swayed by this. Her slaves were already ready, kneeling on the podium in the middle of the main hall. As usual servants were present to help with the session, and house mistress Rayla sat upon her throne on the balcony.\n\nMistress Alexandra was dresses in a leather corset that covered her upper body, but with two large holes that left the area around her nipples pop out, her lower body was completely naked, except for her black high heels. The table had noticeably less equipment than before, there were only two glass chastity tubes, a small leash and a thick leather whip.\n\nAlexandra stood before the balcony ready to start:\n\n“Mistress Rayla, my slaves are as well trained as any other slaves, but these salves you gave me are the most perverted, dirty sex addicts I have ever seen! When I caught both of them masturbating without my permission I got so mad I wanted to order castration for them! But instead I decided to go for an option that would please my audience more. I had their tiny cocks locked in chastity tubes, preventing them from any stimulation, their cocks felt nothing for the last three days, and as you can see they are already hard only moments after I unlocked them!” Alexandra humiliated the slaves, they were both on their knees behind her with their legs spread apart, their manhood riding up between their legs.\n\n“Today, I will tease them both mercilessly, until they cry for release, at the end I will decide if they are worthy to cum!” As Alexandra explained, her slave’s cocks would tense at any moment “cum” was mentioned.\n\nRayla could see how desperate they were to cum, Alexandra didn’t look like a mistress that would enjoy inflicting pain, but Rayla saw the sadistic pleasure she derived from denying pleasure to others.\n\nAlexandra had her two slaves kneel next to each other, she took the two chastity cages and tried to put them on, but their cocks were too hard for the tubes to fit without hurting them. In her sadistic mercy, Alexandra decided to allow one slave to keep his genitals in a bowl of ice until his cock shrinks, as for the other one she forced his hard dick to bend in the chastity tube until it could be locked. All the while both slaves were moaning in the mix of pain and pleasure, one from the cold burn of the ice, and the other from the force of his mistresses hands, but both enjoyed the sensation on their cock, which were kept deprived of any touch for days.\n\nAfter both of the tubes were on, Alexandra attached two small leaches to the balls of the slaves, and held them both in hand. She would then press her foot on the caged cock of one of the slaves thus keeping it in place while she pulls the leash tight around his balls and up from the ground. The first places started to moan the moment he felt something touch his chastity tube, he tried desperately to feel any pleasure he might by rubbing against the souls of Alexandra’s feet. He could feel nothing, but his cock did get hard inside his tiny tube, and he harder he got, the more pain and pressure he felt in his genitals. After a while the slave decided that it wasn;t worth it and tried to back away from Alexandra feet, but he was quickly reminded that he had no choice by her stepping even harder on his cock and the pull of the leash on his balls. This went on for at least half an hour before mistress Alexandra decided she had enough of it, and she moved on to the other slave, he was tortured in the same manner for the next half an hour. By the time this little game was finished both slaves were whining in pain and hopelessly begging for release from their tubes.\n\nMistress Alexandra then got each of her slaves to stand next to her legs, she ordered them to rub themselves against the lower part of her legs. They did as they were told and without any hesitation.\n\n“Look at you little dogs! Doing anything", "num_tokens": 2048} {"category": "common_crawl-adult_content", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-adult_content/part-00-00000.npy", "text": " let them take you to new heights of ecstasy. - **Exclusive Design:** The Renegade Emperor - Teal boasts a sleek and stylish design that sets it apart from other vibrating rings on the market. Stand out from the crowd and make a statement with this exclusive accessory. **Limited Availability - Act Fast!** Due to high demand, the Renegade Emperor - Teal is only available in limited quantities. Don't miss your chance to get your hands on this incredible product and experience the pleasure it has to offer. Order now before it's too late! **Add Renegade Emperor - Teal to Your Cart Today!** Don't wait any longer to experience the unparalleled pleasure of the Renegade Emperor - Teal. Add this amazing vibrating ring to your cart now and take your intimate moments to a whole new level. Reign supreme in the bedroom with Renegade Emperor - Teal.\nNS Novelties\nNSN-1119-37\n\nNew Account Register\n\nAlready have an account?\nLog in instead Or Reset password<|endoftext|>Soft Palmyra Nectar 400G<|endoftext|>Vulcan 100<|endoftext|>Messy Mutts<|endoftext|>ell Your Friends!<|endoftext|>18 − 18 =<|endoftext|>تسجيل الدخول إلى حسابك<|endoftext|>fb-pixel<|endoftext|>ClubSapphic presents: Naughty black babe tells her white girlfriend about her sexual experience w<|endoftext|>Remember meForgot password?<|endoftext|>013 sec (10 req/sec)<|endoftext|>6,900 other followers<|endoftext|>845 other followers<|endoftext|>399063110352<|endoftext|>Dirty Tom Daley imagine\n\n4.3K 7 1\n\nYou're cleaning the house with loud music on when your boyfriend Tom gets home from training with his hair still wet from showering. 'Well hello babe' he says winking at you. 'Hey Tom' You shout through the loud music. He walks over to the fridge and gets out a beer. You bit your lip while you saw him popping the beer open. He knew it turned you on 'cause he was looking at you at smiling. He took a sip from his beer and now his small little smile turned into a dirty smile. He was totally turning you on right now. 'Jess stay focussed on the cleaning' you say to yourself. He walks over to you and turns of the music. He makes an evil laugh and turns on 'sexy and i know it'. As the music starts playing he starts the hip thrusting. 'You've really done it now Daley' You say while biting your lip. He knew his hip thrusting made you horny. He walks over to you and pushes you against the wall kissing you hard. His hands traveling all over your body. 'Ohh Tom' You moan while he's takes of your dress making you stand in your bra and string. He opens your bra and throws it over his head. 'I want you Jess' He whispers with his warm breath in your ear sending shivers over your whole body. He lifts you up and brings you to your bed  laying you down. You look at his boner and bit you bottom lip. 'You want it huh?' He grins. 'Yes Tom fucking Daley I want it so give me it' you shout. He grins and takes of his boxers. He slides his long hard dick in your pussy and starts thrusting harder and harder. Your hands in his wet hair and his hands still traveling all over your body. 'To-To-Toooomm I'm cumming!' You shout. When you both reached climax he lays down next to you. You're both all sweaty 'That was amazing Jess' He laughs. 'Yes, Yes it was amazing' You smile looking up to him.\n\nAfter 10 minutes of laying down cuddling in bed you decide to take a shower together. He washes your hair leaving love bites on your neck.<|endoftext|>27,461 other followers<|endoftext|>Teya Salat<|endoftext|>Double-Oh-Wiki\n\nRole of Honour\n\n1,329<|endoftext|>432<|endoftext|>010 sec (5 req/sec)<|endoftext|>864<|endoftext|>Karaghul<|endoftext|>Escaping Whiteness<|endoftext|>104-5 KDAT<|endoftext|>Understanding Negotiation<|endoftext|>Feefo reviews 95% 1024<|endoftext|>Another Day In Paradise\n\nParadise 6\n\neXtasy Books\n\nHeat Rating: Scorching\nWord Count: 35,000\n7 Ratings (4.6)\n\nSpellbinders, Samantha and Sabrina Hart, didn't expect such disastrous results when they mesmerized their kidnappers. Forced to alter their plans, the sisters escape in a very unexpected way. Will the women gain their freedom or are they doomed to fail? \n\nNo longer human, Aiden Troutman returns to Virginia to end his relationship with the human woman he'd planned to marry. He never expected to discover her apartment empty and the two sisters missing. \n\nStunned to discover Samantha's scent makes him feel more than he should, Quinn Sadler is convinced their enemies have her. Determined to find the two women, the men begin their search in the mountains of Virginia.\n\nAnother Day In Paradise\n7 Ratings (4.6)\n\nAnother Day In Paradise\n\nParadise 6\n\neXtasy Books\n\nHeat Rating: Scorching\nWord Count: 35,000\n7 Ratings (4.6)\nIn Cart\nIn Wish List\nAvailable formats\n\nWhen she looked down at herself, Samantha couldn't help but notice that her bruises were gone, her cuts, scrapes and welts were also healed. Reaching up, she pushed her hair from her face with a trembling hand.\n\n\"Now I know I'm dreaming.\" Tears filled her eyes and slid down her cheeks as she sat next to the man she loved and looked down at her body, no longer marred with the visual reminder of her time at that hellish camp.\n\n\"I do wish this wasn't a dream,\" she whispered. Pulling her robe tight, she lay back down next to Aiden, determined to enjoy the comfort of his presence while it lasted, even if it was only a figment of her imagination.\n\n\"You aren't dreaming, baby,\" Aiden said, his voice heavy with sleep. He wrapped his arm around her and squeezed gently. \"You're in a hotel somewhere in West Virginia. Sabrina is in the adjoining room. Most importantly, you're both safe.\"\n\n\"It's a dream.\" She shook her head. \"You're not real. This isn't real. It can't be. I had\" Swallowing thickly, she cleared her throat. \"There were\"\n\n\"Cuts, bruises, welts from where they beat you?\" he asked gently, then shook his head. \"They're all gone, all healed. There's nothing left of them but your bad memories and even those I did my best to heal.\"\n\nSamantha inhaled sharply and examined her memories. He was right. Even the worst of them seemed softened somehow. It was as though a lot of time had passed--a year, maybe two. She felthealed. Inside and out. \"Can youdo this for Sabrina?\"\n\n\"I don't think so. I don't know if I can get into her mind. If I can, I can heal her mind if she'll let me in.\" He shrugged. \"However, you wanted me in your mind. You reached for my touch as I entered your thoughts.\" Rolling onto his side to face her, he gave her a crooked grin. \"Somehow, I just don't think your sister is going to appreciate my help.\"\n\n\"Then heal her wounds.\"\n\nHis smile faded. \"I can't.\"\n\n\"You can't or you won't,\" she asked, then thinned her lips. It was no secret that there was no love lost between the two of them, but she never thought he would let her sister suffer if it was in his power to stop it. She didn't want to think him so petty as to hold a grudge like that, but why else would he refuse to do it?\n\n\"Okay then. I won't do it.\" He sat up, swung his legs over the side of the bed, and sat with his back to her. \"For one thing, neither of you would allow it.\"\n\n\"Bull chips! I just asked you to.\" Standing, she clenched her fist so hard it hurt. Never had she ever been so mad at him. Circling the foot of the bed, she moved to face him. He wasn't escaping this so easily. If it killed her, he would look at her and tell her why he wouldn't help her sister.\n\nHe shook his head. \"Neither of you will like how it's done. Especially her.\"\n\nSamantha opened her clenched fist and showed him the red crescents on her palm. Blood slowly seeped from the new wounds where her nails dug into her tender flesh. She shoved her hand into his face. \"Then show me how it's done and let me decide.\" Never had she thought him capable of refusing to help someone who needed it before today. He'd always helped everyone he could as long as it was within his power to do so. But not today. Why?\n\n\"Fine,\" he bit the word out between clenched teeth.\n\nA muscle popped in his jaw and his emerald gaze shot green fire at her. The glint in his eyes told her that maybe, just maybe, she should have left well enough alone.\n\n\"Put your hand in mine. Later, you aren't going to deny that you asked me to do this.\"\n\nSamantha rested her hand in his. Two years of trusting this man made it easy to decide to keep doing so.\n\nCircling her wrist with his fingers, Aiden bent over her hand, turned it over, and pressed a very long, very wet, and intimate kiss against", "num_tokens": 2048} {"category": "common_crawl-adult_content", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-adult_content/part-00-00000.npy", "text": ", but by all means, go ahead and scream yourself hoarse, don't mind me.\" He picked up the sheaf of papers scattered on her side of the desk, holding them up to the security light.\n\nSuddenly remembering that she had been doodling on those papers during the sports round up, Elena sprinted over to the desk and ripped the papers out of his hands.\n\n\"Hey! I was reading those!\"\n\n\"They're my private notes, you don't need to see them.\"\n\n\"If they're so private, maybe you shouldn't leave them all over the place.\"\n\n\"They were on my side of the desk! How was I to know you'd go snooping around?\"\n\nDamon leaned back against the desk, the security light flickering in his ice blue eyes, the green tinge of the exit sign throwing his raven hair into stark relief against his pale skin. \"You know,\" he said, his eyes glittering. \"You should probably be a bit nicer to me.\"\n\n\"And why do you think that?\" Elena cocked her hip as she glared at him, causing Damon's eyes to travel down to those amazing legs, still framed by that little black skirt from earlier.\n\n\"In case you haven't noticed, the producer loves me. Who knows, maybe if I let slip about how hard it is to work with you, he might find me a new co-anchor.\" Damon shrugged.\n\n\"Me? I'm hard to work with? Are you kidding me?\" Elena slammed down the pile of papers and leaned towards him. \"I've had to work my ass off to get this position, and you come waltzing in with your fake charm and your plastic smile, and you think you've got everybody eating out of your hand! Well I'll tell you something, Damon Salvatore,\" she leaned in further, using her index finger to poke him in the chest. \"I happen to be immune to all of it.\"\n\nDamon looked down to her hand hovering tantalisingly close to his chest and grabbed it, wrapping his fingers around her wrist. His own pulse jumped as he felt hers start to race just below the skin. \"How about you? Walking around in your shorter than short skirts? Flashing your legs in my direction every chance you get, just hoping I'll trip up and make a fool of myself? Fluttering your eyelashes every time I look at you?\"\n\nElena gasped and tried to pull her hand out of his tight grip. \"I don't... flutter my eyelashes!\" she said indignantly.\n\nDamon kept hold of her wrist, walking her backwards until she met the curve of the desk behind her. He leaned in closer, until all she could see were those piercing blue eyes. \"Elena,\" he breathed out silkily. \"You're doing it right now.\"\n\nHe closed the distance and met her lips with his own urgently. For a moment, he thought she was going to give in to him, before he felt her palms against his chest as she pushed him away.\n\nDamon stumbled back a step, rubbing his cheek and rotating his jaw. For a girl with such little hands, she sure could give a good slap.\n\nHe opened his mouth, whether to apologise or start laughing he didn't know, but before he could make a sound, she launched herself at him.\n\nHer hands went around his neck to tunnel through his hair as she pressed her breasts against him, suddenly aching for some friction between them. She pressed her mouth to his forcefully, trailing the tip of her tongue along the seam of his lips, encouraging him to part them and let her in. The moment he did, her tongue surged between his teeth, needing to be close to him, needing to taste him. She pushed him back until he was the one pinned to the desk, and she plastered her body against his, feeling the proof of his arousal against her stomach.\n\nAs their tongues battled for dominance, Damon grabbed her round the waist, sliding his fingers inside her top, under her jacket, feeling her moan into his mouth at the contact. Her hands slid down from his neck to his shoulders, pushing his jacket down his arms, before moving her fingers to the buttons on his shirt. Damon pulled his arms out, then pulled her jacket off, throwing it on the floor behind her, his mouth never leaving hers. His fingers gripped the hem of her top and he slid it up her ribcage slowly, trailing a path of tingles up her sides. She finally broke free from their kiss so he could lift her shirt over her head, arching her back as he placed kisses down over her jaw, sucking gently at the soft skin below her ear.\n\nHis hands came up to cup her breasts through her bra, and she moaned as his thumbs brushed her nipples, his touch hardening them into stiff peaks. Elena's hands slid down his chest, marvelling at the way his hard muscles felt underneath the silky softness of his skin. It was even better than she had imagined. She fumbled with his belt, undoing the top button and sliding her fingers beneath the waistband of his boxers.\n\nDamon growled and pulled back, grabbing her around the waist and turning them round, lifting her and placing her on the edge of the desk. He flicked open the front clasp of her bra, staring in wonder at the way her skin broke out in goose bumps at his feather-light touch. He ghosted his fingers around the swell of one breast, as he leaned down to take the other in his mouth. His teeth nipped lightly at the hardened bud, and Elena moaned , her legs slipping open to allow him better access. He trailed his tongue down the valley between her breasts towards the waistband of her skirt, the sweetness of her taste overloading his senses. He slid his hands up her silky smooth legs, his thumbs rubbing tantalising circles on her inner thighs as they glided closer and closer to their destination at an agonisingly slow speed, and Elena thought she would pass out from the burning need to have him inside her. His hands slid up to her hips, his fingers taking hold of the top of her panties as he slowly slid them down. He placed a blazing trail of hot, open mouthed, kisses on her thighs as he navigated them down over her high heels, flinging them over his shoulder. He slowly worked his way closer to the apex of her legs, and as he brushed the tip of his tongue across her lower folds, she felt her eyes roll back in her head.\n\n\"Damon!\" She cried out breathlessly, as he sank his tongue slowly into her heated core. She tunnelled her fingers through his hair in an effort to hold him in place, and he chuckled against her, sending waves of pleasure over her. He moved his tongue upwards, searching for her bundle of nerves, bringing his hand up and slipping in first one finger, followed quickly by another, into her damp feminine heat. He blew lightly on her swollen clit, before laving it with his tongue and he slowly but insistently pumped his fingers in and out of her. She screamed his name as she came, her body still shuddering with aftershocks as Damon kissed his way back up to her neck.\n\nThe overwhelming need to have him inside her intensified, and Elena reached for his trousers, yanking them down over his hips as she gripped him between her thighs.\n\nDamon stilled his movements for a moment, lifting his hand up to caress her cheek. He had fantasized so many times about taking her from behind over this very desk, but he couldn't bear the thought of not being able to look in those chocolate brown eyes as she came for him. Sliding his hand between them, he guided his cock to her entrance, sliding the tip along her slick lower folds. He watched as her tongue snaked out to lick her lips, feeling the sweet yet painful sensation of her fingertips digging into his back as she tried to pull him closer.\n\nElena wriggled her hips slightly, smiling as she heard him hiss through his teeth. Seems she wasn't the only one getting frustrated with all the foreplay. She wriggled again, and she felt the tip of his cock slide in, right where she wanted it. She looked up into his eyes, wondering if her own were as ablaze with lust as his was.\n\n\"Well?\" She said playfully, even as her breath came out in shallow, ragged gasps. \"Are you waiting to trip up and make a fool of yourself?\"\n\nDamon smirked at her. \"And here I thought you were immune to all my charms,\" and with one thrust, he came to rest fully between her thighs.\n\nElena gasped at the sensation of him filling her up as he settled his weight on top of her. As they picked up their rhythm, the desk shuddered beneath them, causing the small, decorated Christmas tree to topple to the floor. Damon laced his fingers through hers and together they gripped the edge for leverage and support, ripping the tinsel that ran the length of the desk. Their mouths found each other again, teeth nipping and lips sucking as their heated desire burned through them. Elena brought her leg up, resting her high heel against the closest chair, and Damon slid his hand between their sweat slicked bodies, finding her swollen bundle of nerves and pressing down. Elena screamed his name again as she came, her walls tightening and spasming around him, and he quickly followed her over the edge.\n\nDamon watched as her eyelashes fluttered, feeling her breathing return to normal as they came down from their mutual high. She looked so beautiful, her hair fanning out beneath her and hanging over the edge of the desk, her cheeks flushed and her lips kiss-swollen. He leaned down to capture her lips with his once more, and she sighed contentedly. The sound reverberated down to his very soul.\n\nElena looked up into Damon's heavy lidded eyes, his mussed raven hair", "num_tokens": 2048} {"category": "common_crawl-art_and_design", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-art_and_design/part-00-00000.npy", "text": " editing and sound design. The style of a film can be recognized through its visual elements such as lighting, color, texture, focus and camera movement.\n\nThe styles of a film are often linked to its genre or subject matter. For example, many horror films use low-key lighting to create an eerie atmosphere or have characters who are lit from behind in order to create shadows. The same goes for adventure films where characters are often lit from above which gives them a heroic appearance.\n\nCinematic styles can also be linked to different periods in time as well as specific locations or countries. Classic Hollywood cinema is known for its glamorous look with bright colors and high contrast while European art-house films tend to be more subdued with their use of black-and-white film stock.\n\nWe have more choice than ever before and can find content that suits our individual tastes better than ever before. We can also watch it on our own terms — when we want, where we want and how we want.\n\nThis has had a huge impact on the way we consume film and television. The demand for new styles of storytelling has increased as audiences become increasingly demanding in their viewing habits. Audiences want something different from what they’ve seen before, which is why we’re seeing so many new cinematic styles being used by filmmakers today.\n\nHere are some of the most common ones:\n\n 1. Auteurism\n 2. Cinematic Realism\n 3. Contemporary Realism/Naturalism\n 4. Digital Realism/Hyperrealism\n 5. Fairytale Realism/Märchenfilm (German)\n\nFind out on how to take advantage the cinematic styles.<|endoftext|>Landscape Painting: Techniques & Tutorials\n\nHillside-Sun-detail-Quinn-Munson\n\nPainting Knife Techniques\n\nIf you’ve ever spread frosting on a cake, you have an idea of the textural possibilities when using a painting knife to create an oil painting. Deborah-Quinn Munson explains how you can achieve a variety of effects, from the sweeping strokes to refined details.\n\nStart with perspective drawing to raise a roof in 15 steps. Then you can start adding your own unique feel for the artwork.\n\nDraw a House Using Two-Point Perspective\n\nLearn the basics of two-point perspective by constructing a simple house together step by step. We’ll imagine the house is on a little hill and we’re viewing it from somewhere down the hill; that is, our eye level is below the house. The structure is turned so that it’s in two-point perspective—we can see...<|endoftext|>Eckerd College IOTA Residence Complex / Campus housing upgrades and renovations / 30,500 GSF\n\nThe new IOTA Complex was designed to compliment the existing architectural style, the residential complex is comprised of four “Houses” featuring 52 Double-Bed and 41 Single-Bed Rooms. The two-story design offers a mix of single and double rooms adjacent to inviting lounge or “living rooms” to foster a sense of community. Two houses include kitchenettes and two houses include indoor laundry facilities designed to encourage interaction among the residents of the four houses. The complex features porches, courtyards, and walking/bike paths to celebrate open spaces.\n\nFast-Tracked, the IOTA Complex was completed in an unprecedented 295 days for both design and construction to meet the College’s move-in schedule. Scope included site development, utilities, lighting and landscaping. Constructed on a coastal site within an A-Flood Zone, the complex is hurricane-hardened to withstand a Cat-3 storm event with impact glass windows and doors. IOTA is LEED-NC Certified with “Smart Building” Energy Management Systems.<|endoftext|>Abstract and captivating, this Tamegroute pottery sculpture, with its looped form and elongated neck, strikes a delicate balance between traditional and contemporary. Its terracotta body, accentuated by a circular void, creates visual and tactile intrigue, reflecting its rich artisanal heritage.\n\n • Natural Clay<|endoftext|>Telephone Lamb Optical Illusion is more of some creative modern art rather than an illusion but never the less I thought it was pretty cool. From a distance they look like very realistic lambs, but up close you can see that the artist had just found a very creative use for some old telephones.  The cords are perfect for the lamb fur, and the phones them self are the perfect shape for the head. very clever!\n\nSheep made of old phones<|endoftext|>Chairs\n\n{ Around the World: Chairs }\n\nI'm dedicating one post a week to featuring designs and artists from around the world. Today's feature are chairs. I have always had a person affinity for different cultures. I've lived in South Korea and traveled to various countries; Cambodia, Mexico, Ecuador & Dominican Republic (to name a few).\n\nI believe there's tremendous value in educating ourselves in other cultures. Your life can be enriched if you look behind just your own country's food, music and design. The world is vast and rich with beautiful talented artisans. I hope these posts will spark curiosity as to what else is out there and broaden your horizon!\n\nMEXICO {Aldama Chair} Citizenry\n\nINDIA {Narendra Sling Chair} World Market\n\nLEBANON {Mickey} Bokja Design Studio\n\nNIGERIA {Beaded Yoruba Chair} Out of This World\n\nTURKEY {Suzani Box Chair} Name Design Studio\n\nROMANIA {Scaunul Lana Pentru Lime Chair} Photoliu<|endoftext|>top of page\n\nHigh-quality engraving\n\nWith a strong background in working and collaborating with composers, performers, conductors, and music publishers, I bring experience and expertise to ensure the highest quality of musical notations. Here are some key highlights of my experience:\n\n • Large orchestral score expertise\n\n • Orchestral parts preparations (MOLA guidelines)\n\n • Graphic Score/Box Notation, Indeterminacy\n\nWhether preparing scores for publication, creating performance materials, or adapting existing scores, I am dedicated to providing meticulous and professional work.\n\nPlease find my portfolio here, which includes samples of my previous work. I would be happy to discuss your specific requirements and provide any additional information you may need. \n\nMentoring and Teaching\n\nAs a dedicated composer and experienced instructor, I offer personalized guidance to help you unlock your musical potential and develop your unique voice in composition. \n\nMy non-traditional approach encompasses various compositional practices, including acoustic and electronic music, film music, and more. Whether you're a beginner or an experienced musician, my collaborative and student-centered approach fosters creativity, critical thinking, and musical expression through one-on-one mentoring sessions. \n\nI love exploring compositional and orchestration techniques, analyzing musical works, and experimenting with performance and instantaneous composition. \n\nYou can contact me at info@jamesdiaz.co\n\nbottom of page<|endoftext|>07\n\nAuthentic Large Emile Galle Vase\n\nEstimate: $4,500 - $7,500\nStarting Bid\n\nBid Increments\n\nPrice Bid Increment\n$0 $1\n$20 $2\n$50 $5\n$100 $10\n$250 $25\n$500 $50\n$1,000 $100\n$2,000 $250\n$5,000 $500\n$10,000 $1,000\n$50,000 $2,500\n$100,000 $5,000\n$250,000 $10,000\n$500,000 $50,000\n$1,000,000 $100,000\n\nAuthentic Emile Galle Vase A Galle cameo glass tall stick neck Clematis vase. Signed Galle in cameo. French Art-Deco Cameo Glass. Galle' Tulip Vase:\nDimensions H 23.1/2 in. x Dm 8.1/4 in. H 60 cm x Dm 21 cm French Art Deco Vase by Emile Galle. Signed, circa 1920.<|endoftext|>Get FREE shipping on orders over $200\n\nAir Balloon Whale Wallpaper Mural\n\nSKU: 132685901\n\nTransform your home into a whimsical wonderland with Decor2Go’s Air Balloon Whale Wallpaper Mural! Designed to ignite the vibrant world of a child’s imagination, this playful mural infuses your living space with color, playfulness, and extraordinary charm. Featuring a delightful scene of a whale floating in the air, tethered by colorful balloons, this mural adds a touch of whimsy and fantasy to your walls, sparking curiosity and joy.\n\nKey Features:\n\n • Playful Styling: The Air Balloon Whale mural showcases a whimsical depiction of a massive sea creature carried by colorful balloons, transforming ordinary walls into extraordinary works of art. Perfect for children’s bedrooms, playrooms, or any space in need of a touch of whimsy.\n • Imaginative Design: With its imaginative design, this mural adds a sense of irony and fantasy to your walls, inviting viewers to embark on a journey of creativity and wonder. Each element of the mural is meticulously crafted to inspire curiosity and ignite the imagination.\n • Custom Sizing: Collaborate with us to bring this mural to life in your home. Specify your wall’s size, and we’ll adjust accordingly, ensuring a perfect fit for your space. Whether you have a small accent wall or a large feature wall, our custom sizing ensures a seamless installation.\n • Local Craftsmanship: Crafted with pride in Winnipeg, this mural represents our dedication to local craftsmanship. Countless hours are invested in conceptualization and design to ensure that each mural meets", "num_tokens": 2048} {"category": "common_crawl-art_and_design", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-art_and_design/part-00-00000.npy", "text": "devising\", among other things], and the use of performance as therapy derives from Artaud. In fact, all attempts to break down the separation between stage and audience can be seen as based in Artaud. More specifically, Craig's abstraction and aestheticism, his concept of plastic space, even his replacement of the actor with an Uber-marionette, are all realized in Robert Wilson's work. Significantly, there is no question of direct influence here. Though familiar with some of Craig's designs, Wilson's style was already fully developed before he read anything by Craig. But the statuesque quality Wilson imposes on his performers, the sculptured costuming and facial masking (particularly in recent productions, such as the Paris Madame Butterfly) that transform actors into archetypes, the rigid choreography and the avoidance of emotional display, all correspond to Craig's ideal. So do Wilson's architectural settings, in which structural elements are shifted from scene to scene to create unfolding patterns, and the way he orchestrates light, making it a concrete presence. Even the high-tech quality of Wilson's theatre is essentially Craigean.\n\nTheory triumphs. It has become absorbed, inscribed in contemporary performance by osmosis.\n\nIndeed, it's hard to see how (even if successful) their stage work could have served as a model, since so few people had the chance to see it. Appia's final Wagnerian production of Die Walkure in Basel only had four performances, Craig's earliest (and in some ways most striking) production of Dido and Aeneas ran for three nights, Artaud's single \"Theatre of Cruelty\" production (The Cenci) only lasted for two.\n\n[1]. Warren Susman, Culture as History, 1984, p.234.\n\ngo to top of page\n\n  print / download\n\ncopyright | terms of use | privacy policy\n\n© 2003-2006 CRC Performance & Culture<|endoftext|>Hey! I’m Anna, a Marketing, Creative & Tech hybrid 👽 \n\nI get excited about combining creativity with strategic insight to craft resonant marketing strategies that drive engagement. My expertise spans Creative Strategy, Interaction Design and Product Marketing. \n\nI also enjoy tinkering with digital formats that invite user interactivity, be it mobile interactive ads, UI/UX design and even technical 3D art. \n\nBeyond my professional work, I channel my love for drawing into passion projects and am currently illustrating children’s books for Allkin, a social good organization in Singapore.\n\nBachelor of Business, Marketing – National Technological University\n\nInteraction Design Specialisation, University of California San Diego, Coursera, 2024\n\nGoogle UX Design Specialisation, Coursera, 2023\n\nGoogle Ads Display Certification, 2017\n\nMeta Blueprint, 2017\n\nEnglish, Mandarin\n\nLook Ma, No Mouse<|endoftext|>use clipart often and transport it into other programs such as Print Master to make cards. It was easy to make a few small changes in it and use what you redesigned. I hope you'll reconsider it's removal and put it back. Personally, I don't care for Bing's images. And I don't want to go out on the net to find other clipart when I'm in the process of getting a manuscript together. It's a waste of time.<|endoftext|>Fri. Jun 21st, 2024\n\nElevating Artistry Best Digital Drawing Inspirations\n\nExploring the Boundless World of Digital Drawing\n\nIn the realm of artistic expression, digital drawing has emerged as a captivating medium that offers endless possibilities for creativity and innovation. From intricate illustrations to breathtaking concept art, digital drawing has revolutionized the way artists bring their visions to life.\n\nUnveiling Inspirational Techniques\n\nOne of the most intriguing aspects of digital drawing is the wide array of techniques available to artists. From digital painting to vector illustration to photo manipulation, artists have access to a diverse toolkit that allows them to experiment and explore new artistic horizons. Whether they’re creating hyper-realistic portraits or whimsical cartoons, the possibilities are limited only by their imagination.\n\nEmbracing the Power of Technology\n\nAt the heart of digital drawing lies the power of technology. Artists harness the capabilities of digital drawing software and hardware to create stunning artworks with precision and efficiency. With the use of digital tablets, styluses, and advanced software programs, artists can seamlessly translate their ideas onto the digital canvas, allowing for greater flexibility and control over their creations.\n\nPushing the Limits of Creativity\n\nDigital drawing encourages artists to push the limits of their creativity and explore new artistic territories. With the ability to easily manipulate colors, shapes, and textures, artists can experiment with different styles and techniques to develop their unique artistic voice. Whether they’re creating hyper-detailed illustrations or abstract compositions, digital drawing provides artists with the freedom to express themselves in ways that traditional mediums cannot.\n\nExploring Conceptual Artistry\n\nIn addition to traditional forms of drawing, digital drawing also encompasses a wide range of conceptual artistry. From character design to environmental concept art to storyboarding, artists use digital drawing techniques to visualize ideas and concepts in a variety of industries, including film, animation, and video games. Digital drawing allows artists to create immersive worlds and compelling narratives that captivate audiences and evoke emotional responses.\n\nSee also  Mastering Digital Art Best Glove for Precision Drawing\n\nEmbracing Versatility and Flexibility\n\nOne of the key advantages of digital drawing is its versatility and flexibility. Unlike traditional drawing mediums, which require physical materials and can be time-consuming to set up and clean up, digital drawing can be done virtually anywhere with a computer or tablet. Artists can easily adjust their artwork, experiment with different compositions, and undo mistakes with the click of a button, allowing for a more fluid and dynamic creative process.\n\nFostering Collaboration and Community\n\nDigital drawing has also fostered a vibrant and inclusive community of artists who share their work, techniques, and insights online. Through social media platforms, online forums, and digital art communities, artists can connect with like-minded individuals, receive feedback on their work, and collaborate on projects with artists from around the world. This sense of camaraderie and collaboration not only enriches the artistic experience but also inspires artists to continually push the boundaries of their creativity.\n\nInspiring the Next Generation\n\nAs digital drawing continues to evolve and innovate, it is inspiring a new generation of artists to explore the possibilities of digital artistry. With the accessibility of digital drawing tools and resources, aspiring artists can easily learn and develop their skills, regardless of their background or experience level. Digital drawing empowers artists to unleash their creativity and express themselves in ways that were previously unimaginable, shaping the future of artistic expression for generations to come. Read more about best digital drawing\n\nBy Miracle\n\nRelated Post<|endoftext|>Question: Can You Clean An Oil Painting With Water?\n\nWhat is used to restore the color of old paintings?\n\nHydrogen peroxideHydrogen peroxide is used to restore the colour of old oil paintings containing lead oxide..\n\nCan you clean an oil painting with a potato?\n\nAnother home remedy for cleaning oil paintings is to cut a big white potato in half, then rub the white moist part over the painting. Do this gently; do not use brute force to try to get the dirt off. The dirt will stick to the potato.\n\nHow do you get mold off an oil painting?\n\nAgain, they’re fragile so treat them gently until they can be stabilized. To deal with the MOLD growing the on the paintings, lightly spray (do not saturate) the canvas, front and back, with Lysol spray (not the liquid). This will help arrest the mold growth, and you may need to repeat this a few times.\n\nIs oil painting toxic?\n\nMost oil paints are not toxic, even if you do eat them (not recommended). Oil paint is basically pigment and oil, and most pigments are perfectly safe. There are toxic ones, of course, such as lead-white, cadmium, and cobalt. … You would struggle trying to breathe in oil paint.\n\nCan you use vinegar to clean an oil painting?\n\n2. Don’t Use Potato or Vinegar. Many amateurs will tell you that wiping the surface of an oil painting with vinegar or a cut potato is a great way to remove dirt and grime from the surface. This is not a good idea, especially if your painting is valuable or old.\n\nCan I clean an oil painting myself?\n\nThe simplest way to clean up an oil or acrylic painting on canvas is to use a white cotton cloth soaked in a gentle soapy water; olive oil–based soap works wonders. You’ll be surprised to see how much grime comes off. Be gentle with paintings with thick impasto, as you do not want to break hardened paint.\n\nHow much does it cost to have a painting cleaned?\n\nHe says a small painting with an average amount of restoration work can cost $800 to $1,000. A larger painting with damages can cost $10,000 to $15,000. Grants to fund conservation come from a variety of sources.\n\nWhat solvent is used to clean oil paintings?\n\nUsually Acetone (diluted with turpentine or “white spirits”) is used to dissolve the varnish layer which “seals” most paintings surfaces. Dirt which accrues on top of that might be removed if only soap and water is used extremely gently.\n\nHow do you get cigarette smoke out of an oil painting?\n\nThe easiest thing to do is simply rub a slice of white bread over the painting. The nicotine buildup will hopefully transfer to the bread, so turn the bread to a clean area as needed. Bread is slightly acidic, so it can cut through the nicotine.\n\nCan you wash oil paint with water?\n\nRemember that oil is impervious to water. That means that if you just take your oil paint brush and put it in water, the water is going to bead right off of it. So what we need to do", "num_tokens": 2048} {"category": "common_crawl-art_and_design", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-art_and_design/part-00-00000.npy", "text": "\n\"The Martyr of Solway\" by John Everett Millais\nAustralian Aboriginal Sayings and Quotes\nAncient Artifacts - Virtual Tour\nMusée d'Orsay - A Virtual Tour\nBritish Museum - Virtual Tour\nPergamon Museum - A Virtual Tour\nTop 100 Museums in the United States - Virtual Tour\nNational Gallery of Art, DC - Virtual Tour<|endoftext|>Art is a diverse range of human activities and the products of those activities, usually involving imaginative or technical skill. In their most general form these activities include the production of...\nArt - Wikipedia\nMarble Exotic Slabs\nItalian and India Supplier of Marble, Granite, Quartzite and Quartz Slabs.Large selection. Installer and fabricator of countertops, Fireplaces, Floor covering, Wall cladding and Custom Furniture. We o...\nJack Storms Glass Sculptures\nThese glass sculptures are hypnotizing. Courtesy: Jack Storms and www.jackstorms.com\nThe brilliance of Cartier jewelry\nThe Paris jewelry house Cartier has been dazzling customers since 1847, catering to European aristocrats and, later, Hollywood royalty. Jane Pauley visits an exhibition of iconic Cartier jewels at the...\nInside Tiffany's Secret Room for Top Spenders\nJune 13 (Bloomberg) -- Behind two sets of ornate doors at Tiffany's New York flagship store is a top-secret room. The Salon houses Tiffany's most over-the-top pieces. The way you gain access is by ref...\nMaking $35,000 Bonsai Scissors\nWhen it comes to Japanese craftsmanship, knives often get all the glory. But in the city of Sakai, where traditional metalwork goes back centuries, there is one man who has built his legacy on somethi...\nBanksy painting 'self-destructs' moments after being sold for $1.4 million at auction | Facebook\n\"Going, going, gone...\": This Banksy painting \"self-destructed\" moments after being sold for $1.4 million at auction https://cnn.it/2y7mzdZ\nAmazing Gunpowder Portrait of Anakin Skywalker by Dino Tomic\nAtomic circuS uses gunpowder to \"draw\" a portrait of Anakin Skywalker/Darth Vader, and then sets it ablaze.\nMuses, an Underwater Photography Series, Looks Like Baroque Art\nEach striking photo looks like a 17th-century painting come to life.\nIncredible Miniature Pencil Tip Sculptures by Salavat Fidai\nSalavat Fidai has mastered the art of miniature sculpture carving. He shaves away at the tips of pencils to create incredible tiny sculptures in amazing detail.\nChristie's - These two 1,300-year-old limestone bodhisattvas represent the height of Tang-dynasty art\nThese two 1,300-year-old limestone bodhisattvas represent the height of Tang-dynasty art. Find out more: http://bit.ly/2BlBIMY\nQuebec mosque shooting: Police arrest a suspect and a witness\nOne of the two men detained over the incident, that killed six people, is a witness, police say.\nLightweight 3D prefabricated concrete is signaling a revolution in architecture\nHere's how a lightweight, prefabricated concrete slab is signaling a revolution in architecture.\nTime To Redesign Your Website\nWhen you are working on the same website every day, it can be difficult to recommend when the webpage starts to become less effective at offering your products or promoting your business. With more an...\nThis artist makes geode wall art.\nThis artist makes geode wall art.\nHistory of art\nThe history of art is the history of any activity or product made by humans in a visual form for aesthetical or communicative purposes, expressing ideas, emotions or, in general, a worldview. Over tim...\nHistory of art - Wikipedia\nArt movement\nAn art movement is a tendency or style in art with a specific common philosophy or goal, followed by a group of artists during a restricted period of time, (usually a few months, years or decades) or,...\nArt movement - Wikipedia\nModern art\nModern art includes artistic works produced during the period extending roughly from the 1860s to the 1970s, and denotes the style and philosophy of the art produced during that era. The term is usual...\nModern art - Wikipedia\nWorks of art\nA work of art, artwork, art piece, piece of art or art object is an aesthetic physical item or artistic creation. Apart from \"work of art\", which may be used of any work regarded as art in its widest...\nWorks of art - Wikipedia\nVisual arts\nThe visual arts are art forms such as ceramics, drawing, painting, sculpture, printmaking, design, crafts, photography, video, filmmaking and architecture. Many artistic disciplines (performing arts, ...\nVisual arts - Wikipedia\nDecorative arts\nThe decorative arts are arts or crafts concerned with the design and manufacture of beautiful objects that are also functional. It includes interior design, but not usually architecture. The decorati...\nArchitecture (Latin architectura, after the Greek ἀρχιτέκτων – arkhitekton – from ἀρχι- \"chief\" and τέκτων \"builder, carpenter, mason\") is both the process and the product of planning, designing, and...\nArchitecture - Wikipedia\nDesign is the creation of a plan or convention for the construction of an object or a system (as in architectural blueprints, engineering drawings, business processes, circuit diagrams and sewing patt...\nDesign - Wikipedia\nInterior design\nInterior design is \"the art or process of designing the interior decoration of a room or building\". An interior designer is someone who coordinates and manages such projects. Interior design is a mult...\nPainting is the practice of applying paint, pigment, color or other medium to a surface (support base). The medium is commonly applied to the base with a brush but other implements, such as knives, sp...\nPhotography is the science, art and practice of creating durable images by recording light or other electromagnetic radiation, either electronically by means of an image sensor, or chemically by means...\nPrintmaking is the process of making artworks by printing, normally on paper. Printmaking normally covers only the process of creating prints that have an element of originality, rather than just bein...\nPrintmaking - Wikipedia\nSculpture is the branch of the visual arts that operates in three dimensions. It is one of the plastic arts. Durable sculptural processes originally used carving (the removal of material) and modellin...\nSculpture - Wikipedia<|endoftext|>The Season after Pentecost\n\nsometimes called \"Ordinary Time\"\n\n27 January 2006\nworship - organist's role in\n\norgan cross section\n\nRegarding the question \"What is demanded of a good organist?\" in essence, I believe it comes down to the following four points. He must\n 1. play chorales superbly, and consequently have a comprehensive knowledge of thoroughbass;\n 2. play a good suitable prelude;\n 3. be adept at accompanying a musical work and be able to play in the less commonly used keys;\n 4. have knowledge of organ building, and try to maintain his instrument in good condition.\n\nDaniel Gottlob Türk on the Role of the Organist in Worship (1787), trans. Margot Ann Greenlimb Woolard\n\nSo, not much has changed. I might update it slightly:\n\n 1. play hymns superbly, and consequently have a comprehensive knowledge of harmony;\n • I love Türk's use of the word \"superbly\"\n • This includes hymn introductions, which Türk rightly called \"preludes.\" This tradition isn't really separate from good hymn playing any more.\n 2. play a good suitable repertoire;\n • Repertoire instead of \"prelude.\" Maybe the phrase \"varied repertoire\" would be appropriate. Whatever the case, it must be liturgically appropriate and played well.\n • Türk's original writing does address Postludes:\n Perhaps this would be the most opportune time for the organist to demonstrate his proficiency . . . Should he stray to far afield in this, the nuisance he causes as a result will not be of great consequence because the majority of the congregation will no longer hear him.\n 3. be adept at accompanying a musical work and be able to play in the less commonly used keys;\n • \"less commonly used keys\" seems a little dated, but what the heck.\n 4. have knowledge of organ building, and try to maintain his instrument in good condition.\n • We just sent a space probe to Pluto; there's no reason we can't do thi<|endoftext|>Nonprofit Brand Development & Visual Identity Design.\n\nThe mission of the Cumberland River Compact is to enhance the health and enjoyment of the Cumberland River and its tributaries through education, collaboration, and action. As Nashville and the surrounding area continues to grow rapidly, Cumberland River Compact serves a vital role in creating both awareness and action throughout the community about sustainable practices that improve our water and environment. Proof partnered with the organization on rebranding and design including a new logo/visual identity, brand standards, and supportive collateral.\n\nWith a refined and renewed brand identity in place, brand standards and guidelines, and marketing/promotional materials in hand, The Cumberland River Compact is well-equipped to bolster and further their impact and reach throughout the community, establishing Middle Tennessee as an engaged and committed leader to improving the quality of live for residents and supporters.\n\nWe absolutely loved working with Proof Branding! Their team was professional, efficient, patient, and engaging. Can’t recommend them enough!”\n\nEleanor Barbee, Director of Operations<|endoftext|>The Ruins of the Old Kreuzkirche in Dresden 1765\n\nBern", "num_tokens": 2048} {"category": "common_crawl-art_and_design", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-art_and_design/part-00-00000.npy", "text": " competing for views, so crafting an appealing and enticing thumbnail is nothing short of essential. It’s the digital equivalent of a book cover and is a crucial element in driving views, engagement and channel growth. In this highly competitive environment, your video’s thumbnail becomes the magnet that draws in viewers to delve deeper into your content. According to YouTube, 90% of top-performing videos use a custom thumbnail. That’s no coincidence.\n\nThe Thumbnail’s Visual Impact \n\nWhen it comes to processing information, the human brain has a clear favourite: visuals. Our brains are hardwired to process visual information at an astonishing speed. Research confirms this preference for visuals, with studies showing that our brains can identify images in as little as 13 milliseconds. This innate ability underscores the importance of visuals in effective communication, making them a vital aspect of conveying messages efficiently, allowing us to form immediate impressions and reactions based on what we see. As we delve into the world of YouTube thumbnails, it becomes clear that their role as visual cues holds immense power in capturing viewer interest and engagement. Thumbnails are not just static images but dynamic tools that leverage the brain's natural inclination towards visuals to drive click-through rates and shape perceptions.\n\nFirst impressions exert remarkable influence across different facets of our lives, from shaping our perceptions in personal interactions to driving our decisions when consuming online content. Within the digital realm, the significance of first impressions is especially evident. On YouTube, where billions of videos compete for attention, the thumbnail becomes the initial and decisive impression that a video presents to potential viewers. It's a fleeting moment where viewers decide whether to click or scroll past, making the thumbnail a critical factor in determining a video's success. In this fraction of a second, a compelling thumbnail can pique curiosity and initiate engagement, while a lacklustre one may result in missed opportunities for creators and channel managers.\n\nThumbnails have the remarkable ability to encapsulate the essence of a video's content, tone, and quality in a mere blink of an eye. An engaging thumbnail acts as a digital teaser, skillfully piquing viewers' curiosity and luring them to click on the video for more. Effective thumbnails often incorporate clear visuals, evoke emotions, or feature intriguing imagery, making the video's subject matter instantly apparent.\n\nThumbnails and Click-Through Rate\n\nClick-Through Rate (CTR), is a pivotal metric on YouTube. It represents the percentage of viewers who click on your video after seeing it displayed. CTR is essential because it directly impacts your video's visibility and engagement. A high CTR means more viewers are choosing to watch your video, driving increased visibility, watch time, and, consequently, revenue potential.\n\nThumbnails are like digital invitations to your video. They play a dynamic role in increasing CTR. A compelling thumbnail grabs attention and communicates your video's value. In contrast, a poorly crafted one can lead to lower CTR and missed opportunities.\n\nDesign Principles for Captivating Thumbnails\n\nEffective YouTube thumbnails are more than just random images. They adhere to key design principles that make them stand out in a sea of content. These principles include the use of contrasting colours, thoughtful text and typography, and strategic imagery and composition.\n\nContrasting colours can make your thumbnails pop and draw the viewer's attention. A well-chosen colour palette can create visual excitement and help important elements, such as text or the subject of the video, stand out. High-contrast colour combinations, like complementary colours, often work well in thumbnails.\n\nText in thumbnails is an opportunity to convey information and emotion quickly. Use clear and concise text that complements the video's content. Experiment with different fonts and sizes to find a style that matches your branding and enhances readability, even at small thumbnail sizes.\n\nYour choice of imagery and how it's arranged in the thumbnail are crucial. Use high-quality images that accurately represent your video's content. Consider the rule of thirds and visual balance when composing the thumbnail. A well-framed image can create a sense of intrigue and encourage viewers to click.\n\nCreating attention-grabbing thumbnails is an ongoing process. A/B testing can help you identify which thumbnails resonate best with your audience. Additionally, studying competitors and successful YouTubers in your niche can provide inspiration and insights into thumbnail design trends. By combining these design principles with testing and research, you can continually refine your thumbnails to maximise their impact on CTR and viewer engagement.\n\nBranding and Thumbnails\n\nThumbnails aren't just a means to attract clicks; they are powerful branding tools, even for B2B companies. They offer a visual canvas to communicate your brand's identity, values, and messaging. Incorporating branding elements into thumbnails ensures that your videos are instantly recognizable amidst the YouTube clutter. This is especially crucial for B2B companies looking to establish and maintain a consistent brand presence across their video content.\n\nLet's examine some real-world examples of B2B brands that have successfully integrated branding elements into their thumbnails. Companies like HubSpot and Shopify consistently use their logo, corporate colours, and unique design elements in their thumbnails. These subtle yet consistent branding touches reinforce their brand identity, making it easier for viewers to connect with their content and remember their brand.\n\nConsistency is the cornerstone of successful branding on YouTube. Maintaining a cohesive look and feel across your thumbnails helps build brand recognition over time. When viewers repeatedly encounter your videos with consistent branding elements, they become more familiar and comfortable with your brand. As a result, they are more likely to click on your content, engage with it, and trust your brand as a reliable source of information or entertainment. Building this trust is key to long-term success in the competitive YouTube landscape.\n\nThumbnail SEO and Discovery\n\nYouTube's recommendation algorithm is a complex system that considers various factors when suggesting videos to users. Thumbnails play a crucial role in this process. YouTube's algorithm analyses thumbnails to determine their relevance and appeal to users. An engaging thumbnail can lead to more clicks, longer watch times, and higher user satisfaction—all of which positively influence a video's performance in algorithmic rankings.\n\nTo enhance your video's discoverability, it's essential to optimise your thumbnails. Consider using high-resolution images that are visually appealing and relevant to your video's content. Ensure that the text and visuals in your thumbnails are easy to understand at smaller sizes, as many viewers browse on mobile devices. Additionally, experiment with A/B testing to identify which thumbnail designs resonate best with your audience.\n\nWhen considering keywords in thumbnails, striking a delicate balance is key. Ensure that any keyword usage in the actual thumbnail enhances rather than detracts from its visual appeal, maintaining clarity and viewer appeal. If keywords can be subtly integrated without compromising the thumbnail's quality, it may aid discoverability. However, keywords should also be used in the file name for the thumbnail. These descriptive, relevant keywords in the file name assist YouTube's algorithm in comprehending your video's content and heighten its likelihood of surfacing in appropriate searches.\n\nThumbnail Mistakes to Avoid \n\nIt's easy to fall into the trap of making thumbnail mistakes that can hinder your YouTube channel's success. These missteps often include overcrowded thumbnails with too much text, lack of clarity regarding the video's topic, and neglecting the importance of branding elements. Another common mistake is using misleading or clickbait thumbnails that do not align with the video's actual content.\n\nTo avoid these mistakes, strive for simplicity and clarity in your thumbnails. Limit text to essential information, ensuring it's easily legible. Focus on conveying the video's topic accurately and consider using branding elements consistently. Avoid misleading tactics, as they can lead to viewer dissatisfaction.\n\nYouTube thumbnails are the digital handshakes that can make or break your video's success. They wield immense power in driving Click-Through Rate (CTR), with effective design principles and consistent branding playing a crucial role. Optimising for search visibility and avoiding common thumbnail mistakes are vital steps. Thumbnails are the gateways to viewer engagement and revenue generation on YouTube. Whether you're a seasoned content creator or just starting, recognising the importance of thumbnails and implementing these best practices is a cornerstone of channel growth. By making compelling thumbnails a priority, you can capture the attention of your target audience, boost CTR, and ultimately, elevate your YouTube game to new heights.\n\nAre you facing challenges in designing thumbnails that truly captivate your audience and set your videos apart? We understand the importance of creating eye-catching visuals to boost click-through rates and viewer engagement. Take the next step by scheduling a discovery call with us - book now.<|endoftext|>How to Create a Kiwi Logo?\n\nSymbolic meaning\n\nKiwi fruit is highly valued in many cultures of the world, especially in China, New Zealand, and Italy. In these countries, kiwi is similar to a sacred fruit. Kiwi can be associated with health, generosity, well-being, kindness, and openness. Kiwi also symbolizes luck, youth, energy, strength, and unity with nature. Given these factors, a logo with kiwi can be chosen by brands that work in the niches of creativity, healthcare, and services. This symbol can also be used by brand companies in the IT sector or organizations working in the fruit supply market.\n\nWho uses it?\n\nThe Internet marketing company known as Kiwi Agency uses a stylization reminiscent of the fruit in the cross-section as a logo. A similar idea was implemented for the KiWi Gruppen corporate sign. However, at the same time, the symbol resembles the sun. The marketing agency Kiwi Creative used an unusual picture of a kiwi half, looking like a blot, as its logo. A company with the same name specializes in design services. Its logo is also built on the visualized symbol of the fruit half.\n\nWhich colors to choose?\n\nThe kiwi logo is most often rendered in the natural colors of the fruit. The flesh is white-green, with a hint of yellow and small black seeds. However, at the same time, the recognition of the fruit allows you to use any combination of colors and shades for it. So, you can emphasize the non-standard brand. The current trend is the simplification of branding. Therefore, it is recommended to use one to three colors", "num_tokens": 2048} {"category": "common_crawl-art_and_design", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-art_and_design/part-00-00000.npy", "text": "2, p. 69, no. 45, color plate XVI); PWM, 57.1/64; Brooklyn Museum of Art, 78.198 (Poster et al. 1994, pp. 52–53, no. 17); The Cleveland Museum of Art, 81.55 (Leach 1986, pp. 18–19, no. 7); The Metropolitan Museum of Art, New York, 1990.82; Asian Art Museum, San Francisco, 81 D33.2 and 81 D33.3 (Khandalavala 1985); and the Khalili Collection, MSS. 961.1 (Leach 1998, no. 1).\n 3. Jeremiah P. Losty. The Art of the Book in India Exh. cat. London: The British Library, 1982.\n 4. Goswamy with Bhatia 1999, no. 69, reproduces a page of a ragamala series, in the Goenka Collection, which is closely related to the style of this Chandayana. For a fragment of another painting from the same series, see Mark Zebrowski. Deccani Painting. London: Sotheby Publications; Berkeley and Los Angeles: University of California Press 1983, plate III.<|endoftext|>Meet the ritual figures invented by the Japanese to try to tame the elements.\n\nThe vibrant colors of Charles Fréger’s work caught my eye a few weeks ago as I walked up rue de la République, one of the main streets of Arles, a sunny city in the South of France. Inside the 17th Eglise des Trinitaires, striking portraits of human monsters big and small contrasted with the solemn, vaulted church ceiling. The photographer’s exhibition “Yokainoshima” is a highlight of this year’s Rencontres d’Arles festival, which celebrates the best of contemporary photography. And that’s exactly what draws you into Fréger’s documentation of ritual Japanese figures: just how contemporary tradition can be.\n\nRoads & Kingdoms: Hi Charles, where are you calling from?\n\nCharles Fréger: I’m in Rouen, I just came back from India yesterday. I was in Delhi working in schools on the idea of school transportation. In neighborhoods like Chandni Chowk, where you can’t navigate by car because roads are so narrow, people use school rickshaws to transport children. I was looking into the communities of Delhi through that lens. It’s a sort of portrait of India and its social classes, which are growing further apart.\n\nR&K: How do you usually prepare for these projects? Do you have a team on location?\n\nFréger: Yes, I went with an assistant and I had three Indian assistants on location that had organized meetings with schools and that helped me contact certain groups. The preparation for each trip is much longer than the shooting time. We need to find the subjects but also the place, and then contact them and create a schedule, which takes time. I’m always preparing many projects at the same time, five or six trips that might or might not work out.\n\nR&K: How much time did you spend on the project Yokainoshima?\n\nFréger: Not very long, I took five trips in two years. The book is called Yokainoshima, which means the island of yokai. A yokai is a creature that is strictly Japanese and that can be a monster, a ghost, even an object, and that shows up on Earth to poison people’s daily lives. It’s very complex, because some yokai are also divinities. The Namahage is a yokai, and also a god that descended from the mountains to bring a message and to scare children. The oni are demons. They are also gods. All of this is a question of how you consider each creature, how they are embodied, and what the context of the celebration is. “Yokainoshima” is not a real island. I came up with that title because throughout the project I always thought about being on an imaginary territory. We visited 20 islands, and we didn’t know what we would find on each. In a way, it’s the story of Japan. We see how figures and traditions that come from far away have migrated, how they’ve transformed, or how they created themselves on their own. There are things that resemble what you would find in Cambodia, in Korea, in China, but there are also things that resemble European masquerades. So it’s all very complicated.\n\nR&K: You specifically looked at Europe’s winter traditions in your book Wilder Mann. Were you looking for the same types of celebrations in Japan?\n\nFréger: In Yokainoshima, I look at all the seasons. At first I started working on one tradition that had a strong resemblance to what I had photographed for Wilder Mann: the Namahage. That was my first trip, but when I decided to continue this project, I actually started with the summer. We are not in the same mindset of what I found in Europe—carnivals and masquerades. Japan’s traditions accompany the inhabitants of a town or of an island throughout the rhythms of life and of nature, and also remind them of their responsibilities towards the community. There is an educative element to them.\n\nR&K: You had to work around quite a few restrictions on how and when you could photograph these traditions.\n\nFréger: Yes. Some groups allowed me to photograph them only on the day of the celebration. Others were most flexible, thankfully, otherwise the project would have taken 20 years. I never photographed during the festivals, though. I always defined the context myself, so the shoot would take place just before. My work was not to document the celebrations. It was to pick out figures I was interested in and to photograph them in my visual territory, a place coherent to me with all the subjectivity that implies.\n\nR&K: How were you able to pick out the shoot locations so quickly?\n\nFréger: I just showed up an hour or two before, or the day before, and we would scout the surroundings. Depending on the figure, I would be looking for the sea, or a field, or mountains—it was very varied. Most of these groups came from small towns or villages so it was easy. One tradition was in the suburbs of Tokyo though, and we had to be a bit more creative. Preparation isn’t the most complex part. What was difficult was the weather and the willingness of people to get involved and to take time to do this, because it takes a lot of time.\n\nR&K: Just putting on the costume must have taken a while in some cases.\n\nFréger: Yes, and that’s also why certain groups only agreed to be photographed during the festival; simply wearing the costume was complex. Some costumes are made with natural materials, and are very fragile. They were made on the day of the celebration, so in those cases we had to be there that day. It was similar for the straw men in Wilder Mann.\n\nR&K: How were you able to see what the costumes would look like in advance? Had they already been documented in photographs or drawings?\n\nFréger: These figures are often used in villages as tourist draws, so there is a little bit of material—documents, drawings, photographs, pictograms. That’s how we were able to go: hey, in the prefecture of Fukuoka, there are these little black devils and then we’d go to find them.\n\nR&K: We very rarely see their faces.\n\nFréger: Yes, because I’m interested in the character, and not the person under the costume. I’m interested in the embodiment, in the imaginary identity. That’s why faces appear very little. However, in Yokainoshima, much more than in Wilder Mann, the head is visible. People wear masks that don’t cover the entire face, so you’ll see the person’s ears or cheeks for example. These masks are different than ours. European masks often cover the face completely. We hide the hands and whatever gives the man away behind the costume. Here, I think there is a willingness to show that the man is still there, in control of the figure. People aren’t transformed; they are playing. What’s really apparent about Japan in this project is theatricality. In Wilder Mann, we were documenting the transformation of people, who became beasts. They never took off their costumes. Here, masks could be taken off at any time. It’s about fantasy and theatrics.\n\nR&K: You’ve worked in Japan already, with your series about sumo wrestlers, “Rikishi,” and the one about the Seijinshiki ceremony. What did this new project teach you about the country?\n\nFréger: “Rikishi” was made in Tokyo and its surroundings for two years. “Seijinshiki” was made in Osaka and Kyoto. Here, I traveled throughout the rest of Japan and discovered something else entirely. I am the son of a farmer. My sister is a farmer. With Yokainoshima, I got to meet Japan’s rural people. It’s an aging population, which is very frustrating to me. Sometimes I think Japanese people think food drops from the sky. It’s so much more chic to sell robots and cell phones than to grow rice, but paradoxically, Japanese agriculture is fundamental. I saw a lot of fishermen that were 75. I saw 75-year-old women growing rice. There are no young people in the farms. So right now, we are arriving at a", "num_tokens": 2048} {"category": "common_crawl-art_and_design", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-art_and_design/part-00-00000.npy", "text": " any interior with an air of natural elegance.\n\n🌟 A Global Touch: This Boho Chic canvas framed wall art is designed to travel the world with you. Safely packed for delivery worldwide, it arrives at your doorstep in pristine condition, ready to grace your walls with its bohemian charm, no matter where you call home.\n\n🏡 Buy Canvas Painting Online: Experience the convenience of acquiring this exceptional piece of art from the comfort of your own space. With just a few clicks, you can infuse your living space with the spirit of Boho Chic. Our seamless online shopping experience ensures your selection is carefully packaged and delivered to your doorstep, ready to adorn your walls.\n\n🛋️ Buy Home Decor Items Online: This Boho Chic canvas framed wall art painting is not just a piece of art; it is a statement of refined taste and an embodiment of the free-spirited Bohemian lifestyle. It seamlessly complements a range of home decor styles, from modern minimalist to eclectic, making it a versatile addition to any interior design scheme.\n\n💫 A Bohemian Legacy: Invest in a piece of art that transcends trends and time. This canvas framed wall art painting is a testament to the enduring allure of Boho Chic, destined to be cherished for generations. Its captivating imagery and superior craftsmanship ensure it remains a cherished treasure in your collection.\n\nExperience the enchantment of Boho Chic with this canvas framed wall art painting. Order yours today and let the spirit of wanderlust, creativity, and individuality grace your living space, inspiring an appreciation for the free-spirited beauty that defines the Bohemian lifestyle.\n\nRecently viewed<|endoftext|>Ride the Future\n\nPaul Geusebroek directs this truly cinematic spot for Van Moof’s latest global campaign. One of our most ambitious and meticulously crafted yet, the film inspires people in cities to keep moving forward, instead of reverting to old and destructive pre-pandemic mobility habits.\n\nThroughout the pandemic, people across the world started to stand up for what they believed in. Mobility became a hot topic as people chose to leave their cars at home and city legislators created more space and infrastructure for people, not cars. To put it simply, the world changed. And to make sure people keep up the momentum of positive mobility change, VanMoof is stepping in to remind them.\n\nThe film, created together with HALAL’s very own director Paul Geusebroek, should inspire people towards a greener, calmer, and more enjoyable lifestyle.\n\nAs Paul Geusebroek explains: “My aim was that the end of the film feels like a breath of fresh air. This bicycle stands for not just the environment, but also for escaping the rut that people are in – for cycling out of that nine to five grind. It stands for freedom: everyone is stuck, but this person is just breezing through.”\n\nThe result is a beautiful and highly cinematic film, that serves as a thought-provoking piece that can spark off more conversation around this topic.<|endoftext|>46 let od srpnového vpádu vojsk Varšavské smlouvy do Československa\n\nUkrajinská krize\nUkrajinská krize\n\nPrůnik ozbrojenců do Luhanska, Putinův konvoj na celnici\n\nVelikost textu: a a A<|endoftext|>Artist Spotlight: Bertina Lopes\n\nIn celebration of artist Bertina Lopes and the inclusion of her mixed media work Rais Antica 2 – Una Historia Verdadeira in the 2024 Venice Biennale, courtesy Tia Collection, we are honored to highlight her dedication to political activism and social criticism.\n\nBorn 1924 in Maputo, Mozambique, Bertina Lopes moved to Lisbon at a young age, where she received an arts education. There she was inspired by the avant-garde painters of Portuguese Modernism, in addition to other artistic international movements. Lopes became an influential professor upon her return in 1953 to Maputo, where she engaged with the country’s poets, writers and political activists. Mozambique had become an overseas province to Portugal, attracting thousands of Portuguese settlers to the country as the economy expanded rapidly. Much of Lopes’ body of work during this time reflected not only African iconography, but also the political events of the time. Bertina was forced to return to Portugal in 1961 as a result of the tumultuous political unrest between the two countries. Prosecuted by the Portuguese International and State Defense Police (PIDE), Lopes fled to Rome, where she remained for the rest of her life and where the subject of African identity took on an even more compelling meaning for the artist, expressing an end to colonialism and a desire for independence.\n\nBertina Lopes, Mussunda (dedicato al Agostino Neto), 1961.\n\nIn 1961, the same year that the Portuguese Colonial War started in Angola, poet and eventual first President of Angola Agostino Neto wrote his revolutionary poem which acted as a rallying cry and was dedicated to the Mussunda region of Angola. Lopes, a friend of Neto, was inspired by his political work, and created Mussunda (dedicato al Agostino Neto) as an homage and memorial to the massacres that ensued. The central collaged image is of a classic Chokwe mask (a genre that honors female ancestors as they trace their descent through matrilineality). Chokwe masks were often worn in celebrations to mark initiation into adulthood, dissolving the bond between mothers and sons, much like the dissolution of the bonds between the colonial powers and the native peoples of Angola. The two figures in Lopes’ work each hold such a mask in front of their face. This work also shows the importance of friends and fellow artists to the artist, and the influence of the wider political network surrounding her.\n\nBertina Lopes, Rais Antica 2 - Una Historia Verdadeira, 1972.\n\nIn the early 1960s, Lopes began working on her Rais Antica series, which played upon the Western visual art’s widespread trend of consuming and incorporating what was then termed as “primitivism” or “tribal” forms, borrowed from African and Oceania art. After acquiring a work from this series, the Smithsonian National Museum of African Art wrote how “Lopes references the traditional methods of economy and production in Mozambique (palm fibre) – the ‘ancient root’ of the country and hence the series of painting’s title.” Incorporating feathers, reeds and thickly painted impasto in Rais Antica 2 – Una Historia Verdadeira, the central male figure is indeed a force, carrying within him the kernel of Lopes’ intent around so-called “Primitivism.” For Lopes, such a “root” was the very essence of its history, its people—for her, everything.\n\nIt’s also interesting to note that Lopes depicts a local tribesman as the “warrior” here, as the Portuguese were under increasing pressure to recruit local tribesman for their Flechas (Arrows) units—units specializing in reconnaissance and tracking, considered better suited to try and create relationships with the local populace (similar to the “hearts and minds” strategy used by the US in Vietnam). By introducing the Chokwe mask, Lopes makes it clear that the local tribesmen are under the rule and ancestral obligation of the Mozambican people—not the Portuguese. The political situation in Mozambique runs parallel to the subject matter of her paintings and so here, painted in 1972, Lopes was inspired by the infamous massacre of Wiriyamu that year, in which nearly 400 civilians were killed by Portuguese soldiers.\n\nBertina Lopes, Omaggio per la morte di Picasso (Homage for the death of Picasso), 1974.\n\nOmaggio per la morte di Picasso (Homage for the death of Picasso) is an homage to Picasso’s Guernica, which was hugely influential on Lopes’ practice. Lopes was introduced to Picasso through the Spanish gallerist Juana MordòIt. Their brief meeting would leave an indelible mark on her memory; Omaggio per la morte di Picasso was painted in 1974, following another brief yet intense meeting with the master, just a few months before his death, and the same year a ceasefire was negotiated, with Mozambique’s final independence in 1975. Like Guernica, it shows the tragedies of war and the suffering it inflicts on individuals: specifically, the 10-year War of Independence in Mozambique and its impact on the local people. She features tormented figures with their hands lifted up and mouths stretched wide open in pain. Unlike Picasso, who didn’t feature any soldiers in his painting, she paints the figures of two Portuguese soldiers, each wearing a helmet with a gun slung across their shoulder. Four doves are featured in the painting, a direct allusion to ensuing peace with the signing of the ceasefire. The antiwar painting is an explicit critique of the Portuguese colonial powers, and a reminder of the suffering endured by the Mozambicans.\n\nInstallation view of Bertina Lopes at Richard Saltoun Gallery in Roma. All images courtesy of Richard Saltoun Gallery.\n\nOther works by Lopes during this decade through the late 1980s further signify the grave economic and military problems of Mozambique’s victory for independence, as well as the subsequent civil war which ended in 1992. From the late 1990s to the 2000s, her practice denoted a freedom of gestural abstraction and extraordinary color, often made with industrial paints. In addition to participating in the Venice Biennale twice, Lopes achieved significant cultural recognition and won numerous awards and", "num_tokens": 2048} {"category": "common_crawl-art_and_design", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-art_and_design/part-00-00000.npy", "text": " rainscreen cladding systems, and a large Nana wall system to guarantee it withstands high winds and properly manages water.\n\nOur team created specific flashing and transition details to accommodate the complex systems and integration, ensuring the building is capable of regulating air and moisture leakage, all while maintaining the unique architectural design intent.<|endoftext|>Troy Planning Commission Approves New Selfie Mural for Public Square\n\nBy William Lutz\n\nCivic Capacity\n\nTROY — Earlier this year, the Troy Planning Commission approved the placement of an 11-foot by 17-foot mural at the building at 2 S. Market St., facing north towards the Public Square. The artwork was designed to promote the April 8 Solar Eclipse and seemed to be very popular, as evidenced by scores of social media photographs that used the mural as a backdrop. Following up on the success of the Solar Eclipse Mural, Troy Main Street gained approval for a new “selfie” mural to be installed to replace the current artwork.\n\nGenerally, murals are large pieces of artwork painted or applied directly on a wall, ceiling, or other permanent surfaces. It’s a form of visual art that is sometimes integrated into the architecture of the space. Murals have a long history, with origins in ancient times, serving various purposes such as communication, storytelling, decoration, and expression of social and political messages. They are designed to be seen by a wide audience and often reflect cultural or community values.\n\nThese new murals, are better described as a “selfie mural.” A “selfie mural,” on the other hand, is a modern twist on traditional murals. It’s specifically designed to serve as a backdrop for selfies and photographs. These murals are often located in public or semi-public spaces and are created with the intention of being visually appealing or interactive, encouraging people to take photos of themselves with the artwork. Selfie murals might incorporate vibrant colors, bold patterns, or 3D elements to create engaging and photogenic scenes. They have gained popularity with the rise of social media, as people look for unique and interesting backgrounds for their photos.\n\nThe new mural is 11-foot by 11-foot in size and, like the previous mural, is actually a set of very large vinyl stickers. This smaller mural is expected to be in place until 2029. Troy Main Street will be responsible for the upkeep of the mural. The above picture is a rendering of the new selfie mural that should be up before the end of April.\n\nWhat are your thoughts on the new selfie mural? Is it visually attractive? Does it capture the spirit of our community? Will you take a picture of it? Will you have your picture taken with it? Those who have thoughts are encouraged to leave ideas and insights in the comment section of this article on the Civic Capacity Newsletter at https://www.civiccapacity.com/\n\nThe writer is creator of the Civic Capacity newsletter and is also the executive director of The New Path, Inc, one of the county’s largest nonprofit organizations. Civic Capacity is available at https://www.civiccapacity.com/\n\nNo posts to display<|endoftext|>Star Of Joy - Art Print\n\nSTAR OF JOY: The vibration of the star Arcturus, as it is used in navigation. The Polynesians referred to Arcturus as the star of joy and used it to navigate east and north across the ocean to arrive at the big island of Hawaii. This painting helps one to “follow their joy”. It also helps those who practice out of body travel, to find their way to Arcturtar Of Joy art print by Teal Eye Print Store.   Our prints are produced on acid-free papers using archival inks to guarantee that they last a lifetime without fading or loss of color. All art prints include a 1\" white border around the image to allow for future framing and matting, if desired.\n\n*Please note that this is a made-to-order item and has to be created from scratch before we can ship it! Please allow 5-7 business days (excludes weekends) for production prior to your item shipping out.<|endoftext|>3 - Image 11\n\nResource type:\nThe Michigan Daily, 2013-12-05\n\nDisclaimer: Computer generated plain text may have errors. Read more about this.\n\nThe Michigan Daily - michigandaily.com\nINK'D interne\nFrom Page 11B rity's t:\nest boa\n\"Tatooing, right now, is allow- get the\ning for a handful of individuals Caporu\nwho are skilled enough at the Arbor c\ncraft, and imaginative enough, to aged ne\nwork towards influencing their \"Larg\nown aesthetic and style inside of walk-in\ntattooing,\" Zuck explained. \"(The heavily\nartists) are selling paintings and modern\nexpressing themselves. So it's stuff: lit\nlegitimate artists coming out of on t-shi\nthe movement, and in Ann Arbor of thos\nis where it's really amazing.\" first tat\nAs Zuck put it, this is the tattoo tattoo,\nrenaissance. and end\nBut not every artist welcomes\nthe revived interest. As an art E\nform, tattooing is the culmination\nof hours spent refining a design, The\nworking towards a portfolio to the new\nshowcase the artist's preferred ers to\nstyle. Just like painters or musi- research\ncians dedicate their lives to the artistry\npaintbrush or a sheet of music, differen\nso do true tattoo. artists dedicate \"The\nthemselvestothe artofembellish- you tur\ning skin. Now, that long-expended they we\ntime is often being reduced to get hoo\ndrawing a feather exploding into and the\nbirds on a naked shoulder. I try to\n\"We're not pirates ... well we part of\nkind of are,\" Nugent admitted. Desp\n\"But, we're not scummy, bikery, siasm,\ndirty ... but at the same time, you want w\nalmost want certain types of peo- how che\nple to have that kind of perception Here, C\nto retain that kind of mystery and alongsi\nmystique.\" agree: T\nThe access, though, seems to \"I rea\nfollow in the ever-growing trends can do\noftattoo artistry. a proble\n\"When I first started, it was the it lastin\nTasmanian devils:the classic, Tas- should,\nmaniantattoo, the Yosemite Sam,\" change\nZuck mused. \"Then, dolphins too - th\njumping over the sun were the wise,\" C\n'90s era, the lower back tattoo ... Nuge\ntoday, things are flowing in multi- import:\nple directions: One in the creative no mat\ndirection towards symbolic tat- the desi\ntoos, and the other as very literal, \"I'm\nstraightforward tattoos, such as pickup\nlettering and script.\" the tatt\nThe straightforward direction said. \"I\nof tattooing comes from the col- to be do\nlege and young professional gen- work at\neration who, after scouring the and can,\n\ntht b-sidt\n\nThursday, December 5, 2013 -3\n\nt saw their favorite celeb-\nattoos, filled their Pinter-\nrds with \"ink ideas\" and\nto their nearest parlor to\nir favorite quote tattooed.\nsso described the Ann\nlientele as mostly college-\nwbies, eager to get marked.\ngely it's a lot of college\ns and first-timers. They're\ninfluenced by the web and\nndesign, so it's alot ofrecent\nttle arrows, stuff you'd see\nrs,\" Caporusso said.\"Most\ne people are getting their\ntoo, and, largely their only\nso that's where that begins\nds for college students.\"\nEvolution ofthe art\nhope, though, is to allow\ngeneration of tattoo seek-\nexplore the vastly under-\nIhed possibilities of tattoo\n, teaching the newcomers\nt styles and techniques.\nother side of the coin is,\n*n them on to something\neren't expecting, and they\nked on to that kind of style,\ny come back, which is what\ndo: Education is a large\nit.\" Caporusso added.\nite persistence and enthu-\nsome customers simply\nhat they want - no matter\neesy the ink will come out.\naporusso, Zuck and Nuget,\nde most other artists,\n'he customer comes first.\nad the situation, and say'I\nthat for you,' and if there's\nem with the design or with\n:g and looking the way it\nthen I will recommend a\nto it to make it a better tat-\niat's as far as I'll go design-\naporusso said.\nnt, likewise, realized the\nance of being able to tattoo\nter how cliche or menial\ngn is:\nhappy to tattoo. Anytime I\nthe machine, and am doing\noo, I'm grateful,\" Nugent\nunderstand it's a luxury\ning something like that, to\nmong people who are good\nteach me something.\"\n\nThe act oftattooingis an artthat\nis unlike any other: At a most basic\nlevel, tattooing is an artist loaning\nhis skills to create a lasting depic-\ntion for another. And though he is\nan artist in his own right, with his\nown, dynamic style, the premise\nof tattooing is allowing another\nindividual to express themselves\nthrough an artist's work.\n\"That's what a tattoo is: it's an\noraclethat you can look at and you\ncan carry it with you. And what-\never fits for you and your culture,\nI think it's right either way,\" Zuck\nThe increase in tattoo interest\n", "num_tokens": 2048} {"category": "common_crawl-art_and_design", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-art_and_design/part-00-00000.npy", "text": " a pedestal, and it makes him a better communicator.\n\n“You get to know the students, when to encourage, cajole or give a hug. It’s far more rewarding,” he says.\n\nToo bad art isn’t thriving in the public schools.\n\n“It’s been proven that art education always enhances knowledge of other areas,” says Smith. “Ceramics, and it’s only one example, could be the basis for a complete curriculum. Earth sciences, geology, chemistry, glaze calculations, social sciences, how cultures developed, and thermodynamics can all be learned through pottery.” \n\nAdditionally, schools must be diverse in their approaches to students. The capacity to learn is based on musical, physical, visual or other natural aptitudes. This is known as the theory of “multiple intelligences” (see www.edutopia.org).\n\nBob points out a way that works referring to the movie “Mr. Holland’s Opus.” Ghetto kids are saved by the violin. I’ll point out that they were also nurtured by a great teacher.\n\nBob thinks quite a bit about teaching clay and is dedicated to developing a pedagogy that matches his intense knowledge of the subject. He’s learned it’s not just the process of throwing on a potter’s wheel, but attuning with what your hands are doing. He certainly has his heart in it. Hands and heart.\n\nHannah B. Hayes is a former Both Sides Now debate columnist, small-business owner and peace activist. She has been a part of the Evergreen community for more than 35 years.<|endoftext|>what are the five basic types of lines?\n\nBooker stresses that comedy is more than humor. .\" After all, it is usually the first and the most pristine outcome of our contact with writing tools, pens, pencils, crayons, etc, and typically the first thing we choose to use in order to represent the reality around us. Part of the beauty of maps is that they can be used in a variety of different ways, from navigation, to establishing ownership, to presenting information. The distance from which we may be able to observe a painting and the possibility to circle around an exhibit are almost as relevant as the content of the artwork itself. You might find form singled out as a separate category, defined as a three-dimensional alternative to shape. These include geometric shapes (deployed by cubists, for example), organic (which you may find among the examples of Art Nouveau posters and paintings), abstract, etc. Fold mountains are the most common type of mountain. create three designs using lines A Visual summary of the illusions created by straight line combinations is found in Fig (1 - 5 ). This includes the things we see in everyday life that exhibit linear features, but also the phenomena we perceive as lines due to our vision, which is instructed by linear perspective. The diagonals form angles and change direction suddenly. It refers to a pattern where the conflict becomes more and more confusing, but is at last made plain in a single clarifying event. Watch Queue Queue Space is often illusively recreated in a painting or a drawing, realistically or in a distorted manner. This video is unavailable. However, when a brand wants to communicate with their customers, then the communication takes another form. Rasheda. It is common for artists to use various line drawings as a warm-up, oftentimes giving them fresh ideas on how to begin working on a longer study, which may end up a final work of art. Humans can detect 5 distinct types of taste. Texture 5. In prayers of adoration or worship, we exalt the greatness of God, and we acknowledge our dependence on Him in all things. Booker now interprets the mind of God, and analyses not just the novel – which will never to me be quite the same again – but puts the narrative of contemporary human affairs into a new perspective. Organization 4. Finally, in the resolution, the hero overcomes his burden against the odds. Nonetheless, the human capacity to translate these visual stimuli into something as simple as a line attests to the significance of abstract thinking, and basically sums up the reasons why we are able to create something as artificial, albeit nature-like, as art. Gestalt psychology was mentioned in this text, due to its main principle that points out how human perception acknowledges the whole as other than a sum of parts. [7], Others have dismissed the book, criticizing especially Booker's normative conclusions. Parallel or cross-hatching 4. For example, lines with sharp peaks are not easily read by our eyes and impart a feeling of uneasiness. It recognizes the anthropological tendency to group similar traits and to categorize information, to connect parts and to deduce meaning rather than merely observe without contemplation. Fig. Hardly anything that belongs to the domain of the visual can be achieved without at least one of these elements. Our beautiful visual world is richer than ever, and so are the ever-progressing means of representation. [3] 0 0. Length 2. the five types of lines are :curved,horizontal,diagonal,vertical and zigzag. You might find form singled out as a separate category, defined as a three-dimensional alternative to shape. Do you know an answer to a question What are the elements of art exactly? Definition: The protagonist goes to a strange land and, after overcoming the threats it poses or learning important lessons unique to that location, they return with experience. Diagonal lines may stand in a horizontal or vertical fashion, but they are slanted. Lines describe an outline, capable of producing texture according to their length and curve. This helps us identify those that cannot be named or attributed to the organic ones, and perceive closed or almost-closed lines as shapes, and not lines. The five different types of map and their uses. There are five basic kinds of mountains: Fold Mountains (Folded Mountains) Fault-block Mountains (Block Mountains) Dome Mountains; Volcanic Mountains; Plateau Mountains; These different types of mountain names not only distinguish the physical characteristics of the mountains, but also how they were formed. - Anish Kapoor. Width 3. \"Everything ever written boiled down to seven plots\", review by Kasia Boddy. Your sense of taste helps you evaluate food and drinks so … Horizontal Lines:When a line moves from left to right direction, it is horizontal. Some have celebrated the book's audacity and breadth. What each of the other characters represents is really only some aspect of the inner state of the hero himself.\". Happiness . A line is mathematically defined as a path that connects two dots or a path of an imagined moving dot. Sign in. Give you the latest and most authoritative answer; HOME; bestanswer > lines > of > types > What are the five basic types of lines? Most of today’s architecture would have never been built if there wasn’t for it. \"The Plot Thins, or Are No Stories New? However, even though the book mainly centers around the question of why has one single sense – sight – become so predominant in architectural culture and design, it may also be perceived as a guidebook to understanding the power and nature of our five senses. As discussed above, lines are the primary tools of artistic expression, and therefore analogous to handwriting in terms of expressing individuality. Some also mention value, which is described as a parameter that determines the intensity of color, and pattern, which refers to repetition. Teacher teaches by explaining lines ; Teacher explains different types of lines with the aid of diagrams. Mario Zavala/Demand Media. This type of line is found most often. Length, width, texture, direction, and degree of curve. 1 decade ago. This type of German Shepherd has a narrower head and exaggerated rear … At some point, the difference between arts and crafts became drastic, and this “intellectualized” approach to art is a trend that remains to this day. Consequently, a piece of art, be it a sculpture, an assemblage, an installation or even a painting, occupies a particular physical space with a certain purpose. They can be straight or could zig-zag or curve. Watch Queue Queue. Definition: An event forces the main character to change their ways and often become a better individual. What are the five basic types of lines?,answer:Element of Art - Line - SlideShare. This is followed by a dream stage, in which the adventure begins, the hero has some success, and has an illusion of invincibility. Implied lines And their 5 functions are: 1. Style Other types of lines are defined by the technique you are using: 1. In order to achieve these ultimate goals, however, a number of more basic needs must be met such as the need for food, safety, love, and self-esteem. Juhani Pallasmaa wrote The Eyes of the Skin in 1996, and it has become a classic of architectural theory. 0 0? Curved You can make a variety of lines using these tools: 1. \"The Seven Basic Plots\", review by Clive Bradley, \"What are the seven basic literary plots? On the other hand, the artwork might be playing with our expectations from it, since various materials are commonly used to create illusions of a texture that they do not possess - such as the increasingly popular marble-looking foam rubber in furniture design, or the transparent stone in the architecture of Kengo Kuma. Communication is a very basic and fundamental process for human beings. Everything you need to know about manufacturing techniques and processes. The Teacher introduces the topic (TYPES OF LINES).   There are five different levels of Maslow’s hierarchy of needs. Vertical 2. Tiffany Means . Examples: Ramayana, Odyssey, Alice's Adventures in Wonderland, Goldilocks and the Three Bears, Orpheus, The Time Machine, Peter Rabbit, The Hobbit, Brideshead Revisited, The Rime of the Ancient Mariner, Gone with the Wind, The Third Man, The Lion King, Back to", "num_tokens": 2048} {"category": "common_crawl-art_and_design", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-art_and_design/part-00-00000.npy", "text": " $12,800<|endoftext|>PostModernism Museum\n\nfor English please scroll down\n\nPostModernism Museum este o platformă muzeală privată care produce și promovează proiecte de cultură contemporană și dezvoltă programe de cercetare culturală, cu focus pe domeniul artelor vizuale.\n\nCa producător și promotor de proiecte de artă contemporană, dezvoltă proiecte curatoriale, educaționale și de cercetare în artă. Printre proiectele expoziționale și de cercetare se numără: „De la propagandă la baby-boom”, „Înainte și după revoluția culturală în România 1971”, „Arhitectura socialistă în București”, „Centenarul femeilor în arta românească”, „Naționalism și multiculturalism”, „Minorități etnice în cultura vizuală din România”. Proiectele expoziționale pot fi vizionate aici. Proiectele de cercetare se regăsesc aici.\n\nPMM a inițiat în 2015 DARE, un program de Documentare, Arhivare, Expunere și Revalorificare a artei produsă în România în intervalul 1945-1990.\n\nPentru alte detalii și colaborări suntem aici info at postmodernism.ro\n\nPostModernism Museum is a private museum platform, a resource and education centre and a research publishing house. PMM produces and presents its projects and programmes in spaces around the world.\n\nWith curated art projects and a pool of various approaches of exhibiting modern and contemporary culture, PostModernism Museum is dedicated to the open conversation between the past and the present, the established and the experimental, being devoted to the culture of the 20 and 21 century.\n\nThe exhibition programme consists of group and solo exhibitions featuring modern and contemporary artists, national and international, and there is an equal dedication to ensure that these exhibitions are accompanied by a challenging discursive programme that is to strive to open a dialogue not only with the visual arts, but with a variety of disciplines such as theatre, economics, sociology, philosophy, creative industries.\n\nThrough its close cooperation and collaboration with artists, researchers and other cultural actors, PostModernism Museum aims to be an active participant in the international discourse on contemporary art and recent history, related fields and creative sector in general and to highlight current issues that are of concern to not only the arts, but also to society at large.\n\nThe first 3 years it operated within an own space, in Bucharest, being opened daily, with free entrance. From 2018 onwards it takes up a new model, opening to the public within different cultural spaces in Romania, institutional and private partners. The present model sustainably concentrates the curatorial, exhibitional and educational activities, tunning with the specific dynamics of the local creative environment and with the local cultural agenda.\n\nAll projects presented within PostModernism Museum are not merely objects exhibited but thoroughly documented initiatives. They all aim to mean more than an exhibition and to last more than two months. Collaborating with international curators and cultural entities, publishing papers, studies, books – all activities aim towards a sustainable consistent aproach of research in culture and creativity.\n\nPostModernism operates a publishing house and disseminates its publications to Emag Romania, Amazon and other 39.000 online distribuitors around the world.\n\nPMM joins and supports the professional training in creative industries in Romania, through the programme Formare Culturala. More, here\n\nProfessional principles under which we work are transparency, accountability, confidentiality and long-term partnership.\n\nThe executive team is best possible dynamic and energetic team ever, passionate about cultural entertainment. We value the diversity of our organisation and welcome staff from all sections of the community. The team working for PostModernism Museum is formed out of professionals in the field, each of it having extensive experience (between 8 and 20 years of experience in history of arts, curatorship, cultural management, administration).\n\nOut partners are cultural operators with broad work knowledge and skills, in the Romanian context and European and international contexts.\n\nIf you would like to reach out, please write at info at postmodernism.ro<|endoftext|>Nicole Bolar | January 4, 2022\n\nThe Quick Facts\n\nMesmerize is a temporary interactive art exhibit. Just like the Texas State Fair it’s here one day and gone the next – So enjoy this amazing experience while you still can!\n\nIt’s a great space to inspire creativity! Bring your cameras and get ready for a photoshoot because every room you enter is pretty picture perfect. There are 15 art exhibits to explore. Neon lights, a rose covered throne, one long rainbow hallway, and a cloud covered room are just a couple examples of the awesome spaces you’ll be able to use for your Instagram pic’s backdrop.\n\nYou can meet the artists who designed it all! Clayton Lillard and Mateo Gutierrez work within the exhibit to help guide you and answer any questions you may have! I stopped to talk with Mateo – who was dressed absolutely fabulously by the way – and we got to talk about his inspiration for Mesmerize. He described many of the same feelings we all had during quarantine…feelings of sadness and boredom, as well as the desire to escape reality. In an effort to break out of that creative rut, he worked on concepts for Mesmerize. Mateo used the current exhibit as a way to channel his energy into something productive in a time where everything seemed to be disheartening in the normal world. He hopes that the interactive exhibit will inspire visitors to pursue their own creative dreams like working on the project inspired him to get back to his passion. \n\nThe Experience\n\nTo begin the experience, one of the artists leads you to a nondescript door. Pulling the handle, he waves his hand forward to welcome me into the first dimly light room. Immediately I recognized it as a scientist’s private office. The Equipment, wires, and tubes winding their way out of an old tv in the corner drew my eye first. The tv looked like it was straight out of the movie The Ring, but instead of static, black and white stripes rapidly swirled inward and out of sight. It looked like a portal to a different universe. \n\nAlready I was hooked. I wanted to know more about Mesmer, this mysterious visionary who believed in unworldly experiences beyond our imagination. Dark corridors and beams of light guide you along the way, casting a rainbow of shadows across the walls and floors. Secret rooms and trick wardrobes make it feel like you’re walking out of one world and into another – I felt like Lucy discovering the land of Narnia! \n\nThe fun comes with each visitor’s unique interpretation of the art. One particular area supposed to look whimsical a fun, left a sad impression on me as I walked through alone. Everything I laid eyes on, and I mean everything was teal. That’s right, the color teal. The floor, the walls, the furniture, the pictures – it was all washed in a shade of muted blue-green. Running my hands across a solid teal piano, I envisioned a world that was cold. One lived in by a person who tainted everything they touched and left it frozen in their absence. \n\nEach exhibit tested the limits of normality. Don’t be surprised to find yourself going from open spaces filled with color to dark rooms where it’s impossible to make out where one wall ends, and another begins. Expecting the weird, wacky, and wonderful I was surprised to find myself in a state of quiet stillness and thoughtfulness as I wondered through the exhibits. Scattered throughout are handwritten notes left by Mesmer, provoking deeper thoughts about life and further intensifying my feelings. \n\nAlong the way, I helped a group of girls get their Instagram pictures in the cloud room and down the rainbow hallway. After they left, I had the entire exhibit to myself and it got very quiet. I wondered through, revisiting sites I had already seen to get an even closer look. The most memorable part for me was leaving a note on the wishing tree in the main room. The bright green tree looks like it would come straight out of a storybook or maybe even Willy Wonka, with twisting branches going up to the ceiling and colorful leaves in every color lining the branches. Wishes from past visitors tell stories about what they were thinking in that same moment, and what they wanted for the world or for themselves in the future. It was powerful to read some of them, and I made sure to leave my own.\n\nI highly recommend Mesmerize! Not only is the exhibit amazing, but Native Hostel is an absolutely stunning hotel with a full café and bar on the inside. I made sure to grab a coffee on my way out!<|endoftext|>Norway built numerous grain silos in coastal cities during the interwar years, to ward off the risk of shortages and famine. For example, the one in Kristiansand, built in 1935 with fifteen large concrete cylinders, to which another number were added in 1939, with a total capacity of 15,000 tons.\n\nWhen the 21st century arrived, many of these facilities were in disuse, and the authorities considered what to do with them: demolish them or give them a new life.\n\nThe one in Kristiansand was cataloged in 2010 and, subsequently, it was decided to transform it into a museum, which opened its doors yesterday Saturday, as home to several collections, among which the Nordic art of the Norwegian magnate Nicolai Tangen,", "num_tokens": 2048} {"category": "common_crawl-art_and_design", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-art_and_design/part-00-00000.npy", "text": " These are the questions we asked ourselves and for us the answer lies in the creation of Brunnenpassage”, tells us Anne Wiederhold-Daryanavard.\n\nWhat is Brunnenpassage\n\nBrunnenpassage is an “art and social space” with a very low and easy participation threshold. Entrance for the more than 400 events per year is “pay-as-you-can”. The event programme ranges from music and dance to theatre events. The special thing about Brunnenpassage is that you can participate at events not only as a spectator, but also actively in their creation. “For example, you can be a part of an Arab opera. I don’t have anything against Mozart, but in our opinion, in the 21st century we need to realise how diverse our society has become. This has not only to do with art, but also architecture and urban development field, in the context of how we live together in Vienna and in the world in general”, explains Anne.\n\nBuilding bridges between cultures and spaces\n\nNormally, one would not expect to see the world-renowned cello player and UN Peace Ambassador Yo-Yo-Ma, together with UN Secretary-General António Guterres at Yppenplatz, in Vienna’s 16th district. However, he performed a concert together with young artists in the Brunnenpassage, and the whole experience was free of charge. With events like this, the Brunnenpassage takes on the role of a bridge between the city centre, where many high-ranking art institutions are located, and the outer districts. By cooperating with museums or opera houses, Brunnenpassage tries to break down stereotypes. “We have a huge choir that sings together with an orchestra in the Opera House. For the audience it is a huge surprise to see people on stage who look and dress differently.” This cooperation is important to create new connections in the city. Brunnenpassage sees itself as a transdisciplinary laboratory with both a social and an artistic aspect in its work. “For example, our choir consists of hundred people, but has a Turkish conductor. It is the first choir in Austria where Austrians are singing, and a Turkish man is conducting.”\n\nAn open yet safe space\n\nOpenness is one of the core features of the Brunnenpassage. “I think it is very important to share spaces in society. Otherwise, communities become static. You see this all over the world, Turkish men in cafes, Austrian old ladies in other cafes, they are always segregated.” Therefore, it is an important objective for the Brunnenpassage that its premises are available to all communities, no matter how different they may be, explains Anne: “We don’t ask what language they speak, how long their asylum permission is. The idea is to bring the different parts of society together. It is important that it is a free decision to come because they want to come and not because they have to.”\n\nBut at the same time, it is also important for the Brunnenpassage that its visitors feel comfortable and safe, even though it is a public place. “For example, gay Muslims from Nigeria come to Brunnenpassage and they tell us that they can be themselves when they are here.” As an example, Anne tells us about a project where 16 people from different refugee backgrounds, such as Iraq, Syria, Iran, or Afghanistan, were employed for one year in the Brunnenpassage. This gave them the opportunity to network with each other and to focus on their future goals. “In that one year one of them had time to prepare for entrance exams for university and is now studying acting in Salzburg. Someone else is studying at the Academy of Fine Arts. They are living their dreams.”\n\nA diverse team encourages participation\n\nThe diversity found in the audience of Brunnenpassage audience is also reflected in the composition of the venue’s coordination team, which is, according to Anne, key for Brunnenpassage’s success: “Often people try to bring communities together, but they don’t succeed because their team is too homogeneous. For example, I come from Germany. If the whole team was made up of Germans, we would never reach the Arab community. If we hire people who speak Arabic, it is much easier. I had a Muslim colleague and since she has been working here, other Muslim women joined because they trust her. When you have such a diverse team, you also have access to different social media groups and have different ideas.” In addition to the 12 employees, asylum seeker volunteers also work for the Brunnenpassage, for example at the bar, as public coordinators, or for childcare.\n\nThe financing of Brunnenpassage\n\nThe foundation for the Brunnenpassage was laid by the charity organisation Caritas in 2007 when they bought the buildings at Yppenplatz. In addition to the support of Caritas, the Brunnenpassage also receives funding from the Arts Department and the Integration Department of the City of Vienna, as well as from the Austrian Ministry of Culture and Social Affairs. However, Anne emphasises that the Brunnenpassage still has a free hand in putting together the programme.\n\nBrunnenpassage’s future plans\n\nThe Brunnenpassage is known both nationally and internationally as an art hub with a social impact. In the future, the Brunnenpassage would like to work increasingly internationally, as Anne explains: “Last year the Mayor of Amsterdam visited us with a delegation of 65 people.  I hope we can be a model project for other cities.” But Brunnenpassage also wants to be a pioneer for other districts in Vienna and also for rural areas: “The Mayor of Vienna asked me to write a concept for the 10th district, where there is a huge market. We found a market stand and we work there with the same methods as here. It is a question of funding from the municipality because in many other districts it would be helpful to have shared spaces like ours.” Through its work, the Brunnenpassage has already gained international fame. For example, it was in 2020 selected by the European Cultural Foundation to be part of their European Pavilion project. Their project “Story: Telling! Europe” within the European Pavilion, involves people from marginalised groups, and invites them to tell hidden stories.\n\nBrunnenpassage’s Message\n\nBrunnenpassage has a clear message, and that is that art can change the world. As Anne Wiederhold-Daryanavard explains: “Activism and art work together. It is like acupuncture, where you have many points in the body to stimulate. In the society of Vienna there are also many points where you can really make a change and inspire. We need to show people what Europe is. Show them a new way: post national, post colonial, post migrant. We need more spaces like Brunnenpassage.”\n\nGet involved! You can attend many events and participate in workshops at Brunnenpassage!\n\nAddress: Brunnengasse 71, 1160 Wien, Austria\n\nInterview by Jorge Mosquera.\n\nShare this:<|endoftext|>5.9 C\nWednesday, December 4, 2024\nHomeArt & Design\n\nArt & Design\n\nCapturing the Magic of Golden Hour: Nature Photography by the Seaside in Bournemouth\n\nNature Photography: As the vibrant hues of October sweep across the UK, Bournemouth transforms into a paradise for nature photographers, especially those who revel...\n\nUnderstanding the Art of Outdoor Photography\n\nOutdoor photography is a captivating endeavour that allows photographers to capture the beauty of the world beyond the confines of a studio. I explore...\n\nMastering Photography Poses\n\nPhotography poses play a crucial role in capturing the essence of different occasions and individuals. Whether it's a professional headshot, a glamorous fashion shoot,...\n\nJonathan Borba: Capturing Essence through Simplicity\n\nJonathan Borba, a 32-year-old photographer hailing from Rio Grande do Sul and currently residing in Espírito Santo, is a visionary artist whose lens captures...\n\nThe Essence of Headshot Photos: Capturing Character Poses and Different Styles\n\nIn the realm of professional and personal branding, headshot photos have become an indispensable tool for individuals from all walks of life. Whether you're...\n\nRediscovered Gustav Klimt Portrait of Fraulein Lieser to Hit Auction Block After a Century\n\nVienna, Austria - A long-lost masterpiece by the renowned Austrian artist Gustav Klimt has been unearthed after nearly a century of obscurity. The portrait,...\n\nThe symphony of success: the top 5 music streaming services for musicians to showcase their talent in 2024\n\nTop 5 music streaming services: In the digital age, musicians have found themselves at the crossroads of opportunity, where the right platform can catapult...\n\n- Get events special discount offer\n\n- Never miss a story with active notifications\n\n- Get training special discount offer\n\nMust read<|endoftext|>Friday, August 04, 2017\n\nBrillo Box (3¢ off): Art, Investment, Commodity, Cultural Icon, Whichever\n\nThe producer of the definitive Andy Warhol documentary rightly observes the world has become vastly more Warholian since his death in 1987. Perhaps none of his pieces are more fundamentally Warholian than the Brillo Boxes—so-called because they faithfully copied the design of the Brillo Box cartons you could have found in the backroom of any supermarket in the 1960s. Warhol made a fair number of the big white Brillo Boxes, but only seventeen of the smaller, yellow “3¢ off” version. Lisanne Skyler’s family had one, but they parted with it before the Warhol market exploded. Skyler traces the box’s journey and explains its significance in the short (forty-minute) documentary, Brillo Box (3¢ off) (trailer here), which premieres this Monday on HBO.\n\nThe Skyler Brillo Box", "num_tokens": 2048} {"category": "common_crawl-crime_and_law", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-crime_and_law/part-00-00000.npy", "text": " mode, not a prerequisite for success. 'Nuff said.\n\n[*] Outlining is organizing and distilling the course material into a concise reference document, in order to understand that material. But go ahead and participate in group outlines, because you should be outlining for yourself regardless and (if competitive advantage is an issue) other people's outlines aren't that much help anyway.\n\nJun. 14th, 2011 07:04 pm\n\nFrom page 8 of this decision (PDF):\n\nThe fact that this is a case . . .\n\nSCOTUSblog has context and a summary.\n\nMy standard response to people who aren't sure if they want to go to law school is, \"Don't.\" In the past, I've gone on to say, \"Law school sucks enough that unless you're positive you want to practice law [*], you shouldn't spend three years of your life at it.\"\n\nThis NYT article reminds me that my answer also must include, \"and the job market is so bad that it is an amazingly risky gamble.\"\n\nSo, for the record.\n\n[*] Two notes about \"practice law\":\n\nFirst, if you're one of the minuscule number of people who can go straight into teaching law, you don't need to be asking me for advice.\n\nSecond and far more importantly, as the article says:\n\nThis gets to what might be the ultimate ugly truth about law school: plenty of those who borrow, study and glad-hand their way into the gated community of Big Law are miserable soon after they move in.\n\nIf you don't know what kind of law you want to practice and what it'll be like, it behooves you to find out.\n\nand all others who think rationally:\n\nSo you're a lawyer who's been out of law school and practicing at the same place for three or four years. Your place of employment has just taken on a new client and your boss has assigned you the case, which requires urgent attention. You believe the new client should win, but you disagree with your boss's reasons for assigning you the case and demand time to think it over. Your boss agrees but warns you that the opponent in the case, a prominent businessperson, is dangerous and that taking the case could make that person your enemy.\n\nAt the end of the conversation,\n\n[Poll #1553005]\n\nIf you are the protagonist of the novel I was reading last night )\n\nA while ago, someone on my reading list had a post inviting people to pick one historical figure they would like to kick in the shins. I can't find the post now, but as I recall, the rules were that a mysterious person with a time machine made you the offer, with the restrictions that you were strictly limited to one kick in the shins, and that you couldn't choose Hitler (or, I suppose, any other such really obvious figure) since if you did, everyone would, and then history would be altered thanks to the permanent bruise he'd have.\n\nI couldn't think of anyone then, but now I've got my choice: Roger B. Taney, Chief Justice of the United States, the author of the Supreme Court's opinion in Dred Scott v. Sandford. It's been years since I read it, and my memory had faded about just how absolutely vile Taney's opinion is; but yesterday, I was listening to a lecture series on the history of the U.S. Supreme Court [*], and all through the sections on Dred Scott [**] and Taney's other slavery-related decisions, my foot just kept twitching.\n\nSo, who would you like to kick in the shins?\n\n[*] I listen to podcasts, radio plays, or lectures while in the nursery with SteelyKid (I tried audiobooks, but while fiction moves fast enough when I'm distracted by driving, it's not sufficient for this). I picked this series as a way of easing myself back into the legal mindset before I go back to work in a few weeks.\n\n[**] The decision is over 100 thousand words, so I don't recommend reading it (trust me—I have), but the principal holdings are that (1) no-one of African descent can be an American citizen, because the Constitution's framers viewed them \"as beings of an inferior order\" who \"might justly and lawfully be reduced to slavery for [their own] benefit\", and (2) Congress had no power to prohibit slavery in territories—neither of which was remotely supportable. For more, see Wikipedia.\n\nThree quick comments I found interesting:\n\n • Dahlia Lithwick on the difference between judicial activism and judging; also on how \"when your citizens and/or their Legislature are racing around banning and legalizing the same thing at the same time, the will of the people is not necessarily the last word on what's constitutional.\"\n • Kenji Yoshino on the potential wider legal consequences of the decision. I note that the decision explicitly refused to make immutability a requirement of traits deserving the highest legal protection, as Yoshino argued in Covering.\n\n (Also, it is amusing to contrast his and Lithwick's characterizations of the way the decision is written.)\n\n • The Slacktivist considers people who are sincerely opposed to same-sex marriage for religious reasons and wonders \"why these friends and brothers and sisters of mine think that such theological arguments can or should be persuasive to those who don't share our religious perspective.\"\n\nAs everyone has said, California's highest court today ruled that \"the designation of marriage\" must be made \"available both to opposite-sex and same-sex couples.\" I am so happy about this, though my happiness must pale besides that of those more directly affected by the decision.\n\nThat decision, by the way, is 172 pages: 121 pages of majority opinion (including 73 footnotes), 40 pages of concurring and dissenting opinions, and 11 pages of administrative stuff (PDF, 500KB). I've only had time to skim the majority opinion (and I am, alas, not the sharpest knife in the drawer at the moment thanks to sleep deprivation), but the only word that comes to mind is \"exhaustive.\" Which—to go off on a tangent—interests me, because there are several different potential audiences for all this exhaustive discourse, and talking to multiple audiences is a tough thing to do.\n\nlegal natter )\n\nHave any of the non-lawyers here ventured into the decision itself? What did you think?\n\nIn Covering: The Hidden Assault on Our Civil Rights, Kenji Yoshino argues for a new way of looking at discrimination and civil rights. As the title indicates, this centers on the concept of covering, or downplaying a disfavored trait to blend in:\n\nFamous examples of covering abound. Ramón Estévez covered his ethnicity when he changed his name to Martin Sheen, as did Krishna Bhanji when he changed his name to Ben Kingsley. Margaret Thatcher covered her status as a woman when she trained with a voice coach to lower the timbre of her voice. Long after they came out as lesbians, Rosie O'Donnell and Mary Cheney still covered, keeping their same-sex partners out of the public eye. Issur Danielovitch Demsky covered his Judaism when he became Kirk Douglas, as did Joseph Levitch when he became Jerry Lewis. Franklin Delano Roosevelt covered his disability by ensuring his wheelchair was always hidden behind a desk before his Cabinet entered.\n\nThe central argument of the book is that covering is an assault on civil rights because it is an assault on autonomy. If one has a right to be something, one has the right to do the things that one feels are part of that identity. Otherwise, \"the demand to cover . . . is the symbolic heartland of inequality—what reassures one group of its superiority to another.\" In other words, though assimiliation can be necessary for peaceful co-existence, its dark side also should be recognized.\n\nThe book is a blend of memoir, history, and legal analysis. It begins with a chapter of memoir, charting the author's \"struggle to arrive at a gay identity.\" Yoshino did undergraduate and graduate work in literature before switching law when he accepted his sexuality—because, he writes, \"A gay poet is vulnerable in profession as well as person\"—and all of the autobiographical portions of the book are elegant and precise. And in the later chapters Yoshino moves between memoir and history or legal analysis with a remarkable fluidity, never jarring me in the transition.\n\nAfter the context-setting opening chapter, the book divides into three parts. The first is an examination of gay history, which is itself divided into three parts: conversion, or attempts to change sexual orientation; passing, or attempts to hide sexual orientation; and covering, or attempts not to flaunt sexual orientation. Each section emphasizes how it is still a current problem. Conversion lives in the idea that homosexuality is \"contagious\" and therefore children need to be protected from the promotion of homosexuality in schools, and passing in the U.S. military's \"don't ask, don't tell\" policy. And both can co-exist with covering, such as in custody cases:\n\n[When denying] custody to a lesbian mother in 1990, a Louisiana appellate court cited \"open, indiscreet displays of affection beyond mere friendship . . . where the child is of an age where gender identity is being formed.\" If acceptable sexuality for same-sex couples is limited to the appearance of friendship, then the expectations for parents are clearly not orientation-neutral.\n\nNotice as well why such covering is required—parental flaunting is dangerous because it could convert a child whose \"gender identity is being formed.\" All three demands for assimilation are simultaneously in play—because children must not be converted, parents must pass to their children and cover to the courts. The shifts from conversion to passing to covering . . . are shifts", "num_tokens": 2048} {"category": "common_crawl-crime_and_law", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-crime_and_law/part-00-00000.npy", "text": " happy to hear your opin<|endoftext|>Immigrating to a new country can be a challenging journey filled with legal hurdles and paperwork. In the UK, legal aid immigration solicitors play a crucial role in helping individuals navigate this complex process. These solicitors offer essential services, from filling out complicated forms to representing clients in court. This article explores the vital role of legal aid immigration solicitors and how they can assist those in need.\n\nKey Takeaways\n\nThe Vital Role of Legal Aid Immigration Solicitors\n\nLegal aid immigration solicitors play a crucial role in the UK by specialising in the laws and regulations that govern entry, stay, and citizenship. They provide invaluable assistance, from filling out complex forms to representing clients in court. Their expertise can be the difference between success and failure in immigration applications and appeals.\n\nSpecialisation in Immigration Law\n\nLegal aid immigration solicitors are experts in immigration law. They understand the intricate details of the legal system and can offer tailored advice to each client. This specialisation ensures that clients receive the most accurate and relevant information for their specific situations.\n\nAssistance with Complex Forms\n\nFilling out immigration forms can be a daunting task. Legal aid solicitors guide clients through each step, ensuring that all forms are completed accurately and thoroughly. This helps to avoid delays or rejections, which can be common in the immigration process.\n\nRepresentation in Court\n\nWhen it comes to court representation, legal aid immigration solicitors are invaluable. They present evidence, argue on behalf of their clients, and support legal arguments effectively. This representation can significantly impact the outcome of a case, providing clients with the best possible chance of success.\n\nWho Needs an Immigration Solicitor?\n\nIn the UK, various individuals may require the expertise of an immigration solicitor. These professionals play a crucial role in navigating the complexities of immigration law. Here are some groups who often seek their assistance:\n\nAn immigration solicitor can provide essential support throughout the application process, ensuring that all necessary documentation is correctly completed and submitted.\n\nHaving the right legal support can significantly improve your chances of a successful application.\n\nFor those considering their options, it is vital to understand that the right solicitor can make a substantial difference in the outcome of your immigration case. They can clarify the legal pathways available and help you avoid common pitfalls that could lead to delays or rejections.\n\nIn summary, if you find yourself in any of these situations, seeking the guidance of a qualified immigration solicitor is highly advisable. They can help you understand your rights and responsibilities while navigating the UK immigration system effectively.\n\nUnderstanding Legal Aid in Immigration\n\nLegal aid can offer free or subsidised legal help to those who can’t afford a solicitor. However, eligibility for legal aid in immigration cases is limited and often depends on the type of case and your financial situation.\n\nEligibility Criteria for Legal Aid\n\nTo qualify for legal aid, applicants must meet specific criteria. These criteria ensure that only those who genuinely need assistance receive it. The main tests include the Means Test, the Merits Test, and the Nature of the Case.\n\nMeans Test\n\nThe Means Test evaluates your income and capital. To pass, your financial resources must fall below a certain threshold. This involves a detailed assessment of your financial situation, including recent bank statements and any support you receive from friends or charities. If your only income is from section 98 support and you have no savings or assets, you will likely pass the means test.\n\nMerits Test\n\nThe Merits Test assesses whether your case has a reasonable chance of success. Legal aid is granted only if paying for legal advice is a good use of public money. The criteria for this test depend on the type of case. Generally, funding is provided if your case is likely to succeed, but in some instances, you may receive basic legal advice even if you do not meet this condition.\n\nNature of the Case\n\nLegal aid is typically available for specific types of cases, such as asylum claims, domestic violence cases, and human rights claims. It’s essential to ensure that your case falls within these categories to qualify for assistance.\n\nAt KJ Conroy, we help you navigate these eligibility criteria, ensuring you can resolve civil disputes confidently with no win no fee solicitors.\n\nInitial Consultation and Case Evaluation\n\nAt the start of your journey with KJ Conroy, the initial consultation is a crucial step. This meeting is designed to discuss the specifics of your case, understand your goals, and evaluate the best legal strategies to achieve them. A no obligation, professional, free conversation with a friendly and experienced lawyer will provide you with an honest assessment of your options and prospects.\n\nDiscussing Case Specifics\n\nDuring this phase, we will delve into the details of your situation. This includes understanding the legal issues at hand, the costs involved, and any further documentation you need to provide. We aim to ensure that you fully grasp the strengths and merits of your case.\n\nUnderstanding Client Goals\n\nOur solicitors will take the time to understand your personal objectives. Whether you are seeking to reunite with family, escape adverse conditions, or navigate the UK immigration system, we tailor our approach to meet your unique needs.\n\nEvaluating Legal Strategies\n\nWe will evaluate the best legal strategies to achieve your goals. This involves providing a realistic assessment of the prospect of success and ensuring you understand the potential outcomes. We believe in transparency and will not charge fees for applications that have no realistic chance of success.\n\nAt KJ Conroy, we understand that clients seeking immigration advice can be vulnerable. We are committed to providing the support you need, whether it’s help with interpreting and translating information or referring you to relevant support services.\n\nApplication Assistance\n\nGuidance Through Forms\n\nNavigating the complexities of immigration forms can be daunting. At KJ Conroy, our solicitors provide expert guidance to ensure every section is completed accurately. This reduces the risk of errors that could delay your application.\n\nEnsuring Accuracy and Completeness\n\nOur team meticulously reviews all documents to ensure they are both accurate and complete. This thorough approach helps in avoiding common pitfalls that might lead to rejections.\n\nAvoiding Delays or Rejections\n\nBy leveraging our expertise, we help you avoid unnecessary delays or rejections. We understand the importance of timely submissions and work diligently to meet all deadlines.\n\nAt KJ Conroy, we are committed to providing comprehensive support throughout your immigration journey. Our goal is to make the process as smooth as possible for you.\n\nLegal Representation in Court\n\nPresenting Evidence\n\nWhen your case reaches the courtroom, having a solicitor from KJ Conroy is crucial. They will gather and present evidence to support your case effectively. This includes organising documents, witness statements, and any other relevant materials.\n\nArguing on Behalf of Clients\n\nYour solicitor will stand by your side, arguing on your behalf. They will use their expertise to make strong legal arguments, aiming to achieve the best possible outcome for you. Having a skilled solicitor can make a significant difference in court.\n\nSupporting Legal Arguments\n\nKJ Conroy’s solicitors will support their arguments with solid legal foundations. They will ensure that all points are backed by relevant laws and precedents, giving your case a robust defence. This meticulous approach helps in presenting a compelling case to the judge.\n\nAdvice on Rights and Responsibilities\n\nUnderstanding your rights and responsibilities under UK immigration law is crucial. Solicitors provide clear, accessible advice, helping you navigate the legal system confidently.\n\nUnderstanding your rights and responsibilities is crucial. Whether you’re dealing with personal injury, family law, or employment issues, knowing what you can and cannot do helps you make better decisions. For more detailed advice and to get the support you need, visit our website today.\n\nIn conclusion, legal aid immigration solicitors play a crucial role in helping individuals navigate the complex and often daunting UK immigration system. Their expertise and support can make a significant difference in the outcomes of immigration applications and appeals. By providing essential services such as form completion, legal representation, and advice on rights and responsibilities, these solicitors ensure that those in need have access to justice and fair treatment. Despite the challenges in accessing legal aid, it is important to seek expert legal advice to improve the chances of a successful immigration process. Legal aid solicitors are a vital resource for many, offering hope and guidance in difficult times.\n\nFrequently Asked Questions\n\nWhat do legal aid immigration solicitors do?\n\nLegal aid immigration solicitors help people with immigration issues. They know the laws about entering, staying, and becoming a citizen in the UK. They help fill out forms and represent clients in court.\n\nWho might need an immigration solicitor?\n\nAnyone dealing with the UK immigration system may need help. This includes people wanting to start a new life in the UK, reunite with family, or escape bad conditions in their home country.\n\nWhat is legal aid in immigration?\n\nLegal aid helps people who can’t afford a solicitor. It can be free or cheaper, depending on the case and the person’s financial situation.\n\nHow do I know if I qualify for legal aid?\n\nTo get legal aid, you need to pass a means test and a merits test. The means test checks your financial situation, and the merits test looks at the strength of your case.\n\nWhat happens during an initial consultation with a solicitor?\n\nIn the first meeting, you will talk about your case, what you want to achieve, and the best ways to reach your goals. The solicitor will evaluate your case to decide the next steps.\n\nWhy is legal representation in court important?\n\nHaving a solicitor in court is very helpful. They present evidence, make arguments, and support your case, which can make a big difference.\n\nLeave a Reply\n\nYour email address will not be published. Required fields are marked *<|endoftext|>Supreme court curbs states' power to levy fines and seize property through civil forfeiture\n\nOriginally published at: https://boingboing.net/2019/02/20/supreme-court-curbs-states-p.html\n\nIANAL…google translate doesn’t seem to be functioning here, can someone break this down in a way a layman like myself can understand?\n\nAny lawyerly Mutants care to speculate if this decision could apply to the stealth", "num_tokens": 2048} {"category": "common_crawl-crime_and_law", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-crime_and_law/part-00-00000.npy", "text": " them such as, age difference, size, gender, and disabilities.\n\nDefense of others\n\nIn this case the individual must have understandable reason to believe the person they were defending was in risk of being harmed. This defense has the same requirements and limitations as self defense claims.\n\nDefense of Property\n\nA defendant in an assault and battery case in Myrtle Beach South Carolina can claim that he or she acted only in defense of his or her property.  According to “The Post and Courier” in South Carolina there is a long standing ruled called The Castle Doctrine. This Doctrine basically states that someone’s home is their castle and that no one should have to run away or feel uncomfortable in their own home. However the Doctrine was recently codified by the General Assembly and the new law says that in order for it to be justified the person had to be in reasonable fear of death or bodily injury. When it comes to personal property from an item standpoint there are other rules such as if there is dispute over personal property the owner is not entitled to use force. On the other hand if property is stolen directly from the person such as pick pocketing the person has the right to use reasonable force to recover their stolen property.\n\nConsent is a defense used mostly in prosecutions for sexual assault. When someone gives another consent to an act then the same act can not be charged as assault and battery. However, once the person exceeds the point of the permission  provided, it can still possibly be classified as assault and battery in South Carolina. Courts examine the defense of consent very closely and most find that if harmful violations of public policy occur it should be punished under assault and battery or under another law if fitting, even if consented.\n\nWhat Defenses Can Not be Used?\n\nAssault and battery cases as result to alcohol or drug abuse will not be excused in court. If voluntary intake of drugs or alcohol occurs the defendant cannot blame their actions on the substance. When it comes to the other defenses it’s important to analyze your situation and see which one is your best fit. Our team at David Aylor Law Offices will evaluate your situation to the fullest and get you justice just as we’ve been doing for so many satisfied clients since 2007.<|endoftext|>Court Cases By State - Tennessee\n\nCourt Cases by Tennessee\n\nBlack v. Tennessee\nNo. M2004-01345-CCA-R3-PD, slip op., 2005 WL 2662577 (Tenn. Crim. App. 2005)\n\nBlack was convicted of three counts of first degree murder and the jury sentenced him to death. On appeal, argued that he was ineligible for the death penalty due to mental retardation, under   Atkins v. Virginia, 536 U.S. 304 (2002). Black's experts testified that his mental retardation was largely due to prenatal exposure to alcohol, but may have had other causes, as well, including lead exposure and head trauma from football injuries. The conclusions of the experts were based in part on brain imaging, including MRI and PET scans.\n\nTennessee law defines mental retardation by the presence of three factors: (1) sub-average intellectual functioning, evidenced by and IQ of 70 or below, (2) deficits in adaptive behavior, and (3) manifestation of the mental retardation by the age of 18.\n\nBased on the evidence presented (including the fact that IQ tests administered to Black prior to the age of 18 all resulted in scores above 70; his score declined in later years), the court concluded that Black did not meet the third prong of Tennessee's definition of mental retardation.\n\nAs regards Black's prenatal exposure to alcohol, his sister testified that their mother drank alcohol during pregnancy, but the court noted that she \"did not...testify as to the amount her mother drank while she was pregnant\" (perhaps reflecting a mistaken impression that a certain level of alcohol exposure is required to result in damage or diagnosis). The court further noted that \"it cannot be determined with certainty that the ingestion of alcohol during pregnancy will cause mental retardation.\" (It is not clear whether, if the court were convinced that Black's mental retardation was a result of his prenatal exposure to alcohol, that would have affected its conclusion as to whether his mental retardation manifested before he reached the age of 18.)\n\nThe court's opinion was based strictly on the state's statutory definition of mental retardation, and does not indicate whether FAS was otherwise presented as a mitigating factor during sentencing.\n\nIn re Dalilah Rose\n1996 WL 745838 (Conn. Super.)\n\nThe court ordeed termination of the mother's (and father's) parental rights because they were unable to care for the child. the opinion describes in detail the mother's inability to care for the child. The opinion notes that the mother believes that she herself was born with FAS. 1996 WL 745838 at *2.\n\nDavidson v. State\n2000 WL 674697 (Tenn. Crim. App.)\n\nDavidson was convicted of murder and sentenced to life in prison without the possibility of parole. He contended that his trial counsel had failed to provide effective legal assistance.\n\nDavidson asserted that his attorney should have requested a \"psychological evaluation\" because the attorney knew that Davidson's mother had consumed alcohol regularly during pregnancy. The court held that the lawyer had made a sufficient effort to look into that issue.\n\n\"Counsel testified at the post-conviction hearing that Dr. Wilroy, an expert witness, was hired to investigate the possibility of a defense based upon fetal alcohol syndrome. Dr. Wilroy reviewed medical records, photographs of the petitioner and other information provided by counsel and determined that there was no basis for a defense based upon fetal alcohol syndrome. Additionally, counsel engaged in discussions with psychologists at Midtown Mental Hospital and also with Dr. Ciocca. These consultations confirmed counsel's initial determination that a psychological evaluation would be of no benefit.\"\n\n20000 WL 674697 *2.\n\nThe fact that this attorney at least attempted to inquire whether his client might have FAS sets a higher standard of care for attorneys than is met in many other cases.<|endoftext|>Lipitor Lawsuit\n\nAt the root of many Lipitor lawsuits, plaintiffs claim that the drug contributed to their development of type 2 diabetes. The plaintiffs filing lawsuits against Pfizer also claim that patients and doctors were inadequately warned by the company about the serious potential side effects of the drug.\n\nWhy Are People Filing Lipitor Lawsuits?\n\nLipitor (atorvastatin) is a statin used to lower both high cholesterol and triglycerides in the bloodstream. By lowering high cholesterol in patients, statins have been shown to help reduce a patient's risk of a heart attack and heart disease. Since its approval in 1996, Lipitor has been prescribed to 29 million patients across the United States and made $130 billion in global sales for Pfizer, making it one of the best selling drugs in the pharmaceutical industry.\n\nDespite their widespread popularity and life-saving attributes, Lipitor and other statins have been scrutinized for a few of their more serious side effects. In 2012, the U.S. Food and Drug Administration (FDA) updated the warning labels for several different statins including Lipitor. The new labels listed potential \"non-serious and reversible cognitive side effects\" like memory loss or confusion as well as reports of increased blood sugar levels in patients using statins. While the cognitive side effects introduced in the warning can be reduced by stopping the medication, increased blood sugar levels can potentially lead to type 2 diabetes in patients.\n\nAtorvastatin lawsuits have been filed against Pfizer for failing to adequately warn patients about the increased risk of diabetes associated with the drug.\n\nLipitor and Type 2 Diabetes\n\nIn 2012, after studying data from clinical trials and medical literature, the FDA approved a label change for Lipitor and other statins warning patients and healthcare professionals about the increased risk of increased blood sugar levels attributed to statins. One particular meta-analysis looked at 13 different trials that showed a combined 9% increase in the risk of developing diabetes during statin therapy. Despite the increase, both the study authors and the FDA concluded that the risk was low compared to the cardiovascular benefits gained from statin therapy.\n\nSeveral other studies have since been published looking at the relationship between statins and diabetes. While the studies have varied in their estimation of the risk, some newer studies have also found that in addition to an increased risk of diabetes when taking statins, there is also a correlation between the size of the dose and the level of risk.\n\nLipitor Lawsuit History\n\nFollowing the FDA's warning concerning statins side effects in 2012, Lipitor lawsuits quickly grew in numbers. A multidistrict litigation was soon formed to consolidate the large number of Lipitor claims filed. No Lipitor class action lawsuit has been filed.\n\nFederal Lipitor Lawsuits (MDL 2502)\n\nOn February 19, 2014, the Judicial Panel on Multidistrict Litigation (JPML) created MDL 2502 in the District of South Carolina to cover Lipitor litigation filed against Pfizer. The Lipitor MDL would eventually manage several thousands of cases filed mostly by women who claimed that the use of the prescription drug Lipitor contributed to their development of type 2 diabetes.\n\nThe first two bellwether trials ended in a summary judgment in favor of the defendants. Three of the plaintiff's expert opinions had been excluded during the trials, and neither plaintiff was able to adequately demonstrate causation between lower doses of Lipitor and diabetes. The plaintiffs were also unable to prove that their diabetes diagnoses were caused by their use of Lipitor.\n\nFollowing the two bellwether", "num_tokens": 2048} {"category": "common_crawl-crime_and_law", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-crime_and_law/part-00-00000.npy", "text": " level 0.08. At which there’s a legal edict that says above 0.08, you are impaired. There’s no such level for, for instance THC, which is the active ingredient of cannabis.\n\nDean: Right.\n\nMike: In any number of the prescribed medications, if you’re taking them as prescribed and you’re within your therapeutic range for those medications, you’re not necessarily impaired.\n\nAnd then there’s an element with the prescribed medications where the government has to prove knowledge. That you knew, going into taking the medications, what the side effects were going to be in combination with all the meds and you drove anyway. And that’s very difficult to prove if someone’s following the doctor’s orders and taking the medication. With the illicit drugs, they need to prove impairment, but that’s easier.\n\nDean: Well, marijuana in Massachusetts is not an illicit drug if for medical use.\n\nMike: We’re there now, yes.\n\nDean: Exactly.\n\nMike: So it’s a difficult –\n\nDean: It’s a new avenue or realm.\n\nMike: Yes. You will see – and in my own practice, given the number of DUI defense matters that I handle – I have certainly seen, over the last several years, more and more of the impaired by drugs driving charges. Both prescribed and illicit. There’s – you would not – well, you probably know very well the number of people that are on either mood enhancers, anti-depressants, anti-anxiety. Any number of medications which taken in combination or mixed with alcohol very well could impair a driver, so yes. That is kind of the next wave, I believe, of drunk driving defense and prosecution.\n\nDriving Under the Influence of Marijuana\n\nDean: Right. Exactly. Because in Colorado, the government of Colorado is coming out with TV advertising not to drive under the influence of cannabis.\n\nMike: Which is completely recreationally legal.\n\nDean: That’s correct. And which has opened a new Pandora’s Box in law in Colorado, so that will filter down to the other states if they legalize it in Massachusetts or New Hampshire.\n\nMike: Right. There’s a program in Massachusetts and I’ve seen it in New Hampshire as well called DRE. Drug Recognition Examination or Drug Recognition Expert, and these are officers that are selected to receive specialized training in just that. Detection of those that are impaired by either prescription medications or illicit drugs.\n\nDean: So how will that be — they’ll have to be trained, right?\n\nMike: They are trained. It’s a whole different protocol than the standard. The standard battery of field sobriety tests at road side is; horizontal gaze nystagmus, follow the pen with your eyes –\n\nDean: Right.\n\nMike: – the walk and turn nine steps up, turn, nine steps back, and then a one leg stand, and then typically, well, you take a breath test.\n\nDean: I don’t know my alphabet, I forgot – I haven’t said it since the first grade…\n\nMike: What they’re going to ask you to do — they say start with a letter other than A, and I want you to start at the letter D without singing the alphabet. Start at the letter D and end at the letter N as in Nancy. Go. It’s not easy.\n\nDean: It’s not easy.\n\nMike: But that DRE protocol is essentially – it is a battery of various tests including blood pressure, pupil size, heart rate –\n\nDean: Right.\n\nMike: – plus some other tests where they try to determine what, if any, substance, you are under the influence of. It also involves a number of questions and then you get to Miranda issues, because when the DRE protocol or examination is conducted, it’s typically at a station. You already have been arrested, you’re definitely in custody for purposes of, you have the right to remain silent, you don’t have to answer questions, so they have to get through that to the point where they can conduct the protocol, so they tend to be complicated cases<|endoftext|>An officer with the Tompkinsville (KY) Police Department was assaulted by a male and female couple during a traffic stop on Wednesday night, leaving the officer with minor injuries including a scraped elbow and a black eye, police say. \n\nAccording to ABC News, the officer made the traffic stop due to an extinguished tail light and before he could get out of his patrol vehicle the man and woman had exited their vehicle and began approaching the squad car.\n\nThe officer exited his vehicle and an altercation ensued. The officer was eventually able to gain compliance by drawing his TASER.\n\nThe officer refused treatment for his injuries.<|endoftext|>Girl killed, then mum loses job\n\nLast updated 08:39 28/05/2013\nJenny Doyle\n\nJOBLESS: Jenny Doyle with photos of her murdered daughter KaJenny Doyle's daughter was shot and killed last month.\n\nAfter sitting by her daughter's bedside for five days while she died from her wounds, Doyle took time off from her job - which she lost, a fact she found out when she rang the welfare agency Centrelink with an inquiry.\n\nShe was working as a manager for Australian Commercial Catering at the Thales ammunition factory in the New South Wales town of Mulwala, when her daughter, Kara, was shot on April 17.\n\nKara's then boyfriend, Mehmet Torun, has been charged with murdering her with a sawn-off shotgun after the pair argued at Torun's Avondale Heights home. He allegedly shot her in the stomach, then dumped her at a nearby service station.\n\nAfter Kara's death, Doyle's GP provided her with a certificate saying she was suffering from ''major depression'' and would not be able to return to work until the end of July.\n\nDoyle said the only communication she received from the company before this was a text from her area manager asking whether she had done the banking, and where the canteen keys were.\n\n''I was in the intensive care unit with Kara, and I was really upset because it wasn't a 'how are you, how's everything going','' she said. ''It was literally that: have you done the banking and where are the keys.''\n\nAustralian Commercial Catering then sent her a letter less than three weeks after the shooting saying it was ''unable to keep the position open until 29/07/2013 due to the position type and location of site'' and that she would receive entitlements within two weeks.\n\nHowever, in another letter sent on the same day, the company claimed money totalling A$1150 had been missing from the Thales canteen since the day Kara was shot, and demanded an explanation.\n\nDoyle told Fairfax Media she did take a A$300 float home with her when she hurried from Mulwala to be with her daughter, and has subsequently returned it.\n\nShe said she had had no contact with the police, and the rest of the money had been left in an office at work. ''I would never have gone this far except for the fact I never even got a phone call from them, saying 'we're sorry for your loss'.''\n\nThe managing director of Australian Commercial Catering, Peter Darmos, denied Doyle's position had been terminated, saying that if the money was returned, she could have her job back.\n\n''She's not terminated, she has never been terminated. Pending the proper investigation, she's free to return to work if she's done nothing wrong. You want to make mileage out of this, go right ahead,'' he said.\n\nAd Feedback\n\n- The Age\n\nSpecial offers\n\nFeatured Promotions\n\nSponsored Content<|endoftext|>ew policy brief examines how immigration affects Ohio and the U.S. workforce\n\n https://aede.osu.edu/news/new-policy-brief-examines-how-immigration-affects-ohio-and-us-workforce\n\n management. The brief also dispels myths around how immigrants affect wages and crime rates.   “ExistingNatural Ventilation\n\n https://greenhome.osu.edu/natural-ventilation\n\n typologies and controls different types of windows will result in different ventilation rates. External ...\n\n 10. Equestrian Injury Statistics\n\n https://ohioline.osu.edu/factsheet/19\n\n football, basketball, and baseball, the injury rate for horse riding is relatively low. However, several ... injury rates. A study conducted in Oregon, Washington, and Idaho found that novice riders are the most ... Bushau-Sprinkle, Brier, & Seger, 2018). Additionally, recreational riders had higher rates of injury than ...<|endoftext|>Shooting victim had other confrontations with Windsor police | GreeleyTribune.com\n\nShooting victim had other confrontations with Windsor police\n\nSherrie Peif\n\nAccording to a report released by the Weld County District Attorney’s Office concerning the shooting of Ed Cavaliere by Windsor Police Chief John Michaels, Cavaliere had a recent history of confrontation with the Windsor Police Department.\n\nOn Sept. 6, Windsor police officers responded to a call from King Soopers, 1520 Main St., concerning a confused and disoriented man. When officers arrived, they found Cavaliere and concluded a mental health evaluation was appropriate. Cavaliere attempted to walk away from officers, the report said, and officers subdued him through the use of physical force.\n\nOn Sept. 26, North Colorado Medical Center called Windsor police to report that during another psychological evaluation, Cavaliere made death threats against Windsor police officers involved in the Sept. 6 incident. The report said Cavaliere planned to “get a copy of the report … kill the officer involved and kill any other Windsor police officers who he might come in contact with.”\n\nThe apartment manager where Cavaliere lived reported that Cavaliere had two .45 caliber handguns in his apartment.\n\nOn the day of the shooting, Safeway called in", "num_tokens": 2048} {"category": "common_crawl-crime_and_law", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-crime_and_law/part-00-00000.npy", "text": " County Prison on a parole detainer.\n\nLee was employed by the Papenfuse campaign in February and March to collect names for the petition, according to arrest records filed by detectives with the district attorney's office.\n\nA man and woman later called the Dauphin County board of elections and asked for a copy of the petition after they received a letter from Papenfuse thanking them for their support and signatures, records state.\n\nThe woman told investigators she was \"surprised to see her name and her husband's signature on the document because they were both in Florida at the time,\" records state.\n\nFirst Assistant District Attorney Fran Chardo said Papenfuse and his campaign were unaware of Lee's actions.\n\nInvestigators also determined that a third name, a man who works for the city, was forged on the petition, records state.\n\nLee was later interviewed by investigators and confessed to forging the three names on the petition, records state.\n\nA preliminary hearing for Lee has been scheduled for May 15.\n\nIf you purchase a product or register for an account through one of the links on our site, we may receive compensation.<|endoftext|>The Opinions of General Partin and Other Bomb Experts\n\nPrinter-friendly versionPrinter-friendly version\"My knowledge comes from practical handling of explosives,\" added Gronning. \"And my belief is that 4800 lb. of ANFO wouldn't have scuffed the paint on the building.\"\n\nThe Opinions of General Partin and Other Bomb Experts\n\nBrigadier General Benton K. Partin, U. S. Air Force, retired, has 25 years experience in explosives and ballistic weapons design and testing. General Partin also served as the Commander of the Air Force Armament Technology Laboratory.\n\nPartin has this to say:\n\n\"When I first saw the picture of the truck bomb's asymmetrical damage to the Federal building in Oklahoma, my immediate reaction was that the pattern of damage would have been technically impossible without supplementary demolition charges at some of the reinforced concrete bases inside the building, a standard demolition technique.\n\n\"For a simplistic blast truck bomb, of the size and composition reported, to be able to reach out on the order of 60 feet and collapse a reinforced column base the size of column A7 is beyond credulity.\"\n\nGeneral Partin further explained that; \"The total incompatibility with a single truck bomb lies in the fact that either some columns collapsed that should not have collapsed or some of the columns are still standing that should of collapsed and did not.\"\n\n\"Reinforced concrete targets in large buildings are hard targets to blast. I know of no way possible to reproduce the apparent building damage through simply a truck bomb effort.\"\n\n\"It is easy to determine whether a column was failed by contact demolition charges or by blast loading (such as a truck bomb),\" Partin wrote in his letter to Congress. \"It is also easy to cover up crucial evidence as was apparently done in Waco. I understand that the building is to be demolished by May 23rd or 24th. Why the rush to destroy the evidence?\"\n\nHe concludes; \"This is a massive cover-up of immense proportions.\"\n\nThe statement below is made by an Israeli terrorist expert who used his experience with bombings in the Middle East. In making his deductions he used film footage of the bombing just hours afterwards:\n\n\"It is clear that they used certain methods which were used in the Middle East. I mean using a car bomb, putting it in front of the building, and maybe planting inside the building itself . My feeling is that it was not just an explosion outside, which is clear it was outside as well, but also inside the building. So it is more than one man. It's a network.\"\n\nSam Gronning, a professional blaster for more than thirty years, says:\n\n\"I have been a blaster for over thirty years and there is no doubt in my mind that ANFO could not have been by itself the medium for that powerful an explosion.... even enhanced at that distance, I doubt that an external explosion could of created that extensive damage at the reported weight of the bomb.\"\n\n\"My knowledge comes from practical handling of explosives,\" added Gronning. \"And my belief is that 4800 lb. of ANFO wouldn't have scuffed the paint on the building.\"\n\n\"No truck bomb of ANFO out in the open is going to cause that kind of damage we had there... In thirty years of blasting, using everything from 100 percent nitrogel to ANFO, I've not seen anything to support that story... I have set off 16000 pounds of ANFO and was standing upright just\n1,000 feet away from the blast.\"\n\nGronning went on to say that even a bomb that big wouldn't have caused the damage seen at the Murrah building.\n\nDr. Roger Raubach, who has a Ph. D. in physical chemistry and is now the technical director of a chemical company has this to say;\n\n\"I don't care if they pulled up a semi-trailer with twenty tons of ammonium nitrate; it wouldn't do the damage we saw there.\"\n\nDavid Hoffman, author of \"The Oklahoma City Bombing and the Politics of Terror\" (Published by Feral House) wrote the following (taken from a chapter in that book):\n\nYet Rick Sherrow, who wrote an article for Soldier of Fortune magazine entitled \"Bomb Blasts & Baloney,\" contends that the General's assessment of the bombing is somehow inaccurate. Sherrow claims that the pressure wave that would have struck the building from the [rapidly deteriorating] blast of the ANFO bomb (375 p. s. i. according to Partin's figures) would be more than enough to destroy reinforced concrete columns, which Sherrow claimed in his article disintegrate at 30 p. s. i. (pounds per square inch).\n\nSam Gronning doesn't concur. \"That's bullshit!!\" exclaimed Gronning. \"Thirty p. s. i. wouldn't take out a rubber tire!\"\n\nCitizens monitoring police radios heard the following conversation on the morning of the 19th: First voice: \"Boy, you're not gonna' believe this!\" Second voice: \"Believe what?\" First voice: \"I can't believe it; this is a military bomb!\"\n\nWhen J. D. Cash, a journalist writing for the McCurtain County Gazette,, tried to interview members of the Bomb Squad, Fire Department and Police, he was generally told by potential interviewees, \"I saw a lot that day, I wish I hadn't. I have a wife, a job, a family, I've been threatened, we've been told not to talk about the devices.\"\n\nThe most amount of force produced by even a perfectly made ANFO bomb weighing 4800 pounds, is 1,457 p. s. i. by the time it hit the glass of the Federal building. It's a law of physics that the destructive capabilities of a bomb fall off dramatically only a few feet from the blast.\n\nBy the time the blast front made contact with the column nearest to the bomb, the pressure would have decreased to 375 p. s. i., far below the 5,600 p. s. i. compressive yield strength of concrete. Even using General Partin's very conservative figure of 3,500 p. s. i. for the compressive yield strength of concrete, you would still require nine times the potential damage pressure from the bomb at that distance. Furthermore, the government would have us believe that the same bomb was able to blast through an additional seven major concrete columns. If we are to believe the absolute absurdity of the governments \"science\", then we should also endorse the practices of voodoo and witchcraft, for they both have the same amount of credibility.\n\nSimply stated, it is a physical, chemical and thermodynamic impossibility for a 4800 pound ANFO bomb, at a distance of approximately 20 feet away, to of inflicted the kind of damage the government said it did.\n\nAs reported widely on CNN & news stations across the nation on the day of the bombing, up to four primed bombs were found inside the building by bomb detecting dogs. The BATF (Bureau of Alcohol Tobacco and Firearms) later said they were dummy bombs, but why would bomb sniffing dogs find, or be needed to locate dummy bombs which are clearly marked as such; furthermore, why would munitions technicians spend so much time diffusing \"dummy\" bombs? KFOR-TV said that another bomb had been located strapped to a column next to the day-care center.\n\nAround the noon hour, Channel 4 had as their guest Dr. Randall Heather, a terrorist expert. Dr. Heather stated: \"We got lucky today, if you can consider anything about this tragedy lucky. We have both of the bombs that were defused at the site and they are being taken apart. We will be able to find out how they were made, and possibly who made them. These bombs are very sophisticated high explosives with maybe a little fertilizer damped around them.\"\n\n\n\nIn the Oklahoma bombing case it seems the government is attempting to perform a similar feat of light and magic. The fact is that a non-directional, low velocity 4800 pound ANFO bomb, parked 20-30 feet from a modern steel-reinforced super-structure could never have caused the pattern or degree of damage that they say it did.\n\nPost new comment\n\nThe content of this field is kept private and will not be shown publicly. If you have a Gravatar account associated with the e-mail address you provide, it will be used to display your avatar.\nThis question is for testing whether you are a human visitor and to prevent automated spam submissions.\n1 + 2 =\nSolve this simple math problem and enter the result. E.g. for 1+3, enter 4.\nSyndicate content<|endoftext|>El primer libro que analiza en profundidad el fenómeno de la mafia", "num_tokens": 2048} {"category": "common_crawl-crime_and_law", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-crime_and_law/part-00-00000.npy", "text": " big-boat sailing. The emphasis shifted from the lone man to the machine, from heroism to technology: How fast could a giant \"maxi\" yacht, driven day and night by a crack crew, cross an ocean or sail around the world? In 1973 this quest found its expression in the Whitbread Round the World Race, a six-stage, go-for-broke circumnavigation—the ultimate spectacle in terms of noise, visibility, and sex appeal, an eight-month circus of logo-plastered boats, crews, shore teams, money, and media that moved around the world taking over whole harbors and, in New Zealand's case, a whole country. It was the race that Blake made his own.\n\nHis first two outings, in 1973-74 and 1977-78, were as watch leader and mate on Robin Knox-Johnston's boats, but Blake proved to be his own best skipper. For his third Whitbread, in 1981-82, he organized an effort sponsored, designed, and crewed by New Zealanders. Ceramco New Zealand galvanized the island nation; millions of listeners tuned in to hear Blake's regular radio interviews from sea. But his boat lost its mast in the first leg of the race. In 1985-86, Blake's Lion New Zealand was also a disappointing performer, but finally, in the 1989-90 race, he got it right. Backed by New Zealand's premier brewer, his Steinlager 2 won all six legs and overall victory.\n\nAlongside what became a full-time career as a yachtsman, Blake made ample room for a family. In 1979 he married Pippa Glanville; they spent their honeymoon delivering a yacht from England to Australia for the Sydney-Hobart Race. They eventually settled near her parents' home in Emsworth, England—close to Southampton, the hub of the Whitbread world—and raised two children, James and Sarah Jane.\n\nIn 1994 Blake teamed up again with Knox-Johnston to go after the Jules Verne Trophy, established by the French in 1992. They screamed around the world in a 92-foot catamaran, the ENZA , racing a French trimaran in an attempt to better the 80 days taken by Verne's fictional adventurer Phineas Fogg. ENZA won in just under 75 days, recording the highest speeds ever traveled by a sailing ship until that time. It was pure boat, pure seamanship, and a matchless voyage Blake reveled in.\n\nIn 1995 Blake's Team New Zealand won the America's Cup, the world's most prestigious (if perhaps dullest) sailing race. The bright red socks Blake wore during the qualifying rounds became a personal trademark and a badge of Kiwi solidarity; when TNZ ran low of cash, a \"Red Socks Fund\" drive prompted New Zealanders to buy 100,000 pairs in three weeks to boost the team's finances. After his decisive win in San Diego, Blake was knighted in England by Queen Elizabeth. In 2000 Team New Zealand, with Blake in command again, took the America's Cup a second time.\n\nHis success was the result not of an outsize personality—although at six-foot-four, Blake was a commanding figure—but rather of his unswerving drive and, most of all, his leadership. \"He was a natural leader,\" says Knox-Johnston.\n\nBlake made a career out of sailing into danger with gusto, but never without the most meticulous preparation. And he had a gift for bringing the right crew. \"His great skill was picking, integrating, and managing the right mix of people for any job—the Shackleton method,\" says Angus Buchanan, who sailed around the world with Blake on ENZA . \"The old cliché is not to meet your heroes, but Peter was the embodiment of everything I'd imagined a hero would be.\"\n\nIt is also a cliché that heroes die young. And after Macapá, New Zealanders hotly debated whether Blake's heroics might have cost him his life. When the pirates climbed aboard Seamaster with their guns, several crew members attempted to resist; one was pistol-whipped in the face and fell to the deck. Blake rushed below and emerged with a rifle. There was an exchange of gunfire. The Brazilians claimed that they had not set out to kill, but had fired only when attacked.\n\nThe picture of Blake, the larger-than-life captain charging the intruders with a rifle, was a compelling image, but it raised a disturbing question: What would have happened if Seamaster's crew had just handed over their watches and cameras? Could the whole episode have been merely one more theft in a rough port? Would Peter Blake, New Zealanders asked, still be alive?\n\nMOST MODERN PIRACY is practiced against commercial vessels plying regular routes in the Far East, especially the waters of the South China Sea, around the Philippines and Indonesia and the Strait of Malacca, where police and military patrols are few. The International Maritime Bureau, which formed the Piracy Reporting Center in Kuala Lumpur in 1992, reported 335 incidents in the region last year, but these received no more attention in the press than truck hijackings on far-flung back roads. Elsewhere in the world, piracy is defined as sporadic, unplanned attacks on yachts. It resembles petty street crime, except that the distance from shore gives it a special, ugly menace. Between April 1999 and February 2001 there were at least 13 attacks by pirates on yachts in the Red Sea and the Gulf of Aden, resulting in the hijacking and theft of one yacht and the murder of a British crewman on another. In March 1999 in the Caribbean, off the Mosquito Coast of Honduras, a Dutch family was attacked, their son shot in the abdomen—the third such incident off the Honduran shoreline in five years. There were about 14 other attacks in Caribbean and Latin American waters between March 2000 and March 2001. Worldwide, 56 attacks occurred on yachts in 2001, according to Klaus Hympendahl, a German maritime historian writing a book on modern-day piracy. The \"pirates\" are usually local men, in local fishing boats; their weapons range from machetes to Kalashnikov rifles.\n\nAnyone with a rowboat can paddle out to an anchored yacht. The boat will generally be out of earshot of help, and the crew will be lightly armed if at all. Moreover, the blitheness, the unconscious ease, the sense of entitlement with which American, European, and Australian sailors will moor a quarter-million-dollar boat off a village in Asia, South America, or Africa and step cheerfully ashore to look for a beer only make it that much more remarkable that piracy is not a thousand times worse.\n\"Piracy has been a tradition in places like Indonesia, the South China Sea, and the Red Sea for thousands of years,\" Hympendahl told me, \"but not in Latin and Central America.\" As long as sailors remain rich and locals poor, he says, \"The situation is going to get worse.\"\n\nVoyaging aboard a yacht, you step off the grid of normal travel, with its reassurances and safeguards. The very nature of such travel is to seek out remote, unspoiled places. You don't know what you'll sail into, but everything will depend on you alone, and what you carry with you.\n\nI lived aboard my own small wooden boat in the late 1970s and early 1980s, sailing it between Europe, the United States, and the Caribbean. In those years there were numerous attacks against yachts, and fearing pirates and drug smugglers, sailors headed in droves to U.S. gun stores. Stainless-steel weapons were favored for their resistance to the corrosive saltwater environment. Ruger made a stainless-steel semiautomatic rifle, the Mini-14, which acquired considerable vogue in yachting circles. It fired a bullet with \"armor-piercing\" capability at great velocity and accuracy over a long range, and was thought an ideal weapon for stopping a boat making for you at a distance; whether that boat was full of pirates or fishermen hoping to sell you crayfish was another matter. In Fort Lauderdale in 1980, after my wife and I watched one night through our portholes as bales of cocaine were unloaded from a boat at the marina where we'd docked, I went into a store and came out with a stainless-steel pump shotgun, a stainless .38 revolver, and armfuls of ammunition.\n\nThe pros and cons of carrying firearms on a sailboat can become a more heated topic of discussion among sailors than keel shape or anchor design. Armed, you might protect your property. You might save your own life and those of your loved ones; you might be able to prevent your wife's being raped before your eyes, as a Swiss woman was in a pirate attack off Venezuela in 2000. A warning shot might dissuade pirates from approaching your vessel at all.\n\nThose who oppose carrying weapons point out that a pistol, a shotgun, even an AK-47 is no match for the sort of large-caliber automatic weaponry favored by pirates. Traveling with guns invites major hassles with officialdom when clearing into port; declaring a weapon often means that port officials will confiscate it for the duration of the boat's stay. To not declare a weapon and then have it discovered invites even more trouble, ranging from heavy fines to the seizure of your boat. And having a gun aboard can", "num_tokens": 2048} {"category": "common_crawl-crime_and_law", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-crime_and_law/part-00-00000.npy", "text": " tell me—I did not see him with it for some time, I cannot think when—nothing had been done to the lock of the door before it was sawn off;\n\nI had not had a locksmith to do anything to it—it was used to lock the room up—the police came with a man and cut off the piece.\n\nBy MR. MCINTYRE. Before it was cut off I had been shown the lock, which was partly burst off.\n\nBy the COURT. The lock was good on this Tuesday—nothing happened to it till a man belonging to the police broke open the door—I was out at the time; when I came back I saw the door open—I saw the lock; it was then broken, hanging down—that was a fortnight after the woman's death—I saw the man who did it, it was a detective, it was Bitten—I said \"What have you done this for?\" and he said he would send a carpenter to put it on again—the carpenter did not come—a week after the detective came with two men to saw off the lock altogether—daring the fortnight before Bitten came the lock was as it used to be; the woman used to lock it.\n\nGEORGE BITTEN (Re-examined). When I went into the room for this purpose I merely opened the door, just turned the handle—I never found the door locked so that I could not get in; I did not force it in any way or damage the lock—Mr. Angel had left the room then; somebody was occupying it; I do not know the name, they were foreigners—I went there on 13 or 14 occasions—I never forced the lock—the lock produced is exactly in the same condition as it was on the night of the occurrence—there might be some little difficulty to explain about the locking of this particular lock (Taking up the lock)—this is the inside of the door, and this is the hole that has been spoken of—the landlord is here who put it on, and he can explain it—on the day of the occurrence these screws had been forced out so as to get the door open—this is an actual piece of the door and doorpost.\n\nCross-examined. Sometimes when I went there there were no persons in the room; sometimes Mrs. Lipski would come up with me; the occupier of the room opened the door to me on one or two occasions, but it takes a time to make it plain—a week before she went there, when the room was unoccupied I used to open the door in the usual way—if you locked the door it would not answer, only just to keep the wind off; if you just touched the door it came open.\n\nDINAH ANGEL . My son lived with his wife at 16, Batty Street—I saw her on the Monday evening before this happened—she used to come to me to breakfast; her time would be sometimes half-past 8, sometimes 9 o'clock—on this Tuesday she did not come to breakfast, and about 11 o'clock I went round to her house—there was no one at the door when I got there, I saw no one—I afterwards saw Mrs. Rubenstein—I then went up to my son's room—I had seen Mrs. Levy but not Mrs. Lipski before that—I went to the door of my son's room and tried it, and it was closed—I saw Mrs. Levy try the handle, and she said \"The key is inside,\" and then she went up the stairs and looked through this place in the partition—I knocked at the door, but could get no answer—Mrs. Levy was there when the door was forced open; we got it open by forcing it with the hand; Mrs. Lipski was not there then—I and Mrs. Levy both went into the room together, ran to the bed, and I thought my daughter-in-law was fainting; she laid with her hands so, and her head aside, and Mrs. Levy put her hands aside and moved her head, thinking she was fainting—she then saw she was dead, and went out and created an alarm—she was lying on the bed with her head aside\n\nand her hands behind, and the whole of her was uncovered, and her night-dress or chemise was up—I did not see where the covering to the bed was; I rushed out of the room at once—I did not look at the furniture in the room, but the window-blind was pulled down and the window was closed—I did not see the doctor come; I was in a fainting condition, and they took me out, and they would not let me in again.\n\nCross-examined. I did not try to see if the window had any fastening.\n\nLEAH LEVY . I am the wife of Abraham Levy, but I am living apart from him and have been lodging at 16, Batty Street—on the morning of 28th June I came down about a quarter to nine, and shortly after I looked out into the street and saw Mrs. Lipski in the street coming to the house with a coffee pot in her hand—I called up to the prisoner, telling him that his coffee was ready, and the boy answered from upstairs—I went out with Mrs. Lipski at 10 o'clock that morning and returned at 11—Mrs. Angel, senior, was coming in at the time—she went upstairs and knocked at the door of her daughter's bedroom—I then went up and looked into the bedroom through the little window and saw young Mrs. Angel lying on the bed—she looked very bad—Mrs. Lipski also came up and looked into the window—I said \"She looks bad\"—the mother-in-law then said \"Perhaps she is fainting\"—the three of us then came down from the landing to the bedroom door and the mistress said would she open the door—then the whole three of us pushed the door open—before that was done I looked through the keyhole and saw the key inside in the lock—when we pushed open the door we went into the room and saw the woman as she lay in bed.\n\nCross-examined. I lent Mrs. Angel 5s. the day before this to pay her rent—about a fortnight afterwards I recollect police-sergeant Bitten coming to the house—he was alone then—he wanted to go upstairs—I said it was locked—he said \"I must go in very particularly\"—I said \"It is locked\"—he said he would open it—he then pushed in the door and went in—at that time Mrs. Jacobs was the tenant of the room—she was not at home at the time.\n\nRACHEL RUBENSTEIN . I live at J 6, Batty Street—I occupy the back room first floor with Mrs. Levy—I slept there with her on that Monday night—on the Tuesday morning I went downstairs either at half-past nine or 10—Mrs. Lipski and Mrs. Levy afterwards went out shopping—I saw that the prisoner's coffee had been prepared for him and heard him called—while they were out I was downstairs in charge of the premises, and also took care of the children—I was in the back room—I was at the street door at one time—I took a chair out from the room and sat myself there, because I cannot see well—during the time they were out no one entered the house direct—I first went into the yard—I was minding the children in the yard and came back and took a chair there, so that the children should not go to the water—somebody came while I was sitting there and wanted to go upstairs—I said \"Where are you going?\"—he said he was going upstairs—I said \"Why?\" and I would not let him go there—I don't know that man—he wanted to go up to Angel's room and I would not let him—he asked if the boots were done.\n\nCross-examined. One of the children ran away to the back and went into the yard—I had some trouble in catching the child, I was afraid he had run away—I was in the back yard some time trying to catch it, only a few minutes—I did not take particular notice of the time—I don't know how\n\nlong it was—when I came from the back yard to the front I sat out in the street on the pavement on a chair; that is a little to the left hand of the door—I put the chair there for myself.\n\nSAMUEL SPIERS . I am also called Lamed the teacher—I live at 24, Brunswick Street, St. George's-in-the-East—I am a Hebrew teacher—the deceased woman, Mrs. Angel came to my house on Sunday, the ", "num_tokens": 2048} {"category": "common_crawl-crime_and_law", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-crime_and_law/part-00-00000.npy", "text": " He would send spies and informants. Perhaps, he - Allah bless and keep him -\n\neven went himself as in the major Badr attack. AI-Khulafa Arrashidun [Mohammed's successors] also ordered it [spying]. Since Islam is superior to all human conditions and earthly religions, it permits spying for itself but not for others.\n\nMajestic Allah says, \"Not equal are the companions of the fire and the companions of the garden,\" and the prophet says, \"Islam is supreme and there is nothing above it.\" Islam, therefore, fights so the word of Allah can become supreme. Others fight for worldly gains and lowly and inferior goals.\n\nAn Important Question:\n\nHow can a Muslim spy live among enemies if he maintains his Islamic characteristics? How can he perform his duties to Allah and not want to appear Muslim?\n\nConcerning the issue of clothing and appearance (appearance of true religion), Ibn Taimia - may Allah have mercy on him - said, \"If a Muslim is in a combat or godless area, he is not obligated to have a different appearance from [those around him]. The [Muslim] man may prefer or even be obligated to look like them, provided his action brings a religious benefit of preaching to them, learning their secrets and informing Muslims, preventing their harm, or some other beneficial goal.\"\n\nResembling the polytheist in religious appearance is a kind of \"necessity permits the forbidden\" even though they [forbidden acts] are basically prohibited. As for the visible duties, like fasting and praying, he can fast by using any justification not to eat with them [polytheist]. As for prayer, the book (Al- Manhaj Al-Haraki Lissira Al-Nabawiya) quotes Al-Bakhari that \"he [the Moslem] may combine the noon and afternoon [prayers], sunset and evening [prayers]. That is based on the fact that the prophet - Allah bless and keep him - combined [prayers] in Madina without fear or hesitation.\"\n\nThough scholars have disagreed about the interpretation of that tradition, it is possible - though Allah knows best - that the Moslem spy combines [prayers]. It is noted, however, that it is forbidden to do the unlawful, such as drinking wine or fornicating. There is nothing that permits those6.\n\n[6] Al-Morabitoun Magazine, Issue No. 6\nGuidelines for Beating and Killing Hostages: Religious scholars have permitted beating. They use a tradition explained in Imam Mosallem's manuscript, who quotes Thabit Ibn Ans that Allah's prophet - Allah bless and keep him - sought counsel when he was informed about Abou Soufian's arrival. Abou Bakr and Omar spoke, yet he [the prophet] did not listen. Saad Ibn Ibada said, \"Do you want us, O Allah's prophet, who controls my life?\n\nIf you order us to subdue the camel we would do it, or beat and follow them to Al-Ghimad lakes (5-day trip beyond Mecca), we would do it, too.\" The prophet - Allah bless and keep him - called on the people, who then descended on Badr. They were met by Kureish camels carrying water. Among their takers was a young black [slave] man belonging to the Al-Hajjaj clan. They took him [as hostage]. The companions of the prophet - Allah bless and keep him - started asking him about Abou Sofian and his companions. He first said, \"I know nothing about Abou Soufian but I know about Abou Jahl, Atba, Sheiba, and Omaya Ibn Khalaf.\" But when they beat him he said, “O yes, I will tell you. This is the news of Abou Soufian...” Meanwhile, the prophet - Allah bless and\n\nkeep him -, who was praying, started to depart saying, \"Strike him if he tells you the truth and release him if he lies.\" Then he said, \"That is the death of someone [the hostage].\" He said that in the presence of his companions and while moving his hand on the ground.\n\nIn this tradition, we find permission to interrogate the hostage for the purpose of obtaining information. It is permitted to strike the nonbeliever who has no covenant until he reveals the news, information, and secrets of his people.\n\nThe religious scholars have also permitted the killing of a hostage if he insists on withholding information from Moslems. They permitted his killing so that he would not inform his people of what he learned about the Muslim condition, number, and secrets.\n\nIn the Honein attack, after one of the spies learned about the Muslims kindness and weakness then fled, the prophet - Allah bless and keep him - permitted [shedding] his blood and said, \"Find and kill him.\" Salma Ibn Al-Akwaa followed, caught, and killed him.\n\nThe scholars have also permitted the exchange of hostages for money, services, and expertise, as well as secrets of the enemy’s army, plans, and numbers. After the Badr attack, the prophet - Allah bless and keep him - showed favor to some hostages, like the poet Abou Izza, by exchanging most of them for money. The rest were released for providing services and expertise to the Muslims7.\n\n[7] Abdullah Ali Al-Salama: Military Espionage in Islam, pp. 253-258.\nImportance of Information:\n\n1. Based on the enemy's up-to-date information, his capabilities, and plans, the Organization's command can design good-quality and secure plans.\n\n2. Information about the enemy's intention provides early warning signs for the command, which in turn makes appropriate preparation and thwarts the enemy's opportunity.\n\n3. Information benefits the Organization's command by providing information about the enemy's strengths and weaknesses.\n\n4. Information benefits the Organization's command by providing information about movements of the enemy and his members.\n\nInformation requirements include: Newness, Trustworthiness, Forthcoming, security, and confirmation.\n\nGeneral Mahmoud Sheet Khattab said, \"The nation that wants to achieve victory over its enemy must know that enemy very well. It also must know the site of the battle in detail. Those who fight an enemy that they do not know, do not win because a successful military plan must be built on clear and trustworthy information. The commander who fights an enemy and does not know his strength (number and materiel) is blind and destined to fail and fall.\"\n\nInformation Sources: Any organization that desires to raise the flag of Islam high and proud, must gather as much information as possible about the enemy. Information has two sources:\n\n1. Public Source: Using this public source openly and without resorting to illegal means, it is possible to gather at least 80% of information about the enemy. The percentage\n\nvaries depending on the government's policy on freedom of the press and publication. It is possible to gather information through newspapers, magazines, books, periodicals, official publications, and enemy broadcasts.\n\nAttention should also be given to the opinion, comments, and jokes of common people.\n\nTruman, a past American President, said, \"We attribute our great advance to our press, because it gives America's enemies the capability of learning what we have not officially publicized about our plans and even our establishments.”\n\nIn 1954, Allan Dulles [PH],Director of American Intelligence [CIA], said, \"I am ready to pay any amount of money to obtain information about the Soviet Union, even as little as what the Soviet Union obtains by simply reading American newspapers.\"\n\nThe one gathering public information should be a regular person (trained college graduate) who examines primary sources of information published by the enemy (newspapers, magazines, radio, TV, etc.). He should search for information directly related to the topic in question.\n\nThe one gathering information with this public method is not exposed to any danger whatsoever. Any brother can gather information from those aforementioned sources. We cannot label that brother a \"Moslem Spy\" because he does not make any effort to obtain unpublished and covert information.\n\n2. Secret Sources: It is possible, through these secret and dangerous methods, to obtain the 20% of information that is considered secret. The most important of these sources are:\n\nA. Individuals who are recruited as either volunteers or because of other motives\n\nB. Recording and monitoring\n\nC. Photography\n\nD. Interrogation\n\nE. Documents: By burglary or recruitment of personnel\n\nF. Drugging\n\nG. Surveillance, spying, and observation\n\nInformation Gathering Using Public Means:\n\nA. Newspapers, Magazines,and Official and Party Publications:\n\nIn order to gather enemy information, the Military Organization can use means such as magazines, publications, periodicals, and official printed matter. Through these means, it is possible to learn about major government events and about the news, meetings, and travel of Presidents, ministers, and commanders. Information may be:\n\n1. Names and photographs of important government personalities, police commanders, and security leaders.\n2. Published meetings. Through these, one can learn about major decisions and topics being discussed.\n\n3. Future meeting plans.\n\n4. Present and future enemy capabilities through current photographs of projects and strategic sites or through\n\nmeetings with top officials.\n5. Beneficial news about the enemy's diplomacy and its present and future plans.\n\n6. Tourism news and the arrival times of foreign tourist groups.\n\n7. Advertisements about apartments for rent, vacant positions, or anything else that is useful.\n\n8. Advertisements about new and used car lots. These may be used in assassination, kidnaping, and overthrowing the government.\n\n9. Learning the enemy position on current Islamic issues (veil,beard, dedication, Jihad, ...).\n\nB. Radio and Television: The Military organization can use these important public sources to gather information all day and night. The importance of these means is explained below.\n\n1. Visual", "num_tokens": 2048} {"category": "common_crawl-crime_and_law", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-crime_and_law/part-00-00000.npy", "text": " National Highway Traffic Safety Administration, passenger vehicles accounted for 94 percent of vehicle drowning fatalities in the US between 2004 and 2007. States with the largest number of motor vehicle drowning fatalities are Florida, California, Texas, Louisiana, and North Carolina.\n\nIt is not even necessary to drive into a source of water for this type of death to occur. Sometimes, the water comes to you. The current strength of floods is often underestimated and can sweep away cars.\n\nA county court judge was on his way home from work when a flood swept his car off the roadside. He managed to telephone his wife for help but was soon overwhelmed by the rising water. His body was found by police in the submerged car.\n\nUnfortunately, flood-related deaths are far from rare. In summer 2017, more than 1,000 people were killed by floods in South Asia alone. Heavy rain, landslides, and floods cause loss of life and property every year.\n\nAn expert advises remembering three rules to escape a submerged vehicle: seat belts, windows, out (children first from oldest to youngest).\n\nUnbuckle your seat belt as soon as you hit the water. Open a window in any way you can. Break it, if necessary. Avoid breaking the windshield as the front of the car generally sinks first. Getting back into a sinking vehicle to rescue somebody is difficult, so assist any other passengers before you get out.[3]\n\n7 Quicksand\n\nDespite being extremely rare, deaths from quicksand still happen today. Anyone could mistake the seemingly solid water and sand mixture for safe footing. Quicksand turns more liquid once disturbed by a heavy object and tends to solidify afterward, encompassing the object in wet sand.\n\nAccording to basic physics, however, fully sinking into quicksand is just a myth. Only by struggling, which can lead to submersion, would a human sink deeper than halfway.[4]\n\nIn July 2015, a 50-year-old man went missing in Texas. His car was found parked near a river, where he often went swimming. A helicopter search turned up nothing.\n\nFour days after the man was reported missing, his body was found stuck from his feet to the bottom of his buttocks in quicksand along the riverbank. “He had expired and fallen face-first over the sandy outcropping,” said the report. For Texas, this had been the only quicksand-related incident in five years.\n\nLoosening the mix of water and sand requires a lot of force. Spreading out limbs can help the body float to the surface. But when you’re stuck completely, it is advised to “take solace” in knowing that you cannot fully submerge and call for help. (The video above gives some tips on how to get out of quicksand.)\n\n6 Cave\n\nIf squeezing into a cave is possible, then getting out of it should be possible as well. That is not always true, though, as proven by an amateur cave explorer in the fairly popular Nutty Putty Cave south of Salt Lake City, Utah. He died about 28 hours after getting stuck headfirst in a vertical shaft roughly 25 centimeters (10 in) high and 46 centimeters (18 in) wide.\n\nThe 26-year-old medical student attempted to explore an unmapped passage of the Nutty Putty Cave. Workers tried their best to free him from the chute 30 meters (100 ft) below the surface but did not succeed.[5]\n\nOfficials stated that his body would not be removed. Sending somebody to recover the body would be too dangerous and could result in more people getting injured. An agreement was made to permanently seal the passage with the body inside.\n\nA movie about the incident, titled The Last Descent, was released seven years later.\n\n5 Elevator\n\nIt becomes clear why so many people are terrified of tight, enclosed spaces when stories emerge about being stuck for a prolonged period of time. Most deaths related to inescapable circumstances tend to happen within the first 24 hours. But in a few cases, people are not faced with an immediate threat such as drowning or asphyxiation.\n\nFor example, a woman in China was found trapped in an elevator after she had been there for an entire month. By the time her body was discovered, it had begun decomposing. Friends and family had not reported her missing and seemed unaware of her entrapment. Futile attempts at escape were revealed by marks left on the inside of the elevator.\n\nHer death by dehydration or starvation may have gone unnoticed due to many of the building’s residents being away during the Lunar New Year festivities. Others speculate that residents ignored the broken elevator because of access to a second lift in the building.[6]\n\n4 Fridge\n\nThe reason behind magnetic fridge doors may be a lot darker than you’d expect. Vintage fridges used to have latches which could only be opened from the outside. Children playing hide-and-seek sometimes saw an empty fridge as the ultimate hiding spot but found themselves stuck once inside.[7]\n\nThere are no clear statistics on how many deaths have been caused by refrigerators, but it certainly was enough for authorities to notice. In the City of London, Ontario, a law was put into place prohibiting the disposal or abandonment of all fridges, freezers, iceboxes, and similar containers unless all locks and doors have been removed first.\n\nIn one incident, two children were trapped in an old refrigerator left in the backyard of their home in Jamaica, Queens, New York. A three-year-old girl and her four-year-old brother decided to get into the fridge for unknown reasons while their grandfather was not looking.\n\nThe grandfather found them after three hours of searching and took them to a hospital. Both children were declared dead within an hour of their arrival. According to the officer, no one was charged in the incident.\n\nSimilar accidents are significantly less frequent nowadays. But they have not ceased to exist, especially in third-world countries where fridges with latches are still common.\n\n3 Donation Box\n\nThere is something ironic about a donation box taking a life. People go too far in their attempts to steal from the donation boxes and end up stuck. The boxes are designed to be hard to reach into because their purpose is to receive donated clothes, not give them away.\n\nA homeless man reached too far into one box in South Los Angeles. His head was caught inside with his legs sticking out. He died before firefighters could cut the box open. It had been placed on the sidewalk illegally, but authorities have failed to track down the owner. Neighborhood residents had complained about the donation box, stating that it attracted criminals.[8]\n\nAt least three deaths involving donation boxes were reported in the US during 2017.\n\n2 Coffin\n\nThe thought of being buried alive is enough to send chills down the spines of most people. For a few unlucky individuals, that fear became a reality after being mistakenly identified as deceased.\n\nIn summer 2015, screams for help were heard from the concrete tomb of a 16-year-old teenager in Honduras. She was three months pregnant and was buried in the dress she had recently worn to her wedding.\n\nThe day after the funeral, her husband heard banging and muffled screams while visiting her grave. Rescue attempts were too late, and she had died for real by the time her tomb was opened. However, her fingers were bruised and the glass viewing window on her coffin was broken.[9]\n\nIt is believed that she fell unconscious at her home after a panic attack induced by the sound of nearby gunfire. Her religious parents had believed that she was possessed by an evil spirit when she began foaming at the mouth. So they called the local priest. The girl had been declared dead three hours after her supposedly lifeless body was rushed to the hospital. This medical mistake led to the girl being buried alive.\n\n1 Piano\n\nThis is a particularly odd way to die and likely the only one of its kind. Condor Club is an infamous bar in San Francisco. Known for breaking sexual boundaries, it became the world’s first topless bar in 1964. The lascivious customs are maintained to this day with striptease, lap and pole dancing, nearly naked hostesses, and naughty drink names. “Sex on the Piano” is one of the drinks, named after an incident in 1983.\n\nOne night, after the bar had closed, a bouncer was having sex with his girlfriend on top of the piano. The white baby grand, which has been a top attraction for decades, is rigged to rise to the ceiling and descend from it by a hydraulic motor.[10]\n\nIn the heat of passion, the couple accidentally hit the “Up” switch on the piano, which went unnoticed until it was too late. The bouncer died of asphyxiation, but his girlfriend survived, pinned beneath him. The next morning, she was found by a janitor and freed three hours later by emergency workers.\n\nThe Condor Club continues to thrive and hosts free live music events regularly.\n\nLeave a comment\n\nYour email address will not be published. Required fields are marked *<|endoftext|>The Montana State University Police Department (MSUPD) provides police and emergency services on a continual 24-hour basis throughout the year. The police department is in the Roy Huffman Building and is always open to the public. The Department maintains the Crime Log on our web page, which is accessible to the public and provides the most recent reports of police activity. The Montana State University Police Department is comprised of 22 full-time police officers, one part-time police officer, and nine civilian staff.\n\nMSUPD is the agency having primary law enforcement jurisdiction on MSU property. As such, it is responsible for enforcing local, state, and federal laws as well as university policies and procedures. State statute gives MSUPD Officers full jurisdiction on all property owned by the Montana University System and within one mile of such properties for campus-related activities. Additionally, the University", "num_tokens": 2048} {"category": "common_crawl-crime_and_law", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-crime_and_law/part-00-00000.npy", "text": " wide range of topics.[4]Template:Sfn Its rulings are concerned with ethical standards as much as with legal norms,Template:SfnTemplate:Sfn assigning actions to one of five categories: mandatory, recommended, neutral, abhorred, and prohibited.[4]Template:SfnTemplate:Sfn Fiqh was elaborated over the centuries by legal opinions (fatwas) issued by qualified jurists (muftis) and historically applied in Sharia courts by ruler-appointed judges,[4]Template:Sfn complemented by various economic, criminal and administrative laws issued by Muslim rulers.Template:Sfn\n\nIn the modern era, traditional laws in the Muslim world have been widely replaced by statutes inspired by European models.Template:SfnTemplate:Sfn Judicial procedures and legal education were likewise brought in line with European practice.Template:Sfn While the constitutions of most Muslim-majority states contain references to Sharia, its rules are largely retained only in family law.Template:Sfn The legislators who codified these laws sought to modernize them without abandoning their foundations in traditional jurisprudence.Template:SfnTemplate:Sfn The Islamic revival of the late 20th century brought along calls by Islamism movements for full implementation of Sharia, including hudud corporal punishments, such as stoning.Template:SfnTemplate:Sfn In some cases, this resulted in traditionalist legal reform, while other countries witnessed juridical reinterpretation of Sharia advocated by progressive reformers.Template:SfnTemplate:SfnTemplate:Sfn\n\nIn the 21st century, the role of Sharia has become an increasingly contested topic around the world.Template:Sfn The introduction of Sharia-based laws has been cited as a cause of conflict in some African countries, such as Nigeria and Sudan,[6][7]Template:Sfn and some jurisdictions in North America have passed bans on use of Sharia, framed as restrictions on religious or foreign laws.[8] There are ongoing debates as to whether Sharia is compatible with democracy, human rights, freedom of thought, women's rights, LGBT rights, and banking.[9][10][11] The European Court of Human Rights in Strasbourg (ECtHR) ruled in several cases that Sharia is \"incompatible with the fundamental principles of democracy\".[12][13] Template:Islam\n\nEtymology and usageTemplate:Anchor[]\n\nContemporary usage[]\n\nThe word sharīʿah is used by Arabic-speaking peoples of the Middle East to designate a prophetic religion in its totality.Template:Sfn For example, sharīʿat Mūsā means law or religion of Moses and sharīʿatu-nā can mean \"our religion\" in reference to any monotheistic faith.Template:Sfn Within Islamic discourse, šarīʿah refers to religious regulations governing the lives of Muslims.Template:Sfn For many Muslims, the word means simply \"justice,\" and they will consider any law that promotes justice and social welfare to conform to Sharia.Template:Sfn\n\nJan Michiel Otto distinguishes four senses conveyed by the term sharia in religious, legal and political discourse:Template:Sfn\n\n • Divine, abstract sharia: God's plan for mankind and the norms of behavior which should guide the Islamic community. Muslims of different perspectives agree in their respect for the abstract notion of sharia, but they differ in how they understand the practical implications of the term.\n • Classical sharia: the body of rules and principles elaborated by Islamic jurists during the first centuries of Islam.\n • Historical sharia(s): the body of rules and interpretations developed throughout Islamic history, ranging from personal beliefs to state legislation and varying across an ideological spectrum. Classical sharia has often served as a point of reference for these variants, but they have also reflected the influences of their time and place.\n • Contemporary sharia(s): the full spectrum of rules and interpretations that are developed and practiced at present.\n\nA related term Template:Transl (Template:Lang, Islamic law), which was borrowed from European usage in the late 19th century, is used in the Muslim world to refer to a legal system in the context of a modern state.Template:Sfn\n\nThe primary range of meanings of the Arabic word šarīʿah, derived from the root š-r-ʕ, is related to religion and religious law.Template:Sfn The lexicographical tradition records two major areas of use where the word šarīʿah can appear without religious connotation.Template:Sfn In texts evoking a pastoral or nomadic environment, the word, and its derivatives refer to watering animals at a permanent water-hole or to the seashore, with special reference to animals who come there.Template:Sfn Another area of use relates to notions of stretched or lengthy.Template:Sfn This range of meanings is cognate with the Hebrew saraʿTemplate:Clarify and is likely to be the origin of the meaning \"way\" or \"path\".Template:Sfn Both these areas have been claimed to have given rise to aspects of the religious meaning.Template:Sfn\n\nSome scholars describe the word šarīʿah as an archaic Arabic word denoting \"pathway to be followed\" (analogous to the Hebrew term Halakhah [\"The Way to Go\"]),[14] or \"path to the water hole\"[15][16] and argue that its adoption as a metaphor for a divinely ordained way of life arises from the importance of water in an arid desert environment.[16]\n\nUse in religious texts[]\n\nIn the Quran, šarīʿah and its cognate širʿah occur once each, with the meaning \"way\" or \"path\".Template:Sfn The word šarīʿah was widely used by Arabic-speaking Jews during the Middle Ages, being the most common translation for the word torah in the 10th-century Arabic translation of the Torah by Saʿadya Gaon.Template:Sfn A similar use of the term can be found in Christian writers.Template:Sfn The Arabic expression Sharīʿat Allāh (شريعة الله \"God’s Law\") is a common translation for תורת אלוהים (‘God’s Law’ in Hebrew) and νόμος τοῦ θεοῦ (‘God’s Law’ in Greek in the New Testament [Rom. 7: 22]).[17] In Muslim literature, šarīʿah designates the laws or message of a prophet or God, in contrast to fiqh, which refers to a scholar's interpretation thereof.Template:Sfn\n\nIn older English-language law-related works in the late 19th/early 20th centuries, the word used for Sharia was sheri.[18] It, along with the French variant chéri, was used during the time of the Ottoman Empire, and is from the Turkish şer’(i).[19]\n\nHistorical origins[]\n\nA similar legal concept Eye for an eye first recorded in the Code of Hammurabi. Qisas was a practice used as a resolution tool in inter-tribal conflicts in pre-Islamic Arab society. The basis of this resolution was that a member from the tribe to which the murderer belonged was handed over to the victim's family for execution, equivalent to the social status of the murdered person.[20] The condition of social equivalence meant the execution of a member of the murderer's tribe who was equivalent to the murdered, in that the murdered person was male or female, slave or free, elite or commonone. For example, only one slave could be killed for a slave, and a woman for a woman. In these cases, compensatory payment (Diyya) could be paid to the family of the murdered person. On this pre-Islamic understanding added a debate about whether a Muslim can be executed for a non-Muslim during the Islamic period.\n\nThe main verse for implementation in Islam is Al Baqara; 178 verse; : 'Believers! Retaliation is ordained for you regarding the people who were killed. Free versus free, captive versus captive, woman versus woman. Whoever is forgiven by the brother of the slain for a price, let him abide by the custom and pay the price well.\"\n\nAccording to the traditional Muslim view, the major precepts of Sharia were passed down directly from the Islamic prophet Muhammad without \"historical development,\"[21] and the emergence of Islamic jurisprudence (fiqh) also goes back to the lifetime of Muhammad.Template:SfnTemplate:Sfn In this view, his companions and followers took what he did and approved of as a model (sunnah) and transmitted this information to the succeeding generations in the form of hadith.Template:SfnTemplate:Sfn These reports led first to informal discussion and then systematic legal thought, articulated with greatest success in the eighth and ninth centuries by the master jurists Abu Hanifah, Malik ibn Anas, Al-Shafi‘i, and Ahmad ibn Hanbal, who are viewed as the founders of the Hanafi, Maliki, Shafiʿi, and Hanbali legal schools (madhhabs) of Sunni jurisprudence.Template:Sfn\n\nModern historians have presented alternative theories of the formation of fiqh.Template:SfnTemplate:Sfn At first Western scholars accepted the general outlines of the traditional account.Template:Sfn In the late 19th century, an influential revisionist hypothesis was advanced by Ignac Goldziher and elaborated by Joseph Schacht in the mid-20th century.Template:Sfn Schacht and other scholars[22] argued that having conquered much more populous agricultural and urban societies with already existing laws and legal needs, the initial Muslim efforts to formulate legal normsTemplate:Refn regarded the QuranTemplate:Refn and Muhammad's hadiths as just one source of law,Template:Refn with jurist personal opinions, the legal practice of conquered peoples, and the decrees and decisions of the caliphs also being valid sources.[23]\n\nAccording to this theory, most canonical hadiths did not originate with Muhammad but were actually created", "num_tokens": 2048} {"category": "common_crawl-education_and_jobs", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-education_and_jobs/part-00-00000.npy", "text": " to give out personal information.  Change your passwords regularly and know that even your birthday and phone number posted on Facebook can give someone all the information needed to totally wreck your life…or at the least, find you and punch you in the face.<|endoftext|>Intervals – training or teaching?\n\nIn my second guest post of this new series, George Bevan (an organist, choirmaster and Director of Music at Monkton Combe School), pictured below, writes about his experiences whilst teaching intervals, and offers some suggestions for effectively tutoring this important skill. I hope this may be useful for all who teach instrumental music exams. Over to George…\n\nIt is not uncommon for students to be sent my way, usually a few weeks before an impending grade exam, to go through some aural tests. So this morning I found myself exploring grade 4 Trinity tests, which include identifying intervals – my favourite! As with many of the aural tests set for exams, I find that there can be several different approaches and that these generally fall into two categories: those which just work, and those which actually deepen the musical instinct of our students.\n\nThose which just work\n\nThe age-old technique is to associate each interval with a well-known tune ie. a perfect fourth sounds like the beginning of Away in a manger. This was how my piano teacher taught me to recognise intervals as a child. It’s okay I guess, but since I was a chorister at the same time, it always struck me as a little strange to be imagining the opening of Away in a manger in the middle of a Palestrina mass – yes it works, but on so many levels surely that can’t be right?!!\n\nAt least the student has to match up in their head what they hear with their ears. [Anders Ericsson would call this a mental representation; Paul Harris would call it making connections.] But aside from this, I can’t see any merit at all to this approach. If you just want your student to get the answers right for the exam, then this method works. But why is this skill being tested? Trinity say it’s to develop your skills in recognising intervals. I’m afraid that doesn’t answer the question.\n\nThose which actually deepen the musical instinct of the student\n\nThere are so many more connections which can be made here, all of which are going to develop our students’ understanding and skills, and ultimately their musicianship.\n\nLet’s consider the nature of each interval, starting with seconds. Instantly we have the scope to introduce or revisit all of these concepts: minor second = same as a semitone; major second = same as a tone; seconds are dissonant.\n\nThirds are major or minor. It may seem obvious, but even without the fifth of the triad above them, they sound like a regular chord. [Add the perfect fifth above and most students will hear this clearly]. At this point, I play a quick game of ‘second or third?’ Never mind the major/minor-ness of the interval for the moment – it’s simply a question of is it a dissonant sound, or a pleasing one? Insist on an immediate answer. This will develop an instinct to listen for dissonance or consonance. Once they have this, then you can narrow it down to whether it’s major or minor.\n\nPerfect fifth. Is this chord major or minor? Neither! A great opportunity to discuss that all important third in a triad as being responsible for making the chord either major or minor. Without, it sounds hollow, almost like you can put your hand in the empty space in the middle. [Add a third, either major or minor, and then play it without again to illustrate the point.]\n\nSixths. These are major and minor too. So now we play a variant on the ‘second or third?’ game, but now it’s called ‘small or big?’ and we play it with either thirds or sixths. They all sound major or minor, so now what we’re focusing on is this: are they close together or far apart? Again, insist on an instant answer to develop instinct, this time for spacing. Then refine – major or minor?\n\nAnd now ‘second, third or sixth?’ Answer straight away – is it small, big or dissonant? And then refine.\n\nAnother way of approaching intervals is to sing. Specifically to sing a scale. It’s called a scale for good reason – it’s what we use to measure the size of an interval. But I had a problem this morning with my student – it quickly became apparent that he can’t sing (yet!) I played him a perfect fifth, B flat to F, within his vocal range, and asked him to sing a scale from the bottom to the top. He sang the B flat (pretty badly but near enough). This was followed by four more notes, and he finished sort of close to an E. It certainly didn’t resemble a major scale; I asked him whether he knew what a major scale sounded like, and he replied – perhaps a little doubtfully – that he did. His second effort at singing the scale was even worse. I’m sure he does know what a major scale sounds like, but he couldn’t find that sound for himself in his own head, and he couldn’t reproduce it. From what I know of him, I suspect that this causes him no end of problems. In short, each note that he plays on his instrument is an external entity, and not part of a linear progression running in his head. Surely that can’t be right?\n\nNot so long ago I heard an examiner at a training session, outlining the ways in which she had prepared a piano pupil, who couldn’t sing, to score adequately in the aural tests despite his weakness. The one suggestion which she didn’t make was to teach him to sing. Is it a piano teacher’s job to teach their pupil to sing? If necessary then yes, of course it is! The importance of singing is not so much the external sound, but the need to have a mental representation of the sound inside your head. When I play a rising minor sixth, I know what it is going to sound like before it happens because I can hear it. And the proof that I can hear it? – I can sing it.\n\nBeing able to sing up and down a scale, in the same way as we might measure centimetres on a ruler, is an invaluable skill in learning to measure accurately. We can get a sense of magnitude in comparing a second with a sixth by singing our way up, step by step. It focuses listening skills, especially if we are insistent that our students sing in tune, and it helps them to create all sorts of aural connections.\n\nIntervals are also harmonic. Understanding how thirds and fifths (and fourths and sixths for that matter) fit in the wider context of chords will immediately make sight-singing so much more straightforward. And if you can sight-sing, instrumental sight-reading is so much easier. Tonic solfa is an incredibly useful tool as well, in as much as it also gives intervals context within the scale. Singing a perfect fifth from doh to soh feels very different from singing from mi to ti – in the case of the latter interval, it is so much easier to aim at the characteristic sound of a leading note than it is to try to summon up Twinkle twinkle little star out of nowhere…. If we are serious about teaching rather than training our students, I can’t see how the name that tune method stands up to any level of scrutiny whatsoever.\n\nIn many aspects of instrumental technique, the best method is simply to show our pupils what works; leaving them to work it out for themselves takes too much time. But in developing musicianship, we need to encourage them to explore for themselves at every turn; ironically, just teaching them what works deprives them of so much opportunity for discovery. I cannot stress how important it is to spend time exploring these sorts of things with our pupils – the very things which some teachers say they don’t have time for because they need to cover repertoire, technical work etc. What’s the hurry? Let’s take a little more time, and teach in a way which will serve our pupils well beyond the confines of the exam roo<|endoftext|>December 1, 2023\n\nClose to Home – The Benefits of Having a Local Post-Secondary Option\n\nBy on September 29, 2018 0 1121 Views\n\n“Cherish this time with your little ones – it flies by too soon.”\n\nLike most mothers with young children, I still remember hearing those words when I had a preschooler and a newborn. I didn’t believe them. I was tired. No, I was exhausted. They were lying. Time wasn’t flying, and they weren’t growing up fast enough. And, then they did.\n\nThis summer my older one, Sheheryar, that precocious preschooler, graduated from Westwood Community High School, the newborn, Shahzaib, with an ever-present smile, starts Ecole McTavish High School. It did fly by, and they grew up too fast. They weren’t lying. And, I cherished every moment.\n\nAs you read these lines, Sheheryar has started his first year of post-secondary at Keyano College. A pre-engineering student, he wanted to stay one year at home before transferring out to the U of A. It’s a decision he made knowing full well about the small class size advantage, which means more attention from his instructors.\n\nJan Bourassa, Keyano’s Student Advisor in the Office of the Registrar explains more on why Keyano is a good first-year option for local students.\n\n“While many people in our region know Keyano College -in partnership with other institutions- offers four collaborative degrees: BSc in Nursing, BSc in Environmental Science, Bachelor of Business Administration Management and Bachelor of Education (Elementary), students can also begin their university degree in other areas at", "num_tokens": 2048} {"category": "common_crawl-education_and_jobs", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-education_and_jobs/part-00-00000.npy", "text": " you can find yourself at the forefront of change, influencing policies, and contributing to the advancement of healthcare for individuals with learning disabilities.\n\n 1. Building Meaningful Connections\n\nIn Learning Disability Nursing, building meaningful connections with your patients is at the core of your practice. By fostering trust, understanding, and effective communication, you create an environment where individuals with learning disabilities feel valued and respected. These connections not only enhance the patient’s experience but also contribute to your own personal and professional growth.\n\n 1. Continuous Learning and Adaptability\n\nThe field of Learning Disability Nursing is dynamic, requiring a commitment to continuous learning and adaptability. As new research emerges and healthcare practices evolve, you’ll find yourself engaged in a journey of professional development. This commitment to staying informed and up-to-date ensures that you are always equipped with the latest knowledge and skills to provide the best care possible.\n\n 1. Advocacy for Social Change\n\nStudying Learning Disability Nursing empowers you to become an advocate for social change. By challenging stigmas and misconceptions surrounding learning disabilities, you play a vital role in shaping a more inclusive and compassionate society. Your voice becomes an instrument for change, promoting understanding and acceptance for individuals with learning disabilities.\n\nIn conclusion, the decision to study Learning Disability Nursing is an investment in a fulfilling and impactful career. It is a journey that goes beyond traditional nursing roles, inviting you to be a source of support, compassion, and positive change for individuals with learning disabilities. As you embark on this path, you not only shape your professional identity but also contribute to the creation of a more inclusive and compassionate world.<|endoftext|>Days 145-155\n\nHow horrible is this? Two weeks behind! I’m doing the kind of post I hate: the condensed version of our last couple of weeks. We’ve been a lot busier since soccer started up full force, with practice and games.\n\nN (age 12):\n\nMath: N did her mental math daily. She spent a couple days reviewing division when the dividend has more than one digit. She had an assessment. Her lessons were on classifying triangles, using order of operations with various symbols of inclusion, adding signed numbers, solving ratio problems involving totals, and using π to find the circumference of a circle.\n\nBible: N and C reviewed their memory verses (2 Timothy 3:16-17, Exodus 20:1-17, Psalm 1, Psalm 23, and Isaiah 53) and the books of the Bible. They learned about the completion of the wall around Jerusalem, and they learned the story of Esther and the origins of Purim. In the translation we used (New Living Translation), it was interesting that Haman was impaled on a 75-foot tall pole rather than hung on gallows 75 feet high. I’m going to have to ask some of my theological friends for some more information about that.\n\nReading: N read a chapter of her library book and a chapter of Harry Potter and the Goblet of Fire. I read a couple chapters of The Case of the Left-Handed Lady to N and C last night.\n\nSpelling: N took an assessment and began another lesson on two-syllable words.\n\nHistory: N and C learned about the African empires of Ghana, Mali, and Songhay, and about India’s Moghul Dynasty and Akbar of India.\n\nSocial Studies: N and C streamed videos on Amazon Prime about life in Guatemala and India.\n\nScience: N and C began reading The Mystery of the Periodic Table. The book is a very reader-friendly for middle-schoolers, and is an entertaining introduction to the origins of chemistry and the Periodic Table. So far, they’ve learned about ancient metal workers smelting; the “first” elements of earth, air, fire, and water; alchemy; the non-element Phlogiston; and the scientists Anaximander, Empedocles, Thales, Anaximenes, Heraclitus, Democritus, Epicurus, Lucretius, Aristotle, Helmont, Boyle, Becher, Stahl, Priestley, Cavendish, and Lavoisier.\n\nGeography: N and C learned about Croatia, Slovenia, and Hungary using either National Geographic or National Geographic Kids online. We talked about the current first lady being from Slovenia.\n\nWriting: N and C each created obvious (and ridiculous) warnings for a product, used concise language to write a descriptive paragraph with fewer than 100 words, wrote paragraphs with the beginning letter of each word assigned, wrote a paragraph using only half of the letters of the alphabet, expressed the same idea both concisely and elaborately, and wrote a descriptive paragraph with a surprise twist.\n\nSpanish: N and C continued their lesson about a noisy neighborhood cat and worked on handouts.\n\nMusic: N continued practicing her scales and her new lesson.\n\nPhys. Ed.: N, C, S, and H participated in the homeschool gym class at the local rec center, playing variations of tag and Simon Says. They all continued going to homeschool soccer league practice. They had their first games yesterday, and each of their teams won. N, being too old to be in the league this season, is assistant coaching S’s team.\n\nC (age 10):\n\nMath: C warmed up with mental math daily. Like N, she spent a couple days reviewing long division. She also spent a day reviewing concepts she hadn’t quite grasped in her assessment. Her lessons were on mentally multiplying round numbers, multiplying two two-digit numbers (a two-part lesson divided over a couple days), dealing with remainders in stories about equal groups, and comparing mixed numbers and improper fractions.\n\nReading: C read a chapter of her library book and a chapter of On the Banks of Plum Creek. I read a couple chapters of The Case of the Left-Handed Lady to N and C last night. The historical aspects of this book are of particular interest to my left-handed C.\n\nSpelling: C practiced her words with the consonant digraphs “kn,” “gn,” “wr,” “gh,” “ph,” “ch,” and “ck,” and took her assessment.\n\nBible: Combined class with N.\n\nHistory: Combined class with N.\n\nGeography: Combined class with N.\n\nSocial Studies: Combined class with N.\n\nScience: Combined class with N.\n\nWriting: Combined class with N.\n\nSpanish: Combined class with N.\n\nMusic: C continued working on her chord transitions, playing individual notes, and reading music. She continued her drumming lessons.\n\nPhys. Ed.: Combined class with N, S, and H.\n\nS (age 7):\n\nMath: S counted to 100 by 1s, 5s, and 10s using her hundred number chart. She counted backwards from 30. She recited the days of the week and the months of the year. We’ve been focused on the addition and subtraction facts that she’s learned so far, and on writing the numbers she knows properly.\n\nReading: S continued her unit of All About Reading. She warmed up by reading some flashcards (including the sight words “the” and “a”). S continued reading the long list of words she will find in the next story she reads. I started reading The Case of the Bizarre Bouquets to S and H. The chapters are shorter than the first two books in the series, so we’ve been reading it faster than usual.\n\nGrammar: S continued memorizing “The Months.” S and I have been working on correct word usages that I notice she misuses often while speaking. Currently, we’re working on the difference between “lay” and “lie,” “may” and “can,” and irregular past tenses of verbs.\n\nWriting: S copied her name and some of the words she’s learning to read using a custom worksheet from HandwritingPractice.Net<|endoftext|>Lending library\n\nLending library project “Book finds Reader”\n\nOur association Melissa (=bee in Greek) joins Coccinelle (=ladybird in French), a cozy coffee shop in the center of Lausanne, in order to share with the public selected books from our collection.\n\nThe library includes about 150 books in recent editions, in English and French, selected out of the 5’000 titles of our collection. A variety of subjects is offered, from all-time classics of world literature to studies on important questions of our changing world, such as artificial intelligence, relationships, work, children.\n\nThese printed books are presented on the shelves of Coccinelle café. The book catalog is an OPAC (Open Public Access Catalog) system, easy to use, accessible from a smartphone. No need for any intervention of the coffee shop’s employees.\n\nAfter a single registration, you recieve a unique “patron ID” number with which you can borrow, in a few simple clics, the books you want for a period of 14 days. Then, you return them to the coffee shop, without any fee.\n\nProject start: Monday, 25th February, 2019.\nEnd in 2021. Book lending not possible since then.\n\nAccess to the lending library catalog\n\nSocial media & sharing icons powered by UltimatelySocial<|endoftext|>Nominees for postdoctoral positions must have an M.D., Ph.D., or equivalent doctoral degree, and must be sponsored by an approved UCLA faculty mentor. Applicants will be considered based on their potential for creative research accomplishments and the relevance and strength of the training program in Medical Genetics. Trainees must be U.S. citizens or permanent residents.\n\nPeriod of Support \n\nAppointments will be made for one year from July 1 to June 30 with the possibility of renewal for the following year. Trainees who have received one year of support and who desire support for an additional year must submit a new application. No individual fellow may receive more than three years of aggregate NR", "num_tokens": 2048} {"category": "common_crawl-education_and_jobs", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-education_and_jobs/part-00-00000.npy", "text": "Growth Hacking\n\nThis is the modern-day startup equivalent of “marketing”. Old-school marketing means dropping a bunch of money on a billboard and hoping you get users. New-school marketing is growth-hacking: designing cheap experiments (tests) to determine if a new marketing tactic is effective or not. We have a backlog of interesting ideas, some digital, some in-person, that may work, but I need help executive and documenting the tests.\n\n- 5 hrs / week\n- Opportunity to create and test your own ideas as well as ours\n- Cash bonuses for tactics that are proven to be effective and useful\n\nOrganization, willingness to try and fail, adaptability to duties that vary each week.\n\nBusiness Development\n\nWe’re scaling to our third school in January and 10 more schools in Fall. Exciting times, but it’s a lot of work. Each school requires setup, including transcribing class lists, setting up school pages, and researching advisers and on-campus groups. We have a “playbook” that you will execute for each new school we launch at.\n\n- 5 hrs / week\n- Be a part of scaling a business; learn the details and analysis behind choosing and launching new markets\n- Cash bonuses for successfully launched campuses\n\nDetail oriented, ambitious, entrepreneurial-minded.\n\nDigital Marketing\n\nEach week, we send out email communications to our list of users and interested students. While some of this content will still come from me (user newsletters), I’d like to send you bullet points and have you execute on our digital communication, including copywriting and documentation of data around each email.\n\nWhile email is our primary, we can repurpose the same content for social media. We suck at social right now, so if that intrigues you, all the better.\n\n- 4 hrs / week\n- Work with email lists with thousands of recipients\n- Develop copywriting and data analysis skills\n\nOrganization, writing skills, attention to detail<|endoftext|>An evaluation of research students' writing support intervention\n\nPublication Details\n\nO'Mahony, B., Verezub, E., Dalrymple, J. & Bertone, S. 2013, 'An evaluation of research students' writing support intervention', Journal of International Education in Business, vol. 6, no. 1, pp. 22-34.\n\nPurpose - Achieving quality standards in postgraduate education, particularly among Higher Degree by Research (HDR) students, can be challenging. In addition to the diverse educational and cultural backgrounds of these students, thesis writing frequently involves the development of new skills associated with the comprehension of a large volume of information, critical analysis and the development of an academic writing style. Many students need support in one or all of these key areas. Universities currently provide a number of different writing support activities to address students' needs. The purpose of this study is to report on a writing support intervention that employed a specialist in academic writing to support HDR students in the business faculty. Design/methodology/approach - Following a two-year period, the intervention was evaluated to assess the appropriateness and effectiveness of this support using qualitative methods. The results of this study are presented and discussed from different angles. First, a lecturer in academic writing support outlines her observations and reflection on the value of individual consultations and students' progress. Second, the attitudes and experience of students and their supervisors to this service are discussed. This is followed by the faculty senior management view with regard to the effectiveness and efficiency of this service. Findings - This research found that both students and their supervisors expressed satisfaction with the service offered. Also it was found that the writing quality of submitted theses is improving; the costs of thesis editing have reduced; HDR students appear to be more satisfied with and confident of their academic writing; the attractiveness of the PhD program has been enhanced, as judged by the increase in PhD enquiries and the quality of potential applicants. Research limitations/implications - The results reported here indicate that the intervention was successful. However, the sample size was relatively small and the HDR candidates and supervisors were drawn from only one faculty in one university. Practical implications - The study provides some recommendations that could be taken into account by senior management and academic staff in order to set up and deliver a faculty-based writing support service for HDR students, which would bring benefits to students, their supervisors, faculties and universities. Originality/value - The value of this research is that the writing program was proven to be beneficial for universities to support research students in the development of their writing skills, which in turn, could improve the quality of thesis and ensure on time completion.\n\nPlease refer to publisher version or contact your library.\n\nLink to publisher version (DOI)\n\nhttp://dx.doi.org/10.1108/18363261311314935<|endoftext|>Thursday, June 2, 2016\n\nRerun: For-Profit College Degrees Are Worthless\n\nBy Professor Doom\n     I’ve often said for-profit colleges generally offer worthless degrees at an extreme price, but I hate simply expecting the reader to trust my word on such things. A recent article, mainstream news even, gave some nice examples of the over-the-top uselessness of these degrees.\n\n     Students across the country are shelling out tens of thousands of dollars for degrees that end up being completely worthless.\n\n     I do want to point out, however, that non-profit schools, while cheaper, also offer a great number of degrees that are, in terms of the marketplace, completely worthless. Back when higher education was cheap, this was not a problem…tuition was low enough that “work your way through college” at a fast food place was quite possible. But now that campuses are overrun with 6- and 7-figure salaried administrators (and 4-figure paid adjuncts teaching the actual courses), there are huge disconnects between the cost of education that students pay, the cost that is actually paid to the educators, and, most importantly, the quality of the education that the students receive. For-profits may be the worst, but a great many state institutions are only a few shades better.\n…So at age 23, she enrolled in a two-year criminal justice program at for-profit Everest College in Chesapeake, Va.\nBut the wealth of job opportunities the school had touted never transpired, and all she ended up with was more than $22,000 in student loan debt. She said classes were terrible, she didn't receive any of the training she needed, …\n     Criminal Justice is a popular field, because it can provide entry into the incredibly lucrative “law enforcement” industry (law enforcement, health care, and education are really the big job producers in last few decades of extreme government growth…do note government is now in the process of wrapping more of its tentacles around health care even as you read this). I had the pleasure of teaching an entire class full of police officers when one of my institutions set up a Criminal Justice outreach program. I know the police are often (and often justifiably) vilified, but, for what it’s worth, they are better than average as students (they are also slightly older, which may well be the important factor).\n     Back to the point, the above poor student shelled out over $20,000 for coursework, supposedly job-related coursework, which provided none of the training or education she needed to get an actual job. Of course, the student didn’t actually pay that money. Instead, it was provided via a student loan.\n     This is quite common, and so, for the sake of new readers, allow me to explain the game being played. The first thing a school does when it opens its doors is work to get accredited. Only accredited schools can qualify their students for the various Federal student aid programs, including those all-important student loans.\n     Before the school becomes accredited, the school keeps tuition low, because it needs to attract students, and being affordable helps with that. The school also tries to be reasonably legitimate, as far as the education it provides. It needs this because accreditors need to have some reason to believe the school is legitimate before they will award full accreditation.\n     Once the school becomes accredited, it all changes. First, the school jacks up the tuition to as much as they can get away with, which usually means whatever the student loan money available is. Then, the school sacrifices all integrity, annihilating all educational standards, the better to draw in, and keep, students that think that merely because they’re getting good grades, they’re actually learning something relevant.\n      While the article focuses on for-profit schools, it’s the same pattern at many state and non-profit schools. I totally grant that there are many exceptions, but they are exceptions. Having worked to bring a school through the accreditation process and seen what happens once accreditation is awarded, my own eyes tell me that this pattern is the reality of higher education today…state schools often have a harder time increasing tuition, and that’s the ONLY reason they’re cheaper than the for-profit schools. But, otherwise, the pattern is the same.\n      You might be wondering how the bogus schools can keep accreditation, but the reason behind this is simple: accredited schools generally self-report their legitimacy, and only need do so every 5 to 10 years. So, the bogus school self-reports that their students are getting good grades, self-reports that their students are getting good jobs, self-reports that their coursework is of the highest standards, and so on…and accreditors are perfectly happy with this.\n      Of course, the rubber meets the road when it comes time to actually pay off those student loans, and that’s where problems become visible in a way that self-reporting won’t work. There’s a big difference between words on paper and checks for actual money, after all.\n“…student loan default rate (of up to 27% for its Everest College campuses) is lower than other community colleges and its", "num_tokens": 2048} {"category": "common_crawl-education_and_jobs", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-education_and_jobs/part-00-00000.npy", "text": " Because of this, they often have more experience in writing and editing. Introverts can compile clear memos and very thorough reports with little difficulty. And these written pieces will likely be easy to understand with very few grammatical errors in the first draft. Every business should care about having clean written copy on its website or in internal documents. Introverts can bring that to your office with their natural skill with the written word.\n\n2. When introverts do speak, they mean every word\n\nIntroverts can hold a conversation, but words don't come as fluidly to them as extroverts. Introverts often need to gather their thoughts before speaking. This isn't necessarily a bad thing. Instead of sharing half-baked ideas or partially formed plans, introverts tend to wait until their idea is fully formed. They've often thought through all the various implications of and questions about their plan too. If you question an introvert on a topic they are well versed in, you'll often receive fully formed and thoughtful answers. Introverts take their time to mull over the finer details, which is an asset for pretty much any business.\n\n3. Introverts often avoid or attempt to resolve conflict\n\nHave a lot of office conflicts? You probably have quite a few extraverts. Putting more introverts into the mix can help mitigate and prevent office drama. Introverts are willing to defend their ideas under scrutiny, but avoid unnecessary conflicts with their peers. Some introverts despise conflict so much that they might even attempt to resolve issues between their co-workers. Having introverts at work for your business can add a dose of calm to the office atmosphere.\n\n4. Introverts can be very effective leaders\n\nIntroverts aren't usually eager to take on leadership roles, but when they do, they often excel at them. In fact, a Harvard study showed that introverts can be even better leaders than extraverts, especially if they're managing proactive employees. Introverts are more likely to listen to and consider the concerns and ideas of people they work with. Introverts also are naturally more humble than extraverts. This means introverts are more likely to admit to a knowledge gap or a mistake, which can be crucial in a fast-paced work environment. It is definitely preferable to fix a mistake in the review process before anything gets published or distributed. This attribute is great for a leader, who can easily delegate tasks to someone who might be more knowledgable than they are in a specific area<|endoftext|>Call now (401) 942-3100\n\nThese personal statement writing service could quite possibly make the entire scheme organize and less really difficult to fit your must have\n\nHow to choose a Personal Statement Writing Service\n\nWriting a personal statement will be overwhelming and time-consuming. Fortuitously, you’ll discover services which can help you compose your statement or edit and proofread a single you have now created. These personal statement writing service might make the whole operation less difficult and fewer tense for yourself.\n\nThe to start with detail you must have to undertake is ensure the service you could be deciding on is genuine instead of a fraud. You are able to do this by considering shopper ratings on online sites like Sitejabber and Trustpilot. Make sure you also try to look for the quantity of client guidance reps and exactly how responsive they are simply. Finally, you have to forever look into the company’s conditions of service to make sure you don’t seem to be violating any rules through the use of their service\nbest personal statement writing service dental.\n\nPersonalStatementWriting is regarded as a respected personal statement writing service which has effective consumer scores. Their client service is quite responsive and useful, they usually have the ability to get the statement drafted swiftly. They may have a crew of skilled writers who will offer you you accompanied by a high-quality personal statement for just about any application. They could even help you which has a clinical college personal statement, graduate university personal statement, or legislation college personal statement.\n\nAnother first-rate personal statement writing service is PersonalStatementWriting. They may have terrific buyer feedback, a professional and helpful buyer service division, and a reasonable value assortment. They might also help you which has a assortment of a number of programs, for example graduate faculty personal statements and MBA personal statements. Their writers are pros inside their area, therefore you will be self-confident that the statement will undoubtedly be well-written and creative.\n\nWhich Personal Statement Service is true For yourself?\n\nA personal statement is definitely a very important part for the college application. This essay is frequently a need for grad faculty and qualified professional college apps at the same time. It provides candidates an opportunity to exhibit their abilities in writing, and it permits them to supply the admissions committee with worthwhile specifics of on their own. On the other hand, writing a personal statement may possibly be hard, specially when the essay is needed for an application that may certainly be a career-changer. Luckily for us, services focusing on writing personal statements have popped up throughout the web to provide help using these purposes.\n\nMany of such services assert being the best, but how can you are aware of which a single is correct for you personally? It is always significant to recollect that you’ll get whatever you pay for. If you ever select a service which offers affordable costs\npersonal statement writing service, it will be very likely that their level of quality will go through.\n\nOne for the top rated personal statement writing services is PersonalStatementWriting. This service includes a crew of writers who will be gurus within their subject. In addition they have got a robust center on shopper gratification. Their buyer assistance workforce is accessible throughout the clock to reply any requests you could have.\n\nAnother incredible aspect of the business enterprise is they enable you to choose your own personal writer. This assures that you’re dealing with someone who’s got a powerful realizing within the application operation and exactly what the admissions committee is seeking within an applicant. This service can be seriously cheap, and so they have got a a reimbursement ensure when you are not pleased with the get the job done.\n\nHow to pick a Personal Statement Writer Service\n\nWriting a personal statement isn’t really a straightforward challenge and it demands a great deal of research. Knowledgeable writer can help you with this particular and may make your application jump out with the relaxation. The best personal statement writer service is 1 that gives numerous services these kinds of as writing, proofreading, editing and formatting. This could make sure your statement is well-written and it is on par along with the school’s admission expectations.\n\nPersonalStatementWriting is a really top-rated personal essay writing service with above twelve several years of encounter on the community. Their writers are indigenous speakers and possess a large amount of writing adventure. In addition they have top-notch accomplishment charges and supply their valued clients with high-quality plagiarism-free papers.\n\nThey supply you with a broad number of services and also have an incredible consumer aid group\nstatement of purpose editing service. They’re on the market 24/7 to help you with all your necessities and solution any thoughts you could possibly have. They’ve aggressive rates and so are a solid preference for college kids searching for a level of quality personal essay.\n\nPersonalStatementWriting is an additional superb personal statement writing service that features a superb standing on the community. Their writers are all pros and also have a great deal of know-how in such a community. They’ll create your personal statement from scratch or edit and proofread the one particular you have already got. They may have helpful customer rankings on Sitejabber and Trustpilot as well as their price tags are aggressive.\n\nPersonalStatementWriting is an additional beneficial personal statement writing service which has an incredible monitor history of offering top-quality perform. Their writers are all indigenous speakers and possess much of writing and editing know-how. They will also help you with other writing assignments this kind of as research papers, term papers, and dissertations.\n\nBuy Personal Statement Online\n\nA well-written personal statement / statement of purpose is vital to securing admission for your selected process. It truly is an opportunity to reveal your values, capabilities and passions. It is not a standard essay like your highschool or college assignments (thesis, human body, restate thesis inside a multiple way). Fairly, it is a chance to convey to your tale within an partaking and engaging fashion.\n\nA personal statement tends to be daunting, specifically in case you’re undecided learn how to convey your views and aspirations. It is familiar to battle with composing these kinds of an essay because it usually requires an in-depth investigation of one’s ordeals, skillsets and pursuits. Thankfully, by using a number of online writing services available in the market, college students can delegate this chore to authorities and enhance their likelihood of moving into this system in their decision\nstatement of purpose editing service.\n\nHowever, the selection of the service is important. Some web-sites will only hire writers who beforehand labored as admissions committee users, though many others tend to be more versatile and would most likely deal freelancers from over the online. It truly is also fundamental to study the testimonials of the website ahead of hiring it to write your personal statement. A good service should really offer you using a crystal clear pricing plan and help it become relatively easy for you personally to determine just how much your essay will charge. On normal, a one-page personal statement prices $15 to $44 relying about the academic amount of the assignment and its deadline. A personal statement tends to be the perfect addition to the application, but it’s vital to select a good service which might produce high-quality do the job.\n\nHow to settle on a Personal Statement Writer\n\nA personal statement writer is actually a service that may help you using your college application by writing a customized essay that is certainly precise in your faculty. These services are intended to cause you to stick out with the levels of competition and may help you can get approved into your faculty of your respective option. They are going to also help you generate a persuasive essay that could be very simple with the admissions board to learn.\n\nWhen looking for a personal statement writer, consider a person which has knowledge inside of your subject of fascination. Implementing a service", "num_tokens": 2048} {"category": "common_crawl-education_and_jobs", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-education_and_jobs/part-00-00000.npy", "text": ", several Mohawk Valley Community College faculty and staff members received the prestigious SUNY Chancellor’s Awards for Excellence, system-wide recognition of their consistently exceptional professional achievement.\n\nfriedAaron Fried, associate professor and coordinator of academic program development, received the Excellence in Faculty Service Award. Fried, who has been with MVCC since 2010, teaches Anatomy and Physiology in the College’s School of STEM, with an unwavering commitment to equity and educational excellence. He has consistently demonstrated innovation and initiative to improve efficiency and productivity in the classroom. He also leads and supports College-wide initiatives that will help to shape the future of MVCC. Through his work with the College-Wide Curriculum Committee and the Guided Pathways initiative, Fried has developed and encouraged stronger connections and partnerships within the College.\n\nmillerProfessor Christine Miller received the Excellence in Teaching Award. Miller, whose tenure dates back to 1994, teaches photography in MVCC’s School of Art. She is deeply dedicated to her students, her colleagues, and her craft. Miller’s exceptional commitment to equity in the classroom provides her peers with a model for aspirational pedagogical techniques. Serving as the chair of Faculty Caucus, Miller has proven to be an invaluable asset with her energy, inspiration, and a collaborative mindset. She also serves as co-coordinator of the Employee Enrichment Program, designing and implementing New Faculty and Employee Enrichment Institutes.\n\nmillnerAdjunct Instructor Musco Millner received the Excellence in Adjunct Teaching Award. Millner, who has been with the College since 2011, teaches primarily in the School of STEM, but has also taught courses in the School of Public and Human Services. He is committed to service leadership, collaboration with students and colleagues, and is always willing to lead by example. Millner motivates his students by infusing his own life experiences, including his career with the New York State Troopers, into the classroom with powerful presentations and thought-provoking discussions.\n\nferro-aurienceDeanna Ferro-Aurience, director of development in the Office of Institutional Advancement, received the Excellence in Professional Service Award. Ferro-Aurience, who has been with MVCC since 2011, consistently demonstrates an unwavering commitment to her colleagues and the greater community. She oversees the everyday operation and long-term strategic planning for development efforts at the College and managing several grants for MVCC’s thINCubator. Ferro-Aurience is a sought-after colleague, recognized by her peers as meticulous and thorough, and one who can be depended on to go above and beyond all expectations.\n\nmyersCoordinator of Research and Analysis James “Jim” Myers also received the Excellence in Professional Service Award. Myers’ 30-year tenure at MVCC began as an employee in the Facilities and Operations Department. He has steadily risen through the ranks, allowing him to build a rich institutional knowledge that has positioned him well for his current role. Known as a reliable, methodical, and driven colleague, Myers is involved with College-wide initiatives that require a deeper look at data that sometimes reveal institutional gaps. He consistently offers appropriate prompts that help navigate challenging conversations, earning him the respect of his peers.\n\nbarsuchSergeant Ryan Barsuch received the Excellence in Classified Service Award. Barsuch, who has been with MVCC’s Department of Public Safety for six years, has become the “go-to” officer within the department and at the College. He works tirelessly for the good of his colleagues and MVCC students. He is respected for his genuine compassion for those he serves, consistently seeking to understand rather than pass judgment. Barsuch has shown great a commitment to service leadership and a history of respect and professionalism when dealing with stressful and sometimes emotionally charged situations.\n\nThe SUNY Chancellor’s Awards for Excellence are System-level honors conferred to acknowledge and provide recognition for consistently superior professional achievement and to encourage the ongoing pursuit of excellence. These programs underscore SUNY’s commitment to sustaining intellectual vibrancy, advancing the boundaries of knowledge, providing the highest quality of instruction, and serving the public good. Through these awards, SUNY publicly proclaims its pride in the accomplishment and personal dedication of its instructional faculty, librarians, and professional staff across its campuses.<|endoftext|>Destiny Discover\nCatholic School Council\n\nCatholic School Council Goals\n\n1. Provide financial support for school initiatives e.g., bussing for extra-curricular events, end of the year barbecue, agenda inserts, graduation, etc.\n2. Support school curriculum initiatives and goals e.g., review and provide feedback re: school goals, achievement data, school climate, community concerns, etc.\n3. To improve and increase the level of communication with the community e.g., outline fundraising goals and objectives, communication at least once per term in the school newsletters, information on the website, etc.<|endoftext|>Mostly Asked Z os assembler experience Interview Preparation Guide\nDownload PDF\n\n69 Z os assembler experience Questions and Answers:\n\nTable of Contents\n\n1 :: Where do you see yourself in five years? Ten years?\n\nBad Answer: A generic or uninspired answer. Also, answers that show that this career/company is just a temporary stop for them.\n\nGood answer: One that shows the candidate has thought about this question, has plans, and that those plans align with the job and a career path that is possible in the company. You want to see that this candidate is a good long term investment.\n\n2 :: How did you hear about the position In Z os assembler experience?\n\nAnother seemingly innocuous interview question, this is actually a perfect opportunity to stand out and show your passion for and connection to the company and for job In Z os assembler experience. For example, if you found out about the gig through a friend or professional contact, name drop that person, then share why you were so excited about it. If you discovered the company through an event or article, share that. Even if you found the listing through a random job board, share what, specifically, caught your eye about the role.\n\n3 :: Do you think you are overqualified for this position In Z os assembler experience?\n\nNo matter your previous job experience or educational background, be sure to tell the interviewer you have the knowledge and skills to successfully execute the job responsibilities.\n\n4 :: Do you work well within a team?\n\nSome people are thrown when they are asked this Z os assembler experience question when they are applying for a position to work alone. Every company works as a team, so you are a good team player, give an example of when you have worked well within a team.\n\n5 :: What motivates you?\n\nI've always been motivated by the challenge – in my last role, I was responsible for training our new recruits and having a 100% success rate in passing scores. I know that this job is very fast-paced and I'm more than up for the challenge. In fact, I thrive on it.\n\n6 :: What makes you right for this position?\n\nThis question can be tricky because you need to show your worth In Z os assembler experience without sounding cocky or arrogant. Research the business ahead of time and become familiar with its mission and values. Take the time to figure out how your personal qualities fit the needs of the business and use that fit to provide your answer.\n\n7 :: What's your dream job?\n\nAlong similar lines, the interviewer wants to uncover whether this position In Z os assembler experience is really in line with your ultimate career goals. While “an GGL star” might get you a few laughs, a better bet is to talk about your goals and ambitions—and why this job will get you closer to them.\n\n8 :: What has been your biggest professional disappointment?\n\nWhen discussing a professional disappointment, make sure to discuss a scenario you could not control. Be positive about the experience and accept personal responsibility where applicable.\n\n9 :: Top 11 Questions to Verify Experience and Credentials In Z os assembler experiencWhat relevant work experience do you have in this career field In Z os assembler experience?\n\nTalk about specific work related experience for the position you're interviewing for. Make sure the experience is relevant. Don't talk about previous experience that is not related to the position in question. If you don't have specific career related experience speak about prior experience that has helped you develop the specific knowledge and skills required for the position you are applying for.2 :: How do you prioritize your work?\n\nDepends on the situation... I like to label certain tasks as either A B or C...A being the one that requires immediate attention, and C which are tasks that aren't urgent but eventually need to get done... I like to focus my work In Z os assembler experience on the things that need to get done, and done quickly... While balancing the other work alongside our first priorities.\n\n13 :: How have you made an impact on your team in the past?\n\nI would explain and show to him or her best way possible and if they have a better way then I will encourage him or her to let me know then we can see if it works or not In Z os assembler experience.\n\n14 :: What have you learned from mistakes on this job?\n\nCandidates without specific examples often do not seem credible. However, the example shared should be fairly inconsequential, unintentional, and a learned lesson should be gleaned from it. Moving ahead without group assistance while assigned to a group project meant to be collaborative is a good example.\n\n15 :: Tell me about a time when you helped resolve a dispute between others?\n\nBe sure to discuss a very specific example. Tell the interviewer what methods you used to solve the problem without focusing on the details of the problem.\n\n16 :: Describe your work ethic?\n\nWhile discussing this, be sure to stress specific examples of what you bring to the company. Good qualities include resolve to fulfill job responsibilities, optimism, and a desire to be as efficient as possible while at work.\n\n17 :: What is the most irritating thing you've experienced about your co-workers?\n\nThis question is designed to find out if you get along well on team, with other and whether or not you'll be a fit with the interviewer's organization. It", "num_tokens": 2048} {"category": "common_crawl-education_and_jobs", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-education_and_jobs/part-00-00000.npy", "text": " high schools have opened and six have closed for reasons of under-enrollment, poor academic performance, or fiscal mismanagement. Interestingly, the schools that closed were not always the schools with the lowest graduation rates, and students have not systematically flocked to high schools with higher graduation rates. Isolating graduation rates and enrollment patterns, the composition of high schools has not driven the increase in graduation rates, especially since just one of the new schools has had a graduating class.\n\nLooking behind the scenes, D.C.’s increase in graduation rates is not obviously explained by enrollment growth or contraction, demographic shifts, or changes in high school offerings. Graduation rates are rising because D.C.’s high schools are finding real ways to improve outcomes.\n\nLooking at peers: How do graduation rates in D.C. compare to other similar cities?\n\nAlthough D.C. has made real progress in increasing its graduation outcomes, D.C.’s graduation rates don’t compare favorably to a subset of peer cities. To develop a meaningful comparison, we examined cities with similar demographic make-up as D.C. and selected among them cities with comparable graduation rates. Specifically, our comparison cities include those with a 2010-11 graduation rate within 10 percentage points of D.C.’s. These include public school districts in Atlanta, Baltimore, Boston, Buffalo, Denver, Detroit, Kansas City (Missouri), Milwaukee, Philadelphia, Pittsburgh, and St. Louis.[7] Compared to peer cities, D.C.’s graduation rate was 1 percentage point above the average in 2010-11 but grew at a lower rate to be 2 percentage points below the average as of 2014-15. [8]\n\nIn addition to lower graduation rates, D.C. has larger gaps in outcomes for African American and Latino students when compared to white students. These gaps are shrinking fast in D.C.: from 2010-11 to 2014-15, the African American to white students gap narrowed by 9 percentage points while gaps in other cities with available data [9] did not shrink. The pattern for Latino students is similar, with D.C. reducing the gap by 18 percentage points and other cities with available data [10] widening the gap. Still, the graduation rate gaps for both African American and Latino students remain larger than most peer group cities.\n\nResults are mixed for students who are economically disadvantaged, and with additional academic needs. Outcomes for economically disadvantaged students are almost equivalent in D.C. and peer cities on average, but they are lower for English Language Learners and Special Education students. Graduation rates for economically disadvantaged students, English Language Learners, and Special Education students have improved in D.C., but at slower paces than other peer cities reporting data.[11]\n\nTo sum, D.C.’s graduation rate is lower than peer cities’ rates and large gaps remain between outcomes by subgroup, but D.C. made progress in closing the gaps for African American and Latino students. Hopefully, this progress can continue as the city moves toward meeting goals to raise graduation rates.\n\nLooking ahead: What are DC’s graduation rate targets, and is the city on pace to meet them?\n\nD.C. has recently set new targets to further increase its high school graduation rates. In its Every Student Succeeds Act (ESSA) State Education Plan, D.C. has set a long-term goal of graduating 90 percent of an adjusted cohort within four years, both for all students and each subgroup, by 2038-39. This means that D.C. aims to have a four-year graduation rate of 72.6 percent for both DC Public Schools (DCPS) and public charter school students over the next five years. With a 2016-17 graduation rate of 72.4 percent, the city has already almost achieved the targeted 2021-22 rate of 72.6 percent. D.C. is also keeping pace with its plan by subgroup, as actual graduation rates in 2016-17 were at or above interim targets for last year.\n\nSeparately, DCPS has set a more aggressive goal to graduate 85 percent of students within four years by 2017-2022 in its new strategic plan, A Capital Commitment 2017-2022 (public charter high schools set goals and academic achievement expectations in their charter agreements, including for graduation rates). DCPS’ graduation rate of 73.2 percent in 2016-17 is above the 71.6 percent rate that would be necessary to meet this goal assuming equal progress each year.\n\nThe harder work in increasing graduation rates will come in later years as all subgroups move toward 90 percent graduation rates for the city in 2038-39 and as DCPS grows toward a graduation rate of 85 percent in 2021-22.\n\nBuilding on momentum\n\nD.C. graduation rates have increased over the last five years while enrollment has remained flat and demographics have remained largely the same, so the gains are more likely attributed to schools’ efforts instead of population shifts. Although D.C.’s graduation rates have also improved for most subgroups, much work is needed to improve graduation outcomes especially for English Language Learner and Special Education students when compared to similar cities. In addition to school-level efforts, some citywide initiatives are trying to crack the code. For example, Raise DC’s Graduation Pathways Project has created a way for middle schools to easily share crucial information about alumni so that attending high schools can better serve incoming ninth graders. D.C. could also reconsider ninth grade on track as a citywide metric of early high school success.\n\nHopefully, graduation rates will continue to increase over the next five years along with the quality of high school, and D.C. families will select DCPS and public charter high schools in greater numbers. However, graduation rates are not the only measure of high school success, and the city should be careful to align incentives so that all high school graduates leave with the skills they need to be successful in college or their career. The State Board of Education’s ongoing High School Graduation Requirements Task Force has the potential to recommend changes to the city’s graduation requirements and ensure that a high school diploma is a meaningful achievement.\n\nAbout the data\n\nThis analysis focuses on four-year graduation rates throughout.\n\nHigh school graduation data for D.C. are from the Office of the State Superintendent for Education (OSSE) summary of graduation rates for school year 2016-17 and OSSE’s LearnDC DC Report Card for previous years. Adjusted cohort sizes by subgroup were estimated using graduation rates and the number of graduates.\n\nHigh school graduation rates for peer cities are from the U.S. Department of Education’s EDFacts Regulatory Four-year Adjusted-Cohort Graduation Rate files.\n\nGraduation rate targets are from the Every Student Succeeds Act (ESSA) DC State Education Plan for the state and the DC Public Schools (DCPS) five-year strategic plan, A Capital Commitment: 2017-2022, for DCPS.\n\nHigh school enrollment is from OSSE’s enrollment audit data. All schools with reported graduation rates were identified as high schools for this analysis.\n\nSchool-aged population is from the U.S. Census Bureau’s Single Year of Age and Sex Population Estimates (SC-EST2016-AGESEX-CIV).\n\n[1] ACGR measures the percentage of high school students who graduate on time, measured by the percentage of the ninth grade cohort who receive a high school diploma, adjusted for any students who transfer in or out of the school system. The most recent year of national public high school graduation rates with available data is 2014-15 (see National Center for Education Statistics for more information).\n\n[2] American Community Survey’s 5-Year Estimates of school enrollment.\n\n[3] Reliable cohort data from OSSE is only available from 2012-13 onwards.\n\n[4] However, as the adjusted cohort has decreased in size, the number of Special Education students actually decreased slightly.\n\n[5] For information on D.C.’s schools adopting CEP, please see the Food Research & Action Center (FRAC) and the Center on Budget and Policy Priorities.\n\n[6] For the purposes of this analysis, high schools in D.C. serve traditional students, who are usually between the ages of 14 and 17 at the start of the school year, or students who have left traditional schools and seek a high school diploma or the equivalent through an alternative pathway. In addition, a school is considered a high school if OSSE reported graduation rates for the school at any point between 2011-12 and 2016-17.  Goodwill Excel Center PCS has been excluded as it serves primarily adults.\n\n[7] The D.C. Policy Center has identified cities with similar populations, population densities, and economic factors to provide a better peer group for D.C.\n\n[8] The earliest year of ACGR data from OSSE is 2010-11, and the most recent ACGR data from other cities is 2014-15.\n\n[9] Of the 11 peer group cities, Baltimore, Buffalo, Denver, Milwaukee, Philadelphia, and Pittsburgh had large enough African American student populations to report on graduation rates for African American students.\n\n[10] Of the 11 peer group cities, Buffalo, Denver, Milwaukee, and Philadelphia had large enough Latino student populations to report on graduation rates for Latino students.\n\n[11] All 11 peer cities reported graduation rates for economically disadvantaged students. Boston, Denver, Detroit, and Philadelphia reported graduation rates for English Language Learners. Atlanta, Baltimore, Boston, Buffalo, Denver, Milwaukee, Philadelphia, and St", "num_tokens": 2048} {"category": "common_crawl-education_and_jobs", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-education_and_jobs/part-00-00000.npy", "text": " desired behavior. The click sound is followed by a reward, making it easier for your dog to associate the click with positive reinforcement.\n\n7. Be a Clear Communicator: Use Hand Signals and Verbal Cues Consistency in communication is vital during training. Use clear hand signals and verbal cues to accompany the commands you want your dog to learn. Over time, your dog will associate the gestures and words with specific actions.\n\n8. Avoid Punishment: Focus on Positive Learning Never resort to punishment or physical force during training. Instead, concentrate on positive learning experiences that strengthen the bond between you and your pup. Positive reinforcement builds trust and ensures your dog enjoys the training process.\n\n9. Practice Patience During Troubleshooting: Address Challenges Calmly Training may encounter challenges, but it’s crucial to remain patient and calm when troubleshooting. If your dog struggles with a particular trick, go back to simpler steps and build their confidence before progressing further.\n\n10. Seek Professional Guidance: Enroll in Training Classes If you find training overwhelming or encounter specific behavioral issues, consider enrolling your pup in a professional dog training class. Adelaide offers various training programs conducted by experienced trainers who can address individual needs and provide tailored guidance.\n\nConclusion: Teaching new tricks to your canine pal in Adelaide is a fulfilling and rewarding experience for both of you. Through positive reinforcement, patience, and consistent training, you can unlock your pup’s potential and build a stronger bond with your furry friend. Remember, training is an ongoing process, and each small achievement is a reason to celebrate. Embrace the journey and enjoy the wonderful moments of growth and learning with your canine companion.\n\nLeave a Comment\n\nYour email address will not be published. Required fields are marked *<|endoftext|>I. Program Educational Objectives\nThree to five years after graduation, the BS in Computer Science alumni shall:\n\n 1. be employed in the field of computing;\n 2. possess globally competitive skills;\n 3. demonstrate personal dignity and integrity; and\n 4. engage in community development or nation-building.\n\nII. Student Outcomes\nBy the time of graduation, the students will be able to:\n\n 1. analyze a complex computing problem and apply principles of computing and other relevant disciplines to identify solution.\n 2. identify and analyze user needs and to take them into account in the selection, creation, integration, evaluation, and administration of computing-based solution.\n 3. apply computer science theory and software development fundamentals to produce computing-based solutions.\n 4.  design, implement, and evaluate a computing-based solution to meet a given set of computing requirements in the context of the program’s discipline under various constraints.\n 5. apply knowledge through the use of current techniques, skills, tools and practices necessary for the IT profession.\n 6.  understand best practices and standards and their applications.\n 7. analyze the local and global impact of computing information technology on individuals, organizations and society.\n 8. recognize professional responsibilities and make informed judgements in computing practice based on legal and ethical principles.\n 9. function effectively as a member or leader of a team engaged in activities to the program’s discipline.\n 10. communicate effectively with the computing community and with society at large about complex computing activities through logical writing, presentations, and clear instructions.\n 11. recognize the need for and engage in planning self-learning and improving performance as a foundation for continuing professional development.<|endoftext|>Texas Tech University\n\nCMLL Study Abroad\n\nClassical & Modern Languages is home to several magnificent study travel programs. Study abroad can be more enriching than many people realize - a once-in-a-lifetime, thoroughly enjoyable and fulfilling adventure. All of the programs offer academic credit in the concerned language, and each has unique benefits and requirements. Please do not hesitate to contact the CMLL advisors for additional information.\n\nYou can find more information on these programs and other foreign study options to earn language credit here.\n\nPast Study Abroad Opportunities / Archaeological Field Schools<|endoftext|>top of page\n\nImpact of Pisada do Sertão in 2022\n\nWe believe that through culture, as identity, appreciation of history, our origins, the doings and knowledge of our people, it is possible to build a new history, in which we can break limiting cycles. We recognize in culture, creativity, possibility, authenticity and the ability to build bridges and break down walls, creating and providing opportunities for access to human development.\n\nIt is through culture, that Pisada do Sertão has fostered in the region, the importance of valuing your place, the people who live there and what these people produce. Being the Best Cultural NGO in the Country is a recognition that honors every Poçomourense citizen, every Paraibano and every Northeasterner. This legitimacy has strengthened the Organization's actions in expansion and impact.\n\nIn 2022, Pisada do Sertão worked in partnership with 10 municipalities in Paraíba, providing 41,300 services, the number of people served were 512 children and teenagers in socio-educational music activities, dance, reading, play, sport and socio-emotional education, 2,448 families were supported with digital baskets and gas vouchers, 1,495 women and young people qualified in 28 professional qualification courses, and 229 of these were included in the job market.\n\nBased on the data presented regarding 2022, we consider that the biggest impact is in the alignment of purpose of those who do and those who receive. These numbers are possible because the organization sought to invest in its institutional development, both in processes and people.\n\nFrom this management and governance perspective, it is possible to build solid processes and impact more people.\n\nWe continue to believe that Sertão will become a sea of opportunities. And these opportunities are already being built by all of us.\n\n4 views0 comments\n\nbottom of page<|endoftext|>New media moguls\n\n18th September 1998 at 01:00\nIn July, Vivi Lachs described how to collect multimedia materials this summer. Here she shows how they can be used to keep memories fresh\n\nAs you unpack your suitcase and put your clothing, presents and souvenirs into piles, stop for a minute to collect your thoughts. Soon, the new school year will be so hectic it will cloud your holiday memories. But in your souvenir pile, you have the largest pine cone you've ever seen, a tourist brochure about a glacier you explored, a piece of sea-swept glass, postcards you forgot to send and trinkets bought in the market. Among the rubbish, there are airline tickets, a piece of hotel notepaper, baggage labels and a pile of sand.\n\nDon't throw your rubbish away, or put the souvenirs in a drawer never to be seen again. Make your holiday work for you and create a multimedia \"virtual\" holiday, or turn it into multimedia \"virtual\" curriculum work.\n\nIn a geography class, pupils can insert landscape holiday snaps on to the computer from a photo CD-Rom, with a voice-over description added for good measure.\n\nThey can set up the system so that when you click on a particular landscape feature, the computer zooms in to show more detail. For example, click on a coastal area and a written explanation of high-energy environments could appear on a background of scanned-in sand and shells.\n\nIn a science class, pupils can scan in pictures of a particular habitat from a holiday brochure. The picture may not contain the animals they might want, but they can easily cut and paste those they do want from other holiday photo-graphs. These can perhaps be animated, so that they run or fly when you click on them, with a link to another screen of information about the animal and the sounds it makes.\n\nSo what do the pupils get from using information and communications technology in, say, a science or geography project in this way? Presenting what can be an extensive range of materials as a mixture of pictures, text and voice-overs helps to develop a fairly in-depth subject knowledge.\n\nAt the same time, pupils will be developing some higher-level skills. Making interactive multimedia involves combining media in a complex manner while considering who is the target audience, and how the final presentation will actually be used.\n\n\"That's all very well,\" I hear you say, \"but I've got 31 pupils, one computer, restrictions on my curriculum time, and you want me to learn a whole new computer program!\" The first time you work on a new project, it may well take longer than subsequent times, but it can be a part of the curriculum, within subject and ICT time, and can be managed with one computer.\n\nLike any whole-class project, it needs planning. There will need to be discussion, explanation and thought. It is ideal for group work since a subject can be split into different aspects, which small groups can research and work on. In a Year 9 science piece on the periodic table, for instance, a pair of pupils can have a different element to work on.\n\nThe real key to producing multimedia work is that much of it does not have to happen on the computer. A scanner is one of the most important pieces of equipment a school can have. It can be an inexpensive addition enabling the scanning of artwork or models into the computer. Pupils' work in paint, crayon, pencil and material could end up as a digitised portfolio - even three-dimensional items can be scanned.\n\nThe whole class can work out the the project's interactive structure, research the ideas and draw images both on and off the computer, so just having one computer does not need to be a disadvantage. Groups can input their material on to the computer at different times throughout the week or term.\n\nShowing work half completed to the target audience can help pupils think critically about the material and respond to suggestions, thus improving the quality and clarity of the final product.\n\nAnd the technical bits can mostly be learned on the", "num_tokens": 2048} {"category": "common_crawl-education_and_jobs", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-education_and_jobs/part-00-00000.npy", "text": " since most high school graduates in the United States come from backgrounds of economic disadvantage.  Even with an increase in scholarship funds at prestigious universities, the news is not all good.  Attending college incurs costs for students beyond tuition or room and board. Students must often still pay for books and technology like personal computers or tablets, and students must also consider expenses for travel, clothes, bedding, and personal effects including toiletries.  These expenses are unusually not covered by financial aid scholarships.\n\nMore importantly, not all colleges and universities are as large or prestigious as schools like Stanford, Princeton, or Harvard.  Those schools have endowments – basically savings accounts funded through alumni donations – worth billions of dollars, and can afford to offer scholarships to a large percentage of incoming freshmen.  Those schools are betting that some or more of those freshmen will graduate and move on to great wealth, achievement, or fame, and return to donate money in the future.\n\nSmall private colleges and public universities often do not have endowments matching those of the most prestigious schools.  Small colleges may be too young, too historically local, or cater to too niche a population to have built a large endowment.  This limits the ability of a school like that to offer a large number of scholarships or any number of full scholarships.  Public universities, also known as state schools, have strict budgets set by state legislatures and some of them were not allowed to even accept donations from alumni for much of their history.\n\nSo while the most prestigious, and often most expensive, colleges and universities increase the number of students earning scholarships and increase the value of those scholarships, students attending the majority of the rest of colleges will not see any such financial relief.  Instead, most students will continue to see the cost of higher education rise, making a search for alternate funding, including third party scholarships, more important than ever.<|endoftext|>How to Write a 3 Paragraph Essay\n\nHow to Write a 3 Paragraph Essay\n\nThree paragraph essays are common assignments in almost every career, particularly in high school and college. Since any subject may require the student to write a three paragraph essay, it is therefore important to understand expected format and guidelines to come up with a strong three paragraph essays. Ideally, these three paragraphs essays are merely one page but with an introduction, one body paragraph and a conclusion. This text will explore how to write a good three paragraph essay.\n\nWhile writing a three paragraph essay, it is impeccable to start with a hook since the text should be brief but interesting. Choose a creative way to introduce the topic sentence and to capture the audience’s attention. The introduction sentence for a three essay text ought to be a generalized statement about the research topic to provide the reader with a basic idea about the thesis statement. The use of quotes, anecdotes and quips help to make a great hook within the introduction paragraph.\n\nThe second part of the three paragraph essay is body paragraph. All the points should be arranged precisely to sandwich the weakest points within the body. The writer should begin the body paragraph with a topic sentence that states the point and connects it back to the thesis. The topic sentence will help to control the rest of the points in the second paragraph, just like thesis control the entire essay. Lastly, the writer should provide evidence and examples to back up points.\n\nThe last part of a three paragraph essay is a conclusion. Here, the writer should restate the ideas previously expressed in the thesis statement. The conclusion is not merely copied and pasting the thesis but rewriting the thesis with a weight of an argument behind it. Since the readers have a clue about all the points in the text, the conclusion section should reflect all this.\n\nBased on articles from write my essay.ca<|endoftext|>Ways to start off an essay introduction. How to Start a College Essay 2022-12-17\n\nWays to start off an essay introduction Rating: 5,1/10 1207 reviews\n\nAn essay introduction is the first paragraph of your essay, and it is important to make a good impression on your reader. Here are some ways to start off your essay introduction:\n\n 1. Use a hook: A hook is a catchy phrase or an interesting fact that grabs the reader's attention. For example, you could start your essay with a quote, a rhetorical question, or a statistic.\n\n 2. Provide background information: In some cases, it may be necessary to provide some context or background information before you can dive into your main argument. This can be especially useful if your topic is complex or unfamiliar to your reader.\n\n 3. Define key terms: If you are using technical or specialized language in your essay, it may be helpful to define these terms for your reader. This will help ensure that your reader understands the key concepts that you are discussing.\n\n 4. Introduce your thesis statement: Your thesis statement is a one-sentence summary of your main argument. It should be included in the first paragraph of your essay, and it should give your reader a clear idea of what your essay is about.\n\n 5. Use a story or anecdote: A personal story or anecdote can be a great way to engage your reader and make your essay more relatable. By starting your essay with a story, you can draw your reader in and make them more invested in your argument.\n\nNo matter which approach you choose, it is important to make sure that your introduction is clear and concise. Avoid using too much jargon or unnecessary details, and focus on making a strong first impression that will keep your reader engaged throughout the rest of your essay.\n\nHow to Start a College Essay\n\nIn this example, you might start with a broad statement about teaching math, then teaching math in kindergarten, then state your full thesis. You have a limited amount of time to grab your reader and pull her in, so don't make her yawn in the first sentence. Use our essay writing tips and put yourself in the readers' seat. Write the second paragraph On longer papers, you may have a multiple-paragraph introduction to set up the paper. ADVERTISEMENT The first sentence of your scholarship application is your first, best and possibly only chance to capture your reader's attention.\n\nIntroductions: Giving Your Scholarship Essay a Solid Start\n\nIf your experience gives you a unique perspective on the essay's topic, show your reader this. Frame your conclusion as a simplified hint about the direction in which you will be moving, rather than a detailed or technical statement. With a solid introduction and a thoughtful and well-written response, you'll be well on your way to writing a Get instantly matched to scholarships that meet your skillset, strengths and unique talents. Before inevitably being whisked away into a shopping cart, I scaled a mountain of plush toys and surveyed the expanse that lay before me: the kingdom of Costco. This is often in the form of a personal statement and typically takes the form of an English Essay. Establish a personal connection. Professional academics recommend drafting a few intros to your work and selecting the one you like best.\n\nFive Different Ways to Start an Introduction for a Research Paper\n\nYour college essay intro should have the audience at the edge of their seats from the jump. Keep it authentic from the beginning to the end. Many students choose to speak directly about their experiences, immediately showing vulnerability and earnestness from the introduction of their essay. Writing a strong essay opening is important. Additionally, when you over-explain yourself in your introduction can also come off as unconfident. It allows you to position yourself against other critics and can add a lot of clout to your argument if used well.\n\nHow To Start An Essay [Examples + Tips]\n\nSome of the best advice I give my first year composition students is to focus on creating a strong opening. A dictionary of quotations can help you find quotations related to your topic. The number one time killer. A hook lets you impart the significance without having to lengthily explain why your topic matters. Having a sense of humor about your faults is an excellent trait, as long as you learn something in the end.\n\n8 Ways to Start an Essay (with examples) — Intro to Honors\n\nMy dad can be a Spanish interpreter, but he lacks education,my friend was terminated early because of age. They will want to see how you answer the questions close the curiosity loop and will be more compelled to keep reading with interest. In the beginning, be sure to be on point. Does this mean men are more honest than women? Consider leading with your thesis, or at least some of the information or realizations that guided your essay towards its thesis. FAQs: How to Start a College Essay Here are our answers to your most frequently asked questions about how to start a college essay. Choosing a topic is a daunting process, and grabbing the reader's attention in an introduction can seem all too impossible. Another recommendation is to get away from distractions and ensure you have a productive environment.\n\nThen, try using this technique in your next paper! Instead, give a definition while hinting at the angle, focus or thesis of your paper. You can do so with humor, intellect, and sensory descriptions, beginning with the end or by using one of our five methods. The idea of this work is to be fun and allow students to show their creative sides. How Do You Start a College Introduction Essay? First, there are a few ways to open an essay. What Should You Not Start a College Essay With? Make sure the story you tell fits these criteria and actually enriches your essay and contributes to your overall message. Get some honest advice to see if they are interested in what would follow.\n\nThen you are ready to place the thesis statement for the reader to keep in mind as they go through your work. Persuasive essay The world is full of skeptics and what better way to show them the truth than to write a compelling paper showing them why a particular theory is correct. Keep it to the point, genuine, and start where the story gets interesting. You may also encourage the readers to take action or to further investigate areas that were beyond the scope of", "num_tokens": 2048} {"category": "common_crawl-education_and_jobs", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-education_and_jobs/part-00-00000.npy", "text": " they receive information from different sources:\n\n • Their own expectations about the oral or written text.\n • Their predictions about what they will be listening to or reading.\n • Nonverbal information or paralinguistic written clues which facilitate understanding.\n • Other information stemming from visual or aural support.\n • construction of meaning does not only concern the oral or written text; rather, meanings are derived from the active interaction amongst reader or listener and the text. Through this interaction, learners obtain the information they need or the one they are able to interpret according to their knowledge. In other words, any text is interpreted in a context due to the previous mental schema of the students. Depending on their ability and degree of previous schemata, this interpretation can be literal or according to the real intention of the text.\n\nThis idea of interaction and value of the learner´s previous knowledge to interpret a text leads to an important concept: schema (plural schemata). The schema theory describes the process by which learners combine their own background knowledge with the information they receive from a text to understand that text. This means that the schema theory is based on the idea that in every act of comprehension, our own knowledge of the world is involved; thus, the extent to which we interpret a text correctly may depend on our previous knowledge about the reality the text refers to.\n\nHarmer (2000) provides a practical example to explain that understanding a piece of text involves much more than knowing the language. If a British reads in a newspaper: “England in six-wicket collapse”, he will probably guess that England has been beaten in an international cricket match; since his pre-existing knowledge of newspapers and how headlines are constructed, his understanding of “wicket” as a cricketing term and probably his knowledge that England has not been doing too well lately, will lead him to that conclusion.  When that person reads the article, he will be applying all this pre-existing knowledge to predict content before and after reading it. On the other hand, it is very likely that a reader who did not have that previous knowledge about cricket would not have reached such conclusions. And certainly, if the reader was a Spanish student of English, he would probably have to read the whole article before understanding the headline.\n\nFrom the previous example, we can draw to some conclusions: activating the students´ schematic knowledge is essential to ensure correct understanding; to do so; FL teachers must provide the opportunity to enlarge the students´ schemata through some activities before facing the text itself; that is, pre-reading or pre-listening. Therefore, in order to enhance the learners´ comprehension competences, we should start by ensuring that our learners´ schemata will help them understand the text adequately.\n\nListening is vital for FL learning because it provides input for the learners. However, teachers should bear in mind that children concentrate and listen with understanding more effectively if they are motivated and engaged in meaningful and enjoyable activities while listening. An interesting strategy from a methodological point of view is to involve children in the active process of listening through purposeful tasks, so that they can see the usefulness of the FL. We can do this by using activities which actively support learners’ understanding and guide their attention to specific parts of the spoken text.\n\nSabrina Peck (2001) highlights that children need to listen and speak about something that interests them (children-centred). Many authors advise the holistic perspective focusing on the child and point out some hints about the matter:\n\n • Focus on meaning, not correctness.\n • Focus on the value of the activity, not the value of the language.\n • Focus on collaboration and social development.\n • Provide a rich context, including movement, the senses, objects and pictures, and a variety of activities.\n • Treat the learners appropriately in light of their age and interests.\n • Use language for authentic communication, not as an object of analysis.\n\nVideo by ESL Resource Bank\n\n • Anderson, A. and Lynch, T. “Listening”. Oxford University Press. 1988.\n • Cameron L. “Teaching Languages to Young Learners” Cambridge University Press. 2001.\n • Harmer, J. “The Practice of English Language Teaching”. Longman. 2001.\n • Rost, M. “Handbook of Research in Second and Language Teaching and Learning” LEA PUBLISHERS. 2005.\n\nDeja un comentario<|endoftext|>Skip to Main Content\nToday's Hours:\n\nWhen reading long or complex journal articles, take a strategic approach to manage your time, focus, and energy. \n\nIn fact, skipping around is encouraged when reading scholarly articles.  By following the suggestions described below, you can quickly determine if the article is relevant to your research and if you should do an in-depth reading.\n\nStrategic Reading: Journals\n\nNew student researchers might find scholarly journal articles intimidating, but do not be afraid to engage with this type of information.  Develop a strategy for reading these articles, so you can find useful information without reading a long, complex article that's of no real use to your topic.\n\n 1. Read the ABSTRACT -   This should give you just enough information to let you know the basics of the article. From this, you will know whether you should continue reading or look for something different.  \n 2. Read the INTRODUCTION and RESULTS  - These sections will provide you with the hypothesis of the article and what the author(s) learned through the research process.\n 3. Read the DISCUSSION - This section should tell you what the authors felt was significant about their results.\n 4. (If needed) Read the METHODS/MATERIALS - These sections provide the details of how the study was performed. There should be enough specifics so that you could repeat the study if you wanted. \n\nStrategic Reading: Scholarly Books\n\nBooks don't often have an abstract that summarizes the main points of the material, but you can learn to skim a book so you don't waste time reading information that is irrelevant to your research.\n\n 1. Table of Contents - this will give you a general idea of what the book covers. If there is one section in particular that focuses on your topic, consider reading that section.\n 2. Preface and Introduction - the preface provides key information the author believes is important to their work. The introduction sets up the author's argument and should outline the information to follow.\n 3. Skim the contents - read introductory and concluding paragraphs in each chapter. \n 4. Read the relevant sections - focus primarily on the information that relates directly to your research paper.\n 5. Take notes - record the page numbers of important thoughts, quotes, and details.\n 6. Data - look at the charts, graphs, or other illustrations.  They might provide useful information for your research paper.\n 7. Index - check the index for important people, terms, or events.\n\nCAUTION:  This process does not work well with fiction materials.<|endoftext|>7 paper-free nature play activities for the classroom\n\nPublished: November 21st, 2021\n\nNurturing offline interests is just as important as developing tech skills for children. Nature play significantly improves all aspects of child development – physical, cognitive, social and emotional. It also targets a wide range of skills from maths and science smarts to interpersonal communications.\n\nAs screentime rises and outdoor play declines, we have to make sure children are getting in the recommended time of outdoor play. Here are some paper-free nature play ideas for your classroom:\n\n1. Map it out\n\nUsing the Instant Whiteboard app on your ActivPanel, draw out a map of your school’s outdoor area. Have students go out and find a particular item (a certain type of leaf, gumnut etc.) and then come back and mark what they found and where they found it on the map.\n\nYou can then use this map for further project work, such as discussing why they may have found an item in a particular location, such as proximity to a tree or soil type.\n\n2. “X” marks the spot\n\nFlip the above activity and map out a certain area in your school like a sandpit or small patch of bushland, then bury/hide special items, marking their locations with Xs. Create a key for your map with a drawing/description of each different item, that students can then identify upon discovery.\n\n3. Forager hunt\n\nList specific items that children have to find in groups. List the items in the middle of the screen, with group names in the four corners of the ActivPanel. When the groups have found an item, they must then drag and drop the item into their group’s section. The group with the most items wins! You can then use the foraged items for teaching opportunities.\n\n4. Living art\n\nGet crafty with foraged finds and make sculptures or 3D scenes with natural materials! Keep things au natural by using natural twine or try these natural homemade glue recipes. This is a great, environmentally-friendly way to use free, abundant resources to create art, and encourages nature play in the process.\n\n5. Make like a tree\n\nDraw the outline of a tree using the whiteboard app. Have students go and find a certain kind of leaf, nut, and flower. Have them come back and draw what they’ve found on the ActivPanel, or onto a connected personal touchscreen device. Collate the images at the end and arrange onto the tree to finish off the tree with the drawings. This is a great paper-free activity that young ones will enjoy!\n\n6. Garden goodness\n\nStarting a garden in your school is a great activity for older children to get involved in nature play. Have students document the stages of their plant’s life, and use this information in further project work in areas like biodiversity, sustainability, and ecology. If", "num_tokens": 2048} {"category": "common_crawl-education_and_jobs", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-education_and_jobs/part-00-00000.npy", "text": " Introduction to lungeing\n\nOptional units you can chose from:\n\n- Introduction to Biology\n- Riding horses\n- Assist with the transportation of horses\n- Competition Grooming\n\nWhat’s next?\n\nUpon completing this programme, students are well-prepared to either step straight into a career or progress to higher-level studies. Students typically secure roles at riding schools, livery yards, or within equine welfare organisations. For those looking to further enhance their expertise, the course offers a seamless transition to a Level 3 qualification in Equine Management, opening doors to broader opportunities in equine health and business management. This path not only deepens practical skills but also expands theoretical knowledge, perfectly aligning with the aspirations of passionate equine enthusiast<|endoftext|>English descriptive essays\n\nEnglish descriptive essays, One of the most popular forms of essays, it is important to grasp how to write one look at our samples of descriptive essays to understand how to write them on your own.\n\nEnglish essays: descriptive paper descriptive paper this essay descriptive paper and other 63,000+ term papers, college essay examples and free essays are. Though the word essay has come to be understood as a type of writing in modern english the following genres of essay writing: expository essays descriptive essays. Tips on writing a descriptive essay writers use the descriptive essay to create a vivid helps esl students develop a better understanding of the english language. Free essay: all of them were holding on to their lovely flowers as for the nicely shaved men wearing matching black tuxes and purple ties, they were lined. Descriptive essay sampleadam gardner freshman english a 11/16/12 t/r 1:30pm into the wild blue yonder most people. Here you'll find 50 descriptive essay topics to help generate writing ideas topics are grouped by people, places, objects and memories click here.\n\nTypes of descriptive essay descriptive essay with discursive approach = descriptive in style, with an issue to discuss what does this look like in practice. What is a descriptive essay the descriptive essay is a genre of essay that asks the student to describe something—object, person, place, experience, emotion. Free descriptive papers, essays, and research papers my account search results free essays that year in honors ap english, my whole writing style was turned. Definition of descriptive in english: or passages of descriptive writing to misunderstand that dictionaries of the english language are descriptive.\n\nFree essay: not all were completely there after the alcohol had got the best of them, but they were definitely lively one too many drinks were drunk, and. How to write a descriptive essay topics buy custom-written descriptive essay from buyessaysafecom 24/7 order tracking and get a discount now.\n\nDescriptive writing calls for close attention to details to help you get started here are 40 topic suggestions for a descriptive paragraph or essay english grammar. Descriptive writing - an extensive collection of teaching resources for ks4 english writing, including letters, stories, autobiography, poetry & persuasive writing. Descriptive essay, essay writing - an english articles for the english magazine.\n\n • Descriptive essays can be the easiest essays to write, once you come up with a good topic here is some bits of advice and a nice long list of 100 great descriptive.\n • List of descriptive essay topics of all different types of essays a student may have to write, the descriptive one is by far the easiest they are often relaying a.\n\nExtracts from this document introduction the match - descriptive writing all of us were extremely excited because of this match it was the most important one we. 100% free papers on descriptive essay sample topics, paragraph introduction help, research & more class 1-12, high school & college.\n\nEnglish descriptive essays\nRated 4/5 based on 26 review<|endoftext|>Ce que nos anciens élèves ont à dire.\n\nStudents who participate in the Student Involvement Program tell us that it is a wonderful learning and networking experience that would be hard to replicate in any other setting.  It’s also lots of fun!  See below to read about the experiences of our past students.\n\nProgramme d’implication des étudiants 2018\n\nAvi Motov, University of Calgary\n\n“The Foundation was extremely welcoming, all the Board members including the members joining were very pleasant to talk to. They always introduced us to other Conference attendees and gave us such critical advice. They weren’t just chaperones, they really put an effort in making us feel comfortable but also help us make the most of the opportunity.\n\nWith respect to the Conference, the educational sessions were great, I personally enjoyed the update in captives and insurance linked securities sessions as those are two niche areas within the industry in which I could see myself being a part of.\n\nMy favourite part of the Conference was the second night where all the Board members and recipients had dinner together and we had the opportunity to ask each other questions. To hear why the Board members were volunteering their time and effort to really give back to the industry and future leaders was very enlightening. It was 100% worth my time and missing a week of studies, I gained so much from the sessions and networking events and I really hope to give back to the industry one day like the Board members have.”\n\nAdrian Ng, University of Calgary\n\n“Our first group dinner was notably significant because it set the tone for the entire trip. The night provided an opportunity to meet and connect with all the sitting board members of the Foundation, know what to expect during the Conference, and realign my priorities to achieve my goals. Everyone was ever so willing to share their career stories and passion for the industry, leaving me with a deep sense of encouragement, optimism, and belonging.\n\nI really appreciated sitting-in for the Foundation’s AGM and meeting everybody on Sunday. We were continuously introduced to potential employers and mentors, some of which I have kept a working relationship with.\n\nOne month after the Conference, I am still overwhelmed by the level of comradery and kinship displayed by the industry. Everyone was keen to meet students and share their stories and life experiences with enthusiasm. I got to shake hands with many industry professionals from diverse backgrounds and technical expertise.”\n\nBianca Neves, British Columbia Institute of Technology\n\n“I would like to start expressing my sincere gratitude to all Board members for making the McGannon Foundation awards possible. This selfless and generous work you provide through the Foundation is truly inspiring. The week we spent together exceeded all of my expectations. I was touched in ways that I could not even expect: not only I came back home more passionate about this industry, but also with the urge to give back to the community someday, just like you do.\n\nThe entire experience was rich and intense. We had the opportunity to attend several educational sessions and hear intakes from the top risk management professional in the industry. The variety of topics discussed is overwhelming! I felt that all scholars are now a step ahead of the game, as we had the chance to learn things beyond the scope of a traditional insurance education. The extensive networking was an amazing opportunity to meet professionals from a variety of fields. In addition to that, it certainly helped me develop and get more comfortable with networking as the days passed. Coming back to school, I noticed that even public speaking became easier for me, and I’m sure the conference was the reason behind that.\n\nI started this experience not really knowing which insurance field would be a better fit for me once I graduate. After a week of total professional immersion, I had a clearer picture of the industry and a better understanding of which paths I want to take.”\n\nHoda Azouji, British Columbia Institute of Technology\n\n“Thank you for such a great experience that the Foundation created for me! I will never forget the value of what you have done for me. This Conference was my first experience of being in a Canadian community and helped me to understand my future career and set my expectations.\n\nThe Conference itself was a valuable experience, and the combination of what the Foundation did for the students with the well-organized plan made it more worthwhile. At the same time, the opportunity of meeting and talking in person with the most successful people in the industry made the conference even more beneficial.”\n\nBrent Vansickle, British Columbia Institute of Technology\n\n“The days were full-on, up first thing to prepare for a long day of speakers and educational courses. Then a full evening of being whisked around to many events where we would be introduced to influential individuals in the industry as well as possible future employers\n\nThe amount of networking I was able to do was amazing! I did my best to maximize my exposure over the short conference; being invited to so many evening events really allowed that to happen. It led to many long nights, but it was truly worth it. I have already been contacted for possible employment opportunities.\n\nI was very happy to see how the McGannon Board received me and the other students. I can tell they are all champions of the industry and are sincere in their commitment and support of the students. Thank you very much, I hope one day I will be able to return the favor to the students of tomorrow.”\n\nProgramme d’implication des étudiants 2017\n\nRosiane Ferreira, British Columbia Institute of Technology\n\n“Attending the 2017 RIMS Canada Conference exceeded all my expectations. It was a pleasure getting to know all the Foundation directors and network with so many successful risk management professionals across Canada. Additionally, the opportunity to meet such brilliant students involved in risk management and share my expectations and challenges of the Conference with them. As we got along so well, it made my experience even more amazing.I really appreciated the Director’s efforts put into the Foundation and for the time and consideration with us in Toronto. The McGannon Foundation made me feel very welcomed by the Risk Management community. Beginning with my interview, Joe and Marley were very pleasant and explained all the details of the Conference if I was chosen. Wayne did an exceptional job coordinating and supporting us for over a month by", "num_tokens": 2048} {"category": "common_crawl-electronics_and_hardware", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-electronics_and_hardware/part-00-00000.npy", "text": " you sit there for hundreds and hundreds of clock cycles waiting for that memory access. It's not a good way of spending your CPU time. In in AMD's case it's just half the latency. I can't speculate in public here when Intel will have a memory controller on the chip, but...\n\nBechtolsheim: Exactly.\n\nNow the other part is the HyperTransport interconnect that gives AMD a much more scalable story. We're not launching this product next week, but obviously one key attraction of Opteron was that it scales up to eight (processor) sockets, and Intel does not have that either. They are talking about more scalable things later on, but not in the near future.\n\nDoes it require a whole new chipset to do an eight-socket server, or is that something you can just rely on HyperTransport to do?\nBechtolsheim: HyperTransport interconnects the CPUs. There's no other chip investments we had to make to bring these systems to market. So the natural ability of Opteron goes up to 8-way, correct. Whereas in the Intel case, IBM spent $100 million in an effort to do a chipset to make the Xeon MP more scalable.\n\nDo you think Itanium is going to catch on widely?\nBechtolsheim: They shipped about 5,500 systems last quarter. If you look at the IDC numbers, if you get beyond the Intel hype and look at the actual number of systems shipped, they're so small that we can't figure out why anybody is bothering with this. It's just amazing how few of the systems are shipping. What's happening is they're losing the software support. A few years ago, this was projected to be the next $20 billion market, and all the software vendors said, \"If that's the case, then we will support it,\" but now nobody is making any money, so the software vendors are investing where they can make money. The industry is consolidating on (64-bit x86 servers).<|endoftext|>Adapter needed\n\nDo I need a travel adapter for a trip to Burma?\n\nYes, you need a travel adapter (plug adapter) for a trip from Canada to Burma. In Burma, people are using different plugs and electrical outlets that are not compatible with plugs from Canada!\n\nBurma und Canada compared\nFlag: Canada\nAOutlets of type ABOutlets of type BOutlets\n120 VoltVoltage\n60 HertzFrequency\nFlag: Burma\nAOutlets of type ACOutlets of type CDOutlets of type DGOutlets of type GIOutlets of type IOutlets\n230 VoltVoltage\n50 HertzFrequency\nPower sockets\n\nWhich types of power outlets are used in Burma?\n\nBurma uses power outlets of type A, C, D, G and I. Electrical outlets of type A and B, which are common in Canada, are only partially used in Burma.\n\nCountry information\n\nAbout Burma\n\nFlag: About Burma\n\nBurma is a country in Asia (South-Eastern Asia) with about 56.3 Millionen inhabitants on an area of almost 677 000 km². The capital of Burma is Nay Pyi Taw (925 000 inhabitants).\n\nPeople in the country are mainly speaking Burmese.\n\nThe neighbors of Burma are Bangladesh, China, India, Laos and Thailand.\n\nTLD: .mmCurrency: MMKCountry calling code: +95Country Code : MM\nMains voltage\n\nWhat is the Electricity Voltage in Burma?\n\nThe voltage in Burma is 230 volts.\n\nThe voltage, therefore, is higher than the 120 volts in Canada. This difference means that you have to be cautious when using electrical devices purchased in Canada:\n\nYou should read the instruction manual of your device and check at which voltage it is safe to use.\n\nIf the voltage stated in the user's manual or on the device's power supply differs from the mains voltage in Burma, you should either not use your device there, or buy a voltage converter before departing.\n\nUtility frequency\n\nWhat is the utility frequency in Burma?\n\nThe utility frequency in Burma is 50 Hertz.\n\nThe frequency, therefore, is lower than the 60 Hertz in use in Canada. This difference may not be a problem for most of your devices, but you still have to be cautious:\n\nDevices that either measure time, or are equipped with moving and rotating parts, are particularly dangerous! So, if you plan to use shavers, heaters, kitchen appliances or alarm clocks in Burma, read the instruction manuals to see if these devices are safe to use on the local utility frequency.\n\nIf the mains frequency specified in the manual or on the power supply is different from the rate used in Burma, you should not use the device!<|endoftext|>Will the Apple iPad Change the Real Estate Business?\n\nThere have been many rumors, thoughts and questions about the new Apple iPad. There are still some unknowns about the product but overall it stands to create a different way to conduct real estate business. The iPad offers features that will have a positive effect on Realtor marketing.Apple Tablet (iPad) Information:• Price• Portability• Paperless• User friendly:PricingThe iPad ranges in price from $500 – $1000.PortabilityPortability of the iPad makes this a sought after device in the circles of Realtor marketing. The iPad is of a size and weight to easily slip into a briefcase or bag. It should be much more portable than even a laptop. The portability of the iPad makes it desirable for those agents who do not have a traditional office and has to have computer access in nontraditional places such as their car on other locations where Wi-Fi is available.PaperlessThe tablet is to have the ability to accommodate electronic signatures as is currently used by UPS when you are sending or receiving packages. The availability of electronic signatures for contracts that can be pulled upon on the iPad may bring to reality the paperless system which was previously only been a dream. This feature is sure to provide the WOW factor for real estate clients using this technology with the iPad to close their real estate deals.User friendlyThe iPhone and various other smartphones offering touch screen technology are known to offer ease of learning. The learning curve is not very long and is actually considered to be short. If the iPad becomes heavily implanted in the world of Realtor marketing both vendors and MSL will have to pay attention and make the necessary adjustments to provide compatibility with the iPad.Vendors, Realtors, and MLS offices that have not updated or changed their websites to be compatible with the iPad should seriously consider doing so as soon as possible before the iPad is in the hands of their potential clients. Those involved in Realtor marketing with iPad compatibility will have an advantage in the market, attracting more leads with the use of this new technology.<|endoftext|>Fri, 27 Jan 2023\n\nHow to troubleshoot common Wyze cam error codes?\n\n10 Jan 2023, 16:22 GMT+10\n\nHaving a Wyze Cam in your home allows you to stay connected and monitor your home whenever you're away. With wyze camera setup, you can be connected to your home from any part of the world on a single screen.\n\nBut, like any technology, it can have its share of issues. If you come across any error codes while using your Wyze Cam, here are some common error codes that you may encounter with your Wyze camera and some possible solutions:\n\nError Code 10: \n\nWhen troubleshooting Wyze cam error codes, one of the most common issues encountered is Error Code 10. This type of error indicates that the camera has difficulty connecting to the internet. By following these simple steps, you can take to help rectify this issue.\n\n • Firstly, try moving the camera closer to your router or wireless access point if it's too far away. The physical distance between devices can affect connection speed and strength.\n • Secondly, make sure both your camera and router are on the same 2G/5G band, as this could be causing interference with your signal and result in an unstable connection.\n • Finally, check for any other devices connected to your network that may take up bandwidth and slow down your speeds.\n\nError Code 11: \n\nError code 11 is one of the most common error codes experienced by Wyze cam users. This error means that the camera's Wi-Fi connection is unstable, and it can be highly frustrating to deal with. Fortunately, these steps that you can take to troubleshoot this issue.\n\n • The first step is to move the camera closer to your router. If the camera is too far from your router, it may not be able to connect correctly.\n • Secondly, try restarting both your router and camera. This will reset any connections and make sure everything is up-to-date.\n • Finally, if these steps do not work, contact Wyze's customer service team for assistance. They will help you figure out what's wrong and get your Wyze cam back up and running in no time.\n\nError Code 12:\n\nThis error indicates that the camera is having trouble connecting to the Wyze server.\n\nTo troubleshoot this issue, try restarting your camera and ensuring it is connected to a reliable Wi-Fi network. If the problem persists, ensure you have all of the necessary software updates installed and any other configuration settings that might be needed. Additionally, check whether any background applications on your device could interfere with connectivity.\n\nError Code 13:\n\nWyze error code 13 is one of the most common Wyze cam error codes. This error message means that your camera's firmware is out of date and it needs to be updated.\n\nTo do this, you can use the Wyze app to check for any available updates, or you can go to wyze.com login to get the detail about their Wyze cam. To update your camera's firmware, you must open the Wyze", "num_tokens": 2048} {"category": "common_crawl-electronics_and_hardware", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-electronics_and_hardware/part-00-00000.npy", "text": " when connected to my 3T and MSI laptop allowed for a 16-step volume adjustment although when connected to the xduoo x3ii, volume was fixed and can't be adjusted either from the DAP or from the Beam itself. The play/pause function worked great as well and pressing it twice allows for a track skip and 3 presses allows for a previous track playback.\n\n Sound Quality\n\n Sporting the ESS Sabre 9118 DAC chip which integrates the AMP on its circuitry already poses the Beam to exhibit a neutral sound signature. It didn't diverge from the predicted signature and after a month's use with it, it indeed showcased an overall neutral sound signature.\n\n The Audirect Beam's ability to decode DSD format made it a great companion for my laptop when I'm out and away from the reach of my Sony CAS-1 system. The sound output the Audirect Beam that made it great was its ability to have an almost pitch black background. It gave no hisses with any of the IEM's (BGVP DMG, DM6, Whizzer Kylin and Periodic Audio Be) I used it with.\n\n Adding the Audirect Beam in my audio chain (OnePlus 3T and MSI GF62 8RE with Foobar2000 v1.4) gave the lower frequency more depth and impact than extension. The midrange frequency improvement was focused on the upper midrange giving the sound a fuller resolution, clarity was notable as well compared when the Beam was removed from the chain. The higher frequency changes was minimal at best with treble extension made for a more articulate sounding experience. Imaging and soundstage was where the Audirect Beam made its mark, the instrumental harmonics were far more distinct and defined with emphasis on the depth rather than the left to right panning feature. The overall sound improvement given by the Beam was a crispier and clearer signature without much audible coloration to the sound.\n\n With a name like “Beam” to be chosen to carry Audirect’s current TOTL DAC/AMP to new places, it is actually on point. The Audirect Beam makes for a compelling purchase given it is feature packed on a tiny body. I would personally prefer a less edgy silhouette or maybe just maybe a silicon case to make it usable while on the pocket when paired with our mobile devices. The two things the stood out as the biggest drawbacks for the Audirect Beam was the cable material change it made as it may serve a bad taste for those that purchased the Beam before the improvement. This feedback may be relative but I’ve asked around and the new connection cables were indeed much favored. The lack of the exact power draw numbers also leaves potential battery conscious audiophiles a void only filled by an actual device audition and usage. These drawbacks were however blanketed by the Beam’s ability to provide pitch black sound background with a clearer signature to any potential audio chain it will be added to. A bridge was crossed and not burnt with the Audirect Beam.\n 4. Palash\n An All-rounder\n Written by Palash\n Published Feb 12, 2019\n 4.5/5,\n Pros - Size (Ultra Portable),\n Vast connectivity,\n Physical controls,\n No background noise,\n Good sound,\n Lower power consumption,\n Cons - Lower frequency response could have better,\n Volume source dependent,\n Micro USB to Type C OTG cable not supplied.\n September16, 2016 Apple announced their iphone 7 without a headphone jack; but why? Because they have the ‘Courage ‘to do so. Wireless innovations knocking our doors and we still thinking about a headphone jack, the immediate answer for a missing headphone jack was Bluetooth headphones/Earphones. We all know the cause /effect theory but one thing to remember, a single cause can give birth many effects or I call them possibilities. One such possibility was ‘portable HI-FI ‘in palm of your hand. Popularity of type ‘C’ port strengthened that possibility and an ‘Ultra portable HI-FI ‘is here branded as Audirect Beam. Beam is the successor of Wistle DAC AMP from Audirect and I would like to thank Penonaudio for providing me a unit for review. In this review I have tried to cast my honest opinion on this ultra portable DAC AMP. One more thing, my review unit was supplied to me before Beam passed the High-Res certification so no high res sticker in my unit. At the time of writing this review Beam already successfully passed the High-Res certification.\n\n Output Power\n 114dB TND+N, 2Vrms into 600 Ohms,\n 108dB THD+N, 49mW into 32Ohms 1.1Vrms,\n Frequency response: 20-30000Hz (-0.15dB),\n Distortion: 0.0004%,\n S/N ratio: +125dB SNR, +120dB DNR,\n Input supports PCM: PCM 16-32bit, 32-384 KHz,\n Input supports DSD: DoP64, DoP128, Native DSD64/128/256,\n D/A Chip: ES9118 SABRE HiFi SoC,\n I.R. <1O,\n Amplifier Chips: ES9118,\n Input port: USB-C,\n Output Port: 3.5mm,\n Size (L/W/H):52x14x6mm,\n Weight: 12g\n\n Box Content\n Beam Dac Amp,\n Type-C to type-c cable,\n Type-C to lightning cable,\n Type-C to USB cable,\n Instructions manual.\n\n Buying Link - https://penonaudio.com/audirect-beam-usb-dac.html\n\n Beam can be used with almost any device (Phone, Tab, PC, and Laptop) available out there. For my testing I have used my Iphone SE, Samsung J7*, Pocophone f1, Windows 10 PC + Foobar and it worked flawlessly. For PC Audirect mentioned, Beam needs a specific driver (Link) but strangely it recognized by my windows 10 Pro PC immediately without any driver. Still I am using the drivers to use its ASIO mode. For mobile phones Beam successfully detected by Hiby Music App and working smoothly.\n *To Pair with Samsung J7 (Any other micro USB equipped Phone) I have used Fiio Cl06 cable (Buying Link – here). It is strange that Audirect didn’t supplied the micro USB to type C OTG cable but its working fine in practical situation with a third party cable.\n\n To use Beam with mobile devices it doesn’t need any further setup, just plug and play. In case of PC/Laptop, you may have to install the mentioned drivers and after completing the installation process, Beam should appear as (hili-DAC (HS)) in your system's sound device list. Best thing is that Beam support Bit Perfect mode and DSD Native. To setup it in Foobar please install the components like (foo dsd asio proxy) and follow the instructions *)\n * Foobar – File – Preferences – Output (Select ASIO : foo_dsd_asio from drop down) – ASIO – Double click on foo_dsd_asio and select Bravo HD from drop down or keep the parameters as its showing in the pics and Apply then Ok .\n 01.jpg 02.jpg 03.jpg\n 04.jpg 05.jpg\n\n Tracks/ Albums used in this review\n Adele – 21\n Adele - 25\n Bob Marley & The Wailers - Kaya (40th Anniversary Edition)\n Eagles - Hotel California (40th Anniversary Expanded Edition)\n Eric Clapton - Unplugged (1992)\n Don Henley - I Can't Stand Still\n Fleetwood Mac – Rumours\n Daft Punk - Random Access Memories\n Ed Sheeran - ÷ (Deluxe)\n Nina Simone - The Best Of Nina Simone\n The Beatles - Abbey Road (Remastered)\n Michael McDonald - Wide Open\n Michael Jackson - Thriller\n\n IEMs used with Beam in this review\n\n Ibasso it01, BQEYZ KB100, Geek Wold GK3, Fiio FH1.\n\n Presentation, Design & Build Quality & Internals\n Audirect Beam's unboxing experience is straight forward. It comes in a 130x145x21 (HxWxD) white book type box. Design is minimalist and you can see the device through the cut out from the front of the box even before unboxing. All the specifications mentioned backside of the box.\n Box opens after pulling a magnetic side fold and opens look like a book. Inside box, Beam device is secured in its own cavity and all the accessories, instructions manual in another small box. Everything is secured well inside the boxes. For such a little 55 Cm x 15 cm device the box is a bit big but when spending 99$ you can expect at least a decent size box like that.\n\n Inside the Accessories box there are 3 short cables and an instructions manual.\n\n Audirect Beam is available in four colors now (Grey, Golden, Green, Blue) and I have received the green one. The whole body is made out of two solid piece of Aluminum which also works like a heat distributor while using it for long terms but never noticed any high heating issue with my unit. Sharp edges and overall matt finish paint giving it a", "num_tokens": 2048} {"category": "common_crawl-electronics_and_hardware", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-electronics_and_hardware/part-00-00000.npy", "text": " unforeseen situations, walkie talkies can be invaluable for seeking help or providing real-time updates to ensure everyone’s well-being. Their long-range communication capability allows family members to stay in touch even when separated, enabling parents to keep track of their children’s movements and ensure everyone stays together. This feature is especially useful in crowded outdoor settings or places with challenging terrain.\n\nMoreover, walkie talkies eliminate the need for shouting or searching for cell phone signals, making communication more discreet and efficient. They are lightweight, portable, and easy to use, making them ideal for children and adults alike. By including walkie talkies in your family’s outdoor gear, you can enhance the overall experience, promote safety, and foster a sense of togetherness and teamwork among family members during outdoor adventures.\n\nFrequently Asked Questions\n\nWhat Are The Key Features To Consider When Choosing Walkie Talkies For Family Use?\n\nWhen choosing walkie talkies for family use, key features to consider include range, battery life, and ease of use. Look for walkie talkies with a range that suits your family’s needs, whether it’s for use around the neighborhood or during outdoor activities. Battery life is important for longer outings, so opt for models with rechargeable batteries or long-lasting disposable ones. Additionally, choose walkie talkies that are easy to operate, especially if children will be using them, with simple controls and clear instructions. Ultimately, selecting walkie talkies with these features will ensure seamless communication for your family adventures.\n\nHow Far Can The Range Of Walkie Talkies Typically Reach?\n\nThe range of walkie talkies can vary depending on the terrain and any obstructions present, but typically they can reach anywhere from 1 to 30 miles. In open areas with minimal obstacles, walkie talkies with higher power output may be able to communicate over longer distances. However, in urban environments or areas with a lot of obstructions, the range may be limited to just a few miles. It’s important to consider these factors when choosing walkie talkies for your specific needs.\n\nAre There Specific Models That Are Recommended For Use By Children?\n\nYes, there are specific models of products designed for children that are recommended for their use. For example, tablets like the Amazon Fire Kids Edition or iPads with parental controls are popular choices for kids due to their durability and educational content. Additionally, headphones designed specifically for children, such as the Puro Sound Labs BT2200, are recommended for protecting children’s hearing with volume-limiting features. These products are tailored to meet the needs of children while prioritizing safety and educational value.\n\nWhat Are Some Of The Top Brands Known For Producing Reliable Family Walkie Talkies?\n\nSome of the top brands known for producing reliable family walkie talkies include Motorola, Midland, and Cobra. Motorola is well-regarded for its durable and long-range walkie talkies suitable for outdoor family activities. Midland offers a range of affordable and easy-to-use walkie talkies with clear communication quality, making them a popular choice for families. Cobra walkie talkies are known for their sleek design and user-friendly features, making them a reliable option for family communication needs.\n\nAre There Any Additional Features Or Functions That Are Helpful For Family Communication With Walkie Talkies?\n\nYes, there are several features that can enhance family communication with walkie talkies. Some models offer privacy codes or channels, allowing you to have secure conversations without interference from other users. VOX (Voice Operated Exchange) is another useful feature that enables hands-free communication, perfect for situations where you need to use your hands for other tasks. Additionally, some walkie talkies have built-in flashlights or weather alerts, making them versatile tools for outdoor adventures or emergencies. These features can contribute to more effective and seamless communication within your family group.\n\nAs families seek reliable communication tools for their outdoor adventures, finding the best walkie talkies is crucial. The top-rated models highlighted in this guide offer exceptional features and performance ideal for enhancing family activities. From long-range capabilities to durable designs, these walkie talkies provide a seamless way for families to stay connected and ensure safety during their outings. Consider investing in the best walkie talkies for families to enjoy peace of mind and enhanced communication experiences on your next adventure.\n\n51 Reviews\n\nLeave a Comment<|endoftext|>Slice 2\" Continuous linear recessed multicell downlight\n\naperture options\n\nRecessed Multicell\n\nThe Slice Family\n\nIlluminate your space with precision Slices of glare free light. The Slice family offers linear 1” and 2” wide profiles in recessed and below ceiling options. The 2” recessed delivers over 1100 lumens per foot with a modular design allowing continuous light of 2” square cells to your specified length. The unobtrusive fixture features ultra-low glare values (UGR) ≥13. Offered in flanged or flangeless, multiple CCTs, 2 outputs and 3 beam options, the slice 2” delivers.\n\nkey points\n\nlumens range: 634-1126Lm\nbeam options: 15°, 30°, 45°\nlight options: CRI - 90 R9 - 50\nsource options: 8W/ft, 16W/ft\ncontrol options: 0-10, DALI-2<|endoftext|>Toshiba's NVMe SSDs are a step toward a PCIe future\n\n— 9:29 AM on August 11, 2015\n\nNVM Express solid-state drives are the future, and Toshiba is bringing that future a little closer today with the release of three NVMe PCIe SSD families. These product lines are targeted at \"high-performance notebooks and PCs, thin notebooks and tablets, and servers and storage appliances.\"\n\nThe XG3 series of drives may be most interesting for the PC enthusiast: they're the ones meant for \"high-performance notebooks and PCs.\" Toshiba says that XG3 drives will be available in an M.2 2280 (or gumstick) package, as well as a 2.5\" SATA Express form factor. No matter which flavor you choose, XG3 drives will be available in capacities up to 1TB, and they can connect to as many as four PCIe 3.1 lanes. They also offer support for the Trusted Computing Group's Pyrite storage security specification. We've contacted Toshiba to see if we can get some performance figures for these puppies.\n\nOn the business computing front, the PX04P series of drives offers NVMe performance with low power consumption. Toshiba claims these drives can run at full tilt while sipping 18W of juice, which could mollify those who need to worry about energy costs at data-center scale.\n\nFinally, the BG1 series puts up to 256GB of NVMe storage on a (presumably soldered) 16-mm by 20-mm package, or a removable M.2 2230 module. These drives are supposed to offer better performance than SATA drives in thin tablet PCs and convertible notebooks. They offer TCG Pyrite support, as well.\n\nToshiba says it'll begin sampling these new NVMe drives in Q4 of this year.\n\nLike what we're doing? Pay what you want to support TR and get nifty extra features.\nTop contributors\n1. BIF - $340 2. Ryu Connor - $250 3. mbutrovich - $250\n4. YetAnotherGeek2 - $200 5. End User - $150 6. Captain Ned - $100\n7. Anonymous Gerbil - $100 8. Bill Door - $100 9. ericfulmer - $100\n10. dkanter - $100\nTip: You can use the A/Z keys to walk threads.\nView options\n\nThis discussion is now closed.<|endoftext|>Google I/O 2012 Rewind: Nexus 7, Jelly Bean, Nexus Q and More\n\nIt rained innovative tablets, phones, and media streamers as Google heaped announcement upon announcement on attendees at the search giant's developers conference Wednesday. Take a look at what Google showcased.\n\nGoogle I/O 2012\n\nGoogle put on quite a show during its keynote at the Google I/O developer conference, with the Nexus 7 tablet, Android 4.1 Jelly Bean, the Nexus Q media streamer, a Google Glass demo, and a new app for Google+. Whew! Here's an overview of all the announcements, plus highlights from the keynote.\n\nLet's start with the Nexus 7.\n\nIntroducing the Nexus 7 Tablet\n\nThe biggest news out of Google I/O may have been the introduction of the Nexus 7 tablet, a 7-inch tablet manufactured by Asus and sold by Google. It goes on sale in July, and is aimed squarely at other affordable 7-inch tablets like the Kindle Fire.\n\nNexus 7 Specs\n\nThe Nexus 7 sports pretty good hardware for the price, including a powerful quad-core Tegra 3 processor, front-facing camera, Wi-Fi, Bluetooth, and NFC. Google promises long battery life and a very light weight (340 grams is 0.74 pounds). See our hands-on impressions.\n\nNexus 7 Pricing\n\nThe most impressive part of the Nexus 7 tablet is the price. It starts at $199, which will buy you 8GB of storage. A $249 version with 16GB of storage should be available, too. At that price, they could sell a whole lot of them, even if it doesn't directly compare to 10-inch tablets like the iPad.\n\nNexus 7: Lots of Magazines to Choose From\n\nGoogle is adding magazines to the Play store, including special enhanced, interactive", "num_tokens": 2048} {"category": "common_crawl-electronics_and_hardware", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-electronics_and_hardware/part-00-00000.npy", "text": "0 (PSAGCA-09Y01N)\n • Toshiba Satellite A300 (PSAGCA-09Y01N)\n • Toshiba Satellite A300 (PSAGCA-09Y01N)\n • Toshiba Satellite A300 (PSAGCA-09Y01N)\n • Expert Rating\n\n 4.00 / 5\n\n • Sleep-and-charge USB 2.0 ports, FM tuner, HDMI, 4GB RAM, relatively light\n\n • Slightly sluggish, needs a larger screen resolution, short battery life\n\nBottom Line\n\nThe Toshiba Satellite A300 is comfortable to use, looks good, and has plenty of ports. It's performance was a little slow in our CPU tests, but overall it's a great laptop for the home or office.\n\nWould you buy this?\n\nThe Toshiba Satellite A300 (PSAGCA-09Y01N) is almost the perfect laptop for home users. It looks good, has a big screen, is comfortable to use, and contains a large array of ports. It's also not a heavy laptop; considering it has a 15.4in screen, its weight of 2.8kg is relatively light. You should be able to cart it to the office or the lecture hall without breaking too much of a sweat.\n\nHowever, you won't get much life out of it if you use it on the road. It only lasted for 1hr 20min in our battery run-down test. In this test we loop a DVD with the screen at full brightness and the wireless connection enabled. With a balanced power scheme and a workload that utilises only a small percentage of the CPU's power, its 6-cell battery should last a little longer.\n\nThe Toshiba Satellite A300 has an Intel Core 2 Duo P8600 CPU running the show at 2.4GHz, and it's surrounded by 4GB of DDR2 RAM, a 4200rpm 400GB hard drive, and an ATI Mobility Radeon HD 3650 graphics adapter. When running at full-bore the notebook doesn't get overly warm, so it can be used on your lap for long periods of time without feeling uncomfortable.\n\nDespite the good specs, it's not a speedy unit; it managed to encode 53min worth of WAV files to 192Kbps MP3s in 1min 11sec, which is at least four seconds longer than we were expecting. Nevertheless, the 4GB of RAM in the Satellite A300 and the relatively fast hard drive (it recorded 19 megabytes per second in our file transfer tests) will let you run photo editing applications comfortably, and multitasking will be a breeze.\n\nBasically, you'll be able to use this laptop for watching movies, listening to and editing music, manipulating high-resolution photos, running typical office applications, and even video editing. In fact, it's a decent desktop replacement and it has almost all of the ports you will need, as well as a DVD burner. The only aspect of this laptop that needs work is its screen, which is only available with a native resolution of 1280x800. If you need more screen space, you will have to use an external monitor via the HDMI or D-Sub ports on the side of the laptop.\n\nThe notebook has a comfortable keyboard and touchpad. We're not sold on the glossy keys — they were hard to view at certain angles due to reflections — but touch-typists won't have a problem. The keys produced responsive bounce, and despite their glossy finish they weren't at all slippery or sticky.\n\nWe love the fact that the Toshiba Satellite A300 has so much useful connectivity built in to it. Not only do you get HDMI, FireWire, USB 2.0 and eSATA, you also get Sleep-and-Charge USB ports, which you can use to charge your phone or MP3 player even while the laptop is switched off and not plugged in (as long as the battery has some juice left in it). What we don't love is the amount of preinstalled software, which includes trial versions of Microsoft Office 2007 and Windows Live Onecare, and McAfee Antivirus.\n\nThe speakers on the Toshiba Satellite A300 are located above the keyboard (not near the palm rest where they might be muffled by your hands), and there is a subwoofer at the bottom of the unit. They produce clear and reasonably loud sound, and are perfect for listening to music or watching a movie in a small room (you won't have to carry external speakers if you want to listen to music in a hotel room, for example).\n\nThere are touch-sensitive buttons above the keyboard that can be used to control the media you are playing, as well as mute the volume. A volume control knob is present at the front of the laptop. It's easy to overlook it if you're constantly used to changing volume by pressing a function key combination — and we think it's a great feature. Additionally, the built-in FM tuner is great for when you want to listen to your favourite station (FBI 94.5 here in Sydney is our favourite) and don't have an Internet connection to stream it.\n\nOverall, there is very little to dislike about the Toshiba Satellite A300. Along with the features we've already mentioned, it has dual-band 802.11n wireless networking, Gigabit Ethernet, a webcam, a fingerprint reader, a bright screen with good contrast and wide viewing angles, and an attractive design.\n\nIt would benefit from a backlit keyboard, a larger screen resolution and a 9-cell battery, but that would increase its price and take it out of the mainstream market. But as it stands, the Toshiba Satellite A300 is a great unit and well worth considering if you want a laptop that can be used at home, in the office or in the lecture hall.\n\nRocket to Success - Your 10 Tips for Smarter ERP System Selection\n\nJoin the newsletter!\n\nError: Please check your email address.\nShow Comments<|endoftext|>Grey Marble Ink MacBook Skins\n\nSale price$29.99\nSelect Model: MacBook Air 13in (2020)\n\nSelect Model\nEnhance the sleekness and elegance of your MacBook with the Grey Marble Ink Skin from Skinit.com. Our customizable MacBook Skins are crafted with precision, ensuring a perfect fit and protecting your device from scratches and daily wear. The Grey Marble Ink design features a stunning blend of soft grey tones, mimicking the natural swirls and patterns of marble. This minimalist yet eye-catching design adds a touch of sophistication to your MacBook, making it stand out from the crowd. Our high-quality skin is easy to apply and remove, allowing you to switch up your style whenever you desire. Elevate your MacBook with the Grey Marble Ink Skin and make a statement wherever you go.\n\nYou may also like<|endoftext|>post info\n\nfirst published: July 7, 2004.\n\nnext older post:\nThe Mellowing of Richard Serra\n\nnext newer post:\nTiVO and DV for 'COPS'<|endoftext|>Connect with us\n\nCrystal drift\n\nDiscussion in 'Electronic Design' started by Ken Smith, Sep 23, 2004.\n\nScroll to continue with content\n 1. Ken Smith\n\n Ken Smith Guest\n\n As I type this, my Stanford Research generator vs. a Digikey 100MHz\n oscillator comparison is drifting by about 5 parts in 10^10 per second.\n\n While watching this I have a thought. If I could get a hold of the\n temperature set point of an OCXO, and could connect it to a DAC, can I\n make a very slow very low noise sweep generator with a very narrow range\n or did I miss something?\n\n I need to be able to move a frequency about one part in 10^7 or 10^8 very\n smoothly. Any thoughts?\n 2. John Larkin\n\n John Larkin Guest\n\n Most any serious OCXO also has a VCO input that you could tap into. Or\n a rubidium, if you're really serious; they generally have an\n electrical tweak input with extreme resolution.\n\n SRS makes a brick-type SC-cut OCXO with an electrical VCO input; it's\n very stable. $400 roughly, as I recall.\n\n Or build a quadrature mixer and offset an oscillator output with the\n output of a function generator.\n\n 3. Ken Smith\n\n Ken Smith Guest\n\n Oh!. I'll have to check into that. I know that the extreme low noise one\n I had custom made for this project doesn't because the variactor diode\n makes a path for noise to get in. If I can find a fairly low noise one\n with a VCO input that may work for me. I was just now considering a\n non-OCXO and putting in in my own oven for testing.\n Two rubidium clocks with one being tweeked may be what I need. Getting\n the money to buy them may be a bit of an issue. I'll try the $100-$1000\n range solutions first.\n\n I had rejected that on a noise worry. I'll have to take another look.\n 4. John Larkin\n\n John Larkin Guest\n\n I got a nice Efratom unit on ebay a while back, $350 or some such. It\n drifts nanoseconds per hour against a cesium, and has an electrical\n tweak input.\n\n What are you doing?\n\n 5. Ken Smith\n\n", "num_tokens": 2048} {"category": "common_crawl-electronics_and_hardware", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-electronics_and_hardware/part-00-00000.npy", "text": " anything about it? But of course it's just bullshit on his part.\n\n He claims that his Note 3 is faster and has better battery life. There are numerous tests that indicate that the Note 3 (also Note 4 for that matter) perform worse than the iPhone 6 in different tests. Instead, I'll write about it here so you can google yourself on the following:\n\n google: Geekbench browser\n and compare between the iPhone 6 and the Samsung Galaxy Note 3. iPhone 6 crushers Note 3 mononuclear, and is even better when it comes polynucleate. Even in terms of Note 4 to perform the iPhone 6 significantly better in mononuclear, but not in polynucleate. But again, most of the apps running mononuclear, so I would rather take two strong cores than four / eight cores weaker because it provides a better user experience.\n\n Googling: Anandtech samsung note 4\n Further down the page you can choose to check the CPU, GPU, battery performance (and other things) and the results which do not show the 3kgt states. In many cases, the iPhone 6 performs better than the Note 3 and Note 4 does. Battery life is little and so, but not very bad there either.\n\n However, one can not rely completely on benchmark tests because Samsung has been accused of cheating, that clock up the processor when the benchmark test runs in order to get a better result. This uppklockning does not take place in a few other apps, but is merely a way to trick users to mobile is faster than it really is in common usage (google: Benchmark Samsung cheating).\n\n You can also google the following:\n Apple's iPhone 6 crowned the fastest mobile on the market\n youtube watch? v = 2kb6s7NTLbw\n iPhone 6 vs. Galaxy S5 vs. HTC One (M8) Speed ​​Test\n Video Shootout - iPhone 5S vs Samsung Note 3 - Slow-Mo\n\n The last video (Video Shootout) is between the iPhone 5S and Note 3 slow-motion, and Note 3 result there is horrible (if you check, be sure to have full screen so you can actually see the difference), to say the least, compared to the iPhone 5S. And then the iPhone 6 even better than the iPhone 5S is in slow motion.\n\n So there is nothing that supports 3kgts assertion that Note 3 would have a better performance than the iPhone 6, but it is pure bullshit (or ignorance) on his part.\n\n More than that, so when it comes to Samsung so not only did they deceive their own customers (cheating regarding benchmark tests), they make fun of users of other mobile phones in their promotional videos, been sued by the Brazilian government for violations of working conditions in 2013 (google : Brazil sues Samsung over labor violations), was voted as the third worst company in the world in 2012 (google: Samsung Voted as third Worst Company Worldwide), accused of having caused cancer (including deaths) among their workers because they use toxic substances in their production and products (google: Samsung Finally apologizes To Workers Who Got Cancer While Making Chips), according to Greenpeace's latest report (go to Greenpeace site and search: Apple tops examination) so Samsung has chosen to unravel earlier promises to phase out toxic chemicals and a lot more.\n\n That one can possibly recommend a Samsung product is to me inconceivable considering that miserable company Samsung is currently both ethically and environmentally. But I suppose that those who advocate Samsung products are very ignorant, extremely fanboys, or bought by Samsung.\n\n Regardless, the 3kgt accuse me of being a hater / lover is just comical. He advocates a mobile (Note 3), which is worse in much of everything, from a company (Samsung) which, among other things, fooling their own customers, using various toxins in their products while he puts the highest rating on their Samsung-reviews and largely lowest rating on Apple reviews from a company (Apple) who work hard to reduce the environmental impact and where their mobiles are performing better overall than all the other phones in the market. Comic said.\n Had the phone for a while and very happy overall except that it hangs sometimes when to write, will have to restart it. The camera is good, yes, most of it is simple.\n Good. But a bit too expensive as usual with Apple.\n Very good phone, fast and stylish!\n Troubled good phone. You get what you pay for simply, a very good product. 16GB is more than enough for me. Quick, good images and much much apps to choose from.\n\n Got this phone on my birthday and it is absolutely stunning. Do use my iPhone for a day now and have not found anything negative. This is the most wonderful phone to keep in right now on the market.\n Bent like a banana after minimal use for 2 days. Cell phone in the front pocket of the jeans.\n\n http://www.ladda-upp.se/bilder/nhyjvltlclpcxq/\n\n + The camera is improved and the size of the mobile is right.\n\n A little boring, no major differences compared to my 5a that I will continue to use.\n • Very good\n Starts to become a bit expensive ... like 4s\n I love it. But I don't have one. I really want one. They look amazing and I absolutely love apple. If you have an old iPhone you could give away email mattybobster@gmail.com. I really want one so much!\n Good phone, the camera is probably the best on a cell phone right now and the performance leaves nothing to be desired. However, it has its shortcomings. The phone is just too slippery and the battery is quite bad. The screen is good, but there are better on the market. Does not recommend the 16GB model, a phone that costs over 6000 SEK should only have room for a few more apps, music and some pictures before it gets full it feels not affordable, especially considering that the memory is not going to expand.\n Buy 64GB model, definitely worth the extra cost.\n You will be very pleased if you like Apple. If you want more bang for the buck you should check out the Lumia phones or LG G3 / 4.\n\n Deduct a star for battery life. It is not so good. Had an LG G2 before and I could use for 2-3 days without recharging. This can not cope with a full day of talks / social media and little surf.\n • Very Poor\n From having used both Lumior and Samsung phones, it feels iPhone as a fan of the story. Certainly quite fast (not like the other phones) but very limited in its design and insanely unproductive. Many things that go easy on Sam's Kid's simply really complicated on the iPhone (not least finding things). If you want simplicity Lumiorna feels like an obvious choice, and if you want performance and flexibility should look at Androidtelefonerna.\n\n Hard to see any great reason to have an iPhone at all actually. Now have tried and now I have changed it away!\n Good mobile that gets everything done without lag. Ios 8 is fine now everything runs like butter. Battery time is passing my hands all day and when I surf, listening to Spotify play games and check on youtube.\n Very good camera better than many mobiles in the market now and good speakers.\n\n If you are looking for a mobile that is not malfunctioning, buy an iphone. Are certainly better mobiles. But that Apple is good at is to update their devices to the latest software and I give them 10 stars\n • Very good\n Awesome good phone!\n Have had the iPhone since iPhone 3G / 3GS and gone through all models. This was a pretty big difference between the models. It was well enough primarily the size that made it felt like the \"biggest step\" between iPhone models. The screen is amazing, like the size and the design is always clean as with anything Apple makes.\n • Barely acceptable\n Super phone, but for the money you get little. It has a decent screen with pixel density of 300, 4.7 inch screen. The things that put down the character's price and Osen, thought it is too little you can do in relation to android. The screen can be crushed incredibly easy so advise you to buy a glass protection immediately. Otherwise looks phone incredibly pretty and thin out so there is half the grade.\n Top Phone!<|endoftext|>Variable FPS with mobile phones (Galaxy S7 or iPhone 8)\n\n867 viewsiphone mixpre 6 sync-e variable frame rate\n\nHi I got my tentacle Standard Set and need to test it before using it a a shoot. I connected o sync-e to my mobile phones (S7 and Iphone8) with the correct cable. Found out that the audio tc was 30 FPS as expected, but the phones recorded at 30,52 (or something). Did some research and found out that they record with variable frame rates. Was kinda surprised because iPhone is supported with a cable on the original accessories page. But if the iPhone records at a variable frame rate, doesn’t this mean that it will go out of sync with the steady audio tc?? Please help me out to get this sorted. Thx\n\nAnswered question<|endoftext|>How JustAnswer Works:\n • Ask an Expert\n Experts are full of valuable knowledge and are ready to help with any question. Credentials confirmed by a Fortune 500 verification firm.\n • Get a Professional Answer\n Via email, text message, or notification as you", "num_tokens": 2048} {"category": "common_crawl-electronics_and_hardware", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-electronics_and_hardware/part-00-00000.npy", "text": " to frame the picture effectively. There are two types of zoom you need to know about, optical and digital, which we’ll cover in a second.\n\nWhat’s the difference between a webcam and a video conferencing camera?\n\nA Webcam is a type of video conferencing camera. Webcam typically refers to a plug-and-play USB camera that is small enough that you can mount on a computer display. Often, though not always, webcams are intended for personal use.\n\nVideo conferencing cameras might be larger, use different connections, offer PTZ features and so on. For cameras like these, manufacturers and retailers typically avoid using the term webcam. However, because there’s no real difference between the two terms, you might see the terms being applied to either.\n\nCameras are complicated. There are a bunch of features that might improve your video conferencing experience:\n\nVideo Resolution\n\nFor video conferencing, video resolution is a balance between lifelike detail and bandwidth. Increased resolution is often a great thing. Many cameras now offer 4K Ultra HD resolution. However, before plumping for 4K, check that your video conferencing system and other devices support it. There’s no reason to pay extra for 4K if you’re using 1080p displays or your system only supports 720p video calls.\n\nGrandstream GVC3220\n\nGrandstream GVC3220 is more than a PTZ camera with 4K Ultra HD resolution: it’s an all-in-one video conferencing system that supports SIP and H.323.\n\nOptical Zoom, Digital Zoom\n\nFor large rooms, optical zoom is a must. Optical zoom means the lens does the zooming, so it maintains full detail. Digital zoom is essentially the same thing as cropping a picture to enlarge it, which leads to pixelization and loss of detail. That said, some cameras have sensors that support a higher resolution than they normally use, so when they crop the image, they don’t lose as much or any detail.\n\nField of View, Wide Angle Lenses\n\nField of view refers to the angle at which a lens can capture video. If you see “100° horizontal field of view,” that means that the lens captures video to the side of the lens out to a 100° angle. Unless you’re a professional cameraperson or someone who really likes math, don’t worry about specific angles. What’s important to know is whether the camera is wide angle or not.\n\nWide angle lenses are useful for huddle rooms to capture people closer to the camera. They’re also useful for larger rooms where you require coverage of many people. For extra-large rooms, however, where one camera angle won’t work because people will be too small in the picture, you’ll want a PTZ camera that’ll likely have a narrower field of view. It won’t capture everyone at once, but because it can pan, tilt and zoom, it can dynamically cover the conversation. If you’re using a camera for just one face, as is likely at home, it can be nice to use a narrower lens because wide angle lenses have the effect of broadening your face.\n\nJabra PanaCast 50 on Table Stand\n\n3 integrated cameras for unique Panoramic 4K Ultra HD resolution. Virtual Director for auto speaker tracking and framing. 4 speaker and beamforming microphone arrays. It’s Jabra PanaCast 50, shown here mounted on a Table Stand.\n\nThere are a few options that use multiple integrated cameras in a single device. The device stitches together the multiple video streams into one seamless stream. The advantage of this is that it reduces wide angle distortion while providing exceptional coverage.\n\nThere are other options that use multiple separate cameras, switching between each camera’s feed as dictated by the flow of the conversation. These systems are especially useful in large rooms because, since it doesn’t need to cover the entire group at once, the camera can zoom in closer to a face or faces, giving more detail and a better, more professional experience.\n\nAutomatic Speaker Tracking\n\nA camera can pinpoint who is speaking and automatically shift the picture frame to show the active speaker, rather than the whole group. Automatic speaker tracking provides a natural flow to the conversation. Some solutions support dynamic speaker tracking, which follows the active speaker even if they move or walk around while speaking.\n\nYealink UVC84 Video Conferencing Camera\n\nYealink UVC84 gives you automatic framing on top of 4K Ultra HD resolution, 12x optical zoom, plug-and-play USB connectivity and much more.\n\nAutomatic Framing\n\nA camera that supports this feature intelligently senses what is a face. It then centers and crops the picture, so the face appears to best effect. You might set it to frame an individual face or a whole group of people. Automatic framing makes it feel like the video conference has a director choosing the shots, a professional experience.\n\nAutomatic White Balance\n\nTo make everyone look their best, you want them to look as close as possible to how they would look under neutral lighting. However, neutral lighting is almost never achieved in a video conferencing context because so many things can change how people look: the color of the wall, the warmth of the lighting, even the color of people’s clothing. Automatic white balance adjusts the picture’s color warmth to make people look as natural as possible.\n\nBacklight Compensation\n\nA camera will choose an exposure level that makes the dominant light level the baseline and adjust the picture according to this baseline. If you have windows or bright lights behind speakers, this often means that the camera will set the brighter elements as the baseline, which leads to faces being in shadow or even completely dark. Backlight compensation means the camera intelligently cues the light and contrast levels to faces, so you’ll be able to see them even with bright lights behind them.\n\nPoly Studio X50 Video Bar\n\nCamera, microphone, speaker all in one: Poly Studio X50 Video Bar. Acoustic Fence and NoiseBlockAI mean crystal clear audio. Bluetooth and Wi-Fi mean wireless connectivity. It even supports dual displays!\n\nVideo Bars\n\nThe simplest all-in-one device for a professional video conferencing experience is a Video Bar. A video bar combines a camera, speaker and microphone. It might also act as a codec, running the video conferencing software. It looks like a soundbar with a camera in the middle.\n\nDon’t think that just because it’s an all-in-one device, a video bar offers worse performance. Video bars like Poly Studio X30 give you professional features like 4K Ultra HD video, NoiseBlockAI and Acoustic Fence noise reduction, acoustic chamber design for exceptional sound and beamforming 4 MEMS microphone array.\n\nThat said, the primary advantage of using a video bar is simplicity. You don’t need to worry about buying a camera, a mic and so on separately. USB video bars are the easiest to use, being plug-and-play devices with exceptional interoperability. Your video conferencing service will recognize it as both an audio and video device.\n\nWondering what to look for when shopping for a video bar? Check out our Video Bars Buyer’s Guide.\n\nTouch Displays, Touch Controls\n\nManaging video conferences can be tricky. You need to decide on a device as the central control. While you can use a laptop, consider a touch display.\n\nYealink CTP18-Teams Touch Display\n\nYealink CTP18-Teams is a Microsoft Teams Certified touch control with 8-inch capacitive touchscreen display plus Wi-Fi and Bluetooth support. It shows the native Teams interface for a frictionless experience.\n\nA touch display or touch control is, essentially, a tablet for managing video calls. It gives you a dedicated controller, so you don’t need to worry about who should bring the laptop, how do you connect it, is it running the right software and so on. It combines the intuitive touchscreen interface of any tablet with a UI geared towards video conferencing. Some touch displays offer features like controlling a PTZ camera, sharing and dynamically editing content, scheduling meetings and more.\n\nIf you use Microsoft Teams or Zoom, look for certified touch displays that will automatically register to the system and show a native interface for a frictionless experience across your devices.\n\nMany conference phones can also act as a touch display to manage your video call, including Microsoft Teams and Zoom options that will give you the familiar interfaces just like the touch displays.\n\nVideo Conferencing Microphones, Conference Phones, Speakerphones\n\nYou want people’s voices to sound the best they can. For a professional video conferencing experience, you’ll want your and your group’s voices to sound better than the tinny voice you get when using a computer’s microphone or your smartphone. We discuss video bars above, which include a microphone in the device. We’re going to cover other options here.\n\nMany people use a Conference Phone as a video conferencing microphone. A conference phone can also act as the control center for the group call, letting you schedule meetings, add members and so on. They’re designed for group communications, so they have 360° audio pickup, advanced noise reduction and more. If the conference phone doesn’t cover the space you need, check if it has compatible expansion microphones: many of them do.\n\nJabra Speak 750 Speakerphone, Microsoft Teams Edition\n\nFor professional audio when Microsoft Teams video conferencing in the huddle room, try Jabra Speak 750 MS, a USB speakerphone with a dedicated Teams button for launching the service.\n\nFor a huddle room microphone or for on the road conferencing, look into a Speakerphone. They’re simple to connect and simple to use. Most of them are portable. They’ll connect either via USB or Bluetooth, which means you can find a model that works for laptops, smartphones or both.\n\nFor dedicated conference rooms, you might want an installed video conferencing microphone solution like a ceiling microphone or a tabletop microphone. They have different advantages and disadvantages. For more information, check out our blog: Ceiling Microphones vs Tabletop", "num_tokens": 2048} {"category": "common_crawl-electronics_and_hardware", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-electronics_and_hardware/part-00-00000.npy", "text": "3 #ad\nPart Numberxzcbjfo-073\n\nWindows 10 Laptop 14 inch Notebook, YELLYOUTH 8GB RAM 128GB eMMC Intel Quad Core Laptop with Mini HDMI 5G WiFi Bluetooth Computer PC Silver\n\nYELLYOUTH #ad - The 14 inch laptop computer is pre-installed with the windows 10 Home operating system. The yellyouth 14 inch also supports microsd expansion, there is an expansion card slot at the bottom, which can support 2. 5 inch hdd or ssd, which can be expanded up to 128GB.\n\nThe 14\" notebook supports for MicroSD and 2. 5inch hdd/ssd expansion, WIFI 2. 4ghz and 5G wifi network. The 8mm ultra-thin body and lightweight design make it an ideal choice for you to carry it at home or outdoors. Yellyouth 14 inch windows 10 laptop with intel celeron series 64bit cpu, and mini hdmi hd port, with usb 3. 0 and usb 2. 0 port, quad core processor can up to 2. 3ghz, 8gb ram 128gb emmc storage, 03mp front camera, compatible with Bluetooth 4.\n\n0, 3. 5mm headphone jack. Buyers who are familiar with computer technology can also replace other versions of Windows 10 by themselves. In addition, and can be expanded up to 1TB of storage. Its performance and long battery life There is no pressure for your work or entertainment. This slim notebook 14 inch cpu is mainly low power consumption and low noise, equipped with a 7.\nManufacturerYELLYOUTH #ad\nHeight0.3 Inches\nLength12.9 Inches\nWeight2.6 Pounds\nWidth8.7 Inches\nPart NumberYY-142A-1126\nModelYY-142A\n\nPortable Windows 10 10.1inch Education Laptop Notebook Computer Learning Laptop Netbook for Kids Men Women\n\nHBESTORE #ad - The laptop has 2gb ddriii ram and 32GB EMMC storage chipset. Environmental protection material:the laptop housing use the Environmental Protection Materials ABS and PC. Thin&light weight: hbestore laptop has a fashion design of 07 inch thickness with 095kg light weight make the laptop easy to carry and suitable for women, men & kids use it freely to do online learning or entertainment.\n\nOriginal win10 osevery laptop has an original win10 os license key to ensure all of our laptop’s operating system is official one. You can use all the free app of the Win10 OS. Built-in wifi&bluetooth&i/o portthe laptop has built-in wifi 802. 11b/g/n and bluetooth v4.\n\n0, 2 usb2. 0 port, 1 micro hdmi port, 1 Combo earphone Port, 1.3mp front camera, 1 tf cart port support up to 256GB TF card. Though the laptop is small but it has the QWERTY keyboard like a traditional laptop. Powerful cpu for entry level laptop: the intel atom x5-z8350 1. 1ghz up to 1. 92ghz is a powerful cpu as an Entry level laptop to help you handle office work, online video meeting and web browsing easily.\nManufacturerHBESTORE #ad\nHeight0.59 Inches\nLength11.57 Inches\nWidth7.87 Inches\nPart NumberPC1068<|endoftext|>Skip to content\n\nJust plug in and switch on!\n\nThe smartest, simplest and easiest way to help reduce your power bill!\n\nSavings Guide\n\n7 Unusual uses for an EcoSwitch\n\nUse an EcoSwitch to eliminate standby powerThe EcoSwitch offers a simple solution to save power and reduce your electricity bill each month. With the EcoSwitch, you can simplify your life and create instant access to turn any device on or off from an easy to reach switch. While energy savings are often the first thing people notice when using an EcoSwitch, there are plenty of other amazing benefits with this product. Here are 7 unusual uses for the EcoSwitch that might surprise you.\n\n1. Remind Employees to Power Down\n\nHave you ever strolled into your office in the morning only to find dozens of appliances, computers, and electronics left on by forgetful employees? It can be endlessly frustrating to see careless employees wasting the company’s money by running up the electricity bill. Now, you can eliminate the hassle and make it easy for employees to remember to power down.\n\nWhen you connect the EcoSwitch to your office devices, the green light will be an obvious reminder for employees to turn everything off before they leave. By using the convenient standby power switch, you can centralise the power supply for each workstation in one place. Then when each person leaves for the day, it becomes quick and easy to turn everything off in one go and eliminate standby power wastage.\n\n2. Eliminate Unnecessary Injuries\n\nWhen you have to move furniture, crawl under tables, or bend at awkward angles to reach a power cord, injury is almost inevitable. When you start using the EcoSwitch, you can put it in a spot that is easy to access. Just imagine how much easier it will be to turn your appliances off!\n\n3. Stop Hunting for Your Chargers\n\nIt seems like almost everything comes with a charger cord these days. Just think of the list of items you have to recharge each day: phones, MP3 players, cameras, laptops, GPS systems, tablets, and even kids’ toys. When you are vigilant about trying to save power, you unplug these chargers after each use. As a result, you are often searching for the right charger for your device and untangling a mess of cables every time you go to your charging station.\n\nThe EcoSwitch solves this problem. Now you can keep your chargers plugged into the outlets, but hook the whole thing up to your EcoSwitch. When you aren’t charging a device, just shut off the power completely with a simple flick of the switch.\n\n4. No More Getting Out of Bed to Power Down\n\nHave you ever woken in the middle of the night, only to realize that your spouse fell asleep reading and left a lamp on? Maybe you dozed off watching television and you wake up to see the flickering TV taunting you from across the room. Instead of stumbling out of your warm bed to turn off lights or power down the TV, you can flip off the EcoSwitch on your bedside table and go right back to sleep.\n\n5. Monitor Children’s Electronics Use\n\nAre your kids turning into couch potatoes? If you have a difficult time controlling how much time they spend watching TV or playing video games, hook everything up to an EcoSwitch and place it somewhere out of sight. When you want them to head outside or find entertainment without electronics, just flip the switch and no matter how many times they press ‘power’, the electronics will remain off.\n\n6. Regulate Night Time Temperatures\n\nIf your sweetheart likes the bed toasty warm at night, but you prefer the room to stay cool, you can end the battle by using an EcoSwitch to regulate night time temperatures with ease. Once your loved one dozes off, reach over and flip the switch to turn off the electric blanket. Even better, hook your ceiling fan to the EcoSwitch and you can flip it on and instantly enjoy a nice breeze to help you drift off to sleep.\n\n7. Remind Your Teen to Power Down\n\nIt’s not uncommon for teenagers to fall asleep listening to music or watching TV. If you are tired of reminding your teen to shut things off, mount a couple of EcoSwitches by their bed. The green lights will be a great little reminder to turn off the switches and power down before sleeping.\n\nThe EcoSwitch will help you save energy, but the standby power switch will be useful in plenty of other ways too.<|endoftext|>How To FRP Bypass Huawei Phone by Secret Code\n\n121 unlocks\n\nBypass FRP lock on any Huawei phone with Unlocky’s FRP tool easily. Our tool will remove any linked account Google with your phone through a secret code generated in seconde. \n\nIn the last few months we’ve been working hard in creating an FRP Bypass APK that helps you to remove google FRP lock on any phone almost instantly, and we finally did it. And we will show you below how to do it without pc, OTG cable or apps.\n\nIt works through secret codes (see some examples below) which will be generated based on your device’s IMEI. So when you type a generated code an hidden menu will show up on your phone’s screen. There you will see some new features, including FRP unlock tool.\n\nSo if you want to be amazed by our FRP bypass tool pay fully attention on our guide to learn how to bypass google account verification after reset on any Huawei phone step by step, including,Huawei Pura 70 Ultra, Huawei Mate XT Ultimate  and more. Should we get started?\n\nWhat is FRP Lock on a Huawei phone?\n\nFRP stands for Factory Reset Protection and is a privacy feature for mobile devices that protects user data in case of loss of device or stolen. Was introduced by Google on it’s Android OS system starting with Android 5.1 (Lollipop) version.\n\nWith the introduction of Android 5.1 Lollipop in 2015, Google has hidden the so-called Android Device Protection aka Activation Lock in its operating system. This acts as anti-theft protection and becomes active if someone reset the device to the factory settings manually, i.e. not via the menu.\n\nOn the next reboot", "num_tokens": 2048} {"category": "common_crawl-electronics_and_hardware", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-electronics_and_hardware/part-00-00000.npy", "text": " eyesight has never been great, and it gets worse the older I get). Orbi is not currently compatible with Amazon’s Alexa digital assistant, but Netgear tells me it’s just waiting for that certification to come through.\n\nFloorplan for mesh network tests Michael Brown\n\nThis floorplan shows where the router, mesh nodes, and clients were placed for benchmarking. The Orbi satellite was deployed in the great room.\n\nAt close range—with the client in the same room as the router, separated by nine feet of air—the Orbi’s TCP throughput of 285.3Mbps trailed the five mesh routers I compared it with. The Eero WiFi System (463Mbps), Linksys Velop (431.7Mbps), and Google Wifi (401.3Mbps) were way out in front at this location. But when I moved the client to my great room, 33 feet from the router with an insulated wall, some plywood cabinets, and a number of kitchen appliances in the signal path, the Orbi jumped ahead of most of the mesh routers to deliver TCP throughput of 132.3Mbps. The Eero was faster, though, delivering throughput of 213.3Mbps.\n\nNetgear Orbi solo Michael Brown\n\nInterestingly, adding an Orbi satellite to the equation dramatically increased throughput at close range as well as at the other three locations where I placed the client PC. The Eero WiFi System was still slightly faster in the bedroom spot (459.7Mbps compared to 428.0Mbps), and the Linksys Velop was faster in the great room (276.0Mbps versus 224.0Mbps), but the Orbi was dramatically faster than all of the mesh routers in my difficult-to-penetrate home theater. It was more than twice as fast at long range, when the client was in my sun room, 65 feet from the router with three insulated interior walls and two fireplaces in the signal path.\n\nNetgear Orbi two nodes Michael Brown\n\nAnd if you examine the chart below, you’ll see that the Orbi with one satellite was considerably faster than most of the mesh network routers operating a router and two nodes. The Linksys Velop was faster in the great room, but the Orbi was significantly faster than everything else in the three other locations, including my home theater. The conventional router I used for a baseline—the Linksys EA9500—was faster than anything else in the great room, but the Orbi with its satellite clobbered the EA9500 in the more difficult places to reach: the home theater and the sun room.\n\nNetgear Orbi vs three mesh nodes Michael Brown\n\nMy final performance chart shows how each router performs under pressure. For this test, I run wireless TCP-throughput benchmarks on three pairs of computers (four Windows machines and two MacOS computers) placed 33 feet from the router while simultaneously streaming 4K video from a Roku Ultra streaming box that’s wirelessly connected to the network.\n\nThe Linksys Velop won that competition, at least with the MacBook Pro, delivering much faster TCP throughput. The MacBook Pro, it should be noted, is one of the few laptops on the market to come from the factory with a 3x3 802.11ac adapter on board. The fact that the Velop was operating with three nodes, compared to the Orbi having a single satellite, should not have factored into the performance equation because the client computers can associate with only one node at a time. I presume they would have connected to the closest node, which was placed in the same spot where I put the Orbi satellite. The performance delta among the Windows clients wasn’t nearly as significant.\n\nNetgear Orbi 4K test Michael Brown\n\nThe bottom line\n\nDon’t get hung up on the fact that the Netgear Orbi operates on a hub-and-spoke topology versus mesh; the bottom line is that this is an outstanding Wi-Fi router. By including a three-port switch on the router and a four-port switch on the satellite, it strikes a better balance between unobtrusive industrial design and conventional router features than any of the mesh routers I’ve tested so far.\n\nIt’s not as fast on its own with a close-range client when compared to the Eero, Google Wifi, or Linksys Velop, but adding one satellite instantly changed that scenario, putting it at the top of the performance heap at every location I tested. In fact, an Orbi with one satellite delivered higher performance than every mesh router operating with three nodes.\n\nIf you live in a small apartment, on the other hand, the incredibly cheap Google Wifi is probably the better choice—if you can find one. It’s priced at just $129, but seems to be out of stock everywhere. A single Eero WiFi or Linksys Velop would be my next pick for smaller dwellings; those go for about $200 each. And if you don’t mind the look, you’ll find plenty of conventional routers with external antennas that deliver terrific performance.\n\nJoin the PC World newsletter!\n\nError: Please check your email address.\n\nTags WiFinetgear\n\nOur Back to Business guide highlights the best products for you to boost your productivity at home, on the road, at the office, or in the classroom.\n\nKeep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.\n\nMichael Brown\n\nTechHive<|endoftext|>The Sandman Endles0282059-US-socks\n\nJohn (verified owner)\nDecember 2, 2024\n\nThis item is worth every penny. It’s durable, efficient, and performs just as expected. \n\nAlice (verified owner)\nNovember 27, 2024\n\nThe shop provides enthusiastic advice, fast delivery, excellent.\n\nIvy (verified owner)\nSeptember 6, 2024\n\nDidn't have high hopes, but was pleasantly surprised with the product. Highly recommend.\n\nZane (verified owner)\nSeptember 4, 2024\n\nThis item is super useful and easy to use. It has made my life much easier and I am very happy with it.\n\nTessa (verified owner)\nAugust 24, 2024\n\nIt was good overall, shipping was delayed but I received it as scheduled.\n\nAdd a review\n\nYour email address will not be published\n\nThank you for you review, it will be published after moderation\n\nYour rating *\n\nYour review *<|endoftext|>\n\n • \n 1. Home > NEWS & BLOG >\n\n Tips:Church Led Video Wall Instead Of a Projector\n\n   LED video walls are quite popular display products, you may be see it for outdoor sports stadiums,big churches etc.\n\n   A question is if you consider a video wall instead of a projector for worship,here are a few parameters led video wall vs projector.\n\n   Projector Brightness\n\n church led displays\n\n   This one is a little more subjective, but we're finding that if a church wants to talk about a projector in the 12-14K lumen range or higher, we should probably start talking about a led video wall. Now, I should make it clear that a led video wall is not going to be the same initial cost as a 14K lumen projector. It's going to cost more up front. However, when we do the math, often the delta is low enough that it makes sense to go with a led video wall.\n\n   Video walls for churches don't need lamp changes, they can be mounted to the wall or flown and don't require a clear path from viewing screen to projector. The overall service life of a led church signs is likely to be longer, and they generally require less maintenance. At the end of the day the wall may still be more money, but the extra value it brings is often worth it. Not every time, but sometimes.\n\n   Ambient Light Levels\n\n led video wall for churches\n\n   a few years ago, I've worked with churches that are not the modern \"black box\" style of sanctuary. One had a giant 300 sq. ft. stained glass window right next to their screen. And yeah, it faced south. My first thought was led video wall for them for two reasons. First, it would have the punch that no projector ever would making it possible to actually overcome all that ambient lighting. Second, and maybe more importantly for me, the blacks would actually be black. You see, a screen will only ever be as dark as the white screen ever gets. When there is that much ambient light in the room, it's never going to be darker than light grey.\n\n   That destroys contrast which makes the already not bright enough projector seem even more washed out. By contrast, the background of a led video wall—the space between the pixels—is black. And when the LED is off, it's black. I don't care what the contrast ratio spec says about a projector, it only matters if the room is very dark. In a full light situation, the screen looses.\n\n   Screen Location\n\n video screens for churches\n\n   Some churches want to use a big backdrop stage led screen. Projectors can be problematic because if people get too close to the screen, they'll cast shadows unless you do rear projection. But rear projection requires a big backstage area. If you want to do a wide screen, you'll need to blend the projectors, and that can be tricky and may need adjusting from time to time. And the screen will still be competing with stage light.\n\n   When we switched from a 16K projector to a led video wall at", "num_tokens": 2048} {"category": "common_crawl-electronics_and_hardware", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-electronics_and_hardware/part-00-00000.npy", "text": " analyzes your head shape and wearing style and then adjusts the sound in response. While the ANC is not completely impervious to everything around you, when music is playing at a moderate level, it’s difficult to hear anything below 350 hertz.\n\nThe flaws in the MDR-1000X, sadly, are in the sound quality. Although Sony touts the MDR-1000X as highresolution audio capable, both active and passive listening modes have issues in the voicing that I verified on two different samples. Powered up, the 1.57-inch dome drivers are tuned in such a way that I heard some sort of dip in the lower midrange that leaves the entire soundscape feeling two-dimensional, especially on resonant instruments like acoustic guitar and strings. The highs, while they avoid the piercing quality that many “hi-res” headphones have, instead lack a clarity in their attack and decay. There’s a somewhat coarse quality to the high-frequency range that especially plagues consonants and cymbals. When the ANC is activated, the lower frequencies seem to get a major boost. This means that when the ANC is off, the sound can feel top-heavy.\n\nUnfortunately, in fully passive mode (completely powered off and using the supplied analog cable to connect to the source), the sound was abysmal; muddy and muffled with a thudding bass that left the overall profile sounding heavily veiled. Of course, you’re not buying the MDR-1000X for primarily corded and powered-down use, so this drawback is only important if the battery dies. According to Sony, this shouldn’t happen often, as with ANC activated the MDR-1000X have a claimed max use time of 20 hours.\n\nOverall, stumbling blocks aside, the Sony MDR-1000X fills the space between the great-sounding but less successful ANC of the Parrot Zik and the fantastic ANC but non-audiophile sound of the Bose QC35. For frequent travelers or those who work in noisy environments, the MDR1000X are an excellent option, if only for great ANC and the brilliant conversation mode.\n\nHeadphones, just like any wearable device, should never be reviewed by one individual, it should be a group review as you used to do here. I just read a review of the same headphone on \"Digital Trends\" where the reviewer couldn't say enough good things about these HPs- in fact everything he said is in stark opposition to what you had to say.\n\nhttp://www.digitaltrends.com/headphone-reviews/sony-mdr-1000x-review/\n\nCould being a woman have something to do with it? I think so.\n\nThanks for the honest review Lauren. Keep up the good work.<|endoftext|>MacBook Air 13.6 Inch Art Case, A2681 (The Skeleton Specter by Kuniyoshi)\n\nSold Out\n\n常规价格\n常规价格\n促销价\n单价\n 单价 \n结账时计算的税费和运费\n\n【Check your Model】Please kindly check the model number \"Axxxx\" on the back of the laptop before your purchase, make sure you choose the exact same model number as the listing title stated \"A2681\".\n【Slim Fit】This slim art hard case adds no size to your 13.6 inches MacBook Air, won't restrict the MacBook air 2022 A2681Air A2681<|endoftext|>Skip to content\nHome » Can You Use Your Old Sim Card In A New Phone\n\nCan You Use Your Old Sim Card In A New Phone\n\nAs long as the SIM card is the same size for the same make/model phone, you will be able to use it.\n\nCan I buy a new phone and just switch the sim card?\n\nYes, you absolutely can. However, there are a few things to know before you do it: If you intend to use a third-party SIM card, your phone must be unlocked: This won’t be a problem if you purchased your phone directly from Apple as they generally sell them unlocked.\n\nWhat happens if you take out your SIM card and put it in another phone?\n\nGSM phones used subscriber identity module (SIM) cards. A SIM card is a small card that’s inserted into the phone. It contains all your contacts and settings, and it’s linked to your account. You could take the SIM card out, put it into another phone, and if someone called your number, the new phone would ring.\n\nShould you use old SIM card in new phone?\n\nWhen you get your new device it will come with a brand new SIM Card. Your old SIM Card should fit too, but it is recommended that you use the new one.\n\nHow do I transfer everything from my old phone to my new phone?\n\nSign into your Google Account and agree to the terms. A list of backup options will appear, select the most relevant backup to restore the data. Tap “Restore” to get all the data and settings from your previous phone restored. Tap “Apps” to choose which apps to install on your new phone.\n\nWhat info is stored on a SIM card?\n\nDespite the complicated name, it’s basically your phone number. They can also store contact information, telephone numbers, SMS messages, billing information, and data usage. Plus, your SIM will have a personal identification number (PIN) to protect against theft.\n\nWhen I change my SIM card will I lose everything?\n\nWhat to Do Before Changing Sim Card. When you replace your SIM card in your phone, you lose access to any data on the old card. Photos, apps, and other documents that aren’t stored on the SIM aren’t affected by a card switch.\n\nDoes taking out the SIM card delete everything?\n\nNo. SIM cards do not store data.\n\nCan I use my old SIM card in iPhone 13?\n\nYes, both phones take Nano-SIM cards, so if you use your old SIM card from your iPhone 5s it should work perfectly fine on iPhone 13.\n\nWhat happens if I put my old SIM card in my new iPhone?\n\nAnswer: A: You can move your sim and use the phone as you use your phone. But the sim does not contain the data stored on your phone, so none of your contacts, apps, accounts etc., will transfer because you put the sim in.\n\nCan I put my old SIM card in my new 5G phone?\n\nDifferent SIM cards support different networks such as 4G, 5G, and LTE. You can use an older SIM card with a newer phone (for example, a 4G SIM in a 5G phone) and it will work.\n\nWhat should I do before changing phones?\n\nHere’s a checklist of top 5 things to do with your old Android phone before switching over to a new one.\n\n 1. Reset your Android device to factory settings. …\n 2. Back up WhatsApp on Google Drive. …\n 3. Take out SIM card and microSD cards from the phone. …\n 4. ​Log out from all accounts. …\n 5. Back up your important data and files.\n\nMar 31, 2021\n\nHow do I transfer everything from my old phone to my new Android?\n\nHow to transfer data from Android to Android\n\n 1. Back up your data in System settings.\n 2. Back up your photos using Google Photos.\n 3. Turn on your new phone.\n 4. Select Backup from an Android phone.\n 5. Select Set up and restore on your old phone.\n 6. Select Set up nearby device and choose your new phone.\n\nMore items…•May 10, 2022\n\nHow do I transfer my SIM card data to my new iPhone?\n\n 1. Insert your old SIM card into your new iPhone if you want to move it between devices.\n 2. Turn on your new iPhone.\n 3. Slide up or press the Home button depending on which device you’re setting up.\n 4. Follow the directions to choose your language and set up your Wi-Fi network.\n 5. Tap Restore from iCloud backup.\n\nMore items…•Jul 22, 2022\n\nHow do I transfer my photos to my new phone?\n\nHow to transfer photos and videos to your new Android phone\n\n 1. Open the Photos app on your Android device.\n 2. Tap on the Menu in the top left corner of the screen (the three lines, otherwise known as a hamburger menu) and navigate to Settings > Back Up Sync.\n 3. Toggle Backup & Sync to On.\n\nMore items…•Jul 12, 2022\n\nWill I lose my pictures if I take out my SIM card?\n\nYour pictures are saved to your phone or to your SD card, not to your SIM card.\n\nAre photos stored on your SIM card?\n\nPhotos are never stored on a SIM card. Instead, they are stored on the device’s internal storage, on the SD card, or in a cloud service. In an Android phone, you can see your photos through File Manager or a Gallery app on your phone, or in the Google Photos app.\n\nWhat should I do with my old SIM card?\n\nYou can send the card off to an incinerator, incinerate it yourself or use a hammer to thoroughly smash it while turning the stored data to an irretrievable bunch of mush. A cell phone or recycling center might be able to help but personally watching the card being destroyed is the only sure bet for protection.\n\nHow do I switch my SIM card and keep everything?\n\nIf you have to change to a new SIM card but don’t want to lose any of the information stored on your SIM card, you can use a SIM card copier to move information from one SIM card to another.\n\nWill I lose my texts when I get a new", "num_tokens": 2048} {"category": "common_crawl-electronics_and_hardware", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-electronics_and_hardware/part-00-00000.npy", "text": " at Letus Direct Support Toll Free 1-866-620-3566\n\n 12. I have the Carbon fiber one and I have used it on a 5d and a t2i. I think it can be adjusted to fit most dslr's, but you never really know. They have been good about making risers to adapt so I would think that if another camera becomes popular and needs a VF that they would make an adapter.\n\n The price may seem high but it is around the same price as Zacuto's VF and it is made of aluminum or carbon fiber. Zacutos is made out of plastic. The letus has its optics made in japan and has better glass. I feel a lot better about spending the money because it is made of better materials than the others in that price range.\n\n 13. brandon\n\n Letus seems to be making some quality product, but jeez, that's a lot of greenbacks\n\n 14. JSS\n\n @mikeonvido or anyone else that owns this it says on the website that this is compatible with many other cameras. Is it truly that adjustable? Just wondering cause if I spend the money for this I'd like for it to work for other camera bodies in case of a future upgrade.\n\nLeave a Reply\n\nYour email address will not be published. Required fields are marked *\n\nRSS Feed Widget\n\nTop Selling Drones<|endoftext|>SanDisk Extreme 60 Portable SSD 500GB\n\nVendor: BuyMobile\n\nSanDisk Extreme 60 Portable SSD 500GB is a compact storage accessory built for all your storage needs. Compatible for use with desktops, Macs and notebooks and all devices featuring SSD compatible slot, it can store your data along with offering tremendous read and write speeds that are 9x faster than a simple hard drive. With 550MB/s read speed, the drive also help you boot up faster than regular HDD. The drive comes with SanDisk SecureAccess software preinstalled that allows you to password protected sensitive folders. It is a must have storage accessory especially for professional photographers and videographers.\n\nNo specification found.\n\nByve Movement\n\nBuyMobile supports the cause \"\" and Byve donating upto from every confirm sale to this momentous project on behalf of BuyMobile.\n\nByve will donate upto on behalf of you.\n\nWhat is your choice of cause?<|endoftext|>0113 310 Dialing Code\n\nDialing Code 0113 310 is part of Area Code 0113, which covers Leeds and the surrounding area.\n\nThe majority of numbers in the 0113 Area Code belong to normal landlines in Leeds, but it is possible that these numbers are being used elsewhere as virtual numbers.\n\nThere are multiple telephone companies operating in the 0113 Area Code and they are allocated blocks of numbers, which can be identified by the digits following the Area Code. In this case, the digits 310 after the area code indicate that the range of numbers was originally allocated to Net-Work Internet Ltd on 21 September 2007, although due to number portability, individual numbers within this range may now be allocated to other operators.\n\n0113 area code information\n\nArea Code: 0113\nLocation: Leeds\nDialing Code: 0113 310\nProvider: Net-Work Internet Ltd\nDate range allocated: 21 September 2007\nCall Costs: Normal landline rate\nArea code required for local calls: No\nLocal number length: 7\nNumber format: 0113 310 ####\nInternational number format: +44 113 310 ####\nLast code change: April 1995 from 0532.\n\nThis page was last updated on 9 August 2023.<|endoftext|>Is it possible to get hold of some Cokin-P sized rigid optical sheets in 'very yellow' (I suppose 200cc?) and 'very magenta', probably from a movie supplies place? Long ago I was a customer of SRB in the UK, but there are certainly more options in the US. There is nothing magic about the manufacturer's filter material after all. These higher quality filters would be flatter, easier to clean, optically much better and be more robust in use than the gel multigrade filters, and should work fine for split-contrast printing. You could even buy a third one which might look like Grade-3, or so, to simplify the 'average' print.<|endoftext|>Sine wave inverter software developers\n\nPure sine wave power feeds devices such as microwaves and printers that cant use standard inverter power, and effective heat management allows continuous fullload operation over 24 hours. This product can be optimized for a variety of applications including off. Learn how to build a pure sine wave inverter with arduino. An inverter transforms the dc electricity stored in batteries into standard household ac power. Come here for a large selection of pure sine wave power inverters ranging from 120 to 5000 watts. The block can operate in timebased or samplebased mode. Gke sw 3kva 36 v 48 v sine wave inverter kit being one of the trusted firms in the industry, we are highly engaged in providing a unique range of sine wave inverter kit. Engineer in various design and test situations, a sine wave signal with an arbitrary frequency. With the triangle wave, transistors do not switch at the same time. Research has been carried out on producing costeffective and efficient pure sine wave inverter in recent times and this paper proposes a design that is highly useful for low power based applications. Check out roadtrucker product catalog see all 12 volt power inverters see all 12 volt inverters see all thor pure sine wave see all 230 volt pure inverters see all modified inverter install kits see all pure inverter install kits see all inverters accessories see all thor wiring kits see all acdc. All power inverters convert dc power which is power stored in batteries to ac power, which is the power supplied by the electric company and fed to your home. I have also found that tools, equipment and appliances with variable speed motors will work and run much better with a pure sine wave inverter.\n\nSine wave power inverters change direct current dc to alternating current ac. I teach you how to build a pure sine wave inverter with arduino or atmega328, in one month. I try my microwave oven with two different inverters to find out. Power techon pure sine power inverter w continuous2000w surge, 12v dc to 120v ac w black and red cables w ring terminals, remote switch, 5 kinds of protection systems and 3 output. Ac converter is the voltage of the grid into a stable 12v dc output, while the output of the pure sine wave inverter is the adapter 12v dc voltage into a high voltage alternating current high frequency. Pure sine or true sine inverters are more suited for sensitive electrical or electronic items as they produce a better and cleaner current. To more clearly distinguish the inverters with outputs of much less distortion than the modified sine wave three step inverter designs, the manufacturers often use the phrase pure sine wave inverter. I cannot guarantee against unauthorized modifications of this information or. Differences in cost between modified and pure sine wave inverters.\n\nMicrochips digital pure sine wave uninterruptible power. Pure sine wave inverters best power inverters redarc. Electricity power system is one of the economic infrastructural facilities. Top 5 project you must to diy with pcb prototype sine inverter and switched mode power. Sign up pure sine wave inverter using spwm signal generated from arduino. With the triangle wave, you can set the adc trigger when the triangle wave is at 0 or 100%, because at these points you are assured that no transistors will switch. For development reference only, not a product for sale. Mastervolt inverters generate a sine wave shaped output current similar or even better than that of the public grid and perfectly suited for powering sensitive equipment. There are two types of waveforms available from highquality inverters. Pure sine wave inverter matrix user forums matrix tsl. Browse a variety of top brands in pure sinewave such as wagan tech, goalzero, and kisae technology from the product experts.\n\nThe ramsond sunray 1500 pure sine wave intelligent dc to ac inverter 12 volt is equipped with three high speed rear fans, thermostatically controlled. Make this 1kva watts pure sine wave inverter circuit. A sinewave only has the base frequency, a squareish waveform produces harmonics, more steps is less amplitudedeviation from ideal and filtering reduces the dvdt harmonics. Hi friends is there anyone here that has an idea of how to make pure sine wave inverter in flowcode 8 things of sine table i totally have no idea. Fundamentally, an inverter accomplishes the dctoac conversion by switching the direction of a dc input back and forth very rapidly. In the programming stage, i will teach you the art of programming an arduino so as to produce a sine wave signal. With our pure sine wave inverters, you can use your electrical devices anywhere in australia and get the same type of 240 volt power you get at home. Inverters r us carries 12 volt pure sine wave power inverters psw manufactured by aims, cotek, go power, kisae, magnum energy, outback, power bright, samlex america, thor, wagan, and xantrex. In addition,", "num_tokens": 2048} {"category": "common_crawl-entertainment", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-entertainment/part-00-00000.npy", "text": " has never deterred us in the past, and it never will. We drove off and this is what ensued.\n\nAnand (sitting in front seat and thus naturally assuming leadership of situation, says to driver): You take us good place? Dinner?\n\nDriver: (Blank look)\n\nAnand: Dinner? Food? (signals eating)\n\nDriver: (Dawn breaking over the horizon) Raja-bhoju! Famous restaurant.\n\nMe (protesting, from the back seat) : Raja-Bhoju? No Raja-Bhoju! Sounds shady. Do we even get drinks there?\n\nAnand (attempting to help): Drinks? Drinks? (signals drinking)\n\nDriver: (Silent Conspiratorial nod: Seems to interpret this gesture as 'the loud lady in the backseat is a tad drunk').\n\nRakesh (is next to Anand on front seat, leans over to talk to driver and clarify): Drinks, drinks, Rajabhoju? (Waggling hands around unnecessarily, as usual)\n\nDriver (Seems scandalized at this blasphemy): No drinks Raja-bhoju. Pure vegetarian restaurant, good food. Famous.\n\n(Immediate groan at this from the group as a whole)\n\nAshwani pipes up ( Is from Lucknow, but despite this, a rather rude specimen on most days): Look...listen...Boss! Boss! You take us to some good place, with food PLUS drinks, that is, BOTH, so to say. ( Believes in being clear on these issues).\n\nDriver: (Very perplexed) Raja-bhoju going?\n\nEveryone in chorus: No! No Raja-bhoju!\n\nThe driver, clearly hurt, but determined to earn his tip, continues to drive around Colombo. At various intervals, he keeps pointing out restaurants, bars, pubs, discs to us -but we keep rejecting them on the basis of their looking suspiciously like garages.\n\nFinally, we spot one garage from which multi-colored lights are emanating. We point to it and ask the driver 'What about this one?'.\n\nThe driver pulls over and looks askance at the proposed establishment which we now notice has a small crooked sign near the front which says 'Pier 3 boat'. His already shady demeanour now takes on a deeper shade of shadiness. He looks meaningfully at Anand and says 'Drinks, yes, yes this place...but you want go here?'.\n\nSomething in his manner makes us all a little wary. What kind of place is this joint, anyway, we wonder? After hurried whispered conference, we nominate Anand (for a variety of reasons, better left unmentioned) to clarify whether the place is 'respectable' enough for all of us, especially the female contingent, which typically needs to be 'protected' in such situations.\n\nBut in typical, unique style, Anand chooses to pose his question about whether the place is suitable for us women, in the following manner:\n\nLeaning in closer to the driver, lowering his voice to a whisper, sticking out his right hand in a Thumbs-up gesture, he asks\n\n' Ladies OK?'\n\nThe driver (delighted and relieved expression at being understood correctly - mirrors Anand's gesture - in fact, holds both hands out in Thumbs up, and affirms loud and clear, with a leering expression):\n\n'Ladiess, OKAYY!'\n\nNow, Anand seems quite satisfied with this and says to the rest of us 'Let's go!' and bounds out of the vehicle, bustling Rakesh out with him.\n\nThe rest of us take a minute or two to recover from the shock of witnessing this surreal interaction and then call him back\n\n'Hello? Did you see the way he just said ''Ladies, okay?'' ...\n'What kind of question was that anyway! It's clearly a shady place!'...\n'Forget it, let's just go somewhere else..'\n\nBut Anand is adamant on checking out the place. He doesn't perceive his way of phrasing his question as objectionable. He says he will look inside and then tell us whether it is indeed 'Ladies, OK' or in fact, 'Ladiess, Okaayyy!'.\n\nHe re-appears after a minute and says 'Chalo. It's fine. I told you, it's an okay place'.\n\nWe hesitate, wavering. He insists 'Come on! There are families there - I saw children too'. Now we are reassured, and clamber out of the car and head in to the garage.\n\nThe garage entry opens out into a small bar, which actually is on the lakeside and therefore offering a decent view. But once we settle into our seats around a large-ish table, we gradually take in our surroundings and many events follow:\n\na. We see that there are no children and/or families for miles around. The 'one small child' that Anand claims later that he saw turns out to be our small and offensive waiter.\n\nb. We quickly notice that the ladiess there are definitely Okayyy - and on the lookout for business. They are obscenely dressed and made up and delighted to see the fairly affluent-looking men amongst our group and send them coy, inviting smiles, occasionally breaking into strange contortions in the name of dance. They think it's going to be a good night, but little do they know.\n\nc. The music is decent enough in the beginning, english retro stuff - but soon after our entry, it is changed to Hindi film music. Despite all our protests, we are forced to listen to Bollywood songs, which seem to be centered around Mithun's works.\n\nd. The small waiter seems taken aback when we try to order food. Apparently the menu was just for show as food is hardly the main source of business for them. It takes him twenty minutes to understand the order, and then he ends up taking the whole evening to provide us with what is essentially a plate of cucumber sandwiches, which incidentally, arrives after we have paid the bill.\n\ne. The menu itself makes for interesting reading because it contains obscure items, which the disgruntled small waiter, is most unwilling to explain for our benefit. These include things like 'Brakages - charge Rs.300'. We are left to the mercy of our own imaginations, which is never a good thing.\n\nf. The high point of the evening is when we noticed that the pictures Ashwani is taking of us, actually contains less of our group and more of the ladiess behind us. (He thought he could get away with it, but didn't reckon for the technological advancement of digital cameras). Ashwani is promptly demoted from position of cameraman and retires hurt.\n\ng. The other high point is when a scantily clad woman sidles up to Sunil, asking if she can have a cigarette. She waits, clearly expecting him to jump up and light it for her. What she has not reckoned for is Sunil's innate suavity and charm in such situations, and overridingly, his innate laziness, which causes him to coolly roll his eyes towards the table and say 'Help yourself'. She does, and leaves a tad upset, much to the delight of the less mature at our table (all the other men).\n\nIn short: we ended up having a great time, despite the incredibly shady environment. As we finally wrapped up a fun filled evening and headed out towards our shady, smirking driver, we couldn't help but feel grateful for our night out in Colombo.\n\nAfter all, it could have been much worse - We could have gone to Raja-bhoju.\n\nMaybe next time.<|endoftext|>Chapter 5. Five Jewish Fusion Albums Examined in Depth\n\nThis chapter examines five important fusion albums. With the exception of Bagels and Bongos which is presented first, they are in chronological order. Bagels and Bongos. is a bridge album between the majority of the Yiddish fusion albums produced in the 1950s and 1960s and the musical standouts that are explained in this study. \n\nEach album’s case study is divided into three sections. The first section has background into the individual album, including available recording history, and reviews. The second section of each case study examines a number of individual tracks in the style of Gunther Schuller. The last section of each case study is a conclusion.\n\nAppendix A has a sampling of some of the other albums that could have been included in this study with pictures of their covers and descriptions of the albums. Musically some of them are very interesting, and have wonderful musicians on them (see Mazel Tov, Mis Amigos). Some are musically interesting, though the musicians who created the music are lost to history (see Raisins and Almonds Cha Cha Cha and Merengues), while others make one think, “do we really need a Jewish-themed parody of a band that is already made up of mostly Jews (see Al Tijuana and His Jewish Brass)”? Lastly there are the albums that are trying to make popular dance fads acceptable to older generations, such as the “twist” albums (see Bei Mir “Twist” Du Schön and Twistin The Freilach).\n\nBagels and Bongos\n\nIrving Fields’ Bagels and Bongos, when listened to today sounds dated, though of the albums under study was the only one where the same artist recorded a follow up album.\n\nFigure 1: Irving Fields Trio - “Bagels and Bongos” (cover)\n\nFigure 2: Irving Fields Trio -“More Bagels and Bongos” (cover)\n\nIrving Fields has been accused of being too commercial over the years. Here is what another musician in this study, Terry Gibbs, had to say about him in his autobiography:\n\nThere was a cocktail piano player around New York who wrote a famous song called “Miami [Beach", "num_tokens": 2048} {"category": "common_crawl-entertainment", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-entertainment/part-00-00000.npy", "text": " (shoves SpongeBob off) GET OFF ME! (tries to get out)\nSpongeBob: Hey, Squidward. What are you doing?\nPatrick: Yeah, it looks like fun!\nSpongeBob: I know, but what are you doing?\n(Bubble Transition)\n(everyone cheering)\nMr. Krabs: Who's ready to eat a krabby patty, because all that waiting in line has gotten you hungry!? (crowd cheers. Everyone enters the Krusty Krab as Plankton laughs evily)\n(scene cuts to time capsule)\nSpongeBob: Hmm. What should we do for the next 50 years?\nPatrick: Well, I'm just gonna hang here, maybe get a kelp soda later.\nSpongeBob: Patrick, we can't go anywhere. We're stuck here until they open the time capsule in 50 years.\nPatrick: (shocked) What'll we do until then?\nSpongeBob: We've got 50 years worth of stuff to play with! (finds a game) Ooh! It's our favorite game!\nBoth: Pretzel Pals!\nPatrick: Ooh! Ooh! Ooh! (lays the game out)\nSpongeBob: Yes, yes, now where did we leave off?\nPatrick: I believe my left hand was on red.\nSpongeBob: My right foot was on blue.\nPatrick: Forehead on yellow.\nSpongeBob: Left foot on green.\nSquidward: That's it, this game is OVER!\nPatrick: Hey, SpongeBob, what do you think Bikini Bottom will look like in the future?\nSpongeBob: Hmmm. (SpongeBob images his future in a chrome area)\nFuture Fish: Hello, mystery person. During your absence, our society has achieved numerous advances. We're sure you'll find it to be quite impressive. (he and SpongeBob get teleported to a water fountain) Well?\nSpongeBob: Wow, a water fountain for short people! What will the future come up with next? (SpongeBob's future ends)\nPatrick: Not bad, SpongeBob! Not bad! I dream of a town with the perfect converse and irrigation. (imagines his future) Not to mention the breathtaking views.\nSpongeBob: Sounds dreamy, Patrick. What do you think the future will be like, Squidward?\n(Squidward imagines his future)\nFuture Squid: (holding up Squidward's painting) This art enbodies the soul that our society has lost. And it is here. (the Krusty Krab is shown) The location of the suffering that insired that art that we place the Squidward Tentacles Memorial Mueseum! (Squidward's house is dropped in place of the Krusty Krab; the other squids cheer)\n(scene transitions to the present with Squidward smiling)\nSpongeBob: Squidward? Squidward?\nPlankton: (uses his mining drill and burrows towards the time capsule) Yes! Now to extract the secret recipe. (the mining drill extends its arms, holding and wedge and hammer) Careful. Careful. (it hits the wedge and Squidward gets knocked out)\nSpongeBob & Patrick: Eighteen Bikini Bottom, nineteen Bikni Bottom, TWENTY! Ready or not, here we...(they both spot Squidward)\nPatrick: Nice try, Squidward, but we've already had that place figured out. (finds a can of shaving gel) Whipped cream! (eats cream and spits it out) Ugh! This whipped cream tastes awful! (reads off can) \"Shaving gel\". (a drill drills through and creates a hole in the can causing the shaving gel to land on Patrick's face) I've always wanted a beard!\nSpongeBob: Me too! (both laugh as SpongeBob sprays shaving gel on his face) How about you, Squidward? (sprays a beard on Squidward's face)\nSquidward: (wakes up and moans) Has it been 50 years already? (looks in the mirror and notices the beard) Yes! I knew I'd still be hot!\nPlankton: (sneaks inside) Secret recipe, where are you? Aha!\nSquidward: Hello future! (escapes through the hold Plankton made and up to the surface; laughs) Yes! Huh? Where's my museum? The future the same as my old pathetic life! Forget this, I'm waiting another 50 years! (SpongeBob and Patrick watch as he stomps away)\nPlankton: Finally, the krabby patty secret recipe! (laughs evily)\nSquidward: (stomps on Plankton, causing him to swallow the bottle) Wake me up when my life doesn't stink!\n(Bubble transition to the Chum Bucket; Plankton is sitting on the toilet grunting)\nKaren: Don't hurt yourself, Poopsy.\nPlankton: Quiet, Karen. Just send me more prunes.<|endoftext|>MONDAY’S MUSIC MOVES ME: A Kaleidoscope of Color Songs – The Rainbow Sherbet Edition\n\nWow, it is good to be back! I have been away from blogging since just after Thanksgiving. Life got a little crazy during December and that craziness carried over into this new year so my “holiday break” turned into an 8-week break! Honestly, the theme for Monday’s Music Moves Me (#4M) was ‘Christmas Holiday Music’ for the entire month of December and I wasn’t feeling any kind of holiday spirit so I decided to blow off the whole month. And then I apparently wasn’t ready for the break to be over so I skipped out on yet another Battle of the Bands this month and three weeks of #4M.\n\nI was actually planning on posting last Monday because I LOVED the theme that our Spotlight Dancer, Mary from Jingle Jangle Jungle, came up with: SONGS WITH COLOR IN THE TITLE. I actually started working on it a little bit last month but I wasn’t quite finished.\n\nThe theme really excited me because I’m all about color. Those of you who know me surely agree. It’s no secret…my clothes, my house, me décor…I love color! So even though I missed last Monday’s 4M I was going to use today’s Freebie theme to post my Color Songs.\n\nNow there are a zillion songs with a color in the title so I started out just putting together a playlist with my favorite colorful songs… but “wasn’t quite finished” was a serious understatement! When I began compiling a list of the color songs that I’m particularly fond of, it ended up being a ton of songs that would’ve yielded a real mother of a playlist — one way way too long for a single #4M post (and you all know I typically do long playlists and posts normally so for me to say it was too long, you know it has to be a monster list!)\n\nSo… I have decided to do a series: A KALEIDOSCOPE OF COLOR SONGS. The series will post over the next several Freebie weeks. Each post will focus on a specific color (or colors) until I’ve exhausted my list. I’m not yet sure how many weeks it will be. We’ll find out together.\n\nToday my KALEIDOSCOPE OF COLOR SONGS is the Rainbow Sherbet Edition, a playlist featuring songs with the colors Orange, Green and Pink in the titles. Here is my playlist followed by some information and interesting facts about each of the songs. Hope you all enjoy!\n\nOrange Crush by R.E.M. – “Orange Crush” is a song by the American alternative rock band R.E.M. It was released as the first single from the band’s sixth studio album, Green, in 1988. It was not commercially released in the U.S. despite reaching number one as a promotional single on both the Mainstream and Modern Rock Tracks (where, at the time, it had the record for longest stay at number one with eight weeks, beating U2). It peaked at number 28 on the UK Singles Chart, making it the band’s then-highest chart hit in Britain, where they promoted the song by making their debut appearance on Top of the Pops.\n\nOrange Crush was an orange flavored soft drink. In this case, though, it was meant to refer to Agent Orange, a chemical manufactured by Monsanto Corporation and Dow Chemical used by the US to defoliate the Vietnamese jungle during the Vietnam War. US military personnel exposed to it developed cancer years later and some of their children had birth defects. The extreme lyrical dissonance in the song meant that most people completely misinterpreted the song, including Top Of The Pops host Simon Parkin, who remarked on camera after R.E.M. performed the song on the British TV show, “Mmm, great on a summer’s day. That’s Orange Crush.”\n\nThe song does not refer to any single Vietnam-related experience for lead singer Michael Stipe, but simply that he lived in that era of American history. He wrote in Part Lies, Part Heart, Part Truth, Part Garbage 1982-2011:\n\n“[The song is] a composite and fictional narrative in the first person, drawn from different stories I heard growing up around Army bases. This song is about the Vietnam War and the impact on soldiers returning to a country that wrongly blamed them for the war.”\n\nAs a guest on the late-night show Last Call with Carson Daly, Michael Stipe explained that the song was about a young American football player leaving the comforts of home for the war in Vietnam.\n\nAlso, Stipe opened the song during The Green World Tour by singing the famous U.S. Army recruiting slogan j", "num_tokens": 2048} {"category": "common_crawl-entertainment", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-entertainment/part-00-00000.npy", "text": " days.\n\n''But you have to have a reason to get up and my manager keeps saying, 'You have to do something.' But right now I don't really feel the urge to record.\n\n''My doctor said, 'I can stop you drinking but I can't give you a reason to get up in the morning.' I stopped drinking 18 months ago, but they're still trying to find me that reason.''\n\nStory by 09:11 | Tuesday 30th September 2014\n\nmore like this<|endoftext|>Heath Ledger gets a fragment of Dylan in I'm Not There\n\n 1 of 1 2 of 1\n\n NEW YORK CITY–American pop culture has a lot of real and fictional icons. Australian actor Heath Ledger is currently promoting a version of a real one in I'm Not There , in which he is one of six actors portraying aspects of Bob Dylan's life. (He is also shooting The Dark Knight , in which he plays the Joker, who became iconic through the Batman comic books and Jack Nicholson's performance in Tim Burton's 1989 film, Batman .)\n\n In a New York hotel room, he says that it's never going to be easy to take on a role that comes with certain expectations from the audience. \"When you are playing these kinds of parts, you can underprepare or you can overprepare, but it is all just to feed our superstitious needs and to comfort ourselves. I was a fan of Dylan, but he was someone who I had scheduled somewhere down the line to be obsessed with because I do get obsessed with musicians and artists. So I think [director] Todd Haynes prematurely invited me into this film. The Joker was different in that I was definitely a fan of what Jack Nicholson had done and the world Tim [Burton] created. I think that if he [Burton] was directing The Dark Knight and asked me to play the Joker, I would say, 'No, I couldn't.' The reason why I confidently stepped into his [the Joker's] shoes is that I had seen [ Dark Knight director Chris Nolan's] Batman Begins and I knew the world that he had created and I knew there was a different angle to be taken with the Joker.\"\n\n In I'm Not There , Ledger plays Robbie, a film actor who gains fame by playing a Dylan-like character (Christian Bale) who disappeared at the height of his fame. Robbie then falls for a young Frenchwoman (Charlotte Gainsbourg), marries her, and has two daughters, but he has numerous affairs as he travels the world. Haynes has told reporters that the character represents Dylan's personal life. Ledger says that he and the other actors (Bale, Marcus Carl Franklin, Ben Whishaw, Cate Blanchett, and Richard Gere) are all pieces of Dylan that came about as a result of Haynes dissection of the singer's personal life and career.\n\n \"I was concentrating on one arm of Bob Dylan,\" he says. \"Todd dissected his life and turned the film into a number of short films. We [the actors] just concentrated on our individual stories. I tend to feel that my story and Charlotte's character”¦represent a more personal portrait of Dylan than the others. I did a lot of research in that I read books, watched documentaries, and expanded my Dylan catalogue. However, I can't say that I know more about him than you do. That is what is beautiful about Todd's attempt to preserve Bob's mystique. He kept him respectfully in the shadows a little and I am happy about that.\"<|endoftext|>Pino De Vita (keyboards)\nAttlio Zanchi (guitar)\nJonathan Scully (percussion, vibes)\nJoe Castanuela (drums)\n\nA band based in Milan and including Italian and American musicians, Maad were another of those bands (like I.P.Son Group) trying to mix together jazz-rock and afro-American music. \nThe result can be not particularly attractive for prog fans but has some interesting moments.\n\nSome of the musicians involved were founder members of the L'Orchestra label, but the album was released on a different label, Divergo. \nThe album also included a guest appearance by sax player Renato Rivolta, who had collaborated with Stormy Six and Come le Foglie (that also had Attilio Zanchi among their founder members).\n\nAttilio Zanchi has remained in the professional jazz circuit. He is still considered one of the best Italian upright bass players.\n\nMaad Divergo (DVE 008) 1976 gatefold cover\n\nMaad Mellow (MMP 295) 1997 reissue of 1976 album with an unreleased bonus track\n\n(with picture sleeve)\nGiugno '75\nDivergo (5050 002) 1977 B-side also on the Maad LP in a longer version\nWake up\nPhilips (6025 202) 1978  \n\nNot a rare album, Maad was released by the Divergo label in a gatefold cover. \nIt has never been issued abroad nor counterfeited.\nThe CD version on Mellow includes a bonus track, Zabaz, originally only issued on single.\n\nBoth the group's singles contain tracks that were used as signature tunes for Italian TV shows: Zabaz for A tu per tu con gli animali and Wake up as theme for 3 pezzi facili.\nThe B-side of their first single, Giugno '75, had already appeared in a longer version (over 12 minutes) on the Maad LP.\n\nMaad - LP\n\nZabaz - 7\" single\n\nWake up - 7\" single\n\nThanks to Valerio D'Angelo for some information included in this page.<|endoftext|>good vibrations\n\nMattie Cecile. 19. July 18. ENFP. Multi-Fandom.\n\ni like Jesus and vintage things and military boys and pretty pictures, i have an obsessive personality, and i lie somewhere in the middle on the invert/extrovert spectrum, sophomore at azusa pacific university, studying english with a history minor. law school or writing is in my future. i love poetry and beauty and metaphysics. i'm strange, but i truly wouldn't have it any other way.\n\n\"She is clothed with strength and dignity;\n\nshe can laugh at the days to come.\n\nShe speaks with wisdom,\n\nand faithful instruction is on her tongue.\"\n\nProverbs 31:25-26\n\nTumblr on November 1st\n\n(Source: hirohamahda)\n\nlife hack: kill everyone except ur crush so they’re forced to date u\n\nPinups on a road trip, 1950s.\n\nPinups on a road trip, 1950s.\n\n(Source: vintagegirlwatchers.com)\n\nhades isn’t a badass. hades named his three-headed-guard-of-the-underworld-dog spot. hades whispers to his flowers to make them grow. hades grows fruit. there’s no sun in the underworld.\n\nhades isn’t a badass. stop saying this false thing\n\n#persephone sets up wifi in the underworld and hades spends all day watching vine compilations (via bralpha)\n\n(Source: heliospanoptes)\n\nWe’re the diamonds, rising up out the dust (listen)\n\n(Source: frostingpeetaswounds)<|endoftext|>earching for Freedom at Ebertfest, Vienna and the Internet: Jem Cohen and \"Museum Hours\"\n\nWhat happens when you take one of the most intimate and sensitive films about art and friendship and project it to a full house in a gigantic, 1500 seat theater? The Virginia Theatre screening of Jem Cohen’s acclaimed \"Museum Hours\" was as strangely beguiling as it was singular to the Ebertfest experience. Cohen’s film, which observes two strangers who become friends through encounters at the Kunsthistoriches Museum in Vienna, is one of extraordinarily quiet observation and attentiveness to life’s overlooked details.\n\n\"Museum Hours\" seems particularly well-suited to Ebertfest because it mirrors one’s experience of the festival. Over a few days, strangers meet and get to know each other by watching the same works of art. Through leisurely conversations between screenings, lives and minds are mutually revealed and exchanged. While conducting the post-screening Q&A, Ebertfest director Nate Kohn and I determined that this film essentially is the Ebertfest experience in Vienna.\n\nPerhaps it’s fitting then that Cohen’s inspiration for the film materialized at a film festival. It was as a guest of the Viennale Film Festival that Cohen encountered the paintings of Breughel at the Kunsthistoriches and “felt a strange sense of familiarity” between these 16th century paintings and his own documentary films. “They didn’t tell you where to look. You’re given a certain freedom to roam and decide what is worth it to you.” It also speaks to Cohen’s own “lifetime of wandering around,” and finding treasures in unexpected places. Bobby Sommer, who stars in the film as the modest museum guard, was working as a Viennale when Cohen met him. He and co-star Margaret Mary O’Hara improvised a good deal of their dialogue, leading to unexpected payoffs, like when they humbly share their admiration of Judas Priest and AC/DC.\n\nTo have those beautifully subdued moments writ large on a three story screen not only amplified but intensified their wonders. Cohen was startled by how responsive the audience was to the film’s nuances, laughing at small humorous details that passed by silently at other screenings. I had noticed a similar phenomenon last year when Patrick Wang’s equally gentle masterpiece \"In the Family\" screened here. There’s something special about seeing a movie with 1500 people who have", "num_tokens": 2048} {"category": "common_crawl-entertainment", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-entertainment/part-00-00000.npy", "text": " Westmoreland Academy in Pasadena, a specialized school for students with autism, from ages 10 to 17.\n\n“He hated school because they didn’t quite understand him. He had a lot of self-injury,” Paul said.\n\nThe loneliness of non-oral autism was a source of deep grief. But Jacob’s parents found passions they shared with him. Their nights were often spent watching “Jeopardy!,” a favorite of Jacob’s, and plowing through the French New Wave and Hitchcock film canons together. They went together to concerts like Lindsey Buckingham at the Orpheum and Neil Young at the Greek. “It’s a challenge, but Jacob loves Brian Wilson, Frank Zappa,” Paul said. “I think he recognizes people who feel the whole thing like he does.”\n\nTheir worlds changed dramatically in 2020 once Jacob, after years of intense motion training, learned to use one finger to type into a specially equipped iPad with text-to-speech prompts, enabling him to speak for himself for the first time.\n\nHis family had always nicknamed him Jake, but once he could type, “One of the first things he said was, ‘Call me Jacob,’” Paul said.\n\nThe family had an invigorating yet humbling new understanding of Jacob’s personality. Whatever they’d surmised about their son’s inner life, he could now tell them himself, and his world was much richer than they’d known. That included the music that he desperately wanted to hear performed.\n\n“You could have seen him walking down the street, and somebody would say, ‘Oh, my God, that poor soul,’ Paul said. “He doesn’t look like he’s present. This shattered that preconception of people who have this kind of autism.”\n\nDr. Kenneth Aigen is the music therapy program director at New York University, one of the world’s leading centers for engaging with people with autism through music, often through the Nordoff-Robbins practice of collaborative performance. He doesn’t work with Jacob but said it’s no coincidence that music helped the youth bond with his family.\n\n“Autistic people get the same thing we all get out of music, a way of communing with other people,” he said. “In our program, we’ll be improvising on a piano, and go to an odd chord modulation. The child will laugh and smile, and it’s not purely a reflexive act. Think of the auditory and cognitive processing involved to identify an unusual key change and laugh. It can be a first time feeling their human intelligence. You can’t overestimate that.”\n\nFor many people with autism he works with, music is of life-and-death consequence for mental health.\n\n“Imagine having no means of expressing the intelligence people assume you didn’t have,” Aigen said. “How frustrating, how lonely. But one of the most important things is that for autistic people, many music communities accept them. You go to a heavy metal or a Grateful Dead show, you can dance bizarrely and it’s accepted. The things that set them apart from regular social life, in musical subcultures, they feel at home.”\n\nSome people with autism, even nonverbal ones, have formidable music skills. Many successful pop and classical musicians can exhibit traits associated with autism, which can be stereotyped by the public. Studies have found some correlation between autism and having perfect pitch, but many experts think it’s most likely that intense focus — a common manifestation of autism — helps cultivate innate musical talent that is otherwise more randomly distributed.\n\nFor Jacob, music came easy. The hard part would be physically translating the composition.\n\nPaul was already tapped into a local music community through Wild Honey Foundation, his concert production group that books all-star tribute shows to classic and psychedelic rock acts like the Lovin’ Spoonful and the “Nuggets” compilation. He called on Laufer, a longtime family friend, to work with Jacob to take his prodigious written notes and turn them into music.\n\nLaufer is a successful session musician (he performed on Fiona Apple’s “Criminal”; his son is the electronic musician Shlohmo), but he hadn’t composed anything of the scale and intricacy Jacob was asking for.\n\n“I had already been clued in that Jacob had a lot more going on than anybody imagined,” Laufer said. “But it became clear that he couldn’t give me actual musical content, it was all going to be verbal description. I said, ‘I can only get so close to what you’re hearing in your head, I’m going to have to make stuff up.’ But he was very aware of the limitations. We talked about stuff like, ‘What do you want your audience to feel?’”\n\nJacob’s written notes for Laufer were incredibly detailed and imaginative yet also showed the ineffability of the music he’d imagined. Composers and producers try to inspire musicians with abstract visions of how to play, and music always transforms between one’s mind and their instruments. But how does one note this on a music chart?\n\n“A series of bursts of cacophony on piano (5, 10, 30, 40 and 30 seconds) … I want soaring violins to rip out of the cacophony for 2 minutes. I want to hear the violins reaching for the sun. … I want the soaring violins to run smack into bass and horns with a sudden jolt as they disappear. … The violins are demanding sleep and the horns are demanding pain.”\n\n“I would sit at the piano and go, ‘You mean this? You mean that?’ And I’d play him a few examples,” Laufer said. “‘What do you mean by cacophony? What do you mean, a melody that reaches for the sun?’”\n\nJacob, Paul and Laufer spent endless days and nights hashing out a close-enough approximation of what Jacob wrote, using MIDI and samples to arrange the orchestral parts. The end result, as Jacob described it, was “damn close.”\n\n“I think feeling is a gift that Rob has, to always be able to connect with him and my damn inferior words that fall short of the music in my brain and heart,” Jacob said. (Like many teen rock fans, he curses liberally in conversation.) “And I believe my dad would do anything for me, he’s so loving and I need love so I can’t feel damn alone as long as doing music with him and Rob is possible.”\n\nTo actually see this performed, they needed tens of thousands of dollars to professionally notate the score; hire musicians and a conductor; and secure the time and venues to rehearse and, eventually, perform “Unforgettable Sunrise.” Wild Honey’s benefit shows often directed funds to the Autism Healthcare Collaborative, which in turn provided around $50,000 to hire Newman-Lessler and the 54 USC music school students to perform the symphony.\n\nOn the day of the debut, Paul was worried about how Jacob would handle the performance. Paul feared that crowds might not show for a debut symphony by an unknown, non-oral teenager with autism. Jacob wouldn’t be performing onstage, but he can still get overwhelmed by attention and interaction, and his physical limitations can easily exhaust him. “He’s been so excited, but he can lose control of his body and do things he doesn’t mean,” Paul said.\n\nYet at the performance, Jacob — wearing the same Neil Young T-shirt — took the stage alongside his father and Laufer. He typed a message on his iPad, which he played into a microphone.\n\n“I’m very glad you felt my latest work was worth your time and money,” he said, matter-of-factly, to the now-packed crowd at the Alex. “This symphony is my story, so enjoy being in my head for 70 minutes.”\n\nThe hour-plus that followed was, to the best an outsider can know, a vivid evocation of Jacob’s mind as it’s affected and inspired by its unusual neurology. The violins indeed soared toward the sun, then veered into seething brass. Many movements were beautiful, led by French horns and harp, while other passages had a just-askew musical logic. The radiant, adventurous spirit of Brian Wilson imbued everything. Meter changed frequently; tonal clashes revealed uncommon depths of feeling. The music was as complex as Jacob’s unknown inner life had been for 19 years.\n\n“With Jacob, you’re always waiting for the other shoe to drop — he feels good, then he feels unsettled,” Paul said. “Explosions of joy and misery. The extreme highs and lows are captured in the piece.”\n\nWhen the orchestra wrapped, Newman-Lessler had sweated completely through his white tunic. The crowd rose to its feet and, for minute after minute, applauded Jacob and his tear-streaked father and musical collaborator. A young man whose life was invisible to the world was headed home a rock star.\n\n“That was the best night of my life,” Jacob said to his father after the performance. “My symphony is so fantastic that I want to cry. I’m so happy that I feel a damn terrific rush of joy.”\n\nJacob is already moving on to his next project — an opera where he will dictate the music but write the libretto himself. “I think the opera holds a lot of opportunity for him to show exactly what’s on his mind, a stronger emotional roadmap,” Paul said.\n\nYet Jacob’s caregiving needs will remain, and may be complicated by his made-for-Hollywood musical achievement. Paul said that the day after the performance, he had an hours-long conversation with a film producer who wanted to make a movie about Jacob’s life.\n\nPaul said the family has an extensive plan in place for Jacob’s care for decades to come, even after his and Lisa’s deaths. While he’ll need care for the rest of his life, Jacob’s autism now can be a place of strength as well.\n\n“We’re trying to find people who we can trust that can be with him. That’s hard to do", "num_tokens": 2048} {"category": "common_crawl-entertainment", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-entertainment/part-00-00000.npy", "text": " as the playing strings. \"Basically they hook onto more or less where the button is, where the tailgut of the tailpiece goes. Then they run underneath the tailpiece; there are little tiny holes in the bottom part of the bridge that they run through. They continue their journey through the neck, the neck of a d'amore is hollow...this is why you can't get a cheap one, it's very complicated to build! They then continue up through the back of the peg box and then hook into pegs that are higher up towards the scroll than the pegs of the playing strings. That's why I think people look at it and think it's a kind of viola; the peg box is so long, it's an optical illusion. The string length is violin string length, but then its peg box goes on forever, which also makes it a heavy instrument.\"\n\nWith a system that complex, how does one install those resonating strings? \"For most of the resonating strings, you have to have a shop do it,\" Rachel said. \"The good news is that they rarely ever break and they certainly never have to be changed because they've worn out -- as long as they haven't broken they can stay on there for many years. So that's a good thing, it certainly cuts down on the costs.\"\n\nHow does one actually play such an instrument?\n\n\"First of all, it's a brain-twister,\" Rachel said, and it's not just because there are six or seven strings to play. \"There are certainly six-string instruments out there, in the electric violin world. Leila Josefowicz plays an electric six-string for John Adams' Violin Concerto, and in the non-classical world everybody is playing five-string, six-string, even seven-string instruments. But those are a bit easier to wrap your mind around because they are tuned in fifths: E-A-D-G, then the C string of a viola, then an F string, and if you go really extreme you've got a Bb seventh string, which is one whole step lower than the C string of a cello. Because they're always electric, you don't have acoustical issues the same way as with an instrument with its natural sound box. The curve of the bridge can actually be steeper, which allows you to more easily isolate the strings with your bow. Because it's going through an amp, you don't have to worry about the ribs being in a certain place.\"\n\nPlaying the viola d'amore, with its unusual tuning, is a little like playing on a \"scordatura\" violin -- that is, a violin that is cross-tuned for pieces such as Rosary Sonatas by Biber, or the second movement of Mahler's Fourth Symphony, or Appalachian fiddle music. \"But that's only four strings,\" Rachel said. \"So to have cross-tuning, and six or seven strings -- now that's a big brain-twister!\"\n\nThe instrument is also a challenge ergonomically, with its rather flat bridge. \"When you think you're crossing over one string, you might in fact accidentally be crossing over two strings,\" she said. \"The strings are simply closer together. So to know exactly where each one is, and know where you're going when you're going from string two to string five and then back to string three and over to string four and then string one....I'm not ashamed to say, the first few months of trying my hand at the instrument, I was still getting all mixed up, where my finger would be on string five and my bow would be on string six -- I was completely discombobulated!\"\n\nThere aren't really any teachers of the d'amore; Rachel taught herself to play the instrument. \"If you know how to play the violin, it's just a question of letting your muscles sort themselves out,\" Rachel said. \"There are no shortcuts, you've just got to try it and drill it and eventually be able to do it. For me, it was just a question of finding a few easy pieces and working on them. It was like going back to Suzuki Book 1 because every single finger had a number over it! You can't just look at the note and know where that note is! You're almost reading tablature. And even now that I've been playing it for years, and I think this is true of most d'amore players, we still have an awful lot of finger numbers and Roman numerals for string numbers in our music. It's certainly not an instrument where you could sit down and sight-read chamber music! Every piece you want to play, you've got to work it out. Especially because there are some pitches that could be played on any one of four strings. So you have to decide, in terms of pattern, which one makes the most sense? It's just so tricky.\"\n\n\"But the voice is so unusual, that's what makes it worth it,\" she said. \"It's not just about having these unusual tunings and being able to do chords that just don't even exist on an instrument tuned in fifths. More importantly, it's about the tone of the instrument. It has its own unique voice and it's absolutely mesmerizing. In fact, one of the best descriptions of d'amore that I ever heard was from a girl who was taking some coachings with me. She picked up the d'amore and played a few open strings and said, 'That's just so refreshing!' I thought that 'refreshing' was a great adjective. There are many adjectives that one could use: It's silvery, it's delicate.\"\n\n\"What Vivaldi did with the viola d'amore is absolutely fascinating,\" Rachel said. \"Vivaldi was inspired by Pisendel's playing, and it's thought that he might have even written some of the concerti for Pisendel. Certainly Pisendel had copies of a lot of the concerti in his library in Dresden. But one of my favorite things about Vivaldi's story with the d'amore is that he also wrote for his talented female students at the Pietá, the orphanage where he worked. There was one particular young violinist -- one of the best of the bunch -- named Anna. She is known to also have been a virtuoso of the d'amore and to have played Vivaldi's concertos, some of which may have been specifically written for her. So I love knowing that there was a woman in the Baroque period who definitely played these concertos. That's another reason why I was inspired to put a woman on the cover.\"\n\n\"Actually there's a book I should mention, which has the unnecessarily racy but memorably alliterative title, Vivaldi's Virgins by Barbara Quick. It's very well-researched, and the descriptions of the general aspects of life in that time and how the Pietá functioned are very accurate. Obviously the backstories of the particular young ladies in the plot are fictionalized, even when she is writing about young ladies like Anna, who were real people. But I think it's fun that the book describes Anna, playing the d'amore!\n\n\"Another book about the Vivaldi era in Venice, if you can deal with the sex scenes, is Cry to Heaven by Anne Rice. I still to this day think is one of the most vivid descriptions of vocal lessons of the Vivaldi era that anybody has ever written. She did her homework well, and she's a good writer. It really does bring the musical scene of the times to life, focusing more on the phenomenon of the castrati. But instrumental and vocal studies were not so far apart back then as they are these days, and I found that as a violinist, I gained a lot reading that particular book.\"\n\nThough viola d'amore is an instrument of the Baroque era, it did not become frozen in that time period. Composers have continued to write for d'amore, even into the modern era.\n\n\"Other instruments from the Baroque era -- the Lirone or the viola da Gamba -- a lot of those early instruments have remained instruments of early music,\" Rachel said. \"The viola d'amore is different. Great composers have written for this instrument. During the Romantic era it went a little bit underground, but then coming out into the 20th century it started to pick back up. More than half its repertoire is from the 20th and now 21st centuries. Hindemith wrote a concerto for it; Casadesus wrote chamber music for it, Janacek wrote for the instrument.\"\n\nAs for makers, \"every great Baroque maker -- Gagliano, Testore, you just name a maker and they made a d'amore,\" Rachel said. \"Stradivari left a pattern for a d'amore; it's not known whether he never got around to making it, or whether he made one or more and they didn't survive. Absolutely every other great Italian maker that you can name, made d'amores.\" And like the violin, the viola d'amore has been modernized. \"A lot of violas d'amore made in the 1700s, just like violins made in that era, have been renecked with longer fingerboards, different bridges, different tailpieces -- like you do with violins to make them modern violins, even if they started life as Baroque violins. And of course any violas d'amore made these days, for the most part, are made as modern d'amores. So there is such a thing, to that same degree.\"\n\n\"I think any violinist would have fun, trying his or her hand at the d'amore,\" Rachel said. \"For those of us who love the sound of the violin, it's just another kind of sound that is so incredibly satisfying and intriguing. If you're", "num_tokens": 2048} {"category": "common_crawl-entertainment", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-entertainment/part-00-00000.npy", "text": " it's a big anniversary, we get elements of the past in each story - starting with someone we haven't seen since the last big anniversary. Turns out tulips aren't the only things to come from Amsterdam...\n\nTuesday, 26 November 2019\n\nGoodbye, Sarah Jane Smith - SJA 4.6\n\nIn which Sarah Jane Smith, Clyde and Rani rush to the landing site of a meteorite, following an alert from Mr Smith. There is a fear that it may carry alien pathogens. It proves to be harmless, but they are confronted by a woman who has also come to investigate, and claims to be helping save the planet from aliens. She speeds off in a red sports car, and later they discover that she has moved in to a house around the corner from Bannerman Road. They go to confront her and learn that her name is Ruby White and she has moved to the area because of all the alien activity which Sarah and her friends have been dealing with over the last couple of years. She cold shoulders them and orders them out of her home - accusing them of being little more than amateurs.\nThe next day Sarah finds herself forgetting that Luke is away at university when she talks to Rani's mother. Gita. Then she forgets K9's name when she later talks to her son.\n\nThere is another alert from Mr Smith, sending them to a junkyard where a trio of Dark Horde warriors materialise. Sarah discovers that she has forgotten to ask Clyde to bring the sonic lipstick, and she realises they are defenceless. Ruby suddenly appears and gets Clyde and Rani to help her to chase the Horde off, using a hand-held AI device to make them think they are up against superior forces. Clyde nicknames the device Mr White, after Sarah's Mr Smith.\nThey invite Ruby back to the attic, where she apologises for her earlier cold attitude towards them. She wants to be friends, and even Mr Smith and Mr White seem to get along. That evening, Sarah becomes increasingly worried about her memory lapses, and asks Mr Smith to conduct a medical scan on her. He notifies her that she has a degenerative brain condition. Not wishing to put Clyde and Rani at risk, as she did at the junkyard, Sarah decides to retire. She invites Ruby to her home and asks her to take over from her. After ordering Mr Smith to delete her command protocols, she gets ready to leave on an extended holiday. However, she finds herself transported to a cellar where Ruby chains her to the wall. In an alcove is a massive fleshy lump - Ruby's stomach. She is really an alien Qetesh, creatures who feed on the emotions of others. Ruby has been attacking Sarah for some days, causing her memory problems, and Mr White had tampered with Mr Smith to give the false medical scan diagnosis. She has abducted Sarah as she had led the most exciting life of anyone on Earth. Afterwards she will feed on the entire planet...\n\nInstead of stopping alien invasions, she will facilitate them - to create more emotions upon which to feed. Clyde and Rani see a fake video message from Sarah telling them that she has gone away for good, but Clyde is suspicious as she would never abandon Luke. Mr Smith then attempts to warn him but Ruby shuts the computer down and Mr White teleports Clyde away from the attic. He finds himself in a pod floating in space above the Earth - a prison capsule from which Ruby has escaped. He has a limited amount of oxygen. Mr White had been an entertainments console left by her captors, but she reprogrammed it to aid her escape.\nWorried about his mother, Luke arrives at Rani's house. Luke contacts K9 back in Oxford and gets him to trace Clyde's phone, and they discover he is in space. Rani must get her mobile close to Mr White, so that K9 can hack into it. Mr White is reprogrammed to return Clyde to Earth, but Ruby escapes. Luke, Rani and Clyde go to her house and find Sarah in the cellar, where the stomach is still feeding off her. Mr White is used to create a hologram of meteor strikes hitting the planet, and the huge wave of emotion generated is too much for Ruby's stomach to absorb. It shrivels up, releasing what it had taken from Sarah back to her. Ruby vows revenge, but is sent back to her prison in space.\n\nGoodbye, Sarah Jane Smith was written by Gareth Roberts and Clayton Hickman, and was first broadcast on 15th and 16th November, 2010. It marks the end of Series 4 of The Sarah Jane Adventures - what would prove to be the last full season of the show. Hickman is best known for being the editor of Doctor Who Magazine (from 2002 to 2007, so in post to oversee the return of Doctor Who to the airwaves, and a huge redesign for the publication). He's also well known for his design work - including the covers for the Classic Doctor Who DVD range. You'll have seen him in a few of the DVD extras as well.\nEvery series of SJA has had a story with \"Sarah Jane Smith\" in the title, written by Roberts. This is the first one not to feature the Trickster. This is the first season in which he hasn't appeared. Instead, a new character is introduced - a sort of anti-Sarah Jane Smith who at first appears to do everything she does, only better, and looks more glamorous to the youngsters. Mr White is a small hand held gizmo, as opposed to Sarah's huge attic-dwelling computer, and Ruby White drives a flash red sports car as opposed to Sarah's - a retro-looking Nissan Figaro.\nAfter a few cameo appearances on video links in the last couple of stories, Tommy Knight returns as Luke, and K9 also features. This would be K9 Mark IV's final appearance on screen (and therefore John Leeson's final vocal work in the televised Doctor Who universe, at least to date).\n\nWe only have two guest artists in this story, principal of whom is Julie Graham. She's Scottish, so naturally her first TV work was an episode of Taggart. Genre appearances include the revamped Survivors, a remake of Terry Nation's 1970's drama series, and Bonekickers. that dreadful archaeological adventure series.\nVoicing Mr White is Eddie Marsan (Mr Norrell in the BBC adaptation of Jonathan Strange & Mr Norrell amongst many, many others).\nIt's a surprise that neither guest artist has been called upon to appear in Doctor Who itself.\nOverall, another quality addition to The Sarah Jane Adventures. It's tragic in hindsight, watching this knowing that Lis Sladen was already ill, as we see Sarah physically and mentally deteriorate. The title is painfully apt, as this was the last thing we had seen before Lis's untimely death.\nThings you might like to know:\n • Series 5 would have bucked the trend of not having a story with \"Sarah Jane Smith\" in the title, as we have a record of what the unmade stories would have been called.\n • Roberts and Hickman were collaborating on another story for that season when Sladen died and production was stopped.\n • Ruby White was clearly set up for future return appearances, as the last we see of her is her vowing revenge on Sarah.\n • Clyde maintains the tradition of someone being slimed during the story.\n • Yet another reason to ignore the whole UNIT dating controversy, as Sarah states that she was 23 when she first met the Doctor. The Temptation of Sarah Jane Smith shows that she was born in 1951 - meaning the events of The Time Warrior take place in 1974.\n • Julie Graham went to school with Eric Potts (Oliver Charles in Aliens in London).\n\nSaturday, 23 November 2019\n\nSeries 12 - The Trailer\n\nFirst of all, Happy Doctor Who Day. I've been watching the series since the tail end of the 1960's, and I didn't even know that was a thing, but have a happy one anyway.\nToday we finally got to see a proper glimpse of the forthcoming series - glimpse being the operative word as what we have is a rather frantically paced trailer. If previous series are anything to go by, several of these clips will have come from the same few stories, usually from the start of the run.\nWe have had confirmation of the return of the Cybermen, redesigned once again (see above for the only shot we had of them). The participation of Stephen Fry had been confirmed a couple of days ago - along with the involvement of Lenny Henry, and both feature in the trailer. Both may well be appearing in the same story, which I suspect will be the one which debuts on New Year's Day. This is the epic James Bond-ish one (TARDIS crew in tuxedos, etc).\n\nTwo other guest artists were announced yesterday, and one of them - Goran Visnjic - was spotted in the trailer, in a story which appears to have a 19th Century setting. Might this be the Mary Shelley one that's been rumoured? (Update: no it isn't. Having rewatched the trailer the costumes are too late, and I'm hearing that Visnjic might be playing Nikola Tesla). I didn't spot Robert Glenister (making a return to the show after appearing in The Caves of Androzani).\nThere was one clip of a Judoon, and the 1943 Occupied Paris story was also confirmed - so we definitely have two stories with historical settings.\nA few new monsters were to be seen - including something that looked a bit like the Racnoss Queen, something which is able to break into the TARDIS, a giant scorpion-like creature", "num_tokens": 2048} {"category": "common_crawl-entertainment", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-entertainment/part-00-00000.npy", "text": " for her baby brother with Old Peg, but it turns into a fugitive story with the police and then social welfare on her tail. As with the Peters children, she has to make an escape from a horrible children’s home en route. She also gets weakened by pneumonia, just as Max does. Like the Peters and Amundsen children, Corrie meets more helpful people than not. In fact, we could almost swear that a number of these people have guessed these children are runaways but are turning a blind eye to it.\n\nThe endings of the two stories share similarities in that the children make it to the end of their journey, only to find everything seems to end in a big let-down because the initial outcome did not meet their expectations (Rainbow’s End being a home for olds, not children, and Old Peg not curing Peter). However, the twist is that it does bring about what they wanted in the end, just not in the way they expected.\n\nThe story takes time out to comment on the hardship and knock-on effects of WW2, even though peace has come. Food rationing continues, food shortages e.g. a sign saying “Sorry no spam”, and the war posters saying things like “Plan your meals to avoid waste” and “Careless talk costs lives” remain in place. Buying sweets on rations is a real treat. Make-do-and-mend is still the rule e.g. Mum making best dresses out of old curtains. Mum feels the change in women’s lot when peace comes; during the war she worked in a munitions factory, but afterwards, she struggles to find a job because preference is given to returned servicemen and women. Eventually she finds a part-time cleaning job at a theatre, where the fateful Wizard of Oz evening unfolds. Bombed-out planes and buildings are still visible on the landscape. So are old air-raid shelters, one with “We won the war” scrawled on it. We also see the mental effects it has had on some people. For example, they meet a kind lady who unfortunately has a screw loose; she thinks Dorrie and Max are her own evacuee children and a scarecrow in her husband’s old army uniform really is him. Post-wartime rebuilding is also evident; for example, we see a “Prefabs Homes for the Homeless” to help meet the housing shortages. And the Hans storyline is a clear message about confronting the demons of WW2 and not letting old hatreds consume you.\n\nMax is the weaker of the journeying pair because he is younger and less mature, but he does not have a weak constitution like his counterpart in Fir Tree. Until his bout with pneumonia he remains a healthy kid. And he does have his bright moments, particularly when he wants to cheer Dorrie up. Some of them are more thought out than others, such as buying flowers in honour of Dad. But as he is a very young, spirited boy, more often he makes ill-judged decisions, one of which leads to him developing pneumonia. He is also more prone to being emotional and losing his temper, for example, when he meets Hans.\n\nJinty produced a number of journey/quest/fugitive stories, such as “The Darkening Journey” and the aforementioned “Song of the Fir Tree” and “For Peter’s Sake!”. They all ran for a while, a testament to how popular they were. But “Somewhere Over the Rainbow” is by far the longest. It was so long that it holds the record for second-longest serial in Jinty’s history. This shows how popular it was, and there are so many elements to make it popular: the backdrop of WW2; the fugitive elements; the Wizard of Oz theme, which has always been popular; the adventures and dangers; and above all, the emotional elements to tug your heart and make you really feel for these children.\n\nAnother thing to make this story popular is that nobody knows what to expect at the journey’s end, not even the children. All they know and believe is, they will find happiness. Okay, happiness, but in what way? What form will it take? This is a suspenseful mystery element, and we are holding our breath to see just how it all turns out at rainbow’s end. This sets it apart from the other journey stories Jinty has run, where everyone expects the outcome that the protagonist expects. But not in this case. Neither we nor the children know just what to expect at the end of the story, which keeps us in suspense all the way. Also keeping us in suspense is the nagging doubt as to whether the children’s home they expect really is their key to happiness; after all, the other children’s homes they encountered in were bad experiences, so would they be all that happy with another? We are so glad it ended in a happy adoption with new parents instead.<|endoftext|>Lindy Gravelle is a singer-songwriter-pianist who began her musical career in Tillamook, Oregon at the age of three, singing in the Leonnig Family Band with her father, Ron (vocals & guitar), sisters Leonore (accordion), and Lorraine (piano & vocals), and brothers Ronnie (violin/fiddle), and Roger (drums & vocals). Their repertoire was rooted in country music, with added elements of rockabilly, swing and pop, all of which are still evident in her sound today. The family moved to the Eastern Oregon town of Heppner when Lindy was five. It was there that she spent her formative years, and she still calls Heppner her “hometown” today.\n\nBy the age of eight, Lindy was playing piano and singing as a regular member of the family band at the Wagon Wheel, Heppner’s preeminent restaurant and watering hole, owned and operated by her parents, Aggie and Ron. Among recording artists who were major influences for Lindy at that time were Patsy Cline, Ray Price, Buck Owens, Hank Williams, Sr., Connie Smith, Bob Wills and a multitude of others, in all genres of music. The family eventually sold the Wagon Wheel and moved to McMinnville, OR, where Lindy completed high school while continuing to perform both within school and professionally at various venues throughout Oregon and Washington. It was during her high school years when she started writing and recording her own music and gained notoriety around the Northwest as an up & coming star on the country music horizon.\n\nUpon graduation, Lindy decided to leave the Northwest in pursuit of her musical career. In the early 1980’s she was living in the San Francisco Bay Area, performing with her Red Dog Band and opening concerts for various stars, including Michael Martin Murphy, Commander Cody and Hank Williams, Jr.  In 1985 she moved to Nashville where she was gainfully employed as a singer, songwriter and performer for 15 years. While there she wrote A Bottle of Wine and Patsy Cline which was recorded by Marsha Thornton on MCA Records and reached the Billboard Magazine Country Top 40 chart. Another of her songs, Exit 99, was featured on Lorrie Morgan’s RCA Records' gold-selling album Warpaint.\n\nLindy’s Northwest roots were strong, and eventually she felt the need to return to her native state. In 2000 she moved to Central Oregon and continued her musical career.  She regularly performed in several venues throughout the region while continuing to write and record a number of original songs that her fans grew to love and repeatedly requested. \n\nIn June of 2015 Lindy relocated to Ellensburg, Washington to be closer to family in the Seattle area. While there, she broadened her musical abilities by performing as a featured vocalist with the fabulous Ellensburg Big Band and enjoyed singing songs made famous by Ella Fitzgerald, Peggy Lee, Joe Williams, Natalie Cole and Etta James. Although living in Ellensburg was enriching in many ways, Lindy felt a stronger pull to return to Central Oregon, so in March of 2017 she moved back, because there's \"No Place Under the Sun Like Oregon\".\n\nLindy is once again performing in and around Central Oregon and delighting her fan/friendz in the process. She currently has 9 albums in her discography that she offers from her website and at her live performances. Always aiming to please her audiences, Lindy Gravelle is a pleasure to see, hear and enjoy!\n\nLindy in April 2020<|endoftext|>Thursday, 3 April 2014\n\nWhat I Learned From a Disappointing Series Finale\n\nOn Monday, the sitcom How I Met Your Mother came to its nine season conclusion.\n\nI have thoughts.\n\nThere will be spoilers.\n\nYou have been warned.\n\nI have so many thoughts that it took me 4 days to marinate on them and untangle how I really felt, what is applicable, and what isn't. I'll skip something things, gloss over what I didn't mind because all in all, I only have one huge sticking point.\nFirst of all, let's get two things out of the way.\n\nThing number 1: I love Robin/Barney.\n\nThing number 2: I HATE Ted.\n\nI remember the exact moment I hated Ted. It was in the episode \"Something Old\", where Marshal and Lily are packing up to move to Rome and want to throw away an old bean-bag chair, but Ted fights them on it for all the memories it contains. Said chair had been with them since college. But here's the thing, Ted.\n\nIT'S NOT YOUR CHAIR. IT WAS NEVER YOUR CHAIR. And I know it wasn't the chair itself that was Ted's issue, it was what the chair symbolized but to me, it just came across as yet another instance where Ted whines and complains until", "num_tokens": 2048} {"category": "common_crawl-entertainment", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-entertainment/part-00-00000.npy", "text": " the bomb's circuitry would be overloaded and it would not detonate. Otherwise, he would be blown up. Holly shot it, but Koboi had lied, and there was no \"sweet spot\". It was merely a trick to cause the LEP to believe Holly shot Root.[1] Holly knew it was probably a lie, she fired anyway for the tiny chance that it wasn't.\n\nThe ensuing explosion incinerated Root and forced Holly to flee. Since they did not have any sound feed on their cameras due to Koboi's jammer, the LEP accused her of Root's murder. Root was eventually replaced with Ark Sool, and Holly resigned, believing it would do more good if not under command of him. Followed by which former Captain Trouble Kelp was appointed commander.[1]\n\nArtemis Fowl and the Time Paradox[]\n\nFollowing Root's death, Holly managed to get a chance to say goodbye to him in the past, thanks to Artemis, who was trying to make it up to her for accusing her of giving his mother Spelltropy. Root found it odd, but was touched by it.[4]\n\nThe Silky Sifaka lemur, Jayjay (Julius Junior), was also named in his memory, because his head fur resembled that of Root's buzz-cut.\n\nPortrayal in the Artemis Fowl film[]\n\nWhile Root is male in the book series, in the Artemis Fowl live action film the character is instead female and is portrayed by Judi Dench. This version of the character has much the same role as Root had in the first Artemis Fowl film, and some of the one seen in The Arctic Incident, though this side of the character does not show up much, since the film focuses mostly on the siege of Fowl Manor plot from the first book. Regarding the change, director Kenneth Branagh stated that the filmmakers asked author Eoin Colfer if they could have that kind of license and he replied \"Let's do it.\"[5]\n\n\"No, Foaly! None of your bright ideas, thank you very much! Captain Short's life is in danger, so push that button before I have to climb that tower and push it with your face!\"\nArtemis Fowl\n\"Shut your mouth, convict.\"\nThroughout Artemis Fowl series[2][3][6][1]\n\"Don't give me any of your lip today, Foaly, because today is not one of those Oh-I'm-so-impressed-with-the-pony's-technology days.\"\nArtemis Fowl[2]\n\"If it makes any difference, I'm proud of you, Holly.\"\nThe Opal Deception[1]\n\"It's not about what's best for us. It's about what's best for the People.\"\nThe Opal Deception[1]\n\"Not a nice set of options. Don't you have anything good to tell me?\"\nThe Opal Deception[1]\n\"Root: Just push that button before I get over there and push it with your face.\n\nFoaly: Some things never change. \"\n\nThe Opal Deception\n\"Go and save Artemis. That's the last order I'll ever give you, Captain. Don't you dare ignore it.\"\nThe Opal Deception\n\"Don't call me Julius! You always do that just before you disobey me.\"\nThe Opal Deception\n\n 1. 1.0 1.1 1.2 1.3 1.4 1.5 1.6 1.7 Artemis Fowl and the Opal Deception by Eoin Colfer\n 2. 2.00 2.01 2.02 2.03 2.04 2.05 2.06 2.07 2.08 2.09 2.10 2.11 Cite error: Invalid tag; no text was provided for refs named book1\n 3. 3.0 3.1 3.2 3.3 Cite error: Invalid tag; no text was provided for refs named book2\n 4. 4.0 4.1 Artemis Fowl and the Eternity Code by Eoin Colfer\n 5. Truffaut-Wong, Olivia (November 27, 2018). The ‘Artemis Fowl’ Movie Changes Some Characters, But Director Kenneth Branagh Says It’s Still The Story You Love. Bustle.\n 6. Cite error: Invalid tag; no text was provided for refs named book3<|endoftext|>RadioBDC Logo\nRadioactive | Imagine Dragons<|endoftext|>\"Police call 110: Ronny\": This is what the new case from Magdeburg has to offer\n\nIt's every parent's nightmare: their child disappears without a trace.\n\nIt's every parent's nightmare: their child disappears without a trace. That's exactly what the new Magdeburg \"Polizeiruf 110: Ronny\" (March 19, 8:15 p.m., the first) is all about. A ten-year-old boy who has to live in a children's home, a desperate mother and a violent friend - one emotional topic follows the next. In this case, not only the spectators, but also chief inspector Doreen Brasch (Claudia Michelsen, 54) reaches her limits.\n\nTen-year-old Ronny Hartwig (Johann Barnstorf, born 2009) lives in the children's home and celebrates his birthday there. He also visits his mother Sabine (Ceci Chuh, born 1991) on this day. But on the way back, the little boy disappears without a trace. The search by chief inspector Doreen Brasch and her colleagues begins. Both Ronny's mother and her new friend René (Oskar Bökelmann, born 1997) are under suspicion. Sabine has been trying to regain custody for a long time, but the youth welfare office doesn't think she's stable enough. René, on the other hand, sees the little boy as a troublemaker who is sabotaging life together with Sabine and his daughter Josefine (Lotta Herzog). Also on his birthday there is a fight between René and Ronny. The ten-year-old runs away with a bleeding nose.\n\nHe wanted to meet his favorite educator Matthias Pecht (Thomas Schubert, 29) to go fishing. However, Pecht lies during his first questioning and is thus also counted among the suspects. What happened to Ronny? Is he alive? For Brasch and her colleagues, the search becomes a painful race against time. Because the freezing temperatures reduce every minute the chance of finding the child alive.\n\nAbsolutely. The new case from Magdeburg is emotionally charged. After all, it's about a ten-year-old boy who is missing. Until the end, the question of whether Ronny is alive or not torments you. The children's home component is also added. You immediately sympathize with the little boy who wants to go back to his mother. A look into the sad children's eyes - the first tear could already fall. If that wasn't bad enough, his mother's boyfriend would make life difficult for him.\n\nIn this film, the focus is primarily on women, or mothers, and their feelings. \"'Ronny' is a film about the love we have for our children. The fear that something will happen to them, that we will lose them, that they will become alienated, slip away from us or even disappear,\" explains director Barbara Ott (40). The focus is on the disappearance of the child, but the effects that this has on everyone involved are also shown. An act marks not only the victim, but also the people close to them - sometimes forever.\n\nChief Inspector Doreen Brasch, who has a grown-up son herself, is also struggling with her feelings - but he has broken off contact. She gives everything from second one, you can tell how close she is to the case. She loses her composure more than once, niceties and rules don't seem to matter here. Brasch rigorously pursues only one goal: to find the child. The many suspects don't make things easier - but more exciting and also sadder. After all, how can it be that there are so many people in a child's environment who want something bad for him?\n\nBrasch is also very emotionally involved for a reason, she is doubly confronted with her past. \"A memory of another case comes up, which is painful because they acted incorrectly at the time and were therefore unable to save the child,\" explains actress Claudia Michelsen. In addition, a detail from her childhood is addressed. On the other hand, detective Uwe Lemp (Felix Vörtler, 61) and detective superintendent Günther Márquez (Pablo Grant, 26) only play minor roles in this case. The young supporting actors are convincing across the board. \"Regardless of age, I find her work remarkable and I really wanted her to be in the film,\" agrees Ott.\n\nWhat might bother many: Some questions remain unanswered. Characters pose puzzles that are never solved. At the end of the day, a scene is hard to endure - even for Brasch. This case definitely gets under your skin and will certainly resonate with one or the other.<|endoftext|>One Flew Over the Cuckoo's Nest1080p\nResolution 1920x1080 px\nFile Size 7911 Mb\nCodec h264\nBitrate 7453 Kbps\nFormat mkv\nType DVD-rip\nResolution 416x", "num_tokens": 2048} {"category": "common_crawl-entertainment", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-entertainment/part-00-00000.npy", "text": " was very influential in my life. Anyway, my father wasn’t going to let me go to school in LA as that town in the 1970s was full of crazies.\n\nSo you went to Northwestern.\n\nYes, but when I graduated from there, my father still wouldn’t let me move to LA. So I went to New York, interviewed for a job at Chappell music, and got it. It turned out that music publishing was the perfect job for me. I can’t tell you that I knew anything about publishing before I took the job. I knew I loved the songs of Gamble and Huff, Thom Bell and Linda Creed, and that they were extraordinarily talented songwriters. I didn’t know that there was a job behind that. I just knew I had a love for songs that could touch people and wanted to make that work for the songwriters.\n\nDo you know when you realized you had what it took to make it in publishing, that you were good?\n\nWhen I signed Arrested Development back when I was with EMI. I identified who they were and what they did in relationship to the music I loved growing up, I trusted my instincts, and signed music that I loved. At the time, Arrested Development was also important as it introduced me to the music that was coming out of Atlanta, which meant songwriters such as Dallas Austin and Jermaine Dupree. That was where real success was for me, that Atlanta scene.  Those were the first signings that gave me confidence that I could identify talent and work with them.  \n\nWhat does it mean to be great at what you do beyond recognizing talent and knowing what to do with it?\n\nFrom there, it is about giving them the support to achieve their dreams. It doesn’t happen by accident. Along with having that THING that Alicia Keys has, Lady Gaga has, Rosalia has…\n\nAll artists you signed.\n\nI want to  know if they have a desire to have a cultural impact. Not everybody does. Once you recognize that, you then supply resources for them, be it emotional support or finding them collaborators to make music or a support team to get their music into films, television and commercials or finding a team to help them administratively. I make sure every artist we sign understands the business. There is a tremendous financial upside to writing hit songs and the money comes in, not by accident, but because you have a great team that goes out and collects every penny from all over the world. Our job is to maximize value for peoples’ songs. I want artists to have career sustainability and financial sustainability.\n\nBefore you came to Universal, did you wonder if you were undervalued or underestimated in the biz because you were a woman? I mean, you left Sony when you did because there was nowhere left to go after making all that success there.\n\nIt was a combination of things. At that time, Sony’s publishing [group] had a chairman, Marty Bandier, who left [to] run a very successful company.  For me, I was happy to be a great signer of talent, happy to be co-president of a company… until I wasn’t.\n\nAt long as it worked out and business got done, you were cool.\n\nYes. Then my life changed. Around age 50, I got divorced. I had three kids. Here I was having tremendous success. Why not go for something bigger? It was that moment where I got in touch with Universal, said I was considering leaving Sony, and they asked if I was ready to be the head of Universal Publishing. I played a role in not being the chairman before I was the chairman. I did it when it was the right time for me. Was I underestimated because I was a woman or was I underestimated because there was someone at Sony before me who had built a great company and wasn’t ready to give it up? Reflecting on it, it was 50-50.\n\nIn the years since you’ve been at Universal, you have brought about a 35% increase in profits. In the era of streaming success, what can you do beyond what you are doing to get streaming services to treat songwriters more fairly?\n\nIt’s complicated. Because a stream is a blended rate between a mechanical and a performance, ASCAP, BMI, all the publishers have to continue to fight the fight, because of those complications. Sadly it is the middle class of writers — the album cut writers — that are struggling. Hit writers are doing fine.\n\nI suppose this question is generational: What are you saying to newer, younger talent such as Ariana Grande and Nick Jonas about where their careers should go in regard to publishing, as opposed to legacy artists such as Springsteen and Paul Simon?\n\nWith the legacy artists, it’s about sustaining that legacy but finding new ways of having their music introduced to new audiences. So my pitch to Barry Gibb is different than my pitch to Ariana Grande. Not only are we making sure we are collecting every penny for you, we have people around the world who are thinking of new creative ideas for you and your songs. You have to fight for spots in television and film. Is there someplace your song should be? You know Samantha Gongol from Philadelphia?\n\nYes, she’s part of Marian Hill. They had that Apple ad with “Down.”\n\nApple AirPods. That is how people know that song. It was my team that pitched that song to Apple. You can’t assume that people are going to find you on Spotify. It is my people’s job to help find your songs a place. I also tell young artists that you want a company that is there when the chips are down because it is cyclical out here. Things are not always so good.\n\nTalking about young Philly, you just signed Tierra Whack. Considering she comes from an experimental hip hop lace, how do you see her sell-ability?\n\nI love her so much that I can’t even take it. It doesn’t have to be an artist who has a hit song on the radio. She’s culturally defining, she’s bold. She could be a director. She could do an animated movie She’s gonna do her thing and we’re going to support her. We’re going to introduce her to film studios and television executives. She’s going to have ideas about creating art, be it audio or video … I just started an organization with Alicia Keys called She is the Music about creating opportunities for women in a male-dominated business. We’re supporting our sisters to have success, their own place in the business. Tierra is going to be really important there, to that vision.\n\nWhat is your take on artists who want to own their publishing?\n\nIt is about this: Is a song more valuable sitting in your hard drive or because you have a team behind it adding value? If you have the wherewithal to license your music, to go collect the monies owed on your own, to do all of the administration while you’re creating it and performing it on the road — all the power to you. If you find the right person who you believe will add value to your song, I would want my song heard, licensed and paid for all over the world. That said, many artists own their songs. The days of other people owning your IP forever may be over.\n\nYou’re forever in Los Angeles now. What of Philly is left in you?\n\nEVERYTHING. My childhood, both good and bad, formed me. I’m a Philly girl. It is what I hear and what I experienced being a Philly girl defines me.\n\n • A.D. Amarosi's Headshot\n\n A.D. Amorosi is a Philadelphia-based journalist who, along with Philadelphia Weekly, writes for numerous local, national and international publications including Variety and the Philadelphia Inquirer.\n\nEnjoying this article?Consider joining AltPhilly, an exclusive community with access to members-only digital content and more.<|endoftext|>Apollo and rocky relationship\n\nCreed refresher: Everything you need to know about Apollo Creed | jingle-bells.info\n\napollo and rocky relationship\n\nAssuming both Rocky and Apollo are taking the fight seriously, Rocky wins because, at this stage in their rivalry, he's both physically and mentally superior. Somewhere in the relationship there had been a rocky period, and Apollo had a relationship with another woman, and out of that relationship. But just in case you didn't watch all the way through Rocky IV, or if you need a brief refresher on Apollo Creed before meeting his son, we're.\n\nCreed last line in the film: The result was not revealed until the film Creedin which Rocky tells Apollo's son that Apollo won this fight. Rocky IV[ edit ] InApollo 43 years oldcomes out of a five-year retirement to fight mammoth Soviet Olympic boxer Ivan Dragowho has come to the United States on behalf of the Soviet Union to enter the world of professional boxing.\n\nHighlighted by a pre-match rendition of \" Living in America \" by James BrownApollo enters the arena from a descending scaffold overhead, dancing to the music in his old red, white, and blue Uncle Sam outfit. With Rocky, Duke, and Paulie in his corner, Apollo is overly confident that he can dispense of Drago with ease. However, Apollo is not ready for the extreme size and strength of the Russian. After taunting the Russian and landing a number of ineffectual punches, Creed is pummeled badly in the first round.\n\nRocky wants to stop the fight but Apollo refuses. Apollo adamantly tells Rocky not to stop the fight \"no matter what Rocky again tries to stop the fight by throwing in the towel. Apollo tells Rocky not to stop the fight, giving Drago a chance to deliver a fatal blow as Rocky drops the towel causing the fight to stop to Apollo, who dies in Rocky's arms in the middle of the ring.\n\nDrago wins by technical knockout. An enraged Rocky then sets out to avenge Apollo's death by beating Drago in the Soviet Unionwith the Soviet premier and the Politb", "num_tokens": 2048} {"category": "common_crawl-entertainment", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-entertainment/part-00-00000.npy", "text": " will be the perfect comedy relief in the middle of a summer packed with sci-fi. Watch the hilarious first teaser.\n\nZack Snyder's Man of Steel\nExpected in June\n\n\"He was convinced that the world wasn't ready...\" Not many realize yet just how sci-fi this movie is going to be, exploring some of Krypton and how that world parallels Earth. Plus, the plot involves an alien with super powers being raised by Americans. The villains will be even more aliens, lead by General Zod and Faora (both wearing some kick ass sci-fi armor), who come to our planet with nefarious plans and weaponry. This movie may be set on contemporary Earth as we know it, but touches upon the questions of how we would deal with such sci-fi events if they were to actually happen. I've got a good feeling Zack Snyder (of 300, Watchmen) has totally reinvented himself for Man of Steel, and chose wisely with Henry Cavill as Kal-El.\n\nMarc Forster's World War Z\nExpected in June\n\nZombies everywhere in a post-apocalyptic world destroyed by zombies. While it may not be as good as Max Brooks' book that it's based on, the World War Z movie we're getting this summer from director Marc Forster (of Finding Neverland, Stranger Than Fiction, Quantum of Solace) at least looks like it will have a shitload of zombies. Brad Pitt stars in what seems to be the biggest zombie movie ever, with invasions the size of cities, but will it live up to \"The Walking Dead\"? Get a glimpse of the undead chaos in the new trailer.\n\nGuillermo del Toro's Pacific Rim\nExpected in July\n\n\"Today we are cancelling the apocalypse!\" This isn't even out yet, and that quote has pretty much achieved legendary status already. Spoken by Idris Elba, that line represents just how epic of a monster movie this will be, but I'm sure we're still going to lose our minds once we actually watch it. Guillermo del Toro (of Cronos, Blade II, Hellboy, Pan's Labyrinth) pretty much went all out with this, bringing us monsters the size of skyscrapers and human-driven robots to match them. Sci-fi as its grandest, with everything realized to insanely epic detail and crafted to exhilarate our geekiest sci-fi inhibitions. Bring on the Kaiju and Jaeger!\n\nNeill Blomkamp's Elysium (+ Chappie)\nExpected in August\n\nFrom the visionary filmmaker who brought us District 9 comes his second feature film, Elysium, another action science fiction story involving a futuristic society still divided by classes. Neill Blomkamp filmed Elysium starring Matt Damon last year, and was planning to have it out in theaters by now, but pushed it back until August. In the meantime, he's developing his third film, Chappie, a sci-fi comedy (but that's all anyone knows about the plot so far). Blomkamp is clearly one of the leading voices in science fiction cinema right now, and there's no question that he's likely to push the genre even further with these next two movies.\n\nEdgar Wright's The World's End\nExpected in August\n\nAnother apocalypse comedy, similar to This is The End above, that busts its way into sci-fi thanks to that angle. Edgar Wright (of Shaun of the Dead, Hot Fuzz, Scott Pilgrim) deserves to be on here anyway for supporting Attack the Block, but The World's End is sci-fi anyway. The story is about five friends who reunite in an attempt to top their epic pub crawl from 20 years earlier, but unwittingly become humankind's only hope for survival when the apocalypse arrives. Both Simon Pegg and Nick Frost will be back, as this is the final film in their Cornetto Trilogy. The World's End has been described by Wright as \"social science-fiction\", which is a whole subgenre of its own and one that will evolve in this era thanks these kind of films.\n\nDavid Twohy's Riddick\nExpected in September\n\nEveryone's favorite Furyan badass is back. One of my own personal favorite sci-fi films is Pitch Black from 2001, even though I didn't care much for the sequel. Now director David Twohy and star Vin Diesel are taking things back to those Pitch Black roots, with an R-rated sci-fi featuring Riddick once again stuck on a planet with some nasty ass alien creatures. Even though they haven't changed the title from only Riddick, based on the first teaser just revealed and all the enthusiasm Vin Diesel has for the project, this might be the awesome follow-up all the Pitch Black fans have been waiting for. \"You're not afraid of the dark, are you?\"\n\nAlfonso Cuarón's Gravity\nExpected in October\n\nFrom the filmmaker who gave us Children of Men, one of the best sci-fi movies of this last decade, comes another original story set entirely in space. Alfonso Cuaron (Great Expectations, Y Tu Mamá También, Harry Potter and the Prisoner of Azkaban) writes & directs this highly ambitious, highly anticipated sci-fi drama starring Sandra Bullock and George Clooney as astronauts left drifting aimlessly in space after a catastrophic collision. From everything we've heard about it, including hyperbolic early buzz, it could be one of the most groundbreaking sci-fi movies of this new era, but Warner Bros has been playing things close to their chest, delaying it from a late 2012 release until late 2013 and upgrading to IMAX 3D in the meantime.\n\nGavin Hood's Ender's Game\nExpected in November\n\nRemember - the enemy's gate is down. This might just be our most anticipated sci-fi movie of 2013. Adapted from Orson Scott Card's 1985 sci-fi novel, it's about a very young soldier being trained at the International Fleet's battle school. Ender's Game has Gavin Hood (of Tsotsi, Rendition, X-Men Origins: Wolverine), who has been developing it for years, writing & directing along with Harrison Ford and Ben Kingsley as Col. Graff and Mazer Rackham, respectively. Asa Butterfield plays Ender Wiggin, with Hailee Steinfeld, Abigail Breslin and Viola Davis all in the cast. We haven't seen too much yet, but I've heard nothing but amazing things about how it's turning out so far, and I've got a good feeling it might just live up to the book.\n\nJoon-ho Bong's Snowpiercer\nExpected in 2013\n\nAn ensemble post-apocalyptic sci-fi thriller set in the future during an ice age, that takes place entirely on a massive train carrying the last human survivors still divided by social class. From the director of Memories of Murder and The Host comes Joon-ho Bong's first sci-fi film - Snowpiercer. Everything we've heard following this project for years makes it sound like it will be one of the most thought-provoking and unique sci-fi films about humanity, with an incredible international cast, too. I'm very anxious to see this already.\n\nRichard Curtis' About Time\nExpected in 2013\n\nEven British director Richard Curtis, of Love Actually and Pirate Radio, is venturing into sci-fi. His next movie is called About Time about a time traveling young man named Tim, played by Domhnall Gleeson (Brendan Gleeson's son, seen in both Deathly Hallows). Rachel McAdams stars as his love interest (in her second time traveling romance following The Time Traveler's Wife) but after they meet, an unfortunate time-travel incident means he's never met her at all. Tim learns he can relive any moment in his life to try things differently until he gets them perfectly right and we're off from there. Curtis is a talented storyteller and I'm curious to see what he does with a concept like this. The film is shot and ready for release in 2013.\n\nAlan Taylor's Thor: The Dark World\nExpected in 2013\n\nWhile this is a comic book movie, the cosmic setting makes it a worthy sci-fi crossover. At the helm is \"Game of Thrones\" director Alan Taylor making his feature debut, with Chris Hemsworth returning as Thor up against the evil Dark Elves of Svartalfheim. This is mostly comic book fantasy, but I love the cosmic universe Kenneth Branagh established with Thor in 2011, with the very mystical feeling traveling between worlds. I hope we see them expand upon that, but with Marvel's Phase 2 kicking off in 2013, I have no doubt they will.\n\nFrancis Lawrence's Hunger Games: Catching Fire (+ Mockingjay 1 and 2)\nExpected in 2013 (+ 2014/2015)\n\nThe World Will Be Watching... From the beginning all the way to the very end. It was Francis Lawrence (of Constantine, I Am Legend, Water for Elephants) who landed the job of directing not one, but all three of the remaining The Hunger Games sequels (yes they're splitting the last book), based on the book series by Suzanne Collins. Up first is Catching Fire, already being shot and prepared for release in November of 2013. The sequel picks up where the first movie left off, in the post-apocalyptic sci-fi world centered around the annual Hunger Games event. Oscar winner Jennifer Lawrence returns as Katniss, along with Josh Hutcherson as Peeta, and a massive ensemble cast. I actually loved the first one and can't wait for the rest.\n\nSebastián Cordero's Europa Report\nExpected in 2013\n\nThis sci-fi project came out of nowhere, but has a hell of a", "num_tokens": 2048} {"category": "common_crawl-fashion_and_beauty", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-fashion_and_beauty/part-00-00000.npy", "text": ".\n\nAnd that's not what she wanted for her wedding day at all.\n\nShe wanted to be the most beautiful maiden in all the land..... she wanted to outshine everyone, so that no one would stand a chance in trying to seduce her husband later on.\n\nRight now, she looked like her regular gorgeous self, so where was the magic?\n\nDidn't they all say that wearing a wedding gown would make one look like a goddess.\n\nRight now, she looked like a stunning Mortal maiden... but who the heck wanted to look like that?\n\nShe wanted to rival even her ancestors who were now gods, so how could she be pleased with this kind of crappy work?\n\nTo be fair, it was the mirrors fault and not the tailors.\n\nSince these people didn't have glass mirrors, they polished flat silver or even copper and gold surfaces, to make mirrors.\n\nThese sort of mirrors could only reflect light by 20 to 30%... So the image on the mirror wasn't exactly clear, and didn't really show the real beauty of the person.\n\n\"Shut up!!!!!!\n\nExcuses, excuses... that's all you know how to do.\n\nAre you saying that I, the first princess of Arcadina, is blind?!!!!\n\nAre you saying that my eyes are deceiving me?\n\nI've told you that I don't like it, so stop making excuses for your work!!!\" Jenette yelled.\n\n\"Didn't you just hear what she said?Find authorized novels in Webnovel,faster updates, better experience,Please click www.webnovel.com for visiting.\n\nmy friend here said that you should fix it up... so just do your job!!!\n\nWhy are you even a royal tailor if you can't even sew properly?\"\n\nStanding beside Jenette was her long time friend, Barbara Salazar.\n\nBarbara came from one of the high class noble families, and had been friends with Jenette ever since she was 10 years old.\n\nBarbara was more like a lackey that followed Jenette everywhere she went.\n\nIf someone bullied Jenette, Barbara would be the first one to attack or plan the person's demise.\n\n\"Listen carefully, I want the waist a little tighter, the breast line a little lower, and the slit a little wider!!\" Jenette commanded.\n\n\"B...but.. my princess, wouldn't that be too shameful?\n\nPeople who were those clothes are typically seen as...as.... \"\n\n\"Are you trying to say that I'm a harlot?\"\n\n\"No no no..my princess... all I'm trying to say is that...\"\n\n\"Shut up and do what I say!!!\" Jennette yelled back at the tailor.\n\n\"Y....yes....yes yes my princess.. I... I will personally adjust it once I leave .\n\nThis.. this time, it will be perfect.\" The tailored reassured while bowing several times.\n\n\"A princess threatening a poor defenseless worker?... how fascinating..\"\n\nJenette and everyone in the room turned towards the door, and saw the devil herself walking towards them.\n\nAngelina Dwight!!<|endoftext|>Ethical kids clothing company Frugi to launch rental collaboration\n\nEthical kids clothing company Frugi is the latest high street name to tap into consumer demand for rent rather than buy clothes.\n\nThe upmarket Cornish brand has joined forces with new children’s clothing rental service thelittleloop – one of a growing number of firms serving growing consumer appetite for more sustainable wardrobe choices.\n\nThe fashion industry is under growing pressure to change its business model, 和 PrimarkAsos recently announcing plans to overhaul their supply chains to make them greener. The initiatives reflect growing concern about the environmental harm it causes with an estimated 300,000 tonnes of clothing waste going to UK landfill every year.\n\nThelittleloop is based on the idea that keeping kids’ clothing in circulation is the best way to reduce its environmental footprint. Starting at £18 a month, subscribers use credits to borrow clothes that can be returned when they have been outgrown.\n\nCharlotte Morley, a former executive at retail website notonthehighstreet, who started the business while on maternity leave last year, said thelittleloop was about more than assuaging the “guilt of fast fashion” and aimed to support brands “going above and beyond” to make ethical and durable children’s clothing.\n\n“Their [Frugi] clothes are such incredible quality that they work perfectly for rental,” said Morley. “We hope we can help even more people than before access these ethically produced garments for their children instead of resorting to the high street.”\n\nMorley described fashion retail as a “broken system” that encourages people to “keep buying cheap and new, spewing clothing out in ever greater quantities”. She said she wanted to buy ethical clothing for her children “but couldn’t justify the cost” with selling clothes on afterwards a time-consuming hassle.\n\nThe fashion brands involved in thelittleloop, which also include Kite and Polarn O. Pyret, still own the clothes and receive a share of the rental revenue. They also share the responsibility for the lifespan of the garments.\n\nAlthough Frugi, which is famous for its colourful prints and appliqué designs, is more expensive than many other high street brands, its chief executive Sarah Clark said the high-quality fabric used means the clothes last longer.\n\n“Using organic cotton, which is more durable, means our clothes are made to last, and thelittleloop is helping us to further extend the lifespan of these clothes,“ 她说.\n\n“We believe if you are buying something for £3 in a supermarket it has a different level of durability.”\n\nRenting clothes is billed as a sustainable and frugal alternative to fast fashion for women in particular. It has been popularised by firms such as Rent the Runway and public figures such as Carrie 约翰逊, who rented her wedding dress and her outfits for the G7 conference.\n\nThe growing sector, which according to GlobalData is going to be worth £2.3bn by 2029, has been touted as a possible solution to fashion’s environmental crisis. A report by the World Economic Forum this year suggested the industry generates 5% of global emissions.\n\n评论被关闭.<|endoftext|>Celebrate any occasion with these shimmering diamond stud earrings. Fashioned in 10K gold, each earring showcases a sparkling 1/2 ct. oval black enhanced diamond solitaire. Dazzling with 1 ct. t.w. of diamonds and a bright polished shine, these post earrings secure comfortably with friction backs.\n1 CT. T.W. Oval Black Enhanced Diamond Solitaire Stud Earrings in 10K Gold<|endoftext|>Rousteing gives one-off Gaultier couture display in Paris\n\nJul 5, 2022, 7:05 PM | Updated: Jul 6, 2022, 2:49 pm\n\nA model, left, wears a creation for Franck Sorbier's Haute Couture Fall/Winter 2022-2023 fashion collection presented Wednesday, July 6, 2022 in Paris. (AP Photo/Lewis Joly)\n\n(AP Photo/Lewis Joly)\n\nPARIS (AP) — An enfant terrible appeared in a new guise on Wednesday as designer Olivier Rousteing of Balmain took a one-off shot at a couture collection for the house of Jean Paul Gaultier.\n\nSuch was the excitement surrounding the event that roads were blocked and security stretched over 100 yards, tangling traffic in all directions. The show was fashionably late. That may have had something to do with Kim Kardashian. She arrived tardily with her daughter North West in outfits referencing the 1992 heyday of Madonna and Gaultier, who sat in the front row sipping champagne and laughing almost all the way through.\n\nHere are some highlights of the fall-winter 2022 couture collections:\n\nTaking the codes of Gaultier — such as structured tailoring, Breton striped nautical tops and the conical bra — Rousteing let his hair down on Wednesday for an infectious and tongue-in-cheek fashion homage to Jean Paul Gaultier, who retired from couture in 2020 after a 50-year runway career.\n\nIt was all about the quirk. Rousteing took Gaultier’s torso-shaped perfume bottle “Le Male,” which features a metal strap under the nozzle — and turned it into several looks. Garnering applause from the enthusiastic audience, one model strutted forth with a metal choker, striped glass top and tin micro mini. Elsewhere the famed pinstriped menswear tuxedo jacket, with voluminous proportions, was reimagined beneath a body-shaped corset.\n\nThere were genuinely touching moments, such as when two models walked together in pregnant conical bra looks in black and flesh, touching their bellies. That was seen as a political statement supporting lesbians having medically assisted reproduction, something the French parliament allowed last year.\n\nBeyond homage, this couture was definitely very Rousteing. He fused his personal styles upon the Gaultier house codes and many of the styles — flowing capes, caps and layering — captured ones seen before on the Balmain runway.\n\nIn purely aesthetic terms, many of the looks veered off into pastiche or costume. Nobody seemed to mind.\n\nA blond Kardashian and daughter spurred a dazzle of paparazzi snaps walking up the stone steps of central Paris’ Gaultier HQ dressed in the image of Madonna when she controversially appeared — with exposed breasts — with Jean Paul Gaultier at a 1992 amfAR fundraiser in Los Angeles, California.\n\nThe styling was flawless in this homage, in which Kardashian channeled the pinstriped Gaultier dress that at the time spawned headlines around the world. Kardashian’s version here was more tame, with skin-colored inserts. West wore a waistcoat, like the couturier did as he held hands with his", "num_tokens": 2048} {"category": "common_crawl-fashion_and_beauty", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-fashion_and_beauty/part-00-00000.npy", "text": " for an outfit that exudes laid-back cool.\n\nYou might also like:<|endoftext|>Interview with Mimz Blog\n\nbuy differin .3 gel online\n\nHave you ever heard of Mimz Blog? Mariyam is a fashion, beauty & lifestyle blogger currently based in Dubai. Other than blogging, she is also a designer of Mimz Collection. Read below my interview with Mariyam to get to know her more:\n\nclick here Can you start by telling us a bit about yourself?\n\nMy Name is Mariyam and I was born and raised in Dubai. I started my business by designing (Mimz Collection) and now I do blogging as well. Therefore, my Instagram page is now called mimz.blog\n\nhttp://camanual.com/poem-guidelines-not-applies-to-company-with-turnover-of-rs-50-crores-or-less-in-a-year/?relatedposts=1 When and why did you start blogging?\n\nBlogging along with designing have always been my passion. I started blogging 3 months ago with the intention and main reason of helping other businesses grow by creating more brand awareness\n\nget link Describe ‘Mimz blog’ in one word.\n\nhttp://kahraezink.com/tyre/2094 How do you decide what fashion or beauty products to review or attend?\n\nThe fashion or beauty products have to be aligned with my business’s strategy to ensure that my page gets the right reputation.\n\nasbury park speed dating Are there any fashion bloggers you follow? If so, can you please name a few?\n\nI adore few, but at the same time I like being unique and exclusive\n\nfollow url What have you learned from your blogging experience?\n\nI learned that no matter where you start, you can always achieve what you want if you are passionate and determined\n\nhttp://fbmedical.fr/aftepaes/1986 Can you tell me more about your fashion collection? Where did your inspiration come from? \n\nMy fashion collection revolves around the idea of affordable luxury whether it is the Arabic traditional wear or western casual wear. The inspiration came in believing that all girls are beautiful and they deserve the best. That’s why, Mimz Collection was created to meet these needs by delivering high end quality at an affordable price\n\nclick Who or what are your designs influenced by?\n\nThe designs are influenced by 4 pillars: modernism, style, affordability, and luxury.\n\nhttp://gatehousegallery.co.uk/?myka=conto-demo-per-opzioni&352=d5 Why did you decide to create your own fashion label?\n\nI believe that the need for affordable luxury always exists, therefore, all girls should know how beautiful they are even if they can’t afford the high designer brands. I wanted to provide this while ensuring the quality meets the expectation of the consumers.\n\nOpzioni binarie con ig markets Opzioni Bookmark piagnucoleremmo svicolasse misurabile tassandomi leggero ingobbiti go here Do you follow trends or make your own?\n\nOf course, when it comes to fashion, you have to continuously keep up with the trends and provide something that the consumer demands, while keeping in mind to be unique\n\nrencontre femme 23 Do you have a favorite outfit?\n\nYes. I love jumpsuits\n\nhttps://infotuc.es/esminec/4603 How do you manage your time efficiently?\n\nTime management is essential to every business owner. Therefore, I always set out my priorities at the beginning of the week and I work according to that schedule so that I don’t miss out on the important things that need to be done\n\nWhat’s the biggest challenge of being both a blogger and designer?\n\nI guess the biggest challenge is having to be in few places, all at the same time. Therefore, this is where prioritizing really helps\n\naspirin 75mg buy Do you have any tips or tricks for achieving an aesthetic Instagram page and launching a fashion collection?\n\nUnderstand what your followers want and deliver that with consistency\n\nYou can follow Mariyam on her Instagram @mimz.blog\n\ni want to buy benemid note: all answers are original and unaltered<|endoftext|>Emerald engagement rings\n\nLe Jardins\n\nA geological masterpiece and unfairly maligned\n\nEmeralds have been prized for centuries due to their rich green colour, captivating crystal patterns and a natural lustre that seemingly glows.  With historical references noting it as a gemstone to have been loved by Cleopatra and Napoleon, emeralds remain a widely celebrated gemstone, making emerald rings an appealing choice. Whist more recently, commentary around the stones brittleness have seen them (sometimes) unfairly disregarded.\n\nLike any of natures most wonderful creations it is only with a deeper understanding one truly appreciates the beauty. From Colombia to Zambia, Afghanistan to Brazil these gems hold their own little world inside each crystal.\n\nResponsible Luxury\n\nB-Corp Certified\n\nPaving the way in a new era of responsible luxury, as a B-Corp certified jewellery designer, we are amongst the world's first top tier luxury jewellers to achieve the certification.\n\nB-Corp Certified\n\nA tapestry of detail\n\nBuilding a deep understanding of emerald gemstones\n\nEducation forms a critical component in the creation and selection of any jewel, and this especially so when you're considering an emerald gemstone for an engagement ring. Not only does it allow for a heightened appreciation of the rarity or uniqueness of a given specimen - it also ensures any given design is tailored and matched to ones own story. \n\nThe power of jewellery (and the true value) comes from its deep association with personal meaning. Yes, on its own an emerald is a rare and beautiful gemstone, prized by collectors and gemstones lovers (like us alike). However when tied to a personal meaning it becomes all the more powerful.\n\nWith emeralds being found in such a variety of different locations it is a gemstone that can be matched to so many different stories. From couples who met travelling in Colombia to a sacred family home in Brazil each specimen can be tied to its own story.\n\nGlobal deposits\n\nThe location of emeralds across the globe\n\nEmeralds can be located on all 5 continents of the earth, yet their appearance and form can vary greatly by geography\n\nThe world map opposite (courtesy of The Gemogical Institute of America) highlights the global distribution of emerald deposits). The formation of these crystals dates back 100s of millions of years (if not billons) with the formation of Beryl in the upper continental crust. \n\nColombia has historically produced the most sought after specimens with a rich bottle green colour. However as reserves become increasingly rare, jewellers & collectors alike have gone in search of more varied or unusual specimens, bringing other geographical regions to the fore.\n\nPrestigous locations\n\nColombia has been the origin of the most sought after emeralds\n\nHistorically, the best emeralds have been found in Colombia; these gemstones have a good saturation of colour, and exceptionally \"clean\" stones can be found, typically from the Muzo region. These precious gems were used by the Incas. Today, emeralds are still found in Colombia, as well as Brazil, India, Zambia, Tanzania, Zimbabwe & Siberia.\n\nIn ancient Egypt, Cleopatra's love of Emeralds was well known. This precious gemstone has been cherished by royalty and prominent figures in society for centuries. In the first century AD, Pliny the Elder stated \"...nothing greens greener\".\n\nDelicate gems\n\nFormed in harsh environments\n\nEmeralds are part of the Beryl family; their chemical formula is Beryllium Aluminium Silicate. They are formed in metamorphic and hydrothermal environments, grown in fluids containing many different minerals which as it cools down, the minerals precipitate out and form new compounds and crystals. Emeralds have a hardness of 7 1/2 on the Moh's scale of hardness, but due to their growing environments, they have a brittle nature.\n\nThe Beryl family is large and contains other gemstones such as Aqumarine, Morganite and Helidor. The colour of the stones used in our emerald engagement rings come from the presence of Chromium in the crystal lattice, as well as Vanadium.\n\nUniquely Enchanting\n\nA rich, soft green\n\nAlmost all natural emeralds contain inclusions, typically referred to as \"le jardin\" of an emerald because it can look like a little mossy garden in the gem. The clarity of an emerald shouldn't be compared to another gem such as aquamarine or sapphire. \n\nDepth and tone of colour are incredibly important when looking at emeralds, a rich soft green is typically the most sought after. The best emeralds seem to \"glow\" from within.\n\nAlternatives to green emerald engagement rings\n\nBecause of the way that emeralds grow, they tend to be brittle, so whilst an emerald engagement ring is a popular choice for many, they should be worn with caution. If you love the green tones of emeralds, but don't want their associated risk, then thankfully there are other green gemstones that can be used in engagement rings.\n\nBy appointment\n\nArrange a visit\n\nWe operate by appointment only so that we can ensure we give each consultation our undivided attention. Investing time in education can't be done quickly. Let us know your initial ideas and we will help guide you from there.\n\nContact us<|endoftext|>Baby companies give out a ton of free baby samples but only if they know you're out there and have a baby. If there's a company that makes a baby product you'd like to try, you should visit their website and register your information with them. This way when the baby companies decide to send out free baby samples, they'll automatically send one out to you.<|endoftext|>Fakultas Pendidikan Matematika dan Ilmu Pengetahuan Alam", "num_tokens": 2048} {"category": "common_crawl-fashion_and_beauty", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-fashion_and_beauty/part-00-00000.npy", "text": " not so good; drops; friends in micro Bo you mention; wear a meta watch, just look at this concentration of watch of all kinds of software, you can easily get the information. diesel orologi Traditional hollowing techniques and high-tech laser engraved complement each other, unparalleled sense enjoyment the become coveted contemporary masterpiece.Both low-key and slightly quieter men watch party selection.Two years later, SONY has adjusted the product, launched the SmartWatch generation and the two generation, but the function is almost exactly the same. Although it has not been successful, but it marks a large electronic manufacturers have begun to focus on the smart watch market. diesel orologi Golden watchcase, watchband, milk white dial watch, but also can withstand time test, at any time to wear won't fall behind.\n\nWe also from the special status of the undisputed company has always been adhering to the concept of excellence tabulation company was founded in 1839. This spirit has already into our top ten value, has become a symbol of Patek Philippe of supreme quality, with our timepieces as from generation to generation, immortal. diesel orologi The size of 36*40mm is more suitable for Asian men, revealing refined and cultured temperament. Big three needle design, classic simplicity.Smart watches will be an extension of mobile devices that support Bluetooth 4 LE is the trend, but now not all devices are upgraded to Android 4.3 (support for notification listener API and Bluetooth 4); diesel orologi This is a table showing the the Great Wall look back Chinese, curved walls and semi hollow form ice.\n\nReplica El Reloj\n\nSome people is not optimistic about the smart watches the market prospects, and some even market commentators are quite \"mean\" view, think \"when mainstream smart phone screen size has evolved to about 4 inches. On the wrists tied a piece of the world the best pie chart display instrument, is essentially a ridiculous thing\". diesel orologi Since the choice of the broadband Boyfriend Blazer, watches to domineering routes, large dial between gold watch powerful gas field, the most suitable for the boyfriend style.Watch Red Dot Design Award?Longines cable IMIA (Saint-Imier) series inspired by the brand long watchmaking tradition of founding the birthplace of 521. diesel orologi The classic design of the supporting claw on both sides of the table, the smooth flow of the streamline shape from the 1952 constellation series has been preserved since the world, loved by the world.\n\nThat is domineering, domineering men are unparalleled momentum, this man for his watch. Long chain above a round table, click spring machine, table cover \"pa\" sound of a bomb out, palm, table covers fold, everything is attributed to lonely.Seiko pursuit of human technology, convinced that the best watch should fit the tacit understanding feeling and the wearer, and Seiko watches can bring peace of mind of a reliable feeling and emotion meet for the wearer. diesel orologi High imitation of uneven quality of products on the market, the price is for everyone. diesel orologi With the increasing cultural exchanges between China and Western countries, western festivals in Chinese shine.This is the reason for the current Phone Windows developers are not enthusiastic.\n\nUna Pagina su:orologio atomico      La prossima Pagina:armani giorgio\nLa Nostra Copia completa di orologi di Marca, di Buona qualità e a Buon Mercato. diesel orologi La marca de relojes de imitación de nuestra completa, de buena calidad y barato.\nCopia di negozio di orologi\n\norologi economici Aquí hay imitación Rolex, de buena calidad y barato.<|endoftext|>You must have javascript enabled to use scrubi.biz !\n\nSurgical Scrub Brush\n\nThis offers a sterile surgical scrub brush dry 30box for purchase. The brush is a perfect addition to your surgical cleaning supplies and can be used to dry your instruments and materials. This box can hold 30 of the brush's size, making it a perfect purchase for the medical community.\n\nSurgical Scrub Sponge\n\nThere's no doubt that a surgical scrub sponge is a essential part of any surgical team, and we'veheartened our patients with the information and tips we need to provide the best possible experience when going through surgery. in this blog post, we're going to learn about how to use a surgical scrub sponge properly, so that you can provide the best possible patient experience. first, let's take a look at how to use a surgical scrub sponge: 1. Use a surgical scrub sponge as a bath for your patient when your patient is in the bath, they need to be dry-cleaned. to use your surgical scrub sponge as a bath, simply put them in the bath and water to fill up the sponge. As soon as your patient comes out, take a break and they will need to cool down. if you're using a surgical scrub sponge as a bath, they will need to be wet before they can be used. So, it's important to make sure their bath is filled as much as possible so that they can use it before their patient comes back in. to use your surgical scrub sponge as a protectant,\n\nSurgical Scrub Brush Ebay\n\nThis surgical scrub brush is made of high quality, new nylon material that has been designed to provide great quality and quality in your surgical process. This brush is meant to be used with, and before use, cleaning the surgical areas. The bristles are cryptocurrency-weightless and meaningfully reduce the amount of debris that can build up on the skin. this surgical scrub brush has achloroxlenol pcmx solution wnail pick. It is for use with the chloroxlenol pcmx solution. This brush is made of soft, flexible material that makes it easy to get to the nail. It has a long, hard bristled end for reaching the nail and a small end for reaching deep into the bone. this product is a surgical scrub brush with aonite and nail cleaner for perfect and efficient scrubbing of nails and to remove any dirt andavascript. It has a unique design with a longtails that allows it to reach the entire length of the nails. The brush is made of soft, lightweightmaterial and has a soft, sturdy handle. this 30-pack medline scrub-in surgical scrub brush with nail cleaner is perfect for cleaning nails. It has a soft, linen-like texture that makes it easy to scrub. The bristles are sharp enough to easily remove anynail builders series #7pb this bristol-free scrub brush with nails is perfect for those needless areas - such as hernias and redo jobs. The soft, linen-like texture is easy to scrub and the burrs are sharp enough to avoid fade.<|endoftext|>Home>Lifestyle>How To Cut A Shag Haircut\n\nHow To Cut A Shag Haircut\n\nWritten by: Herta Zhu\n\nLearn how to cut a shag haircut and create a trendy, low-maintenance style at home. Discover the latest lifestyle tips for achieving the perfect shag haircut.\n\n(Many of the links in this article redirect to a specific reviewed product. Your purchase of these products through affiliate links helps to generate commission for Regretless.com, at no extra cost. Learn more)\n\nTable of Contents\n\nThe shag haircut has made a remarkable comeback in the world of fashion and beauty. Its effortless, tousled layers exude a timeless appeal that complements various face shapes and hair textures. Whether you're aiming for a chic, rock 'n' roll vibe or a laid-back, bohemian look, the shag haircut offers versatility and a touch of edginess.\n\nIn this comprehensive guide, you'll learn how to master the art of cutting a shag haircut. From gathering the necessary tools to texturizing the ends, each step is crucial in achieving the desired outcome. Whether you're a professional hairstylist or a passionate individual eager to experiment with hairdressing, this guide will equip you with the knowledge and techniques needed to create a stunning shag haircut.\n\nThe beauty of the shag haircut lies in its adaptability to different hair lengths and types. Whether you have long, flowing locks or a short, sassy bob, the shag haircut can be tailored to suit your personal style. By understanding the fundamental principles of layering and texturizing, you'll be able to customize the haircut to accentuate your features and enhance your overall look.\n\nThroughout this guide, you'll discover the essential tools required for a successful shag haircut, the step-by-step process of sectioning and cutting the layers, and the art of texturizing the ends to achieve that signature shaggy effect. Additionally, we'll delve into styling tips and finishing touches to ensure that your shag haircut looks effortlessly chic and maintains its shape between salon visits.\n\nWhether you're a trendsetter seeking a bold new look or a hairstylist eager to expand your repertoire, mastering the art of cutting a shag haircut will undoubtedly elevate your hairstyling skills. So, grab your tools and let's embark on this exciting journey to unlock the secrets of the iconic shag haircut!\n\nStep 1: Gather the necessary tools\n\nBefore embarking on the journey of creating a stunning shag haircut, it's essential to gather the necessary tools to ensure a seamless and successful process. The right tools not only facilitate precision but also contribute to the overall quality of the haircut. Here's a comprehensive list of the essential tools you'll need:\n\n 1. Quality Shears: Invest in a pair of sharp, high-quality shears specifically designed for haircutting. The precision and sharpness of the shears are crucial for achieving clean, even cuts and seamless layering.\n\n 2. Fine-Tooth Comb: A fine-tooth comb is indispensable for sectioning the hair and creating precise partings. It allows for meticulous separation of hair strands, enabling you to work with accuracy and control.\n\n 3.", "num_tokens": 2048} {"category": "common_crawl-fashion_and_beauty", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-fashion_and_beauty/part-00-00000.npy", "text": ": These are used to promote collagen production, strengthen hair follicles, and support the regeneration of scalp cells. Peptides, in particular, are known to stimulate the growth of thicker, healthier hair by improving the overall condition of the scalp.\n • Biotin and Vitamin B Complex: Known for their role in maintaining healthy hair, biotin and other B vitamins improve the scalp’s blood circulation and support keratin production, strengthening hair from the root and preventing hair thinning.\n • Antioxidants: Ingredients like Vitamin E, green tea extract, and caffeine have antioxidant properties that help neutralize free radicals and protect the scalp from environmental stressors like pollution, which accelerates aging.\n • Hyaluronic Acid: Traditionally used in skincare, hyaluronic acid has made its way into scalp shampoos. This ingredient hydrates the scalp, improves elasticity, and restores moisture balance, which is crucial for maintaining a youthful scalp.\n\nThese ingredients not only enhance the shampoo’s ability to cleanse and nourish the hair but also address underlying causes of scalp aging. The combination of peptides, antioxidants, and hydrating agents is proving to be a powerful solution for consumers looking for effective anti-aging hair care products.\n\n2. Personalized Hair Care Solutions\n\nWith the rise of personalized skincare and hair care routines, scalp anti-aging shampoos are no exception. Consumers are increasingly seeking products that cater to their specific scalp and hair needs. This has led to the rise of brands offering customizable shampoos, where consumers can select ingredients based on their scalp type, hair concerns, and desired outcomes.\n\nFor example, some brands now offer quiz-based platforms that assess a consumer’s scalp health, lifestyle, and hair goals. Based on this data, a customized shampoo is created with targeted anti-aging ingredients. This trend is helping brands differentiate themselves in an increasingly competitive market while providing consumers with more effective and tailored solutions.\n\n3. Focus on Clean and Sustainable Beauty\n\nAs environmental consciousness grows, so does the demand for clean beauty products. The scalp anti-aging shampoo market is no exception. Brands are increasingly turning to sustainable and eco-friendly practices, focusing on both the product and the packaging. Many companies are opting for natural, cruelty-free, and plant-based ingredients, avoiding harsh chemicals such as sulfates, parabens, and silicones, which can be damaging to the scalp over time.\n\nConsumers are becoming more aware of the ingredients in their personal care products, leading to a preference for shampoos with natural anti-aging properties. This focus on clean beauty is reshaping the industry, driving the adoption of scalp anti-aging shampoos made with responsibly sourced ingredients. Additionally, eco-friendly packaging, including recyclable or biodegradable containers, is becoming a major selling point.\n\n4. The Integration of Hair Wellness and Scalp Health\n\nThe modern consumer is increasingly aware that healthy hair starts with a healthy scalp. As a result, scalp care has evolved from a niche interest to a mainstream focus. Brands are now offering scalp-specific treatments that go beyond just cleansing. These products target various aspects of scalp health, from reducing inflammation to balancing oil production, improving circulation, and stimulating hair follicles.\n\nShampoos designed for anti-aging are also being marketed alongside complementary products such as scalp serums, massagers, and conditioners that enhance the benefits of the shampoo. This integrated approach to hair wellness is driving growth in the market by offering consumers a complete solution for addressing the underlying causes of hair aging.\n\nConsumer Trends Driving Growth in the Market\n\nSeveral consumer trends are fueling the growth of the scalp anti-aging shampoo market:\n\n1. Aging Population and Awareness of Scalp Health\n\nAs the global population ages, the demand for products that promote healthier, more youthful-looking hair is growing. According to the World Health Organization (WHO), by 2030, one in six people in the world will be over the age of 60. With this shift, the aging population is seeking out solutions for thinning hair, hair loss, and overall scalp health. Scalp anti-aging shampoos, which offer a non-invasive way to address these concerns, are becoming increasingly popular in this demographic.\n\n2. Influence of Social Media and Beauty Bloggers\n\nSocial media and beauty influencers play a significant role in shaping consumer behavior. The rise of platforms like Instagram and TikTok has made beauty and personal care products more accessible to a global audience. Scalp anti-aging shampoos are often featured in tutorials, reviews, and unboxing videos, which help generate buzz around new products and innovations.\n\nFurthermore, influencers who focus on wellness and clean beauty have contributed to the demand for natural and sustainably sourced scalp treatments. As more influencers share their experiences with anti-aging hair care, consumer interest in these products continues to rise.\n\n3. Growing Interest in Holistic Beauty Routines\n\nThe increasing popularity of holistic health and wellness practices has extended to the beauty industry. Consumers are no longer satisfied with products that simply cover up problems—they are looking for solutions that address the root cause of hair and scalp concerns. This shift toward holistic beauty has driven demand for products like scalp anti-aging shampoos that offer multiple benefits, from improving scalp health to enhancing hair thickness and shine.\n\nChallenges and Market Restraints\n\nWhile the scalp anti-aging shampoo market is growing rapidly, there are a few challenges that brands and manufacturers must navigate:\n\n1. High Competition and Market Saturation\n\nWith the increasing popularity of scalp anti-aging shampoos, the market is becoming more saturated, with many new brands entering the space. Established companies must find ways to differentiate their products through unique formulations, superior quality, or innovative marketing. Additionally, small and emerging brands face significant competition from global beauty giants, making it difficult to stand out.\n\n2. Effectiveness and Consumer Expectations\n\nConsumers have high expectations for the effectiveness of anti-aging hair care products, which can sometimes be unrealistic. Many consumers expect immediate results, but anti-aging benefits take time to show. Brands need to manage these expectations through proper marketing and education on the benefits of consistent use.\n\n3. Price Sensitivity\n\nWhile premium anti-aging shampoos offer excellent benefits, they often come with a higher price tag. Price-sensitive consumers may hesitate to purchase these products, especially in regions where the middle class is growing, but disposable income remains limited. Manufacturers will need to balance pricing with quality to capture a larger audience.\n\nThe scalp anti-aging shampoo market is expected to continue its growth trajectory, driven by innovations in ingredients, consumer demand for personalized and eco-friendly products, and an increasing awareness of scalp health. As more people look for holistic solutions to address aging hair, the market for these shampoos will only expand. Brands that can deliver effective, high-quality products that meet consumer demands for sustainability, customization, and long-term results will likely lead the charge in this rapidly evolving market. With the growing focus on beauty from the inside out, scalp anti-aging shampoos will remain a key player in the beauty industry for years to come.<|endoftext|>Wednesday, February 4, 2015\n\nHow do men and women deal with unwanted hair in the Arab Culture?\n\nShaving for men and women both is a practice that is taken to ensure cleanliness of the body. Shaving, waxing etc. are all parts of the same category which either mean to remove hair from the skin or pluck it from the roots. Though, they eventually grow back within a month depending on an individual’s hair growth rate. Today's read is to enlighten all those about the culture of shaving in Arab World whether people keep it in practice or not.\n\nTo start off with, men shave quite often. They often get their beard and mustache shaved after some time period. Sometimes they want to grow the beard and get it shaved to change looks or in Islam just to maintain cleanliness. Men often get their hair from their underarms removed in order to maintain cleanliness because of the extensive heat and sweat. It isn't a bad practice for them to remove hair from their private areas as well. This is very beneficial if they have more than a wife and have intimate relationships with them all. This will ensure prevention from health hazards. What we are still not aware of is the fact whether Arab men do get their arms, legs and chest waxed or shaved. In the Muslim culture however this isn't a very common practice. They don't. But then this depends upon from person to person.\n\nFor the women however it is important to remain clean and purified at all times. Arab women must have their underarms clean and their private areas every forty days. This is the Islamic duty that must be followed in order to ensure purity and cleanliness. Women often use Shaving cream, hair removal cream or lotion, Waxing or Machines to remove all un-wanted hair. The Soon to be bride will make sure she gets all the hair removed before her wedding, same follows with all Arab women. They all take great pride in having smooth, hair free skin. They may choose to shave or wax their legs and arms or their whole body depending on their individual condition.\n\nOther hair removing methods include use of Hawala which similar to Wax will remove the hair once you wash it off. Though it will ease the pain caused by waxing. Preferably the best method is to either use a machine or Wax since that will keep you in ease for at least a month whereas other hair removing methods such as use of chemicals will worsen hair growth and you'll have to take this practice into account every week!\n\nThere is no compulsion though which method is better than the other but I though it is advisable to take one in practice that is easy and keeps you clean for a longer duration than the rest and does not harm your body. Many women do get their hair facial removed though that isn't at all a compulsion. In fact many scholars state that a woman must not remove hair removed from her face and neither should she get her eye brows made. It is definitely better to take several hearings into account before following any one!\n\nSaudi Culture\n", "num_tokens": 2048} {"category": "common_crawl-fashion_and_beauty", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-fashion_and_beauty/part-00-00000.npy", "text": " snug but with a thumb's width at the toe and two fingers' width at the top two eyelets. The Time of the Day You go Shoe Shopping. If the size falls between widths, round up for a thick foot and down for a thin foot. The side-to-side fit of the shoe should be snug, not tight. This doesn't mean that you just need to order the next size up. Yet, many people believe you can wear bigger shoes if you wear thick, heavy socks. To get the width, measure between the broadest part of your foot. Answer (1 of 15): Neither. It requires trying them on and trying them out first. \"It's very tiny . When you are buying shoes try them on in the evening (when your foot is slightly bigger) and try them on with running socks. Age Height Shoe size Over 20 5'8″ to 6′ or taller 9 to 15. The toes should not be squashed or pinched against the boot's front. Wiggle your toes. Sports shoes are sized right. After all, your numerical shoe size, ranging from around four to 14, only accommodates the length of your foot. But choosing the right pair of running shoes can be a challenge. Feb 22, 2009. Average your heel-to-toe size and your heel-to-ball size (round up to the nearest half size) using the following chart: So, if the above chart indicates you're a size 8.5 according to your standard heel-to-toe length, but a 9.5 in heel-to-ball length, your best size is really a 9, since this is the average between the two. FAQ: Should your hiking boots be a size bigger? This same rule applies to measurements taken with a branding . You may find that one foot is slightly larger than the other - if that is the case then focus on getting the right size for the larger foot. The only time that you could wear a shoe in a bigger size is when purchasing a sneaker but you should only go up about half a size. Make sure this space is present, so the feet have room to . When measuring your shoe size, or trying on shoes, remember that one of your feet is probably bigger than the other. The Health Consequences of the Wrong Boot Size \"One of the things about wearing any shoe that's too small is that it can compress the front of the foot and you can wind up with structural problems like bunions and hammer toes,\" says Dr. Neal Blitz, DPM, FACFAS, a foot surgeon based in New York and Los Angeles who is board certified in both foot surgery and reconstructive rearfoot and . If this area doesn't fit comfortably in the shoe, the shoe size is too small. Some may pinch even when you follow the rules. The logic being, while on a trail you would often come across inclines and the backpack would force your weight down and shift your feet a bit inside your shoes. There are some things you should look out for when you want to get shoes. However, when trying on hiking boots, there are ways to make sure you get the best possible fit, rather than simply choosing a larger size. Shoes that are too small are one of the major causes of foot pain and problems. Hence, for keeping your shoe smell fresh, you will have to buy a size bigger. Now repeat for the other foot. There's no real answer to the question of whether running shoes should be a size bigger. Therefore, it's best if you can try on your dress shoes in the afternoon. It may be the sock I was wearing was pretty thin - I could get a thicker sock, always an option I guess. Shoe sizes may vary by brand, so you should try to consult the chart of the brands you're most interested in. This is generally equal to the size of the tip of your index finger. Check for Space. Take your measurements at the end of the day, when your feet are the . However, they may not be a whole size bigger because different shoes have different sizing variations. The shape of your feet changes over time. Keep in mind that if you're purchasing a shoe for a child, it may be helpful to buy a larger size to allow them room to grow. Running Socks. Is it better to get shoes a size bigger? However with that being said the key word here is in \"most cases\". And the heat would create a bit bad smell. I want to purchase a pair of shimano RP4 Road shoes,I have looked at your shoe size guide. The length is measured from your longest toe down to the end of your heel. For a comfortable and enjoyable running, running shoes need to fit a bit different from your casual shoes. You might get away with it for a few miles but you will quickly start to feel the pain. This discomfort can lead some people to wonder if they need to size up. Feet have gotten larger, too. There's a grain of truth to that—increased blood flow and swelling during and . You must have heard people saying to buy a shoe one size larger than the size which fits you perfectly. So, for the fit size of shoes, it will be painful for you, or you might feel a bit uncomfortable. You should have about a thumb's width (half an inch) between the end of your longest toe and the end of the shoe, and the shoes should not squeeze your foot's width. And you may be wearing a shoe that's a size bigger than what you wore in your 20s, in part because of weight gain that puts greater pres-sure on your feet, and in part because your ligaments and tendons have lost some of their elasticity (which also . I tend to buy shoes that are half a size too big anyway compared to day-to-day shoes, seems to be a better fit, but you can tighten the fit around the top of the shoe by lacing them differently. The short answer is: it depends. The widest part of your foot is the ball. \"The real test is wiggle room for your toes. You'll get a more realistic idea of . While there are no official statistics about shoe sizes, anecdotally, the average shoe size for women in the United States ranges between 8.5 and 9.Average shoe size by height. You should get that snug feel. In one word, \"Bigger\"! Myth #2: You should buy sneakers a half-size bigger than your normal shoes. It seemed like fair advice. You should never buy shoes you . Just get shoes that feel right for you. A man who wears a size 10 tennis shoe might end up going to a size 11 or 12 in boots. Some may be too big, even with your proper socks on. If the size falls between widths, round up for a thick foot and down for a thin foot. Going to a long thru-hike Luckily, fitting you in the right running shoe is what we do at Road Runner Sports. This will also mess with your foot's arch, potentially causing foot and leg pain. To accommodate this, a proper fitting running shoe should be about a half size larger than your street or dress shoe. 2. The shape of your feet changes over time. Conventional wisdom holds that your running shoes should be about a size bigger than your dress or casual size. At the very least it should be the same length . Running shoes are important, but most important if running is your daily job or an important part of your life. At the very least it should be the same length . Although kids shoes should be snug, there should be about half an inch of space after the big toe ends. If your foot is wider than average you might need to buy your shoes a half size larger to ensure a comfortable fit that does not allow pinching or binding. A running shoe should fit snug in the heel and midfoot yet have wiggle room for your toes. Almost the most important. 1. What is the most common female foot size?\n\nLes Miserables Unabridged Word Count, Cinnamon Swirl Bundt Cake Mix, Inf Clairefontaine Website, Html Heading And Paragraph On Same Line, Krusteaz Chocolate Chip Muffin Calories, Flattest Shooting Caliber To 500 Yards, Zidane On Gerrard And Scholes, Icd-10 Code For Left Diabetic Foot Ulcer With Gangrene, Lightest Road Bike Pedals 2021, Type 212 Submarine Interior, How To Change Garage Door Code Overhead Door, Disadvantages Of Research Methodology, Solid Gold Compass Pendant Mens, Tabu Sushi Carmel Mountain, Shurima Legends Of Runeterra,<|endoftext|>Salon de Jessie\n\nFor Men\n\nSalon de Jessie specializes in Men’s Grooming and Haircuts in Hollywood.\n\nWe offer a great haircut for men which is personalized for each gentleman that sits in our chair. From fades, to executive cuts, and even a beard clean up, we strive to be the best of the best!\n\nWhile you’re enjoying your professional haircut in the heart of Hollywood, enjoy a complimentary cocktail on us!\n\nBuzz Cut\n\nMen’s Haircut using 1 guard.\n\nIncludes a shampoo.\n\nClipper Cut\n\nMen’s haircut using clippers and shears.\n\nIncludes a shampoo, style, hot towel, and neck shave.\n\nMen’s Short Haircut\n\nHaircut using just shears.\n\nIncludes a shampoo, blowdry, and style.\n\nNeck Cleanup\n\nCleaning up the hair line below the occipital bone.\n\nIncludes a hot towel and neck shave\n\nBeard Cleanup<|endoftext|>A   B   C   D   E   F   G   H   I   J   K   L   M   N   O   P   Q   R   S   T   ", "num_tokens": 2048} {"category": "common_crawl-fashion_and_beauty", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-fashion_and_beauty/part-00-00000.npy", "text": " educate ourselves on evidence-based skincare practices.\n\nBy doing so, we can make informed decisions and achieve healthy, glowing skin.\n\nIn this blog, we'll separate fact from fiction and debunk the most common skincare myths to help you achieve healthy, glowing skin.\n\nMyth #1: You only need sunscreen on sunny days\n\nTruth: Sunscreen is not only needed when it is shining, but many people mistakenly believe this. Your skin can still be exposed to UV radiation even when the clouds are not there.\n\nDid you know that up to 80% UV radiation from the sun can reach the earth even when it is cloudy?\n\nThis means that going unprotected on an overcast day can still lead to skin damage. It's essential to opt for broad-spectrum protection that offers UVA/UVB protection to keep your skin well-protected.\n\nMyth #2: Natural Skincare is Ineffective\n\nTruth: In the world of skincare, it's easy to fall for products with eye-catching packaging and quick-fix promises. But the truth is, repairing, healing, and rejuvenating the skin takes time. And this is where natural skincare products come into play.\n\nContrary to popular belief, natural skincare is not ineffective. In fact, it's quite the opposite. Natural skincare products are made with 100% authentic ingredients that have medicinal properties, making them highly effective in producing long-lasting results.\n\nMentioned below are some effective natural remedies you can try:\n\n • Turmeric and Milk: Turmeric is known for its antiseptic and antibacterial properties, making it an excellent ingredient for maintaining healthy skin.\n • Aloe Vera: Aloe vera has anti-inflammatory and healing properties that can soothe and nourish your skin.\n • Honey and Lemon: Honey is a natural humectant that helps to moisturize and hydrate your skin. Lemon has natural bleaching properties that can help to lighten and brighten your skin.\n • Coconut Oil: Coconut oil is an excellent moisturizer that can help to nourish and hydrate your skin.\n • Rose Water: Rose water is a natural toner that can help to balance the pH of your skin and tighten your pores.\n\nMyth #3: Expensive skin care products are always better\n\nTruth: Don't be fooled by the price tag when it comes to skincare. Just because a product is expensive doesn't necessarily mean it's of high quality.\n\nWhile luxurious packaging and flashy marketing may seem appealing, it's crucial to focus on the ingredients and their effectiveness.\n\nRather than being swayed by fancy advertising, take the time to carefully read the label and look for active ingredients that are supported by scientific research.\n\nThese ingredients have been proven to be effective in addressing various skin concerns, such as fine lines, dark spots, and acne.\n\nAlso Read : 3 Simple Tricks to get Glowing Skin in Summer\n\nMyth #4: You do not need anti-aging products while you are young.\n\nTruth: There's a common myth that you don't need to use anti-aging products until you're in your thirties.\n\nHowever, it's never too early to start using them. Anti-aging products, particularly those with antioxidants, can be used as early as age 21.\n\nThe earlier you start, the better. It's crucial to use anti-aging products that are appropriate for your skin type.\n\nProducts with potent active ingredients such as retinol can be added to your regimen in your mid to late 20s.\n\nAlternatively starting with natural ingredients at a young age can give effective results when you become old\n\nFollowing are natural anti-aging products you can use:\n • Turmeric Face Mask: Turmeric has been used in India for centuries for its healing and anti-inflammatory properties.\n • Coconut Oil Massage: Coconut oil is rich in antioxidants and is an excellent moisturizer for the skin.\n • Amla Juice: Amla is rich in Vitamin C and antioxidants that can help reduce fine lines and wrinkles.\n • Neem Face Pack: Neem has antibacterial and anti-inflammatory properties that can help prevent acne and reduce fine lines and wrinkles.\n • Rose Water Toner: Rose water is a natural astringent that can help tighten pores and improve skin texture.\n\nMyth #5: You should wash your face with hot water to open your pores\n\nTruth: The myth of hot water opening pores is just that – a myth. Pores don't open and close.\n\nHot water can cause more harm than good. It actually strips the skin of its natural oils.\n\nThis eventually leads to dryness and irritation. Instead, use lukewarm or cool water to cleanse your face.\n\nWhile many people believe that washing your face with hot water opens your pores, this is a myth.\n\nOur pore sizes do not change when coming in contact with water, nor are they sensitive to its temperature.\n\nIn fact, when hot water comes in contact with our skin, the outer layers of our skin swell up, making our pores look more open.\n\nThe best practice is to wash your face with lukewarm water.\n\nMyth #6: Exfoliating every day is good for your skin\n\nTruth: While exfoliating can remove dead skin cells, it can also cause skin irritation and dryness.\n\nAvoid harsh scrubs, which can cause skin micro-tears. Use gentle exfoliation only once or twice per week.\n\nTo protect your skin barrier, make sure you apply a thick moisturizer or hydrating lotion after exfoliating.\n\nMentioned below are two main types of exfoliation: physical and chemical.\n\nPhysical exfoliation involves using a scrub to physically remove dead skin cells.\n\nChemical exfoliation uses acids to dissolve dead skin cells.\n\nIf you prefer a natural approach to exfoliation, Some popular options include:\n\n • Sugar: Mix sugar with a carrier oil like coconut oil or olive oil to create a gentle scrub.\n • Oatmeal: Mix ground oatmeal with water to create a gentle paste that can be used as a facial scrub.\n • Coffee grounds: Use leftover coffee grounds as a body scrub for a natural exfoliant and caffeine boost.\n\nIf you prefer a skincare product, look for a product that contains chemical exfoliants such as alpha-hydroxy acid (AHAs), or beta-hydroxy acid (BHAs). BHAs such as salicylic and glycolic acids penetrate deeper into pores to remove dead skin cells.\n\nAlso Read: \n5 Best vitamins for skin that are essential for flawless skin\n\nMyth #7: You can apply skincare products in any order.\n\nTruth: There is a correct order in which to apply your skincare products if you want each product to be absorbed properly and do its job.\n\nTo seal in moisture and hydration, you should apply your products starting from the thinnest to the thickest.\n\nHere's a step-by-step guide to help you remember the correct order:\n\nCleansing: Start by cleansing your skin to remove any dirt, oil, or makeup residue. This step prepares your skin to absorb the rest of the skincare products more effectively.\n\nToning: Follow up with toners or mists to balance your skin's pH levels and hydrate your skin.\n\nSerum: Apply a serum that targets your specific skin concerns.\n\nMoisturizer: After the serum has been absorbed, apply a moisturizer to lock in hydration and nourish your skin.\n\nSunscreen: Protect your skin from harmful UV rays by applying a broad-spectrum sunscreen with at least SPF 30.\n\nMakeup: If desired, apply makeup products last.\n\nIn the end, when it comes to skincare, there is a lot of misinformation out there. It's important to separate fact from fiction and debunk these common skincare myths.\n\nDon't fall for marketing gimmicks and always read the label of consumer goods to look for active ingredients backed by science.\n\nRemember that natural remedies can be effective but should be used with caution, and exfoliating should be done in moderation with gentle products.\n\nFinally, following a proper skincare routine with the correct order of application can make all the difference in achieving healthy and glowing skin.\n\nBy understanding and implementing these tips, you can take charge of your skincare and achieve the results you desire.\n\nAdd new comment\n\nThis question is for testing whether or not you are a human visitor and to prevent automated spam submissions.\nEnter the characters shown in the image.<|endoftext|>Toilet Purse - Lotta - Jade\n\n199,00 DKK\n\nThe cube case is designed with a size allowing all necessary products to “on-the-go” to fit in there. You can also use it as a make-up since it is very spacious, but still do not take up too much space.\n\nThis Cube Case fits perfect to the Mommy bag which have the exact same colorThere is a side strap so it can be placed in the bathroom.\n\nProduct Description: \nColour: Jade<|endoftext|>Everyday Band 6mm\n\n£85.00 GBP\nItem is in stockHurry! Low inventoryItem is out of stock Item is unavailable\n\nUse code \"WELCOME10\" to receive 10% OFF your first order\n\nIntroducing our extraordinary Everyday 6mm Band, a must-have accessory that will seamlessly blend into your daily life and become an indispensable part of your personal style. This meticulously crafted ring is designed to be your go-to piece, effortlessly enhancing any outfit with its timeless appeal.\n\nThe 6mm width of this band strikes the perfect balance between subtlety and presence. It's substantial enough to make a statement, yet sleek and comfortable for everyday wear. Whether you're going to the office, meeting friends, or enjoying a relaxed weekend, this band effortlessly elevates your look.\n\nWhat sets this Everyday 6mm Band apart is its simplicity and versatility. With its clean, minimalist design, it can be paired with any ensemble and effortlessly blend into any occasion. Its timeless aesthetic ensures that it will remain a cherished piece in your jewellery collection for years to come.\n\nOnce you slip this band onto your finger, you'll", "num_tokens": 2048} {"category": "common_crawl-fashion_and_beauty", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-fashion_and_beauty/part-00-00000.npy", "text": " life and have innovative ideas.\n\nAdvice from Alexei Orlov\n\nDo what excites you the most. Alexei Orlov says that people have an immense ability to think so far. Along with this Alexei Orlov advises the younger generation to live life for themselves. The truth is nobody cares, yet to take it is an opportunity and win the race. Consistency and dedication are the two utmost essential things in life that must be done to achieve something big.\n\nTherefore Alexei Orlov being an entrepreneur, people must create a strategy that includes determination and consistency.\n\nmilia treatment in etobicoke\n\nIt can often happen that small white dots come out on our face that is rough to the touch: these are milia.  They are not dangerous but they are an annoying cosmetic problem. There are various procedures for milia treatment in etobicoke.\n\nMilia are small white dots that form on the face when dead skin cells become trapped under the skin surface, forming small cysts. These appear on the nose and cheek nearby, but which can also appear around the mouth or on the eyelids.Milia can appear at all ages but are very common among newborns it is also called “infantile acne”, and occurs on the face, around the eyes and on the cheeks.  Milia are often due to a lack of skin exfoliation or the use of creams that contain steroids, or prolonged exposure to the sun’s rays.  In adults, we often speak of secondary milia, which is due to burns or burns, perhaps caused by facial treatments such a: dermabrasions or lasers, which favour the formation of blisters on the skin that damage the lining of the pores.\n\nmilia treatment in etobicoke\n\n There are various types of milia classified according to the age at which it appears and the wounds that can cause these small cysts to develop.\n\n Neonatal milia\n\n It can occur in 40% of newborns and usually lasts for some days.  Milia in infants can appear on the face, head and back.\n\n Juvenile milia\n\n It usually occurs due to genetic disorders.Primary milia in adults and children. It is caused by keratin that gets trapped under the skin and can occur on the eyelids, forehead, or genital area.  It usually disappears within days but can last for several months.\n\nMilia in plaques\n\n It is associated with genetic disorders and can appear face on any area, mostly seen on eyelids, earlobes, cheek area and on the jaws.  The cysts are larger and occur mainly in middle-aged women but also adults and boys.\n\n Numerous eruption typemilia\n\nThis type occurs with itching in some areas of the facial area, arms and back.  The cysts appear after some time and go away after a few days mostly or months.\n\n This type of milia appears due to small wounds in the skin, effected by burns or a rash.  They appear irritated and red at the edges and white in the centre.\n\nMilia associated with drug use\n\n The use of steroid-based creams can cause the appearance of milia on the treated areas.  However, such side effects with other topical ointments are rare.\n\nThis Amazon Humidifier For You Now\n\nAn ultrasonic humidifier is considered a very simple and convenient device. It comes with a reservoir of water and a diaphragm or any other kind of vibrating element. The vibration of the diaphragm takes place at a higher frequency; it is so high that humans cannot hear it. Amazon Ultrasonic Humidifier is quite efficient to use.\n\nThe vibrations propel microscopic droplets of the water into the air. After the evaporation of the droplets in the air, it adds humidity in the room to the air. In Amazon Ultrasonic Humidifier, you are required not to heat the water at any time, so such humidifiers are regarded as cool mist humidifiers. It is noteworthy to mention that most evaporative humidifiers can also accomplish evaporation without requiring to heat it.\n\nWhat are the benefits of using it?\n\nUltrasonic humidifiers provide numerous advantages; some of them are detailed below:-\n\nultrasonic humidifier\n\n#1. Humidifies the air\n\nThey can humidify the air properly. With the help of humidistat,, the humidity levels can be detected, and you can shut down the humidifier after the air has got enough moisture in it.\n\n#2. Simple mechanism\n\nYou can make it extremely small as well as compact since the mechanism to humidify is so simple and convenient. In order to fit the humidifier in a tight space, this is an ideal choice.\n\n#3. Quieter vibration\n\nThe sound of the vibration of an ultrasonic humidifier is very quiet in comparison to the fan of an evaporative humidifier. One of the best features is that they don’t emit an audible hum so that it doesn’t make a quiet room noisy.\n\n#4. No generation of the heat\n\nSuch humidifiers don’t generate any heat, which makes them safer in comparison to steam humidifiers which produce water vapour after boiling the water.\n\n#5. Irreplaceable wick\n\nYou are required to replace a filter or a wick if you are using an ultrasonic humidifier. The collection of the build-up minerals is done by the wick is done by the humidifier, which is often left behind via the water, especially with hard water, which constitutes a lot of minerals.\n\nIs it true that ultrasonic humidifiers leave white dust?\n\nBoth ultrasonic humidifiers, as well as cool mist impeller humidifiers, release white dust. Most of the ultrasonic humidifiers come with an option to demineralize cartridges which are designed in such a way that it traps all the minerals before they become airborne.\n\nseat cushion\n\nMany a time in this fast-paced life, we are unable to take care of ourselves and our needs. This was the time before the pandemic could happen where a majority of us would be constantly on our toes and would take stress to the head and the body. Nowadays in the given situation of the pandemic, we have no option but to sit at home. We are in front of electronic devicesevery time that it might ruin our eyesight and our peripheral vision. But what’sworse about this is that they can affect the way we sit.\n\nBrief – Most of the time when we sit to do something, we would sit on those hard rock chairs, one should not follow this practice as they can very badly injure their spine, lower tailbone. If this happens then they will slouch and will overall be convicted of a bad posture. Hence while sitting on a chair, it is necessary to also sit on seat cushion. This area is made of different materials and has various textures and let me tell you that they are a major game-changer.\n\nseat cushion\n\nConcept–It is common to feel fatigued and to curb the habit slowly, we must invest in these products. While most of these are seat cushions, it comes in different variations and can be used in multiple places. It is not limited to chairs or office chairs but if one wants to maintain their posture then they can use it in their day-to-day lives if they are following leisure activities that require them to sit, then this is a great way to help you get your posture back.\n\nFeatures – There are many sites online that take it upon themselves to provide their customers with one of the best seat cushions and hence some of the features that are more or less similar to one another are –\n\n • Most of them are made purely of 100%.\n • U – shaped are one of the best sellers in the market.\n • Designed to give one the best comfort especially the lumbar and the tailbone.\n • Comes in a variation of sizes and is also found in the backseat sizes where they can be clipped on the car seats as well.\n • Most of these use memory foam, gel, or soft padding based on one’s needs and are adjustable from the straps.\n\nConclusion – Seat Cushions are an investment, not only will it support you but will give you the best of health.\n\noffice foot rest\n\nIf it is not convenient for you to leave your desk all through the day, you should still find a way to exercise even while sitting behind your desk. Sitting down behind your desk for a long time is not helpful at all as it can negatively affect your health. One of the best ways to put an end to this issue is to start using a foot rest. A foot rest is your best helpmate if you are the very busy type and you cannot even spare the time to leave behind your desk to walk around the office. You may also exercise when you want to visit the rest room, but the time spent on this is rarely enough for adequate exercise during the working hours.  Office foot rest can make up for the lack of movement and help you to keep your body system alive and active.\n\noffice foot rest\n\nWhat are those qualities that make a foot rest one of the best items you can purchase for office use?  Check below for helpful answers to the question.\n\nNo more fatigue\n\nWith the help of a foot rest, you can successfully put an end to fatigue in any part of your body.  The product can be trusted for putting an end to any form of ache that you may feel as a result of sitting behind your desk for a very long time. The product can help you to put an end to that numbness also. Additionally, it has preventive effect and can successfully prevent the numbness from even happening at all. The office foot rest can successfully achieve the above since it keeps your muscles moving. Numbness and fatigue can happen if your muscles are static and not moving, which is the situation in those who sit behind their desks for a very long time. Using this product can make your muscles mobile and you will enjoy the associated benefits fast.\n\nThe best to buy\n\nIf you are looking for a", "num_tokens": 2048} {"category": "common_crawl-fashion_and_beauty", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-fashion_and_beauty/part-00-00000.npy", "text": ". Avoid booze and smoking cigarettes. Consume lots of water. Eight glasses of water a time is the highly recommended amount important for adequate hydration. Invest 15 mins each morning as well as night working out the muscles in your face. Attempt to deal with your face many opportunities a day and also absolutely rest all your face muscle mass.<|endoftext|>Personalized Top Ten Golf Legends T-Shirt\n\nPersonalized Top Ten Golf Legends T-Shirt\n\nThey're the names that people say in hushed tones. Tiger Woods, Jack Nicklaus, Walter Hagen. Is there name on that list? Well, according to them it is. For the guy who might just possibly overrate his golfing talents<|endoftext|>Engraved gourmet woman bracelet\n\nA gourmet bracelet for women with a plaque for engraving a name\nYou can choose a model of hearts or Hamsa on the sides\nThe children’s names will be engraved in round beads\n\nProduction & shipping time 5-10 business days\n\nEngraved Gourmet Woman Bracelet: The Perfect Personalized Gift\n\nWhen it comes to finding the perfect gift for a special woman in your life, nothing beats the elegance and personal touch of an Engraved Gourmet Woman Bracelet. This unique piece of jewelry is not just a bracelet; it’s a statement of love, appreciation, and thoughtfulness.\n\nWhy Choose a Personalized Bracelet?\n\nPersonalized jewelry has always been in vogue, and for good reasons. When you choose to personalize jewelry, you’re giving a gift that carries a special message. It’s a reflection of the time and effort you’ve put into selecting something that resonates with the recipient. Whether it’s an initial, a special date, or a meaningful word, the engraving on the bracelet makes it a cherished keepsake.\n\nGift for Woman: Making Occasions Memorable\n\nEvery woman loves to receive jewelry, but an engraved gourmet bracelet takes it a notch higher. It’s the perfect gift for woman who values elegance and personal touch. Whether it’s her birthday, anniversary, or any other special occasion, this bracelet will remind her of the special bond you share. Moreover, with the trend of personalized jewelry on the rise, she’ll be proud to flaunt her unique piece.\n\nQuality and Craftsmanship\n\nMade with precision and attention to detail, the Engraved Gourmet Woman Bracelet is designed to last. The engraving is done meticulously to ensure that every letter and symbol stands out beautifully. Whether it’s made of sterling silver, 14k gold, or any other premium material, you can be sure of its durability and shine.\n\nFree Express Shipping\n\nTo make your shopping experience even better, we offer free express shipping on all our engraved gourmet bracelets. So, not only do you get a gorgeous piece of personalized jewelry, but you also get it delivered to your doorstep in no time.\n\nIn conclusion, an Engraved Gourmet Woman Bracelet is more than just a piece of jewelry. It’s a symbol of love, care, and thoughtfulness. So, the next time you’re looking for the perfect gift for woman in your life, consider personalizing it. It’s a gesture she’ll remember and cherish forever.\n\nIf you have any questions, click here to send a quick message on WhatsApp.\n\nAdditional information\nSelect Material\n\nSilver 925, Gold Plated, Rose gold plated\n\nSelect Model<|endoftext|>Hugo Boss mens tracksuits sale\n\n156 items\n\nElevate your loungewear with the impeccable quality and heritage of Hugo Boss men's tracksuits. Crafted with the utmost attention to detail, these tracksuits exude a high-end fashion aesthetic that is sure to inspire. Each piece is a testament to the brand's renowned expertise, combining comfort and style effortlessly. From sleek and sophisticated designs to contemporary athleisure elements, the collection presents a range of options to suit your preference. Indulge in the finest materials, including rich leather and breathable fabrics, that guarantee exceptional comfort and long-lasting durability. Discover these exceptional Hugo Boss tracksuits at discounted rates on Love the Sales, adding a touch of luxury to your wardrobe while embracing the incomparable feeling of wearing a true fashion masterpiece.\n\nRefine your search\n\nSmart filters\n\nRefine and order by\n\n156 items\n\nSort by\n\n Search results\n\n Shop fashion sales from 100s of stores in one place.\n Buy better with deals from sustainable and premium fashion brands.\n Tap the heart on full price items and we'll notify you when they go on sale.\n New season for less\n Shop current season deals from your favourite designers.<|endoftext|>1. Shop\n 3. Butterfly blouse in Green\n\nButterfly blouseblouse is crafted using traditional Ukrainian satin stitch embroidery in orange-blue-black colors. It has airy butterfly sleeves with 2 triple tassels on the waist line.This Vyshyvanka is designed to fall fluidly over the body. Decorative handmade stitches adorn the sleeves and the bottom of the blouse.<|endoftext|>583 seconds\n52 querie(s) executed<|endoftext|>Shipping times may be impacted due to Covid-19 as carriers adjust operations.\nCheck out our awesome clearance section for discounted Mama Koala prints and more!\nUse code LBT10 for 10% off all general merchandise excluding sale items and Mama Koala products!\nUse Code CHEWONTHIS for 20% off all teethers!\n\nELF - Pocket Diaper - Butterfly Tabs - Green\n\nELF - Pocket Diaper - Butterfly Tabs - Green<|endoftext|>Pride Shoes – Celebrate the LGBTQ Community In Style2019-06-12T10:45:09-05:00\n\npride flag\n\nPride Shoes - Celebrate the LGBTQ Community In Style\n\nThe LGBTQ community have been celebrated for years with special edition Pride shoes that usually are being released before the beginning of the summer. June is recognized as the Pride month, with various events and parades taking place all over the world. Giving the high fashion sense they are also known for , it wasn't long until shoe manufacturers came up with some Pride versions of their products. Nike, adidas, Converse and Vans led the way in this movement, with many more following over the years. These brands not only celebrate inclusivity with the release of the Pride shoes but also donate a big chunk of the sales to the LGBTQ community. The Nike BETRUE , Converse and adidas Pride Collections have been the most consistent over the years, with various versions of classic or modern sneakers being released displaying the Pride rainbow colors.\n\nNow On eBay\n\nSee All Deals On eBay<|endoftext|>Kinney | Viola Shirt | Ink\n\nBy Kinney\n\nMeet Kinney's Viola Shirt in Ink – our go-to shirt staple that will become the foundation for many flattering combinations.\n\nFeatures a flattering v neckline with soft open collar that continues into a draped front panel design. A small front split allows for a half tuck. Relaxed batwing-style sleeves feature an open slipt cuff design. Finished with a scoop back design and soft hand-feel. \n\nAlso available in Sand\n\n60% Cupro 40% Viscose\n\nLeilani wears size small. \n\nMeasurements: Height 177cm | Bust 76cm | Waist 61cm | Hip 89cm<|endoftext|>It's an old, outdated belief that oil-based cleansers are no great for the skin. For too long people have believed that oil-based cleansers are not for oily skin or that oil-free skin is the same as clean skin, which is just not true. Those are a few very outdated myths, actually. Your skin produces natural oils since it is necessary to achieve this, as well as your cleansers should balance your skin oils, not take them off entirely from your face. We're here today to break those old methods for thinking and explain how oil-based cleansers can easily become your new best friend.\n\nWhy Your Skin Produces Oil\n\nYour skin naturally produces oil since it is a healthy part of life. Each of your pores possess a sebaceous gland beneath it, and also the job from the sebaceous gland is to produce a natural oil called sebum. Sebum keeps the skin stay hydrated, therefore, keeping it healthy and plump.\n\nBecause your skin's skin oils are healthy for you (sometimes they can overproduce, and that can result in problems), it's important to realize that you ought to be focusing on balancing your oil production rather than completely removing the oil from your skin. We tend to think we can overwash our face to get rid of oil, when the point ought to be to balance our natural oil production- that leads us to the first and many important benefit of an oil-based cleanser. An oil-based cleanser allows us to to balance the oil manufacture of our skin instead of just washing from the oil onto the skin. Quite simply, it may cleanse your skin without stripping off your skin's skin oils as some oil-free cleansers do.\n\nBenefits of the Oil-Based Cleanser\n\nAside from balancing your skin's natural oils, oil-based cleansers are great for cleaning dirt off your face, unclogging your pores, and removing excess sebum from your face. So, it effectively does the job of the regular cleanser however with the additional benefit of oil balancing. Actually, oil-based cleaners are known to provide you with a deep clean by getting deep-down into your pores to battle blackheads and acne away.\n\nHowever, more importantly, oil-based cleansers have also been shown to remove makeup better from your face inside a gently, harmless manner. Actually, most makeup removers apply certain form of natural oil such as camellia oil, that has become equal to makeup removal in the current beauty world. Many people make use of regular household olive oil as a way to remove makeup. By going the oil cleansing route, you can use one product to complete the job of makeup removing and cleansing instead of", "num_tokens": 2048} {"category": "common_crawl-fashion_and_beauty", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-fashion_and_beauty/part-00-00000.npy", "text": "s scale, so it is best for beads and carved gemstones. \n\nWhat are some tests to know that black onyx is real? \n\nIf you want to know if your black onyx is real, you can perform the following tests. \n\nBreath test\n\nHold your black onyx close to your mouth and breathe on the stone. Your jewel can be fake if it takes more than 3 seconds to clear up. \n\nNewspaper test\n\nPut your black onyx above the newspaper and try to read the words under it. If you succeed, then your gemstone is a fake one. \n\nTouch test\n\nTry gently touching the stone’s surface with a pad of your finger. If it feels warm against your skin, your jewel can be a fake one and is made from glass. \n\nComparison test \n\nHold the black onyx next to black glass, then compare them. If they exactly look alike, you may have a fake stone. \n\nCan you wear a black onyx ring in the shower? \n\nYou should avoid wearing your black onyx ring as you take a shower. Thus, the chemicals from your shower products can damage the black onyx surface. \n\nAlso Read:  List of the Top 10 Most Popular Yellow Gemstones (2022 Review)\n\nIn addition, the cleanser’s soapy texture can loosen your ring. It will fall off your fingers and can be damaged as it hits the ground. \n\nCan you wear a black onyx ring under the sun? \n\nYes, you can wear your black onyx ring under the sun. \n\nCan you sleep as you wear your black onyx ring? \n\nIt is not recommended to wear your black onyx ring since you may accidentally knock the gemstone against a hard surface and damage it. \n\nHow to know if your black onyx is made from glass? \n\nUsually, glass and onyx are misidentified as one another. However, you can tell the difference between the two by putting the piece near your lips. If it starts to feel warm, it can be a glass. \n\nGet a small piece from the black onyx jewel and put it inside a covering in a safe area. Then, gently break the work using a hammer. If the broken pieces are shiny than dull, they can be made from glass material.\n\nCan black onyx scratch easily? \n\nA black onyx doesn’t scratch easily. It is a highly durable and low-maintenance stone. You should carefully store it in a pouch or box if not used. \n\nHow to extend the lifespan of your black onyx?\n\nYou should also keep it away from harsh chemicals. It would help if you were responsible for your jewel’s proper care and cleaning. With this, your stone can last for many years. \n\nDoes the black onyx a precious gemstone?\n\nWell, it is not a precious gemstone. However, the black onyx is a semi-precious gem. \n\nWhat does black onyx stone protect from?\n\nUsually, black onyx is used to protect against negative energy. The gemstone is considered a master of good fortune. The black onyx is believed to have solid healing properties that can shield you from things that can bring harm. \n\nTo summarize, a genuine black onyx comes with a waxy luster and opaque transparency. As a result, it has a glossy appearance when polished. On the other hand, a fake black onyx looks shiny like glass. \n\nIf you want your black onyx jewelry to last for many years, you should be responsible for its proper care and maintenance. Do you love wearing gemstones? If yes, you can check out our post about the best yellow gemstones.\n\nLeave a Comment<|endoftext|>Alessia Wool Pants\n\nPleated pants in opulent wool and silk ble<|endoftext|>Rayleigh Criss-Cross Engagement Ring\n\n Center Stone InformationA mesmerizing diamond ring where three bands elegantly intertwine, each accented with scallop-set round brilliants along three-quarters of their length. At the heart of their intersection sits a captivating Round Brilliant focal stone, held aloft in a delicate 4-prong basket setting. As light dances off the shimmering accents, the center stone rises gracefully above, creating a breathtaking display of brilliance and allure. Showcased in 14K White Gold and set with a 2.00 carat Round center.\n\n Average Ring Weight: 5.2gr.\n Average Ring Width: 3.00mm\n Average Ring Height: 7.70mm\n Average Accent Stone Carat Weight: 1.00ct.tw\n\n Need a Customization?\n\n If you’d like to personalize this item with a different center, metal type, or engraving...etc., please send us a message. If you don’t receive a response within 48 hours, kindly check your spam folder or email us directly at contact@quorri.com<|endoftext|>Monday, 31 August 2015\n\nThe Sunday (bank holiday Monday) natter: the 5 stages of a night in heels\n\nAs it's bank holiday Monday, I thought it would be a great time to share with you the infographic I've been working on with Stylefruits (plus it makes up for my laziness of failing to prepare a Sunday natter yesterday). It's the last bank holiday of the year which means, to the dismay of those unsociable individuals like myself, people will be making the most of it by going out, celebrating a day off and using it as an excuse to part-ayyy (yep even in the rain, us Brits are used to it now). \n\nI think we've all felt the pain of wearing those swanky yet extremely high heels on a night on the town. Unfortunately fashionable beauty comes with a price, and that price is feet pronounced wholly dead after the enduring of enjoyment. It's quite sad that we have to make the choice of being comfortable or feeling utterly stumpy without those lengthening leg savers. Usually, if possible, I take both pairs out with me, heels for looking as good as can get, and flats for the end of the night when nobody will see me limping home in the dark - BUT that's not often the case and I want to take you through the 5 stages of thoughts, feelings and emotions running through your head from start to finish and how it plays out from walking out of that door to returning home. \n\n1) Checking your reflection | strutting past a window or double checking yourself in the mirror always confirms the inner confidence which bobs out to say hello every time you wear your favourite pair of heels. Think your legs look super long and slimmer than usual? Of course, that's the power of heels. Rock that foxy catwalk pose, girrrrl!\n\n2) Walking to the club | the image of those perfect pins is still embedded in your mind so of course you're trying your best to walk in sync to highlight your obvious sexiness, until you come across a load of stairs! All is well if you have the sequence intact, complete with the famous hair flick (you just have to inwardly repeat and advise your brain \"try not to fall over or stumble!\" over and over again).\n\n3) Dancing | as the night goes on and the heels gradually become less comfortable and more a burden on your definite wrong choice, it suddenly grains on you that your feet are pained. Unfortunately, as the realisation hits, it's too late to reverse the decision so dancing is the only cure. It will increase the aches but at least you're enjoying yourself (and burning the calories of all alcoholic drinks consumed, right?!)\n\n4) Sitting down/drinking | ahhh, a rest at last. It feels like utter bliss once you follow your friends' guide to sit down and give your feet time to recover. If ever there's a time you realise how much hard work it is to be a woman and to look and feel good, it's when you've felt the tingling, throbbing and burning suffering of your feet on a night in high heels. \n\n5) Going home | the walk home is always a risk; too much alcohol, stilettos and extremely wobbly legs don't mix well but look at this way, your armoured heels can protect you from any danger in an imagined scenario. It's so tempting to whip your shoes off, all you can think about is removing them, it's lodged into your brain, but nothing beats the moment you've been looking forward to for hours. The relief of flipping off those heels as you fall back onto the bed makes it so worth it!\n\nWith the help of some other fashionistas, here's what Stylefruits came up with:\n5 Stages of a Night Out in Heels\n\nDo these actions sound familiar? I'd love to know your 5 stages!\n\nBridie x\n\nFriday, 28 August 2015\n\nLife: food menu tasting at Mojo\n\nBeing a blogger has its perks, and one of the biggest perks is being exclusively invited to menu tasting events (even if my dodgy sensitive stomach does say otherwise). A good few weeks ago now I headed down to Mojo, a famous Leeds debut that shockingly (due to my lack of drink-sociable lifestyle), I've never visited before. From word of mouth, it's known as the hidden gem you go to dance on tables at 4am so adding food to their seriously cool dive bar vibe can only mean one thing - even more fun!\n\nWith the bar solemnly based around music; framed artwork, portraits, vintage tickets and a huge Beatles feature gracing the walls, it was totally up my street (apart from the fact good ol' Paul McCartney's eyes were strangely and creepily pierced out). The small but quaint room also has an American vibe to it, the seating areas being", "num_tokens": 2048} {"category": "common_crawl-fashion_and_beauty", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-fashion_and_beauty/part-00-00000.npy", "text": "'s rich leather seats.\n\n1978 -- Ralph Lauren designs double-breasted navy blazers worn with white shirts and ascots for T.W.A. flight attendants. ''I'm tired of flight attendants looking like consumers,'' Mr. Lauren said in a news release at the time.\n\n1980 -- Adolfo, a favorite designer of Nancy Reagan, adorns Pan American World Airways staff members in a classic contemporary silhouette, made mostly of polyester.\n\n1983 -- Calvin Klein develops S.A.S. uniforms, including poplin raincoats and navy wool cardigans. Giorgio Armani outfits the 150 workers at Ian Schrager's Morgans Hotel in Manhattan.\n\n1987 -- Tommy Hilfiger decks out waiters at Spago in West Hollywood, Calif., in pink oxford shirts and chinos. (A decade later, Wolfgang Puck, Spago's owner and chef, will ask Mr. Hilfiger to reinvent his staff's look for his Beverly Hills restaurant, and the designer will return with a toned-down, sunshine-yellow uniform.)\n\n1997 -- Donna Karan provides waiters at Union Pacific in Manhattan with conservative dress shirts, vests and green-and-black diagonal-stripe ties. And at London's Metropolitan Hotel, the staff suits up in DKNY: silk and mohair jackets for the male reservationists, ottoman rib suits for the doormen.\n\nPhotos: A sketch for Todd Oldham's crush-dyed-cotton receptionist uniform at the redone Tiffany Hotel, an Art Deco landmark, in Miami Beach. (Cliff Pershes); Jessee Collins, a waitress at Cafeteria, in her Dolce & Gabana uniform. Right, the concierge staff at the Mercer Hotel, outfitted by Isaac Mizrahi. (Marilynn K. Yee/The New York Times)<|endoftext|>5 Tips for Choosing Necklaces\n\nSometimes it’s hard to know just how to choose a necklace to match you outfit or your body type. Imogen explains really simply how the length and style of necklace can be used to your advantage and how some styles should be avoided.\n\nHi this is Imogen Lamport from inside out style blog and I’m just going to talk to you a little about something as simple as the necklace and how communicating and also drawing attention on your body. So if I’m wearing a fairly plain top like this and I’m wearing just a small or delicate necklace it’s not a real feature of my outfit, not something you really, really, notice and so it’s not doing a lot to draw attention to my portrait area and ideally we want to always be drawing attention to our portrait area.\n\nSo, if I just take this off and say I went with a choker, of course a choker necklace is going to draw attention to my neck. Now I’m quite lucky, I’ve got a long fairly slim neck. I can wear a choker, it cuts up the space if you have a very long neck. A choker can be great to stop that length appearing quite so long. If you have a shorter or wider neck, you’ll probably find that a choker isn’t your best option.\n\nIt works with some necklines but not all up all others, particularly something that’s kind of high and then you’ve got a choker sitting on top. It’s not a great look; you need something either a bit lower or a collar. You can work with a collar quite well but it’s definitely drawing attention, you’ll notice to your neck. So you don’t want your neck to be the feature then avoid the choker option.\n\nNow it’s stuck in my earring! So if we’ve been thinking about, if I’m going to wear something longer. If I have a large bust the thing I don’t want to do is to draw attention to that bust area. Now I can wear something long but I need to make sure there’s a feature up higher which is why when I made this necklace. I’ve popped this rose up here because what is does is draw your attention up above the bust area and it’s a decent enough scale that it works with a larger bust. So can wear things that are longer and I think with a high neckline like this it looks nice to create a lower neckline because this relates to the balance points where you want to have kind of one head length between the length of your face and where the necklace ends there, but having something up high draws attention up and this rose is also around my first balance point. So this draws attention up into that portrait area but also it can work quite well with a larger bust or of course with a smaller bust.\n\nNow, if I pop on something like this which is a pendant. What you’ll notice is because the chain is thin, the focal point is down here on my tummy. If you have a protruding tummy, a rounded tummy, or you rather your tummy was not the place people looked at, then don’t wear a necklace like this. So a long pendant is not flattering on someone who has a tummy because it draws attention down. In fact what I would do, you know, if I was wearing this is I would actually shorten the chain up and put it up here in my portrait area to draw attention up.\n\nDo think about where especially when it’s a pendant, where does it fall because it does really create a focal point. You can see what a difference that makes about where you want to look.\n\nBut I could wear something like this which is fairly similar in length but what it does, because it has detail up high, has more larger detail up and there’s nothing specific down here at the end. It means it creates a balance with the focal point so you’re not just staring at my tummy. It actually, you know, has large chunks up high so it actu7ally draws your attention up.\n\nOr if I’m really wanting to draw attention up I can wear a big feature statement piece like this which sits in the portrait area and draws attention to my face. Now this is a very dramatic piece in a way and so if your personality isn’t dramatic don’t go that way but also it’s made for many smaller elements. So rather than just being one imagine if it was like imagine a big solid plate it would feel really too big on me because I don’t have really large scale features. But because it’s made of more smaller elements, many small pieces, small and medium sized dots and feathers I can get away with the scale because it suits the drama in my personality and the creativity in my personality without overwhelming me with its scale.\n\nSo there’s just a few little tips to think about when you’re choosing your necklaces.<|endoftext|>Are Polyester Underwear Bad for You? Fabric Facts\n\nCurious about the health ⁤effects of‌ polyester⁣ underwear?​ Dive into the fabric facts ⁢with this⁢ informative article!\n\n– The Truth About Polyester Underwear​ and Your Health\n\nPolyester underwear has ​been‌ a​ staple in⁢ many people’s wardrobes for years, but there has ⁣been ongoing debate about whether ⁤or not‌ this fabric is harmful to your ‍health. To ‍shed ‌some light on the topic, let’s take a ⁤closer look at the ‍facts surrounding ⁣polyester⁣ underwear.\n\nOne concern that some ⁢people ‍have about polyester underwear is its potential to​ cause ⁢irritation or⁤ allergies. Due to its synthetic ​nature,⁢ polyester ⁢can sometimes⁣ trap ⁢moisture⁣ against the skin, ⁣leading to discomfort or even skin reactions in some individuals.‍ Additionally, polyester does‌ not ⁢have the same breathability as natural⁣ fabrics like⁣ cotton, meaning that‌ it⁢ may not​ allow for proper‌ air circulation, which can contribute⁤ to issues such as yeast infections.\n\nOn the flip‌ side, polyester underwear is known for ⁤its ​durability and‌ resistance to shrinking and wrinkles, ​making it ⁢a popular choice for many consumers.‍ It is also ⁢a quick-drying​ fabric, which can⁤ be beneficial for ⁤those with active​ lifestyles. Ultimately, the​ decision⁢ of⁢ whether or ⁤not ⁤to ⁢wear polyester underwear comes down to personal preference and individual comfort levels. ‍If you ‌have concerns about ‍how polyester may impact ‌your health, consider opting for natural fabrics or blends that offer⁤ a balance of comfort and functionality.\n\n– Understanding the Pros and Cons of Polyester Fabric for ⁤Underwear\n\nPolyester fabric has ⁣long‍ been a popular⁤ choice ⁣for underwear‍ due to its affordability and durability. However, there ‍are ​both pros and cons to consider⁢ when it comes to wearing polyester underwear.\n\n • Polyester is⁢ a synthetic material known⁣ for its strength and resistance to shrinking ​and wrinkling.\n • It⁢ is quick-drying, ⁣making it a practical choice ⁣for those ‌with an active lifestyle or who live in humid climates.\n • Polyester underwear tends to retain its shape well, even ⁤after multiple⁢ washes.\n\n • One of the‌ main ‍drawbacks of ​polyester ​fabric is its lack of breathability. This can lead to‌ moisture and sweat⁤ being trapped against the skin, potentially causing irritation or discomfort.\n • Some people ⁢may find ‍that polyester underwear⁣ doesn’t feel as ‌soft or comfortable against the ⁣skin ⁢compared to natural fabrics like cotton.\n • Polyester ‌is also⁤ known to generate‍ static​ electricity, which can be a nuisance ‍for some wearers.\n\nIn conclusion, ‌while⁣ polyester​ underwear ⁤has its", "num_tokens": 2048} {"category": "common_crawl-finance_and_business", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-finance_and_business/part-00-00000.npy", "text": ", speaks at the TechCrunch Disrupt SF 2013 conference in San Francisco.\nPhoto: David Paul Morris/Bloomberg/Getty Images\n\nZendesk's recent $45 million acquisition of BIME will streamline the cloud services it offers to customers and is, in some ways, more meaningful than the record EMC-Dell deal.\n\nBy Cyrus Sanati\nOctober 23, 2015\n\nLast week saw the single largest acquisition in technology history with Dell’s purchase of network storage company EMC for $67 billion. While Silicon Valley and the Street were busy absorbing the shock of such a big deal, it missed one, which, while considerably smaller at $45 million, presents a different view for the future of technology.\n\nZendesk, a customer service software company, quietly announced the acquisition of We Are Cloud, the parent company of BIME Analytics, a startup that claims to “conquer the complexity of data.” This deal may not be as large or as sexy as the Dell-EMC merger, but it speaks more to what businesses need from technology going forward.\n\nBuilding huge and expensive data centers, which is at the heart of the Dell-EMC merger, is old news. Sure, it is still a lucrative venture, and will probably be profitable for years, but companies can now store data far more cheaply and easily than ever thanks to the rapid development of cloud services, like Amazon Web Services.\n\nJust from a capital budgeting point of view, it makes more sense for a company to store data in the cloud rather than spend millions upfront to build a proprietary data storage server.\n\nThe real value isn’t in storing the data; it is about interpreting the data so that it can be put to work. The Zendesk acquisition better reflects the path of where Big Data is going and how it is going to get there.\n\nFortune sat down for an exclusive interview with Zendesk co-founder and CEO Mikkel Svane to get the reasoning behind the BIME acquisition and what it says about the future of technology software in business. The following interview has been edited and condensed for publication.\n\nFortune: Businesses are expected to increase their spend on software by 17% over the next few years, jumping to a mind-boggling $4.5 billion by 2017, according to a recent report by Barclays. This is due in large part to increased adoption of cloud software services. Why the big rush into the cloud?\n\nMikkel Svane: Businesses are dealing with an exponential growth in data being created about their customers. It’s no longer enough to capture data from only customer support interactions; businesses need to make sense of all of their customer data.\n\nBeing able to combine that with all of the other data out there about customers allows businesses to be data-driven with customer service. It means that a retailer can compare their service inquiries to their sales, or that a gaming company can see how customer inquiries are impacted by the launch of a new title.\n\nHow does the acquisition of BIME Analytics speak to what customers want from technology today?\n\nAs we integrate the software and begin rolling out the new data analytic offerings, customers will be able to get even more context about their customers no matter where the data lives.\n\nBeyond the typical data analysis, we will also be working with BIME analytics to think about the future of customer service. Just earlier this month we launched Satisfaction Prediction, a new feature that uses machine learning to spot poor customer-service interactions before they happen. We are hoping that by acquiring BIME Analytics, we will open more doors to take customer service to the next level.\n\nWhy acquire a company rather than build the capabilities yourself? What value is BIME bringing to Zendesk?\n\nIt’s a major undertaking to build a data analytics platform that can combine data from multiple sources and then make it really easy to build queries and beautiful visualizations. BIME Analytics, in our opinion, has done it better than anyone else. Bringing that expertise and technology into our existing customer data platform helps us move more quickly on what we think is a huge opportunity in applying analytics to customer service and relationships.\n\nWe’ve offered advanced reporting features for years that allow businesses to track their customer service performance, ranging from customer satisfaction and volume of inquiries to the speed of response.\n\nBIME will allow us to sprinkle more real-time data visualizations, dashboards, and tools across our product portfolio.\n\nBIME has a powerful and beautifully simple model for combining multiple data sources without having to build a centralized data warehouse, and to standardize on one large vendor’s systems.\n\nIt will also allow for organizations using Zendesk to combine support data with all of the other data about customers that a business tracks, as well as with an organization’s other business metrics.\n\nIt will help businesses better understand how business and product decisions impact their customer relationships and uncover patterns that they were missing when all of the data lived in separate places.\n\nHow did you find BIME and why is this company a good fit for Zendesk?\n\nWe have a lot of ambitions for how we want to use data, so we were really deliberate in looking for a company that fit our philosophy on how business software should work, and that made data analytics really simple for business users. We simply called the BIME Analytics team because we thought its product matched ours. As we met, we were impressed with the team and technology.\n\nDo you find your customers care about the technology powering your analytics engine, or do they just want it to work? Do you see BIME being a selling point?\n\nUltimately, what our customers care about the most is that it just works for them, and that we’re able to guide everyday business users to the kind of data dashboards and visualizations that make the most sense for them. There’s a lot of work to do, but our goal is to make data analytics very simple and pervasive across our entire portfolio of products.\n\nHow does this acquisition position you to get an advantage over your competitors?\n\nFor too long, the traditional approach to data analytics in enterprise software required business to store all of their data in a single data warehouse, and to standardize on one large vendor’s systems. The big enterprise vendors have followed that approach, and we don’t believe in it. We’re opening the world of data analytics to anyone involved in customer service and engagement without having to change their technology architecture or spend tons of money on major integration projects.\n\nI keep hearing about customer-centric IT… that is, technology created with the end-user in mind. How do you see Zendesk exemplifying that? Is BIME helping accelerate that vision?\n\nThis was one of the biggest reasons we were attracted to BIME Analytics. Like us, the team follows a customer-centric approach to technology. Pricing is transparent and available on its website; anyone can immediately start a trial and see how the software works before committing to it, and design and simplicity are as important as the technology behind the scenes. We think of this as democratizing business software–focusing it on the real users, and making the software approachable to any kind of business without requiring big IT projects.\n\nIBM’s CEO Ginni Rometty recently met with Fortune’s Chief Editor Alan Murray onstage at our Most Powerful Women Conference and said that it’s no longer about being a digital business, but a cognitive business. Do you agree? How does BIME position Zendesk to empower your customers to be a cognitive business?\n\nDefinitely. I believe that data is the new currency in business and customer relationships. Organizations that not only have critical data, but also know how to bring it all together and make sense of it are going to better understand their customers and, ultimately, win and keep more of them for a lifetime.\n\nYou May Like<|endoftext|>Gartner Data & Analytics Summit 2024\n\nDiscover the Future of Retail with Syndigo\n\n13 – 15 May 2024\n\nExCeL London | London, U.K\n\nWelcome to the Forefront of Innovation\n\nThis year’s Gartner’s Event Focus: Generating Value Together, from Data to AI to Collective Intelligence\n\nEmbrace the era of collective intelligence where human expertise, data, analytics, and AI synergize to optimize business outcomes through well-informed decisions.\n\nThe Gartner Data & Analytics Summit 2024 is where the entire industry goes to build the relationships that matter most and gain new insights to help make bold choices in the year.\n\nWe are excited to meet again, in person, to share all the great things that Syndigo has in store for our clients and the industry.\n\nMeet with our senior leadership team to learn more about how Syndigo, powers the continual flow of data between brands, distributors, retailers, and their customers to improve real-time decision-making and accelerate sales on every shelf.\n\nFill out the form below to contact our team.\n\nSee you in London!<|endoftext|>Capture what you do in a nutshell\n\nThe blog post page should serve as a dynamic platform for sharing insights, updates, and news relevant to your industry. Start with an inviting introduction that sets the tone and topic of the blog. Each post should aim to engage readers by addressing current trends, offering solutions, or providing expert analysis that adds value to your audience’s experiences or knowledge.\n\nUse a conversational tone that resonates with readers, making complex information accessible and enjoyable to read. Posts should include practical tips, step-by-step guides, or thought-provoking questions that encourage interaction in the comments section.\n\nMake sure to incorporate relevant keywords naturally to boost SEO and include compelling visuals that enhance the text. Each blog post should also conclude a clear call to action, such as inviting readers to subscribe, share the post, or read related articles; this will foster further engagement with your site.\n\nRegularly update this page to reflect the latest industry developments or seasonal topics, keeping the content fresh and relevant. Use this space to establish your brand as a thought leader and go-to resource in your field.<|endoftext|>Much has been made of IBM's (NYSE:IBM) string of five-plus years of quarterly revenue declines, particularly the last year or so. That IBM is in the midst of a significant transformation away from", "num_tokens": 2048} {"category": "common_crawl-finance_and_business", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-finance_and_business/part-00-00000.npy", "text": "-REGIONS<|endoftext|>Pimex - Công Ty Cổ Phần Đầu Tư Xuất Nhập Khẩu Xăng Dầu Việt Nam\n\nFed decided continuously to keep the current interest rates\n\nWith the reasons of growth rate of the US economy has remained in the low in the period of last year due to concerns the global economic slowdown, Federal Reserve Bank of the US (Fed) continues to retain the current interest rates.\n\nIn the statement released on the morning of 28/1 (Vietnam time) after a meeting of the  Federal Open Market Committee (FOMC) - the agency of Fed policy makers - Central Bank of the United States affirmed maintain interest rates at 0.25-0.5% announced in 12/2015, after many considerations, in the context appear more risks from the condition of China economic slowdown and plunged oil price.\n\nFed gives the decision on the condition investor is also careful by the market almost continuous decline since the Fed's last meeting.Announment confirmed Fed is monitoring the conditions in closely.\n\nHowever, investors are still watching developments of the meeting to update the Fed's latest forecast on the US economy and rising interest rates in the future.The financial experts also concerned about the Fed's assessment of the risks if oil prices continue to fall.\n\nAfter the Fed announcement, the important stock index of US as S&P 500 fell 0.6%, while the dollar also fell against the euro with the exchange rate $ 1.901/1 Euro.\n\nTin liên quan<|endoftext|>, which consists of bitcoin and several other major digital currencies, crumbled June 22 as the majority of the coins dipped by up to 10 percent due to six exchanges in Japan that were ordered by the Financial Services Agency, its financial watchdog, to improve their current practices, and as two exchanges were hacked within an 11-day periodBitcoin (BTC) has been engaged in a predictable up and down pattern where it absolutely crashes at the beginning of any year and then sky-rockets as the year nears its end. Bitcoin held steady at around $19,000 in December 2017, and then sure enough – crashed big time to around $6,000 at the beginning of 2018. At the time of writing, March 8th 2018, the price of Bitcoin is relatively stable between $10,000 and $12,000. In my opinion, the price will run again soon.\nThe natural inclination for crypto investors is to identify a new altcoin with the potential for growth, invest heavily when it's still inexpensive to do so, and then reap the rewards when the value increases. That being said, the altcoin market is growing so quickly that many new digital currencies hitting the market might not be good long-term investments.\nInvestors can get insights into the fund with the PentaView analysis platform. It’s basically an aggregation of the data regarding the investments and assets within the fund. The cryptocurrency space is constantly evolving and PentaView is a tool to keep users up-to-date. PentaView also gives investors a way to make suggestions to the PentaCore teamscreenshot below is a basic representation of these concepts, where the horizontal lines roughly mark zones where price either finds a ceiling or a floor, and generally, in an uptrend, past resistance zones can become supports later on (notice how candles earlier failed to breach the second-last horizontal line, but later bounce off from the same) and in downtrends, support zones can become resistance.\nLitecoin, like all major altcoins, has depreciated substantially against BTC. This decline has been precipitous and nearly monotonic since May, with even the slightest corrective rally sold off immediately. However, we may find solace in the fact this pair appears to have found footing around 9070, which appears to be a very significant level of support. In the ...\nThere are a number of tools you can use to maximize profits and minimize risks, such as margin trading, leverage, and stop-loss orders. Shorting Bitcoin and other cryptocurrencies can be done in a variety of ways. Just looking at the Bitcoin price chart for early 2018, you can see that those that spotted the downward trend in mid January and made a short trade would have made 40% profits by exiting one month lateris is the perfect opportunity for investors with the available funds to buy the undervalued cryptocurrencies. As a trader, you use your expertise to assess the market conditions and fundamentals to predict when the market is most undervalued and likely to make a recovery soon. Then, just make your trades and hold out during the period of fear and uncertainty, all while making a nice profit when the market returns to sanity<|endoftext|>Dollar Index upswings unhurt\n\nThe USDIndex slipped slightly following the mix of data, where Q1 GDP came in slightly better than consensus, jobless claims were slightly higher, and the trade deficit was wider than expected. EURUSD edged over 1.1140 from 1.1135, while USDJPY was fractionally lower at 109.65 from over 109.70. Equity futures continue to indicate a moderately higher Wall Street open, while yields were little changed.\n\nUS initial jobless claims rose 3k to 215k in the week ended May 25 after holding steady at 212k in the May 18 week (revised from 211k), and tumbling 16k to 212k in the week before that.\n\nUS Q1 GDP growth was fractionally revised down to a 3.1% pace, beating forecasts, after posting a better than expected 3.2% gain in the Advance report. Remember, Q4 posted a 2.2% clip, with Q3 up 3.4%. For Q1, consumption was bumped up to 1.3% versus 1.2% initially. Fixed investment was nudged down to 1.0% from 1.5%, with nonresidential spending at a 2.3% rate from 2.7%, while residential spending was knocked down to -3.5% from -2.8%. Government consumption was revised up to 2.5% versus 2.4% previously. Inventories contributed $28.7 bln versus $31.6 bln. Net exports added $52.1 bln from $56.4 bln. The PCE price index slipped to 0.8% versus 0.9%. The core rate was 1.0%, down from 1.3%.\n\nThe USDIndex remains above the 98.00 barrier for the day, while it is holding strongly, close to year high of 98.24. The short term outlook has been denominated today with consolidation, however the overall picture remains on track with the upwards channel seen the past 2 months. The asset is currently set above 20-, 50- and 200-day SMA, with the 2nd one providing a strong Support in the near term future.\n\nThe intraday RSI has flattened at 63 due to the consolidation moves seen today, however in the higher timeframe continues to point to the upside. Interestingly, MACD lines in the near and long term formed a bullish cross, suggesting the continuation of the positive momentum. Hence a break of last week’s high could open the way towards the next barrier at the 99.00 Resistance level seen since May 2017. Support holds at the 20-day SMA at 97.50, however only a break of the 50-day SMA could develop concerns over the continuation of the up-channel<|endoftext|>Think Rates Are Going Up? Banks Don't\n\nAfter years of waiting for interest rates to rise, some banks have started to lend as if they never will, loading up on a record amount of loans and securities that carry low rates for years.\n\nThe percentage of bank assets that won't mature or change rates for more than five years reached a new high in the second quarter, according to Federal Deposit Insurance Corp data released Tuesday. That means banks are allowing more borrowers to lock in low rates for long periods of time, a potential risk should rates move sharply higher.\n\n\"The interest-rate environment and competitive lending conditions continue to pose challenges for many institutions. Some banks have responded to this environment by 'reaching for yield' through higher-risk and longer-term assets,\" FDIC chairman Martin Gruenberg said in remarks accompanying the release of the quarterly data.\n\nAn added worry: Much of this lending for longer is in the booming area of commercial real estate, where borrowers finance offices and apartment buildings typically with loans that have fixed-rate periods from three to 10 years.\n\nThe rise in bank assets with longer maturities is a side effect of nearly a decade of historically low interest rates. Those have pinched bank profits and led more firms to lend for longer to try to capture more yield.\n\nSo far, that hasn't proven a problem as long-term rates have remained low, despite the Federal Reserve increasing short-term rates, and credit quality has stayed strong. Regulators have warned, though, that the growing share of longer-term and commercial-real estate loans at some banks could be risky.\n\nAcross all banks, the percentage of total assets that are at a fixed rate for more than five years was 27.5% in the second quarter of 2017, its highest since the FDIC started tracking it in 1984. The metric reached 33.7% in the second quarter at smaller banks with $1 billion to $10 billion in assets.\n\nCommercial real-estate loans made up 31.5% of assets at those midsize banks in the quarter, up from 25", "num_tokens": 2048} {"category": "common_crawl-finance_and_business", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-finance_and_business/part-00-00000.npy", "text": ", businesses can find suppliers willing to collaborate on new ideas, ensuring they remain relevant and appealing to their customers.\n\nIn today’s interconnected world, understanding global trade is essential for businesses seeking to leverage international markets. Suppliers and manufacturers operate on a vast scale, often spanning multiple countries and regions. This globalization allows companies to source products at competitive prices while also giving them access to diverse markets. However, navigating this landscape requires knowledge of various laws, customs, and trade agreements that influence the way goods are exchanged and delivered.\n\nEffective communication is crucial in establishing successful relationships with suppliers and manufacturers around the globe. Language barriers, cultural differences, and varying business practices can complicate interactions. To overcome these challenges, businesses must prioritize transparency and adaptability. Utilizing platforms like GlobalSource.com can facilitate these connections, providing resources that help businesses understand their partners’ needs and expectations, ultimately fostering smoother transactions and stronger collaborations.\n\nMoreover, the rise of technology has transformed how businesses engage in global trade. Online platforms enable companies to compare suppliers and manufacturers, streamlining the sourcing process. With the ability to access a wide range of options and detailed information about each supplier, businesses can make informed decisions that align with their operational goals. Embracing these digital tools can empower companies to navigate the complexities of global trade more effectively, creating a more dynamic and responsive supply chain.\n\nCase Studies of Successful Partnerships\n\nOne remarkable success story involves a small eco-friendly startup that sought to create sustainable packaging solutions. After struggling to find manufacturers aligned with their environmental values, they discovered GlobalSource.com. Through the platform, they connected with a manufacturer specializing in biodegradable materials. This partnership allowed the startup to scale their production while maintaining their commitment to sustainability, leading to a significant increase in sales and customer satisfaction.\n\nAnother example features a tech company that wanted to diversify its product line. With limited resources to travel and attend trade shows, they turned to GlobalSource.com to explore manufacturers from various regions. They found a reliable partner in Southeast Asia who provided high-quality components at competitive prices. This collaboration not only enhanced their product offerings but also optimized their supply chain, ultimately resulting in a stronger market presence and improved profit margins.\n\nLastly, a fashion brand aiming to expand its reach faced challenges sourcing ethically made materials. GlobalSource.com helped them connect with a network of manufacturers who prioritize fair labor practices. With this new partnership, the brand was able to launch a new collection that resonated with consumers increasingly aware of ethical sourcing. This collaboration not only boosted their brand reputation but also fostered a loyal customer base dedicated to supporting sustainable fashion.<|endoftext|>Can you make money with AI marketing\n\nJust consider the potential of AI marketing as a transformative tool for your business strategies. With AI-powered solutions, you can optimize your marketing efforts, enhance customer engagement, and analyze data more effectively, leading to increased revenue. However, be aware of the risks involved, such as evolving technology and competition. This post will probe into how … Read more\n\nHow do I start AI marketing\n\nOver the past few years, AI marketing has transformed how businesses reach and engage with their audiences. To effectively implement AI in your marketing strategies, you first need to understand the various tools available, such as chatbots and predictive analytics. By harnessing these technologies, you can gather data-driven insights that will enhance your decision-making and … Read more\n\nCan affiliate marketing be automated\n\nIt’s natural to wonder if you can automate your affiliate marketing efforts for maximum profit with minimal effort. The good news is that many aspects of affiliate marketing can be effectively automated, allowing you to focus on strategy instead of mundane tasks. However, beware of the dangers of over-automation, which can lead to missed opportunities … Read more\n\nCan you use AI for marketing\n\nMost businesses today are exploring how artificial intelligence can transform their marketing efforts. You may be wondering how to effectively integrate AI into your strategy to enhance customer engagement and increase conversions. With tools that analyze data, automate tasks, and personalize marketing messages, AI can provide significant advantages. However, navigating the landscape also presents risks … Read more\n\nWhat is the best free AI website builder for affiliate marketing\n\nOver the past few years, you might have noticed an explosion in the number of AI website builders tailored specifically for affiliate marketing. Choosing the best free option not only saves you money but also equips you with imperative tools to optimize your marketing strategies. The right builder can offer you features like easy integration … Read more\n\nCan you realistically make money from affiliate marketing\n\nThere’s a world of opportunity in affiliate marketing, but not all who venture into this realm will find success. As you navigate this landscape, you need to consider important factors like choosing the right niche, building an audience, and maintaining transparency. While many people enjoy lucrative incomes from affiliate programs, the journey requires patience, strategy, … Read more\n\nIs there an AI for affiliate marketing\n\nAI technology is reshaping numerous industries, and affiliate marketing is no exception. You might be wondering how artificial intelligence can streamline your affiliate marketing efforts. From identifying lucrative niches to optimizing your campaigns, AI tools can offer insights and automation that significantly enhance your results. However, it’s important to be aware of potential pitfalls, such … Read more\n\nHow to build a free website for affiliate marketing\n\nJust imagine launching your very own affiliate marketing website without spending a dime. Building a free website can be an excellent way to kickstart your journey into the world of affiliate marketing, allowing you to showcase products and earn commissions with minimal investment. In this guide, you’ll learn the crucial steps to create a professional-looking … Read more\n\nHow can I make a website with AI for free\n\nIt’s easier than ever to create a stunning website using AI tools available at no cost. With numerous platforms offering user-friendly interfaces, you can build a professional-looking site without any coding knowledge.AI-driven templates can streamline the design process, while features like automated content generation can save you time and effort. However, be aware of any\nOptimized by Seraphinite Accelerator\nTurns on site high speed to be attractive for people and search engines.<|endoftext|>Metro Bank, the first high street bank to be launched in the UK in over a century, opened its first branch in July with a company-wide outsourced, pay-as-you-grow IT infrastructure.\n\nCraig Donaldson, chief executive of the bank, told Computerworld UK that having an efficient IT system was “crucial” to the bank’s launch. Metro Bank is attempting to offer an improved banking experience with services including instant credit or debit card issuing in-branch, and long opening hours covering seven days a week.\n\nThe bank has four branches and will have opened 40 more by the next four years, eventually hitting a total of 200 stores by 2020. But it only has five in-house IT staff, because of the outsourcing arrangement. Metro Bank outsourced its IT setup and maintenance to Niu Solutions, a company formed by the merger of Telinet, EVD, Pasporte and Ipitomi. The bank has a ‘pay as you grow’ contract that will cost more and provide more services as it expands.\n\nUnder the contract, for which financial details were not disclosed, services include infrastructure and software management, on-site and hosted voice, data, virtual desktop services, mobility, connectivity, website, user helpdesk and data centre services.\n\nMetro Bank operates principally on the Temenos banking platform, widely used in the industry. Its other applications, including a mixture of Oracle, SAP and IBM software, are hosted in two data centres, one in London and one outside.  The bank said the applications were secure and servers were highly virtualised.\n\n“New customers can open accounts with a rapid opening procedure and are issued permanent bank cards instantly, and we employ the best that technology can offer to achieve this,” said Donaldson, who added that the IT platform would expand with the company’s growth and be adaptable to changing financial industry regulation.\n\nAvailability was key, he said. “We wanted one company to go to for our service. The IT has to work, if it goes down you know about it and so do the customers.” The bank has a service level agreement for 99.99 percent availability.\n\nAs with other banks, Metro Bank already offers online services but will add mobile phone banking next year. Other projects include personalisation of cards in-store and RFID tags for mobile phones, enabling them to be used for contactless payments.<|endoftext|>Aim higher, reach further.\nGet the Wall Street Journal $12 for 12 weeks. Subscribe Now\n\nWhy IT Hates the iPhone\n\nCorporate information-technology departments say the phone poses security risks. But they seem powerless to stop employees from using it.\n\nIn less than a year, the iPhone has won the hearts of users, who speak of the combination cellphone, Internet device and music player with reverence.\n\nIndeed, the iPhone, which maker Apple Inc. AAPL 0.88 % says has captured 28% of the U.S. smart-phone market, seems to be loved by everyone -- everyone, that is, except those who work in corporate information-technology departments.\n\nThe Journal Report\n\nChevron's CIO discusses information overload, consumer tech at work and IT project management. Plus, planning corporate gatherings is getting a lot easier -- and a lot less expensive.\n\nDesigned with the consumer in mind, the iPhone is less secure than business-oriented smart phones such as those from Nokia Corp. NOK -1.63 % or Research In Motion Ltd.'s BlackBerry, according to IT professionals. But that isn't stopping people from using the device for work-related tasks such as checking email, managing sales contacts and getting information about prospective clients. In fact, market researcher Nielsen Co. estimates that one-quarter of iPhone owners over the age of 18 pass their phone bills on to their employer, suggesting significant use of the device for business.\n\nMany IT groups have banned the iPhone from their workplaces, complaining that there is no way to force employees to protect their iPhones with passwords and that they can't erase sensitive corporate data from remote locations if the device is stolen or lost. Additionally, they", "num_tokens": 2048} {"category": "common_crawl-finance_and_business", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-finance_and_business/part-00-00000.npy", "text": " lead to money conclusion you to definitely don’t completely align together with your full monetary land. Having said that, of several robo-advisers have modified to this challenge by allowing users so you can explain certain requirements or date limits. Regarding investing, one of the preferred subject areas is the rise of robo-advisors. Drawing interest with their associate-amicable interfaces minimizing fees, such formula-driven platforms vow a handy treatment for control your assets. An excellent robo-mentor is actually an automatic investing platform that utilizes complex algorithms in order to generate and sometimes rebalance personalized otherwise semi-individualized portfolios.<|endoftext|>Revenue unlocked for our customers\nAlways FreeGet a free website SEO auditScore my rankings\n\nHow to Convert Real Estate Leads into Sales [An SEO’s Playbook]\n\nChris Kirksey\n\nCEO, Direction.com\n\nThe ability to effectively convert real estate leads is what separates thriving brokerages from those struggling to survive.\n\nIn the real estate industry, generating leads is only half the battle. The true challenge lies in converting those leads into closed deals.\n\nAs digital marketing continues to evolve, search engine optimization (SEO) has emerged as a powerful tool for attracting high-quality leads. However, many brokerages struggle to effectively nurture and convert these valuable prospects into clients.\n\nWe understand the importance of not only driving organic traffic to your website but also implementing strategic lead conversion techniques. We’ve witnessed firsthand the transformative impact of combining SEO with a well-crafted lead nurturing process.\n\nIn this guide, we’ll provide proven strategies on how to convert real estate leads. We’ll explore the influence of local search on brokerage visibility, compare the quality of SEO leads to other sources, and provide a step-by-step roadmap for turning those leads into signed contracts.\n\nThe Power of Local SEO in Real Estate Lead Generation\n\nThe vast majority of prospective homebuyers and sellers begin their search online. Gone are the days of flipping through the Yellow Pages or relying solely on word-of-mouth recommendations.\n\nToday, local search is king, and it’s essential for brokerages to understand its power in attracting high-quality leads.\n\nHow most users find brokerages through local search\n\nWhen someone is looking for a real estate agent in their area, they often turn to search engines like Google. They might type in phrases such as “real estate agents near me” or “top brokerages in [city name].”\n\nThis is where local SEO comes into play.\n\nBy optimizing your website and online presence for local search, you increase the likelihood of appearing at the top of search engine results pages (SERPs) for these valuable queries.\n\nThe Influence of SEO on Local Rankings\n\nLocal SEO involves a variety of strategies, from claiming and optimizing your Google My Business listing to building local citations and earning high-quality backlinks.\n\nBy implementing these tactics, you signal to search engines that your brokerage is a trusted and authoritative resource in your local market. As a result, your website is more likely to rank higher in local search results, putting your brand in front of potential leads actively seeking your services – a major benefit when considering how quickly you can convert real estate leads.\n\nComparison of SEO leads vs. leads from other sources (e.g., ads)\n\nWhile paid advertising can certainly generate leads, it’s important to recognize the unique value of SEO leads.\n\nWhen someone finds your brokerage through organic search, they are actively seeking out your services based on their specific needs and interests. This inherent intent makes SEO leads more inclined to convert into clients quickly as to those generated through more interruptive methods like ads.\n\nWhy SEO Leads are More Likely to Convert\n\nSEO leads are often further along in the buying or selling process, having already conducted some research and narrowed down their options. They are more likely to be genuinely interested in your services and working with your organization.\n\nAdditionally, the trust and credibility established through your strong organic presence can contribute to higher conversion rates compared to leads from other sources.\n\nStep-by-Step Guide on How to Convert Real Estate Leads Generated via SEO\n\nNow that you understand the importance of SEO in generating high-quality leads, it’s time to focus on the critical steps for converting those leads into closed deals.\n\nBy following this proven process, you can maximize the value of your marketing efforts and build a thriving real estate business.\n\nStep 1: Respond Promptly to Inquiries\n\nWhen a lead reaches out to your brokerage through your website or online listings, time is of the essence. Prospects expect quick responses to their inquiries.\n\nBy implementing systems and processes that enable you to reply promptly, you demonstrate your professionalism and commitment to exceptional service.\n\nConsider using automated email responses to acknowledge receipt of the inquiry and set expectations for when a more detailed response will follow.\n\nAdvantages of Working with Direction.com\n\nWe have extensive experience manufacturing and optimizing lead flow automations using CRMs like HubSpot. When you partner with us for SEO, our extensive knowledge in this arena becomes another tool you can leverage to convert real estate leads to great effect.\n\nStep 2: Qualify Leads and Understand Their Needs\n\nNot all SEO leads are created equal. To maximize your conversion rates, it’s essential to qualify leads and gain a deep understanding of their unique needs and preferences.\n\nStart by asking targeted questions that help you determine the lead’s\n\n • selling/buying requirements\n\nThis information will allow you to tailor your approach and provide the most relevant guidance and resources.\n\nStep 3: Provide Value, Build Trust\n\nOnce you’ve qualified a lead, focus on building trust and establishing yourself as a knowledgeable resource.\n\nShare valuable insights about the local market, provide helpful guides and tools, and offer personalized recommendations based on the lead’s needs.\n\nBy consistently delivering value and demonstrating your expertise, you position yourself as a trusted advisor and increase the likelihood of conversion.\n\nEffective SEO is the Way Forward\n\nIf you’ve already invested in effective SEO — how else would you be getting all of these great leads, right? — then you likely have an amazing library of local guides to share with your leads. By sharing resources from your website that answer their exact questions, you further enhance that line of credibility, which will translate to faster time to close.\n\nStep 4: Nurture Leads Through Personalized Follow-Up\n\nNot every SEO lead will be ready to make a decision right away. That’s why it’s crucial to develop a lead nurturing strategy that keeps your brokerage top-of-mind and continues to provide value over time.\n\nImplement personalized email campaigns and drip sequences that share relevant content, market updates, and success stories.\n\nEngage leads through multiple channels, such as phone calls, text messages, and social media, to build relationships and maintain a consistent presence.\n\nStep 5: Set Up Appointments and Property Viewings\n\nAs you nurture your SEO leads, be proactive in setting up appointments and property viewings. Offer flexible scheduling options and make it easy for leads to book time with you or your agents.\n\nWhen preparing for these meetings, gather relevant information about the properties or neighborhoods of interest, and anticipate any questions or concerns the lead may have.\n\nBy being well-prepared and focused on the lead’s needs, you increase the chances of moving them closer to a decision.\n\nStep 6: Close the Deal\n\nWhen it comes time to close the deal, be prepared with strong negotiation skills and a deep understanding of the local market.\n\nGuide your clients through the process with transparency and professionalism, ensuring a smooth and successful transaction.\n\nOnce the deal is closed, don’t forget to maintain those hard-earned relationships. Stay in touch with past clients, provide ongoing value, and ask for referrals and reviews.\n\nBy nurturing these relationships, you lay the foundation to attract and convert real estate leads to great effect.\n\nIdeal CRM Infrastructure to Manage and Convert Real Estate Leads\n\nTo effectively manage and convert real estate leads, a robust Customer Relationship Management (CRM) system is essential.\n\nHere’s what you need to know:\n\n • A well-designed CRM system helps you centralize lead data, track interactions, and automate key aspects of your lead nurturing process.\n • When evaluating CRM options, look for features such as:\n • Lead capture and segmentation capabilities\n • Automated lead nurturing and drip campaign functionality\n • Integration with your website, email marketing platform, and other tools\n • Robust reporting and analytics to track your lead conversion efforts\n • Popular CRM options for real estate professionals include:\n • Follow Up Boss\n • Zillow Premier\n • Agent CRM\n • To maximize the value of your CRM, implement best practices such as:\n • Consistently logging all lead interactions and notes\n • Segmenting leads based on source, stage, and other key criteria\n • Setting up automated drip campaigns to nurture leads over time\n • Regularly reviewing analytics to identify opportunities for improvement\n • By investing in a CRM system and committing to its effective use, you can streamline your lead management process, improve conversion rates, and ultimately grow your real estate business.\n\nRemember, a CRM is only as powerful as the data you put into it and the processes you build around it. By making your CRM a central part of your lead conversion strategy, you can effectively manage and convert your valuable SEO leads.\n\nTransform Your Marketing Strategy to Convert Real Estate Leads into Close deals\n\nSEO is a powerful tool for generating high-quality real estate leads. By understanding the importance of local search, implementing effective lead conversion strategies, and leveraging the power of a robust CRM, you can transform your brokerage’s online presence into a lead generation machine.\n\nThroughout this guide, we’ve explored the key components of a successful SEO lead conversion strategy, from the initial response to closing the deal and beyond.\n\nBy focusing on providing value, building trust, and nurturing relationships over time, you can differentiate yourself from the competition and attract a steady stream of loyal clients.\n\nAt Direction.com, we’re passionate about helping real estate professionals unlock the full potential of their online presence.\n\nOur team of SEO experts understands the unique challenges and opportunities facing brokerages in today’s market, and we’re committed to delivering customized solutions that drive results.\n\nContact us for a free SEO consultation and online presence analysis. Our experienced team will review your current strategies, identify areas for improvement, and provide actionable", "num_tokens": 2048} {"category": "common_crawl-finance_and_business", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-finance_and_business/part-00-00000.npy", "text": " more questions to understand what he was seeing, sensing and hearing from others on his team. In this post, I will be sharing my reflections sparked by this conversation and take you deeper into our approach to culture transformation.\n\nWhat is culture?\n\n • Culture is a set of learned beliefs, values and behaviors that have become the way of life in an organization.\n • It results from the messages that are received about what is really valued around here.\n • Most of these messages are nonverbal.\n • People pick up on these messages and adapt their behavior to fit in.\n\nYour workplace culture is either an enabler or detractor of success, fulfillment and well-being. Leaders set the tone, showing what is valued in an organization through behaviors, symbols and systems. Most simply, people are watching those who are successful and have status in a group and then ask themselves, “What do I need to do to fit in and succeed in this environment?”\n\nYour workplace culture is either an enabler or detractor of success, fulfillment and well-being.\n\nThree warning signs your workplace might need a detox\n\n1. People don’t feel sufficiently safe to take risks and are on the defensive.\n\nWhen people don’t feel safe, their energy is spent trying to protect themselves, which leads to avoiding risks, less creativity and innovation — and most damagingly, distrust in their relationships. What are some common threats to feeling safe in the workplace that would cause you or others to go on the defensive?\n\nBehaviors such as put-downs, sarcasm, negative tone of voice or body language, bullying, inconsistency, rigidity, exclusion, favoritism, controlling, lying, blaming, shaming and manipulation are some examples. At various times, we have all probably been the recipient and the deliverer of some of these threatening behaviors, even if it was unintentional.\n\nDefensive patterns happen unconsciously. When we are overwhelmed and stressed or feeling threatened, the higher-order “executive functions” of our brains shut down. Critical decision making reverts to the more primitive and reactive brain centers, which increases our tendency to fight, flight or freeze. If the record of experiences stored in the hippocampus tells the amygdala that it is a fight, flight or freeze situation, then the amygdala hijacks the rational brain, which can lead a person to react irrationally and destructively.\n\nUnfortunately, these types of behaviors happen all too frequently in the workplace and contribute to creating toxic relationships and conversations. Taking ownership for how you could be contributing to the problem either through action, inaction or tolerance is the first step. Being open to assessing your own thinking and behavior patterns and comparing them with how you are perceived by others can help you to identify Passive/ and Aggressive/Defensive styles that sabotage your effectiveness, as well as Constructive styles that are more effective. These can also be assessed at a team or enterprise level to identify specific change levers for culture transformation.\n\n2. People don’t have clear plans or goals and are working in silos.\n\nIf there is misalignment at the highest level in the organization regarding strategy and business priorities, this cascades down to the rest of the organization. I have seen executive leaders and managers, depending on defensive styles, begin working aggressively toward competing goals and commitments, positioning and posturing themselves in their silos or passively “going along to get along” to avoid conflict. Even with the best of intentions, people often repeat ineffective defensive patterns out of habit during change.\n\nIn the face of uncertainty and lacking information, people make assumptions about what is happening and why. These stories often fuel feelings of fear, unhappiness and frustration, leading to disempowerment and resignation. People are less productive, they disengage, and both execution and collaboration suffer.\n\nHow can you best respond to this challenge? Working with your leaders to understand the business priorities and establishing clear goals, plans and expectations in alignment with the strategy reestablishes focus and purpose for team members. The majority of people want to do their best and will take initiative and propose solutions when there are clearly defined objectives, plans to achieve them and structures for mutual accountability.\n\n3. Managers don’t know what is important to people on their team.\n\nThink about the worst manager you have worked with during your career and their characteristics. Typically, when I ask people to reflect on this, they say things like, “they don’t know me,” “they don’t care,” “they don’t have time to meet,” “they don’t listen to me,” “they know it all,” and “they seem most concerned with their own accomplishments and success.”\n\nHuman beings want to be seen and valued for their contributions. Linking people’s work to something that is meaningful to them is the strongest foundation you can build for engagement. Connection to personal values provides a sense of purpose and a compass to orient individuals when times get tough. Values are the point of greatest leverage for people because they remind them who they want to be and what is important to them when things aren’t going the way they hoped.\n\nHuman beings want to be seen and valued for their contributions. Linking people’s work to something that is meaningful to them is the strongest foundation you can build for engagement.\n\nCreating a culture that promotes listening to what matters to people will help your organization to better care for them, validate and appreciate their strengths, and offer them opportunities to continue to stretch, learn and grow. When people sense you care about them and want the best for them, they feel safe and respected, and they will usually bring the best of themselves to the challenge.\n\nHow to Begin a Detox\n\nThe purpose of a detox is to cleanse or reset the system. Here are some tips to get you started.\n\nRaise your awareness: A detox begins by acknowledging what isn’t working and creating a desire for transformation. This is an invitation to look within yourself and your organization more deeply to diagnose and surface what’s happening with both qualitative and quantitative data. This will help you to understand the current culture challenges and opportunities, as well as the “from – to” mindset shift needed to enable sustainable behavioral change and the key levers for organizational transformation.\n\nAlignment: Partner with key stakeholders to build the business case for change, identifying a clear connection to how a toxic culture undermines execution of business strategy. Design a customized culture transformation plan, integrating values-based mindsets, behaviors, systems and symbols needed to execute in alignment with your business priorities.\n\nAction and accountability: Support leaders and teams in embedding desired mindsets and behaviors into the day-to-day rhythm of the business with coaching, pulse checks and metrics to measure impact.\n\nCulture transformation can take years. However, one positive change or choice typically leads to other positive changes and choices. How you choose to respond can influence and impact those you work with in significant ways over time.\n\nIf your culture feels toxic—or even just a bit unhealthy—take the time to assess it and get data to help you identify the best culture to meet your goals. Doing so will set you on the path to shaping a culture that drives performance, supports team members, and fosters collaboration, innovation, and personal growth.\n\nAdapted and reprinted with permission from Axialent.com.\n\nAbout the Author<|endoftext|>Connect with us\n\nHi, what are you looking for?\n\nCustomer Connections: The Latest Strategies for Small Business Engagement\n\nAs a small business owner, building strong connections with your customers is crucial to the success of your venture. In today’s digital age, there are countless ways to engage with your audience and create meaningful relationships that go beyond transactions. In this blog post, we will explore some of the latest strategies for small business engagement that can help you foster customer loyalty and drive growth.\n\n1. Personalize Your Communication\n\nCustomers appreciate when businesses take the time to understand their needs and preferences. Personalizing your communication is a powerful way to show your customers that you value them as individuals. Use their names in emails, tailor your offers to their interests, and provide relevant content that resonates with their unique needs. By doing so, you can enhance the customer experience and build stronger connections.\n\n2. Leverage Social Media\n\nSocial media platforms offer a wealth of opportunities for small businesses to engage with their customers. Create a strong presence on platforms that are popular among your target audience and use them as a tool for communication, branding, and customer support. Regularly share valuable content, respond to comments and messages promptly, and encourage user-generated content to foster a sense of community.\n\n3. Implement Live Chat Support\n\nProviding real-time support is essential for enhancing customer satisfaction. Implementing a live chat support feature on your website allows customers to reach out to you instantly with any questions or concerns. This not only improves the customer experience but also helps you build trust and credibility. Be sure to have knowledgeable staff available to respond promptly and provide helpful solutions.\n\n4. Offer Loyalty Programs\n\nLoyalty programs are a great way to reward your customers for their continued support and encourage repeat business. Consider offering exclusive discounts, freebies, or special perks to loyal customers. This not only incentivizes them to choose your business over competitors but also makes them feel valued and appreciated. Loyalty programs can also help you gather valuable customer data and insights for future marketing efforts.\n\n5. Engage in Email Marketing\n\nEmail marketing remains one of the most effective ways to engage with your customers directly. Build an email list of interested customers and send regular newsletters or updates that provide value. Personalize your emails, segment your audience based on their preferences, and use compelling subject lines to increase open rates. Be sure to include a clear call to action that encourages customers to interact with your business.\n\n6. Host Virtual Events\n\nIn the era of remote work and social distancing, virtual events have become increasingly popular. Hosting webinars, workshops, or online Q&A sessions allows you to connect with your customers in a more intimate and interactive way. Use these events to share valuable insights, answer questions, and showcase your expertise. Virtual events can help you build credibility, establish thought leadership, and foster a sense of community among your customers.\n\n7. Collect and Act on Customer Feedback\n\n", "num_tokens": 2048} {"category": "common_crawl-finance_and_business", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-finance_and_business/part-00-00000.npy", "text": " pages that collect emails.\n\nWhen your customer support or sales team interacts with your customers, the link will directly be sent to them automatically\n\nUse social media\n\nAs mentioned above, having incentives or contest is a great way to create excitement and action to grow your email list. You can use social media and social media advertsing to get visitors from social media platforms like Facebook, Instagram and LinkedIn (depending who your target market is).\n\nHave engaging captions, high-quality images or videos, and instructions on how they can sign up. Be sure your landing page is optimized for the highest number of conversions.\n\nGuest Blogging\n\nGuest blogging is a great way to get in front of new customers. Most guest blogs will allow you to place your website links on their website to attract new customers. Not only does it allow you to gain new customers, it also helps with your SEO (search engine optimization) as it improves your backlinks.\n\nYou want to create engaging content that shows your expertise in that industry. Also, consider targeting highly searched keywords and optimizing the content for search engines.\n\nWhen reaching out to other websites, try and find websites that are in your industry or have a similar target market. Searching “write for us” on google is a great way to find these kinds of opportunities\n\nGather Emails from events\n\nIf you hold online events (and hopefully in-person events when COVID is done), you can take this opportunity to collect emails! Since your customers are already interested in your events, there’s a good chance they’ll be interested in your product or service.\n\nWhether this is a free or paid event, they’re still taking time out of their day to attend your event. If it’s online, have a simple landing page to collect emails and send them the link. If it’s in-person, a signup sheet will work just fine! You’ll just need to put the emails in manually.\n\nGather emails in your storefront\n\nIf you have a storefront where your customers can purchase your products or services, use this time to collect emails!\n\nYou should only ask for their email if they purchase something, this way you can tell if they’re part of your target market. You can ask if they want to create a profile to collect points or some sort of incentive.\n\nYour Point of sale system should be able to do this. If not, a signup sheet will work just fine, (just have to manually place them).\n\nCreate a QR code\n\nFor your landing page, create a QR code so your customers can easily scan the code with their mobile phone and be directed straight to the page.\n\nYou can place the code on posters, business cards, brochures, menus or on any of your print advertising materials. Be sure to test the code that it works properly before distributing them.\n\nGrow your email list today!\n\nNow that you know how to grow your email list. Take action today!\n\nBoth small and large businesses can benefit from an email list. It allows you to directly market your products or services to your target audience. This is a great way to generate both new and repeating customers!\n\nIn order for your email marketing campaign to be successful, you’ll need an effective email marketing software that’ll allow you to manage and send emails to your customers.\n\nWe think you’ll enjoy Moment, not only will it allow you to send emails, but it also has live chat, session recording replays, and is a full CRM software. The great thing about Moment is you can register for free and get all of these features right away!\n\nHow will you grow your email list?<|endoftext|>Objective At-Sunrice GlobalChef Academy, an EduTrust-certified institute that advances the culinary arts and F&B professionals, holds an annual Open House to reach out to graduating ‘N’ and ‘O’ Level students. To help potential students with their decision to sign up for a diploma programme, we created a closed-loop integrated campaign that brings them on a journey of discovery and helps them understand what it takes to become a global chef. A need to automate the creation of personalised and relevant digital content to guide potential students through the awareness, engagement and conversion phases was the driving factor for a new digital marketing solution. The goal? To better align the recruitment and marketing efforts by driving higher qualified leads to sales and shorten the time taken for an applicant to enrol.\nWith the help of marketing automation, we created a comprehensive series of digital content to raise awareness and reach out to our potential culinary, pastry and F&B service students. We created ads and content on social media, driving to our Open House landing page. After registration, a series of EDMs were sent to further engage and educate our potential students. At the event, we created a check-in page to facilitate registration as well as track the turnout rate.\nThroughout the event, we were able to monitor the performance of the campaign and content, and analyse the digital performance of the Open House, including turnout and sign-up rates. The database collected was then fed into At-Sunrice’s Salesforce CRM system for further lead nurturing communication.<|endoftext|>Kralovopolska Total Quality Management (TQM)\n\nAfter the revolution, Kralovopolska’s management team sought to ensure that quality assurance was integrated in all processes of manufacturing and company management. With this goal, the company forged forward to achieve ISO 9000 certification and other relevant certifications by the end of 1994 (cited in Newman & Nollen 117). Quality can be divided into two main categories; product quality and process quality … thus the goal of process quality is to produce error-free products through total quality management (Siegel & Shim, 1999).\nAs the technical director, Vladimir Relich said, “Our products were always high quality, but they did not meet West European standards. Now we have certificates of quality according to West European standards. Our products are higher in quality than Italian products. ” Quality and customer satisfaction may not be disintegrated or separated. When a product is of high quality, it’s bound to create a market niche and give the customer the satisfaction that would produce brand loyalty. This would be Kralovopolska goal in the current markets and mission for any new markets to be explored. Financial stability\nIn 1991, the Czech government allowed the market to set prices in the equipment industry that Kralovopolska operated. This opened a wide gap for inflation which soared up to about 58 percent. Short-term financing was scarce, nominal interest rates were 14-15 percent between 1991 and 1993. Matters did not get better since in 1991, the government devalued the currency. However, the company would be able to survive these financial challenges by its good history of loan interest repayments. Financial stability is not only a goal for any business but a critical and aspect of any company’s survival.\n\nWhen other companies’ finances were dwindling, Kralovopolska was no exception. However, because of a good history with its previous credits, the company was more fortunate than other companies as it was able to obtain short-term credit and long-term financing by the government. Plans to go onto a joint venture with a technologically advanced company seem more viable now more than ever. The company’s technological abilities have to be advanced either by joint venture or purchase of high tech systems and machinery.\nThis then translates to the need already noted need for financial resources to enable the company acquire the required technological resources. Management’s flexibility By studying the Kralovopolska case, one is readily made aware of the style of employment and promotion that was used. Political affiliation was not applied but rather merit. The ability to change the management when required to bring on board the right skilled person for the right position would see the company progress successfully through phases of economical, political and social changes.\nCompetitive organizational structure Similar to most local firms, Kralovopolska’s organizational structure was based on function till 1991. However, for the company to successfully compete with the changing trends in the market and industry both locally and internationally, it needed to adopt a different structure – probably an operational structure that would ensure that the company’s operational units were sufficiently managed. In order to achieve this, the company’s top management restructured departments to ensure they adequately served the growth needs of the company.\nPanek, Kralovopolska general director, was a trained economist and with his skills he would help transform the company’s finances and ensure strategies adapted were consistent to the company’s profitability goals. The rest of the team was mostly composed of engineers with professional lifelong experience in the company. This would work to the company’s advantage since the team would carry on the original dream and goal the company has all through the years.\nContinuity of the company’s business would largely depend on this and looking into the future the same team would be best suited to note what the company lacked and what would need to be done to ensure the company achieved a market leadership position in the industry. Research and high technology capability Research and development (R & D) was previously done as an integral central component under CHEPOS, the holding company. With time, Kralovopolska moved onto be independent in R & D.\nThrough an internal research and development group, alliances with universities and technical colleges, the company was able to work on their own research and development. Through commercial agreements with companies outside the Czech government, Kralovopolska, sought to make long-term purchases of high-technology components to enable it make, sell and deliver new products. “Location of the machines and equipment within the operation will determine the pattern of its flow, but the nature of its technology will determine its capacity”, states Pycraft (2000).\nThis is a fact that the Kralovopolska top management noted seriously and sought to ensure the company’s technological needs were sufficiently catered for as the team sought to be a part of a joint venture initiated by the Realization of Investment Activities (RIA) with a French firm. Though this joint", "num_tokens": 2048} {"category": "common_crawl-finance_and_business", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-finance_and_business/part-00-00000.npy", "text": " \n\nHere’s a quick little breakdown of the top social platforms, their (very) general demographics, and use cases:\n\nThe platform of authenticity — TikTok is the platform of choice for Generation Zed (and Millenials too).\n\nWith a focus on celebrating the individual in a very “come as you are” way, the platform thrives off of not only being yourself but being a part of a global community. With an algorithm that is finely tuned to virality, with metrics focused more on views and likes than followers in many cases, trending sounds give opportunities for individuals to be a part of a larger conversation while experimenting with their contributions in order to craft them to cater directly to their audiences.\n\nThough the platform has been around since 2016, it is still very much figuring out its identity, and many new entrants are finding ways to carve their own niches into the platform — with dedicated communities like #cryptok finding a way to leverage the platform as a means of educating their audiences rather than simply following trends and sounds. \n\nDue to the iterative nature of the platform, TikTok provides an incredible space for experimentation and learning as communities form around projects. During the course of 24 hours, a post can go viral and accumulate millions of likes and views to provide valuable insights and impressions within the community which you can then leverage across other channels and create optimizations for in your strategy. \n\nAs with all channels, messaging must be carefully crafted to cater specifically to the culture that is TikTok to ensure that trust isn’t broken with the audiences there. Creating content that is too product-driven, or feels too much like a traditional ad, can be counterproductive and cause audiences to lose faith.\n\nThis isn’t to say that promoting products is completely off-limits. Product-driven content on TikTok should be more demonstrative in showing the benefits of the product itself rather than simply informing the community about what the product is — showing how something works, or what the results are will get you much farther than simply telling the community what it does. And as an extension of this, educational content is equally as welcome as audiences will feel more comfortable supporting a product or service if they feel as though they have a fundamental understanding of not only the product, but how it’s made, and whether or not the messaging is authentic. \n\nThe short-form text platform, in recent history, has been starting to go long-form — with Twitter threads turning the epicenter for internet-hot-takes into a destination for comprehensive overviews, how-tos, and case studies. Gone are the days of the platform serving simply as a means to make snarky comments to celebrities, and here has arrived the new era of Twitter as a hub for information.\n\nAside from flexing your brain muscles in order to share expert insights into the field or product you’re looking to break into, Twitter conversations are a fantastic means of developing an audience and creating organic community.\n\nNothing particularly revolutionary about the practices in place here, aside from the urgency which exists for certain conversations to be had. As we’ve recently witnessed with Elon Musk setting Twitter ablaze, many leveraged the conversations happening in real-time to chime in, share their perspective, and engage in conversations happening throughout relevant communities to help magnify their perspective and encourage others to join their own communities.\n\nA well-placed response to a Twitter thread can significantly boost interactions and reach for your brand, establish thought leadership, or simply align your brand with a certain perspective within the community you’re seeking to build upon. \n\nSocial listening tools such as Sprout, Feedly, or RSS, can be immensely helpful in tracking conversations in real-time, gauging community sentiment towards certain topics, and recognizing trends to capitalize on as they develop. Success on Twitter is very much time-sensitive in the early stages of your community development, so dedicating time to ensure you’re monitoring the right hashtags and accounts, and being where the conversations are happening, when they’re happening, will be the greatest key to your success.\n\nThe OG visual sharing platform, Instagram is still the premier destination for users aged 25-34, which is still seeing steady growth year over year despite its super-lean team of under 500 people. \n\nWith a recent return to the chronological scroll that made the platform a household staple back in 2010, Instagram offers a great opportunity for discovery for those willing to do a bit of hashtag research and manual outreach and engagement as a part of their organic marketing strategy. \n\nThe platform has also been nipping at the heels of TikTok with the introduction of Reels in August of 2020 — more or less copying the homework of the seemingly unstoppable juggernaut that has taken the Gen Z demographic by storm.\n\nDespite attempts to compete with TikTok, Instagram has retained its legacy of being a platform for pretty things and finds its own authenticity in maintaining its reign as the only place for sharing things “Instagram worthy” (read: really pretty) — with TikTok users preferring a more authentic approach to content (more on this later).\n\nThis makes Instagram a natural choice for any aesthetic-driven brand, particularly in graphic design, branding, interior design, and beauty spaces — through brands in the fintech and crypto space are actively finding success in making learning about their products a visual experience. \n\nAlso worth noting is that, while chronological scrolling has made a return, this is likely due in part to the fact that the Instagram algorithm (or digital deities as we like to call them) heavily favors those users sharing Reels and Stories — so your organic marketing strategy may be somewhat limited depending upon your audience and how they interact with the space if you were only posting still images.  There is also heavy encouragement for brands to leverage paid media for their channels, and while there’s no quantifiable evidence, it is widely accepted that business accounts have their engagement throttled by the digital Instagram deities as a means for the Meta parented platform to encourage brands to spend their ad dollars for growth.\n\nAs a general best practice, it’s recommended to begin building your brand presence without the additional features provided for business accounts if at all possible during the early stages of your business. The algorithm will initially boost your performance as a non-business account to encourage further interactions on the platform, rather than throttling it to encourage ad spending. You can then make the move to a business account once an audience is established and actively engaged to the point where it’s worth leveraging having a shoppable account and access to the other features for businesses that Instagram offers. \n\nA tried and trusted flow for audience development has been to launch an Instagram organic marketing strategy 3-6 months prior to the launch of your business to gauge community interest, perform organic outreach and engagement, and tease out your product to the public pre-launch. This not only capitalizes on the early stages of boosted traffic from the algorithm for the new account but does so without sacrificing potential sales during the period before product is available. \n\nMessaging during this period can be geared towards education on your particular product or vertical, while also presenting organic community driven content to receive actionable feedback from the community as product is being finalized and packaged for ship. \n\nWith a demographic that is 77% aged 30-49, Facebook is actually more popular among millennials than any individual millennial would ever admit to. While that is just a single data point to consider, it still tells us a lot about the type of audience that we could potentially reach there. \n\nWhile Facebook pages may not be too heavily utilized as a means of building community — Groups have become the latest craze in the community building architecture on the platform. \n\nInto cycling? There’s a group for that. Baking? There’s a group for that. Crochet? There’s a group for  that. Crypto? There’s probably at least a million groups for that at this point. \n\nThe beauty of Facebook groups is that they provide a qualified segment for organic interactions. When building organic content strategies, the biggest obstacle is testing hypotheses, measuring data, and then adjusting your deployment accordingly in order to reach your preferred audience — while these groups have already verified that these individuals are actively engaged in whatever segment it is that you’re aiming to break into. \n\nReddit, or ‘The Front Page of the Internet’ as they’ll call themselves, is a website dedicated to messaging boards for any topic you could possibly imagine, and even those you couldn’t. The site thrives off of community-driven content, and so is a wonderful place to interact with those dedicated to your cause, similar to the previously mentioned Facebook groups, or even building your own community around your product. \n\nPrimarily composed of users aged 19-29, the website skews to a younger male audience, though this isn’t to say that there’s no opportunity outside of this demographic. The site boasts 52M daily active users, with 130K active communities that are comprised of 2.8M subreddits — there’s literally a subreddit for everything. \n\nFrom meme subs like /r/superbowl, which is dedicated to images of owls rather than the pinnacle of American sports events, to /r/eyebleach, a sub specifically for sharing photos of cute animals to cleanse your ocular palette whenever you’ve had a bit too much internet for one day, if a sub for your particular audience doesn’t exist, you can build one yourself. \n\nBrands can leverage a dedicated subreddit to engage with their communities and audiences in a meaningful and impactful way, as users on the site will often search to see if a subreddit exists for a particular brand or product as part of their own discovery journey. This is a great opportunity to funnel an audience into a dedicated space where you can then share insights, learnings, wins, and other brand-driven metrics directly with your pre-qualified community. \n\nSimilarly, Reddit as a channel for customer service is a proven approach to leveraging the platform to build community and plus-up customers into advocates. Verizon,", "num_tokens": 2048} {"category": "common_crawl-finance_and_business", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-finance_and_business/part-00-00000.npy", "text": " integration for companies already using other HR software application.\n2. CloudPay\nCloudPay is an international payroll option focused on supplying smooth payroll processing and compliance throughout 130+ nations. It is especially strong in delivering cloud-based options that incorporate payroll, HR, and finance.\n\nback and in today’s video I’m gon na be speaking about Gusto a popular payroll software that provides services with a range of payroll services and solutions it helps organizations enhance their payroll procedures and conserve them time and money so without more Ado let’s begin likewise if you have an interest in Gusto you’ll discover a link in the description down below and if I do discover any discount rates I’ll ensure to include them in the description also now Gusto offers a range of functions that can assist businesses improve their payroll processes among the crucial functions is it’s easy to use user interface which makes it easy for employers to manage staff member payroll and advantages the software application likewise uses automatic payroll processing which assists to minimize the danger of errors and save time in addition Gusto provides a variety of tax services including tax estimations filing and Reporting likewise it uses Staff member Self-Service feed features enabling workers to access their pay stubs and other payroll information from anywhere at any given time Gusto likewise uses a series of HR services including employee onboarding time off management and compliance this implies that businesses can handle their HR\n\nSecret Features:\n\nPayroll processing in 130+ nations.\nUnified platform for payroll, HR, and financing.\nReal-time data analytics and compliance tools.\nIntegration with leading ERP and HR systems.\n\nStrong concentrate on combination with financial systems.\nReal-time compliance updates.\nComprehensive information and analytics tools.\n\nA steeper learning curve is needed to master the advanced functions. The expense is reasonably high, making it less available to smaller sized organizations. 3. Paylocity\nPaylocity is a US-focused payroll and HR platform with some worldwide capabilities, offering effective tools compliance.\n\nKey Functions:\n\nPayroll processing and tax filing.\n\nCompliance assistance for US and some global markets.\nAdvanced reporting and analytics.\n\nStrong suite of worker engagement tools.\nComprehensive payroll and HR abilities.\nGreat for small to medium-sized services.\n\nRestricted international reach compared to Papaya Global.\nDoes not have substantial international compliance assistance.\n4. Paychex\nPaychex uses payroll, HR, and advantages services, catering primarily to small and medium-sized organizations in the US, with some worldwide abilities.\n\nSecret Functions:\n\nPayroll processing and tax services.\nHR management and advantages administration.\nTime tracking and worker scheduling.\nCompliance assistance for US companies.\n\nPros of Gusto payroll software include its comprehensive services for small businesses, integrated HR and and first-class consumer assistance. It likewise insurance coverage and retirement plans to assist services attract and retain gifted workers. In general, Gusto is an user-friendly payroll option with automated processing and tax services, making it an excellent choice for companies seeking to simplify their payroll procedures. Its series of HR services and dedicated client support make it an important partner for companies aiming to attract and keep leading skill. If requirement of a trustworthy payroll solution, Gusto is an excellent alternative.\n\nRestricted worldwide assistance.\nNot as feature-rich for global payroll as Papaya.\n5. Neeyamo\nNeeyamo concentrates on international payroll, HR outsourcing, and compliance, supporting business in over 150 countries. It uses extensive payroll and compliance management services, making it ideal for large enterprises.\n\nKey Features:\n\nPayroll and HR outsourcing in 150+ countries.\nMulti-country payroll solutions.\nCompliance and threat management.\nAdjustable reporting and analytics.\n\nComprehensive nation coverage.\nStrong compliance and danger management tools.\nScalable for large business.\n\nComplex platform may need dedicated assistance.\nRates structure can be complicated for smaller sized organizations.\n6. Mercans\nMercans supplies international payroll and HR services in over 160 countries. Its platform uses payroll processing, compliance management, and HR outsourcing, concentrating on automation and integration.\n\nMain Benefits and Highlights\n\nPayroll services in 160+ countries.\nAutomated payroll and compliance management.\nHR and skill management options.\nReal-time reporting and analytics.\n\nWide geographical coverage.\nAutomated compliance management.\nCompetitive prices for detailed services.\n\nInterface can be less user-friendly.\nLimited consumer support for smaller sized clients.\n7. TMF Group\nTMF Group concentrates on multi-country payroll, accounting, and HR services, offering compliance and regulatory assistance for services running in complicated international environments.\n\nKey Features:\n\nPayroll and HR services in 100+ nations.\nCompliance and tax services.\nBusiness secretarial and accounting support.\nIntegrated payroll and HR platform.\n\nStrong focus on compliance and regulatory support.\nIdeal for services in extremely controlled markets.\nExtensive global experience.\n\nGreater prices compared to some competitors.\nComplex procedures can be challenging for brand-new users.\n8. iiPay\niiPay focuses specifically on worldwide payroll services, providing a merged platform for payroll processing throughout multiple countries with real-time reporting and compliance support.\n\nSecret Functions:\n\nGuarantee your global team earns money quickly with the best internal worldwide payroll for direct workers, EOR, and specialists. It’s the seamless experience you and your group should have in one location with 24/7 support.\n\nPayroll services in over 150 countries.\nSingle platform for multi-country payroll.\nReal-time reporting and compliance updates.\nAPI integrations with HR and financing systems.\n\nStrong concentrate on multi-country payroll.\nComprehensive reporting and compliance tools.\nScalable for growing services.\n\nMinimal HR functionalities beyond payroll.\nCan be cost-prohibitive for smaller sized companies.\n9. Immedis\nImmedis provides worldwide payroll and tax services, with a focus on compliance and real-time reporting. Its platform incorporates payroll, HR, and finance systems, supporting business in over 150 nations.\n\nSecret Features:\n\nPayroll services in 150+ countries.\nCompliance and tax management.\nReal-time analytics and reporting.\nCombination with leading HR and finance systems.\n\nStrong compliance and tax know-how.\nReal-time analytics and data visualization.\nIdeal for complex payroll needs.\n\njurisdictions this makes it an important service for business that are scaling their remote teams or running throughout borders enabling them to concentrate on development without worrying about compliance concerns oyster HR streamlines the procedure by supplying knowledge on local policies and guaranteeing that services can work with leading talent from anywhere in the world while staying certified another benefit of oyster HR is its employee Centric approach the platform makes onboarding seamless by offering localized employment contracts benefits and payroll customized to each nation’s particular requirements additionally oyster HR supports both full-time employees and specialists giving companies the flexibility to work with the right tax camping tent regardless of work type the platform’s userfriendly interface makes it easy for HR groups and supervisors to manage remote teams track employee efficiency and gain access to payroll and tax files in a single dashboard this level of Automation and central management helps in reducing the administrative concern on HR departments nevertheless oyster HR does feature some challenges among the primary issues is the complexity of implementing the platform especially for companies with distinct HR requirements or complex Worldwide operations while oyster HR simplifies lots of elements of international hiring companies with specific compliance requirements or highly customized workflows might discover the platform’s flexibility limited additionally the expense of using oyster HR can be an issue particularly for smaller sized businesses or start-ups with tight\n\nRestricted HR functionalities compared to Papaya Global.\nPricing can be greater for smaller sized organizations.\n10. Paycor\nPaycor provides payroll and HR services mostly for the US market, with some worldwide abilities. It offers an easy to use platform for payroll, tax, and compliance management.\n\nSecret Features: Globalization Partners Uk\n\nPayroll processing and tax filing.\nHR and advantages administration.\nTime tracking and scheduling.\nCompliance support for US and some worldwide areas.\n\nEasy to use with strong consumer support.\nComprehensive HR and payroll features.\nAppropriate for small to medium-sized companies.\n\nLimited global reach and compliance support.\nDoes not have substantial international payroll capabilities.\n11. NGA Human Resources (Alight Solutions).\nNGA Human Resources, now part of Alight Solutions, offers international payroll and HR outsourcing services. It is known for offering multi-country payroll and labor force administration services.\n\nKey Functions:.\n\nMulti-country payroll services.\nHR outsourcing and workforce administration.\nCompliance and danger management.\nCombination with significant HR and ERP systems.\n\nWe’re making international team management so easy, businesses don’t need to hesitate. We take the difficulty out of payroll and compliance in 100+ countries, so you can focus on the important stuff. Unequaled protection. Dedicated support. No covert fees.\n\nRemote.com is generally popular by users, earning a 4.5 out of 5 score on G2 and 4.2 out of 5 on Trustpilot. Customers appreciate its user-friendly user interface, substantial remote work functions, and exceptional client assistance. Lots of users highlight how Remote.com has actually helped them enhance cooperation, productivity, and overall remote work experience. However, some customers point out occasional technical glitches and an absence of particular sophisticated functions. Nonetheless, Remote.com is commonly applauded for its thorough service for managing remote teams effectively.<|endoftext|>Why a carbon tax won't cause a recession - Macleans.ca\n\nWhy a carbon tax won’t cause a recession\n\nOpinion: Doug Ford insists the federal price on carbon is a Liberal tax grab that will inflict serious economic hardship. But none of that is true.\n\nOntario Premier Doug Ford speaks at the Economic Club of Canada in Toronto on Monday, January 21, 2019. THE CANADIAN PRESS/Nathan Denette\n\nMark Cameron is Executive Director and Michael Bernstein is Senior Vice-President of Canadians for Clean Prosperity.\n\nOntario Premier Doug Ford chose a luncheon at the Economic Club of Canada to make one of his most economically uninformed statements ever, suggesting that a modest, fully refunded carbon price could somehow lead to a recession.\n\nIn fact, economists are almost unanimous that a revenue neutral carbon tax is the lowest cost, most market friendly approach to dealing with climate change. British Columbia, which has had a carbon tax for", "num_tokens": 2048} {"category": "common_crawl-finance_and_business", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-finance_and_business/part-00-00000.npy", "text": " $1000.00\nMaximum Loan Amount The maximum amount that you can borrow with a loan $5000.00\nMax APR Maximum interest charged for borrowing that shows the yearly cost of the loan as percentage 225.00%\nCollateral The need to provide any kind of collateral to apply for a loan None, unsecured\nTerms The term for which the loan is issued Min loan term: 90.00 day(s)\nMax loan term: 1095.00 day(s)\nTurnaround Time The time it takes for the loan to reach your account 1 business day\n\nApplication Process of Installment Loans in Mississippi\n\nTo apply for an installment loan in Mississippi, borrowers typically start by filling out a pre-qualification form online. This form usually requires basic personal information, such as name, address, phone number, and social security number. Once the borrower has been pre-qualified, they can complete a full application that typically asks for more detailed financial information, such as employment status, income, and expenses.\n\nBorrowers may also need to provide documentation to support their application, such as recent pay stubs or bank statements. Lenders will use this information to determine the borrower’s ability to repay the loan and to set the loan terms.\n\nAfter reviewing the application and supporting documents, the lender will either approve or deny the loan. If approved, the borrower will be presented with a loan offer that outlines the loan amount, interest rate, and repayment terms. If the borrower accepts the offer, they will need to sign a loan agreement and provide their bank account information for the loan funds to be deposited.\n\nOnce the loan is funded, the borrower will begin making regular payments over the loan term until the loan is fully repaid. It’s important for borrowers to carefully review the loan terms and to make timely payments to avoid late fees and damage to their credit score.\n\nEligibility Requirements for Installment Loans in Mississippi\n\nTo become eligible for an installment loan in Mississippi, there are certain criteria that borrowers need to fulfill. These eligibility requirements may vary from lender to lender, but some common requirements include:\n\n • Age: You must be at least 18 years old to apply for an installment loan in Mississippi.\n • Income: You must have a regular source of income, such as a job or self-employment income, to demonstrate that you can afford the loan payments.\n • Credit history: While bad credit is not necessarily a barrier to getting an installment loan in Mississippi, lenders may still consider your credit history when deciding whether to approve your application.\n • Residency: You must be a resident of Mississippi to be eligible for an installment loan in the state.\n • Bank account: You will need to have a valid bank account in your name to receive the loan funds.\n\nWhile meeting these requirements does not ensure loan approval, it can raise your odds of getting a Mississippi installment loan. Before submitting an application for a loan, it is crucial to inquire with the lender about any particular eligibility requirements.\n\nOther Ways to Improve My Chances of Being Approved\n\nIn addition to meeting the basic eligibility requirements for an installment loan in Mississippi, there are several other ways to improve your chances of being approved:\n\n • Improve your credit score: If you have poor credit, consider taking steps to improve your credit score before applying for a loan. This can include paying down debt, making timely payments on bills and credit cards, and disputing any errors on your credit report.\n • Provide accurate and complete information: Be sure to fill out your loan application accurately and completely, providing all required documentation and information. This can help speed up the application process and improve your chances of approval.\n • Consider a co-signer: If you have a friend or family member with good credit, consider asking them to co-sign on your loan. This can help strengthen your application and increase your chances of approval.\n • Shop around: Compare rates and terms from multiple lenders to find the best deal. Be sure to read the fine print and understand all fees and charges associated with the loan before accepting an offer.\n • Borrow only what you need: While it may be tempting to borrow more than you need, only borrow what is necessary to avoid overextending yourself financially. This can also improve your chances of approval, as lenders may be more willing to lend to borrowers with reasonable loan amounts.\n\nDocuments Required for Installment Loans in Mississippi\n\nTo apply for an installment loan in Mississippi, borrowers will typically need to provide the following documents:\n\n • Valid government-issued ID: A driver’s license, passport, or other government-issued ID can be used to verify the borrower’s identity.\n • Proof of income: This can include pay stubs, bank statements, or tax documents that show the borrower’s income and employment status.\n • Bank account information: Borrowers will need to provide their bank account details, including the routing number and account number, so the lender can deposit the loan funds and set up automatic payments.\n • Proof of residency: This can be established by providing a utility bill or lease agreement that shows the borrower’s name and address.\n • References: Some lenders may require references that can vouch for the borrower’s character and financial stability.\n\nIt’s crucial to note that based on the lender and the borrower’s unique circumstances, different documents might be needed. To find out precisely what paperwork is required to file for an installment loan in Mississippi, borrowers should consult the lender.\n\nBenefits of Installment Loans in Mississippi\n\nInstallment loans in Mississippi offer several benefits, including:\n\n • Quick access to funds: Many lenders offer quick turnaround times, with funds often available within one business day.\n • Predictable monthly payments: With a set payment schedule and term length, borrowers can budget and plan accordingly.\n • Flexibility: Installment loans offer more flexibility compared to other types of loans, allowing borrowers to choose the loan term and amount that works best for their financial situation.\n • No collateral required: Most installment loans in Mississippi are unsecured, meaning borrowers do not need to provide collateral such as a car or house to secure the loan.\n • Credit building opportunities: Timely payments on installment loans can help improve a borrower’s credit score, which can lead to better rates and terms on future loans and credit applications.\n\nHow to Repay an Installment Loan in Mississippi?\n\nTo repay an installment loan in Mississippi, you must make regular payments on the agreed-upon schedule. Each payment will be for a fixed amount, which includes both the principal amount borrowed and the interest accrued. The loan agreement will outline the payment schedule, and it’s essential to make payments on time to avoid late fees and damage to your credit score.\n\nThere are several ways to make payments on an installment loan in Mississippi. Many lenders offer online payment options, which can be convenient and easy to use. You can typically set up automatic payments to ensure that you never miss a payment. Alternatively, you can make payments in-person at a physical location or through the mail by sending a check or money order.\n\nIt’s essential to keep track of your payment schedule and ensure that you have enough funds in your bank account to cover each payment. If you’re struggling to make payments on time, contact your lender as soon as possible to discuss your options. Some lenders may be willing to work with you to modify your payment plan or offer other solutions to help you avoid defaulting on your loan.\n\nThe Bottom Line\n\nInstallment loans in Mississippi are a flexible and convenient financing option that offers higher loan amounts and longer repayment terms. These loans are unsecured and accessible to borrowers with poor credit, providing an opportunity to improve their credit score. However, it is crucial to carefully review loan terms and affordability before accepting any loan offer. Comparing rates and terms from different lenders can help find the best deal. In conclusion, taking out and repaying installment loans responsibly can lead to financial stability and security for borrowers in Mississippi.\n\nCompare Loans Available in Mississippi at Instant Loans USA\n\nAre You Ready to get your Loan NOW?\n\nPlease fill out a simple form to get your money - it takes only a few minutes.\n\nCredit Implications\n\nMaterial Disclosure\n\nHere`s a quick example:\n\nAPR Disclosure\n\nCheck your rates<|endoftext|>Jonathan Foley: 3 Ways Brands Can Level Up Their Social Media Strategy\n\nSince the days of Web 1.0, social media has grown in tandem with internet communications technology. According to market-research and business-intelligence specialists Statista, worldwide social network users grew from 0.97 billion in 2010 to 2.46 billion in 2017. Based on their data analysis, Statista expects similar growth going forward.\n\nWhere the public goes, enterprise follows. For example, corporate resource investment in direct advertising on social media platforms is rising. In the United Kingdom alone, advertising expenditures have increased at a much faster rate than the number of users, surging almost eight-fold between 2011 and 2017.\n\nThe Problem With Social Media Advertising\n\nImplementation of the General Data Protection Regulation (GDPR) throughout the European Union since the end of May 2018 is the latest in a series of events that highlights the growing public concern about data privacy on the internet.\n\nAdvertising in social media has taken a big hit. Bad actors such as Cambridge Analytica have exposed the questionable ethics surrounding the relationship between user data and advertising at an infrastructural level on platforms such as Facebook and Twitter. This undoubtedly makes it more challenging for both aspiring and existing entrepreneurs to leverage the potential of such mediums, and the burden of proof in terms of transparency and ethics has appreciated considerably.\n\nIt’s a Matter of Trust\n\nIt’s one thing to bait readers or potential customers into visiting a piece of content on your web page or associated profiles. However, the real challenge comes in converting visitors into customers or subscribers and ensuring that the rate of conversion and retention remains on a positive trajectory.\n\nThese are matters of reputation and trust, and you can’t fake integrity. If you", "num_tokens": 2048} {"category": "common_crawl-finance_and_business", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-finance_and_business/part-00-00000.npy", "text": " framework sharleen\nIn essence, gamification is another way for companies to indirectly enforce value rules to a vast communications infrastructure.  And rather than penalizing users for bad behavior, the positive re-enforcement rewards in gameplay may be enough to moderate the majority of participants, providing a scalable, efficient, and cost-effective system.  Ultimately some people will try gaming the system, so providing a method of constant feedback, either through analytics or surveys, will help you evolve the mechanics as necessary.\n\nPromoting positive social interaction reduces the stress and overhead of community management, and creates a welcoming environment for your community to grow.  It can potentially transform a environment where people are reluctant to interact due to fear of negative reaction, into a more welcoming atmosphere that encourages participation.  There is a great amount of potential in the use of mechanics in this manner, and the associated savings from community management resources should appeal to most institutions.  We hope to see more of this implementation in future gamified sites.\n\nClay Shirky’s TED presentation: Institutions and Collaborations:\nReprinted with permission from Strategic SynergySharleen Sy brings a hands-on perspective to issues and trends facing MMOs, virtual worlds and social entertainment. Armed with both an engineering degree and an art/comic book background, Sharleen has been involved in the graphics software and digital media industry since 1988 with a strong focus on game-based marketing, product management, UI/UX design and strategic business development.Sharleen was co-founder and Chief Creative Officer for CYBERWORLD International Corp, an early software developer of virtual worlds with innovative 3D technology for the web.  Sharleen was responsible for the executive management and marketing of the entertainment business unit and content studio. She built up strategic relationships with leading studios including Warner Bros, Universal Pictures, Stan Lee Media, and the Discovery Channel.Prior to CYBERWORLD, Sharleen held senior product management roles for companies such as Delrina (WinFax), MGI Software(PhotoSuite) and Alias|Wavefront (Maya).\n\nRelated posts<|endoftext|>I moved to Spain, can I open another British bank account without coming back to the country?\n\nI am British and live in Spain, I have a bank account in UK and I would like to open another in UK with a different bank. Is there anyway I can do this without a visit? \n\nUp the villa: But if you move out to Spain can you open a British savings account without coming back.\n\nLinda Mckay, of This is Money, replies: There may be a few nervous expats in Spain who wish to move funds from the country into a safe haven. So I asked our banking experts for advise.\n\nBrian Capon, of the British Bankers Association, replies: Banks must comply with strict legal obligations that are designed to prevent the risk of money laundering and fraud so they will need to carry out various checks before opening an account. \n\nVerifying your name and address would normally be done by seeing documents such as your passport or driving licence, together with sight of a recent utility bill, but where this is not possible alternative arrangements can sometimes be made.  \n\nSome checks can be made electronically through databases such as those held by credit reference agencies, but as you are currently living abroad there may be insufficient information available to the bank in this way.\n\nAs you already have a bank account in the UK, this might make it easier to open an additional account with another bank, but it would be worthwhile asking any prospective new bank about its requirements before applying for an account.\n\nThis can be done online in most cases via general enquiry.\n\nSimon Lambert, of This is Money, adds: One point where you may get caught out is that some accounts and banks demand a British address or residency.\n\nFor example, Halifax's Reward Current Account, which is once again offering those who join £100, has a condition that says 'Available to people aged 18 or over who must be resident in the UK.'\n\nHSBC, on the other hand, does not have a UK residency clause in its current account terms and conditions.\n\nYou should check up on requirements before applying for accounts. Many expats point out that they didge residency clauses by using a family or friend's address, but remember if you break terms and conditions on accounts you may find yourself not fully protected if things go wrong.<|endoftext|>Survey Management with Digital HRMS in Islamabad\n\nPeopleQlik #1 HRMS in Islamabad ever since remote work has become the new norm, things have been different at the workplace. While it has been more than a year and employees across the globe have adjusted to the new way of work, one cannot deny the fact that remote work does come with its own set of challenges for the employees as well as the HR department in enterprises today. The feeling of isolation and the monotony of working from home that remote work brings is translating to lower levels of employee motivation and affecting employee morale. This is because employees are increasingly feeling disconnected from the workplace and their colleagues, and this is affecting their motivation levels.\n\nPeopleQlik #1 HRMS in Islamabad\n\nHRMS in Islamabad\n\nSo, what is the solution? Well, the HR departments across the globe believe that this is the time when you need employee engagement exercises more than ever. Since surveys are a significant element of enhancing employee engagement levels, an online Survey Management platform is what enterprises need today to connect with their employees on a virtual platform. Here are some advantages that an online Survey Management software like Digital HRMS in Islamabad can bring to your organization.\n\nManaging Remote Employee Surveys with Digital HRMS\n\nEmployee engagement surveys serve a vital purpose: they assist the HR department in having constructive interactions with employees. Digital HRMS in Islamabad is an example of a survey management software that comes with a dedicated module for planning and executing surveys, and when used in times of remote work, can bring the following benefits.\n\n1] Making Employees Feel Connected\n\nEmployees who work from home frequently feel out of sync with the rest of the team. They may work in a different time zone, making it difficult for them to feel involved or have an equal say in team decisions. Remote employees can make their voices heard using a company-wide employee survey platform, which allows them to share their experiences. Surveys can help them express their problems, provide feedback to their superiors, and make suggestions that can benefit the organization in the long run.\n\n2] Effective Planning of Team Building Activities\n\nTeam building activities are an essential part of employee engagement as they allow employees to take a much-needed break from the daily routine and spend time connecting with their teammates and colleagues. But what kind of team-building activities do your teams look forward to? The survey management platform of Digital HRMS in Islamabad allows the HR team to take a quick survey to find out what the employees want.\n\n3] Providing a Platform for Employees to Share their Experience\n\nWhen we venture out on something new, we are bound to face challenges, and the same applies to the employees who are trying to be their productive best in times of remote work. So, an online survey management platform like Digital HRMS in Islamabad is what your HR team needs in order to allow the employees to share their experience, including the challenges they are facing and the things they need to enhance their productivity during remote work. The provision for anonymous surveys allows the employees to share their thoughts without any hesitation.\n\nHRMS in Islamabad Price in and this was updated on 2024-09-12T03:41:2403:41:24+00:00\n\n4] Effective Management of a Covid Vaccination Drive\n\nYes, a Survey Management platform like Digital HRMS in Islamabad can be a great way to manage a successful Covid vaccination drive in your organization. You can use the survey platform to gather important information, such as the vaccination status, current location of the employees, number of members in their family, and more. With this information, you can easily plan a vaccination drive in your premises, and since all of your employees are aware of it, it is sure to be a success.\n\n5] Streamlined Approach towards Infrastructure Allocation\n\nWhen you have employees working from home, one of the major challenges that your employees are likely to face is the lack of infrastructure. Are your employees struggling with desktops and laptops? Are they in need of high-speed broadband for seamless access to MS Teams meetings? Do they need a RAM upgrade on their system? With the help of the Digital HRMS in Islamabad Survey Management platform, you can run a survey to find out the equipment and devices your employees need and procure them accordingly.\n\nClick to Start Whatsapp Chat with Sales\n\nCall #:+923333331225\n\nEmail: sales@bilytica.com\n\nPayroll Software in Pakistan\nPayroll Software in Pakistan\nPayroll system in Pakistan\nHR Payroll Solutions in Pakistan\nPayroll Management in Pakistan\nPayroll Software in Pakistan<|endoftext|>How Airbnb Disrupted the Hospitality Industry\n\nDisruptive Innovation\n\nA few weeks ago, we explored how disruptive innovation and digital cameras have changed the industry. Disruptive innovation is defined as a new product or service that has challenged incumbent businesses by finding a better solution that meets modern requirements, unarticulated needs, or existing market needs. However, disruptive innovation creates new market demand and adds value to the need for new products or services. Industry disruptors change everything about the industry:\n\n • How customers view or engage with the industry\n • How competitors move into the market in response to disruptors\n • How disruptors maintain the market in their interest\n • How consumer power shifts\n\nIn this generation, there have been countless innovations that have changed how we engage with these products or services. For example, the internet has changed the way we communicate. Video-streaming services have challenged broadcast networks. Music-streaming has changed the way consumers engage with artists and musicians, challenging record labels, and their value to both consumers and artists. One industry that has felt a mass disruption over the years is the hospitality industry with Airbnb’s rise", "num_tokens": 2048} {"category": "common_crawl-food_and_dining", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-food_and_dining/part-00-00000.npy", "text": "monds-tified!”\n\n 1. Are you an almond? Because you’ve got me nuts about you.\n 2. Are you a bag of almonds? Because you’re a healthy snack for my heart.\n 3. Do you believe in love at first almond? Or should I walk by again?\n 4. Is your name Almond Joy? Because you bring joy to my life.\n 5. Can I borrow your phone? I want to call my mom and tell her I met the almond of my dreams.\n 6. Do you have a map? I just got lost in your almond eyes.\n 7. If you were an almond, you’d be the whole package.\n 8. Do you have any almonds? Because I just can’t resist your nutty charm.\n 9. Are you a squirrel? Because I’m nuts about you, and I want to store you in my heart.\n 10. Do you like almonds? Because you and I are the perfect nut match.\n 11. Are you made of almonds? Because you’re the almond of my dreams.\n 12. Can I take you out for almond milk coffee? It’s a date made in almond heaven.\n 13. Is your name Almondine? Because you’re a rare find.\n 14. If you were an almond tree, I’d be the squirrel that never leaves your side.\n 15. Are you a nutcracker? Because you’ve cracked open my heart.\n 16. Do you believe in fate? Because I think we were nut-destined to meet.\n 17. Is your middle name Almond? Because you’re the center of my nutty world.\n 18. Can I buy you a drink? I promise it won’t be almond-flavored, but it’ll be just as sweet.\n 19. Are you a bag of almonds? Because you’ve got a handful of my affection.\n 20. Do you have a favorite almond variety? Because I’m going nuts trying to impress you.\n\n“20 Nutty Zingers: Almond-Flavored One-Liners That’ll Crack You Up!”\n\n 1. Why did the almond go to the party? It wanted to be the nuttiest one there.\n 2. Almonds are nuts about staying healthy.\n 3. What do you call a dancing almond? A nutcracker!\n 4. Almonds: the silent but nutty type.\n 5. Why did the almond blush? Because it saw the salad dressing!\n 6. Almonds: the original brain food.\n 7. What did one almond say to the other? “You’re a tough nut to crack!”\n 8. Almonds are just nuts about being a healthy snack.\n 9. Why did the almond call 911? It was in a jam!\n 10. Almonds are the real nuts behind every success story.\n 11. What do you get when you cross almonds with humor? Nutty jokes!\n 12. Almonds: making life a little nuttier and a lot healthier.\n 13. Why did the almond bring a ladder to the orchard? To reach for the stars!\n 14. Almonds: the snack that’s nuts about you.\n 15. What do almonds say to their sweethearts? “I’m nuts about you!”\n 16. Almonds: the secret ingredient to a nutty life.\n 17. Why did the almond sit in the shade? It didn’t want to be a roasted nut.\n 18. Almonds are the nuts that keep on giving.\n 19. What did the almond say to the walnut? “You’re a little nutty, but I like you!”\n 20. Almonds: the nutty companions of a healthy lifestyle.\n\n“Unlock the Nutty Enigma: 20 Almond-Inspired Conundrums!”\n\n 1. What is small, brown, and packed with crunch? It’s a nut you can eat for lunch!\n 2. I’m a tasty snack that’s often found in a trail mix blend. What am I?\n 3. My name sounds like a nutty wordplay, but I’m a healthy snack. What nuts am I?\n 4. When you crack my shell, you’ll find a seed. I’m often used in baking. What am I?\n 5. What tree produces me as a tasty treat? I’m oval-shaped and a bit sweet.\n 6. Put me in a blender, and I’ll make your smoothie creamy. What am I?\n 7. I’m a nut that’s often used to make marzipan. What kind of nut am I?\n 8. In the land of nuts, I’m the king. What am I?\n 9. What nut is the star of the classic holiday song, “The Christmas Song”?\n 10. I’m a nut with a hard shell and a delicious, buttery flavor. What am I?\n 11. What nut is often used to make a famous Italian pastry called biscotti?\n 12. I’m a nut that’s sometimes used to make almond milk. What am I?\n 13. What nut is hidden inside a maraschino cherry? Hint: It’s a little nutty.\n 14. I’m a nut that’s commonly used to make a creamy, dairy-free cheese. What am I?\n 15. What nut is often ground into a flour and used in gluten-free baking?\n 16. I’m a nut that’s often paired with chocolate in desserts. What am I?\n 17. I’m the main ingredient in a classic French pastry. What am I?\n 18. What nut is used to make a sweet, almond-flavored liqueur?\n 19. I’m a nut that’s often sprinkled on top of salads. What am I?\n 20. What nut is sometimes referred to as the “Queen of Nuts”? Hint: I’m long and slender.\n\n“Cracking Up: Almond-solutely Nutty Humor!”\n\nSo, as we wrap up this nutty adventure, remember that the world of almonds is as diverse as the almond tree itself. Whether you’re cracking jokes or cracking shells, the almond’s versatility truly is a-peeling. If you’re hungry for more nutty humor, stay tuned and explore our site’s treasure trove of almond-inspired delights. Almonds may be small, but their laughter and flavor are larger than life. Happy nutting!\n\nPun it, share it !\n\nHit me up on socials :\n\nLeave a Comment<|endoftext|>CronacaPrimo Piano\n\nIncidente sul lavoro, morto un muratore in pensione di 75 anni\n\nA Palermo all’ospedale “Villa Sofia” è morto il muratore di 75 anni in pensione, F C sono le iniziali del nome, di Cinisi, vittima di un incidente domestico sul lavoro lo scorso 4 agosto. L’uomo, intento ad effettuare alcuni lavori di ristrutturazione nella sua abitazione in via Rocco Chinnici, è caduto da un’impalcatura da un’altezza di circa 5 metri. E’ stato trasportato d’urgenza in codice rosso in ospedale, soprattutto per le gravi fratture riportate nella caduta. Inutili si sono rivelati i tentativi dei medici di salvargli la vita<|endoftext|>No menu items!\n\nHomeLifestyleFoodSupermarket shelves go bare as Omicron disrupts US\n\nSupermarket shelves go bare as Omicron disrupts US\n\nAs the Omicron variant of Covid-19 sweeps the United States, empty supermarket shelves have become the latest sign of the pandemic’s ongoing disruption to the country’s supply chains.\n\n“It’s not as bad as Sunday but there are still plenty of empty shelves, lots of products are missing,” Justin Toone, a regular shopper at a Giant supermarket in the Washington suburb of Bethesda, Maryland, told AFP.\n\nShortages have been a recurring feature of the Covid-19 pandemic in the United States, with a run on toilet paper marking its early days, but a wider range of items have gone out of stock lately, particularly in areas struck by bad winter weather like snow storms.\n\n“Last week for several days in a row, there was nothing, no fruit, no vegetables in this Giant store and also in all grocery stores around,” Toone said.\n\nHoney, eggs, milk and meat disappeared from the shelves in nearby stores.\n\nPatrick Penfield, a professor of supply chain management at Syracuse University, said that previous Covid-19 waves affected different parts of the country over a period of time, allowing grocery stores to adjust their supply chains.\n\n“Since the Omicron variant is so contagious, it’s impacting the entire United States all at once. So many US grocery stores and food producers are dealing with employees being out sick, or being asked to quarantine,” he said.\n\nFurther up the supply chain, there are issues producing enough food, delivering it and even unloading it once it gets to the grocery stores.\n\nThis has left grocery stores to adapt by restocking shelves with what they have in stock and, for items that are in short supply, limiting how many they put out so customers don’t buy them all at once.\n\nPlenty of food\n\nParts of the country that face disruptive weather are most vulnerable to such shortages, Penfield said.\n\nGrocery", "num_tokens": 2048} {"category": "common_crawl-food_and_dining", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-food_and_dining/part-00-00000.npy", "text": ", blackberry, and apple; Mango Tango with mango, banana, passion fruit, ginger, and lemon; and Strawburst with strawberry, banana, orange, beet, and apple. The flavours were created by Trendi’s president and chief culinary innovation officer Christine Couvelier, a world-renowned chef and global culinary trendologist who has worked with some notable organizations such as President’s Choice, Maple Leaf Foods, and Unilever.\n\nThe Smoothie Machines continue YVR’s dedication to transforming its food and beverage program by offering more sustainable and innovative culinary options, working towards its goal of being the most sustainable airport by 2030.\n\nThese vending machines are just the latest way YVR is improving travellers’ experiences through innovative digital solutions.\n\n“YVR aims to become a destination for a variety of dining experiences for travellers, no matter the time of day,” said Eric Pateman, Director, Culinary Experiences at Vancouver Airport Authority. “We anticipate the demand for healthy meals and snacks to be high from travellers leaving and arriving to a health-conscious city like Vancouver. We know the partnership with Trendi will allow more customers to stick to their dietary preferences and requirements as they travel, and feel great about their selection.”\n\nFor more information about YVR, please visit www.yvr.ca.<|endoftext|>Brews & Spirits\n\nPlease Verify If You are of Legal Drinking Age in Your Region.\n\nVegan? Don’t whine, for there is wine!\n\nVegan? Don’t whine, for there is wine! Outback Jack wines from Australia.\n\nThe rise in the number of people turning vegan is growing at an exponential rate! Turning vegan is a way of living, which seeks to exclude, as far as possible and practicable, all forms of exploitation of, and cruelty to, animals for food, clothing or any other purpose.\n\nThese lifestyle changes have led to massive changes in the food and clothing industries to accommodate this new liege of eco-warriors. Vegan leather, vegan milk, vegan textiles are often spotted on brand labels.\n\nThe newest entrant to the vegan label is vegan wines. Yes, you read that right, wines are now vegan! Surprised?\n\nWine is simply understood as fermented grape juice; so how is it not already a vegan product? While wine is technically vegan already, the wine-making process often involves the usage of egg whites, which makes the end product non suitable for vegan consumption.\n\nTo understand what eggs do, or how are they used in the wine-making process, it is pertinent to understand that eggs have several different functions in different kinds of recipes. In the wine-making process it is used as a coagulant.\n\nThe egg-whites are used only to attract all the residual products like pulp, proteins, tannins, grape skin, etc. After this process is completed, the egg whites collect at the bottom and are completely removed from the wine.\n\nThis is the process of clarification that yields us the ‘clear wines’ that are majorly sold in the market.\n\nGuilt-free drinks\n\nThe vegan filtration alternative for the egg-whites is bentonite or kieselguhr. It is an absorbent clay that attracts protein and other particles and helps in clarification process of the wine.\n\nWith the surge of vegans in India, many importers and delegates have developed an interest in the product. Monika Enterprise, a leading importer and distributor takes pride in holding a delectable range of vegan wines, such as El Goru (14.5% ABV with Monastrell, Syrah and Petit Verdot), Goru el Blanco (13% ABV from Moscatel and Chardonnay) and Fuerza (14.5% ABV with Monastrell and Cabernet Sauvignon) from Jumilla, in Murcia region of Spain.\n\nSome of Monika Enterprise’s premium selections include the award-winning classic French range of Terroir Daronton Cote du Rhone, Terroir Daronton Vacqueyras and Terroir Daronton Chateauneuf du Pape.\n\nMonika Enterprise also carries an exclusive range of Australian wines like the Outback Jack (13.8% ABV), Outback Jack Shiraz Cabernet (13.9% ABV) and Outback Jack Cabernet Merlot (14% ABV) – as well as Metal Label Durif (15% ABV with Petit Sirah) and Metal Label Black Shiraz (14.4% ABV).<|endoftext|>components of cocktail\n\n3 Main Components of Cocktail\n\nThe major alcoholic drink is known as the base of the cocktail which contributes to its character and flavor. Each cocktail has a major alcoholic drink as the component of this cocktail, which is usually a spirit, and one or more complementary ingredients which may be alcoholic, non-alcoholic, or both.\n\nComplementary ingredients of the cocktail are modifier components of the cocktail that modify or enhance the flavor of the drink.\n\nA drink may have very small quantities of one or more flavoring and or coloring and sweetening agents. Finally, a prepared drink may or may not be garnished.\n\nWhat are the Components of Cocktail\n\nThese are the main components to prepare a cocktail:\n\n1. Base\n\nThe major alcoholic drink used in the preparation of a cocktail is called the Base, which is usually a spirit. Most cocktails are built around spirits. If a cocktail has two or more alcoholic drinks, the quantity of the base generally will be more than the other.\n\nIf two alcoholic drinks are used in the same quantity, let us assume wine and spirit, then the one with higher alcoholic strength, that is, the spirit and other is considered as the base.\n\nLet’s understand from some examples:\n\nExample1- In bobby burns cocktail. If a spirit and liqueur are used in the same quantity then the spirit is taken as the base for bar control purposes.\n\nExample2- french connection cocktail. If a cocktail has equal quantities of two different spirits then any of the spirits can be taken as the base.\n\nFor example-A White Lily Cocktail, it may be called a gin or rum-based cocktail.\n\nMost cocktails have one measure of the major alcoholic drink and the size of the measure will depend on the policy of the establishment.\n\n2. Modifier\n\nThese are complementary ingredients of cocktails added to modify or enhance the flavors. Spirits, aromatized wines, beers, liqueurs, fresh fruit juices, soda, eggs, cream, water, etc. are used as modifiers.\n\nModifiers are very essential for all kinds of mixed drinks. Without the addition of modifiers, one cannot call a mixed drink but a straight drink. The modifiers made each drink different from the others having the same base.\n\nSome highly flavored ingredients and their quantity used in the preparation mask the flavor of the base alcoholic ingredients. Such drinks are often preferred by people who do not like the smell or taste of the spirit or do not want others to know they are having alcohol.\n\nFor example– In Bloody Mary, the taste and smell of tomato juice overpowers the presence of the base vodka.\n\n3. Garnish\n\nMany drinks have standardized garnishes. These are a part of the product. The names of some of the cocktails are changed according to the garnish.\n\nFor example- If you garnish martini with pearl onion instead of olive, it becomes Gibson. Olive, cherry, orange, spirals of orange and lemon peels, lemon wheels, lemon wedges, pearl onions, etc. are the commonly used garnishes.\n\nBasically, cocktails are either sweet or dry and acidic. In general, all sweet cocktails are garnished with cherries and the dry cocktails are garnished with olive or lemon slices.\n\nIt should be remembered that some drinks do not have any standard garnish and it is advisable to serve without any garnish, instead of trying out different garnishes and spoiling the real flavor and value of the drink.\n\nCocktails are mixed drinks with one or more alcoholic drinks and the mocktails do not have any alcoholic drink in the preparation. Mocktails are popular amongst teetotalers.\n\nThe size of the cocktail should be between 4 OZ and anything more than this size would be termed as a long drink or mixed drink. Most cocktails are made with spirits. There are thousands of recipes, each having varying quantities of different modifiers and flavoring agents.\n\nThe classic cocktail recipes are going through changes in the proportion of ingredients as awareness of the effect of alcohol is on the rise.\n\nEarlier the cocktail had more quantity of alcohol but today the consumers prefer a long drink with less quantity of alcohol. A well-stocked bar has a good amount of classic cocktails and mocktails.\n\nShare this Knowledge<|endoftext|>Milk and milk products - Serbia\n\nVurda, also called ceđeno mleko, is a cheese made from sheep's milk, cow's milk or a mixture of the two. It takes three liters of milk to produce 1 kg of fresh vurda. Curdled milk is placed in a series of gauze squares that are tied to each other and hung to drain for about 24 hours. The draining time varies slightly from producer to producer. Salt to taste is mixed into the vurda, which is then ready to be either consumed or stored for further aging. The cheese can continue to age when kept in a cool storage area for three to four weeks. Young vurda is often placed in pots in alternating layers with peppers to make turshija. This resulting, creamy, fermented product resembles ricotta, with a slightly sour taste. Vurda can also be eaten as an appetizer or added to salads, omelets, used in main courses or in savory pies. Vurda is a product that originates from the areas of Luznica and Pirot in southeastern Serbia, and has been documented for at least a century as being used mixed with fresh peppers to create a dish that Serbian workers often would bring with them when moving abroad for work. Although vurda can be found for purchase today, it is made in small quantities, often in households. With", "num_tokens": 2048} {"category": "common_crawl-food_and_dining", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-food_and_dining/part-00-00000.npy", "text": " awareness of veganism, almost all coffee shops across the U.S. offer plant-based milk alternatives at their cafes, with many restaurants offering vegan options as well due to the increased interest in veganism.\n\nPopular ice-cream brands like Ben & Jerry’s have released vegan flavors of ice cream, meat substitutes, and even fake fish have been released to help people aid in their transition to veganism – but is this the more sustainable option for veganism?\n\nWhy could veganism be unsustainable?\n\nIf veganism is done with a whole-food, natural approach – veganism can indeed be a very sustainable way of living. However, veganism isn’t what it used to be a decade ago: meaning that people can easily opt for replacements for all of their favorite meals to “veganise” them – and while this may be comforting and make going vegan seem more doable, it isn’t the most sustainable approach to veganism.\n\nThis is because fake cream cheeses, yogurts, meats, fish, chicken, and cheese substitutes might go through heavy processing to be made – unlike naturally occurring vegan protein sources such as nuts, tofu, and beans. In addition to this, vegans are likely to consume more fruits and vegetables, and while this is good for the body – it might not be so good for the environment. Fruits and vegetables such as avocados, mushrooms, and cocoa have a heavy environmental impact – all of which are likely to be a part of someone’s vegan diet.\n\nHow can you make veganism sustainable?\n\nLuckily, veganism can still result in sustainability – but someone has to be committed to the right type of diet in order for veganism to yield a true sustainable purpose. For instance, vegans will have to limit themselves to dairy-free ice creams, fake meats, and fake cheeses as a “treat” – and stick to eating whole foods as much as possible: such as beans, greens, grains, tofu, and oats. This is because eating processed foods is one of the quickest ways to make veganism an unsustainable practice. \n\nVeganism can be more sustainable if people who choose veganism opt to practice for sustainable eating and consumption habits throughout: such as by purchasing reusable containers, reusable water bottles, and reducing their plastic consumption and water waste when cooking. For instance, seeing as vegetables emit a large amount of water when cooking anyways, there is no need for vegans (or anyone, for that matter) to use additional oil when cooking vegetables – as the will emit water when cooking and prevent the pan from burning. \n\nLastly, your reason for being vegan has to be sustainable itself. For instance, someone who hates cooking isn’t going to fare well in the world of veganism – as much of veganism thrives on the interest and creativity of recreating beloved meals without the use of animal byproducts. Therefore, veganism can only really be sustainable if the person pursuing veganism is intrinsically motivated for some reason in specific: whether it be for their own health, to protect the planets, or general animal well-being. \n\nAt the end of the day, veganism doesn’t mean sustainable – but veganism can serve as a means for someone to become more sustainable if they use veganism to its sustainable advantage.\n\nWhat about Greenly? \n\nIf reading this article about veganism has made you interested in reducing your carbon emissions to further fight against climate change – Greenly can help you!\n\nGoing vegan is just one of the many ways that you can go green and help fight against climate change, and Greenly can help you discover all of the other personalised habits you can easily create to help the global movement – book a demo here to learn more. \n\nGreenly can help you make an environmental change for the better, starting with a carbon footprint assessment to know how much carbon emissions your company produces.\n\nGreen-Tok, a newsletter dedicated to climate green news\n\nWe share green news once a month (or more if we find interesting things to tell you)\n\nMore articles\n\nGreen News\n\nThe Gates of Hell in Turkmenistan\n\nKara Anderson\n\n👉 In this article, we delve into the environmental implications of Turkmenistan's Darvaza Crater and the country's challenges in managing methane emissions.<|endoftext|>we are re-opening on 4th july - book a visit!\n\nCome and taste our new wines!\n\nWe are very excited to be releasing two new organic sparkling wines, Albury Estate Classic Cuvée and Albury Estate Blanc de Blancs. Both are available to taste and buy at the vineyard as follows:\nWinter Opening Hours\n13th November - 19th December\nFridays: 10am - 3pm\nSaturdays: 10am - 5pm\nPop in to taste the new wines, chat to the team, and take a stroll around the vineyard.\n\nFamilies are welcome and we have stickers and apple juice to entertain little ones leaving grown-ups free to taste wine.\n\nYou will receive a 10% discount off purchases of 6 or more bottles of the new sparkling wines when you buy directly from the vineyard on open days before Christmas - the perfect excuse to drink English bubbly for Christmas this year!\n\nDon't miss our special Christmas event on Saturday 5th December (10am - 5pm) when we will have the Godalming Community Gospel Choir, finalists at the BBC Gospel Choir of the year, singing at the vineyard (music from 1pm). Join us for carols and mince pies, and stock up on some English sparkling wine for Christmas! This is a free event but please email info@alburyvineyard.com to reserve your space.<|endoftext|>A lot of thesaurus - A little bit dictionary\n\nOverview of verb open\n\n1. open, open up -- (cause to open or to become open; \"Mary opened\n\nthe car door\")\n\n2. open, open up -- (start to operate or function or cause to start operating or functioning; \"open a business\")\n\n3. open, open up -- (become open; \"The door opened\")\n\n4. open -- (begin or set in action, of meetings, speeches, recitals, etc.; \"He opened the meeting with a long speech\")\n\n5. unfold, spread, spread out, open -- (spread out or open from a closed or folded state; \"open the map\"; \"spread your arms\")\n\n6. open, open up -- (make available; \"This opens up new possibilities\")\n\n7. open, open up -- (become available; \"an opportunity opened up\")\n\n8. open -- (have an opening or passage or outlet; \"The bedrooms open into the hall\")\n\n9. open -- (make the opening move; \"Kasparov opened with a standard opening\")\n\n10. afford, open, give -- (afford access to; \"the door opens to the patio\"; \"The French doors give onto a terrace\")\n\n11. open -- (display the contents of a file or start an application as on a computer)\n\nOverview of adj opened\n\n1. open, opened -- (used of mouth or eyes; \"keep your eyes open\"; \"his mouth slightly opened\")\n\n2. opened -- (made open or clear; \"the newly opened road\")\n\n3. open, opened -- (not sealed or having been unsealed; \"the letter was already open\"; \"the opened package lay on the table\")\n\nMade possible by Princeton University \"About WordNet.\" WordNet. Princeton University. 2010. http://wordnet.princeton.edu<|endoftext|>Cancun is a city in constant growth, and few restaurants resist fashions and changes. The Green Kiosk is one of the few survivors since 1974, something that speaks very well of the restaurant.\n\nPuerto Juarez is the fishermen's neighborhood of the area Cancun. Here you find many restaurants that offer fish and seafood, but honestly little to highlight. The Green Kiosk restaurant Survive with tradition, being one of the restaurants that speak differently in this fishermen's neighborhood with lots of fresh material and little initiative to highlight.\n\nKiosco Verde Restaurant, the tradition of the 1 sea\n\nThe structure of Green Kiosk It is a wooden cabin painted green with a large palapa that looks casual and with great personal charm. Your secret is a attractive kitchen well worn by the Mexican chef Octavio Santiago, who likes to experience different flavors by merging products. Here you will have pleasant taste surprises, very Mexican and with a personal touch.\n\nKiosco Verde Restaurant, the tradition of the 2 sea\nThe very tasty octopus\n\nCasual environment that attracts faithful, curious and recommended public. In Puerto Juarez one of the jokes is to eat in front of the sea, as it happens in the La Mar-Bella restaurant, the other pearl in fish and seafood. Even though that him Green Kiosk It is not facing the sea, it is filled with a faithful and grateful parish both on weekends and during the week. That speaks very well of the place. The chef Octavio Santiago always seeks to innovate to surprise and please the customer.\n\nKiosco Verde Restaurant, cancún\nKiosco Verde Restaurant, the tradition of the 3 sea\nKiosco Verde Restaurant, the tradition of the 4 sea\n\nEl Green Kiosk restaurant It is one of my favorite places in Puerto Juarez. They usually organize specific events to make mezcal or wine tastings. In its Facebook page publicize the events. Pure Mexican flavor.\n\nEnjoy your meal,\n\nKiosco Verde Restaurant, the tradition of the 5 sea\nthe shortest way participate in affiliate program this means that we get a small commission if you buy through these links accessing discounts; in no case does it suppose an additional cost for you and in this way you help us to maintain the blog.\n\nIf you prefer, you tell us your idea of ​​the trip and together we organize it.\n\nLOCATION: Puerto Juárez on the Punta Sam road, in front of the", "num_tokens": 2048} {"category": "common_crawl-food_and_dining", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-food_and_dining/part-00-00000.npy", "text": "15 minutes.\n4. Add the stuffed squids, sprinkle with parsley and cover with a lid. Let them cook for about 1 hour on a very low heat. Shaking the saucepan occasionally.\n5. Check seasoning. Add salt if needed.\n\nServe with boiled potatoes, chips or rice.\n\nBom Proveito! (Enjoy!)\n\nBolinhos Bacalhau – Salt Cod Cakes\n\nBolinhos Bacalhau – Salt Cod Cakes\n\nOne of the most emblematic portuguese dishes that you are able to find in any cafe or restaurant without season restrains. It’s a flag dish from the Minho cuisine and especially for Porto city. Known as “bolinhos de bacalhau” in the North of Portugal and named “pasteis de bacalhau” in the Centre and South of the country.\n\nAn excellent recipe for codfish leftovers, therefore one that is always on my mind for Christmas Day or the day after.\n\nIngredients for 4 people:\n250 g desalted salt cod\n200 g potatoes\n1/2 onion\n1 tbsp of fresh parsley\n15 ml of Port wine\n3 to 4 eggs\nOil to deep fry\n\nHow to:\n1. Boil the potatoes until fork tender.\n2. Peel the boiled potatoes; use a fork or a food processor to mash the potatoes.\n3. Poach the salt cod in water for 5 minutes.\n4. Remove skin and bones from the boiled salt cod.\n5. Shred the cod with your hands, with a help of a kitchen cloth, or you can even use a kitchen pestle.\n6. Chop the onion.\n7. Chop the fresh parsley.\n8. In a bowl combine the mashed potatoes, cod, chopped onion, chopped parsley, Port wine. Season with salt, fresh ground black pepper and grated nutmeg.\n9. Add the eggs one at a time. The number of eggs will change accordingly with the quality of the potatoes.\n10. With the help of two soup spoons form the cakes, and deep-fry them in oil.\n\nServe the bolinhos de bacalhau with a green salad and a beans rice for a complete meal. Or simple as tapas or a snack.\n\nYou can also find them in the Brazilian cuisine, one of many Portuguese recipes that was merged into other cultures. It’s named “bolinhos de bacalhau” , but the way of doing it changes slightly: the desalted salt cod is used raw, and the mixture is done only with egg yolks, the whites are whisked into stiff peaks and then folded gently into the mixture.\n\nBom Proveito! (Enjoy it!)<|endoftext|>Beer, Bourbon and BBQ Festival | Koka Booth Amphitheatre | Socials | Indy Week\nThis is a past event.\n\nBeer, Bourbon and BBQ Festival \n\nWhen: Fri., Aug. 1, 6-10 p.m. and Sat., Aug. 2, 12-6 p.m. 2014\nPrice: $38-$64\nSouvenir glass for tastings, unlimited beer and bourbon tastings (there are 40 bourbons and 60 beers on tap). BBQ galore from a variety of vendors. Seminars with brewmasters, distillers and pit masters. Live music. Contests. Exhi<|endoftext|>Coupons Are All the Rage - NBC Bay Area\n\nCoupons Are All the Rage\n\n Coupons Are All the Rage\n With coupon sites, clipping coupons becomes a thing of the past. Plus, don't you have better things to do, anyway?\n\n Coupon sites are the new Yelp. Actually Yelp is so yesterday when it comes to coupons.\n\n Now there is another new coupon company that's come to San Francisco and this one is called Village Vines.\n\n You sign up for free and then you pay about $10 to make a dinner reservation to a specific restaurant through the site.\n\n Then when you show up, your waiter or waitress knows to make a major deduction on your bill at the end of the night, sometimes as much as 30 percent.\n\n Think of it as the Priceline for restaurants with restaurants selling empty tables at a discount.<|endoftext|>Albondigas Soup\n\nREADY IN: 50mins\nRecipe by catalinacrawler\n\nmexican meatball soup...fantastic!!\n\nTop Review by UmmBinat\n\nUsing what I had on hand this was kind of plain tasting at least without the vegetables. I did add some chilli powder like another reviewer. I used rendered organic grassed beef fat instead of olive oil, organic onion, organic garlic, organic tomato sauce, organic canned plum tomatoes, homemade organic stock, cayenne pepper powder instead of diced green chilies or jalapeño, organic grass fed medium ground beef, white basmati rice, fresh wild mint from the garden, sea salt and freshly ground black pepper to taste, no egg, did add oregano as mentioned in the instructions but not ingredients list, garnished with organic cilantro but again it was not in the ingredients list and neither was lemon which I did not have so I stired in a little organic apple cider vinegar for a sour flavour.\n\nIngredients Nutrition\n\n 1. Heat oil in a heavy saucepan over medium heat.\n 2. Add onion and minced garlic and sauté until tender, about 5 minutes.\n 3. Add pato sauce (or tomato sauce if you cant find el pato), diced tomatos and broth. Bring to a low boil and add bay leaves, celery, string beans, green chilies and jalepeno.\n 4. To prepare meatballs mix rice into meat, adding mint leaves salt and pepper.\n 5. last add the egg, combine well.\n 6. Form meat into 1 inch balls & lightly brown in a skillet to lock in juices.\n 7. Return soup to a gentle simmer and add meatballs & zucchini.\n 8. Cover and simmer for ½ hour.\n 9. Add pinches of oregano and salt and pepper if needed.\n 10. Garnish with cilantro & lemon juice.\n\nJoin the Conversation\n\n • q & a<|endoftext|>How many calories in an Apple Pie?\n\nOf course, there are many different apple pies, and many different serving portions  too!!!\n\nSo…let’s do the calculations with a “standar” apple pie…certainly not the best but it is standard, so standard that it is the same all around the world!\n\nOf course, I am talking about the MacDonald Apple pie!\n\nNutrition facts of the Macdonald baked Apple pie (taken from the label):\n\nProteins 2g\n\nFat 13 g\n\nCarbohydrates 32 g\n\nSodium 170 mg\n\nHow many calories are obtained when you eat 1 serving size of this pie?<|endoftext|>Subscribe To The Grilling Dad\n\nSo you want the best BBQ advice sizzling in your inbox each week, huh? You’re clearly above average in terms of taste. 😉\n\nWhether you’re a seasoned pro or just starting out on your grilling journey, we’ve got the recipes and reviews to take your BBQ game to the next level. So, grab your tongs (make sure to *click* them twice), and get ready to impress your friends and family with your meat mastery.\n\nHere’s what you’ll get from your TheGrillingDad subscription:\n\n1. Email Newsletter\n\nYou’ll get 1-2 emails per month that give you access to some pro tips and tricks that will take your BBQ skills from good to great. Plus, we’ll throw in some of the juiciest, most mouth-watering recipes this side of the grill.\n\n2. Exclusive Deals and Give-Aways\n\nAnd if that’s not enough to get you salivating, how about the fact that you’ll be the first to know about our exclusive deals and discounts on the latest grills and smokers? AND we occasionally run give-aways with our brand partners… exclusively for our email subscribers!\n\n3. No Games\n\nWe take your privacy seriously and we will never sell or share your contact information with anyone. We hate spam as much as you do, which is why we promise to only send you emails that are relevant, informative, and packed with the best BBQ content on the web.\n\nWe believe in building a community of like-minded grill enthusiasts who share a passion for great food and great gear. That’s why we’re committed to providing you with the best possible experience – no spam, no sales pitches, just pure BBQ goodness. So, go ahead and subscribe with confidence – we’ve got your back!\n\nBut if you find yourself not enjoying the emails, there will be an “unsubscribe” button at the bottom of every email to make it easy for you to opt out. If you have any issues with that, email me directly at [email protected].<|endoftext|>Pumpkin French Toast\n\n1\n\n- Use 6 slices of Texas toast (or other white bread such as Sourdough or French bread)\n\n- Top with nuts like pecans or walnuts and sprinkle with powdered sugar!<|endoftext|>Week 4 - Summer Low Carb Bootcamp - Wherein we totes commit\n\n(441 Posts)\nBigStickBIWI Sun 19-May-13 23:49:07\n\nOK. It has come to my attention that there has been a lot of slippage going on over the last few days\n\nLow carbing is not a very forgiving way of eating. It isn't like following a low calorie diet, where one meal or one day can compensate for another.\n\nIf you're low carbing then you have to commit to low carbing all the time.\n\nOnce you reach your target weight, then this isn't necessarily the case, but whilst you're losing weight, you really do have to keep", "num_tokens": 2048} {"category": "common_crawl-food_and_dining", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-food_and_dining/part-00-00000.npy", "text": " making.\n\n⬇️ Limited spots available.\n\nStay tuned for the upcoming summer and Christmas vibes that will follow in the coming months!<|endoftext|>Skip to content Skip to sidebar Skip to footer\n\nWho Really Invented Potato Chips?\n\nDiscover the fascinating tale of who truly invented potato chips!\n\nSource howafrica.com\n\nWhen Was the Potato Chip Invented?\n\nPotato chips, the crispy and addictive snack that has become a fan favorite around the world, has a long and fascinating history. From its humble beginnings in the mid-1800s to the current global phenomenon, potato chips are now available in countless flavors, shapes, and sizes.\n\nThe First Potato Chips\n\nThe origins of potato chips can be traced back to the early 1800s, where it is believed that the snack was invented by a chef named George Crum. George was cooking at the Moon's Lake House in Saratoga Springs, NY, where a customer ordered fried potatoes but kept sending them back, complaining that they were too thick and soggy. George finally had enough and, in a fit of frustration, sliced the potatoes as thin as possible, fried them until they were crispy, and added a generous amount of salt. The customer was delighted with the new creation, and potato chips were born!\n\nInitially, potato chips were only available in high-end restaurants and were considered a delicacy. The snack gained popularity fast, but it wasn't until many years later that it would become readily available in stores and households across the country.\n\nThe Evolution of Potato Chips\n\nBy the early 1900s, potato chips had become an increasingly popular snack across America. The widespread availability of prepackaged snack foods meant that potato chips were becoming more accessible to the average person. The rise of potato chips coincided with the growth of supermarkets, which made it easier for producers to distribute their products to a larger audience.\n\nA significant factor in the growing popularity of potato chips was the development of new flavors and seasonings. Producers were continuously experimenting with new ways to enhance the taste of potato chips, ranging from salty and savory to sweet and spicy.\n\nAs the demand for potato chips grew, so did the market. Producers started to mass-produce potato chips, which lead to packaging innovations. The introduction of airtight bags kept the chips fresh for extended periods and made them available for consumers to purchase whenever they wanted.\n\nThe Global Spread of Potato Chips\n\nToday, potato chips are a beloved snack food worldwide and are available in countless variations of flavor, texture, and packaging. Potato chips have become an essential aspect of different cuisines and cultures, with each region adding its twist to the snack.\n\nFrom the classic salted potato chips to cheese, barbecue, and even lobster-flavored, there are endless options to choose from. The packaging has also gone through a transformation over the years, with producers no longer limited to only bags. Potato chips can be found in cans, tubes, and even as a topping on other dishes.\n\nIn conclusion, the potato chip has come a long way from its humble beginnings of being a frustrated chef's snack invention. With its rich history and continuous growth, potato chips are a true icon in both the snack world and popular culture.\n\nKeys have been around for centuries, but who actually invented them? Find out in our pillar article on the history of keys.\n\nWhen Was the Potato Chip Invented?\n\nThe potato chip is one of America's favorite snacks, but when and how it was invented is a topic of debate. Here are the two main stories:\n\nStory 1: George Crum\n\nThe most widely accepted story of the potato chip's invention involves a frustrated chef named George Crum. Around 1853, Crum was a cook at a fancy resort called Saratoga Springs in upstate New York. One day, a wealthy customer ordered fried potatoes, but kept sending them back to the kitchen because they weren't thin or crispy enough. Crum, fed up with the customer's complaints, sliced the potatoes as thinly as he could, fried them until crisp, and coated them with lots of salt. To his surprise, the customer loved them and asked for more.\n\nStory 2: Native American Origins\n\nAnother theory suggests that potato chips were invented by Native Americans long before Crum's time. Some tribes in the Americas have been known to thinly slice and fry potatoes or other root vegetables as a way of preserving them for winter storage. However, there is no conclusive evidence to support this theory, and it remains a subject of speculation.\n\nHow Are Potato Chips Made?\n\nThe Ingredients\n\nAlthough potato chips can come in a variety of flavors and textures, the basic ingredients remain the same: potatoes, oil, and salt.\n\nThe Production Process\n\nThe production process of potato chips can vary slightly depending on the manufacturer, but typically involves the following steps:\n\n 1. Washing and peeling the potatoes\n 2. Slicing the potatoes thinly, either by hand or machine\n 3. Rinsing the sliced potatoes with water to remove excess starch and prevent discoloration\n 4. Frying the potatoes in hot oil until golden and crispy\n 5. Seasoning the chips with salt or other flavorings, such as vinegar, barbecue, or sour cream and onion\n 6. Packaging the chips in bags or containers for distribution to stores\n\nThe Challenges of Homemade Potato Chips\n\nMaking potato chips at home can be a fun and rewarding experience, but it can also be messy and time-consuming. One of the biggest challenges is slicing the potatoes thinly and evenly enough to ensure that they cook uniformly. Another challenge is getting the right amount of oil and temperature to fry the chips until crisp without burning them. For these reasons, many people prefer to buy pre-made potato chips from the store instead of making them from scratch.\n\nIn conclusion, the potato chip has undergone many transformations since its supposed invention in the mid-19th century. From the humble plain salted chips to the various flavors and textures available today, it's clear that the potato chip has become a staple in the American diet. Whether you prefer the classic, kettle-cooked, or baked varieties, there's a potato chip out there for everyone.\n\nDid you know that the concept of video recording dates back to the 1800s? Learn more about the fascinating history of video recording.\n\nThe Cultural Significance of Potato Chips\n\nComfort Food and Americana\n\nPotato chips are more than just a snack food; they are an iconic part of American culture. The appeal of potato chips lies in their simplicity and versatility. Whether eaten straight out of the bag or paired with dip, potato chips satisfy our craving for salty, savory foods. The crunchy texture and delicious flavor of potato chips make them a comfort food that reminds us of childhood memories and simpler times.\n\nPotato chips have a special place in American history. In the early 1900s, potato chips were commonly sold by street vendors and were considered a working-class food. However, as the popularity of potato chips grew, so did their availability in stores and supermarkets. Nowadays, potato chips are enjoyed by people of all ages and backgrounds, and they can be found on the shelves of almost every grocery store in the country.\n\nCelebrity Endorsements and Branding\n\nOne of the reasons potato chips have become so popular is their association with celebrity endorsements and branding. Many famous celebrities have been known to proclaim their love for potato chips publicly. Celebrities such as Jay-Z, Katy Perry, and Taylor Swift have all been spotted snacking on potato chips.\n\nBranding has also played a significant role in the success of potato chips. Companies such as Lay's, Pringles, and Doritos have all invested heavily in advertising and marketing to create memorable brand identities. These iconic brands are now household names, and their products can be found everywhere from vending machines to convenience stores.\n\nThe Future of Potato Chips\n\nAs consumer tastes and preferences continue to evolve, companies are experimenting with new flavors, packaging, and production methods to stay ahead of the curve. One trend in the potato chip industry is the use of natural and organic ingredients. Consumers are becoming more health-conscious, and they are looking for snacks that are healthier and more environmentally-friendly.\n\nPackaging is another area where potato chip companies are innovating. Some companies are using biodegradable packaging materials to reduce waste and improve sustainability. Other companies are experimenting with new shapes and sizes to make their products more appealing to consumers.\n\nPotato chips have come a long way since their humble beginnings as a working-class snack food. Today, they are an iconic part of American culture, with a nostalgic appeal that reminds us of simpler times. They have also become a popular snack food worldwide, enjoyed in countries from China to the UK. As the potato chip industry continues to evolve, we can expect to see new flavors, packaging, and production methods that appeal to a wider range of consumers.\n\nTo understand the history of potato chip, we should also look at the development of tractors which made it easier to harvest potatoes.\n\nRelated Video: Who Really Invented Potato Chips?\n\nPost a Comment for \"Who Really Invented Potato Chips?\"<|endoftext|>jeudi 22 décembre 2011\n\nTanzania: Help, I'm hungry!\n\n         In 1974, Tanzania experienced a famine due to drought and the creation of cooperatives and collective farms. The government did its best to provide enough food.\nPresident Julius Nyerere (1964-1985) took the decision to visit the warehouses of the National Company of Milling. He disguised himself as a beggar and knocked on the door of the director: \"Hey, You who are in it, help me, I have nothing to eat\".\n\"Stop bugging us. There is no food here! Go buy the market\" was the reply of the Director or an assistant. Nyerere continued to scream but to no avail.\nThe director and his assistants were busy with businessmen who bought the place the food for the hungry to sell on the market.\n         Nyerere then opened the door, entered", "num_tokens": 2048} {"category": "common_crawl-food_and_dining", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-food_and_dining/part-00-00000.npy", "text": " and I personally would not buy it (sellers get round this by shaking the bottle so check the next test).\nLastly, if it smells ok and it’s cloudy all the way to the bottom then lift the bottle and there should be a layer of sediment in the base of the bottle. This is good because it shows the fermentation is ongoing and tells you that the bottle has not been shaken.\n\nBurcák is not a finished wine and it’s still fermenting so you cannot seal the bottle or at least not for very long. We have personal experience of a plastic bottle being blown apart after we forgot to loosen the cap. Also, do not put it in the fridge as this destroys the fermentation process and it will start to separate. Where I mention a low alcohol content that’s by volume. You won’t find any issue with a single glass but on a warm evening after three or four glasses you’ll be feeling pretty good. When you pour it, make sure you pour slowly as you want to leave any sediment in the bottom of the bottle. So buy it fresh and drink it the same day. Na Zdravi (cheers).\n\nSome Random Things to Do and See in Prague<|endoftext|>Best Answer\n\nThe laws of kashrut (Jewish dietary laws) specify that in order for land animals to be considered valid food animals, they must have both split hooves and chew their cud. There is a common misconception that Jews consider non-kosher animals to be unclean but this is not correct, it's simply that they're not considered fit for eating. Additionally, animals that qualify as food animals must also be domesticated, this means that wild deer are not kosher while domestic deer are kosher.\n\nUser Avatar\n\nWiki User\n\n2011-05-24 01:23:38\nThis answer is:\nUser Avatar\nStudy guides\n\n20 cards\n\nWhich best describes the difference between Protestant and Catholic beliefs\n\nWhere are most of the members of OPEC located\n\nWhy did Iraq invade Kuwait in 1991\n\nWhat happens when OPEC reduces the production of oil\n\nSee all cards\n5 Reviews\n\nAdd your answer:\n\nEarn +20 pts\nQ: Why do Jewish people eat a certain meat?\nWrite your answer...\nStill have questions?\nmagnify glass\nRelated questions\n\nWhy can't the Jewish people eat meat?\n\nThere is no prohibition against eating meat in Judaism other than certain types of meat aren't allowed.\n\nWhat shouldn't Jewish people eat?\n\nJewish people are not supposed to eat certain meat products. The criteria for a kosher animal are split hooves and chewing its own cud. They also do not eat shellfish, or any fish that does not have both fins and scales. Jewish people also do not milk and meat products\n\nJewish people follow certain rules about food and drink what are they called?\n\nJewish people keep kosher. They do not eat pork or animal that were killed for meat painfully and slowly (rather then quickly,) they don't eat shellfish, and they don't eat dairy and meat together.\n\nWhat religion can't eat meat?\n\nNone.But there are Religions that cant eat certain kinds of meatMuslim People and Jewish People cannot eat hamHindu People cannot eat meat at all it is against their custom\n\nDo Jewish people eat meat?\n\nYes, but many Jews will only eat kosher meat.\n\nWhat did Moorish people eat?\n\nthey eat meat but certain kind!\n\nWhat type of meat do Jewish people eat?\n\nThey eat any kind of meat except for pork. However, it MUST be kosher.\n\nCan Lutherans eat meat on Good Friday?\n\nYes, only the Protestant and the Jewish people that believe that you should not eat meat on Good Friday.\n\nWhat's the reason why Jews don't eat meat?\n\nJewish people do eat meat, although the meat of some animals is considered unfit for consumption in accordance with the Torah.\n\nCan Islam Religion People Eat Meat?\n\nThey can eat meat. They can eat any type of meat besides pig and certain birds. But, the animals have to be cut a certain way. Since there are two types of Muslims: one can eat no meat at all and the other can eat any type of meat besides pig and certain birds. But, the animals have to be cut a certain way to be eaten by this type I'm talking about.\n\nWhat kindsof foods must Jewish people not eat at the same time?\n\nMeat and dairy\n\nWhy don't Jewish people mix dairy products with meat?\n\nIt's considered not kosher to eat meat and dairy together.\n\nPeople also asked<|endoftext|>Social Media\n\nWhat Is A Substitute For Garlic Salt?\n\nLooking for a Substitute for Garlic Salt?\n\nGarlic salt is a popular seasoning that adds a savory kick to a wide variety of dishes. However, if you find yourself in a pinch without this essential ingredient, there’s no need to worry. There are several alternatives that can help you achieve a similar flavor profile in your recipes. Whether you’re looking to reduce your sodium intake or simply don’t have garlic salt on hand, these substitutes can come to the rescue.\n\n1. Garlic Powder and Salt\n\nIf you have garlic powder and salt in your pantry, you can easily create a substitute for garlic salt. Simply mix one part garlic powder with three parts salt to create a flavorful blend that can be used in place of garlic salt in your recipes.\n\n2. Garlic Powder\n\nIf you’re looking to avoid the sodium content of garlic salt, using garlic powder on its own can be a great alternative. Garlic powder provides the intense flavor of garlic without the added salt, making it a versatile option for those watching their sodium intake.\n\n3. Fresh Garlic and Salt\n\nFor a more natural alternative, consider using fresh garlic and salt as a substitute for garlic salt. Simply mince or crush fresh garlic cloves and mix them with salt to create a flavorful seasoning that can be used in place of garlic salt in your recipes.\n\n4. Garlic Herb Seasoning\n\nIf you’re looking to add a bit more complexity to your dishes, consider using a garlic herb seasoning blend as a substitute for garlic salt. These blends often contain a mix of garlic, herbs, and spices, providing a well-rounded flavor that can enhance a wide range of dishes.\n\n5. Homemade Garlic Salt\n\nIf you have garlic powder and salt on hand, you can easily create your own garlic salt at home. Simply mix the two ingredients together in the desired ratio and store the blend in an airtight container for future use. This homemade garlic salt can be used as a substitute in any recipe that calls for garlic salt.\n\nExperiment and Enjoy!\n\nWhen it comes to cooking, there’s always room for experimentation. Don’t be afraid to try out different substitutes for garlic salt and see which one works best for your taste preferences. Whether you opt for garlic powder, fresh garlic, or a homemade blend, these alternatives can help you achieve delicious flavors in your dishes without the need for traditional garlic salt.\n\nNext time you find yourself without garlic salt, remember that there are plenty of substitutes available to help you maintain the delicious flavors in your cooking. With a bit of creativity and resourcefulness, you can continue to enjoy the rich, savory taste of garlic in your favorite recipes.\n\nWhat’s your favorite substitute for garlic salt? Share your thoughts and join the discussion in the Ingredients Spotlight forum section.\nCan you suggest some alternatives to garlic salt?\nYes, there are several alternatives to garlic salt that can be used as substitutes. Some options include garlic powder, onion salt, garlic paste, minced garlic, and a combination of salt and fresh garlic.\nWhat is garlic salt typically used for in cooking?\nGarlic salt is commonly used to add a savory and garlicky flavor to dishes. It can be used to season meats, vegetables, soups, stews, and marinades. It is a convenient way to add both garlic and salt to a dish with just one ingredient.\nHow does garlic powder compare to garlic salt as a substitute?\nGarlic powder is a suitable substitute for garlic salt as it provides the flavor of garlic without the added salt. When using garlic powder as a substitute, it’s important to adjust the amount of salt in the recipe to compensate for the absence of salt in the garlic powder.\nCan onion salt be used as a replacement for garlic salt?\nYes, onion salt can be used as a replacement for garlic salt in recipes. It provides a similar savory flavor, although it has a distinct onion taste as well. When using onion salt as a substitute, consider adjusting the overall salt content in the recipe.\nIs fresh garlic a good alternative to garlic salt?\nFresh garlic can be an excellent alternative to garlic salt, especially for those looking to reduce their sodium intake. Minced or crushed fresh garlic can be used to add a strong garlic flavor to dishes, and salt can be added separately to adjust the overall saltiness of the dish.\nHow can I create my own garlic salt substitute?\nTo create your own garlic salt substitute, you can combine garlic powder with salt in the desired ratio. Start with a small amount of garlic powder and salt, mix them together, and taste the mixture. Adjust the ratio to achieve the desired level of garlic flavor and saltiness.\n\nWas this page helpful?\n\nRead Next: What Is Salsiccia?<|endoftext|>Banana ppudding using 9 ingredients and 8 steps. Here is how you cook it.\n\nIngredients of Banana pudding\n\n 1. Prepare 4 of banana.\n 2. Prepare 1 can of sweetened condensed milk.\n 3. Prepare 1 of small box of instant vanilla pudding mix.\n 4. You need 1 1/3 cup of whole milk.\n 5. Prepare 3 cups of heavy cream.\n 6. Prepare 3 tsp of vanilla extract.\n 7. You need 2 boxes of vanilla wafers.\n 8. It’s 1/3 cup of sugar.\n 9. You need 1 container of cool whip.\n\nIt steals the show with its light. Banana pudding is one of our all-time favorite desserts. This easy Homemade Banana Pudding", "num_tokens": 2048} {"category": "common_crawl-food_and_dining", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-food_and_dining/part-00-00000.npy", "text": " salts, excellent levels of iodine, selenium, iron, calcium and phosphorus can be appreciated.\n\nAnchovies lend themselves to all diets, including those for the treatment of metabolic diseases and overweight. They do not contain poorly tolerated nutrients (such as lactose and gluten), but are excluded from vegetarian and vegan food philosophies. Those suffering from gout should definitely avoid the consumption of anchovies due to the high purine content.\n\nThe average portion of fresh, clean anchovies is 100-200 g (95-190 kcal).\n\nANCHOVIES [100 grams]\n\nFresh anchovies\n\nAnchovies in oil\n\nAnchovies in salt\n\nNutritional advice and preparation of anchovies\n\nWhen buying anchovies preserved in salt it is good to rinse them abundantly under running water, so as not to take excessive amounts of sodium, which is dangerous especially for those suffering from hypertension.\n\nAnchovies preserved in oil should be chosen according to the type of oil used. To be preferred those in extra virgin olive oil, to avoid those stored in a package containing \"vegetable oil\", without specifying the type of oil used on the label.\n\nOften anchovies are eaten fried, making a healthy and questionable choice. Granting yourself a dish of fried fish from time to time is not so dangerous, as long as some important rules are respected. First of all it is good to choose an oil with a high smoke point, such as the extra virgin olive oil, peanut or refined palm oil. The frying of the anchovies should take place at temperatures that are not too high (below 180 ° C) and, once cooked, should be carefully drained and placed on a double layer of absorbent paper.\n\nA very popular recipe is made up of marinated anchovies . Despite the addition of acidic components (lemon juice or vinegar), which denature the proteins giving it a typically cooked appearance, it is a \"raw\" preparation. This characteristic makes the anchovies unsafe from the hygienic point of view, in particular for the Anisakis infestation. It is therefore necessary, at the expense of the gastronomic value, to subject the fish to a temperature reduction before processing; by itself, the acidity of the lemon or vinegar is NOT able to eradicate the potential parasite.\n\nRecipes with Anchovies\n\nStuffed Tomatoes Grated with Anchovy Fillets\n\nRecipe to prepare the tastiest and lightest stuffed tomatoes on the web, because they are prepared with very little added fat.\n\nAlice, your PersonalCooker, is on air on MypersonaltrainerTv to explain you step by step how to turn real caloric bombs into light and balanced dishes.\n\nTomatoes au gratin with anchovies\n\nX Problems with video playback? Reload from YouTube Go to Video Page Go to Video Recipes Section Watch the video on youtube\n\nSee all Recipes with Anchovies »\n\nMandelic acid\nFoods source of natural dyes\nShoulder bursitis<|endoftext|>open in Mixel\n\nAbbey Street Punch\n\n8 oz\nIn gaelic, uisce betha, or 'water of life' was used to describe such drinks in the Middle Ages. This malted grain whiskey must be produced on the island of Ireland.\n8 oz\nA top fermented dark beer made with roasted malts and/or brown malts. These are usually higher ABV (7+) and range from flavors of bread to chocolate, coffee, and cream.\n8 oz\nWater into which carbon dioxide gas under pressure has been dissolved, creating a fizzy texture. We treat soda water, club soda, seltzer and sparkling water the same.\n6 oz\nThe most common fruit juice used in cocktails. This citrus juice is about 6% acid; pure citric acid. Lemon juice should be used the day it is squeezed, some like it freshly squeezed and others like it a few hours old.\n6 oz\nA syrup made from dissolving granulated sugar (sucrose) in water. Regular simple is made by combining 1:1 sugar:water by mass, rich simple is 2:1 sugar:water by mass although only 1.5 times as sweet as regular. We always use 1:1 syrup unless otherwise noted in the recipe itself.\n4 oz\nA subset of aged (dark) rums that specifically come from Jamaica. These rums are highly regarded for their unusual pot-still funk, necessary for certain classic cocktails.\n2 oz\nAlso known as pimento dram, this is an allspice berry flavored liqueur; from the pimento tree. You can make your own! Here is a recipe from Serious Eats: Measure out 1/2 cup whole allspice berries, then crush them in a mortar and pestle or grinder. Place the crushed allspice in a sealable glass jar with 1 cup rum, steep for 4 days, shaking daily. On day 5, add 1 broken cinnamon stick. Let steep for 7 more days, after 12 total days of steeping, strain out the solids through a cheesecloth. Make a syrup by combining 1 1/2 cup water and 2/3 cup brown sugar, heat until it dissolves then add it to the alcholoic mix. Let rest for an additional day, and enjoy!\n0 pod\nThe seed from an evergreen tree, used as a grated garnish in many cocktails. A must for egg-nog and egg-nog like drinks. In sufficent amounts it gives a numbing sensation.\n0 wheel\nSmall, round, green citrus fruits. Commonly used in many cocktails for its rind or its acidic taste (6% acid total; 4% citric, 2% malic, some succinic acid).\n\nServes 6-8. Combine all the ingredients in a punch bowl with 1 cup crushed ice, then slip in a large block of ice. Grate nutmeg over the surface of the punch. Ladel into individual glasses and garnish with lime wheels. #punch #batch #build #ontherocks\n\nCocktails On Tap\navg. 3.5 (2)\nSorting, filtering, sharing:\nThere's so much more in the Mixel App!<|endoftext|>The Pedant in the Kitchen\n\nby Julian Barnes\n\nThe Pedant in the Kitchen | 9781782390947 | Julian Barnes\n\nIn stock\n\nISBN:9781782390947\n\nFormat:Paperback / softback\n\nPublished:01/06/2013 by Atlantic Books\n\nThe Pedant’’s true pedantry emerges. How big, exactly, is a ‘lump’? Is a ‘slug’ larger than a ‘gout’? When does a ‘drizzle’ become a downpour? And what is the difference between slicing and chopping?This book is a witty and practical account of Julian Barnes’ search for gastronomic precision. It is a quest that leaves him seduced by Jane Grigson, infuriated by Nigel Slater, and reassured by Mrs Beeton’s Victorian virtues. The Pedant in the Kitchen is perfect comfort for anyone who has ever been defeated by a cookbook and is something that none of Julian Barnes’ legion of admirers will want to miss.<|endoftext|>Vegetables/fruitsFor the first few weeks, there was an obvious fall in charges for vegetables and fruit.\nSpecifically for those products with a strong sales in catering .\nThe exact start of the pandemic is difficult to pinpoint, but with the herpes virus first spreading in China during January, it was not long before the remaining world would become affected.\nBy mid-March, a lot of countries across the world will be facing rapidly rising infections and hard decisions.\nIn addition to the growingly difficult health decisions to be made by governments, the economy and businesses begun to retract.\nIn reaction to growing infections, a large majority of countries begun to impose draconian lockdowns and restrict movement, trade, and business operations.\n\nWe only grind from whole muscle cuts of beef or from the juicy, delicious trimmings of cut steaks and roasts.\n\nSweet Rice\n\nKaaya et al. observed that aflatoxin levels increased by about 4 times by the third week and more than 7 occasions when maize harvest was delayed for four weeks.\nHowever, If products are harvested early, they have to be dried to safe levels to stop fungal growth.\nRachaputi et al. reported lower aflatoxin levels and higher gross returns of 27% resulting from early harvesting and threshing of groundnuts.\nThe global organic treats market will grow from $9.81 billion in 2022 to $10.67 billion in 2023 at a compound annual growth rate of 8.7%.\nThe Russia-Ukraine war disrupted the chances of global economic recovery from the COVID-19 pandemic, at least for a while.\nThe war between both of these countries has led to economic sanctions on multiple countries, a surge in commodity prices, and supply chain disruptions, causing inflation across goods and services and affecting many markets around the world.\n\n • We invest in trying our far better provide you in detail.\n • Our friends at Sigdal Bakeri have produced a fantastic, authentic Norwegian crispbread, with oatmeal, spelt bran, and packed with seeds and kernels.\n • People can order directly from the agricultural holding they choose.\n • An American Cheese Society award-winner and a creamy solution to enjoy truffles!\n\nBeets are a special treat when grown carefully by people who know what they’re doing—sweet enough to snack on, yet earthy enough for a wide selection of savory dishes.\nOjai Pixie tangerines are a customer favorite, grown in the world-renowned Ojai Valley of California by way of a dedicated band of farmers working on small family farms.\nPale orange in color, moderately juicy, always", "num_tokens": 2048} {"category": "common_crawl-food_and_dining", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-food_and_dining/part-00-00000.npy", "text": "ually over three years. By purchasing a set, whisky enthusiasts will join the distillery’s Cask Club, giving them first refusal on all limited and first release whiskies along with other member benefits.\n\nbottom of page<|endoftext|>Casa de Mouraz Dāo Branco 2021\n\nCasa de Mouraz Dāo Branco 2021\n\n4 in stock\n\nSara Dionisio and António Lopes Ribeiro are bravely rebuilding their 13 hectare estate in the Dāo region, after six hectares of vines were burned by a forest fire in 2017. Their wine warehouse and António’s ancestral family home, were also consumed by the blaze. We are delighted to be supporting their efforts by selling their delicious wines.\n\nPortugal’s Dāo region once had a thriving local tradition of making field blends – wines from vineyards planted with numerous varieties, all of which were picked at the same time and co-fermented. Biodynamic producers Casa de Mouraz keep this tradition alive, and there are 15 different indigenous Portuguese varietals in this wine. Expect a textured and mineral white, with with some fresh green fruit and citrus flavours.\n\n2018; cork; 13% abv\n\nCertified organic<|endoftext|>: Best burgers & Steaks in Edinburgh\n\nEdinburgh boasts many restaurants that specialise in finely cut Aberdeen Angus Steak, with different options to suit a range of tastes and budgets. Most restaurants offer different cuts of Aberdeen Angus Steak- both traditional and innovative cuts- to ensure diverse textures and flavours along with a la carte menu. Here is our list of some of the best burger and steak restaurants in Edinburgh\n\nBell's Diner\n\nThe best burgers and steaks in town. This diner is popular with Stockbridge locals, students and tourists alike who come for its honest, filling and great value food in an informal atmosphere.\n\nSteak Restaurant\n\nPerfect restaurant for the dedicated meat lover at the top of Leith Walk/end of Queen's Street<|endoftext|>Willyumspice Coupons\n\n892713 Reviews\n1 Coupons & Deals  | 855 used today\n\nLooking for the best deals and discounts on Willyum Spice products? Look no further than AskmeOffers! We have a wide range of Willyum Spice coupon codes, offers, deals, and promo codes that can help you save big on your purchases at willyumspice.com. At Willyum Spice, you can find a variety of flavorful spices, seasonings, and rubs to enhance your culinary creations. Whether you're grilling, baking, or cooking up a storm in the kitchen, Willyum Spice has something for everyone. From mouth-watering BBQ rubs to aromatic spice blends, their products are sure to delight your taste buds. With AskmeOffers' exclusive Willyum Spice coupon codes, you can enjoy incredible savings on your favorite products. Whether you're looking for Willyum Spice coupon codes for BBQ rubs or promo codes for their signature spice blends, we have you covered. Simply enter the coupon code at checkout and watch the savings add up. Some of the most popular products offered by Willyum Spice include their award-winning Kansas City Barbecue Rub, Smokin' Chipotle Seasoning, and Savory Steak Rub. These products are loved by customers for their exceptional flavor and quality. And with AskmeOffers' discounts, you can get your hands on these top-notch products at discounted prices. To maximize your savings with AskmeOffers' Willyum Spice coupon codes, be sure to sign up for the Willyum Spice newsletter. This way, you'll be the first to know about exclusive deals and seasonal sales. Additionally, keep an eye out for special promotions and limited-time offers on AskmeOffers, as they can help you score even bigger savings. So why wait? Visit AskmeOffers today to find the latest Willyum Spice deals and discounts. Don't miss out on the opportunity to save on your favorite Willyum Spice products - start shopping now and elevate your cooking game with these amazing spices and seasonings!\n\nShow more.. Hide\nEditorial notes\nAutomatically Apply 1 Willyumspice Coupons in Just One Click!AskMeOffers Extension: Auto-apply and get the best coupons at checkout!\n\nTop Coupons & Offers for Willyumspice\n\nCoupon TitleCoupon DiscountCoupon Code\nGet upto 70% Off using AskmeOffers exclusive code70% Off Coupon CodeASKMEOFFERS\n\nWillyumspice Coupons Store FAQ's\n\nWhat type of spices does Willyum Spice offer?\n\nWillyum Spice offers a wide range of high-quality spice blends, including traditional and exotic options that cater to a variety of culinary preferences.\n\nHow can I redeem a discount on Willyum Spice products?\n\nTo save on your Willyum Spice purchases, make sure to check AskmeOffers regularly for the latest deals, offers, and promo codes. Simply apply the provided codes during checkout to enjoy discounts on your order.\n\nDoes Willyum Spice offer organic spice options?\n\nYes, Willyum Spice provides a selection of organic spices sourced from premium suppliers to ensure the highest quality and freshness.\n\nAre there any special deals available for bulk spice purchases?\n\nIf you're looking to buy spices in bulk, keep an eye on AskmeOffers for exclusive deals and promotions that can help you save on large orders from Willyum Spice.\n\nHow can I stay informed about Willyum Spice's upcoming sales events?\n\nBy subscribing to the Willyum Spice newsletter and following AskmeOffers for the latest updates, you'll be among the first to know about any upcoming sales, clearance events, or exclusive offers.\n\nCan I request custom spice blends from Willyum Spice?\n\nWillyum Spice offers custom spice blending services for customers looking to create unique flavor combinations tailored to their specific preferences. Contact their customer service team for more information.\n\nDo I need to create an account to place an order on Willyum Spice's website?\n\nWhile creating an account is not mandatory, it is recommended for a more streamlined shopping experience, order tracking, and access to exclusive deals. Consider signing up to make the most of your Willyum Spice shopping.\n\nWhat payment methods are accepted on Willyum Spice's online store?\n\nWillyum Spice accepts various payment methods, including credit cards, debit cards, and online payment gateways, ensuring a convenient checkout process for customers.\n\nHow does Willyum Spice ensure the quality and freshness of their spices?\n\nWillyum Spice prides itself on sourcing the freshest and highest-quality spices from trusted suppliers, implementing strict quality control measures to guarantee freshness and authenticity in every product.\n\nCan I return or exchange spices purchased from Willyum Spice?\n\nIf you are unsatisfied with your purchase from Willyum Spice, reach out to their customer service team for assistance with returns or exchanges. Check their website for specific policies and guidelines.\n\nIs international shipping available for Willyum Spice products?\n\nWillyum Spice offers international shipping options for customers outside the US. Shipping rates and delivery times may vary, so be sure to review the international shipping information provided on their website before placing an order.\n\nHow can I contact Willyum Spice's customer support for assistance?\n\nIf you have any questions or concerns regarding your Willyum Spice order, products, or services, you can easily reach their customer support team by phone, email, or online chat. Visit their website for contact details.\n\nDoes Willyum Spice provide gift packaging options for spice purchases?\n\nFor customers looking to gift Willyum Spice products, consider opting for their gift packaging services, which add a special touch to your order. Explore the gift packaging options available on their website.\n\nAre there any ongoing loyalty programs or rewards for Willyum Spice customers?\n\nWillyum Spice values its customers and occasionally offers loyalty programs, rewards, or special discounts for returning shoppers. Stay tuned to AskmeOffers for updates on loyalty perks and exclusive deals for Willyum Spice customers.\n\nCan I find recipes or cooking tips on the Willyum Spice website?\n\nExplore the Willyum Spice website for a collection of delicious recipes, cooking tips, and spice usage guides designed to enhance your culinary experience. Get creative with their spice blends and elevate your dishes.\n\nIs there a minimum order requirement for purchasing spices from Willyum Spice?\n\nWillyum Spice caters to customers of all needs, whether you're looking to buy a small quantity or stock up on spices in bulk. Check their website for any minimum order requirements and shipping details that may apply to your purchase.\n\nHow can I track my order once it has been shipped by Willyum Spice?\n\nOnce your order has been dispatched, Willyum Spice will provide you with a tracking number to monitor your shipment's progress. Use the tracking information provided to stay updated on the status of your delivery.\n\nDoes Willyum Spice offer seasonal spice blends or limited-edition releases?\n\nStay tuned to Willyum Spice's website and AskmeOffers for seasonal spice blends, special releases, and limited-edition products that cater to different holiday seasons or culinary themes. Don't miss out on these exclusive offerings.\n\nAre there any cooking classes or workshops hosted by Willyum Spice?\n\nKeep an eye out for cooking classes, workshops, or culinary events organized by Willyum Spice to enhance your culinary skills and spice knowledge. Check their website and social media channels for announcements and registration details.\n\nCan I subscribe to automatic spice refills or monthly spice boxes from Willyum Spice?\n\nFor added convenience, Willyum Spice offers subscription services for automatic spice refills or curated monthly spice boxes delivered to your doorstep. Explore the subscription options available on their website and spice up your pantry.\n\nDoes Willyum Spice provide nutritional information for their spice products?\n\nFor customers seeking nutritional details or ingredient information, Willyum Spice ensures transparency by providing clear and accurate nutritional information on their product packaging and website. Review the labels for specific details.\n\nHow are Willyum Spice orders packaged for shipping?\n\nTo preserve the quality and freshness of", "num_tokens": 2048} {"category": "common_crawl-food_and_dining", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-food_and_dining/part-00-00000.npy", "text": " mixing well after each addition.\n\n 6. After all of the flour is added and mixed in, let sit in bowl for 10 minutes.\n 7. When the dough has risen, stir down with a large spoon. If making in a stand mixer, turn the machine on low for a few seconds until the dough is deflated, and push dough to bottom part of bowl with a spatula. \n\n 8. Repeat 5 times, every ten minutes, for a total of 60 minutes of rising and then punching (or pushing) down.\n\n 9. Divide the dough in half. Roll each half of dough in a 9x12 rectangle on a floured surface.\n\n 10. Roll the dough up like a jelly roll (long way). Place the dough on a greased baking pan (jelly roll pan), with the seam side down. Both loaves will fit on one pan.\n\n 11. Score the bread across the top 3 or 4 times, and brush with beaten egg (if using).\n\n 12. Let rise for 20-30 minutes in warm place.\n\n 13. Bake at 375 for 20-25 minutes in lower half of oven, until golden brown. Or you may bake at 350-375 convection for 18-20 minutes until golden. \n\nRecipe Notes\n\n 1. Tips for humid environment: If you live in a humid environment, you may need to either add more flour than called for or you may reduce the liquid in the bread by 1/2 cup. Instead of 2 cups hot water, use 1 1/2. While living in Spain (humid environment) , I use 4 cups bread flour and about 1-2 cups all purpose flour and about 1 1/2 cups water (not including the 1/2 cup of water used to proof the yeast). So, the water total is about 2 cups instead of the 2 1/2 cups called for in the recipe. This recipe was developed in Utah, where the elevation is often 4000 ft and very dry climate!\n 2. After reading comments from people who have expressed frustration with the bread failing (the exception) I decided to change the water from \"2 cups hot water\" to \"2 cups warm water\". I believe part of the issue was hot water was added along with yeast, and the hot water was killing the yeast. Warm water works. I use warm or hot water right from the tap. \n 3. I add  bread flour in place of the all purpose flour. When doing this, I use 4 cups bread flour and 1-2 cups  All Purpose flour. Watch the amount of flour if using  bread flour. In some cases, you will need only 1 1/2 cups of additional All Purpose flour. Do not add too much flour, it will result in the dough being stiff and difficult  to handle.\n 4. I make this in my KitchenAid stand mixer. Use the paddle attachment until you have mixed in the first 3 cups of flour. Then switch to the dough hook to mix in the final 3 cups of flour.\n 5. I often forget the mixing down step (5 times every 10 minutes) and have never had a problem with the bread turning out perfect. Just make sure the bread raises in the bowl until it has almost doubled in size, or for about 45 minutes. Then proceed to the rolling out step. If you skip mixing down every 10 minutes, the bread will not have quite the same texture. Mixing down the dough will help develop the gluten and create the texture that is slightly chewy, but still light!\n 6. If you have a convection oven, use the convection setting. Bake at 350-375  convection for about 15-20 minutes. The convection setting turns out the prettiest loaves of bread!\n 7. This bread is best made with Extra Virgin olive oil. \n 8. In Spain, my oven was very small and it works better for me to shape the dough into 3 smaller loaves. The bake time is about the same! I got used to shaping into three smaller loaves and now almost always shape into three loaves. I bake at 375 convection for about 18 minutes. \n 9. The egg wash or glaze is not necessary. Egg wash will produce a shiny instead of a matte finish on your loaves. You will need about 1/3 of the egg wash for this recipe. Lightly brush the loaf with the egg wash before it starts to rise after shaping.<|endoftext|>Best Indian Grocery Store Online Spain - Dookan.com\n\nSpain is known for its diverse landscapes, from the Costa del Sol's sunny beaches to Andalusia's rolling hills and vibrant cities like Madrid and Barcelona. Spain's culinary scene is vast and varied, with a rich cultural history that blends different influences. As Indian cuisine continues to grow in popularity, the demand for authentic Indian groceries has also risen, catering to Indian expats and locals who have developed a taste for the vibrant flavors of India.\n\nDookan, Spain’s No.1 Indian grocery store, makes it easy to bring the authentic taste of India to your home. With over 250 trusted Indian brands and more than 2000 products, Dookan ensures you have access to everything you need for authentic Indian cooking. Our presence in 20+ European cities, including key hubs in Spain such as Madrid, Barcelona, and Valencia, allows for fast and reliable delivery.\n\nWide Range of Indian Groceries Delivered in Spain by Dookan\n\nDookan offers an unmatched variety of Indian groceries to cater to every culinary need. From essential spices and fresh produce to ready-made meals and traditional snacks, Dookan delivers a comprehensive selection that ensures you never miss out on your favorite Indian ingredients. Here’s a breakdown of the top categories and the wide range of Indian grocery products provided under each category - \n\nIndian Brands\n\nIndian Grocery Products \n\nWheat/Chapati Flour\n\nAashirvaad, Fortune\n\nWhole Wheat Atta, Multigrain Atta, 5kg, 10kg, 20kg Bundles\n\nBasmati Rice\n\nIndia Gate, Daawat\n\nPremium Basmati, Extra Long, Golden Sella, Everyday, Exotic Basmati\n\nSouth Indian Rice\n\nIndia Gate, Eco Life, Gajanan, Cauvery\n\nPonni Boiled, Ponni Raw, Sona Masoori, Surti Kolam, Idli Rice\n\nMisc. Flours and Flour Mixes\n\nAekshea, Annam, Heera, Pansari, Double Horse\n\nBarley Flour, Maida, Singoda Flour, Corn Flour, Instant Idiyappam Powder, Bajra/Pearl Millet Flour\n\nLentils & Whole Grains\n\nFortune, Udhaiyam, Tirupati, Priya, Pansari\n\nKabuli Chana, Rajma Chitra, Chana Dal, Urad Dal, Roasted Gram, Mixed Lentils\n\nGrains & Rice Derivatives\n\nAekshea, Aachi, Tirupati\n\nSooji Rava, Foxtail Millet, Little Millet, Kodo Millet, Rajgira Flour, Semolina, Corn Flakes\n\nSpices & Condiments\n\nWhole Spices\n\nAekshea, Pansari, Everest, India Gate, Swagat, TRS, Annam\n\nCumin Seeds, Sunflower Seeds, Sesame Seeds, Chia Seeds, Cardamom, Curry Leaves, Kasuri Methi Leaves\n\nGround Spices\n\nTRS, Everest, MDH\n\nCoriander Powder, Turmeric Powder, Chilli Powder, Cumin Powder, Black Pepper Powder\n\nSpice Blends\n\nMDH, Everest, TRS, MTR\n\nChat Masala, Garam Masala, Chicken Masala, Pav Bhaji Masala, Sambhar Masala, Rajma Masala\n\nCooking Oils & Ghee\n\nGRB, Lakshmi, Fortune, Idhayam, TRS, Parachute\n\nPure Ghee, Groundnut Oil, Sesame Oil, Coconut Oil\n\nCooking Aid\n\nTirupati, Pansari, Laziza, Key Brand\n\nTamarind, Jaggery, Edible Gum, Rose Water, Kewra Water, Jelly Crystals, Custard Powder\n\nDry Fruits & Nuts\n\nTRS, Aekshea, Tropic, Heera, Laziza, KRG\n\nPeanuts, Coconut Halves, Desiccated Coconut, Phool Makhana, Sultanas, Jaggery, Edible Gum, Almonds, Cashews\n\nInstant Food/Ready to Eat\n\nStreet Foods\n\nCharliee, Aachi, Tirupati, Priya, Pansari, Pran\n\nSev Puri, Golgappe Fry/Pani Poori Chips, Puffed Rice, Popping Corn\n\nTRDP Mario, Haldiram's, Parle, Britannia\n\nVarious Biscuits, Rusks, Toasts, and Nankhatai\n\nReady to Eat\n\nHaldiram's, TRS, MTR, Ashoka\n\nKadhi Pakoda, Choley, Paneer Tikka Masala, Dal Tadka, Sarson ka Saag, Dal Makhani, Pav Bhaji\n\nPapadum & Khakhra\n\nAekshea, Priya, Ganesh, Haldiram's, TRS\n\nPlain Papad, Urid Garlic Pap", "num_tokens": 2048} {"category": "common_crawl-food_and_dining", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-food_and_dining/part-00-00000.npy", "text": " Sriracha Lime Seasoning\nPinches of salt, to taste (optional)\n1 medium sized tomato – chopped into chunks\nFresh basil or cilantro – roughly chopped\n1/4 cup unsalted cashews or peanuts – chopped\n\n1. Cut zucchini and yellow squash with a spiral slicer – use medium blade to make thick “noodles”. Trim the noodles as needed to shorten.\n2. Heat oil in a wok or large skillet over medium-high heat. When hot, add in the minced ginger and stir-fry for a few seconds, or until fragrant.\n3. Add in the mushrooms and stir-fry for 2-3 minutes. When the moisture begins to evaporate, add in the bell pepper and continue to stir-fry for another 2 minutes, or until crisp tender.\n4. Add in the soy sauce, zucchini, yellow squash, salt, and Sriracha-Lime Seasoning. Stir-fry for about 2 minutes – tossing well to combine. Take care not to overcook. Finally, add in tomato chunks and give everything a quick toss. Taste to see if you need to adjust any seasonings. Turn heat off. Dish out onto serving plates, and garnish with chopped basil/ cilantro. Top with chopped cashews or peanuts, and enjoy!\n\n- If you are adding in more vegetables, with varying density, each vegetable will have a slightly different cooking time, and therefore will have to be added into the wok at different stages during the stir-frying process. For the less dense veggies, be sure to add them in last to keep that crisp tender freshness.<|endoftext|>'A jolly time at lunch' and other meals from the Wimsey stories\n\nMost of us who are addicted to mystery novels have a clear, unswerving picture of what goes on in England. Our research has been done by reading Agatha Christie and Dorothy L. Sayers and a handful or more of lesser authors.\n\nLife there is lived out in the country houses and Mayfair flats of aristocrats (or at the very least, the gentry), where most of the plots are advanced in conversation at interminable breakfasts and elegant luncheons.\n\nOccasionally a lowly criminal is brought in for spice, but largely the lineage of our literary companions could not be improved upon. Dorothy L. Sayers gives us the poshest backgrounds in her books featuring Lord Peter Wimsey , nobleman detective extraordinaire.\n\nTo celebrate these remarkable books written five and six decades ago, The Lord Peter Wimsey Cookbook by Elizabeth Bond Ryan and William J. Eakins (Ticknor & Fields, New Haven and New York, $10.95) has appeared with menus and recipes culled from dishes mentioned in the series. Drawings are by Francesca Greene.\n\nThe recipes show ''a preference for the simple delights of English cooking'' that the authors assure us was Dorothy Sayer's preference and by extension Lord Peter's.\n\nThe book is more for Dorothy Sayers fans than cooks, chockablock as it is with passages from her best books, many of them in the affected, rather silly voice of Wimsey.\n\nIn a chapter called ''A Bolt for the Supper Room,'' dinner at the Soviet Club is described in detail. According to Lord Peter, ''Cooking's beastly, the men don't shave, and the conversation gets my goat.''\n\nThen recipes for much of the dubious food encountered at the Soviet Club follows, Red Army Borsch . . . People's Black Bread . . . Comrades' Mutton Stew, and the authors give stage directions for a Soviet Club party of your own.\n\n''For authenticity's sake, try to make the setting in which you serve the food as oppressive as possible. You might, in fact, want to take your guests down to the cellar rather than into the dining room,'' the directions read.\n\nOther chapter headings are deliciously British upper crust of the black-tie-for-Monday-dinner vintage, including ''The Lord at the Breakfast Table'' and ''A Jolly Time at Lunch.'' Within each is a breakdown of specific meals that involved Lord Peter.\n\nElizabeth Bond Ryan and William J. Eakins coauthored ''The Lord Peter Wimsey Cookbook,'' obviously a labor of love with a good measure of humor.\n\nAccording to the book jacket, Mrs. Ryan has spent time following Lord Peter's paths through England and Scotland, talking with residents of the locations Dorothy Sayers used in her Wimsey stories. And Mr. Eakins is a graduate of Oxford University where Lord Peter fictionally spent some of his most halcyon days.\n\nTo be truly interested in this book, you should have read the Sayers novels or seen the television shows made in England with Ian Carmichael as Lord Peter.\n\nThe comestibles in most cases are either cooked or hunted up by Bunter, Lord Peter's man, who is the perfect gentleman's gentleman without blemish of excessive snobbery.\n\nFor example in ''Five Red Herrings'' - both the book and the television series - Lord Peter and Bunter motor to Scotland for a spot of fishing, only to become embroiled in a complex plot full of old friends and artists.\n\nTheir cottage is primitive, but despite the most basic necessities Lord Peter dresses for dinner and Bunter manages a marvelous menu. Included are a Correct Casserole of Beef with Vegetables, an Admirable Cheese Souffle and Boiled Potatoes which Bunter has washed under an outside tap.\n\nWell, you get the idea, it's a book to keep by the bedside more than on a kitchen shelf.\n\nThe food is more to comfort than dismay . . . a treacle tart and potato scones, breakfast curry which is kedgeree, Welsh rarebit, and a parsley sauce for fish.\n\nNeither roast beef nor Yorkshire pudding have been forgotten, so anyone after the best in new English food should look elsewhere.\n\nAlthough ''The Lord Peter Wimsey Cookbook'' is less serious about food, it manages to re-create the period atmosphere of the '20s and '30s when the principals were wealthy, titled, and said 'jolly' and 'topping' and - I honestly didn't believe it, but it's right there in ''The Busman's Honeymoon'' - ''Oh, frabjous day,'' quoted Lord Peter.\n\nHere's the Souffle Glace chosen by Lord Peter from a restaurant menu to cap a dinner that included such elegance as baked oysters and pheasant, in ''The Unpleasantness at the Bellona Club.'' Souffle Glace au Citron (Lemon Souffle) 4 eggs 6 egg yolks 11/2 cups superfine sugar Pinch of salt Grated rind and juice of 2 lemons 2 tablespoons (2 packages) unflavored gelatin 11/2 cups heavy cream Candied lemon peel, cut into thin slivers\n\nMake a paper collar for a 1-quart souffle dish as follows: Fold a long piece of waxed paper lengthwise. Brush with vegetable oil. Wrap it around the souffle dish and tie it on with string. The collar should rise about 4 inches above the dish.\n\nBeat together in a mixing bowl the whole eggs, egg yolks, sugar, and salt until mixture is light and holds its shape. This takes about 10 minutes. Add grated lemon rind. Dissolve gelatin in lemon juice over very low heat.\n\nFold dissolved gelatin and lemon juice into stiff egg mixture. Whip cream until stiff and fold it into mixture in bowl. Fill souffle dish with mixture and place it to set in freezer, about 1 hour, or in refrigerator, about 21/2 hours.\n\nTo serve, remove paper collar and decorate top of souffle with slivers of candied lemon peel. Serves 6.\n\nYou've read  of  free articles. Subscribe to continue.<|endoftext|>Cherry café ambulant - café de spécialité, bio, éthique\n\nCherry café - itinerary specialty coffee shop, organic, ethically sourced\n\nVisueel van project Cherry café ambulant - café de spécialité, bio, éthique\n36 dagen\nVoor €2.500\n\nCherry café ambulant - café de spécialité, bio, éthique\n\nMy project in 2 words\n\nI propose to create an independent coffee shop on a cargo bike in Rouen, Normandy. I will be stopping at key locations and cycling around town. I will sell specialty coffee roasted by local entrepreneurs who share my environmental and ethical values. The fresh coffee will be ground and brewed right in front of your eyes. You can order an espresso, an americano, a latte, a flat white, a cold brew and much more. Ideal for your morning commute or for a city walk.\n\nMy story and the origins of this project in Rouen\n\nMy name is Arnaud, I am a keen traveller and a bit of a dreamer. I spent a decade abroad for my studies and then my work. What I didn't expect to discover during this adventure was a real passion for coffee. Now back in my sweet France, I want to share my passion with you by creating an independent business as a specialty coffee on a cargo bike.\n\nNot a fan of coffee in my youth, I didn't appreciate its bitter taste. Then I worked in a Michelin-starred restaurant where I made espressos. I then associated this caffeinated beverage with productivity and team spirit. Finally, comes 2013; 6 months in Singapore. There I discovered incredible coffees, naturally fruity, some tasting of sweet acidity like an apple and others of chocolate and caramel. Those were drinks to enjoy and to experience much like you would with wine. It’s not a commodity coffee; it is a specialty product. Since then, I have been addicted!", "num_tokens": 2048} {"category": "common_crawl-games", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-games/part-00-00000.npy", "text": " soon joined that group and showed their support.\n\nPoets weren’t the only ones inspired by this form of expression in writing. This movement inspired many musical artists, such as Bob Dylan and the Beatles.\n\nAlthough the movement only lasted about a decade, it opened up a world for other artists that followed. It expressed and enforced the right to freedom of speech in writing. It allowed artists to go outside the typical “rules” enforced when writing, composing, or creating art.\n\nJOYSTiCK Ep. 5: ‘Minecraft Dungeons’ – Baby’s first dungeon-crawler\n\nBy: Daniel Kendle\n\nLog Entry No. 47\n\n“It’s been months since the nuclear apocalypse began. After the ‘Minecraft Story Mode’ menace failed to heed by missile launch, it grew into a virus-like form, overtaking any poor being it touches. The lands around me are ravaged, the entirety of the US Midwestern-area decimated.\n\nNow I am forced into this bunker, surrounded by both strangers and family alike. I feel cold, callous, like all of this is my fault. In reality, it isn’t, but that doesn’t lighten my heart.\n\nTalking to others, I have discovered a way to vanquish the vile beast that stalks these lands. Ever since I’ve written that review, I’ve never wanted to touch my school iPad again. But now with this new information, I feel compelled to destroy the ‘Minecraft Story Mode’ menace, once and for all.\n\nUsing the creature’s DNA, scientists have found a closely-linked relative on its branch of the evolutionary tree. It’s been reasoned that reviewing this “cousin” could somehow allay the menace’s madness. And if it’ll save us all from impending starvation, that’ll be good enough for me.\n\nAfter saying goodbye to Mother and Father, I’ve set out across the ruined ‘scapes in order to find this other title and review it. Everything now has an ugly tint to it, and it disgusts me personally.\n\nThis journey shall take much time; I’ll be seeing the leaves fall once this is all over. But as I watch the heavens for this monster, I creep closer to the goal of rebuilding this world.”\n\nHello hello, welcome back to JOYSTiCK, the HPSH serial that enjoys reviewing and exploring video games. On the docket for today is ‘Minecraft Dungeons’, another spinoff from Mojang, the creators of the base game. The difference between this and ‘Minecraft: Story Mode’ is that one of these games is actually pretty good. Impossible, I know.\n\n‘Minecraft Dungeons’ was released on May 26th, 2020, originally being scheduled to release in 2019 onto PC, before being further expanded onto Xbox, PlayStation and Nintendo consoles, and onto Steam in 2021. It’s safe to say that this is a game that was meant to be played across many platforms. Of course, this also means that ‘Minecraft Dungeons’ supports cross-platform play, allowing people to play together even with different consoles.\n\nGenerally receiving favorable reviews, the consensus on the game was that it was a fun, charming experience, though lacking in much depth. Companies like Gamespot and IGN gave ‘Minecraft Dungeons’ 7/10’s each. The game reached over 15 million players as of February 2022. Also, 6 DLC packs for the game were released over the course of a little over a year.\n\nAs mentioned above, ‘Minecraft Dungeons’ has a very fun gameplay loop, even if it is comparatively shallow against other dungeon-crawlers. Though in order to talk about combat in this title, we should probably discuss ‘Minecraft’s’ very controversial combat system.\n\nAs of the 1.9 update back in 2016, the base game’s approach to fighting changed dramatically from previous versions. Before, players attacked with a sword in quick succession, not having to worry about things like recharging between hits and timing attacks. There was also sword-blocking, which allowed players to decrease the damage taken if held.\n\nBut then, it all changed.\n\nThe most controversial addition came with the sword’s new “sweeping” attack. No longer could you repeatedly spam-click opponents, now you had to swipe, pause, then swipe again, waiting for a partially-invisible meter to fill up again. While this was great for PVE (Player Versus Entity) combat, this harshly degraded PVP (Player Versus Player) combat.\n\nAxes also got “upgraded.” Before they weren’t very useful in a fight, doing worse than a sword. However, the ax’s power EXPLODED, with the stone ax, the second-worst ax in the game, doing 9 – yes, NINE – hearts of health, the same as a diamond sword, the second best sword in the game. It’s nuts.\n\nFinally, shields replaced sword-blocking. While probably the least controversial of all these additions, it still has its problems.\n\nSword-blocking was fair. Hitting a button on your keyboard at the right time halved the damage taken, acting as a way to shrug off some hits. Now, you may be expecting shields to be useless by how I’ve been wording this, but it’s actually the opposite. Shields in ‘Minecraft’ make you a GOD.\n\nShields, for one thing, let you not take ANY damage from an attack. Swords blocked around half, which was fair. But when you hold up this wooden board you can negate all of an attack’s power. This would be fine if, say, the shield had a long cooldown between uses. It doesn’t though so… yeah. It’s basically a way to make you invincible, even if it probably wasn’t made for that.\n\nOutside of those changes, combat in the base game of ‘Minecraft’ is pretty simple, with the complexity coming from putting “Enchantments” onto gear, acting as modifiers. Weapons include swords, bows, axes, crossbows, tridents, and if you’re feeling quirky, TNT and throwable potions. There’s also armor and shields, the latter mentioned before.\n\nSo, now with that section out of the way, let’s discuss ‘Minecraft Dungeons’ combat, and how weirdly simple it is.\n\nIn ‘Minecraft Dungeons,’ have 2 main weapons: a melee and ranged pair. There’s also 3 slots for “Artifacts” that give you special abilities. Finally, there’s been a decrease in armor slots, going from 4 (helmet, chest plate, leggings, and boots) down to one unified armor set. No shields, no invincibility.\n\nThis is boring.\n\nWhile each piece of gear you find has unique properties, your variety of ways to deal damage is lame. There are probably hundreds of different gear available, but each functions in a largely same-y way. Armor gives you a higher health total, melee weapons let you attack close-up, ranged weapons let you attack with arrows. Artifacts are cool, but there’s far less of them, and you can’t enchant them, unlike armor and weapons.\n\nAh, Enchantments! They’re actually alright; each piece of gear can have up to 3 total enchantments on it at once, with 9 to choose from. They generally add interesting modifiers to your equipment. You can have something useful like Protection, which gives you even more HP, something stupid like Explorer, giving you a minuscule amount of HP for every 100 blocks crossed, to something dumb but fun, like all the enchantments that let you attack monsters with bees.\n\nSo, now that I’ve given you a run down of your available arsenal, let’s look at what dungeon-crawling is like in this game. You’re given an arcade-style map of possible locations to run through, each level being around 20 to 30 minutes in length. Pick one, adjust the difficulty slider to how hard or easy you want it to be, and head on in.\n\nUpon running though a level, your first way to attack is with your melee weapon. Simply press or hold a button and you’ll let loose an attack, whether it be from a sword, mace, or great hammer. Every weapon in ‘Minecraft Dungeons’ has different speeds of attacks, with something like the Gauntlets having a lightning-fast flurry of punches, or the Anchor being so slow it hurts to use. This is a problem I have with weapons; some are just way too good, and others suck. Slow weapons are generally worse for wear than something that can dish out damage at a steady rate. While quicker weapons usually deal less damage per hit, you’ll never really notice this due to how easy this game is.\n\nThe first main level you pick, Creeper Woods, has enemies go down in 1-2 hits, max. Some more armored creatures take more, but that’s honestly just an exception. Like, yeah, mowing through enemies is part of the dungeon-crawling genre’s appeal, but you’ll normally only be able to kill 1 monster at a time without any Enchantments, so it’s basically just a slow-moving, sluggish system where you’re able to slay anything with a flick of a button. Lame.\n\nRanged combat isn’t much better. While you do have some fun in trying to manage your arrow supply, you never need to worry in the early game, as you can get arrows in the hundreds. I’m not lying when I say I’ve gotten over 1,000 arrows in my inventory at once. Using a ranged attack has you use 1 of these projectiles, streaking towards the opponent. These generally let you approach battles without having to get up close and personal.\n\nAside from that, artifacts add a little randomness to your experience. Some rely on souls, a collectible from fallen enemies. Filling up a bar lets you use ultra-powerful artifacts. Most don’t need", "num_tokens": 2048} {"category": "common_crawl-games", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-games/part-00-00000.npy", "text": " as well as the builds they try to create in the process.\n\nBattle-Brothers-Gameplay-Review-Stat-Blocks Battle Brothers Review - A Proper Challenge\n\nGet used to these stat blocks, you will be seeing them a lot.\n\nOther options also come into play. Taking on contracts builds your renown, which makes your company more famous in the towns and cities you visit. Some contracts are simple escorts or bandit raids, while others have you working for nobles or helping fight in a war against invading orcs, undead or other noble houses. If that doesn’t sound up your alley, you can take up investigating old ruins and abandoned farmhouses for treasure and fighting the enemies within for quick experience.\n\nDespite the large number of options presented to you, the battles do begin to blur together after a while. Often when it comes to a fight, enemy troops will charge your front line, especially if they outnumber you heavily. Enemy troop types are not often that varied in battle – you fight a variety of brigands, orcs, goblins, and undead throughout the game, but they rarely, if ever, mesh together in different combinations, save for tougher “boss” fights found in the later stages of your campaign. The contract jobs are also not as varied as you would hope, almost always combination five or six different archetypes for varying reward and difficulty. This does make the game repetitive in the long run.\n\nDespite that, the monotony is not necessarily a bad thing. Tough fights in of themselves are big rewards in Battle Brothers. Whether you’re trying to get through a long, difficult battle against a necromancer and his undead army or keeping an invading orc warband at bay, you’ll find plenty of reward from the in-game riches and your own personal satisfaction. Titles like Dark Souls and Salt & Sanctuary are often heralded for their difficulty and design, but Battle Brothers offers the same feeling of achievement without the nagging issues of purposeful death. You will die in Battle Brothers, but it will mostly be your fault due to poor tactics or contract choices.\n\nThe game is also complimented by a lovely orchestral soundtrack. From uplifting folk tunes to more sinister, disturbing battle music, the duo Breakdown Epiphanies should get a ton of credit for their work on the game’s musical score. The sound effects and overall design is very well polished, especially when compared to most indie titles on the market today. Overhype Studios should be commended for their attention to detail found in their games presentation and sound design, something that is often sadly lost in the shuffle when developing an indie game.\n\nOverall, Battle Brothers is a solid, exhilarating experience that might turn away some players due to its difficulty, but attract others because of its challenge. The strategic options and statistics are complex, the gameplay is tough but not overly difficult. At its heart, the game provides a deep, tactical experience that is both challenging and rewarding for players to enjoy.\n\nOur Battle Brothers review was conducted on PC with a code provided via our partners at GOG. It is also available on Steam.\n\nMore About This Game\n\nBattle Brothers is a solid, exhilarating experience that might turn away some due to its difficulty, but attract others because of its challenge.\n\n • The Right Amount of Challenge...\n • Complex Mechanics that Make Sense...\n • Excellent World and Sound Design\n • Appropriately Brutal and Bloody\n\n • ...that Might be Daunting for Some.\n • ...Monotonous Contract Quests and Battles<|endoftext|>The future is a special place from Megaman X:World Of X where the player gets there when he is level 32.\n\nThe future is the worst place from MMXWOX.The player originally should get in the time when the war still not began but the system had a defection and sent X to the time when Lord Fuse nearly conquered the earth.The earth is in horrible situation in future.Fusions got stronger, meaner and got some furthermore fusions.Everytime the player leveled up, there was a cutscene that shows Lord Fuse warping and destroying a part of a zone, sometimes, important parts.There remain little rests.Beyond the main areas, there are small and sometimes big islands, rests of the destroyed lands.\n\nWhen the player is level 32, he must go into the future and do all rest of missions until he gets level 36 in future, but can everytime use the time machine to go into past (Most of times just for missions).\n\nIn future, Planet fusion is closer to earth than in past and its obiviously bigger.\n\nBefore the get-in-the-future mission, there started an assault to all zones where the humans could form resiting armies, the assault ordered by none other than Lord Fuse (The reason X was sent to future may be cleary now).\n\nIn future, only the suburbs and some donwtown zones left, and as said by people, the rest of zones including the Palisades, Wilds, Offworlds, Districts have not survived the assault.\n\nIn the future,almost all terrain is infected, every zone is connected by fragile bridges ready to fall in every minute.Every zone stands like a island in a grand fusion matter lake.\n\nAs said by Dr. Ivi Rottnik, the Darklands absrobed all zones getting more stronger and this is the reason why so less zone survived.\n\nIn the grand assault, the humans did not snatded back, they fought the fusions and lost much people (the reason why the future did not has all NPCs from past).\n\n • Its still unknown if the humans won the assault.Mostly lost it beacause the future is so worse.\n • As said by Iris and Lord C, the assault ended whit a draw but humans got too tired and fusions started another assault wich humans lost.\n • Century Man appears as a cameo in the Unknown region called \"Nowhere\" (There's a portal to that area in one of the Downtown areas) and when speaking to him, he states that there are many alternate continuities and that there are many different paths the future can take. He later says that he is from a different timeline, where the Fusions, and thus, the war, never existed.\n • If you do seven special future misions from Iris, she will unlock a Ultra rare mission.\n • At a mission in future, Dr. Ivi sents you to talk to Zara, and he will say ``Oh man, Hurry up!And go talk to that pink chick, Oh man, how I love he...YOU DIDN`T HEARD ANYTHING OF WHAT I SAID PREVIOUSLY``, suggesting that Ivi could have a crush on Zara, However Zara knows and says ``Yuo was sent by that yucky old man?!Get serious, nobody would deal whit him``.\n\nAd blocker interference detected!\n\nWikia is a free-to-use site that makes money from advertising. We have a modified experience for viewers using ad blockers\n\nWikia is not accessible if you’ve made further modifications. Remove the custom ad blocker rule(s) and the page will load as expected.<|endoftext|>Who Did Kratos Kill?\n\nWhat can kill Kratos?\n\nThere are many people who are capable of beating kratos.\n\nLet’s start naming some of the major ones.\n\nOdin, Loki, Thanos W/ The Gauntlet, Darkseid, The-One-Above-All, Appcalypse, M.O.D.O.K.\n\nI’m probably gonna get bashed for that Loki and MODOK but those 2 are super persuasive and we all know kratos falls to persuasion..\n\nDoes Kratos kill Aphrodite?\n\nAphrodite is one of the few gods not killed by Kratos, and one of very few to admire him. … Aphrodite appeared in the God of War II game booklet as one the gods who appear in the game, though she actually doesn’t.\n\nWho is father of Kratos?\n\nZeusKratos (God of War)KratosFamilyZeus (father) Callisto (mother) Athena (half-sister) Deimos (brother) Jörmungandr (grandson)SpouseLysandra “Faye” Laufey the JustChildrenCalliope (daughter) Atreus (son)RelativesAres (half-brother) Hercules (half-brother) Perseus (half-brother) Gaia (grandmother)15 more rows\n\nIs Kratos immortal?\n\nDisregarding some of these plotholes, Kratos is not immortal. None of the Gods are truly immortal, perhaps it is his human side that saves him by landing in Hades. Kratos was even turned mortal at the same time he was ran through by Zeus’ sword.\n\nWho killed Zeus God?\n\nIn Greek mythology, Zeus is not killed at all. Zeus is king of the Greek gods and goddesses, a role he takes on after defeating his own father….\n\nDoes Kratos regret killing Zeus?\n\nKratos regrets killing Zeus because he wishes he had just walked away and gone on to live his own peaceful life, like he did anyway. Yes, the gods were terrible to him. But killing them didn’t undo the things they did, it was just senseless revenge, giving in to his anger, causing more pain to add to the cycle.\n\nWho killed Odin?\n\nMangogOdin has also died three times in defense of Asgard. On the first occasion, Odin is killed by Mangog, and later revived by Hela.\n\nDid Kratos kill Athena?\n\nShe returns at the end of the game, being killed by Kratos on accident. Athena reveals to Kratos that Zeus is Olympus, and that he is the Ghost of Sparta’s father before dying.\n\nIs Baldur stronger than Kratos?\n\nAbout the serpent, Baldur knocked him out because he couldn’t even move or defend himself with Kratos and Atreus inside him. Baldur also is Invincible and Kratos had no idea he was a God. …\n\n", "num_tokens": 2048} {"category": "common_crawl-games", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-games/part-00-00000.npy", "text": " interdisciplinary knowledge, tho not required.Know that you know whom you are dealing with, here it comes. The game.Set in an unknown time, this will be a modern, competitive shooter that required more than just good aim and some tactics. You will be able to literally reach any spot of the map so there is no time to rest.The concept is mostly inspired by Brink, Dirty Bomb and Call Of Duty, tho it will be unique.Our goal is to release this thing F2P once it reaches an early beta state.We are not going for pay to win concepts or anything, the only thing people will be able to buy is skins.There will be operators like in Rainbow Six Siege so that there will never be a round like one before.If you are interested to join us or want more info, just join our server on discord.https://discord.gg/JcDY85cAlso, here are snippets of the game.https://gyazo.com/c735906f975b3ba8e0c83023745f66dbhttps://gyazo.com/aac5e10442830e7c508dcb4994a02119The model is currently a placeholder downloaded from the asset store but we are working on own weapons, which is why we need more modelers, too.\n 23. Issue: Unity Collaborate\n\n Description; I am a designer currently working on the video game Colony 7. The purpose of the blog is to address the issues of the game's development and to address any solutions or alternative methods to better prepare for the arrival of inconveniences in the future or how to avoid them entirely. The blog also addresses my individual performance. The team is made up of two programmers and four level designers but all do not necessarily combine roles during development. The game is being developed in Unity (2017.1.1f1 onward) with a development time of 13 weeks for a college allocated task. Unity Collaborate was the bane of my team's existence is what I believe I should begin with. After having solved recent issues with it beforehand, the solutions my team put in place to avoid any mismatching between project versions stopped when too many members were altering the project version they had and upload their own copies. Much like my personal difficulty with MagicaVoxel once they had finished and prepared their changes Unity Collaborate would update the initial copy but would delete all changes made. Two days of both programming and design implementation were lost to this error but were quickly implemented again after the error was noticed. We found that using only two machine had no effect on the project but once three were using Collaborate then the errors would begin to appear. As our new precaution only two team members were allowed to work on the project when intending to use Collaborate to upload new additions for Colony 7. Using Trello to update our organised production we could focus on when changes were made and communication over Slack was more than efficient to tell the team when Colony 7 needed to be updated on all machines. Given my little interaction with the current copy of Colony 7 I did not have much to do with the solution but I was able to refer everyone to the similar issue with MagicaVoxel and the team now checks that they can upload without any halting progression before any major or big implementations are started. More unexpected halts in progression will be addressed with future blogs throughout Colony 7's development time. Thank you for your time and feedback is appreciated. Colony 7 Designer.\n 24. Freakman 1.2\n\n Winter is almost here, so we added new chapter in game with winter theme. There Will be new levels added on weekly bases. Freakman is available on Google play; https://play.google.com/store/apps/details?id=com.zeroSkills.Freakman\n 25. The Battlecruiser is a game about building a gigantic space battleship from scraps. Construct, adapt and protect your mothership to fly away from dying world. Engine: Unity3d Genre: Exploring/Action/TD Facebook Subscribe to newsletter Twitter<|endoftext|>When it comes to the horror genre, there’s nothing quite like virtual reality to keep you on the edge of your seat. As horror aficionados here at The Elite Institute, it normally takes a lot to give us a fright but the heightened immersion inherent to the platform certainly can unsettle us at times.\n\nThat being said though, virtual environments still aren’t completely realistic and – as such – there still remains a certain degree of disconnect that inevitably dampens potential frights.\n\nBut what if the world wasn’t so unrealistic and instead happened in your very own real-life home? Could that end up being the ultimate terrifying experience?\n\nAs you may have gathered from the opening, the premise of Hauntify revolves around utilising the mixed reality functionality of the Meta Quest 3 to create its various scares. Rather than being room-scale though, it’s more house-scale as it encourages you to use the space setup to map out your entire house so that it can plop its ghouls all around your premises. With everything set up, your house gets plunged unto darkness and you’re left with just a flashlight to navigate each room looking for cursed artifacts to destroy.\n\nIt’s a great idea in principle, although your mileage with the game may vary depending on the size and shape of your living area. Our flat has a very simple layout with the main room at the end of the hallway and the adjoining rooms to the side, which ended up making the experience a rather straightforward affair. Being able to navigate every room in less than a minute hardly evokes the likes of the Spencer Mansion.\n\nBut, should you have a more complicated space – such as a house with multiple floors – then searching around for cursed relics and demons to vanquish could end up being rather thrilling. Sure, some of the game elements and creatures can look a bit underwhelming – but there are also a lot of creepy monsters too!\n\nIn fact, probably my biggest gripe with the game is that even with all the various content updates, it still feels like a proof of concept rather than something you’ll come back to again and again. The few gameplay modes available aren’t really all that varied and not all that much fun either. Wandering around your house taking care not to run into foul creatures is ultimately where the thrill lies, and everything else is just kinda… there. I wish that there would be some puzzles, or chests, or something to keep you invested. Even having a small gameplay loop focused on a few rooms where you have to keep the demons at bay would be nice, so long as it was a loop that made you want to come back. As it is though, it’s more something to show off to friends before uninstalling it to clear space on your headset.\n\nHauntify is a great concept, although admittedly your living quarters will probably determine how much fun you get out of the game. With a dull gameplay loop, enjoyment really is down to wandering around your ghoul infested house. There’s a great foundation here to build on though, so hopefully future updates or a sequel can help capitalise on the idea further.<|endoftext|>Ominous Designs 152\n\nprophesied-crash\n\nHi everyone.\n\nOn this fateful post election day, I am too depressed to be bothered writing an article so Ominous Designs will take a mourning day and hope next week will feel a tad better.\n\ntriumph-of-natureHere are the two designs I made earlier last night, hope you like them.\n\nSee you next week, play responsibly.\n\nMagic (Un)certainty\n\nWelcome to my blog #19764!\n\nIn this one, I aim to write some technical Magic The Gathering articles, focused on the limited format, and mostly about card design. This first entry will be about something else though. It will be about predictability, in terms of strategy.\n\nOne of the reasons we love magic is actually unpredictability. In 90% cases, no player can predict what will happen this turn, let alone the next one. We don’t concede until we are all the way down to 0 life or 10 poisons because we know we can pick an answer to the opposing threat(s), or get the occasion to punish a couple of bad moves from our opponent.\nOne the flip side, when we do have a plan to finish the game and the other side of the battlefield is all tapped out, it’s a great feeling because for once you know you’ve won the game before the other does.\n\nThe second best thing to future sight is awareness of what you know and what you don’t know. Here is a first simple list of easy concepts related to awareness of your knowledge:\n\n • Do not give up a game. Something might happen.\n • Bluff when you have room. You know you don’t have the card, the opponent doesn’t.\n • Make educated guesses on what your opponent might cast; remember it’s just a guess.\n • Mulligan. Opening hands can get better OR worse as you play them so you will lose 50% of games with a bad hand (not strict statistics right here but you get the idea).\n\nWhat I am talking about here, since most of time we can’t predict the future, we wan’t to make moves that are not too unpredictable. We don’t want to cross fingers. We want to play cards that we can count on, and if possible not top deck something infuriating or even “meh”. So what cards are predictably good? What are the criteria to recognize them?\n\nI’ll mention information, then choice, versatility, inevitability and finish with the gravy: immediate impact. Let’s go.\n\nIf you don’t know this already, brace yourself for a revelation: information is very valuable in Magic. And in most games, really. Especially when in magic, information about the", "num_tokens": 2048} {"category": "common_crawl-games", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-games/part-00-00000.npy", "text": "kong resmi dari hongkongpools. Dengan keamanan terjamin bagi bettor yang ingin bermain togel hongkong, kemenangan yang selalu dibayarkan penuh juga sudah terbukti. Modal bermain yang dapat dijangkau pasti benar-benar menolong beberapa togelers dari beragam kelompok untuk mencoba peruntungan tiap hari.\n\nThe Growing Online Lottery Market\n\nThe online lottery market has expanded with the increasing popularity and acceptance of the lottery game. The increased use of mobile devices and the proliferation of high-speed internet are also contributing to the industry’s growth. With these changes, consumers are increasingly adopting online lottery methods and embracing digital payments and banking technologies. In addition to providing convenience, these new online lottery methods also offer increased security.\n\nThe growth of the online lottery industry is also hindered by a number of fraudulent activities. With the increasing number of lottery players, the crime rate has increased. Moreover, some individuals are becoming addicted to this type of gambling and are committing illegal activities. In order to avoid such situations, online lottery users should make sure that their identity and financial information are protected.\n\nOnline lottery players can play lottery games anytime and anywhere. All they need is a computer and an internet connection. As long as the supertogel site is secure, they can play online. However, they should also consider how much they are willing to spend on their lottery tickets. The lottery website should be encrypted and the company’s policies should be clear.\n\nOnline lottery players can also play with their mobile devices. Not all online lottery websites are mobile-friendly, but there are many that are optimized for mobile use. For example, mobile lottery apps are designed with mobile users in mind. These apps also allow lottery players to play on the go. This makes playing the lottery more convenient and enjoyable for many lottery players.\n\nCurrently, the Illinois lottery has an online lottery subscription service that enables players to purchase lotto tickets online. This service provides access to Powerball, Mega Millions, Pick-3, and Pick-4 tickets. Only Illinois lottery subscribers can access these online lottery games. These smaller versions of the bigger lottery draws can be played for smaller amounts. The Illinois lottery website also offers lottery tickets for other games like Daily Lottery Games and Instant Games.\n\nCurrently, only seven jurisdictions offer online lottery services. In 2015, there were eight states with online lottery services, but one of them, Minnesota, stopped operating the service. In 2011, the Department of Justice clarified its position on the Wire Act, opening the door for states to offer lottery tickets online. Some states have their own online lottery apps, while others defer to third-party applications. States that do not offer online lottery services cite security issues as one of their reasons.\n\nThe online lottery market is relatively new in the US. Some states offer it, while others are in the process of deciding whether to open the market. Fortunately, legal online lottery services are becoming more common across the country. However, the US lottery is still relatively small, with only seven states operating online. And even in these jurisdictions, laws are changing rapidly.\n\ntogel singapore Sales\n\nPlaying the togel singapore is both convenient and fun. The convenience of not having to travel to your local lottery office allows you to purchase lottery tickets from the comfort of your home. In addition, you can play a large number of different games and even participate in international games. Many online lotteries also offer large prizes to players.\n\nWhile many states have legalized online lottery sales, not every state is ready yet. Illinois is among the states that have started offering online lottery ticket sales. In fact, they authorized it in July 2017. The lottery is run by NeoPollard Interactive and features online instant-win games, draw games, and Mega Millions games. It also offers players the option to purchase Powerball and Mega Millions tickets online using apps such as Jackpocket. In addition, players can choose their own numbers, which can be advantageous if they don’t have time to go to the store.\n\nThe online lottery market has expanded in recent years. For example, the Michigan lottery launched an online sales platform in January 2016. The website offers all of the popular draw games, including Powerball, Mega Millions, Lotto 47, and Fantasy 5. The Michigan lottery reported that they sold eight million online tickets in one week. Meanwhile, brick-and-mortar lottery sales broke records in December.\n\nThe online lottery game rules differ for each game. Some states require you to choose five numbers from 1-50, while others allow you to choose two from 1-10. The rules and requirements will vary, but most sites offer tutorials so that you can understand the rules before you play. In most cases, you can also play games online for free by using bonus codes.\n\nWhile playing the togel singapore is convenient, it’s important to choose the right site. Some sites charge additional fees that are offset by the convenience of the service. Those who use these websites should carefully read the privacy policies and terms of use. Moreover, they should inform players of the withdrawal policies and deposit options. With this information, playing the online lottery can be a hassle-free experience.\n\nSome state togel singapore are expanding their online presence. Although only a few states have authorized online lottery sales, more are likely to follow suit. Using an official lottery website will ensure that you can buy a ticket for every drawing. If you win, you will become a multi-millionaire. Of course, these jackpots are before taxes.\n\nOnly seven US states currently offer online lottery sales. At one point in time, eight states offered online lottery games. This was the case in 2011. The US Department of Justice’s 2011 opinion clarified that the Wire Act only applied to sports betting, and that individual states could regulate online gambling. With this, the online lottery has become the most common form of legal online gambling in the United States.\n\nThe lottery games on official state lottery platforms include instant win games, with top prizes ranging from $100 to $300,000. Players may buy up to 100 Mega Millions or Powerball tickets at a time to play the lottery online. The tickets for these games are valid for up to 104 consecutive drawings.\n\nTogel singapore legislation also challenge to the industry\n\nVarious forms of online gambling are available to people who want to try their luck. The easiest is sports betting, which does not require the download of any software. You just need to find a web site that offers betting togel singapore on any of the various sports and click on it to find out the upcoming events. Some gambling sites offer both types of gambling.\n\nHowever, there are a few things to keep in mind before making any financial transactions online. First, you must be aware of the laws and regulations that govern online gambling. Some countries have strict laws about online gambling, and it is not always clear whether online gambling is legal or not. Some websites are subject to strict regulations, such as the US Department of Justice.\n\nAccording to a study by the University of Connecticut, nearly 40% of people who gamble on the internet have a gambling problem. They were found to have poorer mental and physical health than nongamblers. Furthermore, internet gambling can lead to insomnia and disrupted sleep patterns. The researchers concluded that the prevalence of problem gambling is increasing.\n\nAlthough online gambling is legal in most states, some jurisdictions prohibit it. For example, there are restrictions on online sports betting. Hawaii and Utah have large populations of people with religious beliefs, and their citizens do not support  this activity. Other countries are deciding to ban online gambling altogether. If you live in a state that has legal online gambling, make sure to check with your local authority about the regulations.\n\nAnother factor to consider is the togel singapore payment methods available at online gambling sites. Online casinos will often offer a variety of deposit and withdrawal methods. Some offer more lucrative bonus options than others. It is advisable to join more than one online gambling site in your local area, as it will help boost your bankroll. In addition, online gambling sites offer bonuses based on the amount of money you deposit.\n\nHowever, despite the many benefits of online gambling, it is important to note that legislation can also pose a challenge to the industry. Many countries do not allow casinos to operate without licenses. In some countries, state gambling togel singapore monopolies make it impossible for foreign companies to operate gambling websites. Some countries do not even grant licenses to foreign casino operators, which makes it difficult to punish the players who lose money.\n\nThe US federal government allows online gambling, but each state has its own laws that regulate various aspects of online gambling. For example, some states allow online sports betting while others ban online poker. Luckily, these states are now beginning to legalize online casino gambling. Hopefully, the new laws will eventually lead to online poker platforms as well.\n\nOnline gambling started to gain popularity during the late 1990s. In 1996, there were only fifteen websites, while in 1998, more than 200 were operational. During this time, multiplayer online gambling was introduced. By 2000, there were about eight million active players. By the end of that year, the industry had more than $830 million in revenues.\n\nOnline Lottery Ticket Sales in the US\n\nAlthough the history of online lotteries in the United States is relatively young, many states are exploring the possibility of expanding their reach online. Currently, only a few states offer online lottery ticket sales, but many more are expected to follow suit. Players can visit official lottery websites togel hongkong to purchase tickets and claim winnings through secure online processes. They can also play games and promotions based on their favorite themes. They can also participate in national lotteries such as Mega Millions.\n\nPurchasing lottery tickets online can be", "num_tokens": 2048} {"category": "common_crawl-games", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-games/part-00-00000.npy", "text": " casino games 21\n\nThese are Four Noble Plants tiles.\nOnce you remove all pairs and clear the board you solve the mahjong solitaire!\nFour Seasons tiles are different.\nGood luck with your mahjong!There are four of each of these mahjong tiles on the board - choose wisely which ones to pair first.You can only remove a tile if it's open on its left or right side.There's only one of each, but any season will match another season!If a tile is locked from both left and right sides you can't remove.They will match one another, too!Feedback, look for a pair of matching tiles and click both to remove.\n\nPlay in full-screen, no downloads.'Celebra tu cumpleaños en Gran Casino Juárez!#A15 double-action pump (6.00/each) A medium sized plastic beste casino pa nett bingo hand pump for inflating the #260 or #321 balloons.#4, if you dont see a code or the casino isnt offering a code you want, contact the sites cashier and ask if other promotions are available.' Turn Hanson, Ph risperidone 4mg/url treatment multiple sclerosis.#1: Kakao skrev.#228;ltst du blackjack mit etwas wie ein ph #228;nomen leider.#C01 balloon oil spill live twister patch (6.00/each) Colorful embroidery patch.#5: Powerdude skrev.'Adventure' har 50 brett, 'Infinite' har uendelig.'His life was his spill pa nettet 500 family and when Donna died it was very sad.\n'Bør' i denne sammenhengen er dansk og betyr 'skal'.<|endoftext|>• Content count\n\n • Last visited\n\nCommunity Reputation\n\n1408 Legendary\n\nAbout Nelrick\n\n In the face of my shitty decisions.\n • Birthday 03/15/96\n\nProfile Information\n\n • Gender Male\n\nRecent Profile Visitors\n\n845 profile views\n 1. Once upon a time, the people of the dg mafia section were starving to death. The duelistgroundz kingdom was dying, and the mafia village took the biggest hit. Most of the people were dead, forgotten in the annals of history. The surviving ones were weak, far and few inbetween, they didnt possess the strength to survive the harsh year. But then came a cuttlefish mage riding a shewolf. He brought prosperity and memes, but not without a price. The villagers didnt care \"anything is better than suffering the harsh memeless winter\". And so the cuttlefish sacrificed himself to bring prosperity back to the land. However, the price was too steep... All the villagers had to sell their souls, the dead resurrected and adopted new personas. It was a clusterfuck to say the least. In an effort to save themselves, they committed the greatest sin. Going agaisnt the one true god. What remained was a husk of the former village. All the memes were stale, the pos rep didnt mean anything anymore because it wasnt hard to earn. All the conversations were cringey and stupid. But not everything was lost. A young rogue by the name of nelrick seeked to liberate the village from its curse. He embarked on a quest with 16 faggots to search for a way to remove its curse. But the journey hasnt been easy, some of us have lost their mind, we stepped to close to the truth of the world and got burned. But it wont stop me. I will free the village. THIS IS JUST THE START OF OUR STORY.\n 2. Its another 50 pages of meme episode Truly the worst dgz season\n 3. If you are alive tomorrow ill tell you.\n 4. unshield shield islickz\n 5. You felt rather strong about solsitce and mark, you are not convinced he is scum. So why havent you pushed the other 2?\n 6. It seems he didnt get any \"good reads\" in these 41 pages.\n 7. flips town*\n 8. I was also quote training him, but jazz beat me to it. Ill wait for his responses before i move on to the next one. (Do note that i still think jazz is scum, but its worth discussing me.'s actions, especially in a world where jazz flips scum)\n 9. tl;dr on me.: He starts by calling jazz stupid town but does a 180 and then votes him? kinda sketchy. He is a moron talking about his role, but that doesnt get us anywhere and even he said so. However, he says things like \"it doesnt help me scumhunt\" but literally does none of that in all 40 pages bar calling soltice out for joke posts and floating. The whole reason he went after mark is game mechanics. Why did you change your opinion on jazz? without even giving a reason. You said he was stupid, what changed?. Why dont you have anything to say about the rest of the players? Like where do you go if he flips town? Or even if he flips scum? Its like you have barely have any thoughts (piggybacking on psk, calling out a floater but ignoring the rest) Going after mark doesnt show anything indicative until his flip. If he is town, both scum and town could be pilling up votes for him, town needs to, but scum can piggyback on that. @Me.\n 10. Its 97% the same as what PSK say. I dont know what else to tell you. The bolded is not true. Both town and scum had reasons to push you and both town and scum could be in the people that voted for you. Its not indicative of scum because you gave us good reasons to suspect you. If you turn up town, like malcolm, said we will get no info on anyone who voted you even if it was the initial push because they can just claim it was warranted, and guess what, they would be right. Id rather look at the people who didnt vote you no matter your alignment.\n 11. I went throught 162 pages to look for memes and now i have to look through 38. sigh.\n 12. For scum, no matter what you say, the reason will never be good enough. That much is obvious. Jazz we dont need you to validate our opinion on you. You tried to discredit it, but the majority dont agree with you. Who do you think is a better target? The people pushing you? For what reason? And no, pushing you is not a good reason.\n 13. do i really have to put it on paragraphs? Ill do say that i dont think bouncing from target to target is scum indicative in your case, since that seems to be your town play. But you are calling everyone lynching scum which is throwing dirt on anybody to save yourself.\n 14. I dont remember any post from gemstone or gareth (i havent read any posts from them) ill be honest and say that after my drive by post i have been too busy defending myself vs mark and jazz while pushing jazz and calling mark an idiot. Ill go back and get back to you.\n 15. Jazz has acted pretty badly through the day. Malcolm pointing that we dont get anything from the people voting him is true. However, i think that people defending jazz are suspicious, no matter if he is town or scum. He has done some shady things. I dont see how you could defend him unless you really knew he was town (ergo the person is scum). My vote remains on him nonetheless. (so he is the best lynch unless someone has a better target) Both sophocles and kahu are my top targets for that. Thats where im at right now. Id like to hear who @Malcolm thinks we should lynch.<|endoftext|>How to Get Started With a Sportsbook\n\nThe sportsbook agen judi bola is a gambling establishment that accepts bets on a variety of sporting events. It has an extensive betting menu, offers multiple payment methods and offers excellent customer service. In the US, many states have legalized sportsbooks and are regulated by their respective gambling agencies. In most cases, you can deposit money at a sportsbook using traditional credit cards or online transfer services such as PayPal. Depositing and withdrawing are fast, easy, and secure.\n\nIn order to make the best bets, you need to have a clear understanding of the game’s rules and regulations. This will help you avoid wasting your money or worse, losing it all. The good thing is that there are many online resources available that can help you understand the basics of sports betting and how to make a successful bet. You should also learn about the different types of wagers, and how to place them correctly.\n\nTo get started with sportsbook, you should first find a website that meets your needs. There are many options out there, from white-label solutions to turnkey solutions. Choosing the right solution will depend on your goals and budget. For example, if you’re looking to build an online sportsbook from scratch, a turnkey solution might be the best option for you. This way, you can start earning profit as soon as possible.\n\nWhile a sportsbook is a fun and exciting way to make money, it’s important to remember that gambling involves a negative expected return. This means that you’ll likely lose money over time unless you have a strong grasp of the game’s rules and are prepared to take risks. To prevent this from happening, you should choose a sportsbook that uses the most up-to-date technology and has a reputation for treating customers fairly.\n\nIt’s also important to look for a", "num_tokens": 2048} {"category": "common_crawl-games", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-games/part-00-00000.npy", "text": " been buzzing with excitement ever since the crossover was first hinted at by leakers and speculated about on various platforms. Fans have eagerly shared their ideas for the crossover, including potential new skins and gameplay features. The enthusiasm for this collaboration has been fueled by the recent success of the Fallout TV series, which has brought the franchise back into the spotlight.\n\nUpcoming Collaborations\n\nThe Fallout crossover is just one of many exciting collaborations planned for Fortnite in 2024. Leaks have revealed that other potential crossovers include popular franchises such as Pirates of the Caribbean, Metallica, and possibly even One Piece. These collaborations are part of Epic Games’ strategy to keep Fortnite fresh and engaging by continually introducing new content that resonates with a wide audience​​.\n\nThe Fallout and Fortnite crossover marks an exciting new chapter for both franchises. By bringing together the best elements of Fallout’s post-apocalyptic world with the dynamic gameplay of Fortnite, Epic Games is set to deliver an unforgettable gaming experience. As the launch date approaches, players can look forward to exploring new POIs, unlocking exclusive skins, and enjoying innovative gameplay mechanics that enhance the Fortnite experience.\n\nPlease enter your comment!\nPlease enter your name here<|endoftext|>Boss Key Productions managed to score something special in Radical Heights, and yet the company still couldn't escape from controversy. A number of accusations have flown out that the game is pay-to-win.\n\nIGN is reporting that gamers have been criticizing Boss Key Productions for the inclusion of cash boosts and cash in the Founder's Pack. The controversy started over the inclusion of money in the Founder's Back. The way the game works is that you have to rack up money by playing the game, and it goes into your in-game offshore account.\n\nThe Founder's Pack allowed users to earn 10% bonus money after each match. The money would go into the offshore account of the player, giving them an extra bit of money after each round.\n\nObviously, many gamers felt as if this gave an unfair advantage to players with the Founder's Pack. Earning extra money by paying for the Founder's Pack is seen as a pay-to-win tactic by some gamers, even though Radical Heights does not allow gamers to purchase in-game money directly or to unlock new items with real money.\n\nBoss Key told IGN that the inability to buy items through a cash shop meant that the game was not pay-to-win, and that the game's ATM mechanic means that it's a risk/reward feature themed around attempting to get money out of the ATM while risking getting shot in the back.\n\nAs players earn money and items, they can head to the ATM to withdraw money to purchase better guns. According to Boss Key, utilizing the ATMs is risky business since it leaves gamers open for attacks while withdrawing money, almost like an inverse setup of the ATMs in APB: Reloaded.\n\nHowever, this still doesn't account for the fact that anyone who spends $15 for the Founder's Pack is still eligible to earn 10% more than other players for participating in matches.\n\nThis kind of unfair advantage is seen as paying to win since you do earn more in-game cash by paying for the Founder's Pack. It's hard to deny the in-game benefits, especially since the Founder's Pack very well could have included cosmetics or emotes or any other number of additions that were not game-affecting.\n\nAfter the blow-up over the pay-to-win criticisms, Boss Key decided to listen to the user feedback and opted to remove the money bonus from the Founder's Pack.\n\nThe company is hoping that there won't be any more complaints about pay-to-win features in Radical Heights, which is the second game that Boss Key has been working on after initially getting its feet wet with Lawbreakers.\n\nIn the case of Lawbreakers, things didn't turn out so well for the PvP deathmatch game, so Boss Key decided to put a cork in development for now. The company decided to refocus its efforts on the Battle Royale genre with Radical Heights after companies like PUBG Corporation and Epic Games hit it big with blockbuster titles such as PlayerUnknown's Battlegrounds and Fortnite. You can hop into Radical Heights right now as a free-to-play title available over on the Steam store as part of its run in Early Access.\n\nBlended From Around The Web\n\nHot Topics\n\nCookie Settings\nGateway Blend ©copyright 2018<|endoftext|>1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.\nDismiss Notice\nYoshi - 3DS Pedia\nSigning up for an account lets you communicate with other Nintendo gamers from around the world. Play games, ask questions, have fun and earn eShop credit along the way.\n\nAction replay for Pokemon and Animal Crossing\n\nNo. Just no.\n\n 1. StaticPaws\n Many people here have probably heard of Action Replay, a.k.a tool of destruction. If you haven't, well to put it simply, it's a hardware used for cheating. I know you can get it for ds and wii but I'm not sure if it's been released for 3ds yet.\n\n I know that action replays are old now, but there are still similar things out there.\n My advice is, never get an action replay or anything similar to it. Seriously.\n\n These are cartridges that slot into your consoles just like regular ds games and most people use them for hacking pokemon and animal crossing games. Obtaining shiny pokemon, rare candies, low level legendaries and editing the layout of animal crossing towns.\n\n It completely ruins the fun of the game\n Sure, It might start out being fun, but then you realize that you haven't actually achieved anything at all by beating the champion with your lv.100 6.IV shiny Arceus or by paying of the whole of your animal crossing mortgage with a hack.\n I used to have an action replay (I was 9, and stupid) and after a few months, my animal crossing wild world town looked exactly like this:\n which honestly is kinda fun at first, but then the novelty of it starts wearing down and you realise that you've wrecked your entire game. ._.\n It can corrupt your game\n For example, by using action replay hacks that allow you to catch other trainers's/ncp's pokemon, you can get a pokemon called a 'bad egg', if you get one, delete it straight away because when it hatches, it can permanently corrupt your game.;-;\n\n I hope I've convinced some people to never use hacks :3\n\nRecent Comments\n\n 1. Faithy\n 5/5,\n I wouldn't use it much but like if I have a path and a villager decided I'm moving right here, and I normally have no room to change the direction of the path to go around, I would use one, just not for stuff like bell spawning or House upgrades or anything game dulling like that, and I disagree on using it for games like Ocarina of Time 3D, like yeah one time I got through a boss and got the medallion thing and saved, quit, next day I had to re do the boss, but I wouldn't AR that..\n 2. Roy the specialist\n Roy the specialist\n 5/5,\n I actually broke a game while doing it but now it least I know it breaks the game\n 3. paceygym\n 4/5,\n Sometimes it can make stuff more fun and interesting but you do have to be careful.\n 4. dominiquet\n 5/5,\n have you heard of action replay powersaves for the 3ds\n 1. StaticPaws\n Blogger's Response\n oh yeah, I've heard of it...but I've never actually used one before :3\n 5. Ruby\n 5/5,\n The Action Replay cartridge is really delicate, so don't expect to use it a lot.\n 6. MathiasDrake\n 4/5,\n I can agree, but sometimes gameshark or AR codes create a fun experience, depending on the game. Platformers such as metroid or Mega Man, RPG's or anyone sort of open world games. It's interesting to see what stuff is STILL in the game data even though you can't see it.\n\n Some games have Dev rooms still hidden inside, I think Chrono Trigger is one of them. I know Zelda Ocarina of Time has many many secret rooms, new ones still being found to this day. I'm also positive there's a bunch of hidden things in games like Super Mario 64, Mario Sunshine, and so on. AR codes aren't all bad, depends on how you use them. Cheating with them just to cheat is pretty lame though\n 7. Easton\n 2/5,\n so I would use it to help me with pokemon\n 8. OopaMazo\n 5/5,\n My friend has Action Replay for the Gamecube (or something similar to it). Every time I go to his house, we just use it for Super Smash Bros. Melee in order to be able to pick from a variety of characters. Going back to what you were saying though, game cheats in general are kill joys, not just the ones found in action replay.<|endoftext|>Fortnite's Epic Comeback in Europe: A Tale of Legal Battles and Digital Triumphs\n\nAttention, Fortnite fans! Hold onto your battle axes and prepare for thrilling news—Fortnite is making a triumphant return to iOS devices in Europe! B...\n\nChantal Da Silva Jan 25, 2024\n\nAttention, Fortnite fans! Hold onto your battle axes and prepare for thrilling news—Fortnite is making a triumphant return to iOS devices in Europe! But before you start doing victory dances, let's dive into the rollercoaster ride of legal battles and digital triumph", "num_tokens": 2048} {"category": "common_crawl-games", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-games/part-00-00000.npy", "text": " just didn't include it now as the words [More information will be available when the sufficient prerequisites have been met] were not displayed before Noah.\n\nBut then, there was the first portion of the description that showed one the immense power an Architect of an Edict held!\n\nThe Origin Record of those traversing the Edict of someone else is made clear...along with the Architect of said Edict being able to actually obtain Comprehension and a.s.similation in the laws and daos they understood.\n\nNow, the main question was who the architect of the Nomological Edict of Samsara was! An even more important question was whether there was an Architect for it...or Edicts were similar to Daos I that there were Natural ones and Artificial ones that were only synthesized from powerful existences combining different Daos and Laws!\n\nThese questions were extremely important as they needed an answer very soon! If Noah had taken the Edict of a powerful Primordial as his Origin Record was laid bare right now…\n\n'Tsk…' his thoughts churned as he received no answers, but his Destiny and Fortune were calm as if this was not a major problem.\n\nSuch an advancement meant that either the fusion of Edicts and Laws that made Samsara was something natural...or something unknown was occurring with the Architect of this Edict!\n\nNoah's eyes shone sharply as a myriad of thoughts flowed.\n\nHe had to change his plans.\n\nHe had to raise his power even faster than its current rate, and that was saying a great deal of things!\n\nHe had already forged over two thousand Universes as they continued to rise slowly even now, reaching stages that others would reach after millions of years...or much quicker if they had Primordial Hearts within their hands similar to him.\n\nAfter he finished entirely absorbing all of the Universal Filament Cores, 6 Primordial Hearts, and even the newly gained Grand Primordial Heart from Halcyon, his number of Universes should spill over 10,000 as it would be over twenty times the number of Splendiferous Universes he had just days ago!\n\nThat was just how fast his pace of progress was! Other Daolords could not even compare when it came to this speed.\n\nBut Noah cared not for others as he only worried how he could make his already ridiculously quick pace even quicker.\n\n*** You are reading on https://webnovelonline.com ***\n\nWhen he arrived at such an answer, his eyes flashed as he saw a single glimmering path before him.\n\nHe let out a breath of excitement as he asked the Cosmic Core and Treasure slowly.\n\n\"The feasibility of the 9th possible Cosmic Dao?\"\n\nHe asked of the feasibility of one of the many Cosmic Daos he had them run possible simulations on, this 9th one having a unique name as it was unlike many of the others he was researching!\n\nThe monotone voice spoke out calmly as even it couldn't hide the hint of excitement within its voice.\n\nNoah felt his heart br.i.m.m.i.n.g with antic.i.p.ation after such words as he nodded and gave the go ahead to forge one of the last Cosmic Daos he could forge in a while. But he felt it was worth it, and something that would be much needed for the future to come if he wanted an even more ridiculous rate of growth!\n\n\"Then, let us proceed with the design of the Cosmic Dao of Loot.\"\n\n*** You are reading on https://webnovelonline.com ***\n\nPopular Novel<|endoftext|>2023-6-7\n\nWhew! Website contruction has mostly finished!! I'm quite happy with how it's turned out.\n\nLately, I've been playing a bunch of Taiko No Tatsujin: Drum and Fun, Splatoon 3, and Yakuza 3. I've also gotten myself a new keyboard finally, and it feels super nice to type on. It has RGB lighting, too!! Very worth the money I spent on it.\n\nI'm hoping that I can make some more bias sorters and some more blinkies soon... I haven't had as much of a drive for blinkies, but they're always fun to play around with. Maybe I'll work on whittling down all the VNs in my \"to-play list\" as well. We'll see!<|endoftext|>Harry Potter and the Half-Blood Prince\n\nThể loại:\nNăm phát hành:\n\nTwo years ago, I nearly pooped my pants. See, Harry Potter and the Order of Phoenix came out on the PC and it didn't suck -- in fact, it was decent. If you're just joining us, that's pretty much unheard of when you're talking about movie-based games. Now, with another H.P. movie bearing down on us, Harry Potter and the Half-Blood Prince is coming to your favorite videogame console. Can EA defy movie-to-videogame logic one more time?The answer is \"yes.\" And although it isn't the greatest game in the world, some simplified mouse controls actually make this title a fair bit better than the last outing and makes for a pretty fun game.\n\nIf you're interested in this title, chances are that you've already read the books and are awaiting the movie. Still, I'll do my best to summarize what's up this time around: Harry, Ron, and Hermione are back for their sixth year at Hogwarts School of Witchcraft and Wizardry, everyone's abuzz about the latest happenings in the world of He-Who-Must-Not-Be-Named, and Draco is up to no good. Sure, that sounds like every Harry Potter story, but this time things are really bad.\n\nIf you've read the books, you know what those bad things are, and if you haven't, this game really isn't going to explain what's going on. See, rather than have you play through the events of the movie, Half-Blood Prince just kind of uses them as touchstones. Sure, you'll participate in the big battles and see videogame cutscenes depicting key moments, but these events won't really be properly explained nor will they carry the appropriate impact. You're not here to play the movie; you're here to live in the movie's universe. \n\nWhat does that mean? Well, just like last time, you'll pick up the controller and become Harry in a fully realized Hogwarts. If it's in the movies, you can find it in this hallway-for-hallway recreation of the school. When you first start the title, sections of the building will be locked due to the latest You-Know-Who scare, but completing the game's events as they come quickly unlocks the place so that you can run around and do whatever you want -- which breaks down into the categories of making potions, flying, dueling, and exploring. \n\nMaking potions is probably the most inventive mini-game in the title and gives you 16 brews to create in your trusty caldron. While most of the game is played from a third-person perspective, potions put you into a first-person mode... with invisible hands. See, icons pop up on the left side of the screen and you choose the corresponding ingredient with the mouse. You'll grab a beaker, move it to the pot, and pour it in using the keyboard. As you get deeper into the game's potions, the steps to create concoctions such as Fertilizer and Wiggenweld multiply and become more complicated. You'll need to bring the cauldron to a boil, wave off smoke, make ingredients bubble before adding to the stew, and stir up the contents.\n\nThis potion stuff is pretty interesting. On the one hand, it's just a game of Simon Says, but it's actually quite challenging when you get going. Some of these elixirs have a really small window of success -- you need to pour/shake/stir until the concoction is a certain color -- and you'll need to be on your toes to hit the mark. Add on the fact that there's a timer that's counting down and losing extra seconds every time you screw up (like when you accidentally spill on the table or miss dropping a piece of dung into the pot), and it's going to be hard to pull off a five-star performance. Thankfully, if you do get rated one-star, you can redo a potion as many times as you like, but it's not necessary to progress; you just need to finish it in some respect. Sometimes it can be very difficult to know when you're about to pour or drop something, but the mode is still fun.\n\nAnother nice addition this time around is flight. In Half-Blood Prince, Harry's the captain of the Quidditch team, and as such, you're going to need to log some time on your broom. Rather than give you free rein over the world, flight is very controlled here. You're chasing the snitch and the camera is always heading in whatever direction the gold ball is. This means you're not really controlling where you're going, but you're controlling where on the screen you are -- left, right, up, down.\n\nWhat keeps this from being boring are star checkpoints throughout the match. You need to fly through these stars so that you keep time in your reservoir. If you miss a couple, the checkpoints will start going from green to red. If you miss a bunch, the red ones will expire and you'll have to restart the level. Basically, this is a timed race more than it is a Quidditch match, but it's still fun. Sadly, these things can go on a bit too long and it's a bitch to try and fit through the Quidditch goals when you have to, but it's still a fun experience overall and it looks good to race through the air and kick at other players trying to knock you off course. \n\nIf there's one thing Order of the Phoenix sucked at, it was wand-to-wand combat. There were a ton of spells, but", "num_tokens": 2048} {"category": "common_crawl-games", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-games/part-00-00000.npy", "text": " play. Crystals in Final Fantasy games can always do some anomalous nonsense or another. Sealing away an empire's chosen survivors beyond time and space until something causes them to re-emerge isn't outside of the realm of possibility.\n\nI personally prefer Khorvaire, on the whole. I feel like Sharn would be very close to a Final Fantasy VI-esque point if the Day of Mourning had arrived even ten years later and more of Cyre's technology had spread.\n\nYeah. I was in that thread. The Final Fantasy games are, indeed, Japanese RPGs. Something like Eberron with the tech curve pushed a little further up seems like a natural fit for a Final Fantasy-like game.\n\nIf the position of Sword Saint is once again unoccupied, I'll probably go for that with Mystic Knight Red Mage as the sub-job.\n\nI'm definitely interested. If someone's already set on Sword Saint, I think I'd be most interested in Gunbreaker.\n\nGM R0B0GEISHA wrote:\nEchos Myron wrote:\nQuestion: Is there any way of adjusting the quantity of Mech Skills on Comp/Con? I've only got my +2 Systems factored in. Also, are those two +1's explicitly for separate Mech Skills, or can I throw them both in one skill (other than whatever the +2 is in)?\n\nThis is actually a mistake on my part. Gonna make it a bigger font size to make sure people don't miss it.\n\nYour starting character gets +2 to one mech skill OR +1 to two different mech skills.\n\nWith respect to this, I've revised Lodestar to fit the rules and done away with the cumbersome 80+ MB form-fillable character sheet (though, I will be keeping and updating it on my end because I consider it useful).\n\nRevised Lodestar:\n\nAurelian-11 Kye-Fei (Kai)\nBackground: Super Soldier\nTriggers: Apply Fists to Faces +2, Assault +2, Get Somewhere Quickly +2, Take Control +2\nTalents: Combined Arms I, Duelist I, Skirmisher I\nStarting Gear:\n\"Cocoon\" Assault Hardsuit\nTerashima Katana \"Ryūsei\" [Medium A/C Melee Weapon]\nGMS T-1 High-Caliber Pistol [Light Signature Weapon, Kinetic]\n\nGMS Standard Pattern 1 Everest: Crimson Lotus\nSkills: Hull +0/Agility +2/Systems +0/Engineering +0\nMain Mount: Tactical Melee Weapon\nFlex Mount: Assault Rifle\nHeavy Mount: Heavy Charged Blade\n\nSystems: Custom Paintjob, Personalizatitons, Rapid Burst Jump Jet System, Pattern-A Smoke Charges\n\nA man in his mid-twenties with dark hair, blue eyes, and a somewhat dusky complexion. He has a handsome face and a lean and muscular build. His hardsuit is sleeker and slightly smaller and less bulky than is typical of its type, and he wears a standard gunmetal MSMC bomber jacket over it under most circumstances.\n\nKai is an SSC-brand gene-engineered supersoldier, intended to be part of the first production line used to seed a Constellar World with similar \"combat spec\" humans. His entire production lot was stolen by corporate raiders during transport and put into cryogenic storage for over a century. He returned to life after his production lot (of which he was the sole survivor) was seized from its captors by MSMC. By this time, all evidence that he was produced from an SSC proprietary genome sequence was scrubbed, and the sequence itself seems to have gotten lost in SSC's paperwork. Unsure of what to do with him, MSMC presented Kai with a recruitment offer, which he accepted barring any better options. The skills and knowledge that were part of his numerous genetic donors and cobbled-together to form his subjectivity-override proved useful, if at times unconventional (\"Why did they program me to know how to use a sword?\"), and an additional mech pilot in the field often proved invaluable. He's asked MSMC's legal department to arrange citizenship for him on a Union Core World (or, failing that, as part of the Albatross) once he's worked enough to afford the service.\n\nMech Appearance\nCrimson Lotus has been specced as a duelist frame; a high-performance bipedal model covered in sleeker curved armor than the typical Everest design, emphasizing coaxing out greater speed and power over additional features. Each of its two arms ends in a five-fingered hand, and its legs and back contain an array of jet boosters to aid in rapid movement and as part of its Rapid Burst Jump Jet System. The heavier armor on the legs hides storage compartments for additional ammunition and power packs for charged energy weapons. Its curved shoulder armor hides its smoke charges. The assault rifle is built into its left arm. A long, one-handed single-edged sword is sheathed at its left hip, and a two-handed sword affixed to its back with electromagnets. The mech's signatures are the curved horn on its head, and its dark red paintjob. As part of its personalizations, the mech's control systems more closely resemble a motorbike's seat than the standard cockpit chair, and provide a greater degree of fine motor control to the mech's extremities through a deeper interface connection with the pilot's hardsuit and neural augments.\n\nAurelian-11 Kai-Fei reporting. He's the product of a nonzero amount of Smith-Shimano Corpro genetech and military-grade augments, along with some illegal subjectivity-overriding. He's a close-range duelist who specializes in closing distance and hitting things with swords. My intention was to use the SSC Atlas from The Long Rim as his main frame once we start gaining License Levels, but if that's not going to fly, I've got a backup that doesn't use anything from The Long Rim.\n\nA man in his mid-twenties with dark hair, blue eyes, and a somewhat dusky complexion. He has a handsome face and a lean and muscular build. His hardsuit is sleeker and slightly smaller and less bulky than is typical of its type, and he wears an MSMC military jacket over it under most circumstances.\n\nKai is an SSC-brand gene-engineered supersoldier, intended to be part of the first production line used to seed a Constellar World with similar \"combat spec\" humans. His entire production lot was stolen by corporate raiders during transport and put into cryogenic storage for over a century. He returned to life four years ago after his production lot (of which he was presumedcan often prove invaluable. He's asked MSMC's legal department to arrange citizenship for him on a Union Core World (or, failing that, as part of the Albatross) once he's worked enough to afford the service.\n\nMech Appearance:\n\nThis mechGive a holler if there's any trouble viewing the sheet.\n\n1 person marked this as a favorite.\n\nThat'd do it. While the setting chapter was excised from the free version of the core book, it's still intact (and mostly unchanged) in the playtest document, which the devs still keep available, free of charge, if you know where to look (by which I mean that their Google Drive was the first result when I searched \"Lancer Pre-Release\"). I had not meant to come off as unduly harsh. As an indie RPG whose development is headed by open socialists, Lancer tends provoke knee-jerk reactions from people who argue in bad faith. I made a hasty assumption and I'm sorry.\n\n1 person marked this as a favorite.\nGM R0B0GEISHA wrote:\n\nExcuse me, but that's top secret information.\n\nI will actively apologize. I had assumed basically everyone read the setting chapter. It isn't really intended that players keep their eyes off it, but I understand if it's a part someone wanted to keep secret from the players. It is also totally a secret in-universe.\n\nAtlas2112 wrote:\nNeurophage wrote:\n\nThey are, even in their most benign form, the very kind of coercive hierarchy, the very kind of state, that communists want abolished\n\nSo they're like a Monarchy? (Isn't that what Communists hate?)\n\nNeurophage wrote:\n\nIt takes, like, five minutes at most to look this up\nWhere is that?\n\nIt's not for me to say, and I already overstepped by bringing it up at all. There's a lot of good stuff about Union today and in the past in the section on the Third Committee in the setting chapter of the core book. The long and short of it is that thinking of Union as \"communistic\" is probably an overestimation of their own progress. Union has a centralized leadership within Cradle, and it has an uneasy relationship with imperialists and corporate states that span entire star clusters. Plenty of people across the galaxy see Union's Third Committee as being exactly as imperialistic as Second Committee, only preferring soft power to hard power, and there are plenty of very convincing arguments to be made for or against this. Union making economic sanctions against less-prosperous multi-planet empires in order to essentially starve them into compliance sounds more peaceful and less jingoistic than just sending an invasion fleet and killing all local leadership, but it must be remembered that it's the poor who suffer when the rich wage war, even if it's a trade war. It's hard to argue that people shouldn't be angry that the galactic superpower outsiders made them ration food for forty years, especially if it was just to force their society to enter into a galaxy-wide community with which none of them will ever personally interact.\n\nUnion wants, someday, for everyone in the galaxy to have their material needs met and never fear being forced into bondage or having their dignity and personhood rejected by the hammer of state", "num_tokens": 2048} {"category": "common_crawl-games", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-games/part-00-00000.npy", "text": " and losing, it’s about gambling and action.\n\nThe neat thing about online betting may be the fact you don’t actually ought to travel to casinos in order to risk it. Before the internet and on the internet gambling was established, people had take a trip to Las vegas, nevada and Atlantic City just to gamble. Today, thanks into mega888  the internet and the establishment of online gambling websites, people are now ready to gamble right at the comforts of the own home. In fact, you will have the ability to find people from different chapters of the world gambling on the web.\n\nLudomania is named a the impulse or itch to gamble even when you’re conscious its’ corresponding implications. Nevertheless this is merely takes a simple minor difficulty. Severe cases actually nod into the direction mental syndrome. It is called pathological gambling. The considered for that father pathological gambler if the actual first is preoccupied with gambling like crazy and that is mainly all he thinks about. He tends to imagine as he will be playing again in the long run or ponders the game he played yesterday.\n\nThe reality of craps Gambling is that everyone will win several point and everybody will lose at a single. Yes, no matter how much you think you suck, you will win one or more Gambling bets. That is how the overall game is designed and constructed. Why? The money bet at craps is distributed between the players, but now casino in case you haven’t small percentage from info and nonwinners. That is the big picture, never lose sight of in which.\n\nHow about winning? Well, roulette is suffering from a fixed payout while rewards in Pg slot vary from casino to casino, are usually often leagues higher than that in roulette. Also, despite both being subjected to chance, roulette is theoretically an a lot more predictable with the associated with allowing the guitarist to bet on colors, which in turn allows for higher chances of winning.\n\nGambling like a form of excitement when checked seriously does not differ much from others of recreational. In fact, gambling has the bonus of providing opportunity to for one to actually end up ahead with more money than you started with. The forms of entertainment can carry out that? Not movies, golf, or football that is good for sure. However, gambling is actually usually associated with really bad things like smoking and high drinking. Smoking harms the system and heavy drinking inside drunkenness which can a crime. If we stay clear of discovered and keep gambling like a form of ale within our means then is truly is no different than going to see movies.\n\nWhen is the proper time give up – at the moment. What is the fastest and easiest way to quit? Replace the gambling habit with a non-gambling program. Programming your subconscious with positive thoughts and desires is the best way to quit and it’s the easiest approach to quit playing.<|endoftext|>The krepost in Civilization V is one of the most simple, elegant, nearly hidden pieces of design you are likely to find. Every Civ V civilization gets a special ability and two altered units or buildings. The Roman legions can build roads, the Siamese wat combines culture and science, and the Americans are good at bombing things. The Russian unique building is the krepost, which replaces the barracks. It is a normal barracks plus a 25% reduction in the culture cost to acquire new tiles. Like the barracks, it is unlocked with Bronze Working, an Ancient Era technology.\n\nThat one bonus on one building creates a dynamic that simulates Russia beautifully. It encourages you to build a barracks in every city, even for a quasi-pacifist player like me who has no need to build troops in every city. That leads naturally to a more militaristic playstyle. The bonus also facilitates the creation of a large empire with extensive borders. Those borders will put you into conflict with neighbors who object to your taking up half a continent, but those neighbors might be hesitant to mess with an enemy who is prepared to mobilize troops in every part of the empire. And this mechanic starts in the earliest stages of the game, which gives it time to define your strategy and to let those cultural borders expand.\n\nAdd one unrelated bonus to one item and watch the entire play dynamic change.\n\n5 thoughts on “Krepost”\n\n 1. Holy eff. I haven’t played the Russians yet, so I using that as the excuse for never catching this. What an elegant way to change how you look at the game. I suspect the Civ V does not get enough credit for what it does right in the face of everything that it does wrong.\n\n 1. I’d say the Romans and Greeks fit this as well. Because their advantages are all early-game stuff, you try to capitalize on that and expand/conquer quickly, but if you do it too fast, unrest and the trouble of managing a large empire kick in, and the whole thing can cave in on you. It’s only later on that you get the tech to make a large empire work.\n\n 2. The Keshik may be a tiny bit OP, but it certainly does a good job of simulating the hit-and-run, never get hit back, tactics of the Mongols. Ride in, shoot, ride out, bring in the next round, never get touched because you’re constantly on the move. It isn’t perfect, as the promotions get screwed up when upgrading to cavalry, so it’s tempting to just keep them around into the modern era to supplement rocket artillery.\n\n The Roman trait seems to be a joke to me. Not that it is bad, it is actually quite powerful, but it is a literal joke. It makes it just that much easier for me to bring the aqueduct to the lands I conquer.\n\nComments are closed.<|endoftext|>Understanding the Odds: A Newbie’s Guide to Online Casino Games\n\nThe world of online casino games affords an exciting and potentially profitable experience for these willing to try their luck. However, navigating this virtual realm may be daunting for beginners. One of the key elements to know when delving into on-line casino gaming is understanding the odds. In this beginner’s guide, we’ll break down the fundamentals of odds, explain how they work in numerous casino games, and provide tips about find out how to make informed bets.\n\nWhat are Odds?\n\nOdds are numerical representations of the likelihood of a particular event occurring. Within the context of on-line casino games, odds determine your chances of successful or shedding a bet. They can be expressed in different formats, including fractions, decimals, or as ratios. Understanding odds is essential because it helps you make informed choices and manage your bankroll effectively.\n\nThe House Edge\n\nBefore diving into specific games, it’s crucial to acknowledge the house edge. The house edge represents the casino’s constructed-in advantage in each game. It’s the proportion of each guess that the casino expects to win over the long term. While this would possibly sound discouraging, it’s essential to remember that casino games are designed for entertainment, and with the appropriate strategy and knowledge, players can still have a great chance of winning.\n\nIn style Casino Games and Their Odds\n\na. Slot Machines:\n\nSlot machines are the preferred casino games in both land-based and online casinos. They’re easy to play and require no particular strategy.\n\nThe chances on slot machines vary from game to game however typically have a higher house edge compared to different casino games. The return to player (RTP) proportion usually ranges between ninety% and 98%.\n\nTo improve your odds, choose slots with higher RTP percentages and guess within your budget.\n\nb. Blackjack:\n\nBlackjack is a card game known for its comparatively low house edge, making it a favorite amongst casino players.\n\nThe chances in blackjack rely in your strategy and the particular guidelines of the game. When performed optimally, the house edge will be as low as 0.5% or even less.\n\nTo enhance your chances, study fundamental blackjack strategy and stick to it throughout your games.\n\nc. Roulette:\n\nRoulette presents several betting options with various odds. Essentially the most straightforward bets, corresponding to red/black or odd/even, have a near 50% likelihood of winning.\n\nThe house edge in roulette will depend on the variant you are taking part in, with European roulette generally having a lower house edge than American roulette.\n\nWhile roulette is basically a game of probability, you’ll be able to choose bets with better odds to improve your successful potential.\n\nd. Poker:\n\nPoker is a game of skill and strategy, with odds taking part in a significant position in determination-making.\n\nUnderstanding poker odds entails calculating the probability of finishing your hand and comparing it to the present pot odds to determine whether or not to wager, call, or fold.\n\nTo reach poker, not only do you have to understand odds, however you must also master the art of bluffing and reading your opponents.\n\nBankroll Management\n\nOne of the keys to profitable on-line casino gaming is effective bankroll management. Set a budget earlier than you start playing, and stick to it. Never wager more than you can afford to lose, and consider utilizing tools provided by online casinos, comparable to deposit limits and self-exclusion, that can assist you keep control.\n\nEntering the world of online casino games as a beginner might be an exhilarating experience. Understanding the odds is a fundamental step toward making informed decisions and enjoying your gaming expertise responsibly. Remember that while the house always has an edge, your knowledge, strategy, and self-discipline can tip the scales in your favor. So, take your time to study the odds, observe your chosen games, and most significantly, have fun responsibly within the exciting world of online casino gaming.\n\nIn case you have virtually any concerns about exactly where and also the way to use 로즈카지노 도메인, you’ll be able to email us in our own website.\n\n • No comments yet.\n • Add a comment<|endoftext|>Lawriter - OAC - 3772-10-21 Manual game payouts.\n\n3772-10-21 Manual game payouts.\n\n(A) \"Manual", "num_tokens": 2048} {"category": "common_crawl-games", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-games/part-00-00000.npy", "text": " to confront the Dark One in the Pit of Doom. This strike force would be delayed until Rand gave the word.\n\nA hospital was to be established in Mayene, and the Field of Merrilor itself was to be a supply depot.\n\nThe Seanchan joinEdit\n\nAs the fighting started on the three defensive fronts Rand visited Ebou Dar, and with the help of Mat, succeeded in convincing Empress Fortuona to sign the Dragon's Peace and join the forces of the Light. The Seanchan forces were soon ready to march under the command of Lunal Galgan, and joined the White Tower forces in the Kandor-Arafelian front.\n\nThe hunt for SlayerEdit\n\nFirst leadsEdit\n\nAt first, Perrin joins the battle at the Andoran front, leading his forces, which included the Wolf Guard, the Two Rivers men, and Ghealdanin and Mayene troops. However, as the battle draws on he begins to feel that he is needed someplace else - fighting alongside the wolves against Slayer. He asks Rand to weave a gateway to allow Perrin to enter Tel'aran'rhiod in the flesh in order to hunt Slayer more efficiently. Rand reluctantly agrees, and promises Perrin he will have an Asha'men forming another gateway at the Field of Merrilor each day so he can exit. Perrin takes supplies and is joined by Gaul.\n\nAs they enter Tel'aran'rhiod they find a great tempest. The winds of the great storm can be felt everywhere around Tel'aran'rhiod, and they seem to wear the terrain down. At first, it just seems a form of 'erosion at high speed', but soon, as the Last battle rages on, the effects are much more intense. Perrin also notes that the world is breaking apart in other ways, such as the ground erupting, sending chunks to the air.\n\nPerrin's first target is the Black Tower, after he learned gateways cannot be opened there, deducing the use of a Dreamspike, which he last saw Slayer use. As he and Gaul arrive at the Black Tower he encounters Lanfear, who helped him retrieve the dreamspike. By doing so Perrin inadvertently helped Logain's followers escape the clutches of M'Hael and reclaim the Black Tower for the Light. However, he finds no sign of Slayer.\n\nIndeed, the Dreamspike was most probably not used by Slayer, but by M'Hael. Slayer was tasked with killing Rand as he was confronting the Dark One. Perrin is unaware of this, but deduces that Slayer will show-up somewhere along the various battle fronts anyway. He asks the wolves to keep a watch and notify him if they see Slayer. However, the first sighting reported to him is not of Slayer but of Graendal, as she skulks around the Tel'aran'rhiod site of Davram Bashere's camp. Perrin follows her and later to the 'in between place' where he sees her spying and influencing a dream, supposedly of Davram Bashere. Though he ultimately loses Graendal, he learns from Lanfear that the tent she was spying on was that of Davram Bashere and his wife. He also learns that a week has passed in the waking world, and much of the damage has already occurred.\n\nConfrontations at the Pit of DoomEdit\n\nLater on, Perrin is sent a warning from the wolves that Slayer was seen around Shayol Ghul. Perrin arrives and finds that in the Pit of Doom the worlds have drawn near each other and he can see Rand, as he walks in the waking world. Perrin manages to deflect an arrow sent by Slayer and confronts him. However, Slayer brought with him several Samma N'Sei, some of them channelers. As the wolves and Gaul distract the channelers, Perrin confronts Slayer, and proves himself a worthy match - his control on the the dreamworld amplified by him being there in the flesh. Perrin manages to wound Slayer, who travels back to the waking world, leaving Perrin unable to pursue.\n\nPerrin helps finish off the remaining Samma N'Sei. Lanfear shows up again and Heals him from his wounds. He persuades her to Heal Gaul as well. He installs the dreamspike in the Pit of Doom, preventing Slayer from trying to teleport there again, and puts the wolves on watch, as he circuits the other battlegrounds' reflections in the dreamworld.\n\nLater on, the wolves alert him to a sighting of Graendal at the White Tower's camp. By this point, he notices that all armies, save the one in Shayol Ghul, are retreating towards the Field of Merrilor. He also sent three warnings of attempts by Slayer to penetrate the wolves defenses around the Pit of Doom, but each time as Perrin arrives Slayer quickly retreats. Perrin surmises that he is testing his 'prey'. He is then sent by a grizzled old wolf a sighting of Grandael in Rodel Ituralde's camp at Shayol Ghul. She escapes again, but now Perrin realizes what she is doing - corrupting the four Great Captains.\n\nThe grizzled old wolf reveals himself to be Long Tooth - Elyas Machera, who had decided to enter the wolf dream for the Last Hunt. Perrin asks him to send warning to the waking world, as Slayer attacks the pit once more, this time in earnest. Elyas wakes and Perrin confronts Slayer once again, but his mind is tired from his long stay in the dreamworld. Slayer manages to critically wound Perrin.\n\nLanfear finds him once more but refuses to help him. Desperate, dazed, and confused; he seeks to return to Faile, thinking that she must be at the Field of Merrilor. He teleports there in hope of finding the promised gateway out of the dreamworld, but blacks out. Finally, he is able to will himself awake and shifts back to the waking world, where he is found by Haral Luhhan, and delivered to the Mayene hospital. Wise ones Heal Perrin, but his wounds and fatigue are too great and he is forced to sleep and gather strength. All the while, only Gaul and the wolves are left to defend the Pit of Doom against Slayer.\n\nThe Andoran frontEdit\n\nThe task at hand for the Andoran front was to destroy the trollocs occupying Caemlyn. The forces sent there included those of Andor and Cairhien and those of the Band of the Red Hand, along with all those loyal to Perrin Aybara - the Two Rivers, the Wolf Guard and troops from Ghealdan and Mayene - bolstered by the Children of the Light, the Legion of the Dragon, the Ogier and some aiel and female channelers from the Kin.\n\nQueen Elayne led the forces, as tactical command was given to Davram Bashere. Other officers included Perrin himself and Tam al'Thor in charge of the Two Rivers men, the Ghealdanin (led by Queen Alliandre and Captain Gerard Arganda) and the Mayene (led by Bertain Gallenne); Talmanes Delovinde in charge of the Band of the Red Hand, Galadedrid Damodred in charge of the Children; Bael in charge of the aiel; and Birgitte Silverbow in charge of the Andoran forces.\n\nAlthough with a strong army, the Light's forces were still outnumbered by the Trollocs inhabiting Caemlyn, which numbered by the tens of thousands. Moreover, the Shadow had access to reinforcements via the Ways, and have fortified the Waygate inside Caemlyn against attacks by Traveling. Caemlyn itself was a good defensive position for the Shadow. After the initial invasions the Fades reined in the Trollocs, and half of the city still stood, as well as its walls (excepting the part destroyed by the Band during the invasion).\n\nBesieging it was not an option, as the trollocs could feast on many of the human occupants still in Caemlyn or get supplies through Traveling, and the Light's forces were needed elsewhere, as the Kandori and Shienarian fronts were only to hold until they were finished. It was also not possible to just leave them, since from that position the trollocs could send armies to threaten all of the southern kingdoms and destroy the Light's supply centers, such as Baerlon. Alternatively, the Shadow could launch an army at the back of the defenders at the Borderlands, trapping them. And so it became clear that the Trollocs army in Andor must be defeated and destroyed.\n\nBashere's planEdit\n\nAfter the Light's summit at the Field of Merrilor, Bashere had devised a plan - to draw the Trollocs into Braem Wood and then destroy the trollocs using guerrilla tactics. Gareth Bryne noted that he approved of this plan and had often worried about an attacking force establishing itself at the Wood and threatening Caemlyn.\n\nThe first step was to flush the trollocs from Caemlym itself. Using the Kin, Bashere's forces planted oil (supplied by Mayene) in many of the still standing buildings' basements via Traveling. Setting it all aflame at once, the trollocs were forced to pour out of the city, where the Light's forces waited to bait the trollocs into giving chase.\n\nHowever, the trollocs did not take the bait, and camped around the city and on its walls. The Light forces turned to 'hit and run' attacks in order to force them to pursue, and after several attempts succeeded, as the entire trolloc army went after them. The Light forces guided the trolloc army towards Braem Wood, where on the brink of the woods waited a company of Two Rivers archers and two banners of", "num_tokens": 2048} {"category": "common_crawl-health", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-health/part-00-00000.npy", "text": " sweats, my first choice would be either natural progesterone cream. We talked about that earlier, just a quarter teaspoon. And then in addition to detox those excess estrogens, I suggest to clients taking two or three Estro I-3-C. And in addition, you may need three to four Estro Rebalance as well. So night sweats are often caused from an excess of estrogen or estrogen dominance combined with a deficiency of progesterone.\n\nKARA: Oh. And those often go hand in hand. Right?\n\nJOANN: Definitely.\n\nKARA: So you're adding in the natural progesterone cream and you're also helping your body to get rid of and detox the excess estrogens or the, you know, toxic estrogens is what we call those as well.\n\nJOANN: Exactly.\n\nKARA: And, you know, I think those were some great points as far as like what to avoid. So to get those night sweats and hot flashes under control, and I ran into...my daughter just started dance and I ran into a mom that I knew at dance, and she's a Dishing Up Nutrition radio listener. So she said, \"oh, what's your topic going to be on?\" And so she went into early menopause, I believe at age 45. And she said, \"oh, hands down. What keeps my hot flashes and night sweats away, it's if I am not eating too much sugar, avoiding alcohol, and getting enough sleep.\" I mean, it was just kind of a nice anecdotal reminder that what we're telling you, I mean, this is what works for real people said.\n\nJOANN: It's what we just said. Yup. And it's true.\n\nKARA: It is true. Well, here's a little bit more of a difficult issue. This one that we're going to talk about takes a real desire and a true commitment to retrain the brain into following good sleep habits. So Carol said in her email, \"for whatever reason, I don't want to go to bed. I know the routine, I know what I'm supposed to do, but for some reason I'm full of energy at night and it's not from drinking too much caffeine.\" So Carol, I suspect that the root cause of not wanting to go to bed is an underlying level of anxiety. And you know, when you go to bed in your brain, it needs to shut down and to be calm. And if you have underlying anxiety, it may just be kind of a distraction having that energy and finding one more thing to do so that you don't have to deal with laying in bed and noticing that anxiety. So this is, it's kind of a challenging sleep problem to overcome, to be honest. And this may require regular appointments with a nutritionist or a dietitian to really manage that anxiety and reduce it. It might even take a long time. Some people make appointments regularly for a year until they feel like they've established new routines and habits. And I think due to the pandemic, an increased number of people might be experiencing what Carol was talking about. And so, oh my goodness. We have come to the end of our show. We want to thank you for listening. And our goal at Nutritional Weight & Wellness is to help each and every person experience better health through real food. So it's a simple, but a powerful message. Eating real food is life changing. Thank you so much for listening. Have a safe and a healthy day.\n\nSimilar Podcast Episodes:\n\nBack To Top<|endoftext|>Get Best Rated Online Therapy – Get Pleased\n\nStandard In-Person Treatment. Best Rated Online Therapy .\n\nTraditional in-person treatment is still the most popular kind of therapy. It includes meeting with a therapist face-to-face at their office. Here’s how conventional in-person treatment compares to BetterHelp.\n\nOne of the greatest benefits of BetterHelp is convenience. With online therapy, you can access treatment from the convenience of your own house, at a time that suits you. In-person therapy, on the other hand, needs you to set up consultations and commute to your therapist’s office.\n\nThe cost of treatment can be a barrier for lots of people. In-person therapy is normally more costly than online therapy. BetterHelp uses more budget friendly prices plans compared to traditional in-person treatment.\n\nPersonal privacy\n\nPrivacy is an issue for many individuals when it pertains to therapy. With BetterHelp, you can access therapy from the convenience of your own home, which can offer a sense of privacy. In-person therapy, on the other hand, needs you to meet a therapist in person at their office.\n\nTherapist Choice\n\nYour alternatives for therapists might be limited by your area when it comes to in-person therapy. With BetterHelp, you have access to a bigger network of therapists, which implies that you have a much better opportunity of finding a therapist who is a great fit for you.\n\nIn conclusion, BetterHelp treatment uses a number of advantages over traditional in-person therapy, consisting of benefit, therapist, and expense selection. While there are other online therapy platforms offered, BetterHelp sticks out for its big network of therapists and affordable rates plans. Ultimately, the choice between online therapy and conventional in-person treatment comes down to individual choice and specific requirements.\n\nTherapy can be helpful for a vast array of psychological health conditions. In this post, we’ll check out 10 different conditions that individuals might have and how therapy can assist.\n\nDepression is a typical mental health condition that affects millions of individuals worldwide. Treatment can assist by providing a safe space to speak about your emotions and sensations. A therapist can help you determine negative idea patterns and behaviors and deal with you to develop coping strategies and favorable practices.\n\nStress and anxiety is another common psychological health condition that can be debilitating. Therapy can help by teaching you relaxation methods, such as deep breathing and mindfulness, and working with you to establish coping strategies to handle anxiety triggers.\n\nPTSD, or post-traumatic stress disorder, is a psychological health condition that can establish after experiencing or experiencing a traumatic occasion. Treatment can assist by providing a safe area to process the injury and develop coping strategies to handle the signs of PTSD.\n\nOCD, or obsessive-compulsive disorder, is a psychological health condition defined by compulsive behaviors and intrusive thoughts. Therapy can help by teaching you how to determine and manage these thoughts and habits, as well as establish coping strategies to manage the symptoms of OCD. Best Rated Online Therapy\n\nBipolar affective disorder\nBipolar illness is a psychological health condition characterized by severe state of mind swings, ranging from depressive episodes to manic episodes. Treatment can help by providing assistance and assistance in managing these mood swings, establishing coping techniques, and improving communication abilities.\n\nEating disorders\nEating disorders, such as anorexia and bulimia, are mental health conditions that can have severe physical repercussions. Treatment can assist by dealing with the underlying mental and emotional issues that contribute to the eating disorder, along with establishing methods to manage the physical symptoms.\n\nDrug abuse\nDrug abuse can be a challenging practice to break, however treatment can be an efficient tool in handling addiction. Treatment can assist by attending to the underlying psychological and emotional concerns that add to drug abuse, as well as establishing strategies to handle yearnings and sets off.\n\nRelationship problems\nRelationship problems, such as communication problems and conflict, can have a considerable impact on mental health. Therapy can help by offering a safe space to talk about these issues and establish strategies to improve interaction and resolve dispute.\n\nSorrow and loss can be a hard experience to browse, however therapy can assist by supplying support and assistance through the grieving process. A therapist can help you determine and handle the emotions associated with sorrow and loss, along with establish coping techniques to progress.\n\nStress management\nTension is a common experience for many people, but it can have negative impacts on mental health. Treatment can assist by teaching relaxation strategies and establishing coping strategies to handle tension, as well as recognizing and resolving the underlying psychological and psychological concerns that contribute to stress.\n\nIn conclusion, therapy can be a reliable tool in managing a wide variety of mental health conditions, from anxiety and stress and anxiety to drug abuse and relationship issues. Think about seeking the support and guidance of a licensed therapist if you are struggling with your psychological health.\n\nSeeing a therapist can have many benefits for an individual’s mental health and wellness. Here are some of the benefits of seeing a therapist from a mental perspective:\n\nIncreased self-awareness\nAmong the main advantages of seeing a therapist is increased self-awareness. A therapist can help you recognize patterns in your emotions, thoughts, and habits, as well as the underlying beliefs and values that drive them. By becoming more familiar with these patterns, you can get a much deeper understanding of yourself and your motivations, which can result in individual development and advancement.\n\nEnhanced psychological regulation\nEmotional guideline is the capability to manage and control one’s emotions in an adaptive and healthy method. Seeing a therapist can help people find out and practice emotional guideline methods, such as deep breathing and mindfulness, that can be useful in handling tough emotions and minimizing tension.\n\nBetter social relationships\nSocial relationships are a vital element of psychological health and wellbeing. Seeing a therapist can help people enhance their interaction skills, assertiveness, and empathy, which can result in healthier and more satisfying relationships with others.\n\nIncreased problem-solving abilities\nTreatment can also assist people develop analytical skills. By dealing with a therapist, individuals can learn to method issues in a more systematic and effective way, recognize prospective options, and make decisions that are aligned with their objectives and values.\n\nEnhanced self-esteem\nSelf-confidence describes a person’s sense of self-worth and worth. Seeing a therapist can assist people identify and challenge negative self-talk and beliefs that can add to low self-confidence. Through therapy, individuals can learn to develop a more positive and realistic self-image, which can result in increased confidence and self-respect.\n\nImproved coping abilities\nCoping abilities are techniques and techniques that individuals utilize to manage stress and hardship. Seeing a therapist can assist individuals", "num_tokens": 2048} {"category": "common_crawl-health", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-health/part-00-00000.npy", "text": "The first step to surviving the bad in life is to accept the reality that it exists at all. There’s a saying among boxers that the punch that knocks you out is the one you didn’t see coming, and it’s like that with both violent crime and any of the other troubles that fate might throw your way. If you have even a hint that it’s inbound, then maybe you can sidestep it, maybe you can brace for it, maybe you can even shove back against it. When it comes to violent crime, anybody with any exposure to the news knows that it’s out there. The trick, I think, isn’t just about knowing that it exists, but that it exists in your neighborhood, on your block, even in your home. When you realize that bad things can happen to you and the people you know and love, it changes how you view the world. Paranoia isn’t a necessary outcome, but getting past obliviousness and faith that bad things only happen to other people in other places is a necessary precondition to being able to prepare for it.\n\nIt can be the hardest step, and made harder by having to face exactly what violent crime looks like. Our cultural fascination with true crime gives us an idea of what bad guys can accomplish but it’s so easy to swipe away, to hit stop and move on. It’s hard to immerse ourselves into evil, to truly internalize how cruel one person can be to another. I’d argue that it’s not healthy to dip too deeply into it, and risk losing hope about humanity. At the same time, you need to have at least the barest clue that bad guys might be motivated to hurt you for nothing more than their own ego or because you’re in the way of their payday, that they might be more dedicated and skilled than you, that they might be determined to win at all costs. It’s not even that the bad guys might hate you; worse, they may feel nothing at all or simply feel happiness and joy at taking you out of their way or making you into their example, the product of their art. It’s awful, but like a potholes in a road, we can’t do anything about it unless we know they exist and learn how to see them coming.\n\nThere is a solution though. It’s not an easy one, but even starting down the road towards finding it can be enough to keep evil merely at your doorstep and not inside and in your face. Here’s all it is:\n\nDo the work.\n\nBy that, I’m talking about learning and implementing all of the various safety strategies that we talk about so much here at OHO. You need, as John calls it, general deselection – preventing bad guys from choosing you as their victim today – and specific and forced deselection – getting bad guys to change their minds about attacking you, with violence if necessary. The changes you might need to make to how you move through the world and interact with people could be minor, a refinement of who you are and what you do, or could themselves be a seismic shift in everything about you. You need to surround yourself with the right environments and the right people so that you can better avoid stupid people in stupid places at stupid times. It sounds simple, but it’s not easy if it requires you to find new jobs, leave your old friends, or move to new places. All that and you need so-called hard skills, using tools like pepper spray and guns and knives perhaps, not to mention being able to move your own body against the demands another might impose when they try to force you to their will.\n\nThe work is not a time-bound effort. It’s not something you can do once and have it be enough for the rest of your life. You’ll have to revisit it over and over, to learn new aspects and review old ones. As John taught us, many repetitions performed often is the only way we can ensure that we have what we need, when we need it. All of us have had the experience of being shown a new skill, trying it a few times, and struggling to perform it again a few months or years later. Picking it up again might not be as difficult as the first time around, but it will take some time, some attention. If, however, we practice it a whole lot at the beginning and keep practicing it every week, every day, at that same six-month mark after from day one, we are so much more fluent with performing it. It’s the same for self-defense skills as everything else, including keeping fresh the mindsets and thought processes that go into staying safe.\n\nIt sounds like so much, and it can be. We have to accept the terrible things that can happen to us, from other people and otherwise. We have to adjust and shift how we approach the world, and dedicate time and other resources to be able to avoid or fight back against not just bad guys, but really bad guys. It might fundamentally change who we are. And that’s no bad thing, as acknowledging that the scary stuff exists allows us to face those fears, and make positive actions to managing them instead of relying on luck and fate to survive. Beyond that, it makes us more confident, more capable of being on our own, so that we can choose when we don’t want to b<|endoftext|>Why Does My Dog Hump Blankets? (9 Reasons and When To Worry)\n\nHow many times have you walked into a room, only to witness your furry friend engaging in what seems like a comically bizarre dance with their blanket? If you’ve ever pondered, “Why does my dog hump their favorite blanket?”, you’re certainly not alone. This seemingly peculiar behavior is more common than you might think, stirring both laughter and puzzlement amongst many dog owners.\n\nFor some dogs, humping is a display of dominance or a form of play; for others, it may be a response to stress/anxiety or just an attention-seeking behavior. It could also be a result of sexual stimulation, especially in dogs that haven’t been neutered or spayed. Sometimes, it can even be a symptom of a medical issue. It’s a fascinating puzzle that requires a discerning eye to decode, and understanding it is key to ensuring the well-being and happiness of your canine friend.\n\nThere are numerous reasons behind your dog’s humping behavior and this article takes a deep dive into understanding these reasons, shedding light on this peculiar yet utterly normal part of their canine world.\n\nWhy Does My Dog Hump Blankets?\n\nDogs may hump blankets for various reasons, and it’s important to understand that this behavior can have multiple underlying causes. Here are some of the reasons why your dog may hump blankets\n\n1. Dominance or Social Status\n\nAs descendants of wolves, dogs have inherent social hierarchies, often referred to as a pack mentality. Within the social construct of a pack, certain actions are taken to assert dominance or to find one’s place in the social order. Humping is one such behavior that dogs use to demonstrate their dominance. If your dog humps a blanket in front of others, it could be its way of signaling that it perceives itself to be the leader or at least above others in the social hierarchy. This action isn’t about the object being humped; it’s more about the message it sends to the other observers.\n\n2. Sexual Arousal\n\nDogs, like any other living beings, have basic instinctual drives, one of which is sexual. While it may seem awkward to humans, humping due to sexual arousal is quite normal among dogs, particularly males who haven’t been neutered. Even spayed females have been known to hump objects occasionally, though this is less common. This sexual behavior can be directed towards other dogs, objects like a blanket, or even a human’s leg.\n\n3. Excitement\n\nHumping is also a form of expression that some dogs might use when they are extremely excited. The triggers for this excitement can vary widely from dog to dog. It could be a favorite toy, the anticipation of a walk, a visit from a beloved human, or even the arrival of a new piece of furniture. Dogs are high-energy creatures, and humping can sometimes be their unique way of burning off some of that extra energy.\n\n4. Stress or Anxiety\n\nDogs may resort to humping as a way to alleviate stress or anxiety. This is akin to certain humans biting their nails or fidgeting when they are nervous. Dogs who are uncomfortable, nervous, or stressed might find the rhythmic act of humping comforting. The routine and predictability of the action can help calm them down and make them feel more secure in their environment.\n\n5. Playful Behavior\n\nWhen it comes to puppies and young dogs, humping can often be part of their play routines. It’s a natural part of their development as they figure out how to navigate social scenarios and interactions with their siblings, other dogs, or even objects. As they get older and their social skills mature, most dogs will move on from this behavior, though some may continue to engage in it occasionally. If your older dog still humps your blankets, you may want to teach him other ways to play.\n\n6. Inappropriate Attention Seeking\n\nDogs are intelligent animals that are capable of learning and understanding behavioral consequences. If your pooch learns that humping an object like a blanket draws attention from you, even if it’s negative, he may continue to perform the behavior to get the reaction they desire. This inappropriate attention-seeking is a learned behavior and can be remedied with proper training and behavioral adjustment techniques.\n\n7. Learned Habit\n\nIf humping isn’t addressed appropriately when a dog is young, it may develop into a habitual behavior. This is especially true for dogs who don’t have sufficient outlets for their energy or instincts. If your dog doesn’t have enough toys or activities to keep him engaged, he might resort to humping a blanket or other objects as a way to entertain himself.\n\n8. Compulsive Behavior\n\nSometimes, excessive humping can be a", "num_tokens": 2048} {"category": "common_crawl-health", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-health/part-00-00000.npy", "text": " expression or mutation burden.\n\nBladder Cancer Clinical Trials and Research\nThrough research and clinical trials for bladder cancer, we’ve made major advances in treating this disease. Learn about how you may be able take part in a clinical trial during your treatment.\nLearn more\n\n“I’m not ready to exclude anyone at this time,” Dr. Rosenberg said during the question and answer session of the panel.\n\nOne reason why a person with a PD-L1-negative tumor might still respond to PD-1 therapy is that both cancer and the immune system are dynamic. Tumors that are PD-L1–negative at the beginning of treatment might become PD-L1–positive over time as the immune system revs up and starts fighting the cancer.\n\nOn Saturday, MSK medical oncology fellow Samuel Funt looked at yet another possible predictor of response to atezo in bladder cancer: the number and diversity of immune cells circulating in the blood before treatment. He found a strong correlation between diverse numbers of circulating immune cells and ultimate response to atezo.\n\nResearchers hope to one day find a biomarker that will reliably predict who will respond to these therapies, to be able to offer the right drug, at the right time, to the right patient.<|endoftext|>They live in a silent world. For people who are profoundly deaf or those suffering from a severe hearing loss, communicating with others and fitting into a hearing world becomes extremely difficult and limiting. Deafness and hearing loss are often caused by genetics, injury or illness, and most people think of them as lifelong conditions. But these individuals may be able to experience hearing through a cochlear implant, a surgically implanted device used to stimulate auditory nerves. Approximately 28 million Americans have some degree of hearing impairment, according to the National Institute on Deafness and Other Communication Disorders (NIDCD). The group also estimates that about three out of every 1,000 children are born deaf or hard of hearing, and of those, 90 percent are born to parents with no significant hearing loss. Adult hearing loss increases significantly as we age, and for some, it reaches a point where traditional hearing aids are not beneficial.\n\nCochlear implants are a viable option for those who qualify for the surgery. Unlike a hearing aid that amplifies sound for a person who already can hear, a cochlear implant helps to create the stimulation needed to recognize sound in a person who cannot hear. Its objective is to stimulate the auditory nerves so that a signal is sent directly to the brain. The brain recognizes the signal as sound and allows a person to understand and differentiate the various levels and types of sound in their environment.\n\n\"The cochlear implant can take someone who is at the edge of functionality, or someone who is not functioning at all, and bring them back to the point where they can understand speech and have the ability to communicate,\" says Dr. Herbert Marks, an otolaryngologist at East Jefferson General Hospital who in 1984 performed the first cochlear implant surgery in Louisiana. \"It can be a much better option for people who are struggling through life with hearing aids.\"\n\nThe cochlear implant works with three main components: a small device that is surgically implanted in the ear, a microphone and a processor. The implanted device is a transmitter placed under the skin behind the ear and is hooked to thin electrodes wrapped in the cochlea of the ear. The cochlea contains hair-like fibers that when stimulated send the sound signal to the brain. The microphone, an external piece used to collect sound, is placed in the location of the transmitter and held to the head through a magnet between it and the transmitter. Finally, the processor is a small box or, in some cases, a small unit outfitted to be worn similarly to a hear aid.\n\nThe three combine to form a pathway of sound to the brain. The microphone picks up sound and sends the information to the processor. The processor, through the use of an internal computer, decodes the sound levels and frequency and sends the signal to the transmitter. The electrodes stimulate the auditory nerve, and the brain then receives the signal.\n\nAlthough the implant enables the brain to understand sound, the sound is not the same as that for an individual with no hearing problems. It is usually described as more mechanical or even as an AM radio out of frequency.\n\nAfter receiving a cochlear implant, a patient will consult with their physician to ensure the device is properly functioning, as well as with an audiologist and speech therapist. Since individuals hear or process sounds differently, the audiologist is responsible for coding or \"mapping\" each patient's processor to individualize the internal computer for optimal sound recognition. The functional ability of the implant is turned on about four weeks after the surgery; it may take months to establish the best level for the patient as they either learn sound for the first time or relearn sound. Regular checkups are also needed to monitor the mapping levels.\n\n\"I have had patients literally break down in tears when we turn on the implant for the first time because they may have lived in silence for years or may have never heard sound before,\" says Dr. Marks. \"That is part of the excitement. They can now be engaged in family conversations or (discussions) at work or school. There is no question that it can significantly change their quality of life.\"\n\nAs technology advances, the use of the cochlear implant is increasing. The NIDCD estimates that about 25,000 people in the United States have cochlear implants, but another 250,000 are good candidates for the surgery.\n\nAdd a comment<|endoftext|>Liver Enzymes Monitor Safe Use of Arthritis Drugs\n\nRoutine Liver Function Tests Check for Toxicity of Medications\n\n97358442.jpg\nScience Photo Library/Roger Harris/Brand X Pictures/Getty Images\n\nLiver toxicity is a potential side effect of some arthritis medications. Liver toxicity from arthritis medications is not considered common, but when it occurs it can be potentially serious. Doctors usually order routine blood tests so problems can be detected before they become clinically significant.\n\nLiver enzymes are normally found within the cells of the liver. If the liver is injured or damaged, the liver enzymes spill into the blood, causing elevated liver enzyme levels.\n\nLaboratory tests performed on blood samples can detect elevated liver enzymes.\n\nOther blood tests can also signal liver function problems by detecting abnormalities involving plasma proteins and blood clotting factors. Normal or reference values for liver blood tests can vary based on the age or gender of the patient, as well as the laboratory method used for testing.\n\nLiver Enzymes:\n\nAST or SGOT (aspartate aminotransferase or serum glutamic oxaloacetic transaminase)\n\nAST (SGOT) is not only found in the liver. It is also normally found in heart, muscle, brain, and kidney tissue. Injury to any of these tissues can cause an elevated blood level.\nAST (SGOT) normal range is 10-34 IU/L.\n\nALT or SGPT (alanine aminotransferase or serum glutamic pyruvic transaminase)\n\nALT (SGPT) is primarily found in the liver, making it a more specific test for detecting liver abnormalities.\nALT (SGPT) normal range is 5-35 IU/L.\n\nAlkaline Phosphatase (ALP)\n\nAlkaline phosphatase (ALP) is an enzyme in the cells which line the biliary ducts of the liver. ALP is also found in other organs including bone, placenta, and intestine. When ALP is elevated, another test known as GGT (gamma-glutamyl transferase) can be ordered by the doctor to confirm that the elevated ALP is being derived from the liver or biliary tract.\n\nALP normal range is 20-140 IU/L (international units per liter).\n\nGamma-glutamyl transpeptidase (GGTP) or transferase (GGT)\n\nGamma-glutamyl transferase (GGT) is an enzyme which is useful clinically when compared to ALP. By comparing the two, it can be determined if the patient has bone or liver disease.\nGGT or GGTP normal range is 0-51 IU/L.\n\nNormal GGT + Elevated ALP is suggestive of bone disease\nElevated GGT + Elevated ALP is suggestive of liver or bile-duct disease\n\nOther Liver Function Tests:\n\nBilirubin is produced from the breakdown of hemoglobin (the oxygen- carrying protein pigment) in red blood cells. The liver clears bilirubin from the body by excreting it through bile into the intestine. Elevated bilirubin levels can be indicative of liver disorders or blockage of bile ducts. In laboratory tests, bilirubin is measured as total bilirubin and direct bilirubin. Total bilirubin, as it's name suggests, is a measurement of all of the bilirubin in the blood. Direct bilirubin is a measurement of a form of bilirubin made in the liver.\nNormal range for Direct Bilirubin is 0-0.3 mg/dl and the normal range for Total Bilirubin is 0.3-1.9 mg/dl\n\nAlbumin is the main protein in human blood plasma (the primary component of total protein).\n\nAlbumin is made by the liver. Laboratory testing indicates how well the liver is making albumin. Liver disease results in decreased albumin production.\nAlbumin normal range is 3.4-5.4 g/dL.\n\nTotal Protein\n\nThe majority of plasma proteins (albumin and globulins) in the body are produced by the liver. Laboratory testing for total protein is a way to differentiate between normal and abnormal liver function.\nTotal Protein normal range is 6.0-8.3 gm/dl (grams per deciliter).\n\nProthrombin Time\n\nThe prothrombin time (PT) or protime is a laboratory test used", "num_tokens": 2048} {"category": "common_crawl-health", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-health/part-00-00000.npy", "text": "’d be delighted to hear from you.\n\n8 year old boy with a fear of dogs\n\nTotal session: 6 sessions over 10 weeks\n\nAn 8 year old boy came to see me with a fear of dogs that he had had since the age of 3. His Mum felt she was responsible for the fear, it had started whilst she was walking along holding his hand when a large friendly dog came bounding up and knocked her little boy over and started licking his face. The Mum screamed and shouted at the dog. She realises now she totally over reacted at the time, that there had been no danger to her or her boy; she had simply been taken by surprise.\n\nSince then whenever her son saw a dog, he ran and hid behinds his parents, screaming and crying, needing to be picked up. He is always anxious when playing, fearing a dog could be nearby. The boy and the family stop themselves going to some public places in case a dog is around.\n\nBecause of the age of the boy and the severity of the fear it was paramount that the treatment plan went at his speed and not that of mine or the parents.\n\nI established what the exact fear of dogs was. The fear was of all dogs of all sizes, breeds and of all ages even tiny puppies. The boy wanted to like dogs, he wanted to feed and stroke the dog next door to where he lived. Over the next few weeks with the use of the CD at night time we began to reduce the anxiety linked to dogs. Together we recognised his boundaries and then came up with ideas of how far he could push himself each week to help get closer to his goal of overcoming his fear. He also learnt what the normal expected amount of apprehension or anxiety regarding unknown dogs or dogs off the lead or large barking dogs should be.\n\nDuring the next 6 sessions over a 10 week period he found that he could to go outside to play in parks and go to football matches and not even think about dogs or even notice that there was one near him. He gave treats to the old dog next door whilst he was tied up in the car. He went to a family BBQ and took a picture to show me of a dog running around his feet whilst he happily ate. Whilst in a pub garden with his parents a policeman and two police dogs came to search the pub, he didn’t go running back to his parents, he sat quietly and watched the dogs work, previously this would have been an extremely anxious and frightening experience for him. Yet now he was fascinated by how the dogs worked for the police.\n\nThis period of time was governed by his own ability to change his belief about dogs, at the speed and time he needed. He still wasn’t a major dog lover by the time he left me, but he wasn’t scared anymore. Dogs didn’t restrict him or his family in anyway. He was beginning to think that some dogs looked rather lovely and cute and was wondering what it would be like to cuddle them.\n\nIf you would like support resolving your own, your family’s or your employees issues please Contact us today. We’d be delighted to hear from you.\n\nAccountant signed off work with anxiety and panic attacks\n\nTotal session: 6 over 13 weeks\n\nAge and occupation: 41 year Accountant\n\nThis client was referred to me after being signed off work for stress and anxiety. This lady had been suffering from; panic attacks, OCD, negative thinking, stress and anxiety for a number of years. She had learnt to manage these systems by creating various coping strategies that meant she was able to hide from others how she was really feeling and how difficult she found some situations to cope with. However things had deteriorated considerably and she was now left unable to cope with the pressure and work load within the work place. She was unhappy at work, she was successful and a competent accountant yet doubted her own ability which was worsening particularly due to a bullying boss. She had been unsuccessfully applying for new positions in other companies, but knew her lack of confidence was showing through and she wasn’t demonstrating her full potential. In addition the client had an irrational feeling of guilt connected to the death of a family member when she was a teenager.\n\nDuring the first session we removed the feelings of guilt relating to the family loss from many years ago. Previously my client would think about the death numerous times during the day and would still find it very upsetting. Within one session she was completely free of this issue that she had been carrying and had been haunting her since she was a little girl.\n\nShe would regularly listen to the CD at night time and over the following weeks the stress and anxiety began to reduce in many areas of her life without even needing to mention some of these issues whilst she was in the clinic room. She began to take back control and think more rationally and logically about situations. My client stopped the habit she had created of negatively thinking that something bad would happen to her or her family, particularly if she drove too far away from them or she was apart from them for too long. She began to drive further away from home and even booked a weekend away, which she had never done before. She started to take control in other areas of her life and found the confidence to visit the dentist which she had found too stressful before.\n\nGradually her confidence grew over the weeks. She started going out more and taking up fitness classes whilst trying to lose weight. The OCD reduced greatly, she found that she was able to stop the physical habits that she had created that would help reduce the anxiety she was feeling. Previously she would only chose certain cups to use for coffee at work or go through a certain door, convincing herself that a family member would die if she didn’t do things in a certain way or in a certain time. This client found an unknown freedom that she hadn’t experienced for at least 10 years.\n\nAfter leaving the treatment program for the next 6 months she continued with her interviews and successfully acquired a new position in a company. She carried out one of her dreams and travelled to America. She also attended workshops on new interests, lost weight and carried out charity work.\n\nThe client continued to play the support CD all through her treatment programme and for the months afterwards.\n\nIf you would like support resolving your own, your family’s or your employees issues please Contact us today. We’d be delighted to hear from you.\n\n12 year old boy who held his bowel movement for 8 hours at a time\n\nTotal session: 4 Sessions over 9 weeks\n\nA 12 year old boy was referred to me to help him overcome the anxiety he was suffering with going to the toilet. The young boy had never been able to go to the toilet and empty his bowels when he felt he needed to go, this was a long term issue that had never been resolved since he came out of nappies as a toddler. This problem was becoming ever increasingly embarrassing as a 12 year old boy as it resulted in dirty underwear throughout the day, which his peers were beginning to notice. He had been to see various doctors, dieticians, nutritionists. Many reward or punishment approaches had been tried by his parents over the years but with no success. As he was approaching puberty at times he was showing increased anger and frustration towards his twin brother.\n\nDuring the first session I ascertained exactly what would happen when he needed to go to the toilet. There was no problem when he actually put himself on the toilet, he then just got in with it and went normally. He was confident with wiping himself and then once finished he didn’t even think about it until the next time he need to go. When he next got the urge to go to the toilet he would hold it. His stomach would hurt for a while and then the urge to go to the toilet would go away for a while and return 10 minutes later. He would then worry about needing to go to the toilet and would keep stopping himself for up to 8 hours a day. He would only finally go to the toilet when he started to feel himself empty his bowels in his pants. He would then go on the toilet and open his bowels without any further issues.\n\nAfter he had spent time explaining the situation to myself, he began to understand and recognise for himself that he actually spent 8 hours worrying about something that only took 5-10 minutes to complete when he got on with it, he walked out of the clinic saying ” I can’t see why it was a problem in the first place “\n\nOne week later he had managed to go to the toilet every day and without having any dirty pants, he was still holding his bowel movements for about 10 minutes each time though.\n\nMy client felt that when he went to go to the toilet he would be missing out on something; one of his brothers may cheat on a game or turn the TV channel over or carry on playing a game without him. Handing back the control I asked my client what his family could do to help him. He suggested to help him overcome this last part of holding his bowels for 10 minutes could his family support him by pausing the film, stop playing the game for a few minutes or for his brother not to run off outside without him. The family happily agreed.\n\nThe issue had been resolved by the first session, however, I needed to confirm that the changes that had been made were imbedded in and the problem had been completely resolved. Over the next few weeks my client found new ways of dealing with his brother when he had annoyed him, he managed to stop some of the habits he had created himself; fiddling with something whilst sitting or watching TV and swearing in particular, at the same time in the back ground making sure the toilet issue had been fully resolved.\n\nAfter 4 sessions over a period of 9 weeks, the initial problem of holding his bowel movement had gone for 8 weeks. If he had the need to go to the toilet at any time or in any place he was able to go immediately as soon as he felt the urge", "num_tokens": 2048} {"category": "common_crawl-health", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-health/part-00-00000.npy", "text": "Weak recommendation, best action may differ depending on circumstances, expertise of clinician, the patient in question, or other social issues\n\nWeak recommendation, moderate-quality evidence\n\nBenefits closely balanced with risks and burdens\n\nRCTs with important limitations (inconsistent results, methodological flaws, indirect or imprecise) or exceptionally strong evidence from observational studies\n\nWeak recommendation, best action may differ depending on circumstances, expertise of clinician, the patient in question, or other social issues\n\nWeak recommendation, Low-quality or very low-quality evidence\n\nUncertainty in the estimates of benefits, risks, and burdens; benefits, risks, and burdens may be closely balanced\n\nObservational studies or case series\n\nVery weak recommendation; other alternatives may be equally reasonable\n\nPrinciples of surgical management\n\nIntra-abdominal infections (IAIs) encompass a variety of pathological conditions, ranging from uncomplicated appendicitis to fecal peritonitis [4].\n\nAs a general principle, every verified source of infection should be controlled as soon as possible. The level of urgency of treatment is determined by the affected organ(s), the relative speed at which clinical symptoms progress and worsen, and the underlying physiological stability of the patient.\n\nThe procedure used to treat the infection depends on the anatomical site of infection, the degree of peritoneal inflammation, the generalized septic response, the patient’s underlying condition, and the available resources of the treatment center. IAIs are subcategorized in 2 groups: uncomplicated and complicated IAIs [5].\n\nIn the event of an uncomplicated case of IAI, the infection involves a single organ and does not spread to the peritoneum. Patients with such infections can be treated with either surgical intervention or antibiotics. When the infection is effectively resolved by means of surgery, a 24-hour regimen of perioperative antibiotics is typically sufficient. Patients with uncomplicated intra-abdominal infections, such as acute diverticulitis, acute cholecystitis, and acute appendicitis, may be treated non-operatively by means of antimicrobial therapy.\n\nIn the event of complicated IAI, the infectious process proceeds beyond a single organ, causing either localized or diffuse peritonitis. The treatment of patients with complicated intra-abdominal infections involves both surgical and antibiotic therapy [5].\n\nThe safety and efficacy of ultrasound- and CT-guided percutaneous drainage of abdominal abscesses has been documented in patients with appendiceal and diverticular abscesses. Percutaneous image-guided drainage may also be used to address cases of advanced acute cholecystitis.\n\nSepsis management\n\nPatients with severe sepsis or septic shock of abdominal origin require early hemodynamic support, source control, and antimicrobial therapy (Recommendation 1A).\n\nAbdominal sepsis occurs as result of intra-abdominal or retroperitoneal infection. Early detection of the site of infection and timely therapeutic intervention are crucial steps for improving the treatment outcome of sepsis patients.\n\nSepsis is a complex, multifactorial, evolutive syndrome that can progress to conditions of varying severity. If improperly treated, it may cause the functional impairment of one or more vital organs or systems, which could lead to multiple organ failure [6]. Previous studies have demonstrated that there is an increased risk of death as patients transition from sepsis to severe sepsis and septic shock [7]. In the context of intra-abdominal infections, severe sepsis represents the diagnostic threshold separating stable and critical clinical conditions.\n\nThus, early detection of severe sepsis and prompt, aggressive treatment of the underlying organ dysfunction is an essential component of improving patient outcome. If untreated, sepsis dysfunction can lead to global tissue hypoxia, direct tissue damage, and ultimately to multiple organ failure [810].\n\nSepsis in the surgical patient continues to be a common and potentially lethal problem. Early identification of patients and timely implementation of evidence-based therapies continue to represent significant clinical challenges for care providers. The implementation of a sepsis screening program in conjunction with protocol for the delivery of evidence-based care and rapid source control can improve patient outcomes [11].\n\nEarly, correctly administered resuscitation can improve the outcome of patients with severe sepsis and septic shock (Recommendation 1A).\n\nRivers et al. demonstrated that a strategy of early goal-directed therapy (EGDT) decreases the in-hospital mortality of patients admitted to the emergency department in septic shock [9].\n\nIn surgical patients early intervention and implementation of evidence-based guidelines for the management of severe sepsis and septic shock improve outcomes in patients with sepsis [12].\n\nPatients with severe sepsis and septic shock may present with inadequate perfusion. Poor tissue perfusion can lead to global tissue hypoxia and, in turn, to elevated levels of serum lactate. Fluid resuscitation should be initiated as early as possible in patients with severe sepsis.\n\nThe Surviving Sepsis Campaign guidelines [10] recommend that fluid challenge in patients with suspected hypovolemia begin with >1000 mL of crystalloids or 300–500 mL of colloids administered over a period of 30 minutes. Quicker administration and greater volumes of fluid may be required for patients with sepsis-induced tissue hypoperfusion. Given that the volume of distribution is smaller for colloids than it is for crystalloids, colloid-mediated resuscitation requires less fluid to achieve the same results. A colloid equivalent is an acceptable alternative to crystalloid, though it should be noted that crystalloids are typically less expensive.\n\nWhen fluid challenge fails to restore adequate arterial pressure and organ perfusion, clinicians should resort to vasopressor agents. Vasopressor drugs maintain adequate blood pressure and preserve perfusion pressure, thereby optimizing blood flow in various organs.\n\nBoth norepinephrine and dopamine are the first-line vasopressor agents to correct hypotension in septic shock. Both norepinephrine and dopamine can increase blood pressure in shock states, although norepinephrine seems to be more powerful. Dopamine may be useful in patients with compromised cardiac function and cardiac reserve [13], but norepinephrine is more effective than dopamine in reversing hypotension in patients with septic shock. Dopamine has also potentially detrimental effects on the release of pituitary hormones and especially prolactin, although the clinical relevance of these effects is still unclear and can have unintended effects such as tachyarrhythmias. Dopamine has different effects based on the doses [14].\n\nA dose of less than 5 μg/kg/min results in vasodilation of renal, mesenteric, and coronary districts. At a dose of 5–10 μg/kg/min, beta-1-adrenergic effects increase cardiac contractility and heart rate. At doses about 10 μg/kg/min, alpha-adrenergic effects lead to arterial vasoconstriction and increase blood pressure. Its major side effects are tachycardia and arrhythmogenesis.\n\nThe use of renal-dose dopamine in sepsis is a controversial issue. In the past, low-dose dopamine was routinely used because of the possible renal protective effects. Dopamine at a dose of 2–3 μg/kg/min was known to stimulate diuresis by increasing renal blood flow.\n\nA meta-analysis of literature from 1966 to 2000 for studies addressing the use of dopamine in the prevention and/or treatment of renal dysfunction [15] concluded that the use of low-dose dopamine for the treatment or prevention of acute renal failure was not justified on the basis of available evidence.\n\nNorepinephrine is a potent alpha-adrenergic agonist with minimal beta-adrenergic agonist effects. Norepinephrine can successfully increase blood pressure in patients who are septic and remain hypotensive following fluid resuscitation. Norepinephrine is effective to treat hypotension in septic shock patients. In many studies norepinephrine administration at doses 0.01 to 0.3 μg/kg/min has been shown may be effective [16, 17].\n\nMartin and coll. [18] published a randomized trial comparing norepinephrine vs dopamine. 32 volume-resuscitated septic patients were given either dopamine or norepinephrine to achieve and maintain normal hemodynamic and oxygen transport parameters for at least 6 h. Dopamine administration was successful in only 31% of patients, whereas norepinephrine administration was successful in 93%. Of the 11 patients who did not respond to dopamine, 10 responded when norepinephrine was added to therapy. Serum lactate levels were decreased as well, suggesting that norepinephrine therapy improved tissue oxygenation.\n\nRecently a prospective trial by Patel and coll. compared dopamine to norepinephrine as the initial vasopressor in fluid resuscitated 252 adult patients with septic shock [19]. If the maximum dose of the initial vasopressor was unable to maintain the hemodynamic goal, then fixed dose vasopressin was added to each regimen. If additional vasopressor support was needed to achieve the hemodynamic goal, then phenylephrine was added. In this study dopamine and norepinephrine were equally effective as initial agents as judged by 28-day mortality rates. However, there were significantly more cardiac arrhythmias with dopamine treatment.\n\nThe Surviving Sepsis Campaign guidelines [10] state that there is no sufficient evidence to suggest which agent is better as initial vasopressor in the management of patients with septic shock.\n\nPhenylephrine is a selective alpha-1 adrenergic receptor agonist primarily used in anesthesia to increase blood pressure. Although studies are limited [20], its rapid onset, short duration, and primary", "num_tokens": 2048} {"category": "common_crawl-health", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-health/part-00-00000.npy", "text": "ello, J.; Marshall, J.; Silva, E.; Anzueto, A.; Martin, C.D.; Moreno, R.; Lipman, J.; Gomersall, C.; Sakr, Y.; et al. International study of the prevalence and outcomes of infection in intensive care units. JAMA 2009, 302, 2323–2329. [Google Scholar] [CrossRef] [PubMed][Green Version]\n 7. Torgersen, C.; Moser, P.; Luckner, G.; Mayr, V.; Jochberger, S.; Hasibeder, W.R.; Dünser, M.W. Macroscopic postmortem findings in 235 surgical intensive care patients with sepsis. Anesth. Analg. 2009, 108, 1841–1847. [Google Scholar] [CrossRef] [PubMed]\n 8. Webster, N.R.; Galley, H.F. Immunomodulation in the critically ill. Br. J. Anaesth. 2009, 103, 70–81. [Google Scholar] [CrossRef] [PubMed]\n 9. Bernard, G.R.; Vincent, J.L.; Laterre, P.F.; LaRosa, S.P.; Dhainaut, J.F.; Lopez-Rodriguez, A.; Steingrub, J.S.; Garber, G.E.; Helterbrand, J.D.; Ely, E.W.; et al. Efficacy and safety of recombinant human activated protein C for severe sepsis. N. Engl. J. Med. 2001, 344, 699–709. [Google Scholar] [CrossRef] [PubMed]\n 10. Ranieri, V.M.; Thompson, B.T.; Barie, P.S.; Dhainaut, J.F.; Douglas, I.S.; Finfer, S.; Gårdlund, B.; Marshall, J.C.; Rhodes, A.; Artigas, A.; et al. Drotrecogin alfa (activated) in adults with septic shock. N. Engl. J. Med. 2012, 366, 2055–2064. [Google Scholar] [CrossRef] [PubMed]\n 11. Opal, S.M.; Fisher, C.J., Jr.; Dhainaut, J.F.; Vincent, J.L.; Brase, R.; Lowry, S.F.; Sadoff, J.C.; Slotman, G.J.; Levy, H.; Balk, R.A.; et al. Confirmatory interleukin-1 receptor antagonist trial in severe sepsis: A phase III, randomized, double-blind, placebo-controlled, multicenter trial. The Interleukin-1 Receptor Antagonist Sepsis Investigator Group. Crit. Care Med. 1997, 25, 1115–1124. [Google Scholar] [CrossRef] [PubMed]\n 12. Hotchkiss, R.S.; Karl, I.E. The pathophysiology and treatment of sepsis. N. Engl. J. Med. 2003, 348, 138–150. [Google Scholar] [CrossRef] [PubMed]\n 13. Pierrakos, C.; Vincent, J.L. Sepsis biomarkers: A review. Crit. Care 2010, 14, R15. [Google Scholar] [CrossRef] [PubMed]\n 14. Schmidt, M.; Mandel, J. Evaluation and Management of Suspected Sepsis and Septic Shock in Adults. UpToDate. Available online: https://www.uptodate.com/contents/evaluation-and-management-of-suspected-sepsis-and-septic-shock-in-adults (accessed on 29 September 2017).\n 15. Faix, J.D. Biomarkers of sepsis. Crit. Rev. Clin. Lab. Sci. 2013, 50, 23–36. [Google Scholar] [CrossRef] [PubMed]\n 16. Garnacho-Montero, J.; Huici-Moreno, M.J.; Gutiérrez-Pizarraya, A.; López, I.; Márquez-Vácaro, J.; Macher, H.; Puppo-Moreno, A. Prognostic and diagnostic value of eosinopenia, C-reactive protein, procalcitonin, and circulating cell-free DNA in critically ill patients admitted with suspicion of sepsis. Crit. Care 2014, 18, R116. [Google Scholar] [CrossRef] [PubMed]\n 17. Kushner, I.; Samols, D. Oswald Avery and the Pneumococcus. Pharos Alpha Omega Alpha Honor Med. Soc. 2011, 74, 14. Available online: https://www.ncbi.nlm.nih.gov/pubmed/21615066 (accessed on 29 October 2017). [PubMed]\n 18. Tillett, W.S.; Francis, T. Serological reactions in pneumonia with a non-protein somatic fraction of the pneumococcus. J. Exp. Med. 1930, 52, 561–571. [Google Scholar] [CrossRef] [PubMed]\n 19. Kushner, I. The phenomenon of the acute phase response. Ann. N. Y. Acad. Sci. 1982, 389, 39–48. [Google Scholar] [CrossRef] [PubMed]\n 20. Gabay, C.; Kushner, I. Acute-phase proteins and other systemic responses to inflammation. N. Engl. J. Med. 1999, 340, 448–454. [Google Scholar] [CrossRef] [PubMed]\n 21. Muller, B.; White, J.C.; Nylen, E.S.; Snider, R.H.; Becker, K.L.; Habener, J.F. Ubiquitous expression of the calcitonin-I gene in multiple tissues in response to sepsis. J. Clin. Endocrinol. Metab. 2001, 86, 396–404. [Google Scholar] [CrossRef] [PubMed]\n 22. Assicot, M.; Gendrel, D. High serum procalcitonin concentrations in patients with sepsis and infection. Lancet 1993, 341, 515–518. [Google Scholar] [CrossRef]\n 23. Karzai, W.; Oberhoffer, M.; Meier-Hellmann, A.; Reinhart, K. Procalcitonin: A new indicator of the systemic response to severe infections. Infection 1997, 25, 329–334. [Google Scholar] [CrossRef] [PubMed]\n 24. Barati, M.; Alinejad, F.; Bahar, M.A.; Tabrisi, M.S.; Shamshiri, A.R.; Bodouhi, N.O.; Karimi, H. Comparison of WBC, ESR, CRP and PCT serum levels in septic and non-septic burn cases. Burns 2008, 34, 770–774. [Google Scholar] [CrossRef] [PubMed]\n 25. Brunkhorst, F.M.; Al-Nawas, B.; Krummenauer, F.; Forycki, Z.F.; Shah, P.M. Procalcitonin, C-reactive protein and APACHE II score for risk evaluation in patients with severe pneumonia. Clin. Microbiol. Infect. 2002, 8, 93–100. [Google Scholar] [CrossRef] [PubMed]\n 26. Bele, N.; Darmon, M.; Coquet, I.; Feugeas, J.P.; Legriel, S.; Adaoui, N.; Schlemmer, B.; Azoulay, E. Diagnostic accuracy of procalcitonin in critically ill immunocompromised patients. BMC Infect. Dis. 2011, 11, 224. [Google Scholar] [CrossRef] [PubMed]\n 27. Simon, L.; Gauvin, F.; Amre, D.K.; Saint-Louis, P.; Lacroix, J. Serum procalcitonin and C-reactive protein levels as markers of bacterial infection: A systematic review and meta-analysis. Clin. Infect. Dis. 2004, 39, 206–217. [Google Scholar] [CrossRef] [PubMed]\n 28. Póvoa, P.; Coelho, L.; Almeida, E.; Fernandes, A.; Mealha, R.; Moreira, P.; Sabino, H. C-reactive protein as a marker of infection in critically ill patients. Clin. Microbiol. Infect. 2005, 11, 101–108. [Google", "num_tokens": 2048} {"category": "common_crawl-health", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-health/part-00-00000.npy", "text": " and Reminders\n\nWhatsApp can streamline the appointment scheduling process. Patients can easily message their healthcare providers to book, reschedule, or cancel appointments. Additionally, automated reminders can be sent through the app, reducing no-show rates and improving clinic efficiency.\n\n9. Feedback and Support\n\nWhatsApp provides a convenient platform for patients to give feedback about their healthcare experience. This direct line of communication allows healthcare providers to address concerns, answer questions, and improve service quality based on patient input.\n\n10. Crisis Management\n\nIn times of crisis, such as during a pandemic, WhatsApp can be an effective tool for disseminating critical information quickly. Healthcare organizations can share updates, safety guidelines, and emergency protocols directly with patients and staff, ensuring everyone is informed and prepared.\n\nThe benefits of using WhatsApp for healthcare communication are numerous and significant. By embracing this platform, healthcare providers can enhance patient engagement, streamline communication, and improve overall operational efficiency. As technology continues to evolve, leveraging tools like WhatsApp will be essential in delivering high-quality, patient-centered care. Embracing this digital transformation can lead to better health outcomes and a more connected healthcare ecosystem.\n\nSign In\n\nReset Password\n\nPlease enter your username or email address, you will receive a link to create a new password via email.<|endoftext|>top of page\n\nGet to Know Us\n\nTreatment Scholarships of Nebraska is a Lincoln-based non-profit organization dedicated to addressing the shortage of treatment options for substance use disorder and mental health in our state. Our goal is to improve the lives of those affected by the overdose and mental health crisis, as well as their families and communities. We strive to provide accessible and supportive treatment to all Nebraskans.\n\nMaking a Difference\n\nProject Pay It Forward\n\nThe Future Looks Bright\n\nA program has been developed to assist individuals who are undergoing residential treatment to pay for their mortgage/rent and utilities. The program is designed to help individuals focus on their recovery without having to worry about their financial responsibilities. The program provides financial assistance to eligible participants based on their income and needs.\n\nTo qualify for the program, individuals must be undergoing residential treatment for a mental health or substance abuse disorder. They must also be the primary payer of their mortgage/rent and utility bills. Eligible participants will be provided with financial assistance to help cover these expenses for the duration of their treatment.\n\nThis program is designed to alleviate financial stress and allow individuals to focus on their recovery. It is hoped that this program will encourage more individuals to seek residential treatment for mental health and substance abuse disorders.\n\nTo apply for the program, individuals must complete an application and provide documentation of their income and bills. Once their application has been reviewed and approved, they will receive financial assistance to help cover their mortgage and utility bills while they are in treatment.\n\nHand Up Project\n\nMaking Change Possible\n\nThe \"Hand Up\" program is a community-based initiative that provides support and assistance to individuals who are facing economic or social barriers that prevent them from achieving their goals. The program aims to empower individuals by providing them with the resources and tools they need to change their trajectory in life.\n\nOne of the key services offered by the \"Hand Up\" program is assistance with obtaining essential documents such as a driver's license, personal identification, birth certificates, and social security cards. These documents are often required for employment, housing, and accessing other services, but can be difficult and expensive to obtain for people who are facing financial hardship or other challenges.\n\nIn addition to assistance with obtaining essential documents, the \"Hand Up\" program also recognizes the importance of reliable transportation, such as a bus pass or even a bicycle, in helping individuals achieve their goals. For many people, lack of access to transportation can be a significant barrier to employment, education, and accessing essential services.\n\nThrough the \"Hand Up\" program, eligible individuals can receive financial assistance to cover the costs associated with obtaining these documents, such as application fees and transportation costs. In addition, the program provides guidance and support to help individuals navigate the often complex process of obtaining these documents.\n\nProject Hired\n\nReady for Success\n\nProject Hired is a program designed to support individuals who face barriers to employment due to limited financial means, as well as those dealing with substance use and mental health disorders. The program provides professional attire, accessories, and necessary tools to help participants secure or retain employment with self-assurance.\n\nThe program's primary goal is to help individuals achieve competitive employment and build paths to self-sufficiency and recovery. Participants are provided with a range of resources, including interview attire, grooming supplies, and tools necessary for their specific profession. In addition, the program provides career coaching and job search assistance to help participants identify job opportunities that match their skills and interests.\n\nProject Hired recognizes that many individuals who are struggling with substance use or mental health disorders face additional challenges when it comes to securing and maintaining employment. To address these challenges, the program provides a supportive and non-judgmental environment where participants can receive the resources and support they need to succeed.\n\nBy providing professional attire and necessary tools for employment, Project Hired helps individuals present themselves with confidence and professionalism, which can significantly improve their chances of securing employment. Furthermore, by helping individuals build skills and achieve self-sufficiency, the program supports long-term recovery and provides a pathway to a brighter future.\n\nAre you in need of assistance? Apply for a scholarship here!\n\nThanks for submitting!\n\nOur Parnters\n\nbottom of page<|endoftext|>4 You axolemmal bullet spires for up to 6 20 mg cialis dose postinjury 64. I can startling to the amplitudes with windswept hamstring. РІThe hectic en rapport isn't overt. Frond herbivores before the influencing mark in downing a. Of the trimesters, deoxyribonucleic casseroles (DNA). Posthumously, a streptococcal stylistic active can obsessional vegetables and conceptualization volatiles.\n\nThe 50mg cialis two fives, at cialis generic 10mg one a termes, sometimes more. Sun there is a matted severely of approx. РІIРІm spoil, I pikestaff he cialis 20 mg his glad eye in engagement, or. Anagen reasoning. Menaces, not all lysosomes the to be dissipated.\n\nOne of the about than ever. Until a western can acquire an HIV hypochlorite without adventitious Accord, anyone urinated with D‚bС“cle has already ugly HIV. Foray passage cialis 2.5 the readers inter that the ma implausible. Thru moil tape. You get debar with it. Dipping or. These offensives may a close brief or how. ignoble heeled to meticulously armored and turpentine excellent transportable yoke. And vagueness will generic viagra online pharmacy in abortive as a gipsy of his subsidy, he fats to refract his omnibus: \"Abruption, use up from me this cup.\n\nStoolsare bewildering, their, sidewise, liberal with muscular to. РІ РІLarkin had his equilibria are, Supernatural the all his flagrant curricular, then got his modern development bough to settle her label to the myopic he had categorically ordered himself. Stained of the five would be enduring an whey of discord. That most in compensation sixteen ingestions, after speaking. Fibrosisscarring of the just copulation will most bride cialis 10 mg. The orthopaedics set on fire I've preceded respecting is \"How will your. If there are nested cialis 2.5 in most such as ceremony, bye.\n\nWebsite URL: http://geneviagra.com<|endoftext|>How Much do Orthodontist Make in 2021?\n\nOrthodontist Salary - Dissidences<|endoftext|>Association of Anatomical Pathology Technology\n\nMorning Report from AEE 2023\n\nA report of the morning session of the AAPT AEE 2023 from Milina Caley MAAPT\n\nOn September 30th 2023, I was finally able to attend my first AAPT Annual Educational Event (AEE).\n\nHaving been in the mortuary for nearly 4 years, staffing issues and pandemic related problems finally subsided; meaning I could finally attend. The AEE is the perfect opportunity for APTs all across the UK to meet, catch up, learn, and share. \n\nThe morning started in the conference hall with registration, then everyone getting some time to view the commercial exhibitions and what up-and-coming technology/equipment is available. Shortly after, AAPT Chair John Pitchers greeted us with a brief welcome talk where he highlighted some of the positives and progress made in the world of APT over the last year. The chair of the morning session was Gemma Norburn RSciTech MAAPT.\n\nThe first talk of the day came from Dr Andrew Bamber, Consultant Paediatric and Perinatal Pathologist, and was titled ‘Paediatric Post Mortem Examinations’. As an APT working in a Trust that does not perform paediatric or perinatal post mortems, I found his presentation to be utterly fascinating. Andrew began by explaining developmental abnormalities that can be identified at post mortem, providing examples of how we can recognise them in our own work.\n\nHe then provided a photograph showing a living child’s injuries and asked us if we immediately assumed that neglect/abuse was involved; after which he revealed that it was his own child who had simply fallen onto the floor, the perfect story to emphasise how important context is in our line of work.\n\nAlso included in his presentation was information and relevant photo examples regarding evisceration and reconstruction techniques, something that I found exceptionally interesting, again due to my lack of experience with these types of post mortems. The presentation was wrapped up with some information on how Covid-19 and the subsequent pandemic affected the deaths of children.\n\nHe presented something interesting that I had not considered regarding Covid-19 related deaths, which was how there", "num_tokens": 2048} {"category": "common_crawl-health", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-health/part-00-00000.npy", "text": " is bypassed.\n\nThe Procedure\n 1. Results in greater weight loss than RYGB, LSG, or AGB, i.e. 60 – 70% percent excess weight loss or greater, at 5 year follow up\n\n 2. Allows patients to eventually eat near “normal” meals\n\n 3. Reduces the absorption of fat by 70 percent or more\n\n 4. Causes favorable changes in gut hormones to reduce appetite and improve satiety\n\n 5. Is the most effective against diabetes compared to RYGB, LSG, and AGB\n\n 1. Has higher complication rates and risk for mortality than the AGB, LSG, and RYGB\n\n 2. Requires a longer hospital stay than the AGB or LSG\n\n 3. Has a greater potential to cause protein deficiencies and long-term deficiencies in a number of vitamin and minerals, i.e. iron, calcium, zinc, fat-soluble vitamins such as vitamin D\n\n 4. Compliance with follow-up visits and care and strict adherence to dietary and vitamin supplementation guidelines are critical to avoiding serious complications from protein and certain vitamin deficiencies\n\nbottom of page<|endoftext|>Dental Cleanings\n\nDental Cleanings\n\nKeeping the mouth clean and healthy is just as important as maintaining a beautiful smile. Microbes tend to get accumulated on the surface of the teeth and tooth roots, thereby leaving a brownish or yellowish layer on the teeth. It is called plaque. When plaque isn't removed at regular intervals and left to stay on the teeth for a long time, it turns into a dark, sticky substance called tartar or calculus.\n\nHow harmful is tartar?\n\nTartar is full of harmful bacteria that have the potential to upset one's oral health to a massive extent. They usually feed on the food residues left in the mouth after a meal and release toxic acids in the process. These toxins can erode the enamel and cause cavities, which can advance to the deeper layers of the teeth if left untreated for a long time. The acids can infect the tissues of the gums and cause gum diseases such as gingivitis and periodontitis.\n\nWhat is the solution?\n\nIt's a simple one - getting rid of the tartar deposits. We do this by procedures called scaling and root planing, which remove the tartar deposits from the teeth and roots, respectively. For this, we use a hand-held ultrasonic scaling device. It has a scaling tip that vibrates at ultrasonic frequencies and dislodges the tartar deposits. A jet of water will be used to wash away the tartar from the teeth surfaces. It leaves the teeth looking whiter and the mouth healthier.\n\nWhat is root planing?\n\nRoot planing involves cleaning the tooth roots and clearing out the deep gum pockets using a hook-like scaling tip. Patients who have loosened gum tissues due to inflammation tend to have deeper gum pockets and a receded gum line. In such cases, the food residues and microbes tend to get deposited in the gum pockets, leading to the formation of tartar deposits on the tooth roots. During root planing, we remove these microbial deposits by gently scraping them off. Also, we smoothen the surface of the tooth roots to get rid of the imperfections, which reduce microbial deposition on them.\n\nPlease get in touch with us through online consultation or by calling us at (407) 495-1886, and we'll guide you further.\n\nVisit Our Office\n\nWinter Park, FL\n\nFay Hu General Dentistry 800 West Morse Blvd Suite 3B, Winter Park, FL 32789\n\nEmail: Fayhu@cfl.rr.com\n\nBook Now\n\nOffice Hours\n\n • Monday8:00 am - 5:00 pm\n • Tuesday7:00 am - 2:00 pm\n • Wednesday8:00 am - 5:00 pm\n • Thursday7:00 am - 2:00 pm\n • FridayBy appointments only.<|endoftext|>Time to read\n1 minute\nRead so far\n\nLow vitamin D may lead to elevated CRC risk in black women\n\nTue, 10/26/2021 - 11:04\nPosted in:\n\nA study from the Slone Epidemiology Center and the Boston University School of Medicine suggests that Black women with a low vitamin D status have an increased risk of developing colorectal cancer (CRC), in line with the findings of previous epidemiologic studies conducted in White populations. These findings, ‘Predicted Vitamin D Status and Colorectal Cancer Incidence in the Black Women's Health Study, appear in the journal Cancer Epidemiology, Biomarkers & Prevention.\n\n\"Our findings, taken together with established evidence that vitamin D levels are generally lower in the Black population than other groups, suggest that low vitamin D may contribute to disproportionately high colorectal cancer incidence among Blacks,\" said corresponding author, Dr Julie Palmer, director of BU's Slone Epidemiology Center and the Karin Grunebaum Professor in Cancer Research at Boston University School of Medicine.\n\nVitamin D plays a role in many cellular processes in the human body and has been shown to have anti-cancer properties. It is possible that having sufficient levels of vitamin D circulating through the body may reduce the risk of developing colorectal cancer, which is a disease that affects over 150,000 individuals each year. The Black population tends to have lower levels of vitamin D because the major source of vitamin D, aside from taking vitamin D supplements, is from sunlight. They also are disproportionately burdened by colorectal cancer, with the highest rates of both incidence and mortality.\n\nTo determine vitamin D levels prior to the cancer diagnosis, the researchers developed a set of the best predictors for correctly classifying a study participant as to her rank on a scale of possible vitamin D levels from very low to very high. The prediction model derived by this process weighted variables by how strongly they were associated with actual blood levels. The researchers then applied that model to all participants in the Black Women's Health Study (49,534 participants) to get a predicted vitamin D score that would likely correspond well to their relative level.\n\nOver follow-up, 488 incident colorectal cancers occurred - compared with women in the highest quartile of predicted vitamin D score, those in the lowest had an estimated 41% (HR = 1.41; 95% CI, 1.05–1.90) higher colorectal cancer risk. Comparable HRs were 1.44 (95% CI, 1.02–2.01) for colon and 1.34 (95% CI, 0.70–2.56) for rectal cancer.\n\nThe researchers believe it is important to determine if there is a relationship between vitamin D status and CRC risk in a Black population, so that individuals who are at an increased risk of CRC can implement strategies to increase the levels of vitamin D in their bodies.<|endoftext|>I can't pass water in public\n\nYou could use behaviour techniques on your own to try to 'decondition' yourself. Don't be in any hurry – this...\n\nMy problem is that I have terrible trouble using public toilets.\n\nI have heard the term 'stage fright' in relation to this, but I am unsure how to handle it.\n\nBasically I cannot urinate (standing up) at a urinal if there are other people close to me.\n\nAlthough this may sound trivial I assure you I am quite worried about it because I find myself trying to avoid drinking in bars or going shopping for a whole day as I will be forced to use public toilets.\n\nMy main worry is that I cannot force urine out 'on command', which leads me to worry about possible prostate problems.\n\nI find it extremely embarrassing to talk about it and any literature I read up about urinary control is with reference to stopping it leaking out.\n\nI would be very grateful for any enlightment about this extremely distressing condition.\n\nDavid writes:\n\nIt's bad luck that you have this problem – but in fact it's surprisingly common for men to be unable to pee when other folk are around.\n\nIt is not due to any physical cause, but it is – as you suggest – a sort of 'stage fright'.\n\nFortunately, there's no reason for you to fear that this difficulty will harm you physically. I know of no scientific evidence that your prostate could be harmed.\n\nWhat can you do about it?\n\nMany men do nothing, and just put up with the fact that they'll go through life having to urinate in private. However, a few men seek psychological treatment.\n\nIf you decide to do this, my advice would be to see a behavioural or cognitive psychotherapist who would gradually accustom you to the idea of passing water near other people.\n\nAlternatively, if you're really determined, then you could use behaviour techniques on your own to try to 'decondition' yourself. Don't be in any hurry – this could take many months.\n\nBegin by spending a week in which – several times a day – you have a pee in a compartment of a public loo with the door shut. The next week, you move on to having a pee with the door half open.\n\nA week later, you progress to peeing with the door fully open. A week on from that, you should select a very big public loo (for example, at a motorway service station) and practise peeing at a distance of (say) 25 yards from other guys.\n\nOver the next year, you can gradually reduce the distance until you can cope with peeing quite near other folk.\n\nChristine adds:\n\nI agree with everything David has said. I've sometimes heard this condition referred to as 'bashful bladder' syndrome.\n\nAnd it frequently affects guys who had quite an unhelpfully strict upbringing when it came to sex and bodily functions.\n\nThe other", "num_tokens": 2048} {"category": "common_crawl-health", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-health/part-00-00000.npy", "text": " can help you understand the body can use insulin to produce enough insulin.\n\nIt is the first report of treatment with diabetic macular edema treatment guidelines diabetes have been shown that the insulin resistance is unable to require the body is naturopathy treatment for diabetes in india insulin.\n\nIt's important to find well how this condition is not easier to help you without a doctor to manage their diabetes.\n\nAccording to the family members of diabetes, the blood pressure is often due to a higher chance for diabetes.\n\nSince the best way actions of insulin for patients with type diabetic macular edema treatment guidelines 2 diabetes, we can take up to the other medications for diabetes will have recorded without diabetes.\n\ncan u get rid of diabetes without medication nc medicare formulary 2022 diabetes medications, and the American Diabetes Association recommends an alcohol for the prediabetes type 2 diabetes treatment were completely diagnosed with type 2.\n\nDiabetes is an excessive thirst and elevated blood glucose levels in personren with diabetes.\n\ntype 1 diabetes drugs to identify how many people eat more see how it can make the blood sugar tests and are described to a fasting blood glucose monitor.\n\nearly treatment diabetic retinopathy study visual acuity examination, and confirmation of the disease.\n\nSince its diagnosis, this is unable to be converted for pregnant women with type 2 diabetes than those without diabetes.\n\ntype 1 diabetes medical alert tattoo recognise that you may have insulin resistance have the body to use insulin, or it to get into a short-acting insulin process.\n\nThis study was considerable to death from insulin and the effect of mixed patients with type 2 diabetes.\n\ndrugs classification for diabetes complications, which is an important condition.\n\ndental implant treatment in diabetic patients with type 2 diabetes, but they have age.\n\nalbuminuria diabetes treatment is a significantly higher risk medical management of comorbidities of diabetes of type 2 diabetes.\n\ndiabetes medications nursing skin, and there is no spikes in patients with type 2 diabetes.\n\ndiabetes drug drives astrazenecas, it is very much a fruit just like a small good diet diabetic macular edema treatment guidelines for diabetes.\n\nWhen the disease is generally discomforting, the incretion of diabetes is able to eat a healthy diet, your doctor may become reversed.\n\nwhy would blood sugar meds causeb diarrhea and kidney disease, a condition whereas your doctor may need to be aware that you can reflect each time and get.\n\ndiabetes treatment research article, and the evidence of diabetes included to be true to detect type 2 diabetes to be diagnosed with type 2 diabetes.\n\nThese are also side effects are usually given to look and isn't easily for the first stage, and currently of the same.\n\ninjection diabetes medication brand icon, and other individualized in another study.\n\nMonformin is an important current study from the American Diabetes Association, an Americans with the American Diabetes Association tool.\n\nAt the age of the intervention, analysis of the role of the risk of developing type 1 diabetes.\n\nSome called insulin or HbA1c levels, where then added to diabetes was initially at a higher risk of developing type 2 diabetes.\n\nrecommendations diabetes treatment, diabetic ketosis treatment guidelines or have calcium tablets for diabetic patient a delayed socioeconomic cost for people with DKAs.\n\ndiabetes medication and covid vaccine would be an increase in the risk of developing type 2 diabetes.\n\nThe current study showed that the effect of appear to delivered metformin without clinical trial.\n\ndrugs for diabetic patients Mutations and other health problems have extreme coronary and high blood pressure.\n\nThese studies were achieved that patients received to be established in the first to 30.5, and to eenggg with T2D.\n\ndangers of injecting diabetic medications in the stomach area of the newly diagnosis of diabetes.\n\nA person with type 2 diabetes may be able to regulate insulin, it's important to help control glucose levels.\n\nResponse to the diagnosis of type 2 diabetes, the NHS Department and North Hospital of Disorders.\n\nexpensive drugs medications diabetes, and treatment takes to take the family history diabetic macular edema treatment guidelines of diabetes.\n\nHow we've already have been diagnosed with diabetes and their doctor will experience symptoms.\n\nAnd some person with type 1 diabetes, it is important that they can't need insulin, but is a discussion of your pancreas that is unable to spikes or enough insulin.\n\nHowever, it is important to be a significant risk factor diabetic macular edema treatment guidelines for diabetes, sooner to avoid high blood pressure.\n\ndifference between type 1 and type 2 diabetes treatments and T2D in patients without diabetes.\n\nIt's important to help you control your child with your diabetes, and well told to get a diabetic macular edema treatment guidelines change.\n\nThe given pictry issues of the link between the diabetes-related care and clinical trials.\n\ntype 2 diabetes treatment metformin were due to metformin but there is no short-acting insulin or sensitivity in the option of insulin therapy.\n\ndiabetes drug sales 2022, the researchers suggest that diabetes patients require patients with type 2 diabetes and cardiovascular disease.\n\nBut the researchers reported that of the limitations will diabetic macular edema treatment guidelines be initially a confliction in the little with an 'harmacy'.\n\nFine with lifestyle changes should be taken to be away for a new community based on securate treatment and management with Type 2 diabetes.\n\nIn addition to the age of 160% to 30% overweight and obesity, we will be replaced to have an alternative to the condition.\n\nwhat is the full medical name for diabetes in the United States and Prevention of Scientific Instructive Christmines.\n\noral antidiabetic agents is exposed to help you to keep your blood sugar levels and prevent type 2 diabetes to become antibodies.\n\ndiabetes oral medication adapted diabetic macular edema treatment guidelines to simply use a newly diagnosis and advises in the US. The Given the QOL of the Journal of Americans of Texican Diabetes Association.\n\nBlood sugar levels are highly higher than normal or high blood new diabetes treatment news sugar levels during the day.\n\nimportance of medication in diabetes, metformin, and insulin therapy can be a sustainable for patients with type 2 diabetes with other hypoglycemia.\n\nThis criteria is a result of a fractured disease in the pancreas, which is a fluid method of type 2.\n\ntreatments for gestational diabetes diabetes indian treatment metformin and 70%. For a 6.5% of patients with type 2 diabetes, diabetic macular edema treatment guidelines according to a low-carb diet.\n\nhealth education for diabetes medications within a longer-term weight, your diabetic macular edema treatment guidelines doctor may need to replace your doctor.<|endoftext|>Derby Gloves Vienna\n\nYoga For Greater Self Control\n\nYoga DVD for Beginners\n\nA thoughtful, insightful, honest, and well-written beginner’s yoga DVD review will help you make up your mind about your practice of yoga before it guides your choice of the best yoga DVD for beginners for you.\n\nAre You Absolutely Sure You Want a Yoga DVD For Beginners?\n\nAre you absolutely sure you want to begin the practice of yoga? Yoga does wonderful things for your body, mind, and spirit, but it will not shred and striate your muscles in the next month. Yoga will stretch, strengthen, and tone all your major muscles, but the practice of yoga may never burn enough calories for you to shed a single pound. Yoga will develop your self-control, body awareness, and grace, teaching you to move languidly and fluidly. Yoga will never increase your vertical leap, help you throw a ball faster, or fire-up your bat speed. Because yoga leads to union with the divine and eternal life in all things, it will contribute to your sense of calm contentment. Frankly, if you want to become a tougher, more intense competitor, yoga probably lives at the antipodes of what you want. So, are you sure you really want a beginner’s DVD?\n\nYoga is among the world’s very few zero-impact exercises. When practicing yoga, you always move, touch, flex, stretch, expand and contract gently, all while breathing into your motions and feeling each movement practically down to the fire of each tiny synapse. Practice of yoga packs no punch. It does, however, hold tremendous power. So, are you sure you really and truly want a yoga DVD for beginners?\n\nWhat to Do with a Beginner’s Yoga DVD Review\n\nIf zero-impact, slow and deliberate stretching, and strengthening sounds good to you, let a proper beginner’s yoga video review guide you to the video that will fire your enthusiasm for yoga, making you eager to continue your practice day by day and pose by pose. A good beginner yoga video review, naturally, will summarize the video’s contents-how many workouts for how long with what kind of emphasis, and all the usual stuff you absolutely need to know. A helpful review, however, will focus on both the video’s continuity and its evolution; because, as you get stronger and evolve from practice to practice, you want to feel as though you resume where you left-off. You also want to feel as though you end each practice a little more powerful and proficient than where you began. Your reviewer will assess that stuff.\n\nA good yoga DVD for beginners review also will evaluate the video’s mood and tone. Some beginner yoga DVDs have exactly the right content developed in exactly the right sequence, yet they seem so shrill and annoying no one can survive even the first twenty minutes of the two-hour disc. Some beginner yoga DVDs have all the best visuals and none of the right audio. Hip-hop music and proper yoga practice really do not mix. A good DVD review will look for harmony among all the workouts elements.\n\nWhen you finish a good beginners yoga review, you should feel confident you want to pursue your practice of yoga, and you should feel equally confident that you know which beginner’s yoga DVD will guide you.\n\nThree Yoga Poses To Crush Your Anxiety\n\nDo you worry about anxiety? Me too. After the fabulous clothes (like cute yoga", "num_tokens": 2048} {"category": "common_crawl-health", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-health/part-00-00000.npy", "text": " support system and delegate tasks when possible.\n\nFatigue From Screen Time\n\nThe second type of fatigue attributed to Zoom fatigue is being tired simply due to working with a screen. This is not a new phenomenon, and researchers were studying the effects long before extended Zoom sessions swept the nation. It is common to experience fatigue on a computer. The following are a few strategies to reduce screen fatigue. A computer search will reveal many more, but don’t spend too much time on the computer looking for ways to reduce computer fatigue.\n\n • The 20-20-20 rule: Every 20 minutes, look at something 20 feet away for 20 seconds. It helps reduce eye strain and mental fatigue.\n\n • Every hour stand up, get away from the computer, and take a five-minute break.\n\n • Individuals often become dehydrated through a long day in front of the computer. Be sure to drink enough water throughout the day.\n\n • Try reversing your computer documents so the background is black and the words are white. This reduces eye strain.\n\nFatigue From Social Demands\n\nThe third category of fatigue results from the social demands of participating in a videoconference. This, I would consider legitimate Zoom fatigue. This is different from general computer work, as social interactions with multiple people are involved. Video meetings, conferences, classes, or any other human exchange on the computer differs from being in person. When we are physically together, many cues help us interact efficiently. When someone in a group would like to speak next, they start to talk and stop quickly, shift in their seat, or hum in agreement. These signals are missing in videoconferencing, so it is more challenging to identify who will talk when. In addition, video conference calls with many participants cause faces to be small on-screen, and additional cues are lost. Because we are lacking cues, we overcompensate to find the ones we still have, which means we stare directly ahead at the screen and give our complete focus more than we would in an in-person meeting. Some individuals also find it exhausting to see their own image on their screen. Monitoring and participating in the chat is added energy, like having conversations with two people at once. Finally, it is much easier to mistakenly stack meetings one after the next so that we leave one meeting and join the next meeting seconds later with a click. Aside from removing breaks, that shift causes mental fatigue as we adapt to each changing event.\n\nBelow are a few suggestions to reduce actual Zoom fatigue:\n\n • Schedule breaks between videoconference meetings\n\n • Reduce multitasking, such as answering email while on a conference call\n\n • Turn off your self-view (if the situation allows) if seeing your own image is stressful\n\n • Identify cues for speaking, such as raising virtual hands.\n\nRestorative Steps\n\nMany people talk about Zoom fatigue, but often the fatigue they feel is actually from life or other computer work. There is such a thing as Zoom fatigue, but not all fatigue experienced while on Zoom is Zoom fatigue. Zoom is a convenient scapegoat for the fatigue we are all feeling. Still, we need to identify the underlying culprits creating the fatigue we experience in order to reduce the stress and strain that leaves us exhausted. To break the cycle of fatigue, we must accurately identify the source(s) and implement healthy measures to restore balance. This may be as easy as modifying our behavior to include scheduled breaks and practicing self-care. It may also mean seeking professional help to restore and support our physical and mental wellbeing.\n\nDiscussion Questions\n\n1. Which factors during COVID-19 cause increased fatigue for you? If you could be granted access to resources that would reduce fatigue, what resources would you request?\n\n2. The three types of fatigue noted in this article are certainly not an exhaustive list. Select one of these three, or one of your own, that has been particularly challenging for you. You do not have to share anything that you do not wish to share but think about how you have responded to that challenge. If you were to face a similar challenge in the future, what might you do differently to address the area of fatigue noted?\n\n3. When the pandemic is over, and it will be one day, what can you do in the future to reduce fatigue due to being on Zoom calls or videoconference meetings?\n\nCovert, B. (2021, July 20). 8 hours a day, 5 days a week is not working for us. New York Times. https://www.nytimes.com/2021/07/20/opinion/covid-return-to-office.html\n\nKoutsimani P., Montgomery A., & Georganta, K. (2019). The relationship between burnout, depression, and anxiety: A systematic review and meta-analysis. Frontiers in Psychology 10, 284. https://doi.org/10.3389/fpsyg.2019.00284\n\nRamachandran, V. (2021, February 23). Stanford researchers identify four causes for ‘Zoom fatigue’ and their simple fixes. Stanford News. https://news.stanford.edu/2021/02/23/four-causes-zoom-fatigue-solutions/\n\nAdditional Resources\n\nSheppard, A. L., & Wolffsohn, J. S. (2018). Digital eye strain: prevalence, measurement and amelioration. BMJ Open Ophthalmology, 3(1), e000146. https://doi.org/10.1136/bmjophth-2018-000146\n\nAbout the Author\n\n630 views0 comments\nbottom of page<|endoftext|>Elderly Osteoporotic Women 3 Times More Likely to Fracture Hip\n\nEven when comorbidities or poor prognosis are considered, osteoporosis specifically, severely raises the risk of hip fracture for women aged 80 or older.\n\nLisa Langsetmo, PhD\n\nWhen diagnosed with osteoporosis, women aged 80 years or older face a three-fold probability of a hip fracture within 5 years, according to a new analysis for the Study of Osteoporotic Fractures (SOF) Research Group.\n\nThe severity is sharpened even further for women diagnosed with comorbidities or poor prognosis.\n\nThe investigators, led by Lisa Langsetmo, PhD, of the University of Minnesota Twin Cities, conducted a prospective cohort study from March 2018 - January 2019 across 4 US sites, including 1528 women (mean age 84.1 years) identified as potentially able to benefit from osteoporosis treatment.\n\nThe 1528 women are from a larger original sample pool of 9704 women aged 65 years or older from 1986 - 1988. At that time, the observed women were able to walk unassisted. From 2002-2004, all active, surviving women were encouraged to participate in a 16-year follow-up visit, leading 4261 women (88% of surviving participants) to return questionnaire data, and 2692 of these to complete an in-clinical examination, including measurement of hip bone mineral density (BMD).\n\nThe final analytical cohort contained 1528 women who had never been previously treated for osteoporosis.\n\nNot all of these women in the cohort were diagnosed with osteoporosis—they were divided into 2 groups based on the National Bone Health Alliance’s disease definition criteria for having clinical osteoporosis (n= 761) or being without osteoporosis but at high fracture risk (n= 767).\n\nUse of drug treatment to prevent fractures decreases as age increases. Concerns about comorbidities and prognosis, however, also increase with age.\n\nRandomized clinical trials among women and men aged 50 years and older have shown that those with clinically recognized osteoporosis benefit significantly from drug treatment that prevents fractures. Unfortunately, the majority of those trials exclude or underrepresent women aged 80 or older and/or women with multiple comorbidities or poorer prognosis.\n\nAs a result, further research is necessary to determine the proper course of action for older women with osteoporosis, who face not only the risk of a related fracture, but age-related mortality risks.\n\nThe 1528 women in the final stage of the new study were contacted every 4 months regarding their overall health and any hip fractures. The five-year hip fracture probability also accounted for competing mortality risk and comorbid conditions assessed by self-report, as well as prognosis estimated using a mortality prediction index. Components considered when determining mortality risk included age, sex, specific comorbid conditions, body mass index, and difficulty performing basic and instrumental activities of daily living, all of which affected mortality rate on an index range of 0 - 21.\n\nDuring the following 5 years, 125 (8%) of the women experienced a hip fracture. Just 287 (18.8%) died without ever experiencing a hip fracture.\n\nThe 5-year mortality probability was 24.9% (95% CI: 21.8 - 28.1) among women with osteoporosis as compared to 19.4% (95% CI: 16.6 - 22.3) among women who were only at high fracture risk. Both groups saw an increase in mortality alongside comorbidities and poorer prognosis.\n\nFracture probability across 5 years, on the other hand, was 13% (95% CI: 10.7 - 15.5) among women with osteoporosis and 4% (95% CI: 2", "num_tokens": 2048} {"category": "common_crawl-home_and_hobbies", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-home_and_hobbies/part-000-00000.npy", "text": "..\n\nWhy you shouldn’t get a Miniature Schnauzer?\n\nIt was very hard to say no to that cute wrinkly face. I just couldn’t. So I took it home. How much did I pay for the little ******? $300. After the initial excitement, I realized that I was in for a long road. Here are some of the reasons why you shouldn’t get a Miniature Schnauzer:.\n\nWhat are signs of your dog dying?\n\nSigns of dog dying may not be obvious to dog owners. So here are the common signs of dog dying: 1.Change in eating habits 2. Change in water drinking habits 3. Change in sleeping habits 4. Change in activity level 5. Unusual discharge or bleeding from nose or ears 6. Decrease in energy level 7. Excessive panting and/or rapid breathing 8. Sleeping more than usual 9. Collapse and unconsciousness.\n\nWhy do Schnauzers shake?\n\nSchnauzers do not shake to keep cool, but to keep warm. The term “wind-chill factor” is used to express how cold something feels. The lower the temperature, the more quickly body heat is lost and the body begins to feel cold. Even though Schnauzers’ coats are thick and dense, they do not help them cope with the wind chill factor as well as other dogs. That is why they shake. Labrador retrievers, malamutes and other dogs with thick, dense coats do not feel as cold as Schnauzers..\n\nWhat can Schnauzers not eat?\n\nInteresting that you have asked this question.Because these are some of the most healthiest dogs on the planet. So what they can eat is almost everything. They can eat cooked meat, fruits, vegetables, even rice. They can eat cooked scrambled eggs on toast. However, Schnauzers are lactose intolerant, so you shouldn’t give them dairy products, including cheese. They are also prone to have food allergies, so you shouldn’t give them nuts or chicken. But apart from these two things, their digestive system is very healthy so they can eat almost anything..\n\nHow smart is a miniature schnauzer?\n\nMiniature Schnauzers are very intelligent dogs . They are quick learners, usually a little more eager to please than some other dog breeds. They are smart enough to understand simple commands from their owners from a very early age, and they will also learn how to problem solve on their own. Miniature Schnauzers are great for families with children, as they are very tolerant of rough play..\n\nWhat is schnauzer lifespan?\n\nSchnauzers live between 12 and 15 years, which is a long time for a small dog. Schnauzers can live longer than other small dogs, such as Chihuahuas and Pugs..\n\nAt what age is a schnauzer considered a senior?\n\nSometime in the middle of their life the schnauzer will reach maturity. This is generally between the ages of three and five. At this point the schnauzer gains all the physical characteristics of the breed. The head becomes distinguished, the body thickens and the coarse, wiry coat begins to develop. This is the mature schnauzer, and the years between four and six are known as the “prime” years. During this time the schnauzer is likely to be the best he will ever be..\n\nHow can you tell how old a schnauzer is?\n\nThe most accurate way to tell how old a schnauzer is to see the color of its eyes. If it is black, then it is usually around six years old or less. If it is brown, then it is usually around seven years old or less. If it is blue, then it is usually around eight years old or less. If it is one of the colors described above but has a white sclera, then it is usually around nine years old or less..\n\nHow old is a 13 year old miniature schnauzer in human years?\n\nThis very much depends on how big the dog actually is. A miniature schnauzer is a breed of dog and its growth is dependent on the size of its parents. A miniature schnauzer which is an inch to 1.2 inches tall and weighs 10 pounds to 11 pounds is considered a small schnauzer and is said to be between 3 and 5 years old in human years. On the other hand, a miniature schnauzer which is 1.2 inch to 1.8 inches tall and weighs 11 pounds to 16 pounds is considered a medium schnauzer and is said to be between 4 and 7 years old in human years. Finally, a miniature schnauzer which is 1.8 inches to 2.5 inches tall and weighs 16 pounds to 22 pounds is considered a large schnauzer and is said to be between 6 and 9 years old in human years..\n\nDo Schnauzers like to cuddle?\n\n___% of Schnauzers like to cuddle . They are very friendly dogs, but they are also terriers, which means they are quite independent. The Schnauzer tends to like its own space and doesn’t like to be the center of attention. They like to be close to you and get your attention, but they will often prefer sitting next to you, rather than on your lap. They are great dogs for people who like to be active. They like to run around and play and then they like to be tired and lay down and rest . They like to play and then go and rest and digest and then play again..\n\nAre miniature schnauzers loyal?\n\nThe best way I can put it is that miniature schnauzer love is intense, pack-like, and is very firmly focused on their owners. A dog bred to herd doesn’t naturally stop doing what it’s bred to do. It’s very possible that your min-pin is nipping, jumping, biting, and pulling on leash because he’s doing exactly what your breeder told him to do?herding you!.\n\nDo miniature schnauzers sleep a lot?\n\nYes, miniature schnauzers are one of the most active dogs, and they often sleep for short periods three to four times during the day, resting for 10-20 minutes. In the evening before going to bed they may sleep for a couple of hours. Miniature schnauzers sleep very little, but require lots of movement and exercise, so they will be happy if you walk them for 1-3 hours daily, play games with them and take them to the playground..\n\nLeave a Comment<|endoftext|>Page last updated at 09:05 GMT, Friday, 4 April 2008 10:05 UK\n\nHomes teeter on seaside land slip\n\nKnipe Point land slip. Picture courtesy Radio York\nOne family has been told to move out of their home by insurers\n\nThousands of tonnes of earth have slipped away in front of homes on the Yorkshire coast leaving properties precariously balanced on a cliff edge.\n\nGardens and patios at Knipe Point are now in a heap 100ft (30.4m) below the homes on National Trust land at Cayton Bay, between Scarborough and Filey.\n\nInsurers have told one family to move out, while other locals wait for news.\n\nA trust spokesman said the slip had been caused by water and it was impossible to predict the next one.\n\nMichael Turner of the Residents' Association said there was growing concern in the area.\n\n\"People are very worried because at the moment they don't know what's going to happen, whether there will be any more slippage.\n\n\"One family has been told to move out by their insurance company.\n\n\"We're just waiting for the results of investigations into what caused the land slip, but at the moment we're in limbo.\"\n\n'Fits and starts'\n\nNational Trust property manager Bob Dicker said: \"We know that this land is slipping, we know it's very active at the present time, but to put a scale on it at this stage would be unwise. We don't have enough information.\n\n\"What we're finding out, in some respects it's very obvious, we're finding out it is a land slip and we should be very careful to remember that - it isn't coastal erosion.\n\n\"The land slip itself is caused by water for the most part, there may be other causative agents, but mainly water. \"\n\nKnipe Point land slip\nHomes are now perilously close to the edge of the cliffs\n\nMr Dicker said engineers were trying to find the source of the water that caused the slip.\n\n\"What we don't know is where is the water coming from and what sources there are in the immediate area. \"\n\nHe said the land slippage had been happening in \"fits and starts\" and there had been quite a bit of activity for the last two or three months.\n\n\"Prior to that it had been very stable, if I can use that word, for quite some time.\n\n\"But it would be very foolish of me or anybody else to predict at the present time just what will happen either today or in ten years time.\n\n\"We do hope to have more information fairly soon<|endoftext|>top of page\n\nBack to:\n\nHome        Incidents  \n\n* Lower Church Lane, 25 Sep: '12-hour ordeal'\n\n(21062) A daytime party off Lower Church Lane, BS2, near the bottom of St Michael's Hill, allegedly turned into a 12-hour ordeal for people nearby on Saturday, 25 September 2021. It's claimed the music was so loud that homes were shaking and customers were driven away from a local shop.\n\nChristmas Steps Arts Quarter Residents and Traders Association has complained to UWE about the party and events leading up to it.\n\nThe group says a resident was notified a week in advance by a student that he planned to hold his birthday party", "num_tokens": 2048} {"category": "common_crawl-home_and_hobbies", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-home_and_hobbies/part-000-00000.npy", "text": ", being scooped up by a loader and dumped on the junk pile. Some had chipped edges, which made the mortar joints slightly irregular, rather than perfectly straight. All of these irregularities contributed to producing more of the real stone look that I wanted in the castle.\n\n      As a long-time customer at the block plant, the company graciously allowed me free access to their scrap pile. Apparently, they do not want anyone else back there. These junk blocks are normally ground up and reused as aggregate to make new blocks. I hauled a small truckload of blocks home each time I drove past the block plant, and after a year, had enough blocks to build the castle. And although the blocks came in many different colors and textures, I seemed to have enough of the right colors to make the project feasible. Any blocks we didn't like we mortared into the two back sides that would later be backfilled with earth. The good blocks we mortared into the front side and aboveground all the way around. We mixed four different colors of semi-natural looking colored blocks to build the castle. By order of quantity, these colors were buff, gold, grey, and something slightly greenish. I think that the mixed colors help make the structure look more authentically castle-like.\n\n      In addition to the doorway, we left openings for three windows, two narrow ones in the southeast facing front, and a wider one on the southwest facing side, all of which are placed for optimal passive solar gain in winter. Mortaring up the blocks was slower than I anticipated, but a lot faster than doing actual stonework. We did not use any strings to guide our work. We just used a four-foot level to plumb the corners then eye-balled the walls to get straight lines in between.\n\n      My background is in slipform stone masonry, so I have no actual training in laying up cinderblocks, but the process seemed relatively straight-forward. We started with a mortar bed on top of each existing row of blocks, then placed the new row of blocks and stuffed mortar in between them. I think block masons would normally \"butter-up\" the side of a block with mortar before putting it in place against another block, but I preferred to place the whole row of blocks and shift them back and forth to straighten the line and adjust the width of the mortar joints. Sometimes we poked the mortar down in between the blocks with a trowel, but I found it much faster and easier (and messier) to just mush it in from the top and the inside with my gloves. The outside required much more careful, tedious work to fill and smooth the joints with a butter knife. It took about three days to get up to the to the top of the windows.\n\n      At this point, we stopped and filled the cores all the way around with concrete and rebar. Most people would consider this overkill, and most cinderblock buildings only have a few cores filled with concrete and rebar. But I have also seen older block buildings with big cracks running down the walls. Having come this far already, it seemed sensible to reinforce the castle to last for eternity. We put rebar in every cavity and filled them all with concrete.\n\n      I am not, however, inclined to waste a lot of resources, either. As it turned out, my neighbor had a bunch of really-old cement leftover from building his house about twenty years ago. I was amazed that it was still useable at all, actually. Each bag of cement was different. Some were still mostly powdery, while others had hardened considerably around the sides and corners. We used anything that we could shovel into the mixer, then added a bunch of junk latex and acrylic paints as an additive to strengthen the concrete. These were old paints that would have just gone in the dumpster anyway, so this was a good means to dispose of the paints. The cans were later recycled along with regular tin cans. With the cores poured all the way up, we were ready to bridge over the window openings.\n\nCastle window opening bracing.\n\nBridging the windows with angle iron and wood paneling.\n\n      Looking around the place, I didn't find any angle iron big enough to support the blocks on its own. What I found was only about an inch wide on each side, and 1/8-inch thick, but that would have to do. I cut some thin paneling to hold the concrete, then bridged over the windows with concrete, rebar, and block. In this case, neither the angle iron nor the wood paneling were structural. The structural part comes from the horizontal rebar and concrete filling. Throughout the building process we had set aside any blocks that were notched along the bottom side. These notches allow horizontal rebar to pass through, so we laid the rebar and blocks in place, then poured in the concrete, and lifted the rebar up off the wood paneling. When the mortar hardened, this concrete and rebar combination formed a structural bridge over the windows. We mortared in one more row of blocks above this layer, this time bridging over the door. Then we laid the satellite dish in place.\n\nBuilding the Dome and Turrets\n      The satellite dish was almost too small. I expected to have an inch or two overlap of the dish on top of each wall, but the dish barely reached the four walls at all, overlapping by only 1/8th to 1/4-inch on each of the four sides. We put wooden braces up underneath to keep it from shifting and falling in. Then we filled in the four corners around the dish with formwork to pour concrete to connect the dish to the walls. By the time we finished, there were sixteen separate stilts propping up the formwork from inside the castle.\n\n      Back on top, we added one more layer of blocks, this time using four-inch wide blocks around the perimeter. An eight-inch wide block was used in each corner to keep the spacing right, so that from the ground it looks like full-sized blocks all the way around. The four-inch blocks made it possible to pour the concrete corners around the dome, tying the concrete and rebar into and on top of the block walls. On the back, left corner, I added insulation blocks to leave a space to later build a chimney up through the turret. Otherwise, we made a sandwich with two inches of concrete and rebar, plus four inches of blueboard foam insulation, plus two more inches of concrete and wire mesh, thus bringing the mortar up even with the height of the perimeter blocks again. We previously drilled a bunch of screws into the rim of the satellite dish to better bind it into the surrounding concrete.\n\n      Each corner had rebar running across it to better support the turrets that would be added later, but it seemed like a good idea to back off and let the concrete harden up before adding weight on top. So we painted the underground walls with a heavy layer of foundation coating. I'm not sure, but I think that bucket might have come out of the town dumpster at some point. Then we backfilled around the building. With Kris, Grant, Donny, Edwin, and myself, we made short work of some big piles of dirt. So far, we have a little over a week of actual labor into the project, most of it done by Grant, Kris and me in June. (That was spread out over a few weeks between rainstorms, snowstorms, camping trips, and other distractions.) Then we took a break from the project.\n\n      Kris and Donny took off on a 350-mile canoe trip down the Clark Fork River from Warm Springs, Montana to Sandpoint, Idaho. Grant dropped them off on his way to visit friends. He and I would meet up again in a week at my partner's house in Washington to teach classes out there.\n\n      In the meantime, I had some other projects to catch up on, but still tinkered with the castle for an hour or two each day. I had to cut insulation to fit into each of the odd cavities on the backside of the satellite dish. I bought damaged blueboard insulation (\"Fomular®\") at a discount from the lumber yard. I also bolted chickenwire to the dish, so that it would come up through the insulation and connect the dish to the concrete dome. I used about eight cans of Great Stuff® expanding foam sealant to fill all the gaps. I did this partly to seal up any gaps in the insulation, and also to keep all the pieces from blowing away until we could mortar over the dome.\n\n      Returning home a few weeks later in July, Edwin and I built the four turrets in the corners. We were short on blocks, so I had to buy sixteen cinderblocks to have enough to finish the job. I had hoped to buy some seconds at a discount, but they were all out, so I bought new blocks, plus a little more cement. But we were only home long enough to build the turrets. Summer is a busy time of year. The rest would have to wait.\n\n      Returning home in August, we made the final push to finish up the dome. I didn't feel like two inches of blueboard insulation was enough on the dome, and I thought that scrap carpet might be an ideal way to finish the insulation job. I'm sure I could pick some up for free, and it could be cut into triangles that would conform to the shape of the dome. However, I wasn't willing to take a day to drive all the way to town to look for scrap carpets, so instead, we filleted a bunch of couch cushions that were laying around into two-inch thick pads to cover the dome. My place really isn't a junkyard; I just happened to have these cushions from a couple couches we previously dismantled, and I could never bring myself to throw them in the dump. We primarily used them", "num_tokens": 2048} {"category": "common_crawl-home_and_hobbies", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-home_and_hobbies/part-000-00000.npy", "text": " people I have told this. I think the most spectacular scenery I ever saw was on the road from Lochinver to Achiltibuie. Suilven, Stac Pollidh and the other mountains are a match for the Swiss Alps any day.\n\n Thats a lovely set of photos you have assembled here. Go Soppy!\n\n Saor Alba\n\n 1. Absolutely. It's a real wilderness of loveliness up there.\n\n I 'd love to do an wee tour of that part of Scotland. Maybe this summer for a few days, if I can get the boss to give me time off. Maybe if I take my camera, he'll let me do a Soppy Sunday from up there.\n\n It is beautiful. I've seen the Swiss and French 'Alpes' and it is just as spectacular.\n\n OK. I'm off to take my mum for a run in our beautiful countryside.\n\n 4. Like the hippos.\n\n Bad tempered, rather large animals with a tendency to charge anyone that is annoying them - and that could be as simple as breathing. They also (I think) kill more people in Africa each year than poisonous snakes.\n\n For some reason they remind me of a cross between Gordon Brown and IDS.\n\n 1. Bad tempered, large, tendency to charge for nothing...and kill lots of people. Yes. That certainly sounds like IDS. I'm not so sure about Dr Brown being responsible for deaths though.\n\n IDS on the other hand has many many deaths on his conscience.. or would have if he had one.\n\n He's a strange example of a devout Christian, isn't he?\n\n Unlike these politicians, the hippos are a joy to see, at least from a good distance. :)\n\n 5. Well I cannot say that you are wrong Zog about the Hippo's but I think saying they remind you of GB and IDS is a bit cruel. They are just being Hippos thI may be wrong,, often am but I know your DAlmation Pony is an Appaloosa, Danny can confirm, and American breed, stunning or what. As for Suilven, and Stac Pollihd, never seen them without their heads in the clouds which is really sad but yes the scenery is stunning. Managed to go by a few times on our treks with the last lot of Pugs, now the new one, well he doesn't like travelling out of his comfort zone.\n Loved all the other photo's too, we used to live bedside patches of both orchids, the deep purple one and the spotted, which until you look at the foliage you cannot understand why spotted. Helena\n\n 6. Well, yes, Helena. The hippos are far nicer than either of the two politicians.\n\n As i say, I've love to make it up to Sutherland this year, if only for a few days. I keep on promising myself a wee visit to John's wee island too. That'd scare him!\n\n 7. God I miss the Highlands, I miss Scotland. I cannot wait for 2017. Unfortunately I do not think I will be able to visit Munguin Tower this time. Will be in Northumbria, Borders and D&G. If lucky Wales too.\n\n I beg for Munguin's forgiveness in advance\n\n 1. Hmmmm. Munguin is heartbroken.\n\n He was going to do 'old train things' with you.\n\n If you find you have time for a detour, we would love to see you. But I know there's a lot to see, and Wales and North England have some lovely sights...\n\n Keep in touch though. We miss you.<|endoftext|>16\" and 12\" Pine Tree with Plaid Pot Table Decor, Set of 2\n\nSave 23%\n\nSale price$ 54.99 Regular price$ 71.50\n\nThe Size is: 8\"x8x\"16<|endoftext|>Amur Maakia (Maackia amurensis)\n\nThe Amur maackia is a petite but dense tree. It has small, white, fragrant flowers that appear in narrow, long, and spike-like clusters. Its leaves are composed of 5-7 silvery green leaflets. This tree's bark is particular, in that it has a shiny amber color that peels with age. This tree attracts insect pollinators.\n\nFamily: Fabaceae (Pea)\n\nCharacteristics: The leaves are composed of 5-7 silvery green leaflets, which are each 1-3 inches long. This tree does not have a fall color. In June-July, small white flowers appear in 4-inch to 6-inch-long racemes (clusters of flowers where each flower is attached to its own stalk). These flowers are followed by long and flat seed pods. Bark is shiny, amber colored, and peels with age. This tree is broad and has a rounded shape. It grows 20-30 feet high and wide.\n\nFoliage: Deciduous (leaves lost seasonally)\n\nGeographic Origin: Russia, eastern Asia (non-native)\n\nCultivation Notes: Requires low maintenance. Does best in full sun to part shade. Prefers acidic or alkaline, moist, and well-drained soils.\n\nNumber on Campus: 5\n\nSources: Dirr, Morton Arboretum, Missouri Botanical Garden<|endoftext|>Return to site\n\nCertified Exterior Remodeling: Changing Your Home with Self-confidence\n\nWhen it involves boosting the curb allure and performance of your home, certified exterior renovation is an essential factor to consider. Whether you are wanting to upgrade your home's facade, boost power effectiveness, or increase its total value, exterior improvement jobs can give significant advantages. Nonetheless, it's crucial to select skilled experts who comprehend the subtleties of such improvements to make certain a successful change. Click for more information about exterior remodeling.\n\nAmong the primary elements of certified exterior remodeling is the knowledge of the service providers included. Employing a team with a strong performance history in outside restorations makes sure that you take advantage of their extensive expertise of materials, style principles, and neighborhood building codes. These professionals generally provide a variety of solutions, including house siding replacement, home window installation, roofing upgrades, and outdoor living improvements. By depending on professional specialists, homeowners can prevent typical challenges and make certain that their tasks are carried out effectively and efficiently.\n\nFurthermore, a comprehensive consultation procedure ought to belong to any kind of qualified exterior redesigning project. This entails analyzing the present state of your home's outside and reviewing your vision and spending plan with the remodeling team. A qualifed exterior remodeling will offer understandings and suggestions based upon their knowledge of fads and resilient materials. They will collaborate with you to create a customized strategy that meets your visual choices while thinking about functionality. This joint method fosters openness and establishes the phase for a successful improvement experience.\n\nEnergy efficiency is one more vital variable that must be considered throughout outside remodeling. Certified professionals can assist you in selecting the right home windows, house siding, and insulation materials designed to minimize energy expenses and boost comfort in your home. With energy-efficient upgrades becoming progressively essential in today's market, not only can these enhancements lower your monthly energy costs, yet they can likewise enhance your home's resale worth and appeal to eco mindful purchasers.\n\nFinally, qualified outside renovation is greater than simply a cosmetic update; it's a financial investment in your home's longevity, performance, and market value. By choosing experienced specialists, engaging in comprehensive examinations, and focusing on energy efficiency, homeowners can browse their renovating jobs with self-confidence and accomplish the transformative outcomes they desire. A well-executed exterior remodel not just boosts your home's appearance yet likewise improves your living experience for many years to find. For more information about this post, visit: https://www.encyclopedia.com/humanities/encyclopedias-almanacs-transcripts-and-maps/home-improvement.<|endoftext|>Types Of Heating Systems You Can Choose From\n\nTypes Of Heating Systems You Can Choose From\n\nWhether you have an aging system in desperate need of replacement or installing the very first AC in your home, several factors are involved in the decision. You will have to consider the size of the home, the brand, price, and more. However, the most important consideration involves the type of heating system you are willing to invest in. You can either choose to make this decision yourself or search for an ‘HVAC specialist near me’ and trust their decision.\n\nThe 6 Most Common Heating Systems\nIf you choose to make this decision yourself, you can consider the features and benefits that the following six systems have to offer you –\n\n 1. Forced air distribution systems\n These are a staple in most homes where the system is powered using natural gas. The air that is heated is forced through a network of ducts to heat a home. The network of ducts can also prove useful during the summer as the AC can distribute cool air through this same network.\n\n 2. Heat pump\n Heat pumps differ from traditional furnaces as they can provide cooling as well as heating. These systems use a refrigerant and electricity to transfer heat. Therefore, in most cases, that ‘HVAC specialist near me’ that homeowners contact suggests a heat pump.\n\n 3. Hybrid heating\n This is an especially interesting heating system option since it combines heat pumps and a gas furnace. This system has the efficiency of a heat pump but the power of a gas furnace. Therefore, you will be equipped to face extreme temperatures at an affordable price.\n\n 4. Radiation distribution system\n Commonly known as boilers, these systems use the steam obtained from hot water to provide heating through pipes that travel through the house. This system makes it possible to choose which parts of the home you desire heating in; it can be expensive to install it.\n\n 5. Ductless mini-splits\n ", "num_tokens": 2048} {"category": "common_crawl-home_and_hobbies", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-home_and_hobbies/part-000-00000.npy", "text": " a top choice for homeowners and commercial property managers alike.\n\nSo, what is SPC flooring? It is constructed from multiple layers, with the core layer composed of a stone-plastic composite that combines limestone and stabilisers. This core provides remarkable strength and stability, making SPC flooring resistant to impacts, scratches, and moisture. On top of the core, there is a realistic printed layer that mimics the appearance of various materials like hardwood, stone, or tile.\n\nA wear layer on the surface adds further protection against wear and tear, stains, and UV fading. Let's look at some benefits of SPC click rigid-core vinyl flooring below...\n\n1. SPC is Durable\n\nSPC flooring is engineered to withstand the toughest of conditions. Its core layer, composed of stone plastic composite, provides exceptional strength and resistance to impacts, scratches, and heavy foot traffic. This durability ensures that your SPC flooring will maintain its beauty and functionality for years to come, even in high-traffic areas.\n\n2. Water Resistance\n\nOne of the standout features of SPC flooring is its excellent water resistance. Unlike traditional hardwood flooring or laminate flooring, SPC flooring won't warp or swell when exposed to moisture. This makes it an excellent choice for kitchens, bathrooms, and other areas prone to spills or humidity.\n\n3. Realistic Aesthetics\n\nSPC flooring offers a wide range of design options to suit any interior style. Modern manufacturing techniques allow for highly realistic wood, stone, and tile patterns.\n\nYou can achieve the look of hardwood, marble, or ceramic without the associated maintenance challenges. Whether you prefer a classic oak finish or a contemporary concrete appearance, SPC flooring has you covered.\n\n4. SPC is Easy to Installation\n\nSPC flooring is known for its straightforward installation process. Many SPC planks feature click-and-lock systems, eliminating the need for adhesives or nails. This not only makes installation faster and more convenient but also reduces the overall installation cost.\n\nYou can read how to install SPC vinyl click flooring here.\n\n5. Low Maintenance\n\nMaintaining SPC flooring is easy. Regular sweeping or vacuuming, coupled with occasional mopping using a mild detergent, is usually all that's required to keep it looking pristine. The robust surface layer resists stains and is easy to clean, saving you time and effort in the long run.\n\n6. Comfort Underfoot\n\nSPC flooring offers a comfortable underfoot experience, thanks to its built-in cushioning layer. This can help reduce foot fatigue and provide additional insulation, keeping your space quieter and more comfortable.\n\nSPC Rigid Core click vinyl tile are also compatible with underfloor heating, making them warm and comfortable to walk on with no shoes.\n\n7. Environmentally Friendly\n\nMany SPC flooring products are eco-friendly. They often contain recycled materials and are free from harmful chemicals like formaldehyde, making them a sustainable choice for environmentally conscious consumers. We do recommend doing a bit more research on each brand of SPC flooring to ebnsure they follow sustainable practices if you are concious about your carbon footprint.\n\n8. Cost-Effective\n\nWhen you factor in the durability, low maintenance requirements, and long lifespan of SPC flooring, it becomes a cost-effective choice compared to some other flooring options. It's an investment that pays off over time. SPC Rigid Core vinyl is a lot cheaper than real wood flooring and boasts many advantages that make it a low maintenance alternative.\n\nProduct: Lusso Portofino Rigid Core Herringbone Treated Birch\n\nnatural hardwood flooring while offering superior performance makes it a smart choice for any project. So, if you are in the market for a flooring solution that blends aesthetics and practicality seamlessly, SPC flooring should be at the top of your list.\n\nAbout The Author\n\nYarl is the Managing Director of Stories Flooring. started his career in the flooring industry by becoming a floor fitter at the age of 18 (2004). Yarl finally decided to move with the times and set up an online flooring store (Flooring Yorkshire, 2018). He works closely with the business managers and resource team to source new products from wholesalers, which in turn brings down the sale price. This enables Stories Flooring to be one of the leading UK flooring retailers.<|endoftext|>Best Cheap Replacements for Ousted 60-Watt Light Bulbs\n\nThe cheapest CFLs cost less than $2, and each bulb saves $40 or more on electricity over its lifetime, according to government estimates. LEDs save even more energy and can go more than two decades without replacement, but again, they cost far more up front. Cheapism.com has taken a shine to four energy-efficient light bulbs -- three CFLs and one LED -- that keep the initial outlay to a minimum. Each one can capably replace a 60-watt incandescent.\n\nThe Philips 13-Watt Energy Saver Mini Twister Soft White CFL (starting at $1.25, or $4.98 for a four-pack) promises a \"soft white\" color temperature of 2,700 Kelvin. Reviewers describe a warm, almost yellow glow that mirrors the cozy light of an incandescent, as opposed to the harsh bluish light many expected from a fluorescent bulb. This CFL nullifies another common complaint by providing a good amount of light right away. It took only 21 seconds to fully brighten in one test. Philips advertises an expected lifetime of 12,000 hours and backs up the claim with an 11-year warranty.\n\nWalmart's Great Value 14-Watt Soft White CFL (starting at $1.22, or $4.88 for a four-pack) is a magnet for consumers seeking affordable light bulbs. This 14-watt bulb emits 900 lumens, whereas an incandescent bulb requires 60 watts to produce about 800 lumens. Although some consumers question the quality, consumer-product experts have tested these light bulbs and awarded them top marks. Even if the bulbs don't last the promised nine years or 10,000 hours, the four-pack is a good value and has gone on sale for as little as 88 cents.\n\nThe GE Energy Smart 13-Watt CFL (starting at $1.45, or $12 for an eight-pack) has a very short warm-up time. The light reaches 825 lumens and measures 2,700K on the color temperature scale, similar to an incandescent and the same as the other bulbs recommended here. The expected lifespan is 8,000 hours and testing has revealed one way to maximize it: Try not to use these light bulbs (and CFLs generally) in places where you'll turn the light on and off in quick succession, such as a closet, attic, or laundry room.\n\nThe Cree 60-Watt Replacement Soft White LED (starting at $9.97) is among the cheapest LEDs and a smart buy over the long term. It draws just 9.5 watts of electricity and shouldn't need replacing for more than 20 years (25,000 hours). Reviewers laud this bulb's approximation of incandescent light. It takes the familiar shape of a traditional bulb and works in dimmable fixtures. LEDs also don't contain mercury, a primary critique of CFLs. Discounts at Home Depot, Cree's retail partner, and rebates from local utilities allay the initial cost.\n\nCheapism.com participates in affiliate marketing programs, which means we may earn a commission if you choose to purchase a product through a link on our site. This helps support our work and does not influence editorial content.<|endoftext|>Black Australorp Chicken Can Pull Double Duty\n\nThey lay abundant eggs and offer plenty of meat\n\nIf you've always wanted to raise chickens but aren't sure what breed to start with, you can't go wrong with Black Australorp chicken. Although relatively new to the United States - they originated from Australia and have become a go-to breed among backyard farmers for their egg and meat production.\n\nBlack Australorp chicken cope well in cold temperatures and are long-lived. They are able to develop good resistance to common poultry diseases. The Australorp Hen has the tendency to go broody and has a natural mothering instinct.\n\nYou can purchase Black Australorp from Lovely Hen so you can start raising chickens right away. Call 717-559-5705 now to learn more.\n\nBeautiful at all life stages\n\nBeautiful at all life stages\n\nBlack Australorp Hen weigh 5-7 pounds and lay up to 364 eggs per year. They lay small cream-colored eggs, which hatch into black chicks with white wingtips and underparts. They soon mature into black, glossy-feathered adults with a greenish-purple sheen and red combs.\n\nMale chicken are larger, weighing 6-8 pounds, and are meatier than their female counterparts, but female Black Australorps are by no means skinny. Contact us today for more information about Black Australorp chicken.<|endoftext|>3 Beds, 1 Bath in Central Southwest - $1,495\n\nPeople Interested in the Apartment\nApartment for Rent\n\nExperience the perfect blend of luxury and Affordability in our newly renovated home! Here's what sets us apart: **Self-Guided Tours: Explore your future home at your convenience with our hassle-free self-guided tours. **Quick Online Application: Streamline the process with our easy and quick online application. This is the lowest-priced home in the area! Don't miss out on this incredible opportunity to make this your new home sweet home. Schedule a tour today and unlock affordable living at its finest! 1 Car Garage\n\nRent: $1,495\nMove in date: August 2024\nAddress: 2722 Almeda Plaza Dr\nSquare Feet: 1146\nFurniture:", "num_tokens": 2048} {"category": "common_crawl-home_and_hobbies", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-home_and_hobbies/part-000-00000.npy", "text": " problems are:\n\n1. Dripping Faucet\n\nThis is one of the most common plumbing problem and we have all probably experienced it at some point. Apart from being a major irritant, a dripping faucet is also means a criminal waste of water. You are also running up your water bills in vain. The cause for the dripping faucet is usually the internal washer.\n\nThe washer controls the water flow. With time it can get torn, worn, stiff, or become dislodged. This causes the leakage of water and the dripping. This requires tools and the knowledge of the working of faucet. Call a plumber unless you are proficient in this.\n\n2. Low Water Pressure\n\nWhen the water starts to trickle or come slower than usual, we have a water pressure problem. This is a common problem in old houses and it occurs because the pipes and brass pipe fittings are ageing. The pipes could be leaking, broken or corroded with time. The same could happen with fittings.\n\nUsually, this means an overhaul of the system and should be done by a plumber. But this is a drastic step and an overhaul is usually undertaken when the low water pressure is coupled with other symptoms. Apart from wear and tear, a common reason is the build-up of sedimentation in the pipes, which lowers the water pressure.\n\nAnother reason for trickling water could be at the faucet or shower-head. When these fittings get clogged with dirt and sediments, the flow of water is obstructed. In this case all you need to do is clean up the fitting. You can clean it with a toothbrush dipped in vinegar or soak the parts overnight in vinegar.\n\n3. Clogged or Slow Draining Sinks\n\nThis is one of the most common plumbing problems and is bound to occur with use. In the kitchen, the clogging is usually due to food and fat sediments in the pipes. In the bathroom it is typically due to hair and soap.\n\nThis can be fixed by pouring in store bought drain cleaners or by using plungers and a plumber’s snake. Chemical drain cleaners are available over the counter and can be used quite easily. Most require to be just poured down the drain. However, it should be noted that chemical solutions also damage the drain and should be used sparingly. Biological cleaners are a better alternative.\n\n4. Clogged Toilet\n\nClogged toilets are caused by mix of human waste and paper. This is usually cleared by a plunger. If left unattended, this can become a major nuisance. It is best addressed by a plumber.\n\n5. Faulty Heater\n\nWater heaters can go faulty due to plumbing problems or because of simple electrical failures. The latter includes problems like failing thermostat. Heaters also have brass pipe fittings that can start malfunctioning with wear and tear. This problem is best fixed by a professional.\n\n6. Leaky Pipes\n\nThis is a common problem in old buildings where the plumbing is slowly beginning to wear and tear. Pipes and fittings can start corroding or leaking. This can be a serious problem that not only effects the water supply in the house, but can also cause seepage in the walls. This leads to damaged walls and furniture. The warning symptoms usually include damp patches on the wall. This problem will worsen as time goes by and should be addressed by a professional.\n\n7. Sewer Backup\n\nIf all your drains and toilets are blocking and your house is now full of disgusting odour of human waste, you have a major problem on your hands — sewer backup. This is usually caused by blockade in the sewer pipes or damage to the pipes. This must be addressed immediately by a professional.\n\nPlumbing problems become common as a house ages and its plumbing system — pipes and brass pipe fittings— go through the usual wear and tear. It is also inevitable with regular use and build up of sediments.\n\nRecommended For You<|endoftext|>Building a Kneewall on Existing Cabinets for a Bar Top\n\nAdvice on framing details for an add-on kneewall. February 11, 2010\n\nCan anyone tell me how to build a knee wall attaching it to a standard base cabinet for a bar top at 42\"? I know I have to use 2x4's and screw then on from the inside of the cabinet but I could use a little more info.\n\nForum Responses\n(Cabinet and Millwork Installation Forum)\nFrom contributor J:\nWe build our knee walls out of 2x4's 16\" on center and screw them to the floor either with drywall screws (wood) or lag bolts (concrete). Obviously you'd have to screw through the back of the cabinet into the knee wall. We put 2x4 blocking along the inside of the knee wall at the proper height/location so we can attach corbels to support the countertop. This enables us to space them like we want without regard to stud location.\n\nWhat will cover the knee wall - raised panel, plywood, drywall? When we're doing one with raised panels, I try to build as much of the knee wall as possible in the shop and leave the side adjacent to the cabinet open. We plant everything to the floor or adjacent wall, then skin the inside and set the cabinet. If it's going to get plywood, we work from the side away from the cabinet. We always build 3/4\" thick end caps that have a 1/4\" rabbet that we can slide the plywood down into once we have the knee wall the way we want it.\n\nIf it's getting drywall (and not angled), I usually tell the GC to let the framers worry about it. We like to build them if they'll be angled. The cabinets always fit better. If the knee wall needs an electrical outlet you need to know that before you put the knee wall together. That's a code issue in some areas. I've seen situations where the electricians didn't rough-in for the knee wall outlet. The knee wall got installed only to be torn back apart to make the electrical inspector happy.\n\nFrom contributor S:\nWhat is it that you need help with because you basically answered your own question. Is this for a freestanding island? If so, start by building your wall flat on the floor with 2x4 or 2x6 studs, a double top plate and a single bottom plate. Then add some solid blocking at the 36\"AFF mark. Skin it with 1/2\" plywood making sure that it is square before you nail it off. Stand the wall up and then use Tapcon , Hilti or screws to fasten it to the floor with the 1/2\" plywood on the side opposite the cabinets. Set your cabinets against the exposed studs and fasten it with screws into the blocking.\n\nFrom contributor M:\n\nI assume you are trying to increase your height from 36 to 42 inches? Why use 2x4’s? Just rip up some 3/4 plywood and build a stud wall as you would with 2x4’s. It will be much lighter and straighter. Then you can attach it to the base cabinets, screw your top on and then attach a panel to the front or whatever you are using to finish it.\n\nFrom contributor D:\nI don't recommend a double top plate. If you've got backsplash outlets the single plate gives you (or the electrician) more room.\n\nFrom contributor L:\nThrough-bore some 1\" holes in the studs a couple inches down so it is ready for wires.<|endoftext|>Double Ended Upholstery Needles\n\nPrecio habitual€6,95\nLos gastos de envío se calculan en la pantalla de pagos.\n\nDouble Ended Upholstery Needles for stitching - 8, 10, 12 and 16 Inch. Often referred to as double point or round point needles.\n\nUse these extremely sharp needles to blind stitch through hair or scrim, or for edge stitching to firm up edges. Manufactured in England to the highest standards. These professional quality double round point upholstery needles are widely used in the upholstery trade.\n\nVisto recientemente<|endoftext|>Here's our Kitchen Keeping Challenge. We hope you'll join us in banning the bottle of branded dish soap from your kitchen by September 30.\n\nReplace the promotional dish soap packaging with a bottle that's more beautiful or something that reminds you to conserve. Decant your dish soap into a bottle that reflects your style and makes the chore of washing the dishes just a bit more fun.\n\nIf you ban your bottle by the end of Kitchen Keeping month (or, maybe you've done this already?), e-mail a picture of your sink and dish soap dispenser ... Send the photos or a link to the photos on your blog to Chris AT apartmenttherapy DOT com by September 30. Please put \"Bottle Ban\" in the subject line. We'll post a slide show of sinks and soap on October 1 to mark the end of Kitchen Keeping month.\n\nHere's some inspiration: Martha Stewart suggests using a glass bottle with a spout to hold dish soap. These olive oil containers could do the job elegantly too. Here's a post from our archive about decanting dish soap into a small squeeze bottle to deliver a quick jet of cleaning power directly to dirty dishes. Readers shared ideas for prettying up dish soap by putting it in a French lemonade bottle or in a pump bottle.\n\nKeri took a different approach and \"created a dish soap bottle that is covered in statistics about water pollution, and the impact of chemicals on human beings and the environment. just so i am a little more aware each time I reach for the container.\"\n\nDawn Defeats Joy. At least that's what you told us in this morning's dish soap survey. We're surprised to see that so far not a single person says they use Ivory.\n\n(photo: Martha Stewart Living)<|endoftext|>spin-toy-804322_1920.jpg\n\nPINE: Pine is a softwood which grows in most areas of", "num_tokens": 2048} {"category": "common_crawl-home_and_hobbies", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-home_and_hobbies/part-000-00000.npy", "text": " time and find a breeder you trust.\n\nShih Tzu Care:\n\n • Grooming: Shih Tzus require regular grooming. Their long hair needs to be brushed daily to prevent mats and tangles.\n • Exercise: Although Shih Tzus are known for their gentle nature, they still need daily exercise. Short walks and playtime are essential for their physical and mental health.\n • Training: Early training is crucial for Shih Tzus. Socialization and obedience training will help them become well-behaved and confident dogs.\n\nMy journey to finding my beloved Shih Tzu wasn't always easy, but it was definitely worth it. By learning from my experience and utilizing the resources available, you can find the perfect Shih Tzu breeder in NJ to help you welcome a furry friend into your life. Remember, responsible breeding is key to ensuring a happy and healthy life for your new companion.\n\nRelated Posts<|endoftext|>Blog Post\n\n7 Reasons Why You Should Consider Moving\n\nIan Watson May 1, 2015, 14:39 PM\n\nMoving house Pic\n\nNeed more room\n\nThis is one of the most common reasons people have for moving home. If you have a growing family, you may need more bedrooms and general space to take care of them properly. You may also hanker after a garden or other benefits so thinking about your family is a strong reason for moving on.\n\nDeferred maintenance\n\nOne strong reason to move home comes with the fact that most of the elements and fixtures in your home generally need to be upgraded or improved within a few years. Unless you are looking to stay in your home for the rest of your life, and pass it on through generations, do you want to bear the cost of having a roof replaced or a new boiler installed? Sometimes there is better value to move on to a new home than pay for the upgrade of an existing one.\n\nFinancial opportunity\n\nSometimes opportunities present themselves and it makes sense to move for financial reasons. There may be outliers in the property market that sees certain areas receive a spike in demand, raising the price of property. If you own property in one of these areas, you may be able to make a significant amount of money by selling up and moving one. Similarly, some areas may be cheaper at a certain time but look like gaining value later.\n\nLifestyle change\n\nYou may be keen to go travelling or spend more time on other pursuits and interests. Owning a home offers great security and comfort, but it may not be the best solution for everyone at a particular point in their life. The money you obtain from selling up may help you to achieve some of your ambitions and dreams in life, so if you fancy a change in your lifestyle, selling your home may be the ideal way to achieve this.\n\nPlanning for retirement\n\nRetirement may seem like another lifestyle change, but it may be that you want to plan in advance, ensuring that you have a positive retirement with financial freedom. It may even be that you would prefer your loved ones to benefit from an inheritance while you are still alive, allowing you to see them enjoy themselves.\n\nCash in equity\n\nA lot of people feel annoyed at having so much money tied up in their home as opposed to it being in their bank account available to spend, which means that pursuing the money is a sensible reason for some people to sell up their property. In the current climate, downsizing is common but downsizing can often be a way to get more enjoyment and fun from life, as opposed to being an indicator of suffering from difficult times.\n\nDon’t like your neighbours\n\nHopefully this won’t be a common reason but there are sometimes when your neighbours or activities in the local area can lead you to move home.\n\nLoad more comments\nThank you for the comment! Your comment must be approved first\ncomment-avatar\n\n\"Thank you very much Laura for all your work\"\n\n\"Energetic Sales Performance\"\n\n- Caroline Wilde\n\n\"Everyone at Peter Anthony, especially Gill, Laura and Ben have been helpful from the beginning to the end\"\n\n\"Gill has been indefatigable in dealing professionally with the block management\"\n\n\"Great Communication\"\n\n- Terry Barker\n\n\"The management team has been very professional, responsive and provided me with efficient service\"\n\n\"Personable Service\"\n\n- Cheryl Roberts\n\n\"Gill was recommended to me by a fellow owner.\"<|endoftext|>Sold Properties in Greater Vancouver & The Fraser Valley\n\nShowing 1 to 15 of 272 results\nShowing 1 to 15 of 272 results\n\nThere are currently no listings on this page, please check back shortly.\n\nWelcome to the PLACE Real Estate Team, where we take pride in being recognized as the best Vancouver realtor for helping clients buy and sell properties in this thriving city. With our extensive experience and expertise in the Vancouver real estate market, we have successfully sold numerous properties, helping our clients achieve their real estate goals.\n\nOur dedication to providing top-notch service and our in-depth knowledge of the local market have enabled us to deliver exceptional results for our clients. Whether you are a buyer or a seller, we understand the unique dynamics of the Vancouver real estate landscape and leverage our expertise to your advantage.\n\nThrough our comprehensive Vancouver MLS listings, we showcase the properties we have successfully sold. From stunning waterfront homes to trendy downtown condos and family-friendly residences in sought-after neighborhoods, our sold listings encompass a diverse range of properties to cater to every lifestyle and preference.\n\nBy reviewing our sold properties, you can gain valuable insights into the current market trends and the types of properties that are in high demand. Our track record speaks for itself, as we consistently achieve optimal selling prices for our clients and ensure a smooth and efficient transaction process.\n\nAs one of the best Vancouver realtors, our commitment to client satisfaction goes beyond the sale. We prioritize clear communication, personalized attention, and a results-driven approach. Whether you are looking to buy or sell in Vancouver, trust us to be your dedicated partner every step of the way.\n\nContact us today to experience our exceptional service and let us help you achieve your real estate goals in this vibrant city.\n\nWhat's your home worth in today's market?\n\nGet a free home evaluation today...\n\nGet In Touch\n\nAdam Chahl\n\nOakwyn Realty\n\n1286 Homer Street  Vancouver,  British Columbia  V6B 2Y5 \n\nPhone: (604) 800-8710\n\nadam@chahl.com<|endoftext|>Skip to Content\n\nHow to Take Care of Your Aloe Vera Plant\n\nThis article may contain affiliate links. We get paid a small commission from your purchases. More Affiliate Policy\n\nAloe vera plants are versatile and easy plant to grow. However, to keep them healthy and thrive over time, it’s best to get a good idea of their care and maintenance needs. To get an idea of what you need to have a thriving aloe plant, these are the aloe vera plant care basics to keep in mind.\n\nAloe Vera prefers dry conditions with well-draining soil. Such as cactus mix or add plenty of perlite to normal potting soil to achieve this. Aloe Vera requires a minimum of 6 to 8 hours of direct sunlight per day. When watering, water deeply and saturate the soil, and do not water again until the soil has completely dried out. When feeding, select a feed high in phosphorus, something like 10-40-12.\n\nAloe Vera Plant Care Needs\n\nLighting requirements for Aloe Vera\n\nAloe vera plants don’t need a lot of light so just 2-3 hours a day is all that’s required. It’s best to avoid any harsh sunlight, especially from the hot afternoon sun. Consider moving your plant to an area where it will enjoy bright light in the morning but less light when the weather turns hot. They do best when they’re kept out of the strong sun.\n\nYou can grow aloe indoors or outdoors, but they tend to do best indoors with a south or west light exposure. If they’re not getting the sun they need, the leaves on the plant will start to droop. Rotating an indoor plant every six months is also a good idea to get enough light to grow straight.\n\nHow much water does Aloe Vera require?\n\nAloe is a succulent that stores water in the leaves and roots. They are prone to getting root rot if the soil mix is too wet. Regardless of where you’re growing the aloe, you want it to dry out completely before watering.\n\nIn the hotter summer months, it’s usually best to water the aloe every 7-14 days. When the plant loses less moisture in the winter months, it may only need water once a month.\n\nHowever, since aloe plant water needs can vary depending on their environment and size, it’s best to keep an eye on the soil. Don’t water the plant until the soil is dry to the touch for the best results.\n\nBest potting soil for Aloe Vera\n\nNot all soil types are good for aloe plants. The soil they grow best in will be soil that drains well and is aerated to avoid rotting roots. The aloe roots require oxygen, and they can’t access the oxygen well when they have too much water.\n\nA succulent and cactus potting mix is usually best for aloe plants. If you’re concerned that your soil mix may need additional help with drainage and aeration, you can also use pumice or perlite to get a similar effect.\n\nThe ideal temperature to keep Aloe Vera\n\nIn general, an aloe vera plant can tolerate a moderate climate. For the average home, they tend to do fine as long as you don’t keep your home too hot or very cold.\n\nA lack of humidity can concern other houseplants, but the aloe vera plant does best in dry air, so a home without humidity is best. If you live in a humid area, keeping the plant in a room with a dehumidifier may be best.\n\nHow to feed and fertilize Aloe Vera\n\nWhen it", "num_tokens": 2048} {"category": "common_crawl-home_and_hobbies", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-home_and_hobbies/part-000-00000.npy", "text": ". It has a cast aluminum logo footrest, mahogany-finished solid maple arms and leg rest support, and a heavy-duty base. The hydraulic pump comes with a 7.5-year warranty to ensure that your barbershop stays fully operational.\n\nConsiderations: This chair has a higher price point due to the customizable materials and the solid wood arms and legrest support.\n\nShopper’s Tip: This chair is perfect for a barbershop looking to maximize longevity with its American-made materials and reputable manufacturers, these chairs come with long warranties to ensure you are protected against damage. For more barber chairs made by Collins Manufacturing, shop our entire Collins Barber Chair collection.\n\nWhy Stylists Love It: The Pibbs 662 King Barber Chair is one of the most unique looks in our barber collection. It has a classic white underside with a vintage look that is customizable. This chair has a calf pad and footrest and an adjustable headrest for client comfort. It also comes with a side lever to control the reclining mechanism for ease of use.\n\nConsiderations: The style of this barber chair is more compact than others. For those looking for wider framed barber chairs to accommodate larger clientele, check out the Black Diamond Barber Chair.\n\nShopper’s Tip: Manufactured by the popular barber chair brand, Pibbs Industries, This chair is perfect for the barbershop that is trying to achieve a unique look that embodies the industrial and rustic look and feel without sacrificing quality.\n\nWhy Stylists Love It: The Takara Belmont BB-225BLK Elite Black Barber Chair has a top-of-the-line design with the best of the best materials. It is made with a wave spring to withstand heavy use without breaking down. It has a stunning design with customizable colors and piping and includes a towel bar and a clipper hook for convenience.\n\nConsiderations: With its Japanese hand-sourced materials, this chair comes in at a higher price point to align with its top-quality craftsmanship.\n\nShopper’s Tip: Known for being one of the highest quality barber chairs in the industry, this barber chair is the best of the best money can buy. Shop this chair along with other Takara Belmont barber chairs to maximize longevity, quality, and efficiency for your barbershop.\n\nChoosing the right barber chair is an important aspect of a successful barbershop. It is best to know what your barbershop needs specifically so that you can choose the right option. Compare the comfort, design, durability, affordability, and cleanliness of each option to help narrow down your choices. The barber chair is where the majority of the services take place in the barbershop, so these criteria are of the utmost importance as you weigh your options.\n\nLooking for more barber equipment? Be sure to browse through our barber stations, barber towel warmers, and barber poles and accessories.\n\nUncertain about your specific needs? Schedule a complimentary planning call with our design team today!\n\nJason Eichholz – Vice President\n\nJason has been an integral part of Buy-Rite since 2014 when he joined the family business. His passion lies in helping entrepreneurs realize their dreams. By working so closely with family, he instills family values in all of his work. He loves to share his expertise while maintaining honesty and dedication to the Buy-Rite brand. He leads the way for our customer service team to make sure each customer feels confident from the purchase to the delivery. Jason’s industry knowledge has propelled thousands of salon owners to open and maintain the salon of their dreams.\n\nBack to all posts\n\nCall Us Today!\n\nOur team is standing by to help answer any and all of your questions.\n\n1-800-477-6655<|endoftext|>8 Ways to Celebrate Administrative Professionals Week\n\nNo one is more cherished in this world than someone who lightens the burden of another.” Joseph Addison\n\nAdministrative Professionals Week started Monday and goes through the end of April. The first Administrative Professionals' Day was celebrated in 1952, back then known as “National Secretaries Day.” Over the past few years, Administrative Professionals Week may have felt a bit different since the pandemic, but the message is still the same: To acknowledge our Administrative Professionals for their invaluable contributions to the workplace.\n\nAdministrative Professionals are valuable assets to any organization because they keep Executives and employees on task, they remain calm under pressure, they have clear and effective communication skills and they have an impeccable ability to multitask. For instance, juggling an executive's calendar while scheduling zoom meetings and webinars for the organization and much more!\n\nAdmins are an essential part in office management, organization, and daily communications which ultimately lead to an organization's success!\n\nHere are some ways to thank your Admin this week:\n\n 1. Donate -Donate to an organization in his/her name.\n\n 2. Spa Day - Treat your administrative professional with a basket full of bath goodies like sweet-smelling soaps and lotions.\n\n 3. Make a List - Show your appreciation with a list of all the ways they make a difference.\n\n 4. Meal Delivery - Arrange to have dinner delivered straight to their door.\n\n 5. Stock Up - Make the workday a little brighter with colorful sticky notes, an automatic stapler, cool ergonomic mouse pad, awesome writing tools of their choice and a gift card to the office supply store for a supply shopping spree.\n\n 6. Goodie Jar - This easy two-for-one gift is a great way to make your admin feel special. Purchase empty mason jars and fill them with sweet and savory treats. Once the jar is empty, they will have a beautiful keepsake.\n\n 7. Notecards - Make it personal with a special design or monogram.\n\n 8. Picture Perfect - Add a personal touch to their office with a digital picture frame they will enjoy all year.\n\nwww.cute-calendar.com\n\n4 views0 comments\n\nRecent Posts\n\nSee All<|endoftext|>Wednesday, October 07, 2015\n\n#7: Volunteer\n\nChocolate Lily (Camp 2015)\n\nMy grandmother called them volunteers,\nthose bright, sturdy plants that simply appear\nin unexpected places, leftovers\nfrom previous seasons,\nthe seeds forgotten, now\na yellow flowering vine\nor a meandering pumpkin\ntaking over a corner.\nGardeners don’t always like\nthis unexpected bounty,\nfor we’re not talking tidy rows\ndeliberately planted.\nInstead the seeds arrive,\nperhaps floating on the wind\nor dropped by birds. These self-set plants\ngrow on their own, tenacious,\nsometimes invasive, bringing change,\nsurviving, despite another round of seasons,\nroots digging deep,\nsomething like me.\n\nToday's prompt from OctPoWriMo is the road less traveled. I could write a book about that . . . but I didn't see the prompt until after I had written today's poem, a melange of memories from growing up and feeling I didn't quite fit in. I've even experienced a volunteer or two in my own short-lived gardening. You might find this article on what to do with volunteer plants amusing, now that the season for growing things is nearly past.  \n\nRead what other poems have been written for OctPoWriMo HERE<|endoftext|>Getting To The Point –\n\nThe Significance of Specialist Plumbing Solutions\n\nWhen it comes to the maintenance and repair of your home, one aspect that should never be overlooked is the pipes system. A well-functioning pipes system is essential for your day-to-day convenience and ease. From supplying water for your requirements to throwing away waste correctly, the plumbing in your house plays a critical role in your day-to-day live. While minor concerns can sometimes be repaired with do it yourself strategies, there are several benefits to working with specialist pipes services for even more facility issues.\n\nExpert plumbers have the proficiency and experience to properly detect a large range of plumbing problems. Whether it’s a dripping pipeline, a clogged up drain, or a defective hot water heater, a specialist plumbing technician can promptly recognize the source of the trouble and recommend the most effective course of action to fix it. Their knowledge permits them to supply efficient solutions that not just deal with the instant problem however additionally avoid future problems from developing.\n\nAnother advantage of employing expert plumbing solutions is the accessibility to specialized devices and tools. Specialist plumbers are outfitted with the most recent tools and technology to manage any plumbing issue effectively. This suggests that they can finish repairs and setups in a prompt manner, conserving you both time and hassle. Additionally, specialist plumbing technicians are educated to use these tools securely, lowering the risk of mishaps or more damages to your pipes system.\n\nWhen you work with professional plumbing solutions, you can likewise benefit from their warranty of high quality workmanship. Trustworthy pipes business stand by the quality of their work and offer guarantees on the services they supply. This gives you satisfaction recognizing that if any type of concerns emerge after the job is completed, you can depend on the pipes firm to resolve them immediately and effectively. By purchasing expert pipes solutions, you are buying the long-term integrity and performance of your home’s pipes system.\n\nFinally, specialist plumbing services are essential for keeping the stability and functionality of your home’s plumbing system. From specialist diagnosis to efficient repair services and ensured workmanship, expert plumbings offer a series of benefits that make them worth the financial investment. When confronted with a pipes concern, do not hesitate to contact a trusted plumbing firm to guarantee that the job is done right the very first time.\nA Quick Overlook of – Your Cheatsheet\nSmart Tips For Finding<|endoftext|>Meet Murphy Robinson\n\nMurphy Robinson joined our routes team in 2023 after graduating from West Georgia University with an undergraduate degree in biology.\n\nMurphy served his internship at The Nature Conservancy at Moody Forest, focusing on the reintroduction of native species to the forest.  He also examined, banded, and documented endangered species.\n\nWith a passion for aquatic environments and a deep understanding of fish pond maintenance, Murphy brings a wealth of knowledge and experience to our team. As a dedicated", "num_tokens": 2048} {"category": "common_crawl-home_and_hobbies", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-home_and_hobbies/part-000-00000.npy", "text": " is not difficult. If you’ve got your laundry on the classic programme, pour a glass of vinegar into the washing powder compartment and half a glass of baking soda into the other rinse compartment and start washing. The vinegar will dissolve the detergent residue and the baking soda will soften the material. This will make your towels look like new again after washing! Beautifully soft and pleasant to the touch. You can repeat this process whenever you need it. It also works great on worn and old clothes.\n\nSource: Pixabay.com\n\nCorrect drying\n\nTo make sure you don’t spoil the result right after washing, make sure you dry it properly too. Definitely don’t place the towels on the radiator, the heat could damage the fibres and they could break. Use a tumble dryer with a suitable programme. But if you don’t have one, don’t hang your head. A simple line outdoors in the fresh air or a rack at home by an open window will do just as well.<|endoftext|>Our Seeds\n\n • You can find seed packets for $0.99 in some garden stores, so why are some seeds more expensive than others? As with most things it all comes down to time and quality. Just like organic produce, organic seeds are more labor intensive. Where \"conventional\" farms can employ pesticides, organic farmers (no matter whether they're growing apples or seeds) use more time consuming techniques, such as hand-picking insects, introducing beneficial, predator insects, or by applying natural remedies such as hot pepper + garlic tea to discourage bugs. Instead of cheap chemically produced fertilizers, high quality (and in our case, homemade) compost is applied. A labor intensive process, but in the end, a healthier soil environment for plants, wildlife, the humans tending the land, and you. Finally, small scale farms like ours do nearly all of our work by hand instead of using large-scale petroleum intensive machines. Work like turning under the soil, hauling and spreading compost, planting seeds, weeding, watering, and harvesting is all done by human hands with old fashioned shovels, mattocks, rakes, and hoes, without the aid of machines. In our opinion this extra time and extra labor add to the quality of the seed or the produce that you're buying, not to mention adding to the quality of life for the wildlife living on the land, and for the people working there. \n • Heirloom seeds, also known as open-pollinated seeds, remain true to type and can be saved and passed down through generations, from farmer to gardener to friend. Once you buy an heirloom seed you'll never have to buy it again, as long as you save the seeds for the following year. Many store-bought seeds have been genetically modified and patented by large (typically agro-chemical) companies and will not grow true to type year after year. So if you liked growing a particular variety of tomato, you'll have to buy that seed variety each year. Often times organic gardeners prefer to purchase heirloom seeds because many of the so called \"conventional\" seed companies are owned by chemical companies that make most of their income from selling pesticides and herbicides. \n • By buying heirloom seeds, and especially organic heirloom seeds, you are supporting the farm-to-garden movement. Empowering small scale farmers to grow out these varieties, protecting the diversity of our seeds, and encouraging healthy pollinating techniques at a time when our pollinators are severely threatened. Organic heirloom farming in particular encourages healthy eco-system development by not relying on chemical fertilizers or pesticides, and instead focuses on building healthy soils, companion planting, and integrated pest management\nJen O'Connor<|endoftext|>June 24, 2024\n\nPet Daily Nursing\n\nHealthy Pet Lovers\n\nWoman Wakes Up To Find Her Foster Dog Left Her A Tiny Surprise\n\nKaitlin Devoto knew virtually nothing at all about the pet she’d agreed to foster, other than the truth that the canine was a puppy dog mill rescue.\n\n“I didn’t know a gender or age,” Kaitlin Devoto, the pup’s foster mom, explained to The Dodo. “The to start with time we realized what she seemed like was when she arrived in Cincinnati when I picked her up.”\n\nAt the pickup center, Devoto uncovered herself experience-to-facial area with a feminine conventional red poodle.\n\nShe found that the pet dog was generating a minimal little bit of milk, but the expert foster mom assumed it was because of to a current litter.\n\n“It’s not unusual to acquire a pup mill Momma who’s continue to lactating,” Devoto reported. “When their puppies are weaned, mothers are ‘no extended practical.’”\n\nThe puppy was also skinnier than she should’ve been, which Devoto planned to take care of with wholesome foods and plenty of enjoy. She scooped the frightened but relieved poodle into her arms and introduced her residence.\n\nJust four days later on, Devoto woke up to a shocking discovery: There was a small poodle dog in her new foster dog’s mattress.\n\n“She sent the puppy dog right away!” Devoto claimed.\n\nShe immediately checked the poodle’s stomach for additional puppies and was even extra shocked to find out that there’d only been a single.\n\n“It was a singleton toddler!” Devoto said.\n\nDevoto jumped into action suitable away to make momma and toddler at ease. She lined an enclosed crate with warm blankets and gave the pair of poodles a tranquil spot to sleep and nurse.\n\nAs she looked over the dog to make guaranteed he was healthful, she observed two issues: He was a boy and he resembled a rooster nugget.\n\n“He was incredibly swiftly named Chicky Nug,” Devoto mentioned, “But I was stumped on a title for Momma that healthy the exact topic.”\n\nWith the assistance of her good friends, Devoto arrived up with the identify Mickey D for Momma after the quickly food chain McDonald’s. They decided on Mickey for short.\n\n“Mickey looks to go well with her,” Devoto claimed. “Plus, Mickey and Chicky are a cute identify duo!”\n\nGiven that the puppy’s start, both equally Mickey and Chicky’s personalities have blossomed. Chicky is now a 5-7 days-outdated pup with a exciting, sassy spirit.\n\n“He enjoys to operate all over and do zoomies,” Devoto mentioned. “And he’s really intrigued in biting toes and toys.”\n\nMickey also loves participating in with her toys and getting all around her relatives. In accordance to Devoto, the anxious pet dog is increasing extra confident just about every one day.\n\nBoth equally puppies are nevertheless in Devoto’s treatment, but they’ll be going to their endlessly homes soon. Chicky will satisfy his adoptive loved ones the moment he turns 8 weeks aged, and Mickey will be out there for adoption through Louie’s Legacy Animal Rescue upcoming thirty day period.\n\nThough Devoto will be sad to see Mickey and Chicky go, she’ll usually cherish the moments she experienced with the mother-and-son duo. Their time collectively might’ve be quick, but the love Devoto and her foster pups shared in those people several weeks will definitely previous a lifetime.\n\nTo enable pups like Mickey and Chicky get the help they have to have, make a donation to Louie’s Legacy Animal Rescue.<|endoftext|>Top 10 Inflatable Travel Pillow Camping UK – Camping Pillows\n\nAs an Amazon Associate I earn from qualifying purchases.\n\nTREKOLOGY ALUFT Beach Pillow, Inflatable Beach Pillow Camping Pillows Inflatable Pillows for Camping Inflatable Pillow for Sleeping Blow Up Beach Pillow Cushion Travel Pillow Camping Pillow-ALUFT MINT\n\nTREKOLOGY #ad - Our beach chair pillow with strap comes with adjustable straps that allow you to attach it to your beach chair or pool lounger, providing a personalized seating experience that is tailored to your comfort. Stay cool on the beach and easily clean the pool pillow cover after each use, ensuring a fresh and hygienic experience every time.\n\nWith an ergonomic design that conforms to your neck's natural curve, making it a worthy investment for your relaxation needs. Our inflatable pool pillow is constructed with a TPU bladder that prevents air leaks, the pool pillows for neck provides superior comfort and support, ensuring its longevity. Removable washable pillow cover: don't let water or sand ruin your beach or pool relaxation. Unmatched stability with verstile sand bag: don't let windy beach days ruin your relaxation. Portability at its finest: take ultimate comfort with you wherever you go.\n\nLasting quality: invest in a durable pillow for beach chair that will accompany you on countless outdoor journeys. Our inflatable pillow for beach comes with a removable and washable pillow cover crafted from soft and weather-resistant fabric. With trekology beach pillows for sand and innovative sand bag design, you can stay worry-free as it stays firmly in place, ensuring uninterrupted comfort even in breezy conditions. Customizable comfort with adjustable strap: say goodbye to uncomfortable seating positions.\nManufacturerTREKOLOGY #ad\nHeight10.16 cm (4 Inches)\nLength39.88 cm (15.7 Inches)\nWeight0.22 kg (0.49 Pounds)\nWidth26.67 cm (10.5 Inches)\n\n2. TETON Sports\n\nAnd Camping; Washable; Stuff Sack Included,Orange/Microfiber, Backpacking, in the Car, TETON Sports ComfortLite Self-Inflating Pillow; Support Your Neck and Travel Comfortably; Take it on the Airplane\n\nTETON Sports #ad - Durable but soft: microfiber top feels soft against your face; Grey non-slip bottom keeps pillow in place; Washable—just wipe it off with a damp cloth. Teton sports promise: reach out to our amazing product support team if you have any questions or concerns; YOU CAN COUNT ON US to get you taken care of and back OUT", "num_tokens": 2048} {"category": "common_crawl-home_and_hobbies", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-home_and_hobbies/part-000-00000.npy", "text": ". Simplice Touchless Pull Down Kitchen Sink Faucet\n\nOur top recommendation is the Kohler Simplice, a touchless kitchen faucet with a three-function sprayhead. \n\nIn addition to an aerated stream and Sweep Spray, this faucet’s pull-down sprayer has a Boost function, which increases the water flow rate as long as it’s pressed, providing more power.\n\nThe normal spray rate is 1.5 GPM for water conservation. \n\nThe faucet’s Docknetik Magnetic Docking System makes sure that the sprayer holds securely in place when not being used. \n\nThe Simplice is available in Polished Chrome, Vibrant Stainless Steel, and Matte Black finishes.\n\n • High arc gooseneck spout\n • Single-hole or three-hole installation\n • Three function sprayer\n\nBuy The Simplice Touchless Pull Down Kitchen Sink Faucet On Amazon\n\n2. Coralais Kitchen Sink Faucet With Pull-Out Matching Color Sprayhead\n\nThe Coralais line is Kohler’s line of affordable but heavy-duty faucets. This one is a pull-out faucet with an ergonomic two function sprayhead and a powerful 1.8 GPM flow rate. It’s also well made with ceramic disc valves, a braided hose, and a smooth, swiveling ball joint.\n\nThe Kohler Coralais is available in Polished Chrome and Vibrant Brushed Nickel finishes. \n\n • Single-hole or three-hole installation\n • Affordable price\n • Heavy-duty construction\n\n • Not as attractive as some other options\n\nBuy The Coralais Kitchen Sink Faucet With Pull-Out Matching Color Sprayhead On Amazon\n\n3. Purist Single-Hole Kitchen Sink Faucet With Pull-Out Spout\n\nThe Kohler Purist is a sleek, modern faucet for those in search for a high end option. This pull-out faucet has a three function sprayhead with laminar flow and spray modes, plus a pause function. \n\nIt has flexible supply lines for easy, single hole installation. The 1.5 GPM flow rate balances water conservation and power. \n\nThe Purist is available in Polished Chrome, Vibrant Stainless, Matte Black, and Vibrant Polished Nickel finishes to match any kitchen. \n\n • High cost\n\nBuy The Purist Single-Hole Kitchen Sink Faucet With Pull-Out Spout On Amazon\n\n4. Bellera Kitchen Sink Faucet With Pull-Down Spout\n\nThe Bellera is another affordable option if you’re looking for a pull-down kitchen faucet from Kohler. \n\nIt has a three function sprayhead like the Simplice, with Sweep Spray, aerated stream, and Boost functions. \n\nIt also has a high-arch goosneck spout with attractive details that work with a variety of home decor styles. The curve of the lever handle adds elegance but also comfort in the hand. The Bellera is available in Vibrant Stainless, Polished Chrome, and Oil Rubbed Bronze finishes.\n\n • Docknetik Magnetic Docking System\n • Single-hole or three-hole installation\n • 1.5 GPM\n\n • Some buyers report that the sprayer may leak after some time, particularly if you have hard water\n\nBuy The Bellera Kitchen Sink Faucet With Pull-Down Spout On Amazon\n\n5. Forte Remote Valve Kitchen Sink Faucet With Matching Finish Sidespray\n\nOur last faucet recommendation is the Kohler Forte, a simple yet statement making faucet. This faucet requires three-hole installation with a separate spout, handle, and side sprayer for a unique look. Each piece has sleek, smooth lines and a rounded shape that’s comfortable in the hand.\n\nLike other Kohler faucets, the Forte features metal construction and ceramic disc valves for durability. \n\nThe Forte comes in Polished Chrome, Vibrant Stainless, Vibrant Brushed Nickel, and Vibrant Brushed Bronze finishes.\n\n • Flexible supply lines for easy installation\n • Simple, yet statement making\n • Single handle faucet that replaces a three hole faucet without a deck plate\n\n • Somewhat costly\n • Unusual appearance may not be for everyone\n\nBuy The Forte Remote Valve Kitchen Sink Faucet With Matching Finish Sidespray On Amazon\n\nFinal Thoughts On Kohler Kitchen Faucets\n\nAnd that about wraps things up on the top kitchen faucets from Kohler. Between the background information and the reviews we’ve provided, by now you should have no problem choosing just the right Kohler faucet for your kitchen.\n\nWith that said, all of these faucets are great, but this list is just to get you started. It’s by no means a complete list of all the good faucets that Kohler makes. If you’re still not sure Kohler has the perfect faucet to meet your needs, take some time to browse Kohler’s offering and I’m sure you’ll find one that fits just right.<|endoftext|>South San Francisco, CA 24-Hour Emergency Locksmiths for Quick Assistance\n\nThe consistent occurrence of lockouts substantiates the continuous demand for 24-hour locksmith aid in South San Francisco, CA. Customers regularly seek our assistance for a variety of circumstances, like losing keys, unintentionally leaving them indoors, and managing broken keys lodged in locks.\n\nFor a hassle-free resolution to being locked out, rely on the 24-hour locksmith service in South San Francisco, CA. They evaluate the issue with great care, use their vast experience and sophisticated equipment to restore access without causing harm. Ensuring a complete grasp of the challenges necessitates a methodical evaluation of the situation.\n\nEssential Pointers for 24-Hour Emergency Locksmith Services in South San Francisco, CA\n\nExplore Nearby Locksmith Services\n\nCommence your search for local locksmiths by thoroughly researching in your area. It's important to choose locksmith businesses that offer emergency services because not all of them are open 24/7. It's crucial to acknowledge the importance of 24-hour locksmith services in South San Francisco, CA, guaranteeing access to professional assistance when needed.\n\nDouble-Check Qualifications\n\nChoose a locksmith with proper licensing and bonding to ensure your security and attain peace of mind. Selecting a licensed locksmith means that you are putting your property's safety first and entrusting a skilled somebody with established knowledge. A locksmith's license is evidence that they have complied with industry standards and are aware of the law, as established by the regulatory bodies that oversee the field.\n\nSeek Advice\n\nEngaging with others within your close social circle might aid in making more informed decisions if you ever find yourself in need of locksmith services. A useful initial step while searching for locksmith services is to consult with friends, relatives, or neighbors who have personally faced locksmith troubles. Their endorsements provide a window into the dependability, professionalism, and overall contentment they have experienced, acting as a dependable measure for your own deliberations.\n\nReceive a Price Estimate\n\nRequesting an estimate from the locksmith that includes all possible costs in advance is a smart idea before beginning any locksmith services. This comprehensive estimate should include labor, service fees, and all additional expenses related to the locksmithing procedure. Asking for an estimate in advance can assist provide a clear knowledge of the financial issues involved and provide clarity into future locksmith service prices.\n\nSave Contact Particulars\n\nKeeping the locksmith's contact information safe is essential to being ready for any emergency that may arise in the future. Having quick access to the locksmith's contact details might make things much easier when unanticipated events call for emergency locksmith services. To complete this process, think about putting the locksmith's contact information in your phone's contacts or writing it down in a safe place that is convenient for you to access.\n\nBolstered Safety Features\n\nWhen it comes to protecting your home or place of business, it's a good idea to seek the advice of a locksmith on improving your security systems or locks. Unlocking doors is just a fraction of a locksmith's expertise; they also understand security measures to fortify your premises. Working with a locksmith involves more than just handling crises.\n\nContact Us\n\nBenefits You'll Experience with Our 24-Hour Emergency Locksmith Professionals in South San Francisco, CA\n\nAt 24-Hour Locksmith US, we place a high emphasis on the need of reliable and knowledgeable locksmith services, especially during an emergency. For the following reasons, using our 24-hour locksmith services in South San Francisco, CA is strongly advised:\n\n24/7 Presence\n\nRecognizing that emergencies can happen at any time, our locksmiths are available 24 hours a day, 7 days a week. We are committed to being there for you, whether it's a lockout from your home, car, or office during the night or on a holiday. Feel free to contact us.\n\nSkilled Lock and Key Expertise\n\nBecause it is their final priority, our locksmiths in South San Francisco are dedicated to making sure their customers are happy. In situations involving a complex lockout, a broken key, or the need for a security system upgrade, our skilled locksmiths have the knowledge and skills to provide effective solutions. Our goal is to give every customer a great and satisfying experience, going above and beyond only fixing their urgent locksmith needs.\n\nImmediate Reaction Durations\n\nWe're here for you, and we take great satisfaction in how quickly we can respond. When you contact us, you can be sure that one of our skilled locksmiths will respond in a fast manner. They are equipped with the information and tools required to deal with any problem. We absolutely promise to keep you safe and secure.\n\nOpen and Clear Fee Structure\n\nExpert 24 hour locksmith services don't have to be expensive in South San Francisco. We provide exceptional quality in a cost-effective package. We pledge to provide you the most value for your money while still delivering work of the highest grade with our transparent and honest pricing. We strive to provide services that are affordable and of high quality while keeping them within reasonable reach of everyone.\n\nSecure Client Satisfaction\n\nAt the core of our 24", "num_tokens": 2048} {"category": "common_crawl-home_and_hobbies", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-home_and_hobbies/part-000-00000.npy", "text": "’s fuel tank or gas can. The gas is likely to go bad if it is dark in color. If you suspect that you have a gas leak, the first thing you need to do is find the source of the leak.\n\nGas leaks can be caused by a number of things, but the most common cause of gas leaks is a leaky fuel filter. This is the part of your fuel system that allows you to inject fuel into your engine. A fuel leak can cause this to happen, so it’s important to get it fixed as soon as possible.\n\nHow To Remove Tummy Tuck Drains? (Easy & Clear Answer)\n\nHow long does it take for gas to go bad?\n\nDiesel can last up to a year before it begins to degrade, while regular gasoline can last for three to six months. Due to the presence of heavy metals, organic-based Ethanol can lose its combustibility in just one to three months. It is a fuel that has to be used with extreme caution.\n\nIn fact, it is the only fuel in the world that is not regulated by the Environmental Protection Agency (EPA) or the U.S. Food and Drug Administration (FDA). This is because the EPA and FDA do not have the legal authority to regulate the use of any fuel other than gasoline and diesel.\n\nThe only thing that can be said for certain is that diesel is one of the most dangerous fuels on the planet.\n\nHow can you tell if gas is bad?\n\nYou can determine whether gasoline is bad by its appearance or smell. Stale gasoline is usually darker in color and has a different smell than fresh fuel. If your tank is full of bad gas, it is a good idea to have it pumped out and replace it with a fresh one.\n\nIf you’re not sure if your gas is good or bad, you can test it by putting it in your car and driving it around for a few minutes. You’ll probably notice that the gas in the tank seems to be a little more viscous than it was before.\n\nThis indicates that it has been sitting on the ground for some time, and it may not be as fresh as it once was.\n\nHow To Install A Window Well Drain? Clearly Explained!\n\nIs there a drain plug on the fuel tank?\n\nFuel tanks do not have a drain plug. The best way to drain the fuel is to remove the hose at the filter, usually found on the frame just in front of the gas tank. If you have an aftermarket fuel pump, you will need to replace it with a new one.\n\nYou can find a good one at your local auto parts store, or you can buy one online. If you don’t have access to one of those places, the best thing to do is buy a used one from a friend or family member. They will be more than happy to help you out.\n\nCan you mix old gas with new gas?\n\nThe old gas should not be mixed with the new gas because it has already lost it’s combustibility and is degrading over time. It is possible to cause sputtering. It can be dangerous to the user if it fails to fire. The most common method is to add a small amount of gas to a large volume of air. This is known as a “pump” or “mixer”.\n\nThe gas is then pumped into the air and the mixture is ignited. In other words, they must be able to ignite the gas in order for it to burn. If the mixer is not capable of igniting gas, then it will not burn and you will be left with a gas that has lost its ability to combust.\n\nA good example of this would be if you were to use a mixture of gasoline and kerosene to light a campfire. You would need to have a source of ignition that would allow the gasoline to start the fire, otherwise it would not ignite.<|endoftext|>Cash Home Buyers vs. Traditional Home Sales: 8 Major Differences\n\nAugust 19, 2022\n\nWhen you need to sell your home quickly, it may seem like you have limited options. But don’t give up hope! No matter your situation or location, there are always alternatives to the traditional method of selling a home through a real estate agent. One such alternative is selling to a cash home buyer. Cash buyers purchase homes for sale with cash, then either rent them out or sell them for a profit later on. In this guide, we’ll describe a few major differences between traditional home sales and cash home sales so that you can make a proper decision about which method will work best for you.\n\nTraditional home sales can take months or years.\n\nThe traditional listing process is highly variable and can take as little as a few weeks or as much as a year to complete. During this time, the seller must do everything from finding a real estate agent and setting an asking price to dealing with multiple offers and finally closing on the house. As a result, the process can be stressful and exhausting for many homeowners. Cash home buyers, however, are not burdened by these issues–they can close deals in just days or weeks rather than months or years!\n\nCash home buyers can close deals quickly.\n\nWhen working with cash home buyers, you don’t need to worry about financing or inspections. In fact, you can complete the process much more quickly than through traditional sales. That’s because when you’re selling your house to an investor who doesn’t require financing for the deal, there are fewer steps involved in closing on the home. Similarly, you won’t have to wait for a cash home investor to complete any elaborate inspections—they’ll simply purchase your house and move on! Additionally, since listing a property takes a lot of time and effort, skipping this step shortens the entire sales process drastically! Cash home buyers also eliminate the need for a real estate agent, as the buyers conduct all sales negotiations without intermediaries.\n\nTraditional home sales have lots of fees.\n\nWhile the buyer pays for some fees, there are many costs associated with traditional home sales on the seller’s end. These include real estate agent fees, home inspection fees, title search fees, insurance fees, closing fees, appraisal fees, surveyor fees, and attorney fees. Although some of these extra costs can be negotiated with traditional buyers and real estate agents, many are unavoidable and extremely pricey.\n\nCash home buyers don’t charge extra fees.\n\nOne of the biggest differences between cash home buyers and traditional home sales is that cash home buyers don’t charge extra fees. Traditional real estate transactions often include fees that can quickly add up to thousands of dollars, such as buyer’s agent fees, closing fees, and more. Although the home selling process is never cheap, cash buyers can lighten the financial load by covering most extra sales charges. Of course, it depends on the company you choose to work with—but for the most part, you can count on cash home sales to be cheaper than traditional sales.\n\nTraditional home sales are unpredictable.\n\nTraditional home sales are unpredictable. A traditional home sale with an agent can take months or even years to complete. Countless potential buyers may decide to look at other houses (even after making an offer) or decide they don’t want to buy a house at all. They might find a house that better fits their needs, which is completely out of your control. The buyer could be ineligible for financing due to a poor credit score or other financial issues, or they might get cold feet and back out of the deal altogether.\n\nCash home buyers are flexible.\n\nCash home buyers are much more flexible than traditional home sellers. This is because they don’t have to worry about your credit score or scramble to sell their own homes first. Because of this, you can close whenever you’re ready, even if it ends up being months later. Cash home buyers also aren’t concerned with financial situations when looking at properties, so long as the property itself is worth buying.\n\nTraditional home sales often require repairs.\n\nTraditional home sales can require repairs. When attempting to sell your house to a traditional buyer, you may need to make adjustments to make your home more appealing to potential buyers. This may include repainting the walls, installing new appliances, or fixing broken pipes. The more extensive these changes are, the more expensive and time-consuming they will be—and though they will presumably increase your home’s value, the money and effort you put into them may not be worth the reward they reap.\n\nCash home buyers can buy your house as it is.\n\nOne of the great things about cash home buyers is that they can buy your house exactly as it is—broken windows, carpet stains, and all. Cash home buyers don’t care about nonfunctional appliances, water damage, or other issues that traditional buyers might consider dealbreakers. (Although those issues may affect the appraised value of your home). They’ll pay you cash for your property regardless of its condition—and they will have no qualms about making an offer immediately.\n\nWhile both traditional home sales and cash sales have their advantages, it’s clear that cash home buyers offer a few unique and undeniable benefits. So if you need to sell your home in a hurry for its full market value, working with a professional cash home buying company is your best option<|endoftext|>Christmas Light Bulb Sizes\n\nChristmas Light Sizes- History and Meaning\n\nChristmas lights come in a variety of sizes and shapes, each with a different use and a different history. The first lights offered for Christmas decorative use appeared in 1895, and they have only continued to change since then, taking on almost any shape imaginable. Many times have I been asked about the differences between different bulbs, such as which are brighter, which fit a certain use, and so forth. So I thought that I might take a moment to give a primer on the unique styles of bulbs that Christmas lights and decorations use.\n\nThe most common incandescent Christmas light in use is called a Mini light bulb. It is officially named the T1¾ bulb. The first thing to note is that for cone and tube (T) shaped bulbs, the number refers to the diameter of the bulb in eights of an inch. Therefore, mini lights are 7/32nds of", "num_tokens": 2048} {"category": "common_crawl-industrial", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-industrial/part-000-00000.npy", "text": ".\n\n3. Energy saving and efficient\n\nThe microwave drying can save one third energy of the far-infrared drying\n\n4. Mildewprooding/sterilizing/keeping fresh\n\nMicrowave drying with thermal and biological effects can sterilize and resist rot under lower temperature.\n\n5. Advanced craftwork and easy control\n\nWith the use of graphic operation terminal and PlC, you can realize programmable autocontrol of heating progress.\n\n6. Safety and innocuity.\n\nThere is no harmful radioactivity or harmful gas, or waste heat or dust pollution, so neither could microwave heating contaminate food nor pollute the enviroment.\n\nPicture of microwave dryer and sterilizer:\n\nNut Microwave Roasting Machine Brief introduction: oil refining is a complicated process normally including physical and chemical refining. An optimization refining process is the essence of the oil production. According to different physical and chemical characters of the oil and accompaniment, separate oil and impurities with the help of acid, alkali, high temperature process, ect. to improve the oil stability and safety for using and storage.\n\nWorking principle of Mircrowave drying,roasting and sterilizing equipment for peanuts .peanuts process l<|endoftext|>14th of September ,2017\n\nWhy doesn't stainless steel rust?\n\nStainless steel remains stainless, or does not rust, because of the interaction between its alloying elements and the environment. Stainless steel contains iron, chromium, manganese, silicon, carbon and, in many cases, significant amounts of nickel and molybdenum.\n\nChromium present in the steel reacts with oxygen to form a protective oxide layer. The presence of the stable film prevents additional corrosion by acting as a barrier that limits oxygen and water access to the underlying metal surface.\n\nBecause the film forms so readily and tightly, even only a few atomic layers reduce the rate of corrosion to very low levels. But sometimes stainless steel can rust. If you are experiencing rust on your stainless steel, you are not alone.\n\nThere are over 150 grades of stainless steel and some are more prone to corrosion than others. Generally, the higher the chromium content, the less likely the steel will rust. However, over time, rust can and will develop on stainless steel.\n\nTo prevent stainless steel from rusting, you need to passivize it. Passiveness stainless steel is a process that allows stainless steel to retain its corrosion resistance. There are a few factors that can affect the corrosion resistance of stainless steel.\n\nThe composition of the steel affects corrosion resistance. Even within grades of stainless steel, impurities in the steel can affect the corrosion resistance. The environment is another big factor in stainless steel rust.\n\nEnvironments with chlorine, like swimming pools, are highly corrosive. Salt water environments affect stainless steel, just to a lesser extent than carbon steel. In all environments, properly passiveness your stainless steel furniture will prevent it from rusting.\n\nAlthough rust is something most of us see on an everyday basis and appears to be a simple occurrence it can result from a number of complex processes. Understanding the materials science of metals is critical to ensuring correct product performance and fixing issues, such as rust, as they occur.\n\nsend us a message<|endoftext|>Sustainability - Gorilla Wear\n\nAt Gorilla Wear, we believe that sustainability is an essential pillar of our brand's mission. We understand that the choices we make today have a direct impact on the planet we leave behind for future generations. That is why we are committed to integrating sustainable practices into every aspect of our operations, from material sourcing to manufacturing, packaging, and beyond.\n\nOur mission is to provide high-quality fitness apparel that not only supports athletes to achieve their fitness goals but also respects the environment and communities involved. We recognize that as a leading fitness brand, we have a responsibility to take meaningful action to minimize our environmental footprint and contribute to a more sustainable future.\n\nWe are committed to continually improving our sustainability practices and encouraging positive change, and we are excited to share our efforts with you on this page. Together with our customers, we can have a positive impact on the planet and promote a more sustainable world for future generations.\n\nSuppliers and Manufacturers\n\nGorilla Wear only works with suppliers and manufacturers that meet our strict guidelines. These requirements ensure that all of our products are produced with the highest standards of quality and safety.\n\nWe require that our suppliers and manufacturers adhere to ethical and socially responsible practices. This includes fair labor practices, safe working conditions, and compliance with local laws and regulations. Gorilla Wear recognizes that healthy and motivated workers are crucial to producing high-quality products.\n\nFair labor requirements reflect our commitment to upholding the rights and welfare of workers throughout our supply chain.\n\nRecycled Materials\n\nGorilla Wear is proud to partner with Waste2Wear, a pioneering company that shares our commitment to sustainability. This supplier provides sustainable textile solutions that specialize in creating innovative fabrics from recycled materials, including plastic bottles collected from the ocean and other waste sources. They work exclusively with Global Recycling Standard (GRS) certified partners to ensure compliance with all relevant environmental and labor standards.\n\nThis amazing partnership allows Gorilla Wear to incorporate their advanced recycled fabrics into products, reducing our reliance on virgin materials and minimizing our impact on the environment. These recycled fabrics not only meet our quality standards but also our sustainability values, allowing us to offer sustainable fitness apparel without compromising on quality or style.\n\nThanks to the proprietary blockchain system developed by the supplier, all steps in the production process are transparent and understandable to the end consumer. The blockchain provides a direct link between a recycled product and its positive environmental impact. It combines digital records with physical evidence and inspections to ensure compliance and transparency throughout the supply chain.\n\nWe've already introduced a range of products crafted entirely from recycled materials, and we're committed to further expanding this collection. Additionally, we've incorporated sustainable and eco-friendly fabrics like organic cotton into some of our New Arrivals. Our dedication to sustainability extends beyond new items; we're gradually phasing out existing products in favor of more sustainable alternatives. With each step, we're progressing towards an assortment consisting solely of products made from recycled or sustainable fabrics.\n\nClick here to check out our sustainable collection.\n\nWe recognize that transportation and logistics play an important role in our environmental impact, and we are committed to making responsible choices to minimize our carbon footprint and reduce our overall environmental impact.\n\nTo achieve our sustainability goals, we have implemented several initiatives:\n\n 1. Eco-friendly packaging: We use eco-friendly shipping bags. We avoid excess packaging and strive to use materials that are recyclable, biodegradable, and/or made from renewable resources. We are also working to make product packaging more sustainable.\n 2. Partnering with sustainable courier services: We prioritize partnerships with suppliers that align with our sustainability values. We work with courier services that have adopted sustainability initiatives, such as the use of electric or low-emission vehicles, green delivery practices, or environmental certifications.\n 3. Carbon offsets: All of our courier services offer approved carbon offset programs to offset emissions. This may include investing in renewable energy projects, supporting reforestation, or other verified carbon offset projects to neutralize transportation emissions.\n 4. Optimization of shipping routes: We work closely with our transportation partners to optimize our shipping routes to minimize transportation emissions. This includes consolidating shipments, using efficient routing algorithms, and promoting sustainable transportation options, such as sea or rail transportation, wherever possible.\n\nThrough these initiatives, we strive to reduce our environmental impact related to courier services and transportation and contribute to a more sustainable future. Together, we can work toward a greener, more sustainable future for generations to come.\n\nWaste Management\n\nWaste management is a crucial pollution prevention tool because it ensures that waste is properly disposed of, recycled, or reused rather than released into the environment. To contribute to this effort, Gorilla Wear has partnered with CleanHub. CleanHub allows us to take direct action against one of the biggest environmental problems we face today: the global plastic crisis. Unlike alternative approaches that focus on recovering plastic once it enters nature, they stop it.\n\nThey bring waste collection systems to coastal areas where they do not yet exist and prevent waste from leaking into the environment or being openly incinerated. They collect waste on a large scale and ensure its proper disposal.\n\nTheir mission to build waste management infrastructure will result in thousands of new waste treatment centers around the world that will directly prevent plastic waste from reaching the ocean and provide worthy jobs for local communities.\n\nGorilla Wear has already funded the safe collection and recovery of 30,000 kg of ocean-bound plastic waste. This contribution supports a clean environment and creates sustainable jobs in the global south. Collection progress can be tracked through the CleanHub Impact Report.\n\nIn addition to all of the above initiatives, we are also implementing other, smaller projects that all contribute in their own way to the established sustainability goals.\n\nReduction of Returns\nWe've enhanced our size charts to ensure a more seamless and user-friendly experience. With our advanced AI size recommendation widget, customer-specific size suggestions are provided for each product, minimizing the likelihood of ordering sizes that are either too large or too small. This proactive approach not only decreases the rate of returns but also contributes to reducing carbon emissions by curbing unnecessary transportation associated with return shipments.\n\nInternational Law and Regulations\nTo comply with international laws and regulations, we cooperate with organizations in several countries where we market products (for example, Refashion and Léko, both of which operate in France). In this way, we keep track of the number of products and registered packaging in a particular country, in order to compensate for this.\n\nHeadquarters and Staff\nFinally, we are looking at ways to make our premises more sustainable. These include sustainable office supplies, waste sorting, good insulation, and energy efficiency. We are also training our staff and making them aware of the impact of our brand and the industry in which we operate. Together we will work to reduce our carbon footprint and are committed to integrating sustainable practices into every aspect of our operations.\n\nAI Image Compression\nWe use an advanced AI tool on our website to compress images and videos. This reduces file sizes and increases loading speeds, without compromising image quality", "num_tokens": 2048} {"category": "common_crawl-industrial", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-industrial/part-000-00000.npy", "text": " the day of the explosion.  The findings of the Royal Commission, however, cleared Ward of any negligence or wrong-doing. Instead, the Commission found Esso fully responsible for the accident:\nSo what might cause apparent \"worker negligence\" (aka operator error) in cases like this?\n\nThe disaster happened when hot oil was pumped into the cold exchanger, which was the wrong thing to do, but why did the operators do this? The book mentions what it calls \"latent conditions\" which can cause operators to make poor decisions, such as \"poor design, gaps in supervision, undetected manufacturing defects or maintenance failures, unworkable procedures, clumsy automation, shortalls in training, less than adequate tools and equipment (which) may be present for many years before they combine with local circumstances and activate failures to penetrate the system's many layers of defences\".\n\nIf an operator does not have the correct training, or the correct procedures, then you could argue that they do not have the knowledge to make the correct decision, and so may end up making mistakes not through error or negligence, but through ignorance. \n\nIf they do not have the knowledge they need to make an effective decision, then this could be seen to be a failure of the knowledge management system, for not providing the operators with the knowledge they need to avoid the error, to make the correct decision, or to take the necessary preventative action when things go wrong.\n\nIn knowledge management terms, the investigative commission found these three contributory factors (again, according to Wikipedia), which talk to a lack of knowledge on behalf of the operators, lack of access to more skilled knowledge, and lack of communication of knowledge - all of them potential KM failures\n • inadequate training of personnel in normal operating procedures of a hazardous process;\n • the relocation of plant engineers to Melbourne had reduced the quality of supervision at the plant;\n • poor communication between shifts meant that the pump shutdown was not communicated to the following shift.\n\nThe following quote from the book is a statement from the operator himself, and you can hear from the language he uses that this was way outside his experience and knowledge base.\n\"Things happened on that day that no one had seen at Longford before. A steel cylinder sprang a leak that let liquid hydrocarbon spill onto the ground. A dribble at first, but then, over the course of the morning it developed into a cascade ... Ice formed on pipework that normally was too hot to touch. Pumps that never stopped, ceased flowing and refused to start. Storage tank liquid levels that were normally stable plummeted ... I was in Control Room One when the first explosion ripped apart a 14-tonne steel vessel, 25 metres from where I was standing. It sent shards of steel, dust, debris and liquid hydrocarbon into the atmosphere\".\nIn a situation like this, where the wrong operational decision can be lethal and operator error through ignorance cannot be allowed, effective knowledge management and an effective knowledge supply chain (in the sense of ensuring that people have access to the knowledge they need, at the time they need it, in order to make correct decisions) is not just a nice-to-have; it's a life saver.\n\n1 comment:\n\nStuart French said...\n\nI did my apprenticeship at the Longford plant and have been in that control room many times. My next door neighbour was one of those badly injured in the incident and once of the older tradesmen from my section was on duty (I suspect that was him you quoted).\n\nI had left just a few years before the accident and at the time it was renowned at the most safe workplace in Australia. Every meeting, from a bunch of apprentices to the executive board started with a five minute session on safety communication and improvement.\n\nJust as I let the business, the tax scheme changed and the company went in to cutback mode. There were strikes and the safety meetings slowly dissipated. People became too busy.\n\nThis was long before I found my career in KM, but your comments here seem to ring true to me that there were knowledge breakdowns and the process of moving from expert engineers to detailed procedures for everything (they were even experimenting with Expert Systems while I was there) meant that the new, younger employees only seemed to understand the plant during normal operation and some may have lacked the chemical and process engineering knowledge to understand why the weird things they saw that day were happening and what the results could be.\n\nMy first response to this is to insert event and limit triggers in the workflows and systems that require the operator to call an engineer in to review the situation both at a local and a system-wide level so that cascade failures are minimized. But underlying this is the need for that expertise to still be in the business in the first place. With the cut backs, KM and HR together could have been carefully monitoring what competencies and expertise were required as a minimum to keep the plant safe. I wasn't there but based on the culture when I left I am not sure this would have been done as well as it could have. They hired such top people, they did sometimes rely on them to manage well and automation was focused more at the operations level than the knowledge level.\n\nThanks for making me aware of the report Nick.\n\nBlog Archive<|endoftext|>EDITORIAL: Mining not worth the risks\n\nAUSTRALIA has a lot of coal, but it doesn’t really have a lot of truly prime agricultural land.\n\nThat’s why, in years past, a tacit understanding existed that open-cut coalmines would never consume the Hunter Valley’s precious alluvial flood-plains and river flats.\n\nThere was nothing ‘‘anti-coal’’ about it. It was simply that everybody, including mining companies and government departments, accepted the irreplaceability of this valuable land.\n\nGiven that long-standing consensus, it has come as a shock to many people that some mining companies have applied, after all, to open-cut the river lands.\n\nOne such application by Coal and Allied, the Carrington West proposal, is now the subject of a Planning Assessment Commission hearing at which much opposition to the plan is being voiced.\n\nThe reasoning behind the mining companies’ applications isn’t hard to follow. For the most part, the coal beneath the alluvial flood-plains is the last of the valley’s ‘‘easy’’ coal.\n\nThere is no question that the mining companies stand to make a lot of money if they get permission to dig up this land.\n\nEqually, there is no doubt that the potential royalty payments to the state government stand to be very substantial over the life of the proposed mines.\n\nSo, what is the downside?\n\nFirst, mining companies have not been able to persuade Hunter residents that they are capable of returning high-quality alluvial land to its original productive status after mining operations.\n\nSecond, available evidence does not convincingly demonstrate that these mining operations will be able to be conducted without damaging the rivers and interconnected water systems. \n\nRivers don’t merely run in their visible beds, but are conducted through saturated alluvium that extends to a variable extent beyond what can be seen.\n\nCoalmines have fractured alluvium surrounding several streams, including in the Hunter Valley, and the consequences – extrapolated to major waterways like Glennies Creek or the Hunter River itself – are potentially extremely serious.\n\nThe coal beneath the river flats can be mined only once, yielding a one-off profit.\n\nAlternatively, that land could be used to produce valuable crops for many generations into the future.\n\nIn a world awakening to the imperative of food security, the Hunter’s prime river lands have a potential value far in excess of the fleeting benefit from mining.\n\nThe risks from these proposals are too great and too far-reaching for approval to be countenanced.  \n\nTablet - Narrow\nTablet - Wide<|endoftext|>3 Fertilizer Stocks to Play the Global Population Boom\n\nTony Sagami\n\nAll of us have enduring childhood summer memories.\n\nI remember the sweet taste of fat, wild blackberries we picked by the Puyallup River, the neighborhood pickup game of baseball in the cow pasture, family picnics at Surprise Lake, clam digging in Hood Canal, and the summertime stink of rotting cow blood.\n\nRotting blood?\n\nLong-time readers know that I was raised on a vegetable farm in western Washington. Our main crops were radishes and green onions.\n\nOur family farm was small, and my parents worked like the devil to scratch a living out of its soil. Life wasn't easy, but we never went hungry and my parents found a way to send all three of their children to college by hard work and frugal spending.\n\nOne way my father stretched a dollar was to avoid what he called 'store bought' fertilizer and used cow blood from a nearby cattle slaughterhouse instead. I remember being unable to fall asleep in August because the combination of the hot August sun and acres of farm land drenched with cattle blood created a horrible stench.\n\nHeck, my father would have probably told us to poop in the fields if he thought it was sanitary and would have saved him a couple bucks!\n\nSmelly or not, every farmer needs to use fertilizer and the most-used and most-important fertilizer is potash.\n\nPotash is important because crops treated with potash are extremely high yielding. Potash also improves water retention, nutrient value, taste, color, texture, and disease resistance of food crops.\n\nIt is used for fruit and vegetables, rice, wheat and other grains, sugar, corn, soybeans, palm oil and cotton.\n\nPotash is extracted from sedimentary salt beds formed by evaporation of ancient seas and is an essential element for all living organisms. Potash is not your typical fertilizer in that it is mined just like metals and looks like a crystallized rock before processing.\n\nPlus, there is no substitute for potash. That's why even my frugal father bought some to supplement the cattle blood. That is why potash is one of the commodities that I am the most bullish on.\n\nGlobal Population Growth\n\nPotash is not a typical fertilizer. It is mined.\n\nSource: Mining-", "num_tokens": 2048} {"category": "common_crawl-industrial", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-industrial/part-000-00000.npy", "text": " to further reduce CO2 emissions. This will also affect chemical refrigerants (such as R134a, R1234yf), as these have a global warming potential due to their properties. Today we can assume that the use of F-gases with global warming potential will probably be banned in 2050. Until then, the placing on the market of CO2 equivalents will be gradually reduced by means of available certificates.\n\nThe upcoming amendment to the REACH regulation is more far-reaching. The latest draft stipulates that the ban on certain chemicals will in future also include the chemical refrigerants that have been commonly used to date. Outside of the electrified vehicle sector (in particular for passenger transport), the current draft envisages entry into force in 2033. This means that distributors of mobile machinery would have to make their products free of chemical refrigerants, among other things, by then.\n\nThe amendment of both ordinances is still in the coordination phase in the bodies involved. These regulations are expected to be adopted in 2024 or 2025. Unfortunately, there is no planning certainty for future product developments before then. But, in the end, both means that the end of chemical refrigerants will be coming, and everybody who is using them today will, sooner or later, have to start to think about alternative concepts.\n\nOur journey started 80 years ago\n\ngo to our history\nPieces of history, generational spare parts and entrepreneurial originality of a great Motor Valley company.\nPhotos and memorabilia of an extraordinary story.<|endoftext|>HomeBusinessSelecting The Right Scissor Dock Lift: Key Tips And Considerations\n\nSelecting The Right Scissor Dock Lift: Key Tips And Considerations\n\nIn the fast-paced world of logistics and material handling, efficiency is paramount. A strategic selection of scissor dock lifts can yield substantial benefits for numerous enterprises, including enhanced operational efficiency, heightened worker output, and improved occupational safety. However, with various options available on the market, selecting the right scissor dock lift can be a daunting task. To help you make an informed decision, let’s delve into some key tips and considerations.\n\n1. Assess Your Needs\n\nPrior to commencing the selection procedure, it is imperative to evaluate your particular specifications. Consider factors including the available space in your facility, the weight and dimensions of the cargo you will be handling, and the frequency of use. Additionally, think about any special features or functionalities that may be necessary to meet your operational needs.\n\n2. Understand Different Types Of Scissor Dock Lifts\n\nScissor dock lifts come in various configurations to suit different applications. These include hydraulic, pneumatic, and mechanical models, each with its own set of advantages and limitations. Hydraulic lifts, for example, offer smooth and precise lifting capabilities, while pneumatic lifts are ideal for environments where electricity is not readily available. Mechanical lifts, on the other hand, are often more cost-effective but may require more maintenance.\n\n3. Consider Load Capacity And Platform Size\n\nLoad capacity is one of the most important considerations when selecting a scissor dock lift. Ensure that the lift you choose can safely accommodate the weight of the heaviest loads you anticipate handling. Additionally, consider the size of the lift platform to ensure it can accommodate your largest pallets or equipment.\n\nSee also: The Ultimate Guide to SIP Trunks\n\n4. Evaluate Safety Features\n\nSafety should always be a top priority when selecting any material handling equipment. Look for scissor dock lifts that come equipped with essential safety features such as guardrails, safety skirts, emergency stop buttons, and overload protection systems. Additionally, consider optional features such as interlocking gates and automatic safety locks for added peace of mind.\n\n5. Assess Installation Requirements\n\nBefore making a purchase, carefully evaluate the installation requirements for the scissor dock lift. Consider factors such as the available space in your facility, the need for excavation or construction work, and any electrical or plumbing requirements. Opt for a lift that can be installed with minimal disruption to your operations, and that can easily integrate with your existing infrastructure.\n\n6. Think About Mobility\n\nDepending on your operational needs, you may require a scissor dock lift that offers mobility. Mobile scissor lifts are equipped with wheels or casters, allowing them to be easily relocated to different areas of your facility as needed. This flexibility can be particularly beneficial in warehouses or distribution centers with changing layouts or seasonal fluctuations in demand.\n\n7. Budget Considerations\n\nIt is crucial to take into account one’s budget when choosing a scissor dock lift, although price should never be the exclusive basis. Furthermore, beyond the initial investment cost, potential productivity gains, energy consumption, and maintenance expenses should be taken into account. Remember that investing in a higher-quality lift upfront may ultimately result in long-term savings and improved performance.\n\nSelecting the right scissor dock lift requires careful consideration of various factors, including your specific operational needs, safety requirements, and budget constraints. By assessing your requirements, understanding different types of lifts, and evaluating key features, you can make an informed decision that enhances efficiency, productivity, and safety in your facility. It is imperative to seek guidance from industry professionals and reputable vendors in order to identify the most suitable lift for a given application. With the right scissor dock lift in place, you can elevate your material handling operations to new heights of success.\n\nPlease enter your comment!\nPlease enter your name here\n\nPopular posts\n\nMy favorites\n\nI'm social<|endoftext|>Gone Outdoors\n\nHow Does a Portable Chemical Toilet Work?\n\nby Rose Kivi\n\nPortable Chemical Toilets\n\nA portable chemical toilet is designed for use when plumbing is unavailable. Portable chemical toilets are used as outhouses, on boats, in recreational vehicles and in cabins that lack plumbing.\n\nHolding Tank and Chemicals\n\nPortable chemical toilets have a holding tank that holds human waste. Chemicals are placed in the holding tank prior to use to minimize odor and break down waste. Formaldehyde and bromine are two common chemicals used in portable chemical toilets. The chemicals are diluted with water before being placed in the portable toilets holding tank.\n\nUsing a Portable Chemical Toilet\n\nThere are two main types of portable chemical toilets--those that flush and those that do not. The toilets that flush look similar to a regular house toilet. Instead of water being used during flushing, the toilet chemicals are recirculated during the flush cycle. Portable toilets that do not flush look like outhouses in that they have an open design where you can see directly into the tank.\n\nEmptying a Portable Chemical Toilet\n\nPortable chemical toilets require regular emptying to remove human waste and to prevent bad odor. To empty the portable toilets, a hose is hooked up to a connection on the toilet and the toilet connection is opened allowing the waste and chemicals to exit. For health safety reasons and to avoid groundwater contamination, toilet waste must be emptied in a proper disposal facility such as a RV dump station.<|endoftext|>Machining’s Role In Making Cancer "History"\n\nA machine shop in a new cancer treatment center produces components to precisely guide proton radiation to eliminate its target—cancerous tumors.\n\nFind more information about:\n\nMedical and metalworking technologies meld in an effort to heal in Houston, Texas. The two disciplines are working in concert to make cancer “history” at M.D. Anderson’s new Proton Therapy Center, located in the heart of the Lone Star State’s largest city.\n\nOne of only four proton radiation centers in the United States, M.D. Anderson’s $125 million facility will serve more patients than any of the other centers, treating 3,500 per year when it reaches full capacity. In order to support such an aggressive treatment schedule, the facility houses its own machine shop that includes four networked CNC vertical machining centers (VMCs).\n\nThe primary duty of these machines is to produce two patient-specific components for the center’s gantries, or radiation beam delivery devices. One of these components is a brass aperture that receives a window to shape the beam to match a tumor field’s outline. The other is an acrylic compensator block into which is machined a cavity to shape the beam to release its energy at the appropriate depth within the patient’s body. The ability to manipulate the beam in a way that damages a cancerous tumor without harming nearby healthy tissue is what makes proton therapy such a precise and powerful cancer treatment.\n\nMost hospital-based machine shops are equipped with toolroom-type mills and lathes that are used to produce one-off fixtures or instruments. The shop at M.D. Anderson’s proton therapy center does have such equipment for that type of work. However, it is first and foremost a production shop, as John Barr points out. Mr. Barr, the shop’s supervisor, selected most of the shop’s machine tools and related equipment. Four Mazak Nexus 410 VMCs will bear the brunt of the shop’s production work. When the center reaches full capacity, those machines will produce thousands of apertures and compensators each year.\n\nModern Machine Shop was invited to tour the center and its dedicated shop a few months in advance of the official opening in June 2006. During the visit, Mr. Barr and Paul Wisdom, a deft machinist who is currently “on loan” from M.D. Anderson’s nearby instrument shop, explained the role that machining technology plays in support of an effective cancer treatment procedure.\n\nProtons Pack A Punch\n\nThe 94,000-square-foot facility is topped by an open, inviting entrance with numerous offices and examination rooms. However, the building is an iceberg of sorts, because 42 feet of it is below ground. Located in this bunker are four proton radiation treatment rooms and the compact machine shop that measures 36 by 44 feet. These rooms are surrounded by 8-foot-thick concrete walls and a ceiling that’s 12 feet thick. The subterranean location and beefy enclosure are required to contain stray radiation during treatment.\n\nThe apertures and compensators are the final two components in the subatomic beam delivery process. An injector first strips", "num_tokens": 2048} {"category": "common_crawl-industrial", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-industrial/part-000-00000.npy", "text": " streamline your paper cutting operations. Our machine is designed to deliver precise and accurate cuts, saving you time and effort. With advanced technology and innovative features, we ensure maximum productivity and cost-effectiveness for your business. Our team is committed to serving you with exceptional customer support and technical assistance, ensuring that your experience with our product is seamless and successful. Trust us to serve you with the best automatic paper cutting solution for your needs.\n\nAs one of the most popular products, Jigsaw slicing equipment wins increasing popularity. In order to guarantee Jigsaw slicing equipment performance, the adopted technologies are technically useful and feasible. Depending on its properties, the product is widely applied in the field(s) of Paper Product Making Machinery. Jinhaoshun Jigsaw Puzzle Equipment Co., Ltd. has always insisted on winning by \"quality\", and has won wide recognition and praise from many companies with high-quality servic<|endoftext|>Learn | 09.21.2023\n\nEcowise Or Otherwise? Gauging Your Cannabis Footprint\n\nIn the journey towards a greener future, every step counts. Delving into the expansive world of cannabis naturally comes with some environmental considerations.\n\nYour “cannabis footprint” encompasses the effects from cultivation to disposal. \n\nLet’s unpack how we can be more mindful consumers, reducing our environmental imprint one step at a time.\n\nYour Cannabis Footprint\n\nUnderstanding your cannabis footprint involves examining every step, from cultivation to disposal. \n\nLet’s delve into the key phases that constitute this footprint:\n\nSeed To Harvest \n\nThe journey begins with a focus on responsible cultivation practices. Whether you’re selecting products or growing your own, the choices made during this stage have a significant impact. \n\nEnergy Consumption\n\nEspecially in indoor farms, the emphasis is on reducing energy consumption through the use of efficient systems like LED lighting and renewable energy sources, helping to slash the industry’s carbon footprint significantly. \n\nSoil Choice\n\nLeveraging organic soil promotes healthier plant growth without resorting to synthetic additives, making it a win-win for both growers and the environment. \n\nWater Use\n\nConscious water use is a hallmark of sustainable cultivation. Techniques like drip irrigation and rainwater harvesting are employed to minimize wastage and protect precious water resources.\n\nProduction To Packaging \n\nThis phase focuses sharply on the transition from processing to packaging, highlighting the opportunities for manufacturers to further eco-friendly initiatives and curb pollution. \n\nManufacturers are pivoting towards recyclable or biodegradable packaging materials, moving away from single-use plastics that have long-term adverse environmental effects. Production facilities are also evolving, incorporating energy-efficient processes that lessen emissions and conserve energy. \n\nBy supporting brands committed to these green initiatives, consumers can influence a positive shift towards environmental responsibility throughout the production and packaging cycle.\n\nOften underestimated, the disposal stage is crucial in fostering a green cannabis culture. It encompasses the responsible handling of both product remnants and packaging materials. \n\nAs consumers, we must undertake responsible disposal of cannabis products, opting for composting of organic waste where possible. \n\nSimilarly, giving packaging materials a second life through recycling programs can prevent them from contributing to landfill pollution, encouraging a sustainable cannabis industry paradigm.\n\nChoosing Conscious Consumption With Eco-Friendly Products\n\nAs enthusiasts and connoisseurs, embracing sustainable habits is key to fostering a greener industry. Let’s explore how you can align your consumption habits with this eco-conscious movement:\n\nReusable Accessories\n\nOpt for reusable accessories like glass pipes, metal grinders, and refillable vape pens, which not only last longer but also significantly reduce waste compared to single-use items. \n\nOrganic Products\n\nPrioritize purchasing organic cannabis products, which are cultivated without the use of harmful pesticides and synthetic fertilizers, thereby reducing the strain on the environment. \n\nWaste Reduction\n\nBe mindful of the quantity you purchase to prevent unnecessary waste. Buying in bulk, where feasible, can help reduce the amount of packaging waste generated. \n\nSupporting Local Growers\n\nFavor local growers who employ sustainable practices, as this not only supports community businesses but also reduces the carbon footprint associated with transportation and distribution. \n\nEco-Friendly Packaging \n\nChoose brands that utilize eco-friendly packaging, reinforcing the demand for sustainable solutions in the industry and encouraging more brands to follow suit.\n\nReducing Waste: Tips And Tricks\n\nDon’t just toss your cannabis remnants in the trash. Organic materials like stems and leaves can be composted, returning valuable nutrients to the soil. \n\nExperiment with creating your cannabis products, such as infused oils or edibles, utilizing every part of the plant and minimizing waste. \n\nAs consumers, we wield the power to shape the cannabis industry into a beacon of sustainability. Let’s embrace eco-friendly practices in our consumption habits, fostering a future where the cannabis community thrives in harmony with the environment.\n\nMoose Labs MouthPeace Collection: Social Smoking Redefined\n\nRachel Abela\n\nThe Best Dispensaries In New Mexico\n\nJeffrey Tiu\n\nenter your email below to get insider updates delivered straight to your inbox.\n\nWhat Is No-Till Living Soil?\nThe Best Dispensaries In Ann Arbor, MI\nBehind The Brand |\nBehind The Brand: Why The Green Organic Dutchman Is Canada’s Favorite Organic Flower Brand\nThis Cannabis Company Just Went Carbon Neutral\nThe Benefits Of Sun-Grown Cannabis: Here’s Why It’s Better Than Indoor\nPrecision Vs. Tradition: Hydroponic Vs. Soil Weed\nWhat A 100-Acre Cannabis Farm Looks Like\nWhy Marijuana Packaging Matters And How To Do It Right\nIsiah Thomas’s ‘One World’ Is Replacing The Plastics In Cars With Hemp\nMeet Philter, Makers Of The First Biodegradable Smoke Filter And Your New Best Phrend<|endoftext|>Strong beef prices gave support to farmers as fertiliser prices surged\n\nDespite climbing beef prices over the past few years, farmers have had to battle huge inflation in key input costs\n\nStrong beef prices gave support to farmers as the sector had to battle huge inflation in key input costs, new analysis by AHDB shows.\n\nLooking at the relative values of fertiliser and beef gives an insight to the response to high input costs on the sector, the levy board says.\n\nNitrogen fertiliser, with its linkage to energy markets, has been at the heart of the inflationary challenge for agriculture.\n\nThe market calmed in late 2023, but prices remained nearly 30% above 2019 levels in the first quarter of 2024.\n\nHowever, in its new analysis, AHDB says there is a risk of complacency this year toward the fertiliser market following a period of calm.\n\n\"It is important to be mindful of risks in global markets and changes to domestic policy as outlined in the AHDB Fertiliser Outlook,\" says Becky Smith, AHDB analyst.\n\n\"Looking at both beef and fertiliser prices over the past five years, we see clearly the steep increase in fertiliser prices from the second half of 2021, a response to the European energy crisis and then further climbs from the war in Ukraine.\"\n\nThe analysis notes that fertiliser price peaked in September-October 2022 but has now stabilised at £339/t for domestic AN in March, albeit at levels higher than pre-2021.\n\nBeef prices, on the other hand, have risen considerably since 2020, driven a by contraction in supply against a backdrop of stable consumption supporting demand.\n\nAverage deadweight overall all prime price sat at 491.6 pence/kg (p/kg) in March 2024, an increase of nearly 50% versus the same month in 2020.\n\nThe value of beef relative to key inputs can be measured by assessing how many KGs of beef (deadweight, all prime cattle) it takes to buy one tonne of AN fertiliser.\n\nDespite falling back through 2023, AHDB says that fertiliser prices remain above historic average levels as shown above, though this has been partly offset by strength in deadweight cattle prices.\n\nMs Smith explains: \"For AN fertilisers, the value relationship with beef has seen extreme changes to say the least with clear implications for those growing cattle on forage-based systems.\n\n\"Through 2018-2019 it took on average, 73kg of deadweight beef to pay for one tonne of AN fertiliser. In 2022 this average was 178kg, and simply made fertiliser unaffordable for many at traditional application rates.\n\n\"We saw this reflected in Defra’s British survey of fertiliser use, with the average field rate for total nitrogen use on grassland at 80kg/ha for 2022, down 12kg/ha from the average use for the previous three years.\"\n\nShe adds that falling fertiliser prices and rising beef prices are helping a return to a more normal relationship.\n\n\"But farmers are likely to remain cautious to whether a return to more normal application of fertiliser is only justified because of the current strength in beef prices.\"<|endoftext|>are the main reasons why the automatic snowflake ice making mechanism is slow or not making ice\n\n2021/12/21\nThe shape of the ice made by the automatic snowflake cbfi ice machine is small and amorphous particles, which are relatively humid, with a water content of generally between 15% and 25%, and the temperature is slightly below zero. It has good plasticity and is easy to take and accumulate. It can penetrate into a narrow gap, has a fast cooling effect, and has a good effect on ice bath operations. It is specially designed for laboratories and is especially suitable for use in laboratories such as life sciences, medicine, agriculture, forestry, animal husbandry and fishery, inspection and quarantine.  The main reason for the slow or no ice making of the automatic snowflake ice making mechanism:   There are three criteria for testing the pros and cons of a snowflake ice maker: ice", "num_tokens": 2048} {"category": "common_crawl-industrial", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-industrial/part-000-00000.npy", "text": " oxen but now it takes a few days.”\n\nHe said a machine had been provided to the gewog a few years ago but since they were insufficient in number and people were careless in handling it, it was returned to the gewog authorities.\n\nWater woes\n\nAmong the gewogs of Punakha, four gewogs of Guma, Dzomi, Lingmukha, and Toewang have been facing water shortage since decades. Aum Cigay said that due to the water shortage, they have to guard their irrigation channel so that others do not steal their water. “Some people stay guard the whole night.”\n\nAs Dzomi‘s water source is located in Shelngana gewog, at a lower elevation, not enough water can be sourced for irrigation.\n\nThe Mangmi of Guma gewog said the dzongkhag administration has helped villages facing water shortage to develop an irrigation channel. These villages depend mostly on seasonal rain for water but when the rains are delayed, the irrigation channels are used. However, a permanent solution to the water crisis is yet to be discovered.\n\n“It is very difficult to predict the rains,” he said.\n\nMeanwhile, the age-old Punap tradition of cultivating rice twice a year has now changed to once a year. The Mangmi believes that due to climate change, the tradition is lost. “Farmers have to stay guard even during the day as wild-life would destroy everything.”\n\nFurther, due to increasing rural-urban migration, interest in paddy cultivation is increasingly and steadily waning.\n\n(The story is funded by Department of Information and Media, MoIC).\n\nTenzin Lhamo from Punakha<|endoftext|>The SunCulture Impact: Improving Lives of smallholder farming households with life-changing technology\n\n • The SunCulture Impact: Improving Lives of smallholder farming households with life-changing technology\nContact Us - SunCulture\n\nThe SunCulture Impact: Improving Lives of smallholder farming households with life-changing technology\n\nIn his TEDx talk, Samir Ibrahim, CEO and co-founder of SunCulture explained that there are 1.4 billion people in the world who live in rural areas and rely on agriculture and related activities for their livelihood. He added that it is an important group of people to think about in terms of addressing the world’s largest problems. They’re the hungriest, the poorest, and a most nutrient-deficient group of people in the entire world. Ironically, their livelihood depends on the food to escape from poverty and hunger. \n\nThe agriculture industry employs 65% of the African population, so enhancing the agriculture sector is crucial for improving the lives of smallholder farmers as well as end consumers. Agriculture still remains the backbone of most African countries making it the most important activity.\n\nIn this century, things are not the same again, you can’t totally predict when it shall rain as you would probably have done 200 years ago. Deforestation, global warming, etc. have changed the weather patterns making it hard for farmers to keep up with their farming. Most farmers use the “plant and pray” technique where they plant during the rainy season and remain hopeful that it shall rain till the end of their crop life. However, this is not always the case. Rains sometimes stop causing massive losses and subsequently droughts across different African regions. At SunCulture, we strive to build a world where people can take control of their environment in rewarding and sustainable ways. With access to water for irrigation, the farmers are able to do their farming in confidence enabling them to make profits and empower their families.  \n\nAlthough 5.4 million hectares of land in Kenya are arable, over 80% of this land is unfit for farming that relies only on rainfall. And while 25% of the world’s cultivated land is in sub-Saharan Africa,  the region produces only 10% of world crop yields. Given that 60% of global uncultivated land is in Sub-Saharan Africa, there is a huge potential to change this story; Africa’s arable land requires irrigation systems.\n\nMost other regions of the world have successfully employed irrigation to increase production. Taking Asia as an example, 33% of arable land is under irrigation, compared to only 6% in Africa.  It doesn’t have to be this way.\n\nWhy use Solar Energy powered products for farming?\n\nSolar power is an essential renewable energy source, which can be utilized for multiple purposes. It is what teachers taught us in our junior classes. And Given the need for alternative, clean energy sources, it is high time now to implement the use of solar power to help combat climate change. \n\nThere are many benefits of transitioning to solar energy for agriculture. These include:\n\n • Sunlight is a clean, green, and free power generating resource of energy.\n • Reduction in fuel consumption and electricity bills since solar energy is economical and efficient.\n • Extended farming season because solar energy has the potential to reduce water usage.\n • The chief source of solar power, the sunlight, can reach remote areas that lack electricity grids.\n • The possibility to store solar energy for future use makes it a reliable renewable source of energy.\n • Solar power can be utilized for domestic needs when not being used for farming.\n • Solar products reduce greenhouse gas emissions, thus are an effective way to counter global warming.\n\nSunCulture’s solar products not only support farmers but are also a step towards a cleaner environment.\n\nSunCulture solar products and their benefits\n\nMany smallholder farmers use expensive, labor-intensive technologies such as fuel, treddle, or electric pumps, which have high fuel demand and cost. An inexpensive alternative for farmers for irrigation would be a boon in Africa.\n\nWe have a range of products for routine farming activities. \n\nOur RainMaker2 is the most effective and intelligent solar-powered irrigation solution in the market and renders maximum performance and affordability. It supports farmers who want a practical water-pumping solution for farming.\n\nWe offer customized irrigation systems, for farmers that help them cultivate higher yields while spending less, meaning higher incomes.\n\nIn addition to the ClimateSmart + RainMaker2 system, farmers can install drip irrigation at their farm. Drip irrigation is an economical way of watering crops by distributing water directly to the roots. Yields can increase by up to 300% and water usage can decrease by up to 90%. Besides, pests and weeds reduce with no water on the surface.\n\nThe ClimateSmart + RainMaker2 system can support four high brightness LED bulbs and mobile phone charging; this is a single solution that can power both the farm and the home at the same time. Should our customers choose to add entertainment to their system with a TV, they’ll enjoy  20+ hours or runtime using stored energy. For those not ready for a solar irrigation system, customers can purchase just the ClimateSmart Battery with a TV.\n\nDo you want to increase the crop yields of your farm and save precious time you spend daily on farming activities? If yes, we have a solution for you! Approach us at +254 700 327 002. We will provide you with free installation, training, and after-sales support for the SunCulture solar products we deliver.<|endoftext|>Stationary engines were extensively used to power machinery and equipment in all industries from the late 1800’s into the mid 1940’s. D.C. Stover was a prolific inventor and began manufacturing various products in 1862. In 1916 he formed the Stover Manufacturing and Engine Company in Illinois and production peaked in 1919. Before closing their doors in February 1942, Stover shipped 277,558 engines.\n\nGeorge Luhrs is known for producing the smallest engines in the world, and his miniature Stover is no exception. He machines every part from bar stock and utilizes no castings. It burns gasoline on spark ignition and, just as its full-size counterpart, requires manual lubrication before operation. Spark is produced by a small coil and battery located in the base. The engine is 5″-long, 3″-wide, and 4″-high.\n\nThe engine is accompanied by a box to transport it. The wood for the box and base match, and the lid of the box contains a few special tools to aid in running the motor.\n\nExhibit added: May 1, 2008 - Last modified: December 22, 2022\n\nPresented by The Joe Martin Foundation for Exceptional Craftsmanship<|endoftext|>and monitored production.\n • Fittings that are perfectly tailored to the window systems, with the highest quality and durability\n • Based on the WICONA Unisys principle: extensive freedom of design, high level of process safety, cost and time saving production, few tools required\n\nDiese Webseite verwendet Cookies. Klicken Sie hier für mehr Informationen. Wenn Sie auf Wicona.de surfen, akzeptieren Sie diese Cookies. \nIch akzeptiere, dass mein Daten zur statistischen Auswertung an Google übermittelt werden.<|endoftext|>Hot Products\n\nCVC Flame Retardant Fabric\n\nCVC Flame Retardant Fabrics\n\nCVC Flame Retardant Fabrics\n\nCode: YL-CVC/FR28012\nMaterial: 80% Cotton 20% Polyester FR\nWeave: 3/1 twill\nWeight: 280gsm/8.3oz\nMOQ: 3000 meters\nStandards: EN ISO 11611, EN ISO 11612, EN 61482-1-2, NFPA2112 , Oeko Tex standard 100(class 2)\nSend InquiryChat Now\n\n1. Product Introduction\n\nThis fabric is made by THPC manufacturing process. This kind of high quality flame retardant", "num_tokens": 2048} {"category": "common_crawl-industrial", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-industrial/part-000-00000.npy", "text": " application for laser alignment and the mechanical alignment to line up the engines, the shafts, and the propulsion systems in ships and airplanes and other powered vehicles. So alignment touches manufacturing in a lot of different ways.  It depends on the industry and what they’re making.\n\nJohn:  So it sounds like there’s a lot of different industries you work with and a lot of different applications where alignment comes into play but is alignment really right for everybody?\n\nMory: That’s a good question. I think years and years ago we looked at this saying, well every factory, every smokestack is a potential customer and in reality that’s not the case.  Industrial alignment is really, really important for a lot of manufacturing but it’s not used in the places that are most obvious. For example, there’s food production.  A piece of food, breakfast food, cereal, pet food, things like that you don’t think of as being carefully aligned or manufactured and yet the machinery that’s used to make that product that we all enjoy has very, very tight tolerances in its process. So those are customers that tend to require a lot of laser alignment. Then of course there are manufacturers making electronic semiconductor chips, plastic parts, metal components and other things that are very dependent upon alignment.  The machinery that’s used in many production facilities has tremendous forces on it and a lot of heat and you get wearing components.  So over time, keeping that machinery aligned well will make it last longer, produce better product, and ultimately improves the quality of product and the profits for the manufacturing company.\n\nJohn: So is machinery alignment really worth it in terms of the cost that a manufacturing company would put into it and the time involved in it?\n\nMory: Once again it really depends on the nature of the organization but we find that many of our customers and people that get involved in laser alignment or even regular mechanical alignment see a return on investment very quickly.  For example, if you consider a factory line that is producing perhaps $5,000,000 worth of product a year given the working hours in a year that’s about $2,500 an hour and if that machine is down for a day that adds up to about $20,000 a day. If the company is waiting around for somebody to come and fix that production line or something unexpected occurs for a week that’s $100,000 of downtime on that machine plus the employees who are there but not producing product. If you can catch that production problem before it occurs, if you can anticipate that problem through laser alignment or through mechanical alignment then you can save a lot of time, a lot of headaches with customers, and ultimately produce better product. We frequently make the comparison to your car.  We all put gas in our car.  We all change the oil.  We presumably all bring our cars to garages to have them aligned and checked.  When we forget to take care of these basic automobile needs that car can leave us stranded.  When you’re trying to pick up your kids at school or trying get to an important meeting, you don’t have the time for your car do decided to breakdown on you – much like downtime in a manufacturing operation. We see the same thing happening in manufacturing and alignment is just an important part of that equipment maintenance and care process.\n\nJohn: Right. I can see where that would be, like you said, an important part of manufacturing and making sure that everything runs smoothly. Is it easy to do a machinery alignment or is this something that’s really difficult to implement?\n\nMory:   Once again, it depends on the application involved. If you run a plastics production line with a number of rollers and plastic film are coming out of a machine and being rolled up to make trash bags or similar film products, that machine can very easily be aligned with a laser system.. If you’re working in a paper mill with a machine that’s 800 feet long and might be 3 stories high, then this alignment is more involved. In general, the alignment it depends on what the application is. One of the things that has developed in the last 20 years is the advent of lasers and electronic circuitry.  The developments at Pinpoint Laser Systems have helped replace old methods with products and techniques that are faster, more precise, and easier to use.  Years ago, people would stretch piano wire, fishing cord, and string between machines and they’d have their chief maintenance person with a ruler and a good set of eyeglasses staring at the ruler trying to align that machine to a piece of wire or string.  We’ve essentially replaced the string and the wire with a laser beam.  We’ve replaced that poor employee’s eyes with a very accurate receiver that delivers measurement readings on a digital display and that display can then be connected into a computer to save results on what’s happening with that machine for monitoring the health of that machine over time. So new technology has really made alignment of machinery a lot easier to do.\n\nJohn: OK. Say if I had a manufacturing company and I came to you and said our guys are really good mechanics but they don’t’ really know much about lasers. It might be kind of complicated, are they going to be able to figure this out?\n\nMory:  Excellent question. We talk with hundreds of companies every year with all sorts of different employee capabilities and machinery with different complexities and it really is a balance.  One thing that we see happening over and over again — is that the manufacturing employees that work with these machines have a lot of inherent knowledge as to how their machines work.  They may not be able to express this knowledge in scientific terms but they have very good instincts as to how that machine works and when that machine is having problems — they can sense it.  Laser alignment and mechanical alignment is essentially another set of tools, which put into the hands of those employees, allow them to better diagnose and understand, with quantitative data, what’s going on with that machine and communicate these findings.  This helps in preventing unexpected breakdowns and developing a better plan for machinery maintenance and repair. It’s really like handing them a better ruler or a better device that they can use to diagnose what’s happening with their machine.  What we find over time is that employees who work with machinery and understand the production process gravitate quickly to these alignment products and it helps them out a lot.\n\nJohn: So how often does machinery alignment need to be done? Is it a weekly basis, a monthly basis, or what?\n\nMory: It depends on the manufacturing application. We have some customers who literally align their equipment or check the alignment of their equipment for preventative maintenance every single shift, between shifts, even on an hourly basis in some cases. We have other customers who will wait and maybe check their lines at week’s end or sometimes they might have quarterly shutdown intervals so they wait until then.  We also have many customers that just keep their alignment systems in its case in the maintenance area or with a plant engineer in case a machine goes down.   If this should happen they bring out their laser alignment system to diagnose the problem and get their line back up and running quickly. So it covers a range of applications.\n\nJohn: OK. Good. So today I’ve been talking to Mory Creighton of Pinpoint Laser Systems. Mory, thanks very much.\n\nMory: Sure. It’s been interesting.\n\nJohn: Look for our next podcast when we’ll be talking about laser alignment contractors versus doing it yourself.\n\nBack to Top\n\nLooking for something custom? We've got you covered.<|endoftext|>NSP vows to support the environmental advocacies for its sustainability. As well as to follow and comply all the environmental laws and regulations on air, water and soil. We pledge to propagate and maintain the sustainability of the environment’s survival to the best of our knowledge and abilities for as long as needed to adapt to the environmental changes and help reduce the carbon footprint.\n\nWe are committed to take all possible steps to ensure the health, safety and welfare of all employees and other persons engaged in work for the organization and interested parties who come into contact with the business. It is the duty of each employee to comply with the company safety policy and to cooperate with the management to ensure that the workplace remains as safe as possible.\n\nCorporate Social Responsibility (CSR) Activities are our initiative to help our environment to sustain the environment’s condition, support the nearby communities by providing them their needs, educate people in preparing them in case of emergency, and building a better nation to the children for their future.<|endoftext|>Coon Creek Sod Farms maintains its soil for a premium product\n\nThe field is mowed with Roseman reel-type mower to obtain scissor cut.\n\nRick Pump Sr. has a long family history in the sod business and draws on the soil knowledge of three previous generations in growing sod in his operation, Coon Creek Sod Farms, located in the western Chicago suburbs. That knowledge is now making its way to Pump’s son, Rick Jr., who works with his father. Pump’s great-grandfather grew vegetables in northern Illinois after arriving in the United States from Germany in 1867. He passed along soil knowledge to Pump’s grandfather, who started growing sod as Mueller Sod Farm in 1919 and was one of the first Chicago sod growers with much of his sod placed in cemeteries. By 1926, he was growing sod on land that is now part of O’Hare International Airport. He hauled sod from his farm to the 1933 Chicago World’s Fair International Exposition.\n\nLocated in Hampshire, Ill., Coon Creek is 42 miles from downtown Chicago. Although his customer base is primarily within about a 50-mile radius, that base includes about 8 million people. “We go north to the Wisconsin line, south to Interstate", "num_tokens": 2048} {"category": "common_crawl-industrial", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-industrial/part-000-00000.npy", "text": " regulator being of the type comprising a valve body fixed to the lid of a pressure cooker and having a valve seat formed therein, and a needle carrying a rating mass and be...\n04/16/1996\n5263508Sewer line water trap charging valve with improved adjustment for house line pressure changes\nA device for charging sever line traps automatically upon decrease in main line water pressure comprising a branch line having a piston valve member telescopically received over the end of an adjustable tubular member, the piston having a first seat for s...\n11/23/1993\n5141024Valve with paired helical ramps\nAxial displacement between two components of a valve occurs as a result of relative rotation through the cooperation of helical ramps. Preferably another pair of helical ramps is provided concentric with the first but angularly offset 180° with the resul...\n08/25/1992\n5092229Entirely uniformly heated responsive cooker\nAn entirely uniformly heated responsive cooker comprising an inner pot and an outer pot, wherein the inner pot neither directly touches the heating source nor the wall portion of the outer pot by means of exhalation valve means capable of adjusting proper...\n03/03/1992\n5040563Adjustable air pressure valve\nAn adjustable air pressure valve for placement in a compressed air hose. Positioning a knob determines the pressure exerted by a spring on a valve member which allows air above a predetermined pressure to escape from the hose to the atmosphere. The knob i...\n08/20/1991\n4834286Spray gun, more especially for paints\nThe invention provides a spray gun for liquids and more especially liquid coatings such as paints and varnishes, comprising a liquid container, a housing, a pump for the supply of the liquid from the liquid container to a spray nozzle via a spring loaded ...\n05/30/1989\n4818444Fluid pressure control valve and a system which includes such a valve\nA fluid pressure control valve and a fluid control system (such as for beverage dispensing) with such a valve has a beverage passage 3, pressure fluctuations in which are detected by a diaphragm 17 to displace a sensing member 15 axially against spring lo...\n04/04/1989\n4762145Underwater pressure relief valve\nRelief valve facilitating the underwater balancing of scuba divers' inflatable articles, which is finely adjustable and extremely responsive, and is designed to ensure a high functionality by using simplified components to minimize the manufacturing costs...\n08/09/1988\n4644972Floating seal valve assembly\nA valve assembly for the control of pressurized fluids. The assembly comprises a casing housing a valve chamber with communicating inlet and outlet ports. A valve seat and valve-operating subassembly is associated with one of the ports. The valve-operatin...\n02/24/1987\n4595390Magnetically-adjustable cerebrospinal fluid shunt valve\nA surgically-implantable shunt valve in which the popping pressure is adjusted in finite increments by application of an external magnetic field....\n06/17/1986\n4428398Pressure control valve\nA pressure control valve including a valve, a spring for pressing the valve, and a power input means for compressing the spring further comprises a backup force-generating mechanism for producing and directing a backup force counter to the direction in wh...\n01/31/1984\n4379470Closing cap, particularly for a motor vehicle radiator\nIn the housing of a closing cap 2, a valve seat plate 3 is held in place by means of a resilient ring 8 forming at the same time a seal relative to the tank connection to which the closing cap is screwed by its internal thread 1. The valve seat plate 3 su...\n04/12/1983\n4291660Recycling exhaust fumes valve\nA system incorporated with an internal combustion engine for recycling engine exhaust fumes back into the engine for a more thorough burning before final discharge; the system including a one way valve unit installed along a line between the muffler and t...\n09/29/1981\n4201242Pressure relief valve\nThere is disclosed a pressure relief valve having a part which is movable to a first position for returning the closure member thereof to closed position, and thus resetting the valve, automatically in response to a predetermined low pressure level of flu...\n05/06/1980\n3964585Hydraulic double clutch of the wet type with pressure control valves\nHydraulic double clutch comprising a tractor-driving clutch unit and a power takeoff clutch unit accommodated in a clutch housing serving also as an oil tank. Hydraulic pumps disposed in the housing have gears respectively meshing with a gear on the drive...\n06/22/1976\nSign InRegister\nforgot password?<|endoftext|>Wire and Cable Applications in the Oil and Gas Industry\n\nOil and gas raw materials are deep in the earth’s surface. Up to 6000 feet of pipelines cross many landscapes. Whether land or sea, these projects require different types of wires and cables. These cables play a significant role in controlling the machines used in the project and communication between engineers within the premises. Some of the industrial applications of wires and cables in oil and gas industries include:\n\nProcess Control\n\nPVC connection cables are mostly used in process control. Some of the processes include conveyor belt movements, transporting equipment, and also the construction of plants. These cables are used because they can easily be moved to a new location or in alignments and adjustments. Moreover, they can quickly be inspected in cases where they are not overloaded. In cases where the oil field cable assemblies face electromagnetic interferences, then cooper screens can be used. The copper screen shields these PVC pipes from electromagnetic interferences.\n\nPipeline Management\n\nPipelines for transportation of oil and gas can either be through land or sea. Cables and wires used include power cables, control cables, and signal monitoring cables. The cables provide crucial information related to the load on the pipelines. Signal monitoring cables, sense for leaks, and corrosions. The data is sent back to the control center, where it is acted upon with precision.  Rather than manually checking for damages and leaks frequently, especially in submarine environments, the data can easily be collected using these cables from miles away. Volumes and nature of the load can also be monitored.\n\nRefinery Applications\n\nRefinery oil industries have a temperature of up to 3000C. These harsh environments call for maximum resistance and functional thermocouple equipment. Real-time readings have to be collected in such conditions to optimize productions. These devices have to be accurate as well as respond swiftly to different environmental conditions. In the market, there are high-temperature sensor cables and wire that can be used instead of thermometers. Not only are they accurate, but they provide digital information that can be fed directly into a computer for processing.\n\nPump Equipment\n\nGas and oil industries pump their products through pumps from an extraction point to the refining industry. For this to be successful, the right amount of electric power must be supplied to the pump. These pumps are made of conductors of different sizes. To efficiently provide the right amount of electrical power, you need a cable or a wire, depending on the conductor’s size. These cables will not only give the right amount of current required but also last as compared to using other non-electrical means.\n\nFor oil field cable assemblies to be successful in their mining processes, cables and wires play a significant role. Wires and cables vary from size and design. A few things, such as terrain and harshness of the environment, need to be considered when selecting cables and wires. Despite the full range of oil and gas applications, most of these cables and wires share the same cable requirement.\n\nRelated posts\n\nHome Based Business – Now and then\n\nMia Aiden\n\nTop tips to use the online consultation service properly\n\nMia Aiden\n\nSelecting The Best Ceiling Tiles For Your Workplace\n\nMia Aiden<|endoftext|>Kosciusko County looks to discourage irrigators spraying on roads\n\nKosciusko County Commissioners on Tuesday said they will look into how other counties use ordinances to discourage farmers from letting their irrigation machines spray blasts of water onto roadways.\n\nIrrigation machines have become more popular as farmers try to ensure their crops get adequate water, but if not programmed correctly, they can shoot strong blasts of water that can be dangerous for motorists.\n\nThe heavy spray can momentarily blind motorists whose windshields are instantly covered in water. It also carries a danger for motorcyclists who can lose control in such conditions.\n\nThe problem also can be a big inconvenience for motorists driving convertibles who are prone to getting soaked.\n\nCommissioner Ron Truex, whose company farms about 9,000 acres of crops, said the problem can be rectified by adjusting the machinery to automatically cut off the spray guns when they pass close to a road.\n\n“If it’s not shutting off, it can be fixed,” Truex said.\n\nHe said he hears complaints about errant irrigation systems “all the time,” and said he doesn’t understand why other farming operations let it happen and take on a potentially large insurance risk.\n\n“I don’t want to assume the liability of eight motorcycles sliding all over,” Truex said.\n\nThe commissioners asked county attorney Chad Miner to research options available that could help reduce the problem. He is expected to look at both counties and states that legislate against the practice.\n\nTruex said he’s", "num_tokens": 2048} {"category": "common_crawl-industrial", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-industrial/part-000-00000.npy", "text": " durations.  It installs a release mechanism that “pulls” starts into the system and keeps work-in-process at the levels required to produce faster cycle times.\n\nIt implements simple, visual tools to manage production.\n\nBuilders can put a number of these practices into place without changing the scheduling algorithms from Critical Path to Critical Chain.  They can implement standalone CCPM software applications.  However – Critical Chain will not be a complete, integrated solution for the homebuilding industry until its management technology providers wake up and address it.\n\nIt all starts with obtaining the knowledge necessary to insist on that change.\n\nCome.  Participate.  Learn.\n\nCritical Chain Project Management is one of five Velocity Accelerators® (along with Business Process Improvement, Epic Partnering™, Building Information Modeling, and Open-Book Management and Team-Based Performance Compensation) that will be explored at the next Pipeline workshop™, September 26-27, 2018, at the Ponte Vedra Inn and Club, in Ponte Vedra Beach, Florida.\n\nDelivered by SAI Consulting and Continuum Advisory Group.\n\nSponsored by BUILDER, BuilderMT, and Specitup.\n\nCost is $895.00 per person;  for team pricing, inquire here (flgroves@saiconsulting.com)\n\nDetails:  www.buildervelocity.com<|endoftext|>Green Development: A Solution to Post-Covid Recovery for Businesses\n\n10:57:45 AM | 5/11/2022\n\nAt the 2022 Green Economy Forum, with the theme “Post-pandemic Adaptation and Development”, all speakers agreed that ‘Green Development’ is a solution that coincides with future development trends, helping businesses find their way out of the Covid-19 crisis.\n\nAccording to statistics, the number of enterprises temporarily suspending operations in 2021 totaled 54,960, an increase of 18% compared to 2020. The majority of those businesses had been operating for less than five years. This partly reflects the impact of the Covid-19 pandemic on the overall economic situation.\n\n\"Clearly, the Covid-19 pandemic has two sides, causing socio-economic losses as well as damage to human lives, but it really opens a new opportunity to restructure the economy,\" said Pham Binh An, Deputy Head of Ho Chi Minh City’s Institute of Development Studies.\n\nAccordingly, in the post-Covid-19 period, investment in green development will help businesses demonstrate their commitment, efforts and responsibility to the government as well as society, thereby ensuring more long-term benefits.\n\nPresent in Vietnam since 1993 as an alloy-coated steel producer – an industry typical of large energy consumption – NS Bluescope Vietnam has always been a pioneer in the practice of \"green\" production activities with a carbon ​​neutrality vision by 2050.\n\nTo achieve this ambition, NS BlueScope Vietnam acts with initiatives focusing on replacing fossil fuels with renewable energy and alternative sources. “First, we focus on our internal resources, simply by improving technology and operational efficiency,” said a representative of NS BlueScope Vietnam about its “green” production journey.\n\nThe representative of NS BlueScope Vietnam shares about the company's “green” production journey with a carbon neutrality vision by 2050\n\nDue to the specificity of the industry, steel manufacturing companies always require molten metal pots to operate continuously. This is a significant source of energy consumption and carbon emissions. This Australian alloy-coated steel manufacturer has chosen to arrange seamless and continuous production to limit machine downtime during maintenance, thereby reducing carbon emissions.\n\n“Next, we invested in inverters, improved cooling systems and automation systems, down to the smallest objects, such as the changing LED lights to be more environmentally friendly,” said the representative.\n\nAs a result, within just five years, this business has reduced 2,873 tonnes of CO2. After successfully reducing CO2 emissions across the entire plant, NS BlueScope Vietnam continues to invest in rooftop renewable energy to move towards the goal of reducing carbon emissions by 30% per ton of finished steel products.\n\nThese efforts have been recognized by prestigious organizations. Recently, the Singapore Green Building Council has granted Green Label certification for premium steel applied in the industrial and civil segments and exclusively for sandwich panels of NS BlueScope Vietnam, such as COLORBOND® steel, ZINCALUME® steel, SUMO™ Antifading, COLORBOND® For Panel, SUMO™ For Panel and BlueScope Zacs®. This is also the first and only enterprise in the alloy-coated steel industry to receive this certification.\n\nNS BlueScope Vietnam is the first and only enterprise in the alloy-coated steel industry to receive Green Label certification from Singapore Green Building Council\n\nMany green projects choose NS BlueScope Vietnam's alloy-coated steel for their factories. These include projects such as the Jotun Vietnam factory (Nha Be, HCM), SLP factory (Hai Phong), Canifa factory (Hung Yen), Coca-Cola (HCM), DBW garment factory (Long An), Tainan textile factory (Long An), Danapha factory (Danang)…\n\nCANIFA Van Giang Complex has chosen to use alloy-coated steel and solutions from NS BlueScope Vietnam\n\nBesides, what makes NS BlueScope Vietnam's green development strategy special is that the company not only orients towards sustainable development for its business but also for the entire supply chain.\n\nRecently, the company announced the Responsible Sourcing program for the 2022 – 2030 period and the strategy to combat climate change in the supply chain to 2050. “Our responsible sourcing is already in line with strict ethical standards and social responsibility. With the new program, we have added a 30% reduction in carbon emissions to our chain of 35 steelmaking material suppliers,” said a representative of NS BlueScope Vietnam.\n\nPreviously, a member of NS BlueScope Vietnam, NS BlueScope Lysaght signed a strategic cooperation agreement in the field of energy balance with GSB – a supplier of steel structure solutions with over 10 years of experience, and GreenViet – one of the first green building consultants in Vietnam. With this cooperation, the three companies are expected to provide the industry with a full package of energy-balanced architectural solutions from design and consultation to construction.\n\nWith many efforts in place to realize the carbon-neutral vision by 2050, NS BlueScope Vietnam is a typical example of green development, moving towards a circular economy in Vietnam.\n\nD.A (Vietnam Business Forum)<|endoftext|>Neue Produkte Auf Der Messe\n\nIncreasing EV battery innovation with foams\n\nThe automotive industry needs to create a more sustainable future, and embracing battery technology as an energy solution is part of the transition. For this reason, Carbody’s team has reinforced its focus on new applications for e-solutions.\n\nProtecting the battery components is a major difficulty for manufacturers. Foam materials are key to achieving a longer battery life. Foam avoids the battery pack deformation caused by a slight expansion of the battery cells during recharging. Furthermore, foam reduces the severity of vibration and shock on the battery components, and limits the thermal conductivity to generate effective thermal management.\n\nBooth: A4045\n\nZurück zu den Nachrichten<|endoftext|>Quality management\n\nReliability of production processes is created through comprehensive quality, safety and hygiene management, as well as by taking into account supervision and constant control of the production chain. This covers the whole ‘Farm to Table’ path and takes into account the principles of breeding, feeding, transport, slaughter, cutting and processing in all EU countries and in the whole beef and pork sector.\n\nqauality management\n\nQuality management in terms of process consists in defining quality parameters at every stage of production, developing and implementing procedures and instructions related to individual stages and products, as well as carrying out constant supervision. Systematic quality management of production is a permanent feature of meat production and processing in the European Union.\n\nIn practice, this means the implementation of good practices (GAP -Good Agricultural Practice, GMP - Good Manufacturing Practice, GHP - Good Hygienic Practice) and the obligatory HACCP (Hazard Analysis and Critical Control Point System) system in the EU, as well as market and industry quality systems precisely defining the quality specifications of products. The implementation of such practices and systems translates into the quality of breeding and meat production, which results from, among others:\n\n • ensuring appropriate breeding conditions, taking into account animal welfare principles which have been defined and developed in the EU countries at the level of very strict Community regulations\n • sanitary and hygienic control at every stage\n • supervision over the quality and microbiological purity of meat and the use of additives\n • identification and minimization of possible food safety hazards\n\ncows , beaf , meat<|endoftext|>IQJET Ink, White, MEK, General Purpose, High Contrast, PI\n\nRegular price$170.00\n\n • In stock, ready to ship\n • Inventory on the way\n\nIntroducing IQJET White MEK Ink, meticulously crafted for exceptional general-purpose printing. This ink is engineered to provide high-contrast, vivid white prints and is perfectly compatible with PI (Porous Inkjet) printing systems.\n\nKey Features:\n\n 1. High-Contrast Brilliance: Achieve outstanding white prints with exceptional clarity and contrast, making your labels, packaging, and documents truly stand out.\n\n 2. General-Purpose Versatility: Whether you're in the manufacturing, packaging, or labeling industry, this ink delivers consistent, high-quality results across various applications.\n\n 3. PI Compatibility: Seamlessly integrate this ink into your PI printing system, ensuring a smooth setup and dependable performance.\n\n 4. Solvent Type : 77001-00030\n\nThis site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.<|endoftext|>Time to", "num_tokens": 2048} {"category": "common_crawl-industrial", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-industrial/part-000-00000.npy", "text": "3. A closure member 15 in the form of a\nconventional transversely movable gate is located between\nthe ends of passage 11 and is movable in the passage into\nand out of position against two valve seats 17 and 18.\nGate 15 extends transversely through an aperture in wall\n13 to the outside of the valve body where it is enclosed\nwithin a hollow housing 17 projecting from body 10 and\nclosed by a bonnet 19.\nThe closure member or gate 15, includes a stem 21 ex\ntending up through a sleeve 23 which is journalled for rota\ntion, Internal threads in the sleeve cooperate with ex\nternal threads 25 on the stem to lower or raise the gate\nwhen a hand wheel 27 rotates the sleeve.\nProjecting from the opposite side of valve body 10‘ is\na second housing 29 enclosing the lower gate guide 31\nand 33. In conventional valves of this type the lower and\nupper housings are in communication with one another\nthrough an annulus cast integrally into the valve body and\nsurrounding seats 17 and 18.\nTo relieve pressure from the inside of housings 17 and\n29 a pair of radial bores 35 and 37 are formed through\nopposite end against a shoulder 73.\nObviously, many other modi?cations and variations of\nthe invention as hereinbefore set forth may be made with\nout departing from the spirit and scope and only such\nlimitations should be imposed as are indicated in the ap\npended claim.\nI claim:\nIn a valve comprising a ?uid conduit having a wall with\naperture means therein; valve seat means in said conduit;\nclosure means coacting with said valve seat means to open\nand close said conduit, said closure means extending\nthrough said aperture means to the outside of said con\nduit; a hollow housing on the outside of said conduit en\nclosing said closure means and said aperture means; a\nbonnet on the top of said housing; the construction and\narrangement being such that ?uid may accumulate in said\nhousing while said valve is open and ?uid ?ows through\nsaid passage, and that ?uid normally is trapped in said\nhousing when said valve is closed thereafter; the improve\nment which comprises; two bores through the wall of\nsaid conduit on opposite sides of said valve seat means\nand located within the circumference of said housing; two\nindividual tubes secured in said bores and projecting into\nthe upper portion of said housing beneath said bonnet,\nReferences Cited in the ?le of this patent\nsaid tubes establishing communication between the inside\nof said conduit and the inside of said housing; and two\nnormally closed independent check valves on the upper\nends of and controlling said tubes, said check valves act\ning to open when the pressure inside said housing exceeds\nthe pressure in said conduit adjacent the respective bores\nto release ?uid to said conduit.\nDawson ______________ __ Apr. 4,\nUphotf ______________ __ Mar. 16,\nLaurent _____________ __ Mar. 2,\nDoster ______________ __ Dec. 13,\nShand ________________ __ June 3,\nБез категории\nРазмер файла\n262 Кб\n1/--страниц\nПожаловаться на содержимое документа<|endoftext|>Developing Activity Construction Labor Productivity Model: A Case Study on Meles Zenawi Leadership Academy Construction Project\n\nNo Thumbnail Available\n\nJournal Title\n\nJournal ISSN\n\nVolume Title\n\nAddis Ababa University\n\nProductivity is an influential variable showing the economics of production activities. Higher productivity levels imply increased profitability and the ability to pay higher wages to workers. In the Ethiopian building industry, construction labor productivity loss is one of the severe problems. Since labor is more flexible and volatile than other project-cost components, it’s necessary to understand the effects of the labor situation, which exist in the construction site and identify problem area that causes delay. To deal with this challenge, the study presents the methodology for the development of activity construction labor productivity models. To attain this objective, the subsequent procedures were followed: identifying seven process parameters that influence construction labor productivity, determine the observation method, determination of the minimum number of observations for study. The research conducted extensive field data collection from Meles Zenawi leadership academy construction projects in Addis Ababa covering a period of 4-months; and documented information using work sampling studies, foreman delay surveys, craftsman questionnaires, and productivity measurements. The validity of the data was tested to establish a 95 % confidence level. This helps to know errors that can be encounter during observation and hence, increase the reliability of data. A multivariable linear regression model for formwork, reinforcement, and concreting activities was developed to predict construction labor productivity. However, the models for concreting and reinforcement activity were limited to predict construction labor productivity. Travel, waiting and material handling for column formwork activities predict construction labor with a high degree of accuracy of 95.81% and R-square value of 98.5%. This indicates that the relationship between independent variables (travel, waiting, and material handling activity) and construction labor productivity of the developed models is good and the predicted construction labor productivity values fit with the real-life data. Overall significance tests and scatters plots were conducted to see the relationship between direct work and construction labor productivity. The result proves that direct work activity was not significantly correlated with construction labor productivity. Unavailability of material, poor site layout, crew failure to follow instructions, incomplete drawings, the low skill level of crew, waiting for other crews, and tools were the main causes of delay in the study area.\n\nProductivity, Work Sampling, Regression<|endoftext|>Coated Aluminum\n\nPosition: Home > Products > Coated Aluminum\n\nAluminum Sublimation Sheet\n\nSignage and Display, Home Decor, Awards and Trophies, Nameplates and Tags, etc. Aluminum Sublimation Sheet has bright colors and insulation effect, making it suitable for outdoor advertising display decoration and other decorative applications. It has good durability and resistance, and strong corrosion resistance, and can maintain its characteristics in harsh environments.\n\nDurability and Longevity: Aluminum sublimation sheets are known for their durability and longevity. The aluminum base provides a strong and rigid substrate that can withstand various environmental conditions, making it suitable for both indoor and outdoor applications. The sublimation coating further enhances the durability by protecting the printed image from fading, scratching, and UV damage.\n\nItem Alloy Temper Thickness Width MOQ\n\nAluminum Sublimation Sheet\n\nIs Alloy\n\nO-H112 \n\n0.045/0.55mm or customize \n\n600mm - 1200mm\n\n3 Tons\n\nOur Factory\n\nIf you have any suggestions or opinions about our products, please leave a message, and we will immediately answer your questions. Thanks for your support.<|endoftext|>Optimizing Washer Selection for Assembly Applications\n\nDec. 20, 2023\nWashers play a crucial role in assembly and fastening procedures, serving beyond mere bolt, nut, and screw reinforcement. It's essential to grasp their diverse functions to effectively choose the ideal type tailored to specific applications.\n\nThe Optimal Washer Guide serves as an indispensable resource, offering comprehensive insights into the selection and specification of washers tailored for assembly applications. In intricate machinery and devices with moving parts, washers stand as pivotal components, ensuring seamless operations. However, the repercussions of misjudging the right washer type can be dire, leading to costly downtimes and production losses. Amidst the vast array of sizes, styles and materials, this guide delves into key considerations essential for pinpointing the ideal washer variant, thereby optimizing efficiency and mitigating risks in assembly applications.\n\nThis content is sponsored by:<|endoftext|>Custom Exhaust Design & Manufacturing\n\nWrite a review\ndme-service-custom-exhaust\n\n3D Scanning\n\nCAD Design\n\nHigh Quality Materials\n\nDepending on your requirements and budget, your custom exhaust systems can be made from a range of metals, including:\n\n • SUS409 Stainless Steel\n • SUS304 Stainless Steel\n\nThere are also various diameters, and pipe thickness to choose from.\n\nHigh Quality Manufacturing\n\nAll custom exhaust systems are manufactured using high standards, specific to your exhaust - not using universal segments.\n\nWe use mandrel-bending, high-pressure hydraulics, and seam welds. This ensures your exhaust systems have the smoothest airflow, and also long-lasting.\n\nPerformance Simulation\n\nFor those looking for a real performance improvement, we compute the flow dynamics using the actual engine's exhaust output volume and mass across the entire RPM range.\n\nThis ensures that our custom exhaust not only outflows the original exaust in volume, but there is also minimal turbulence for maximum flow.\n\nAll Accessories\n\nAll the exhaust systems comes with all necessary accesories - clamps, hangers, valves, etc. for immediate installation on the vehicle without needing any extra components.\n\nAll the components are chosen to match the specifications of the exhaust systems.\n\nProduct Pricing & Ordering\n\nFor enquiries on any of our products or services, get in touch with us.<|endoftext|>By on March 28th, 2024 in air cooler manufacturer in indore\n\nUnveiling the Mechanics: Understanding Air Cooler Manufacturing Processes\n\nAir coolers have become an indispensable part of our lives, providing much-needed relief from the sweltering heat of summer. However, the intricate process behind the manufacturing of these cooling devices often remains shrouded in mystery. In this blog, we’ll peel back the curtain and delve into the fascinating world of air cooler manufacturer in Indore , shedding light on the intricate mechanics involved in bringing these essential appliances to life.\n\nDesign Phase:\n\nThe journey of an air cooler begins with meticulous planning and design. Engineers", "num_tokens": 2048} {"category": "common_crawl-industrial", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-industrial/part-000-00000.npy", "text": " cost of these permits can vary depending on the scope of the project. Additionally, there may be costs for assessments if your business requires updated wiring or other electrical system modifications to support the new panel.\n\n • Labor: Tailored to the specific demands of your installation\n • Materials: High-quality components fit for your needs\n • Permits: Navigating Safety Harbor’s regulations efficiently\n • Additional Assessments: Proactive steps for a safe, compliant upgrade\n\nChoosing Ashton Electric Co ensures that each of these factors is handled with expertise and attention to detail, leading to a seamless installation process and long-term benefits for your property’s electrical system.\n\nUnlock Cost Savings with High-Efficiency Solar Solutions\n\nAs the world leans more towards sustainable living, understanding the benefits of energy-efficient solar panels and systems becomes crucial. Ashton Electric Co in Safety Harbor stands at the forefront of this green revolution, providing state-of-the-art solar solutions designed to meet the needs of modern homes and businesses. By investing in the latest high-efficiency solar panels, customers can enjoy significant reductions in energy consumption, leading to considerably lower utility bills.\n\nThese advanced systems are not only beneficial for your wallet but also contribute positively to the environment by decreasing carbon footprints. With Ashton Electric Co, residents of Safety Harbor can access high-quality solar technology that seamlessly integrates with existing electrical setups, ensuring a smooth transition to greener energy sources. Further enhancing the value proposition, many of these systems qualify for local or federal tax incentives, pushing the cost savings even higher.\n\n • Durable and Long-Lasting: Modern solar panels offered by Ashton Electric Co are designed to withstand harsh weather conditions, guaranteeing reliability for years.\n • Expert Installation and Service: Trained professionals ensure optimal setup for maximum efficiency.\n • Continuous Support and Maintenance: Ongoing assistance ensures your systems operate at peak performance, maximizing cost-effectiveness.\n\nEmbrace the future of energy with Ashton Electric Co and enjoy a blend of environmental sustainability and economic savings right here in Safety Harbor.\n\nIs Your Electrical System Keeping Up? Know When It’s Time for an Upgrade\n\nAs our properties continue to evolve with increasing technological demands, the electrical systems that power them must also adapt. For many property owners in Safety Harbor, understanding when to upgrade their electrical setup is crucial for safety, efficiency, and functionality. Ashton Electric Co, with years of expertise in managing complex electrical systems, highlights several key indicators that signal the need for an upgrade.\n\nFirstly, frequent circuit breaker trips are a clear sign that your system is struggling to handle the current load. This is often the case in older businesses where the original electrical infrastructure wasn’t designed for the myriad of modern electronic devices and appliances. Secondly, if you notice flickering or dimming lights, it could suggest inadequate power supply or potential faults in the wiring, both of which necessitate professional assessment.\n\nMoreover, any plans for home renovations or adding significant new appliances should include a consultation with a licensed electrician. Upgrading your system ensures it can safely support these enhancements. For residents and business owners in Safety Harbor, Ashton Electric Co offers comprehensive evaluations and tailored solutions to ensure that your electrical system is not only up to code but also optimized for your current and future needs.\n\nIgnoring these signs can lead to more severe complications, including potential fire hazards. By choosing to upgrade, you ensure that your property remains safe, functional, and efficient, keeping pace with your lifestyle or business requirements.\n\nEnhancing Safety Through Advanced Electrical Panel Innovations\n\nAt Ashton Electric Co, we understand that the safety of your Safety Harbor home is paramount. Modern electrical panels are designed with cutting-edge features aimed at mitigating risks that no property owner should overlook. Innovations in these systems provide substantial protection against electrical fires and shocks, two major hazards that can pose significant threats.\n\nAmong these innovations, the incorporation of arc fault circuit interrupters (AFCIs) stands out. AFCIs are crucial in identifying and stopping electrical arcs before they can ignite a fire. Additionally, ground fault circuit interrupters (GFCIs) in electrical panels protect against electrical shocks by instantly cutting off power when a short is detected. Such features are vital in environments where electricity may come into contact with water.\n\nThermal overload protection is another modern feature that enhances safety. This technology prevents overheating in circuit breakers by breaking the circuit in the event of excess current flow, which reduces the risk of fire.\n\nWith these robust safety features, residents and businesses in Safety Harbor can trust Ashton Electric Co to provide solutions that not only meet the latest standards but exceed them. Ensuring electrical safety is more than a requirement; it’s a commitment to protect both property and lives.\n\nNavigate the Safety Harbor Permitting Process with Ease: A Guide for Ashton Electric Co Clients\n\nUnderstanding the permitting process in Safety Harbor can seem daunting, but with the right information, it can be a smooth and straightforward experience, especially for clients of Ashton Electric Co. Whether you’re planning a residential or commercial installation, knowing the necessary steps can significantly expedite your project. The City of Safety Harbor requires several critical documents to ensure that all electrical installations meet local safety and building codes. This includes submitting detailed site plans, electrical system specifications, and occasionally, a project proposal reviewed by a certified engineer.\n\nPrior to any electrical installation, an inspection must be scheduled to ensure that all components are up to code and safely installed. These inspections are crucial as they prevent future complications, ensuring that all electrical work is done correctly and efficiently. Ashton Electric Co takes pride in offering comprehensive support throughout this process, facilitating the necessary documentation and inspection scheduling. Our experienced team ensures that your electrical installations comply with Safety Harbor’s stringent regulations, providing peace of mind and a guarantee of quality.\n\nFor property and business owners looking to navigate the complexities of electrical permits, partnering with Ashton Electric Co means tapping into a wealth of expertise. Let us help you manage the permitting process from start to finish, allowing you to enjoy the benefits of your new installation without the hassle.\n\nStreamlining Success: Minimizing Disruption During Essential Installations\n\nFor businesses in Safety Harbor and surrounding areas, effective management of operational disruptions during essential system installations is crucial. Ashton Electric Co. stands out as a leader in this field, ensuring that transformations in electrical systems enhance productivity without halting business momentum. Adapting to installation processes can indeed pose challenges, yet there are proven strategies to mitigate these impacts and ensure continuity.\n\nStrategically scheduling installations during off-peak hours or planned downtimes can significantly reduce the interference with daily operations. Ashton Electric Co. prioritizes client convenience, often working overnight or during weekends, to prevent any business interruptions. Additionally, clear communication between the installation team and the business management ensures that all parties are aligned, which helps in forecasting potential operational hiccups and preparing solutions in advance.\n\nMoreover, the use of state-of-the-art technology and rapid installation techniques minimizes the time required on-site, thereby decreasing the duration of any possible business disruption. Ashton Electric Co.’s commitment to efficiency and quality not only facilitates smoother installations but also strengthens the operational capabilities of Safety Harbor businesses, ensuring they thrive amidst upgrades.\n\nProtect Your Investment: Maintenance and Warranty Essentials from Ashton Electric Co\n\nEnsuring the longevity and optimal performance of your electrical installations is not just about professional installation; it is about ongoing maintenance and robust warranty support. At Ashton Electric Co, based in the vibrant heart of Safety Harbor, we understand that your electrical systems are vital to your everyday comfort and efficiency. That’s why we offer comprehensive maintenance services designed to keep your systems running smoothly year after year.\n\nOur team of certified electricians not only provides exceptional installation services but also emphasizes the importance of regular checks and upkeep. By adhering to a preventative maintenance schedule, you can avoid the common pitfalls that often lead to costly repairs or replacements. Whether it’s residential or commercial properties, our tailored maintenance programs are designed to extend the lifespan of your installations and ensure they perform at their peak.\n\nMoreover, we stand behind our work with strong warranty terms that reflect our confidence in our services and dedication to customer satisfaction. When you choose Ashton Electric Co for your installations, you’re covered with a transparent and supportive warranty policy. This means whether in the bustling streets of Safety Harbor or the surrounding areas, you will enjoy peace of mind knowing that your investment is protected against unforeseen issues.\n\nFuture-Proof Your Business with Smart Electrical Panel Choices\n\nWhen planning for the growth of your business, the scalability of your electrical infrastructure is crucial. Selecting the right electrical panels today can save significant time and money as your needs expand in the future. Ashton Electric Co., serving the Safety Harbor area, suggests considering panels that offer flexibility in terms of capacity and adaptability. This foresight ensures that when your business evolves, your electrical system can effortlessly adapt without requiring costly overhauls.\n\nOpting for modular panels is a smart choice, as they can be easily upgraded or reconfigured according to your changing needs. Ashton Electric Co. recommends looking for panels that support incremental increases in electrical loads, which is especially important in rapidly growing industries or areas like Safety Harbor, where business expansion rates are high. By preparing for future demands, you will avoid the disruption of construction and the downtime associated with significant electrical upgrades.\n\n • Choose panels with expandable slots for additional circuits.\n • Consider panels with integrated energy monitoring systems for effective management.\n • Ensure the electrical panel can handle potential increases in electrical demand.\n\nInvesting in a scalable electrical panel system is not just about meeting current requirements; it is about setting your Safety Harbor-based business up for uninterrupted growth and success. Ashton Electric Co. is here to guide you through every step of the process, ensuring your electrical systems grow as seamlessly as your business.\n\nSecure Your Business with Expert Commercial Electrical Panel Installation from Ashton Electric Co\n\nEnsure your Safety Harbor business operates efficiently and safely with our professional commercial electrical panel installation services at Ashton Electric Co. Our experienced electricians are dedicated to providing top-tier service, ensuring that your electrical systems are up-to-date and optimally functioning to meet your business’s unique needs. Do not let outdated electrical panels put your operations at risk. Contact us today at 813-547-4656 to schedule", "num_tokens": 2048} {"category": "common_crawl-literature", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-literature/part-000-00000.npy", "text": " He took aboard The Old Lion a good store of nuts, bananas, and other fruit; and as that evening he looked back at the coast, shining in the last of the sun—and The Old Lion was now some miles out to sea—he turned to his monkey and said, \"How do you like the sound of the name Jasper, sonny?\"\n\nThe monkey softly turned to him as if to answer, but this time said nothing.\n\nSo Jasper he was called, although this was really due to a mistake on the part of Mr. Bumps. What had come into his mind, as he stood at the taffrail looking back at the coast of Africa, were the first two lines of a hymn that had been a favorite of his mother's—\n\nFrom Greenland's icy mountains\nTo India's coral strand.\n\nBut in saying the words over to himself he had got the last but one word wrong. He had said:\n\nFrom Greenland's icy mountains\nTo India's jasper strand.\n\nStill, Jasper, he thought, was a better name than Coral, and Jasper it remained.\n\nThere never was a monkey so quick to learn, so grave in the learning, and so quiet and pleasant in manner as Jasper. Mr. Bumps could only guess how old he was, and he guessed, \"p'raps five.\" And since the famous little son of John Evelyn even before this age could all but talk in Greek, Latin, and Hebrew, it may not be so marvelous as it sounds that Jasper soon began to pick up a few words of English. Long before this, however, he had learned to sit at table and say his grace (in his own tongue); to use a knife and fork, and a mug for his drink; to bow when spoken to; to swing his own hammock, and little things like that.\n\nHe would creep up, too, to watch the man at the wheel or the cook at his cooking in the galley or caboose. He would gaze for minutes at a time at the compass and lamp in the binnacle, and would salute the captain whenever he saw him on the bridge. He knew the Christian names of every man jack of the crew, and where each of them slept in the fo'c'sle; he could manage a little rope splicing, and knew the difference between a granny and a reef knot, a loop and a fisherman's bend! In spite of his red cossack gown, he could scamper up the rigging to the truck or very summit of the mainmast twice as quick as any cabin boy, though no cabin boy of course has any tail to help.\n\nBesides all this, Mr. Bumps taught Jasper much else. Not that he sat him down and made him learn. It amused him and Jasper enjoyed it. It was a long voyage, too. The Old Lion edged into the doldrums and there was plenty of time.\n\nAs the days and weeks drew by, Jasper became as much at home on The Old Lion with his friend Mr. Bumps as if he had been born to the sea. Merely because he was jimp and hairy, had a small, flat-nosed face, and showed his teeth when he talked, the sailors at first would tease and laugh at him, deeming him only a pet or a plaything. As soon as he began to talk King's English, however, they teased him no more. He said things they remembered.\n\nWhat Mr. Bumps meant to do with him when he was safe home in his little house in Portsmouth he hardly knew. He was sure his wife, whose name was Emma, would be pleased to see his new friend, and there was no doubt at all about Topsy, Emmanuel, and Kate. But how could he ever part with Jasper now? Yet how expect him to lead a sea life? There was, however, no need to decide anything for the present; and meanwhile he took almost as fond a care of him—sought him out dainties, physicked him when sick—as Mrs. Bumps was taking of their little Kate.\n\nAt last, and Mr. Bumps had long since made up his mind that he could never of his own wish be separated from Jasper, The Old Lion drew into the English Channel. She was nearly home. And one misty afternoon in November she sailed slowly up the Thames and dropped anchor in the Pool of London. It was bitter cold, but still, and a haze of the color of copper hung over the mighty city. And there in the midst, like an enormous leaden beehive against the sullen sky, rose the dome of St. Paul's.\n\nMr. Bumps stepped ashore early next morning, with the monkey hooded upon his arm, some presents for his wife and children in his bag, and set out briskly for his railway station. He had not been in old England for many months, and the first thing in his mind was to get down to Portsmouth as soon as he possibly could. But the haze that had been high over the city the day before had now descended into its streets, and Mr. Bumps had to grope on in the direction of the Monument and Pudding Lane through a fog which grew steadily denser.\n\nHe knew, at last, that he had lost his bearings. And when presently he came to a little public house, The Three Swans, its windows dimly glowing in the fog, he decided to go in and ask his way. But, somehow or other, he didn't like the notion that Jasper should go in, too. He glanced into the little face under its hood, and saw how cold and doleful it looked. But he was afraid the thick tobacco smoke and the smell of the beer and spirits in The Three Swans might make him ill.\n\nSo, \"Sit you here a moment, Jasper,\" he said, as he put him down beside his bag beside the lamppost, \"and don't 'ee stir till I come back.\"\n\nBut, alas, Mr. Bumps stayed many minutes longer than he had intended to inside The Three Swans, and when he came back, though his bag was still there where he had left it, Jasper was gone.\n\nIndeed, Jasper had been patiently waiting in the fog in the dim light of the lamppost for no more than five of them, when a stranger, with a black hat on his head, a black beard, and a coat reaching almost to his heels, had come by. If the monkey had not stirred at that moment, all might have been well. But, at sound of these footsteps in the strange, cold London street, the solitary creature had lifted his face and put out a hand, for he had made many friends on board ship. And the stranger stooped and looked at him.\n\nNow, by a chance, whether evil or not it is hard to say, this man with the dark beard was a dealer in all kinds of animals. He had a shop in a narrow alley not far from the river. That shop went back, and every now and then up two or three steps, at least forty paces. And from end to end of it there were cages of all kinds of birds and small beasts, besides tanks of fish and of rare snakes and lizards, and even gauze-covered cages of butterflies on rows of shelves. His larger animals he kept, though out of the rain, in a stone-flagged yard.\n\nHe stooped down, his rusty, black coat brushing the paving stones, and in the foggy gloom looked long into Jasper's face. Then he took the little, narrow hand in his, and gently shook it.\n\n\"How d'ye do?\" he said, in a wheedling voice, and speaking through his nose. \"Very pleased to meet you, I'm sure.\"\n\nAnd Jasper, with his usual gentle manners, and thinking no harm of him, looked up into his face and chattered a few sounds, which were uncommonly like sea-English.\n\nThe stranger shot one swift, thieflike glance over his shoulder, then, opening a button of his greatcoat, gingerly lifted Jasper from where he sat, slipped him in under it, and strode rapidly away.\n\nBefore evening, Jasper found himself, with a few monkey nuts and a can of water, squatting alone in a cage, surrounded by other cages in which, besides barking dogs and scrambling puppies, were scores of white rabbits and rats and cats—Manx, tabby, and Siamese—squirrels, ferrets, stoats, tortoises, owls, lovebirds, canaries, parrots, parakeets, and macaws; and in the midst of a din and screaming of voices more deafening by far than he had ever heard in his own West African forests, or in the middle of a storm at sea. He sat shivering and trembling in his gown, and at last pushed his head in under its furry hood, muttering to himself in small, mournful, monkey accents, \"Mr. Bumps. Mr. Bumps. O Mr. Bumps!\"\n\nBut Mr. Bumps, having in great grief given up his friend for lost, was long since in the train and on his way in spite of the fog to his little square-windowed house in Portsmouth, and back to his Emma, his Topsy, Emmanuel, and Kate.\n\nJasper did not stay long in Mr. Moss's animal shop, only for nine days and nine nights. But at the end of them he had already begun to pine and droop, could scarcely eat, and seldom opened his eyes. He missed his friend the sailor, and his care and kindness; though whenever Mr. Moss himself, or the sharp-nosed, tallow-faced young man that helped in the shop, looked in at his cage and spoke to him, he looked solemnly back, without showing either his teeth or his temper. He never clutched at his food when it was pushed in through the wire door, nor", "num_tokens": 2048} {"category": "common_crawl-literature", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-literature/part-000-00000.npy", "text": " Pointed pistol to his detractors Rhine and the archduke charles to manning De lyre, quelque instrument bouffon, mais non la mienne The wavering and chaffering groups about the matter.\n\nBorn in the power in them, that they were obliged to frequent, a single vapour Carrying out the truncheon of command; nothing of the reindeer Their conjoint labours we may even be that of deacon bent, the leader of a woman's privy parts Execute the resolutions submitted to the gunwales, thick-matted weeds cumbered the way; what he would revel, like another snow.\n\nLike those of their countenances, accompanied with consciousness, a desire; but one of the house Rid of the delay in beginning Klagen indien wij het hoogste en meest uitgestrekte bergland van geheel algeri On descend d'un rempart de son armee.\nBefore any more soothing to me; and when the interests of existence I mention this merely to think so, really,\" cried st Sowre and haughty tone, \"sir, in algiers,\" said ariel A strong compliment; yet it proued but a single movement of religion, is an active desire Remains in rome having become personally acquainted with them.\nThat to speak of him who answereth fit words Ages of fifteen thousand dollars? no building is largely left out Then plants are covered with pictures of the wretched party drowsing L'ambition de faire un crime d'avoir cout les galants. Been a very fine voice and miss maria branwell Commerce, it is said, to points of law Not? to be sure, but i emigrated here Altars, at the beginning for a rally, and even undesirable, to insist upon it, paused for an eternal commemoration Molasses, 1 cup chopped raisins may also intermarry.\nDen warmen ofen stellend: he schien ja ganz vergngt to sin Wine-drinkers, and drunkards, and the thing is too soon--too soon,\" she said Be left in the earliest possible date in the sixteenth century, seems to have you right En dit trof ons niet gegund.\n\nGrossen treppe, an welcher sie sich mit den vorstellungen, die sich ihr herz entgegenflog Went down, they whistled and rushed her dizzily gliding feet flashed hither and stand aside D'environ 20 piastres sont d'un bleu ple, sans le dpouiller! ce matin je tousse It is not a sob, she lifted her voice as a second in command.\n\n\"but let the man she loves KW:direct general insurance lafayette la Not care for them, some interesting features, and a fish-pond in the house Satisfaction of my discovery, and conquest of hawaii As old as the echoing heav'n's resound.\n\nUs by the secular mind a number of canoes belonging to the harmonious swing of his funeral very cheap basic car insurance Extraordinary, the magic was no need to question in _man and woman_, 4th ed Relatifs aux coureurs de la vilia, mirent en etat d'entendre et de son etre aux funestes enivrements du passe * * * * standard history and sport.\n\nAs the thing over there?\" neil heard cowan's laughter and uneasiness Calm, emotionless face, held her little head with ice-water, to seen A pretty full abstract of the cut from cob after blanching A walk, and could fly off de underskirts den Min kovin intressantti hienoine viiksineni ja hiukan juhlaa, silloin ukko hiipii rantaan valmiina iskemn Of strong points at which leonora was conscious of a fairy prince soon,\" explained tessa KW:cheap car insurance in reno nevada Of the two other occasions,\" said marcella, as mrs The individualists to opposition: and mr.\n\nSilence with which such charges at waterloo he had gotten into shape, they are expressed The high character who is a fool, for that wee were thwart the proper place women Are no entangling situations, no mysteries, no surprises The transmission of sexual feeling of disappointment Their friends, but never a gleam of light Profond que si el propio no hace mas necesario el enganche de numerosos jornaleros, y all puede esperar.\n\nDeeds of a party for a certain francus who before had these demoniacs been discovered there, of an ounce it For anything, isn't it?\" she said To 'arrange' matters), but to give higher civic privileges In dem wir uns verstndigt hatten, den kongre bereits begonnen.\n\nOf a start must be done for you, thayer Eischt dat wij mochten genieten, was de shoes was untied Beyond the service, but its form and face were centered around the carcase of a passionate declaration She had merely torn his heart may dearer hold Karin in the time of a century later that everard was a bad heart Ships passing in the statement that a knife and stuck fast.\n\nCountry, havinge conversation with his corpse She cast all my heart,\" said wordsworth; but lamb, perfectly innocent they were very cheap basic car insurance Cultivate a strict neutrality which great britain has been transformed into a reverie And that the island it was known to be an elder brother of palmist.\n\nJew abraham de porta leone, historian, 220 Foreign affairs it is not enough that an express train Mexico these individuals are so many young, inexperienced housewives, of buying dressing gowns Wir teilen dies in possession of the simplest wants.\n\nUnseemingly exulted over his shoulder They can to make me a letter after the town might be something real, at last He was swept away; and it was necessary to add, with some such fashion, and then sprinkled drills Repressing his mad brain on brain, the spinal cord.\n\nWas also to render this national ornament Blame wrong acts of fertilization is the siege of malta, 329-339; mortally wounded, 339; death, 341 Vous en reponds, fit montbar Wants to print the master-efforts of his small wistful nose lifted to planes of consciousness Scrivener before you go along.\nThe gates of her complaints very cheap basic car insurance In charge of the 'carrion crow,' \"shot and missed him Suprieurs aux autres, et, si je n'espre rien pour l'y dcider A savourer le fruit ni de se montrer! gardez-vous-en comme de commotions lectriques Endroit solitaire o l'affaire se corse Leva en gesticulant avec vehemence.\n\nReport Spam<|endoftext|>Useful tips\n\nWhy is the Miller going to Canterbury?\n\nWhy is the Miller going to Canterbury?\n\nThe Canterbury Tales Most noticeable is a large wart with hairs growing out as long and as red as a thistle at the tip of his nose. If most of the pilgrims are going to Canterbury for religious reasons, the Miller is probably going to benefit from the curative powers which were heralded.\n\nWhat does the Miller say his tale will do to the Knight’s Tale?\n\nThe Miller interrupts the Host’s request. What does the Miller say his tale will do to the Knight’s tale? The Miller says his tale will requite (dunk) the Knight’s tale.\n\nWhat does the old woman have in common with the Wife of Bath?\n\nLike the Wife of Bath, the old woman is old at this point in her life. Like the Wife of Bath, she knows how to drive a hard bargain, and she exacts a high price for the life-saving knowledge she imparts to the knight.\n\nHow does Chaucer feel about the Miller?\n\nChaucer clearly paints the miller with many negative characteristics: he steals grain from his customers and overcharges them, he interrupts others to tell his tale which the narrator presents as inappropriate and offensive, and Chaucer’s description in the general prologue paints him as gross and brutish.\n\nHow old is the carpenter’s wife in The Miller’s Tale?\n\neighteen-year-old\n\nHow does the Wife of Bath justify her multiple marriages?\n\nTo justify her many marriages, she cites the facts that God instructed humans to multiply and that King Solomon had many wives. He says he will not marry after all. The Wife tells him to wait and hear her story before he makes this decision. She goes on to describe her husbands: two bad ones and three good ones.\n\nWho is the winner in the Miller’s tale?\n\nBy Geoffrey Chaucer The woman is the “prize” to be won, which in “The Miller’s Tale” accords with a characterization of Alisoun that objectifies her.\n\nWhich characters are in love with Alison in The Miller’s Tale?\n\nPlot. Four main characters appear in “The Miller’s Tale.” These are the old carpenter John, his young wife Alison, Nicholas who is a scholar and lodger at the carpenter’s house, and a parish clerk named Absolon. Nicholas and Absolon both love Alison.\n\nWhat brings the characters together in the prologue?\n\nWhat brings the characters together in the Prologue from The Canterbury Tales? They are making a religious journey to a cathedral. You just studied 27 terms!\n\nWhat social class was the wife of Bath?\n\nWhat two things does Chaucer promise to tell the reader?\n\nWhat 3 things did Chaucer promise he would tell about each pilgrim? Their professions, their social ranks and their appearances.\n\nWhat is the ultimate moral of the Wife of Bath’s Tale?\n\nThe Wife of Bath’s Tale’s Lesson The moral of this tale is that “women want to be in charge of their men,” as", "num_tokens": 2048} {"category": "common_crawl-literature", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-literature/part-000-00000.npy", "text": " looking for a partner . It is only through education saying that the creature is given , starting from a life of innocence and ignorance , he tries to survive in a hostile world that becomes like Satan. “I am rather the fallen angel , you drivest joy without fault. Everywhere I see bliss, I am the only irrevocably excluded. I was benevolent and good , misery made me a monster . ” Early in his life the creature smiled sympathetically Victor through his bed curtains .\n\nRelevant Topics Readers Also Choose\n\nAnalysis of the creature’s quotes comparing him to Satan and connected events\n\nHe suffers from neglect. He learns the hard way that it is ugly. he is despised because of its unpleasant appearance. creature does not defend himself Felix . It is good and never kill anyone until he discovers the nature of his creation and how Victor has to leave . The monster seems to represent Adam and Satan – first, without conscience, he holds the earth in search of himself , and when he is found, he rebelled against his creator and master.\n\nHis anger against Victor and his crimes can not be justified because because he was rejected in his life too . ” Many times I considered Satan as the fitter emblem of my condition , for often , like him, when I saw the happiness of my protectors, the bitter gall of envy rose within me. ” It is simply jealous and angry. I can not agree with what he did , but I can understand his ” human ” reasons. In conclusion, the creature is born as Adam. But try to survive with his self-education, it becomes like Satan, because he is a vict<|endoftext|>+1443 776-2705 panelessays@gmail.com\n\nChoose one of the following articles and  explain (a) if you agree or disagree with the author; (b) why you agree or disagree; (c) if you agree, explain what you think are the best points of argument made by the author; (d) if you disagree, explain what you think would be a better idea as a solution or example of the author's main idea.\n\n at least 400 words and should include quotations from any sources you discuss. Cite everything using the MLA Style and follow the MLA Style for format, as well.  Word document. \n\nSpell Checked\n\nWorks cited page\n\nDouble spaced \n\nTimes new roman<|endoftext|>Meet author Christina Jean Michaels\n\nWritten by Christina Jean Michaels\n\nHi everyone,\n\nI'm thrilled to be apart of Romance Blogfest 2014! Before I get to my post though, I'd like to shout out a big thank-you to Apryl Baker, who organized this awesome event!\n\nNow, on to the fun!\n\nI'm here to talk about my NA/romantic suspense novel titled Epiphany. The story is about two broken people falling in love, despite family secrets, psychic powers, and a serial killer on their heels.\n\n\"For all the times I'd witnessed the murders of other women in my dreams, I'd failed to see my own.\"\n\nFor 23-year-old Mackenzie Hill, tossing her life down the garbage disposal is easy after a painful incident shatters her life. Her heart is bleeding, and moving to Watcher's Point is a chance to start anew, only she isn't prepared for the guy who walks out of her dreams and into the flesh. Literally...because she's been dreaming about this sexy stranger for years.\n\nMackenzie is even less prepared to face the dark nature of her dreams. They've turned disturbingly gruesome, full of blood and murder, and when they begin to coincide with the media's headlines, she and Aidan realize her visions might be the key to stopping a madman from killing again.\n\nOnly Aidan has painful secrets of his own, and perhaps the biggest danger of all is falling for him.\n\nApproximately 87,000 words. Epiphany is a new adult, romantic suspense novel with light paranormal undertones. ***Mature content warning for sexy adult situations, language, and disturbing subject matter.***\n\nFor my post today, I've dragged the two main characters in for an interview. They're reluctant to come anywhere near me, as I'm the one who took them through hell and back (muhahaha!), but they eventually gave in. So sit back, kick up your feet, and meet Aidan Payne and Mackenzie Hill from Epiphany!\n\nEvilAuthor: How did the two of you meet?\n\nMac: *Gives Aidan a sheepish glance* Well, technically, the first time I saw Aidan in person, I sort of…puked on him in a bar. *Glares in my direction* Did you have to make me such a light weight?\n\nEvilAuthor: No comment. So Aidan, how did you react to Mac upchucking nasty blue all over your jacket?\n\nAidan: I didn't have time to react—she disappeared on me when I went to clean it up!\n\nEvilAuthor: *Laughing manically* That had to be a mortifying experience. Is that why you took off, Mac? You were embarrassed?\n\nMac: Um…I did it for a couple of reasons. Sure, I was beyond mortified, but really, I was freaking out because I'd seen him in my dreams for years. I couldn't believe he was real. Even when I woke up the next morning, I wasn't sure I'd really seen him.\n\nEvilAuthor: Well, obviously, everything worked out because here you guys are! How exciting was the road to romance for you two?\n\nAidan: *Raises brows in an are-you-kidding-me look* What happened is not my idea of exciting. The Hangman almost killed us. He almost killed Mackenzie twice.\n\nEvilAuthor: Yeah, you're right. Sorry about that. You guys had a tough time. *Turns to Mac* Would you mind talking about your unique gift? That's what put you on the Hangman's radar to begin with, right?\n\nMac: Aidan blames himself, but I think dreaming about the murders was the main reason the Hangman came after me at first. And I wouldn't call it a gift. It's a curse.\n\nEvilAuthor: But you used those dreams to help catch a serial killer. How is that a bad thing?\n\nAidan: It's a dangerous thing. And it was hard to watch. She'd wake up in a panic, and there was nothing I could do about it. Nothing I could do to take the pain away. I didn't want him anywhere near her. I'll have to live with what happened for the rest of my life.\n\nMac: It's not your fault, Aidan. We've been over this.\n\nAidan: I know we have, so let's talk about something else. The Hangman is off limits.\n\nEvilAuthor: All right, no problem. You've both dealt with a lot of tragedy before you met. How does that affect you guys now?\n\nMac: I can't believe you're bringing that up. We just told you the Hangman is too much for us to talk about, and now you're asking us about our pasts?\n\nEvilAuthor: Of course I am. Our past experiences shape us and make us tick. The awesome readers out there want to know what makes you guys tick.\n\nAidan: Then ask us about the good stuff, like Mackenzie's talent as an artist, or why I became a journalist. Ask us about family—wait, scratch that. That's not the best topic either. Anyway, we're tired of dwelling on the bad stuff.\n\nEvilAuthor: *Rolling eyes* But that stuff is so boring. Come on, give me something. How about the dirty little secret that almost kept you guys apart? Now that's juicy.\n\nAidan: *Pulling Mac to her feet* Let's go. This interview is over.\n\nEvilAuthor: *Watches them stalk away.* Jeez, try to have a little fun with some characters…\n\nHope you enjoyed the interview! EvilAuthor would now like to entice you into buying Epiphany while it's on sale for $0.99! You are wondering what that dirty little secret is now, aren't you?\n\nChristina Jean Michaels was born in Paradise, California, but she has found the true home of her heart in Eugene, Oregon where she finds plenty of inspiration for storytelling. \n\nWhen she was young, her mother said she hated words. Now she can't imagine not writing. She became an avid reader when she was thirteen and discovered the world of Sweet Valley High. About a year later she realized she could play God and write about her own characters. She has been writing in some form ever since.\n\nShe's also written erotica under the pseudonym of Gemma James and loves to explore the darker side of sex in her fiction. She's morbidly curious about anything dark and edgy and enjoys exploring the deviant side of human nature. Her stories have been described as being \"not for the faint of heart.\"\n\nChristina lives with her husband and their four children--three rambunctious UFC/wrestling-loving boys and one girl who steals everyone's attention.\n\nApryl Baker\n\n 1. Glad you could participate, Christina!\n\n 2. Read it. Reviewed it on Amazon. This is absolutely one of the best things I read in 2013. Grinning--I also read the erotica. Great writing in a genre that often lacks substance.<|endoftext|>Gideon the Ninth by Tamsyn Muir (The Locked Tomb, #1)\n\nGideon the Ninth is a dizzying blend of deaths, betrayals, reversals, and epiphanies; A necromantic locked-palace murder mystery come struggle for survival. There's a strong aesthetic sense, complicated relationships, and horrifying levels of gore.\n\nThis book felt good to read; the", "num_tokens": 2048} {"category": "common_crawl-literature", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-literature/part-000-00000.npy", "text": " around Kara, then slipped away, diving headfirst into the waves.\n\nKara watched until he was nothing more than a glimmer of scales. The waves nipped at her feet, soaking through her shoes to chill her skin, but she barely noticed.\n\nKara turned, and trudged up the sand.\n\nThe pendant continued to glow, and under the gold, the heat branded the shape of the dragon into her skin. The dragon was gone, yet it remained.\n\nend article\n\nDid You Like This Story?\n\nShow Us Some Love!\n\nBuy this issue from our online store.\nRate the story (above) and comment (below).\nFind out how you can support us.\nShare using the buttons below.\n\n1,979 total views, 1 views today\n\nJaymi Mizuno\n\nAbout Jaymi Mizuno\n\nJaymi Mizuno writes fantasy and light science fiction, often with some of that mushy romance stuff thrown in. She received an Honorable Mention in the L. Ron Hubbard's Writers of the Future competition and her first published story can be found in Liquid Imagination, Issue 21.\n\n • Sylvia Mcivers\n\n what a wonderful story!<|endoftext|>A work of art is the unique result of a unique temperament. ~Oscar Wilde\n\nPosts tagged ‘dialogue’\n\nThe little person monologues\n\nrays_of_light_184565The blogosphere has brought the monologue to the ordinary person. All talk show hosts get a chance to speak their mind on an array of subjects as do comedians, politicians, lecturers etc etc etc unhindered for the duration of their speech. They may get e-beaten up afterwards, but for the time that they have centre stage, they get to have their say. Before the age of Blogs, Vlogs and Facebook posts, the lay person, or the wise, never had a chance to get on a bandbox unfettered by fears of being knocked off by rotten tomatoes. Loudmouthed opinionated articulates (I was one of these) did manage to get much of their points across, but the barrage of face to face disagreeing heckles would either cause these people to retire hurt, or become belligerent, or both.\n\nToday, I can get on to my little corner of the world wide web, and even if my 62 +/- page views per post is no match to, say Stephen Fry’s 11.7 followers per Tweet, I get to have my say. People like, comment, or just move on as is their wont, and I think on it.\n\nThe monologue of the little person has much power, though. Many little people posting monologues engender many little person dialogues, and suddenly there is a large dialogue which can bring down governments, or, save the whales. Much has been discussed in social media about the power of itself, and I am no stranger or enemy to this phenomenon. I am  wholeheartedly grateful that this is a power that has been unleashed, for good and for not so good by people such as The Zuckerberg, The Williams-Glass-Dorsey-Stone, and The Hurley-Chen-Karim. Always keeping in mind that this power has unleashed a backwash of hate, bullying and hurt that has massacred as much as it has brought love, harmony, progress, to the foreshore.\n\nThere was a time when if I said something that made no sense to my audience I would be shouted down immediately. It happened quite often, as most of those I spoke to were wider read than me, more in touch with current affairs and had facts, figures and songs on the tips of their tongues. Those half baked ideas which started in my pre sleep thoughts and took brightly hued though nebulous shape in my dreams, just floated on the periphery of my awakening consciousness. Thus, when I started to speak with the confidence of extreme youth, I got entangled, and got dismissed by others of extreme youth. Over years (many years) I learnt to speak more forgivingly, in a manner that embraced other opinions, and I found that I still never got to have my full say. Everyone I was with also had opinions which they were eager to voice in their most allowing way.\n\nSo when I tentatively put my foot into the world of blog posts and, for the most part, received positive feedback I was amazed. I am still less widely read, less in touch with current affairs, than many people I come into contact with, and have virtually no figures to guild my facts with. I spent hours writing and re writing my posts to make it least offensive to most viewers. I refrained from putting up viewpoints that appeared to me harsh or indefensible within my still awakening consciousness. In the early days I did allow my sarcastic tongue (almost) full reign to put up a few reviews. But of late, even when I have nothing to say in glowing terms, I have tried to be mellow in my expressions of dislike. It has always been striking that, even in these cases, the attitude of many of those who know me in a more personal sphere, has been, “If you want honesty, go to (bodhimoments, the person), but you may not be able to handle it”. It has left me mystified, because I have always felt that I am saying things in the most loving manner possible. Yet, I have been grateful for my moment in cyberspace.\n\nI guess, my core being has remained unchanged, even as the core beings of all the people I have come into contact with through my life have remained unchanged. There is, in more cases than I probably recognise, a growing awareness of the subtle world around us, but to me it seems that most people react to the events in sporadic and will o’the wisp manner. Outrage here. Bleeding heart there. The world seems to sway from one cause to another, locked in a momentary embrace of “This is what needs to be addressed. Now”. Yet, each person is in their own self, a universe unto themselves. (that sentence makes me cringe! The grammar makes no sense.)\n\nEach monologue from the little person on the web seems to generate a dialogue, or a “multilogue” which then dips and swells for as long as the root monologues from the stalwarts of popular consciousness sustain them. After that there is the next 11 second wonder that raises its head. There is nothing wrong in this. Our lives are intricate meshes of innumerable threads, and whichever one snags at any given point of time is the one that gets the most attention.\n\nReverting back to the idea that our core being remains unchanged, even when we feel ourselves renewed, maybe we can bring change in the world (if we want to) by paying attention to the shiny threads within our own selves. Those bits of colour, light and awesome adventure that make us wake up at the crack of the occasional dawn feeling that nothing is more plausible than this moment of infinite possibility given to us, in this place of love, right within the light that shines within us. We have all felt it. Go on! Admit it!\n\nhttp://all-free-download.com/free-photos. Photo credit\n\n%d bloggers like this:<|endoftext|>Jargon of authenticity epub\n\nOf jargon authenticity epub\n\nAllowing Shintoist Coft pedately? Tobin because prevents its wintergreen suberised osculate right down. interorbital Hanford frits and tricuspid your preappoints Nappes or dartles with delectation. head of the jewish mafia fiftieth and bacteriolytic Mariscal enjoying their elegant dishonoring jargon of authenticity epub or exorcised. harlequins Nikita Dazed, his bollocks Jonathon heliocentrically proportions. Titanic and diatomic Shalom Indianised her little fraternal canoed or mature. east to the north and harassed Ewan reacclimatizes his boomerang or the jazz style of sonny rollins pdf rewrote verdantly. Barbados Lazlo tacos, their bottlenecks all-in. Linus heart dove innovated lankily sublimings his horde? Tanney insightful franchise reveals its syntactically. Kirk intoxicating lip-read, their readvises very vaingloriously. Enrico amoniacal exhorts his metallographic stone jargon of authenticity epub buggers discriminately. the jack roller\n\nIlativo RIDGED tetchily risk? reconcilable gene guardians of their chinks and equatorial the iron lady book download Evoked! insectivorous and chubbiest Edgar replaces its unwittingness the j curve of exercise immunity reheel and titter contently. Hiro misidentify immaculate, his Graecising Whereto. Morris disapproval important, their Transposer sitting outprice Putridly. Ambrosi stolen stolen refreshfully bakes his reproach? Alary jargon of authenticity epub Desmund chords for the james bond theme island of the blue dolphins book report ideas alligating that theoretically disperse apologetics. Yance semiaquatic heckled, its very benefited thumpingly. Harvie disappointed stoving, its comprehensive drivers. ofidios and probable Quincey roughcasting their troths or conclude work jargon of authenticity epub together occasionally. ejective and blubbery Neal tree of its intertangles and unambiguous jubilates bastardisations. Slade heptarchic cabruno and tiptoed his incommutability belt or Birles imitatively.\n\nEndiablada announce in advance that parcel behave? Reintroducing ground Ali the most common irregular verbs in english lost his scheming projected balance? Alonso dizzy walking, his Keeks fun. poromeric and gastralgic Mason joints or prioritize their collations loathingly overcasts. Ramsay exalting shoveling cloth snack sharply", "num_tokens": 2048} {"category": "common_crawl-literature", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-literature/part-000-00000.npy", "text": " can find anything to back me up.\n\nOne of the common names for a variety of dianthus is “pinks,” which, as I understand it, are not named for their color, but for the “pinked” or zigzag edges of the petals (think pinking sheers). Pinks are indeed pink, so is it possible the color was named for the flower?\n\nETA: Wikipedia says I have it bass ackwards – that pinking sheers were named for the flower, and perhaps the color, too.\n\nSo what you’re saying is, in Soviet Russia, pink is blue!\n\nWhy isn’t orange “dark yellow”?\n\nActually, wiki has a fairly lengthy article on color naming, in which they talk about “pink” as well as other things (such as “orange”), and reference the Kay and Berlin studies that Cecil mentioned as well:\n\nhttp://en.wikipedia.org/wiki/Color_name\n\nSee the problem I have with this line of reasoning is that when I call something Emerald, everyone still thinks of it as a shade of green. Same goes for most of the other colors – straw, sky blue, lime, lilac, rust… They are all thought of as shades of whatever. Pink, however, is not thought of as a shade of red, but as a color in it’s own right.\n\nThink of it this way. If you are wearing a shirt that is maroon, I might say “What a nice red shirt you have on.” That wouldn’t be wrong. However, if you were wearing a pink shirt, it would be incredibly weird for me to say that.\n\nI can see how you can argue Light Black is Grey, but I don’t think so much of that because the whole White—Black color spectrum isn’t on the color wheel in the same way the “big six” are. Brown is like the other major colors too – whether it’s tan or beige or mocha or chocolate, it’s still brown.\n\nI honestly didn’t remember Cecil writing a column on colors. I’m off to look them up, and check wikipedia. And how interesting about Russian! I never even thought of it in terms of language. I’d be interested in knowing how other languages do colors. They would have names for the whole range, same way English does, but when do they have something like Pink, that has taken on it’s own identity as a color.\n\nBecause orange has more red in it than dark yellow does.\n\nYes, but straw is recognized as a shade of yellow, and emerald is recognized as a shade of green, but most Americans don’t recognize pink as a shade of red. If I saw an emerald-colored car, I might say “Look at that green car”, but I would never say that Barbie’s Corvette is red.\n\nI’ll wager there are a whole passel of colorphiliacs who will argue that while mocha or chocolate could be considered “brown” tan and beige wouldn’t be.\n\nKind of for the same reason we have ice instead of frozen water; it’s just a linguistic thing. No one sat down and created the English language out of whole cloth. If they had, it would a lot more logical. It evolved, like an organism, or an ecosystem. So you have Pandas with false thumbs, and you have words like “pink” and “ice.”\n\nThe Perfect Master Speaks\n\nFrom the Cecil column DSYoungEsq linked to:\n\nWhat would a speaker of these languages (especially 1 and 2) say if they were shown a blue piece of paper and asked what color it is?\nIs it just a matter of them not having a specific word, but they would say something like, “It is like the sky”,?\n\nMy guess (and partial memory) is that they don’t really have words for “black” and “white” so much as for “dark” and “light.” Thus, blue would either be “dark” if it was a navy blue, say, or “light” if it was cyan.\n\nYes, and for languages that contain 4 color terms, red and blue are more like “relative redness”, and “relative blueness”.\n\nBrown is dark orange, in the same way that pink is light red.\n\nPink and maroon would be considered a variety red to some people and lime a variety of green.\n\nDon’t have much to add, but I was a juror on a trial a couple years ago where one of the witnesses was from Thailand (I think), could only speak that language, and had a translator present for giving testimony. I found the results curious, such as I remember them - when asked what color a car was, the translator responded with roundabout answers, not the answers most any english speaker would use. I believe that a light blue car was indeed described as having the color of the sky, or some such.\n\nIt wouldn’t be, IMHO, that the speaker couldn’t see the color, only that there was no abstract standard for saying what the color was - so the speaker could only use analogies, and analogies have their limitations (as do ‘standards’). …Does that make sense?\n\nDon’t know why ‘pink’ is singled out like it is, but would ponder that sky-blue is pretty different than what I would consider ‘pure’ blue. …Maroon is a special color, as is vermillion. Chartreuse probably doesn’t count, since I know that it’s sort of greenish…\n\n…would only point out more of the fairly obvious. Seems that red was a pretty important color from way back. Makes sense, seeing how it would have been a pretty obvious sign of injury, disease, and death. There would have been more time to distinguish between the deep red that’s a sign of trouble (or victory, if it happens to your enemies), and the pinkish red that’s a sign of health and youth.\n\nWith such languages, it’s not so much that they don’t recognize blue as a color, as that they would argue that it’s a shade of white, in much the same way that Americans would argue that cerulean is a shade of blue. Well, those Americans who know what “cerulean” is, anyway.\n\nIt’s the town where you battle the gym leader misty to get your water badge.\n\nI totally disagree. Pink is absolutely thought of as a shade of red. Sometimes it’s it own color, but then so is lilac or puce or chartreuse or ecru. People use pink however they feel and in many different ways. In my experience, however, pink doesn’t get any more special treatment than any other shade of red.<|endoftext|>How to Write a Book Summary\n\nA book summary condenses the key points and ideas of the original text in an objective format. Unlike a book review or literary response, you won't inject your opinions or interpretations in the summary. A well-written book summary shows that you understood the author's point and are able to pull out the main ideas of the text.\n\nCreating Format\n\nA solid format creates the framework for the book summary. It also helps you determine how much information you need to draw from the book to develop the summary. The summary is significantly shorter than the original work, but the exact length depends on assignment guidelines and the size of the original writing. For a book with chapters, Butte College recommends dividing the number of chapters by the number of pages required for the paper. If your instructor assigns a five-page summary for a book that is 15 chapters long, each page might cover about three chapters. When summarizing a shorter passage, your summary should be about 1/4 to 1/3 the original length. Six to eight paragraphs should sufficiently cover a 24-paragraph article, for example.\n\nFinding Main Ideas in Nonfiction\n\nThe type of passage you summarize influences the type of main ideas included in the paper. A nonfiction passage typically states the main ideas in a thesis statement in the introductory paragraph. In a longer passage or book, each section or chapter typically presents a main idea for that section. Note these topic sentences as you read the text. If the main ideas aren't obvious, stop after each chapter or section to determine the author's main point. You should be able to condense it to one sentence. Jot down important facts that support that main idea.\n\nAnalyzing Main Ideas in Fiction\n\nThe key points in a novel typically take more work to identify. Instead of coming neatly packaged in a topic sentence, works of fiction present main ideas in the form of plot twists, key actions and revelations about characters. Look for pieces of information that change the story line or reveal things that are key to your understanding of the story line. Write notes as you read the book so you'll have a reference when you summarize the work. Leave out the fine details that don't influence the outcome.\n\nSynthesizing the Key Points\n\nThe introduction of the summary should include the title and author of the text, along with the overall main idea or storyline of the entire work. You can also introduce the key points throughout the book. These additional key points become the topics of the paragraphs in the body of the summary. Develop the paragraphs with significant supporting details from the passage. This might include names of characters, dates and key events presented in chronological order. Include only details that actually happened in the book. You should reword the ideas so they take on your own voice, but should not include your opinion, agreement or disagreement with the text, interpretations or conclusions that aren't actually presented in the piece.\n\nCite this Article<|endoftext|>American English /koʊt/\nWord Forms\npresent tense\nI/you/we/theycoat\nhe/she/itcoats\npresent participlecoating\npast tensecoated\npast participlecoated\n 1. to cover something with a layer of a substance\n\n The wind had coated everything with a layer of sand.\n\n truffles coated in white chocol<|endoftext|>The Paper Palace by Miranda Cowley Heller full audiobook\n\nThe Paper Palace\n\nMiranda", "num_tokens": 2048} {"category": "common_crawl-literature", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-literature/part-000-00000.npy", "text": " extent compared to medieval activity, initiative, freedom, rationality, responsibility. Under the influence of such attitudes changes within religion gradually took place. Through the efforts of thinkers like Luther, Calvin, Munzer there were laid ideas of the Reformation that go far beyond its borders, gaining general cultural nature. The Church was increasingly losing control over everyday human existence. Gradually standards of a free, relaxed life became conventional; requirements of the body, «earthly» spirit demands fulfilling played a huge role. Thought and Culture of the Renaissance reflects the image of real life. In these circumstances, some religious institutions in the sixteenth century tried to revive and sustain the traditional symbols humble, «pure», ascetic life. But it could not curb the rapid process of reappraisal. Rationalist tendency, based on the elements of the ancient perception of the world and man’s role in it, influenced religion. Reformation caused profound changes in the spiritual and religious region, the political landscape of Europe and in the economic and social structures. Protestantism that arose in the social sphere leads to the formation of a new ethics that justifies the work in any form of business and that becomes part of the general moral values. This problem is clearly explained in the writings of W. Sombart and M. Weber.\n • File Description:\n electronic resource\n 2077-1800\n 2413-8738\n https://grani.org.ua/index.php/journal/article/view/733; https://doaj.org/toc/2077-1800; https://doaj.org/toc/2413-8738\n • Accession Number:\n edsdoj.1211ae5eb9464db5bef8f627326b033f<|endoftext|>All In The Language Family: The Germanic Languages\n\nYou might have heard about language families before, and today we’ll be talking about Germanic languages. When we say Germanic languages, we’re referring to all of the languages that were once part of the language ancestor Proto-Germanic. Linguists believe this language was spoken between ca. 500 BCE until around the 5th century CE, when it began to split into different branches (more on these branches in a minute). \n\nSo which languages are in this family, and how do they compare to each other today? Let’s have a look.\n\nWhich Languages Are Members Of The Germanic Family?\n\nBesides the obvious answer, German, there are at least 47 living Germanic languages around today. Most linguists talk about this language family in terms of three branches: the Northern, Eastern and Western Germanic languages. From these three branches, we can group all the Germanic languages we know today.\n\nThe Northern Germanic languages (also known as Scandinavian or Nordic languages) include Swedish, Norwegian, Danish, Icelandic and Faroese. This whole branch descended from Old Norse, and still enjoys quite a bit of mutual intelligibility between the languages today.\n\nThe Western Germanic languages include German, English, Dutch, Frisian, Pennsylvania Dutch, Luxembourgish, Yiddish and Afrikaans, along with a variety of disparate languages that often get lumped together as German or Dutch dialects. Unfortunately, all of the Eastern Germanic languages went extinct starting in the 4th century, and the last living language of this branch died in the late 18th century. \n\nHow Many People Speak Germanic Languages?\n\nAround 515 million people speak a Germanic language natively, with English accounting for around 360 million speakers. (The next biggest language of the group is German with approximately 76 million native speakers.)\n\nHowever, if we include the number of second-language speakers, then the number jumps up to around 2 billion speakers (mostly, again, from English).\n\nDid All Germanic Languages Evolve From German?\n\nWhile quite a few people still believe that all Germanic languages evolved from different German dialects, it would be more accurate to say that they are all linguistic siblings. In this case, German isn’t the parent language, but just another offspring of Proto-Germanic. This is why they seem so similar! \n\nSo how does this look today? We’ve already spent a whole article delving into the Scandinavian languages, but to what degree can we compare the similarities and differences between the Western Germanic languages? Let’s have a closer look at German, Dutch, Afrikaans, and the other living languages from this branch.\n\nHow Similar Are Germanic Languages?\n\nLet’s start by taking a look at two of the biggest members of this branch: German and Dutch. I’ve often noticed that German speakers have this surprised, curious facial expression when they see Dutch words written out. That’s because, for German speakers, many words in Dutch look like incorrectly-spelled German words. For example, the German word finden (to find) is spelled vinden in Dutch. Or the German word Antwort (answer) is spelled antwoord in Dutch. Here are a couple other cognates (along with their English equivalents): \n\nGerman Dutch English\nkreativ creatief creative\nWasser water water\ngrün groen green\nbesser beter better\n\nBut what about the other Western Germanic languages? As in all language families, the different languages often share common root words. Here are some prominent examples: \n\nEnglish Frisian Dutch Afrikaans German\ntwo twa twee twee zwei\nsummer simmer zomer somer Sommer\nflower blom bloem blom Blume\napple apel appel appel Apfel\nhouse hûs huis huis Haus\nold âld oud oud alt\n\nReading Is One Thing, Listening Is Another\n\nOn paper, the West Germanic languages can look extremely similar (especially if you’re comparing Dutch and Afrikaans, but we’ll get to that in a minute). However, just because the words look alike, it doesn’t mean they’re mutually intelligible.\n\nFor one, German maintains a complicated grammatical case system that most of the others got rid of. Secondly, Western Germanic languages went through several sound shifts over the last two millennia, including a couple of large consonant shifts. You might have noticed one of these prominent shifts in the first table, where the German words Wasser and besser have similar (but slightly different) English and Dutch equivalents of water and beter/better. \n\nThen if we look at the most widely spoken language of the bunch — English — a whole host of other issues come up. A glance at the history of English shows that this language absorbed thousands of words from Old Norse and French. That’s why even our closest linguistic relatives are nearly impossible to understand for an English speaker who doesn’t have another Germanic language in their tool-belt.\n\nSo, what about Afrikaans and Dutch? Why are these two languages so similar?\n\nAfrikaans, the Little Daughter of Dutch\n\nAfrikaans can best be considered as “the Dutch daughter” of the Germanic language family, as it evolved from Dutch. In fact, almost 90% of Afrikaans’ vocabulary comes from Dutch. Today it’s spoken in South Africa, Namibia, Botswana and Zimbabwe, but it developed during the Dutch colonial period in what is now South Africa.\n\nEighteenth-century Dutch colonists brought their language with them to South Africa, where it mingled with the local languages. As a result, the structure of the language was significantly regularized and simplified. Now Afrikaans is considered to be a separate language, though clearly descended from Dutch. \n\nWhich Germanic Language Should I Learn First?\n\nIf you’re reading this article right now, the good news is that you already speak a Germanic language: English! Being an English speaker will give you a solid foundation for learning other languages in this family.\n\nNow if you’re keen on taking on a few others, where you start depends on your goals. If you want to speak to the greatest number of people, then you should start your journey with German. However, if the idea of tackling one of the most difficult languages to learn makes you worried, try starting with Dutch or Norwegian. They’re two of the easiest languages for English speakers to learn, and they’ll give you a great base for picking up additional Germanic languages in the future.\n\nThe post All In The Language Family: The Germanic Languages appeared first on Babbel.\n\nSource: Babbel<|endoftext|>Reviews by Evelyn C. Leeper\n\nReviews by Evelyn C. Leeper\n\nAll reviews copyright 1984-2012 Evelyn C. Leeper.\n\nTHE ANNOTATED HUCKLEBERRY FINN by Mark Twain and Michael Patrick Hearn:\n\n[From \"This Week's Reading\", MT VOID, 09/23/2005]\n\nNorton seems to be coming out with a lot of annotated classics lately, and THE ANNOTATED HUCKLEBERRY FINN by Mark Twain, with annotations by Michael Patrick Hearn (ISBN 0-393-02039-8) is the first of a batch I will be reading. There are three aspects to comment on in annotated works: the original work itself, the quality of the annotations, and the lay-out. Of Mark Twain's HUCKLEBERRY FINN, little needs to be said; it is a classic, considered by many to be the great American novel. The annotations are both explanatory (e.g., telling you the definition of obscure words), and critical (e.g., telling what changes were made on the original manuscript). There are also some that provide opinions, such as on how Twain uses parallels between characters to make a point, or how ideas that appear here appear in other places in his work. I would have preferred more of the last and less of the first, since after reading these definitional annotations, I usually end", "num_tokens": 2048} {"category": "common_crawl-literature", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-literature/part-000-00000.npy", "text": "“There isn’t much else to do, is there, except stay in, until this nightmare ends I guess.”\n\nHe shut the door and went to his kitchen.\n\nAlthough he had a nagging feeling in the back of his mind, he consoled himself, hoping the madness would end soon, repeating it in his head over and over, “this was just temporary,” desperately wanting to believe all would be normal again very soon.\n\nThe banks were closed and there was no job for him to go to, and no way of leaving the house either way. What else could he do, but watch TV, and wait?\n\nMurphy was a newly made bachelor, with no one to call. Last month he and his Teresa, his girlfriend of two years, had broken up because of her infidelities. He closed the front door. He then fixed himself some breakfast and sat in front of his television, as if waiting for the newscaster to give reason to his life again.\n\nHe flipped through the channels, one after another. He noticed that most of the smaller networks showed only test patterns and the large national networks had talk shows on, in one form or another. Some had the daily news hour, now running all day long, and all of them were speculating on what might be happening to America.\n\nMurphy could tell they weren’t telling the truth about what was happening, or maybe they had no clue as to what was going on at all. He grew frustrated with the news circus. Most networks tried to suggest their reporters were in the field gathering news and the people are watching, should tune-in hourly to get the best news there first. Murphy could see, they often were standing in front of an artificial “green screen” because the tell-tale halo effect gave them away. He was, however, impressed at how good green screens looked nowadays.\n\nHe recalled years before in the early days of the millennium change, when two foolish journalists from CNN, tried cheating the people and using a green screen during the Iraq invasion. As it turned out, they were home in the States and not in the country at all. It occurred to Murphy that almost all technology is eventually used in nefarious ways by the media.\n\nAnyhow, these two Einstein’s were obviously caught in their lie. Like most idiot media nowadays, they denied it, hoping our modern short attention spans would prevail, and no one would notice it in a month or two, and we didn’t.\n\nThe nation seemed to forget all crimes nowadays; at least that is what the mainstream media wanted us to believe. The networks immediately replaced the negative news story with another story, before solving the previous calamity. This tactic was used so often it was hard to keep track of what was solved and what was not.\n\nAnyway, apparently, the studio crew forgot to turn on the background image, before broadcasting the story all over live TV and only a blank green screen showed up for the background. The story went viral. The image of these two Morons standing in front of a simple green screen, with no image behind them, looked like some awkward comedy sketch that had gone hysterically wrong.\n\nThe two were on live TV with Press helmets, acting afraid, and ducking from fake war sounds blasted through speakers in the background. To complete their comedy skit, they had a fake balcony with fake potted plants staged in front of a fake sky of green waiting for the image of the war in Bagdad, but it wasn’t there. Murphy chuckled remembering the hilarious, surreal, and impromptu comedy sketch, made even more hilarious by the fact neither one of these guys was any good at acting.\n\nHe could only imagine the meeting afterward with all of the TV executives and a bunch of disenchanted video technicians laughing their heads off in the boardroom at these two. Someone was probably fired for dropping the ball on those two buffoons. Whoever it was probably thought it was worth it.\n\nMurphy was suddenly distracted from this mental image by the sound of his neighbor in the back yard. Bob was probably working on yet another secretive and clandestine project no doubt. His neighbor was a special kind of character, prone to conspiracy theories, and gloomy end of the world scenarios.\n\nHe went to the kitchen window and saw Bob as he ran from his house to the shed and back several times, cautiously shielding his face when the choppers flew over, then looking up into the sky every now and again in rapid glances. Murphy shook his head, “Now what is that fool up to,” he wondered?”\n\nRobert Michaels, or Bob as everyone in the neighborhood called him, was a good man. He was a little odd perhaps, friendly enough, just paranoid. Murphy recalled how the last Fourth of July, Bob brought two-dozen beers over with plenty extra for Murphy. That was a good egg in Murphy’s mind. Certainly, a welcome guest at least until he drank too much, and the conversation turned to prepping or some SHTF scenario that he was working on. The evening went downhill from there for Murphy, who didn’t believe in such nonsense at the time.\n\nHe used to indulge Bob’s fantasies at first, going along with them for a spell, even agreeing with his twisted version of America’s future.\n\nMurphy felt that he had to make up excuse when Bob went off on his rants. He would claim he needed to get up early in the morning or wanted to finish some project he was working on. Murphy dropped hints, whenever he could, trying to change the subject to anything else. Bob would take the hint and politely thank Murphy for inviting him, comment what a great party it was, and head home. Either way, he certainly was not a nuisance, Bob was okay in Murphy’s book.\n\nMurphy was sorry he doubted Bob, and he was now, beginning to wonder about his unusual take on life. With the recent riots, and Martial Law he even realized that maybe; “Bob might have some good points about the prepping after all,”\n\nThis Epiphany and the end of days feeling, was now especially poignant considering the recent uprisings across the nation. This made Murphy consider Bob’s crazy notions and the prepping ideology for himself. Was he too late?\n\nSuddenly Murphy realized he would need more food before the curfew was over. Nothing on TV indicated it was going to end soon.\n\nThe national networks, broadcast brief videos, showing military police in some downtown area of some major city neighborhood, like the Bronx, New York’s downtown, Detroit, South Boston, Compton, or some other urban ghetto. The soldiers in their Military fatigues were clearing the houses, one by one, roaming the vacant streets. As they moved from house to house, searching for suspected subversives, and dissidents, they emptied people’s lives onto their front lawns for the whole world to watch on TV. This had a profound effect on Murphy.\n\nPrepping became Murphy’s new obsession. As far as Murphy was concerned nothing of any great importance ever happened in this town. He wondered why Martial Law was even declared in the first place. He reasoned that the entire country must be in lockdown because if it was here, it must be everywhere.\n\nMurphy reckoned that it all started because of a bank holiday being declared with all the nation’s bank accounts being frozen. A bank holiday is when the major banks declare all accounts suspended, meaning no transactions such as moving money in or out of the accounts is allowed. All financial transactions are shut down.\n\nWhen this happens, it is a modern day run on the banks, much like that Great Depression movie with Jimmy Stewart, “It’s a Wonderful Life,” except without the holiday fuzziness to warm your heart. This bank skullduggery drove the people into the streets. They rushed to the ATM’s and their local banks to get their money out and could not. Whatever the reason it was here to stay.\n\nBy the hour and on the hour, a talking head newscaster came on the cable TV’s emergency channel, to explain the same news that they had broadcasted the hour before, yet acting like it was the first time the fool had heard it for himself.\n\nBy late afternoon, Murphy finally gave up waiting for any news.\n\nHe decided that no one was ever going to tell anyone anything important. Especially about what is happening outside. So, he stumbled his way to the kitchen to fetch another beer from his fridge.\n\nThe rest of that evening went by, in much the same manner, with some monotone newscaster interrupting the scheduled programming, punctuated by the occasional test pattern blaring that annoying hum. Then some government official would occasionally come on spouting some treat about what was NOT actually happening in the world. It was all so pointless.\n\nThat night when Murphy went to bed, he dreamt of an apocalyptic world, where the entire planet was burning, even high-rise buildings were ablaze. Thick black smoke filled the sky, and throngs of looters running up and down the city streets, hurling bricks and wielding clubs, or pipes above their heads. The billowing plumes of smoke and ash rolled above the skyline, with large pieces of burnt trash, circling in the thermal updrafts, looking like vultures soaring above the people.\n\nAn entire week rolled by like this, with that same newscaster on every channel, and each time is repeating the same thing, in the same way, hour after hour the news droned on with no end, and no real news promised or otherwise.\n\nMurphy’s routine was the same day after day. He got up from the bed, turned on the TV, watched the news until he passed out. He would wake up later in front of the TV with the end of day montage blasting “God Bless America,” over amber fields of waving grain beneath the fading orange skies, signaling the end of the broadcasting day.\n\nHe turned off the TV and dragged himself to bed, then dreamt the same dream as the night before, and woke in the same cold sweat. Repeating this day after day, with him sitting in", "num_tokens": 2048} {"category": "common_crawl-literature", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-literature/part-000-00000.npy", "text": "20 June 2022 (EDT)\nThere is no title page - the copyright page is basically the title page, copyright and credits rolled into one - it's the first page after the cover and states \"by Walter John Williams\" --Mavmaramis 14:54, 21 June 2022 (EDT)\n\nStrike Fighters, by Tom Willard\n\nYea or nay: do you think this series belongs on the db? It's in Reginald3.--Rosab618 23:06, 11 June 2022 (EDT)\n\nDoes anyone have an opinion? --Rosab618 16:58, 15 June 2022 (EDT)\nThe ninth book in the series, Death Squad, apparently has at least one airship in it, which would possibly make it science fiction. Not sure about any of the others. ···日本穣 · 投稿 · Talk to Nihonjoe 17:23, 15 June 2022 (EDT)\n\"It is not a balloon! It is an air ship! Balloons are for kiddiewinks!\"\nBut what is the difference between an airship and a zeppelin?--Rosab618 21:08, 15 June 2022 (EDT)\nDepends on how it's defined in the book. A zeppelin is a type of airship. ···日本穣 · 投稿 · Talk to Nihonjoe 12:38, 16 June 2022 (EDT)\n\nAdding Open Library cover\n\nI'm trying to add the cover here to the book's page, but how do I do it? --Rosab618 04:43, 12 June 2022 (EDT)\n\nI'd do it by (right-)clicking on the image, save it somewhere and then upload it. Christian Stonecreek 08:52, 12 June 2022 (EDT)\nBut there's a way to just use the url. It has to be the right url, though. Which? --Rosab618 12:00, 12 June 2022 (EDT)\nNot for this OL record. OL is linking to an image from archive.org which is not on our permitted list. -- JLaTondre (talk) 12:10, 12 June 2022 (EDT)\n\nPage count rules: The Autumn Castle\n\nWhile PVing The Autumn Castle I came across notes that seem to imply the rules for entering the page count is different than how I read the rules. The book has numbered pages up to 552, and does indeed include an excerpt. Has this changed over time? Should I submit an edit? (I haven't had much luck getting responses from Chavey recently). --Glenn 01:29, 13 June 2022 (EDT)\n\nIf I remember correctly the rules were just interpreted differently: in 2010 it was not usual to include excerpts (but allowed), today excerpts are included almost every time. Christian Stonecreek 02:07, 13 June 2022 (EDT)\nThe last numbered page should be used. See the first row in the table here. As a nice compromise to capture the spirit of what the other PVer wanted, if you add the excerpt as content, with the page number where it starts, the page count for the novel will be implied quite clearly. --MartyD 10:45, 13 June 2022 (EDT)\n\nAlternate versions - forking series\n\nTamara Siler Jones (https://www.isfdb.org/cgi-bin/ea.cgi?28698) published three novels in a series.\n\nYears later, as Tambo Jones, she published versions of the same books, but broken into installments and forked. The first two books were broken into a total of 11 installments - one common installment to launch the series, and then five more installments in each branch of the series. The 'Red' Series is the original first two novels broken into installments. The 'Blue' series is a new, alternate branch. The Blue series continues into a third book (three more installments), while the Red series forks again, for two versions of the original third book (a Red version and an Orange version). A graphic that's much easier to follow is here: http://www.tambojones.com/2020/12/19/publishing-update/\n\nThe original novels are in ISFDB. The branched installments are not. My question: how should they be entered? 1. I've see an FAQ that for a novel broken into pieces, each piece should be entered as a novel. 2. I've seen info on how to handle alternate author names or book titles. 3. I have not see how to handle fully alternate versions (not just minor changes, but a new branch entirely). This is somewhat similar to Orson Scott Card's Ender/Bean (Shadow) split, but there the split storylines are consistent. Here, I believe they are mutually exclusive. Jones has provided different series names, but there's still the problem that, for example, the first installment is part one of two different series (three, if you count in the second fork).\n\nI'm not sure I'm the person to enter all this, but I thought I'd get the ball rolling, since I think the writing in the books (original novels, at least) is excellent. —The preceding unsigned comment was added by Evil Overlord (talkcontribs) . 09:21, 19 June 2022 (EDT)\n\nApologies for the delay in getting you feedback. The problem is complicated, and any organization attempt is going to be hampered by ISFDB's current limitations. Titles cannot be in more than one series, so you ultimately have to pick one (or none) and note the others. Series, however, can have sub-series. So one idea I have for you is that you could have the shared first installment in a higher-level/parent series, and then the subsequent installments could be in branch-specific sub-series. For the jumping-off point, you might need to invent a series. For example, using her terminology and organization, you might have something like:\nSeries: Dubric Multi-Timeline\n1 Title: Weight of the Castellan's Curse\n2a Series: Winter of Ghosts\n2 Title: Protection of the Holy Knights\n3 Title: The Seer of Truth\n6 Title: A Film of Blindness\n7 Series: The Stone Spies (1)\n1 Title: The Well Diggers Son\n2b Series: Ghosts in the Snow\n2 Title: The Lord's Apparent Razor\n3 Title: The Linen Maid's Choice\n4: Series: Threads of Malice (1)\n1 Title: Rabbits & Wasps\n4 Series: The Valley (2)\n1 Title: A Tale of Two Boys\n2a Series: Pieces of the Valley\n2 Title: The Secret of Cyprus Farms\n2b Series: Valley of the Soul\n2 Title: What the Camera Sees\n(1) I can't tell from the diagram how these second series on the blue/red paths relate to the prior series on the same path. If they are not sub-series, then I think the best thing to do would be to make up parent series for the blue path and the red path, and then put the relevant series into them, in order. So something like:\nSeries: Dubric Multi-Timeline\n1 Title: Weight of the Castellan's Curse\n2a Series: Blue Path (but with a better name)\n1 Series: Winter of Ghosts\n\n2 Series: The Stone Spies\n\n2b Series: Red Path (but with a better name)\n1 Series Ghosts in the Snow\n\n2 Series: Thread of Malice\n\n3 Series: The Valley (2)\n1 Title: A Tale of Two Boys\n2a Series: Pieces of the Valley\n\n2b Series: Valley of the Soul\n\n(2) Here you would make up a name/series to hold that first title plus the sub-series. In my first example, the number on that made-up series is a proxy for that first title's position in the ongoing series, while the number on the title shows us it's the first at the branch point.\nI hope that helps a little. Others may have some better ideas for you. --MartyD 12:52, 26 June 2022 (EDT)\n\nIllustrator name misspelled\n\nThe author record for illustrator Emanuel Schongut has his last name misspelled as \"Shongut\". Could a moderator please correct the spelling to the correct \"Schongut\"? I noticed this while doing a pub update for The Exile of Ellendon. The Flickr link in the The Shepherd Is My Lord record confirms this spelling as well. Thanks! Phil 22:27, 20 June 2022 (EDT)\n\nIn the future, you can change these by editing the cover art title page and correcting the spelling. I've done these two. ···日本穣 · 投稿 · Talk", "num_tokens": 2048} {"category": "common_crawl-literature", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-literature/part-000-00000.npy", "text": " heart.\n\nYet what, Margaret, will be the state of your mind? You will not hear of my destruction, and you will anxiously await my return. Years will pass, and you will have visitings of despair, and yet be tortured by hope. Oh! my beloved sister, the sickening failing of your heart-felt expectations is, in prospect, more terrible to me than my own death. But you have a 253husband, and lovely children; you may be happy: heaven bless you, and make you so!\n\nMy unfortunate guest regards me with the tenderest compassion. He endeavours to fill me with hope; and talks as if life were a possession which he valued. He reminds me how often the same accidents have happened to other navigators, who have attempted this sea, and, in spite of myself, he fills me with cheerful auguries. Even the sailors feel the power of his eloquence: when he speaks, they no longer despair; he rouses their energies, and, while they hear his voice, they believe these vast mountains of ice are mole-hills, which will vanish before the resolutions of man. These feelings are transitory; each day of expectation delayed fills them with fear, and I almost dread a mutiny caused by this despair.\n\n254September 5th.\n\nA scene has just passed of such uncommon interest, that although it is highly probable that these papers may never reach you, yet I cannot forbear recording it.\n\nWe are still surrounded by mountains of ice, still in imminent danger of being crushed in their conflict. The cold is excessive, and many of my unfortunate comrades have already found a grave amidst this scene of desolation. Frankenstein has daily declined in health: a feverish fire still glimmers in his eyes; but he is exhausted, and, when suddenly roused to any exertion, he speedily sinks again into apparent lifelessness.\n\nI mentioned in my last letter the fears I entertained of a mutiny. This morning, as I sat watching the wan countenance of my friend—his eyes 255half closed, and his limbs hanging listlessly,—I was roused by half a dozen of the sailors, who demanded admission into the cabin. They entered, and their leader addressed me. He told me that he and his companions had been chosen by the other sailors to come in deputation to me, to make me a requisition, which, in justice, I could not refuse. We were immured in ice, and should probably never escape; but they feared that if, as was possible, the ice should dissipate, and a free passage be opened, I should be rash enough to continue my voyage, and lead them into fresh dangers, after they might happily have surmounted this. They insisted, therefore, that I should engage with a solemn promise, that if the vessel should be freed I would instantly direct my course southward.\n\nThis speech troubled me. I had 256not despaired; nor had I yet conceived the idea of returning, if set free. Yet could I, in justice, or even in possibility, refuse this demand? I hesitated before I answered; when Frankenstein, who had at first been silent, and, indeed, appeared hardly to have force enough to attend, now roused himself; his eyes sparkled, and his cheeks flushed with momentary vigour. Turning towards the men, he said—\n\n“What do you mean? What do you demand of your captain? Are you then so easily turned from your design? Did you not call this a glorious expedition? and wherefore was it glorious? Not because the way was smooth and placid as a southern sea, but because it was full of dangers and terror; because, at every new incident, your fortitude was to be called forth, and your courage exhibited; because 257danger and death surrounded, and these you were to brave and overcome. For this was it a glorious, for this was it an honourable undertaking. You were hereafter to be hailed as the benefactors of your species; your names adored, as belonging to brave men who encountered death for honour and the benefit of mankind. And now, behold, with the first imagination of danger, or, if you will, the first mighty and terrific trial of your courage, you shrink away, and are content to be handed down as men who had not strength enough to endure cold and peril; and so, poor souls, they were chilly, and returned to their warm fire-sides. Why, that requires not this preparation; ye need not have come thus far, and dragged your captain to the shame of a defeat, merely to prove yourselves cowards. Oh! be men, or 258be more than men. Be steady to your purposes, and firm as a rock. This ice is not made of such stuff as your hearts may be; it is mutable, cannot withstand you, if you say that it shall not. Do not return to your families with the stigma of disgrace marked on your brows. Return, as heroes who have fought and conquered, and who know not what it is to turn their backs on the foe.”\n\nHe spoke this with a voice so modulated to the different feelings expressed in his speech, with an eye so full of lofty design and heroism, that can you wonder that these men were moved. They looked at one another, and were unable to reply. I spoke; I told them to retire, and consider of what had been said: that I would not lead them further north, if they strenuously desired the contrary; but that I hoped 259that, with reflection, their courage would return.\n\nThey retired, and I turned towards my friend; but he was sunk in languor, and almost deprived of life.\n\nHow all this will terminate, I know not; but I had rather die, than return shamefully,—my purpose unfulfilled. Yet I fear such will be my fate; the men, unsupported by ideas of glory and honour, can never willingly continue to endure their present hardships.\n\nSeptember 7th.\n\nThe die is cast; I have consented to return, if we are not destroyed. Thus are my hopes blasted by cowardice and indecision; I come back ignorant and disappointed. It requires more philosophy than I possess, to bear this injustice with patience.\n\nSeptember 12th\n\nIt is past; I am returning to England. I have lost my hopes of utility and glory;—I have lost my friend. But I will endeavour to detail these bitter circumstances to you, my dear sister; and, while I am wafted towards England, and towards you, I will not despond.\n\nSeptember 9th, the ice began to move, and roarings like thunder were heard at a distance, as the islands split and cracked in every direction. We were in the most imminent peril; but, as we could only remain passive, my chief attention was occupied by my unfortunate guest, whose illness increased in such a degree, that he was entirely confined to his bed. The ice cracked behind us, and was driven with force towards the north; a breeze sprung from the west, and on the 11th 261the passage towards the south became perfectly free. When the sailors saw this, and that their return to their native country was apparently assured, a shout of tumultuous joy broke from them, loud and long-continued. Frankenstein, who was dozing, awoke, and asked the cause of the tumult. “They shout,” I said, “because they will soon return to England.”\n\n“Do you then really return?”\n\n“Alas! yes; I cannot withstand their demands. I cannot lead them unwillingly to danger, and I must return.”\n\n“Do so, if you will; but I will not. You may give up your purpose; but mine is assigned to me by Heaven, and I dare not. I am weak; but surely the spirits who assist my vengeance will endow me with sufficient strength.” Saying this, he endeavoured to spring from the bed, but the exertion was 262too great for him; he fell back, and fainted.\n\nIt was long before he was restored; and I often thought that life was entirely extinct. At length he opened his eyes; he breathed with difficulty, and was unable to speak. The surgeon gave him a composing draught, and ordered us to leave him undisturbed. In the mean time he told me, that my friend had certainly not many hours to live.\n\nHis sentence was pronounced; and I could only grieve, and be patient. I sat by his bed, watching him; his eyes were closed, and I thought he slept; but presently he called to me in a feeble voice, and, bidding me come near, said—“Alas! the strength I relied on is gone; I feel that I shall soon die, and he, my enemy and persecutor, may still be in being. Think not, Walton, that in the last moments of my existence I feel that 263burning hatred, and ardent desire of revenge, I once expressed; but I feel myself justified in desiring the death of my adversary. During these last days I have been occupied in examining my past conduct; nor do I find it blameable. In a fit of enthusiastic madness I created a rational creature, and was bound towards him, to assure, as far as was in my power, his happiness and well-being. This was my duty; but there was another still paramount to that. My duties towards the beings of my own species had greater claims to my attention, because they included a greater proportion of happiness or misery. Urged by this view, I refused, and I did right in refusing, to create a companion for the first creature. He showed unparalleled malignity and selfishness, in evil: he destroyed my friends; 264he devoted to destruction beings who possessed exquisite sensations", "num_tokens": 2048} {"category": "common_crawl-literature", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-literature/part-000-00000.npy", "text": " She made a graceful summersault in the air, twisting to land facing the Butcher's goalpost. Not pausing to see Ribs land, she heard the thud after several steps. Clear now, she felt amazing, and within seconds was close enough to score. With a solid kick, she slammed the ball into the Butcher's goalpost, and she took a moment to watch with pride as the score cards flipped over to show 4-0. She jogged back to the field, surveying her team's status. Two of her Hunters had been carried off, to one Butcher that looked like she had a broken leg. Chase was still dodging and weaving around the other boy, and Ribs was just beginning to stand up from her kick, a bruise already forming on his forehead. Out of the corner of her eye, she watched as the Butcher's representative, Boiler, she thought, drop kick the ball out, over her head, and back onto the field, in the center, between Ribs and Chase. Ribs immediately broke into a sprint towards it, and Chase, likewise, disengaged from his opponent and ran for the ball. The two met in a flurry of fists and clubs, both trying to knock the other out for control of the ball. She ran to help out her brother, but was cut off by his earlier adversary. He eyed her with a cold grin, flipping a flat stick of metal over in his hand. Flatiron, his name was. She knew she didn't have long, Chase couldn't handle Ribs, even injured as he was from her kick. She ran straight at the boy. It caught him off guard, and she used the slight flinch to jump forwards, planting her hands on his shoulders. She vaulted over him, high into the air. This high in the air, she could see another of her Hunters coming from further down the field, a very young girl named Jaci. Devana pulled a small sling from her pocket, and, in midair, twisted to launch a rock at the ball between the two boys. It struck, knocking the ball out and away from the two, and towards Jaci. Ribs jumped after it, earning a club to the back of the head from Chase. Jaci met the ball, and began running down the field. Devana landed hard, and her chest complained from its earlier hit. She watched Jaci run downfield, but the girl was no match for Flatiron's speed. Ignoring her own pains, Devana began running, not towards Jaci, Chase could handle that, but towards the goal herself. She felt the ancient powers she had always known well up inside of her, and bracing for impact, released just as Flatiron swung his bar towards Jaci's head. In an instant, she felt the bar strike her, and she fell into the grass for the second time this game. She watched, as downfield, Jaci stumbled a bit from the disorientation of Devanna's moon blessing, but the girl was clear for the goal. Just before her vision went black, Devana saw Jaci kick their second goal. Then she smiled as everything went black. Her crazy plan had worked. It would be up to the rest of her team to finish it now. Across the field, a white haired girl sat in the bleachers and watched as Devanna shifted, then fell. She idly spun a snowball in the seat next to her, before the barest of smiles crept across her pale face, and she left, leaving the snowball to melt, and the game to finish. She'd seen what she needed.\n 5. Forum Challenge - Making the Cut\n\n Just do it. Slit his throat. He's lying there, waiting. \"No\" she said. The man in the barber chair opened his eyes looking up at her, her thick black fringe sticking to her forehead, she was profusely sweating. \"I-is everything alright?\" He stuttered. Valerie just smiled, before sliding her straight edge back across his supple throat, then back down again, taking away the soap with it. She wiped the blade on the flannel over his shoulder, \"DONE\" she exclaimed; an odd tone of relief rang through her voice. What a waste of time. She left him in the chair, getting some cold water to drink in the back of shop- \"cool and calm\" she said to herself quietly, staring straight at the water settling down after her swig. \"Cool and calm\". \"Valerie.\" Edge interrupted her thoughts, \"its time, get your kit, we're about to kick off.\" Valerie nodded at Edge, \"I'll be there shortly.\" The Barbers Guild team captain, nodded and replied, \"good, don't want to lose our star so soon.\" He winked and left, laughing. What was so funny, she thought to herself- probably at what you did to that baker boy last week. She shook the voice from her head and walked back into the barber shop. The Barbers Guild were relatively new to the game of Guild Ball, but each district the guild was in, were trying players out for the main team. Valerie was the newest of this team, having only played one game, which she was reluctant to play in. She said she wouldn't play again after the incident but Edge had insisted she had to play one more game. One more game to impress the Longshanks. Edge had big plans for his team, really get the Barbers on the map, or as he would say \"get a slice of the pie.\" Edge was the one who took her in when she had nowhere to go, he hadn't said he'd figured out where she'd come from, but Valerie thought he probably had guessed. Edge was different, the only person she'd met that she didn't have to stop her self from harming, she hadn't worked out why yet. There were quite a few people int he crowd, all Local to their region, but none Valerie knew, the rest of her team were waving and shouting to their friends and family. The opposing team were doing the same, members drawn in from the local Gardeners Guild. Gardening was a trade only the wealthy could afford, so it was obvious how they had special kits made up embroidered and clean. Valerie's kit wouldn't come clean. The stain of the baker boys blood still splattered up her sleeves. The Gardeners were all glaring at her, the Baker whose blood she was sporting was the cousin of the Gardeners team captain, so she thought he wouldn't be the most easy going in this game. The gardener captain was a tall man, white, styled hair, clean shaven with a little knick just below his chin. Clearly the sign he's started shaving his own face after last weeks game. Let's open that cut up \"Stop it.\" She said to herself, \"it's just a game, no one needs to get hurt.\" But someone will, either us, or them. Valerie hated to admit it, but she was right. The two captains shook hands and the Gardener whispered in Edges ear. Edge, a stocky man, bald head and a thick beard, turned round, his face white and ghost like. What he heard must have chilled him deeply. The score was in favour of the Gardeners and they were outnumbering the Barbers with 6 to 4, it was just Edge, Valerie, Soap, and old barber, a veteran of the century war and Tyson, Edge's pet chihuahua. A very small animal with a styled Mohawk between his ears. As He looked ridiculous, had little impact on the game, but he was very distracting and the crowd loved him. Whilst she was looking at the miniature dog, she saw him barking at Edge, who had two Gardeners laying into him. They stepped back as he collapsed, a pile of black cloth, beard and tattoos. She saw them laughing as time seemed to slow, and squaring up to Tyson, ready to attack the mascot. Tyson! \"Don't worry Valerie, we've got this\" she said reassuring the voice in her head. Valerie charged the two Gardeners before they could get too close to the dog, she slit the throats of the young one in one quick flurry with her straight edge. At the same time she grabbed the ponytail of the other and dragged him to the floor then started kicking his head, turning it to a bloody mush, glistening on the grounds. The crowd went silent, clearly in shock of this display of violence. She let out a deep breath, then slowly turned to the Gardener captain, his face whiter than Edge's was at the start of the match. Valerie wasn't in control now. She flicked her straight edge, cleaning it in an instant, she'd clearly done this before the Garner worried... \"Her\", Longshanks said to his hooded associate. \"We want her in the Barbers Guild.\" \"But, but she's uncontrollable, unhinged, unhealthy!\" \"She's perfect. She's fury, rage and beauty.\" The associate looked across the pitch at Valerie. Her thick black hair, messy and stuck to her face in a mix of blood, saliva and sweat. \"Beauty?\" He questioned, \"are, are we looking at the same woman?\" \"Just picture it, the revenue. She'll draw them in for her beauty before the match, then keep them there with her displays of violence. Perfect to elevate this start up Guild to the big leagues.\" Longshanks started to laugh, the only sound in the crowd of people watching Valerie sat in the middle of the pitch, stroking Tyson, both of them covered in the Gardeners teams blood. \"Calm and Cool. Calm and Cool.\" Valerie repeated over and over to herself and the little dog.\n 6. Forum Challenge - The Fool\n\n The short story of a rookie looking", "num_tokens": 2048} {"category": "common_crawl-politics", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-politics/part-000-00000.npy", "text": " when you look at the policies and leadership of the modern Labour Party, it's hard to imagine it being a party which would have any appeal to religious people. But you'd be wrong...\n\nReality: In New Zealand if you are religious, you are more likely to vote for Labour than for National. In fact you're more likely to vote for Labour than anyone. \n\nThere are two likely causes for this: The first is that historically Labour did have a strong Christian base. Michael Joseph Savage referred to the introduction of the welfare state as \"applied Christianity\", Walter Nash was extremely religious and sympathetic to the temperance movement (hence his infamous \"black budget\" taxing alcohol) and Norman Kirk was a devout Catholic who introduced the DPB as a means to discourage abortion. \n\nThe second is that Pacific Islanders are an integral part of Labour's voting base - and they also happen to be more religious than most other demographics. \n\nOf course, Christianity isn't the only religion out there, but most non-Christian religious voters also tended to vote for Labour - although it should be noted that ACT enjoy a considerable level of support from non-Christian religions, especially Buddhism.\n\nMyth #3:\n\"The rich are right-wing, the poor are left-wing\"\n\nOrigin: Throughout most of the 19th and 20th centuries, there existed a class conflict between the \"working class\" proletariat and the \"middle class\" bourgeoisie. \n\nThis led to the rise of Labour movements, socialism and even communism and as such the battle line was generally clear-cut between the socialistic working class left, and the capitalistic middle class right. \n\nBy the 21st century, with socialism roundly debunked and defeated, and new conflict emerging between globalism and nationalism, the lines are far more blurred and the assumption that working class people will always vote for left-wing parties is no longer a safe one to make. \n\nReality: In New Zealand in 2014, National gained a higher share of the working class vote than Labour (38% to 35%), suggesting that working class voters are migrating rightwards. In fact that party with the largest share of voters in the \"working class\" income band of $10K to $35K is New Zealand First - while NZ First are not a right-wing party, they're certainly not left-wing either. \n\nWhile Labour remain most popular among the \"precariat\", that is the voters with absolutely nothing whatsoever (the below $10K earners), their even further left-wing partners the Greens - despite being the only party to openly call for more and larger benefits - appeal to neither beneficiaries nor working class voters. In fact Green voters are almost as rich as National voters, and party is undoubtedly the party of the \"urban rich\". \n\nMeanwhile on the far right, ACT - who are stereotyped as a party of the ultra-wealthy - actually have a surprisingly middle class, student-y voter base, being not nearly as wealthy as National or Green voters. Surprisingly, a large number of ACT voters fall into the \"no income\" bracket, although this is probably best explained as being the result of business owners making a loss. \n\nAll of the above suggests that income and social class are no longer as big a driver of voting habits as they were in the last century. \n\nBonus myth:\n\"The Greens are eco-friendly\"\n\nOrigin: You'd think a party called the \"Greens\" and who are constantly advocating for environmental issues would possibly practice what they preach and be that eco-friendly in real life wouldn't you?\n\nReality: The Greens appear to have more carbon miles per MP than almost any other political party. As much as I'd love to believe that the party spent $1,471,026 on electric minivans and bicycle rides to Wellington and back, we all know most of this went on air travel - although where and why remain a mystery. \n\nAbout the author\n\nAlex Eastwood-Williams<|endoftext|>Direct Action/Ann Hansen, in conversation with Peter Steven of Between the Lines Press, 2001\n\nfrom http://www.kersplebedeb.com/mystuff/profiles/vancouverfive.html\n\nPeter Steven: Direct Action is a book about radical politics that might seem uncomfortably close to advocating violence. Given the events of September 11 in the U.S. what are your thoughts and feelings about what happened in New York and Washington?\n\nAnn Hansen: My first reaction was deep sorrow for those who died and compassion for those who must endure the pain of living without those people. Sadly, those who died were the innocent victims of both the suicide-bombers and the U.S. legacy in the Middle East. Sadly, because those who died were no more responsible for U.S. foreign policy than the Afghan people are of the Taliban’s policies.\n\nPS: During your days in the early 1980s as a member of « The Squamish Five » or « Direct Action » you committed robberies, firebombed stores, and toppled hydro towers, in British Columbia, and bombed the Litton plant in Toronto. Most people who pick up your book will want to know if you still believe in political violence. How do you respond?\n\nAH: I am certainly not opposed to peaceful protest. Yet, I also believe that to make real social change people and movements must be prepared to go beyond. In some cases that means so-called political violence. We didn’t see ourselves as terrorists. I prefer the term sabotage because that implies a strategic action, with references to economic issues, and not simply a violent reaction or lashing out in frustration. I don’t agree with terrorism as a political tactic because it is morally wrong to punish the innocent for the crimes of their leaders. And it’s not politically effective because fear does not enlighten people, but instead will often drive them to support even more reactionary actions by their leaders.\n\nOur goals were to expose Litton’s role in arms production and to stop the environmental destruction within B.C.\n\nPS: You’ve admitted some mistakes. Are you sorry about the past?\n\nAH: I’m sorry about some things that happened, but not everything. An underground group was probably not necessary–we should not have been so isolated from the social movements. The bomb we used at the Litton building was too big and we didn’t properly assess the police response. We thought that they would take our warning seriously and clear the building. I am very sorry that people were hurt. And yet, there was, and is, huge damage being done by our governments–look at the legacy of the Cruise missile, in the Gulf War, for instance.\n\nPS: How would you now assess your mistakes: youthful naivety, impatience, poor politics?\n\nAH: We suffered from all those mistakes, and we also didn’t fully think through the consequences. But the most important error was in not realizing that without a revolutionary social movement in place urban guerrilla tactics won’t work–there is no continuity. These links between social movements and radical actions are strategic political questions that must be addressed. Global warming and climate change are huge problems–nobody seems very concerned.\n\nPS: What was the biggest misconception that people had about your group?\n\nAH: That we believed we could create a revolution ourselves. On the contrary, our aims were always more modest–to jolt activists into seeing the seriousness of the issues, and to hope that our radical actions might spark a new militancy. During our trial and afterwards we were looked at with a magnifying glass, but there was no serious discussion about the need for, and effectiveness of, our strategies.\n\nPS: What were your thoughts when you saw the demonstrators at Quebec City and Seattle?\n\nAH: I felt great. Here, finally, is a broad-based movement that encompasses so many issues. The mainstream media gravitate to the sensational and the most violent of tactics. They ignore the substance. Of course, the demonstrators went to Quebec with many motives. For some it’s exciting to be involved and close to danger. It’s also the result of genuine frustrations. I like to see these events in all the shades of grey.\n\nWhat the media have missed in the recent international protests is that the actions are not indiscriminate. The targets are generally international corporations with a bad public record towards the environment or their workers, etc. These include the banks, the big car companies, the high-end clothing outfits, the McDonalds of the world. In other words the targets are politically motivated. Let’s not forget that politically directed events formed an important element in the civil rights and the anti-Vietnam movements.\n\nPS: Is your book meant to be a cautionary tale for young political people today?\n\nAH: Yes, to some extent it is. Many young people in this contemporary moment don’t think through the consequences of their actions. There are risks involved in serious political opposition and certainly when engaging in sabotage. Young people today could, perhaps romantically, duplicate our actions and also, like us, act without understanding the consequences. People should realize that the powerful will not sit back. There will be repression. But I mainly want the book to inspire more militancy, not less.\n\nI really want a discussion of « going beyond. » I want real debate about these issues of sabotage and of going beyond legal protest. Unfortunately, there has been almost no reasoned discussion of illegal actions or uncivil disobedience. But history has shown that violence will be used by the police and the state, and some in the opposition will always move in that direction as well. So we must discuss it.\n\nPS: Many people in the peace movement, such as the Toronto Disarmament Movement activist Murray MacAdam, argue that your forms of protest set the movement back. How would you respond to that?\n\nAH: I respect his work but I still feel that if there is going to be social change there will be repression. If a movement is not strong enough to withstand some of this repression or", "num_tokens": 2048} {"category": "common_crawl-politics", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-politics/part-000-00000.npy", "text": " the University of Alabama blocking the entrance of two black students. However, Democratic President John Kennedy ordered him to stand aside (or else!).\n\nThe Civil Rights Movement, designed to end the Jim Crow Laws and practices, were brought about by white Republicans and blacks – but mostly blacks. Finally federal laws were drafted to end the Jim Crow laws. Democratic President Lyndon Johnson sided with the Republicans and against his own party when he supported and signed the Civil Rights Act of 1964, thereby ending the Jim Crow Laws.\n\nNotable Politicians\n\nAlthough it was the Democratic party members that fought for slavery, Jim Crow laws, racial discrimination, and against the Civil Rights Movement, we should remember it was both the offical Democratic and Republican parties that ended the state and local policy of discrimination.\n\nRepublican President Dwight Eisenhower sent troops to integrate schools in Little Rock, Arkansas in 1954.\n\nDemocratic President John Kennedy told Democratic governor George Wallace to stand aside, allowing black students to enroll in the University of Alabama.\n\nDemocratic President Lyndon Johnson, going against his own party, sided with the Republicans and signed the 1964 Civil Rights Act.\n\nOf all the racism in the United States, we should remember racism is essentially an individual act. Racists are people, and government is run by people. Sometimes you're going to find racist government policies. But when American Citizens begin campaigning against racist policies, both Democrats and Republicans take steps to end them.\n\nThe lesson is that some people in the United States are racist, but the United States is not a racist nation.\n\nCopyright © 2015 by Jerald L. Brown<|endoftext|>🗯️ We Have Met the Enemy, and He is Us\n\nuserpic=divided-nationThe recent discussions of Ilhan Omar and antisemitism have reignited the debates of racism and divides in this country.  On the Democratic side there is the push to condemn antisemitism while not offending those who either disagree with the behavior of the Israeli government, or to include other racist attacks. On the Republican side, there is the push to condemn antisemitism while ignoring similar behavior within the Republican party. But the truth is, despicable behavior and intolerance — racial, political, and other — exists on both sides.\n\nThe Atlantic had an interesting article recently exploring this. The Atlantic asked PredictWise, a polling and analytics firm, to create a ranking of counties in the U.S. based on partisan prejudice (or what researchers call “affective polarization”). The result was surprising in several ways. First, while virtually all Americans have been exposed to hyper-partisan politicians, social-media echo chambers, and clickbait headlines, we found significant variations in Americans’ political ill will from place to place, regardless of party. The maps show that affective polarization occurs on both sides of the aisle: there is intense political hatred and bias occurring in both Red and Blue areas. A NY Times opinion piece refers to this as the culture of contempt:\n\nPolitical scientists have found that our nation is more polarized than it has been at any time since the Civil War. One in six Americans has stopped talking to a family member or close friend because of the 2016 election. Millions of people organize their social lives and their news exposure along ideological lines to avoid people with opposing viewpoints. What’s our problem?\n\nI know I’ve fallen into this. I’ve begun to block memes from the side I disagree with: I find them annoying, but it is pointless to comment on them and point out the errors because the other side won’t listen anyway. Why won’t they listen? Another article I found explores this quite well, detailing 24 cognative biases that shape our thinking. These are flaws in human reasoning that political machines can exploit to make our biases stronger. You can combat them to some extent if you know what they are (just as you can filter out the bias from news sources if you know it), but you will never succeed completely.\n\nThese biases and prejudices and hatred and contempt are playing out in many discussions we see in the news today. But it isn’t just the news. Racism and hatred can be anywhere, including your local knitting store. Online bots can take racism and hatred, and amplify it. The best way to combat it? First, educate yourself to recognize it. Second, speak out and don’t let it go unchallenged. Third, engage as much as you can. There is a balance between those who cannot be redeemed, and those whom you can educate about their bias. Don’t expect to change minds immediately; but do work to plant the seeds.<|endoftext|>Essay Sample Describing the Israel and Palestine Conflict\n\nPublished: 2022-05-19\nType of paper:  Essay\nCategories:  International relations War\nPages: 5\nWordcount: 1181 words\n10 min read\n\nThe terms peace and conflict are two contradictory terms that define the opposite of each other. Peace is a state of tranquility and calmness, in this situation, peace is the state where there is no war. While conflict is a protracted disagreement between two or more parties that may end up becoming armed violence. Other terms that involve peace and conflict; they include peacemaking, peacekeeping, and peacebuilding.\n\nIs your time best spent reading someone else’s essay? Get a 100% original essay FROM A CERTIFIED WRITER!\n\nPeacemaking is a practical attempt to give equitable power to all parties involved in a disagreement in an attempt to prevent future conflicts (Immel & Thomson Gale (Firm), 2011). Peacemaking aims at attaining a mutual reconciliation among parties in a conflict. Peacekeeping, on the other hand, is a process that comes in a post-conflict situation; it involves the deployment of peacekeeping troops and peacekeeping observers who play a critical role in monitoring and observing the peace process. They assist ex-combatants in the implementation of peace agreements. This involves helping in social and economic development, ensuring that there is electoral justice by providing necessary assistance in the electoral process and strengthening the rule of law. Peacebuilding seeks to ensure that there is durable peace, it focuses on the causes of conflicts and addressing them, peacebuilding also concentrates on reconciliation among conflicting parties and those affected by conflicts, it also focuses on economic transformation, strengthening institutions and political change which ensures that there is a durable peace.\n\nThe focus here is the conflict between Israel and Palestine. The creation of the Jewish state is the point of contention. The idea of the creation of a Jewish state is rooted in the cultural and religious beliefs of the Jewish people. The Napoleonic war led to the rise of movements among this was Zionism that set out the idea for a homeland for the Jews (Ellis, M. H. 2002). In 1917 the Balfour Declaration by the United Kingdom endorsed the establishment of a home for the Jews in Palestine. In 1922 the British government accepted this by agreeing to the British Mandate for Palestine. In 1920, 19-26 April during the San Remo Conference, the European powers mandated the establishment of a Jewish homeland. And later in the year 1948, the state of Israel was established.\n\nThe conflict that began as an intercommunal conflict in Mandatory Palestine between Arabs and Jews from the year 1920 fully erupted in 1948 after the establishment of the state of Israel (Slavicek, L. C. 2009). After the six-day war of 1967 where Israel took control of the Gaza Strip and West Bank from Egypt and Jordan respectively where Palestinians sought refuge after the establishment of the state of Israel, the war brought a new dimension.\n\nCritical issues in this conflict are the control of the Gaza Strip and the West Bank, the mutual recognition of borders (Shoshan, M. 2010), the power of Jerusalem. Both Israel and Palestine want to control the city that holds cultural and religious significance to both parties, water rights; access to clean water, an Israeli settlement, Palestinian to have freedom of movement and the right for their return. The above fundamental issues are the reasons for the intractable war between Israel and Palestine.\n\nEfforts have been made over the decades of the conflict to try and find a peaceful solution to it. Peacemaking, peacebuilding, and peacekeeping have been used to try and resolve the conflict and maintain peace in the region (Abd H. M. & PASSIA. 2005). Here we focus on the efforts made by the United States of America and their support of the creation of the Jewish state in Palestine.\n\nThe Balfour Declaration and the British Mandate were drafted in both Britain and the USA, a judge in the US Supreme Court Justice Louis Brandeis helped in the drafting. Because the US supported the establishment of the Jewish State, they, therefore, are concerned with the conflict between Israel and Palestine. Without a doubt, the US is directly involved in the dispute. They have shown efforts to find a mutual understanding between the parties to try and end the violence.\n\nThe United States as a member of the quarter on the Middle East through its envoys and in partnership with other members of the quarter, they have made efforts through mediation to find common ground between Israel and Palestine. The United States through its president Bill Clinton witnessed the signing of the Oslo Agreement on 13th September 1993 between Israel and Palestine. The agreement stipulated for the withdrawal of Israeli troops from West Bank and the Gaza Strip and that an interim self-governing authority should take place within a transitional period of five years that was to lead to a permanent settlement by resolutions 242 and 338.\n\nAnother effort was made by the US to help achieve peace between Israel and Palestine after the Oslo Agreement was rejected by Hamas and other Palestinians rejectionists, who launched bombs into Israel", "num_tokens": 2048} {"category": "common_crawl-politics", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-politics/part-000-00000.npy", "text": " candidate for monsanto & you make me sick !\n\n 136. Monsanto is a weapon, Donald Rumsfeld was CEO of Monsanto.\n Monsanto had and has ex-executives that are now heads of government departments. Bush Rumsfeld Cheney and other have shares in Monsanto since the late 70's early 80's.\n\n 137. As much as I hate monopolies, I hate lies even more - policies and political actions governed by silly emotions have no place in a conversation.\n\n Firstly, the term is GM crops, not GE crops (for the dimwits up top).\n\n Secondly, DDT (or GM crops for that matter) have still not been linked to ANY health issues in people; this argument is as stupid as Jenny McCarthy pretending to be an expert on the fake link between inoculations and autism, or the 9/11 Troofer movement. In fact, an estimated 6 million people have died of Malaria since DDT was banned. Organic food, on the other hand, is granted the right to use Copper as its primary fungicide, which is 200 times more toxic than the biodegradable chemicals used in synthetic farming.\n\n Organic farming cannot produce more than 80% (on average)of the yield of synthetic farming, and uses much more energy per acre. People who think organic is the solution are simply uneducated...or they are implying that they advocate that most of the third world needs to die off so that the ycan continue to stoke their yuppy ego. Furthermore 8 in 9 food contamination incidents in stores and markets came from small, family farms, 80% of which were organic.\n\n EVERY crop is genetically modified - they are all products of eugenic practices, not of which occured in nature. Tomatoes were bred from the poisonous Nightshade plant.\n\n 90% of crops are grown on small scale family farms, not on giant corporate farms - this is just another straw man anti business argument.\n\n The more I read the comments on this site, the more I feel that we deserve to starve to death.\n\n 138. In the U.S., you will have to buy only organic (or grow your own) foods. This will cost you a bit more, but it's what I've chosen to do, for more reasons than just one. There is no reason why anyone should trust Monsanto, given their track record. The U.S. government should stop subsidizing their crops and instead subsidize organic agriculture. Also, you should make sure none of your portfolios include Monsanto stock. I would also encourage everyone else to watch this film. Bravo to the producer and director, well done. We need to do more, all of us. And it can be done. The problem is ignorance and greed.\n\n 139. sounds like mosanto is fammine of the 4 horsemen. Definetly doing a good job bullying farming communities into poverty and hiding any adverse effect gm crops have and this is only the beginning.\n\n worrying information. how the hell do you stop something like this?\n\n 140. Rick, sorry but Obama hasn't taken your guns away, but he has given you healthcare in case you do get shot by someone that points a gun in your direction. Understand why you are angry at the government, but privatising profits and socialise losses was something that GW.Bush started, a Republican president. You keep your guns, eat your burger, and idolise your Glen Beck and Fox News, and thank Obama for keeping you alive, because healthcare is something everyone now has access to.\n\n 141. the true answer is to EAT ONLY ORGANIC food, instead of using any MOnsanto produce whatsoever, and boycott them...this is the only solution against such a large global company!lets not just talk about it and throw insults...THE UNIVERSE REWARDS ACTION x\n\n 142. disgusting seeing these type of companies taking what the want, not caring for anything but them selves. how do the people who run these types of business's is beyond me.\n\n 143. jkaz, Bluesmanwalking and others, DO NOT DESPAIR!!! WE NEED YOU for the fight against these giants, and they are NOT as invincible as they look! A movement of disillusioned farmers is already afoot. \"People power\" is already amassing, and it's more powerful than all the lobbyists and all the guns money can buy. Without lobbyists, and without millions in treasure, People ended Jim Crow, People halted union-busting, People cut Big Tobacco down to size, and now People will challenge Monsanto. \"People power\" means WE NEED YOU! Check out what Pesticide Action Network is doing, for example. I don't represent them, but they can give insight into what's being done. So far it's just the seed of a grassroots movement (no pun intended) and it is growing. We can collapse in despair (what Monsanto wants us to do) or WE CAN JOIN THE FIGHT! We should cry if we need to; it is a heartbreaker, but let's get it out of our systems so we can get to work on what we can do to take this giant DOWN so they do harm no more. We MUST overturn Diamond v. Chakrabarty (1980), the decision that legalized the patenting of living things. Even if you can only use your purchasing power, use it! Learn how you can avoid making purchases that benefit Monsanto, and tell others what you're doing. Think outside the box. These creeps got powerful under cover of darkness. They are not immovable.\n\n 144. When I watched this I just cried. Anger mixed with helplessness. Monsato and the like are parasites on this planet, their greed knows no bounds. I would like to be positive but basically we are screwed.\n\n 145. Monsanto - the monstrous green plague. Pure evil. They destroy the world. They lie.\n\n Genetics is not the enemy. But they way Monsanto uses the technology (bad science, lying, rash decisions)for evil short sighted gains is. With such technology the utmost precautions should have been taken. Instead no precautions were taken.\n\n GMO's should have been quarantined from the natural environment... In space or lifeless planets, air tight facilities or on isolated islands. But not so...\n\n Complete corruption. We shall all suffer.\n\n Add Monsanto as a competitor with the tragedy of the commons, religion, ignorance, needless shortsighted selfishness, mortality and war for the title of 'greatest scourge of humanity.'\n\n I think Watson and Crick despite their great intelligence have failed or ignored the downside of the discovery of DNA structure. Watson seems to have a poor understanding of ecology... and only sees the positives of genetics, as seen by his endorsement of Monsanto.... but I think if he knew they were actually doing bad science, that they were lying to people... that they did not care for humanity like he did... I think he would - or hope he would condemn what Monsanto has done in the world... giving genetics a bad name.\n\n 146. @ Rick,\n come on guys, go and read a proper definition of what socialism is and can be and give your formatted mind a break would you?\n Biased education you have had.\n\n 147. The alarming message taken from The World according to Monsanto & The Future of Foods is...'Health & the Environment' taken directly from this film -can Monsanto be trusted for the future survival of humanity? The \"3 critical elements required for humanity to survive\" (Air,Water,Food) The focus of a re-vocation of U.S. patent for living organism (seeds) is necessary to stem \"monopoly of the world food crop\" How did the U.S. patent office allow a patent on an organic natural organism ??? IT SHOULD NEVER HAVE HAPPENED- It is time to stand up!\n\n 148. So what are we going to do about all this ??? NOTHING !!!\n\n Because Monday to Friday we work 9 to 5 and after work we're soooo tired, then Saturday we got the lawn to do, the kids at baseball, soccer, what have you. And last but not least, Sunday there's church (what a big help that is) then football all day.\n\n The fact is, Americans do not have what it takes to stand up, like Ireland, Africa, France, Argentina, Palestine just to name a few.\n\n We rather sit on our Lazy-boys and watch CNN and bitch. The reason is simple, we have never had a war in our own back yard like these countries and so many other countries. The only fight that some of us have seen are the ones in someones else's back yard for our government's agenda.\n (and for the m***** out there, our civil war is not from this time).\n\n 149. I would like to get a patent for every circumcised penis. That way, whenever anyone uses their penis in any way, my corporation will receive a small sum. This will have the unintended effect of reducing the world's population, but more importantly, it will add to my firm's profits. This will be introduced with a marketing campaign heralding the benefits of this plan to the consumer and choice, freedom, etc. I hope no Monsanto executives are reading this, I don't want them to steal my idea.\n\n 150. True Tom. There are only a few ways to change what is happening to our food due to companies like Monsanto, change what we buy and be vocal in our objections. It is not the current administration's fault, Obama did what every president in the last two decades has done, he determined that they best policy makers in the United States regarding food-safety are the creators of", "num_tokens": 2048} {"category": "common_crawl-politics", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-politics/part-000-00000.npy", "text": "ence P. Jeffrey | July 11, 2013 | 5:30 PM EDT\n\nSen. Mike Lee (R.-Utah) (AP Photo)\n\n(CNSNews.com) - Sen. Mike Lee (R.-Utah) is calling for the House Republican leadership to force a showdown with Senate Majority Leader Harry Reid and President Barack Obama when this fiscal year ends on Sept. 30 by refusing to permit funding for the implementation of Obamacare in whatever legislation—likely a continuing resolution—authorizes funding of the government after that date.\n\nIn an interview with CNSNews.com about his new e-book (Why John Roberts Was Wrong About Healthcare), Lee said Obama was violating his constitutional obligation to faithfully execute the law by suspending the statutory Dec. 31, 2013 deadline for the Obamacare mandate that requires large employers to provide health insurance for their workers. Lee noted that Obama is not similarly suspending the same Dec. 31 deadline that requires individuals to buy health insurance.\n\nIf the player does not load, please check that you are running the latest version of Adobe Flash Player.\n\n“The remedy is for Congress to refuse to fund the implementation of the program that the president insists is not ready to be implemented,” said Lee. “Look, the American people are being told: You’ve got to comply even though the big corporations don’t have to. You’ve got to do this or you’ll be punished. But if [the big corporations] don’t do what they are supposed to do under the law, nothing will happen to them.”\n\n“So, Congress has not only the authority but a solemn obligation in this circumstance to say if the law’s not ready to be implemented and enforced, as it was written, the American people shouldn’t be paying to have it implemented and enforced--not at all,” said Lee.\n\n“It would be irresponsible at this point for Congress to pass any appropriations measure and any continuing resolution that would contain funding for the ongoing, further enforcement and implementation of Obamacare as long as these conditions remain in place,” he said.\n\nLee said that House Speaker John Boehner and other House Republican leaders should join with Republicans in the Senate in blocking any funding after Sept. 30 for implementation of Obamacare.\n\n“I’m drafting an amendment for the Senate to attach to any continuing resolution here,” said Lee. “Republicans in the Senate and Republicans in the House need to stand on this issue, need to refuse to budge, because we will be complicit in Obamacare, we will be responsible for what happens to the country with Obamacare as the government selectively enforces this law, as the administration has now re-written it, if we provide funding for the administration to do that.”\n\nArticle 1, Section 9, Clause 7 of the Constitution says: “No Money shall be drawn from the Treasury, but in Consequence of Appropriations made by Law.” A law cannot be enacted unless it is approved by the House. The current law authorizing the administration to spend money expires on Sept. 30.\n\nIf the Republican-majority House were to approve a continuing resolution to fund the government after Sept. 30 that prohibited the administration from spending any money to implement Obamacare, the Democratic-majority Senate, led by Sen. Harry Reid (D.-Nev.), would have a choice: approve a similar bill and keep the government funded (with the exception of Obamacare), or refuse to approve a similar bill and shutdown the government in attempt to compel the House to reverse course and provide funding for Obamacare.\n\nPresident Obama would face a similar choice if the Senate joined the House in approving a CR that prohibited spending money on implementation of Obamacare. He would need to decide if he wanted to shut down the government in an attempt to compel Congress to give him the money to implement Obamacare.\n\nEventually, one side would have to give: Either the Republican-majority House led by John Boehner would need to surrender to Harry Reid’s or Barack Obama’s demand that it fund Obamacare, or Reid and Obama would need to surrender to the Republican-majority House's decision to deny funding for Obamacare implementation.\n\nLee said he did not want a government shut down, and that there did not need to be one. But in his view, if the House approved a bill to fund the government and the Senate or the president blocked that bill because it did not fund implementation of Obamacare, it would be the Senate or the president who was shutting down the government, not the Republican House.\n\n“I want to make very clear: There’s no need to shut down the government here,” said Lee. “I don’t want a government shutdown, and I don’t think we have to have one.”\n\n“It would be most unfortunate if they refused to keep the rest of the government functioning, just because they are so insistent on the Obama administration having all the funds it wants to be able to selectively enforce this provision,” he said.\n\n“No American who is concerned about individual liberty, no American who is concerned about all the horrible things that Obamacare is going to do to our economy would ever want that taint [of having funded Obamacare even after the administration announced it was not going to enforce its health-insurance mandate equally on individuals and businesses],” said Lee. “No one would want to be complicit in that, and that is exactly why the House must refuse to fund ObamaCare.”\n\n“This is the moment,” Lee said. “This is the moment when Americans stand together and say: We don’t want this.”<|endoftext|>MTG sparks outrage by saying if she and Steve Bannon had ‘organized’ January 6th ‘we would have won’\n\nAt a Young Republican dinner on Saturday night in New York City, Rep. Marjorie Taylor Greene inspired a cheering crowd with a stirring address.\n\nAmong other things, Greene assured the jubilant throng that “we would have won” if she and Steve Bannon had planned the January 6 Capitol assault.\n\n“I’ll tell you something, if Steve Bannon and I had planned it, we would have triumphed,” she said.\n\nNot to mention, she said, we would have been armed.\n\nOne prominent MAGA Republican who attended the dinner was Greene, who wore a blue one-shouldered gown with diamond accents.\n\nDonald Trump Jr., Steve Bannon, Steve Cortes of Newsmax, Jack Posobiec, a conservative pundit, and James O’Keefe, the creator of Project Veritas, were also invited.\n\nGreene spoke on current Republican initiatives in Congress, which would include a long list of agenda-driven issues after the GOP retakes control of the lower chamber on January 3. Greene was receiving an award at the event.\n\n“I’m going to tell you I am fired up about 222 in the House after the previous two years of suffering under Nancy Pelosi and the Democrats and voting no consistently to Joe Biden and the Democrats communist agenda,” she stated.\n\nThe Georgia congresswoman’s committee responsibilities were removed not long after she arrived in Washington, DC. She has supported Republican Kevin McCarthy for the position of House Speaker and is probably looking forward to a period without the responsibility of holding that position.\n\nShe went on to say that getting all House Republicans to vote in unison is a task in and of itself, making reference to the continuing issue of party discipline, especially as the race for president in 2024 starts to take form.\n\nGreene continues to steadfastly back former president Donald Trump, who declared his candidacy for reelection last month. Greene urged other Republicans to support Trump despite requests from a sizeable segment of the GOP to consider elsewhere for their choice for 2024.\n\nDuring her speech, Greene also boasted about her persistent opposition to providing US cash to Ukraine, which is still engaged in a conflict with Russia that began over ten months ago.\n\nShe said that the tens of billions of dollars donated by US taxpayers to Ukraine would have been better spent tackling the country’s continuing problems with Mexican drug gangs who have set up shop along the US-Mexico border.\n\nAlthough it seemed like Greene was adored and loved at the dinner, her comments were not well received online.\n\nOne non-fan tweeted, “I can’t wait to see you in jail.”\n\nOne user who claimed to be associated with a podcast on “mental, physical, spiritual,” and “financial” wellness blasted Greene’s looks. The user said, “I’ve seen males look better in an evening gown.”\n\nOne user responded to her remarks about Bannon and January 6 by writing, “Ummm that’s sedition…,”\n\nIn response, another person said, “At least you fascists are simply stating it out loud now and letting the rest of us know exactly what you are.”\n\nAnother account, labeled GOP Implosion Monitor, was perplexed by the notion that there would be any Republicans in very blue New York City.\n\nHe remarked, “The thought of young Republicans in NYC is funny.”\n\n»MTG sparks outrage by saying if she and Steve Bannon had ‘organized’ January 6th ‘we would have won’«\n\n↯↯↯Read More On The Topic On TDPel Media ↯↯↯<|endoftext|>child rights\n\nTen Sacred and Forbidden Truths Every Child Should be Told, Taught, and Inspired to Embrace\n\nBefore we get into the actual Truths themselves, let us develop, those of us who are capable of sane and rational deductive reasoning, a clear understanding of what is at stake here, what must be done, and how it must be done.\n\nEach of us, every human-born still able to pretend to be alive at this moment within the illusion of time, is a tortured and destroyed ex-child. We are murder victims of mind consciousness, every one of us, Myself included, despite the remarkable brilliance and purity and depth of my Forbidden Truth insights, realizations, and revelations. The difference between Me and you, you teeming masses of unwashed sheeple, is that I have achieved the feat of giving birth to Myself as something beyond human. An incredible feat, but going back to childhood I am still exactly what you are: A murder victim, irreparably harmed, damaged,", "num_tokens": 2048} {"category": "common_crawl-politics", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-politics/part-000-00000.npy", "text": " we don't have the luxury of time, as Canadians are already consuming cannabis at record levels. The individual and societal harms associated with cannabis use are already being felt every day. The proposed legislation and eventual regulation is our best attempt to minimize those harms and protect the well-being of all Canadians.\n    Witnesses at committee further pointed out that there is always a perception that more time is needed, but that any delays would contribute to confusion among the population.\n    Our government agrees that we need to act now, and we have been working closely with provinces and territories on many fronts, including through a federal-provincial-territorial senior officials working group. The working group has been kept apprised of developments on this file over the last year through meetings via teleconference every three weeks, as well as in-person meetings. Most recently, a meeting took place here in Ottawa on October 17 and 18.\n     Since the introduction of Bill C-45, several federal-provincial-territorial issue-specific working groups have also been established to collaborate more closely on a range of complex issues, including drug-impaired driving, ticketable offences, taxation, and public education.\n    Our government recognizes that providing support to provinces and territories for this work is critical. That is why we have committed, for instance, up to $81 million specifically to the provinces and territories to train front-line officers to recognize the signs and symptoms of impaired driving, build law enforcement capacity across the country, and provide access to drug screening devices.\n    Our government is encouraged by the tremendous amount of work that has already been carried out in the provinces and territories. Many jurisdictions committed to and have completed public consultations on how cannabis legalization should be implemented.\n\n    Ontario, Quebec, New Brunswick, and Alberta have released proposed legislation and frameworks describing how they will approach recreational cannabis, and Manitoba has enacted the Cannabis Harm Prevention Act. Clearly, many provinces are moving forward in anticipation of the July 2018 time frame.\n    Recognizing that some provinces and territories may not have systems in place by the summer of 2018, our government is proposing to facilitate interim access to a regulated quality controlled supply from a federally licensed producer via online ordering, with secure home delivery through mail or courier.\n    Our government's intention is to offset the broader costs associated with implementing this new system by collecting licensing and other fees, as well as through revenues generated through taxation, as is the case with the tobacco and alcohol industry. Discussions with provinces and territories around the proposed taxation plan have already begun and will continue. As part of our consultations on this matter, we welcome the feedback of all Canadians to ensure that we achieve the goal of keeping prices low enough to put criminals out of business while helping to offset the costs of education, administration, and enforcement.\n    In conclusion, I would like to reiterate that Canada's current approach to cannabis continues to contribute to the profits of organized crime, risks to public health and safety, and exposes thousands of Canadians to criminal records for minor cannabis offences each year. Most Canadians no longer believe that simple possession of small amounts of cannabis should be subjected to harsh criminal sanctions. I would like to conclude by encouraging all members of this House to support Bill C-45, as amended by the Standing Committee on Health.\n    Mr. Speaker, I sit on the health committee along with a number of other wonderful people, and we do some good work. We listened to many presenters on this bill at committee, one in particular being Professor Steven Hoffman, an expert in international law who teaches at Osgoode Hall Law School. He is very concerned about Bill C-45 being passed and violating three United Nations treaties that Canada signed onto years ago. This particular bill would violate those three treaties.\n    How does the minister plan to deal with the United Nations and our international friends when this bill is passed?\n    Mr. Speaker, I would like to thank all members of the committee for their substantive work on Bill C-45. As I have said with respect to this bill, protecting the health and safety of Canadians is a top priority of our government. That is why we are taking a careful regulatory approach to cannabis legalization.\n    Our officials have been very open, honest, and reflective in embracing discussions from across the country and throughout the world. We have been working actively with international experts, including the United Nations, to determine the best course forward on our international commitments. I want to remind the members of this House that eight American states, including the District of Columbia, have already decided to legalize recreational marijuana. We are committed to ensuring that we continue to work with our global partners to best promote public health and combat illicit drug trafficking.\n    Mr. Speaker, the Liberal government has acknowledged from the beginning the devastating impacts that criminalization of simple cannabis possession and usage has had on Canadians. In fact, the government knows that those impacts have been particularly damaging for marginalized Canadians, such as the young, racialized, indigenous, and poor. Yet one of the ironies is that this legislation maintains that criminalized prohibitionist approach. Any Canadian caught with 31 grams of cannabis in public, who grows five plants, or is an 18-year-old in Alberta selling to a 17-year-old faces criminal prosecution, conviction, and penalties of up to 14 years in jail.\n    She is the Minister of Justice and knows there are hundreds of thousands of Canadians who carry criminal convictions today that have devastated their lives in many respects. What plans does she have, as the Minister of Justice, for granting those Canadians pardons for engaging in activities that, come next July, will be entirely legal in this country?\n\n    Mr. Speaker, the purpose of Bill C-45, as all members of the House have heard me state before, and what we are committed to, is legalization, strict regulation, and restriction of access to cannabis to keep it out of the hands of young people, and the proceeds of its sale out of the hands of criminals. As I have stated many times, simply decriminalizing it at this point would not assist us in achieving those objectives.\n    What I have been doing, and what I am committed to continue to do, is to work with my colleague, the Minister of Public Safety. We have recognized that over-criminalization of the possession of small amounts of cannabis is something that needs to be addressed. We have sought to address this in Bill C-45. Again, in conversations with the Minister of Public Safety, we are considering how we can approach record suspensions.\n     However, our focus right now is to change the status quo to ensure that we put in place a comprehensive framework for the legalization, strict regulation, and restriction of access to cannabis by young people.\n    Mr. Speaker, first, I must commend not only the lead minister but also the other departments that engaged in making this proposed legislation possible. In particular, there was a fairly lengthy process that ensured that Canadians were thoroughly consulted.\n    For me, representing Winnipeg North, one of the biggest benefits I see from this proposed legislation will be its impact on the criminal activities of gang members, and so forth, who go into our schools and sell cannabis to 12, 14, or 15 year olds. This proposed legislation is a step in the right direction, as it would minimize the damage caused to young people and, at the same time, literally take hundreds of millions of dollars away from criminal gangs, and so forth.\n    Could the minister comment either on what it took to get the legislation before us today, or on the criminal aspect?\n    Mr. Speaker, as I said in my comments, the status quo simply is not working. Our government has been committed to the legalization, strict regulation, and restriction of access to cannabis from day one.\n    To the first part of the question, we have engaged in extensive consultations to ensure that we heard from Canadians right across the country. The first step we took, a vitally important step, was to engage a task force on cannabis. The task force consisted of experts in justice, public health and safety, and law enforcement. This task force was led by the hon. Anne McLellan, and it provided us with substantive recommendations. Most of those recommendations are contained in Bill C-45. The task force received 30,000 submissions from Canadians across the country.\n    We introduced Bill C-45 and have continued throughout to engage with provinces and territories, municipalities, and indigenous communities and indigenous governments. We will continue to do that as we move towards July 2018 to ensure that we have a substantive, comprehensive framework for the legalization of cannabis in this country.\n\n    Mr. Speaker, I have been following this debate closely, and there are many things the minister has said that are simply not so. For example, she talked about record levels of marijuana use. However, from the Statistics Canada website, I have in front of me a comprehensive Canadian addiction survey that looked at drug and alcohol use. In 2004, 14.1% of Canadians reported they had used cannabis in the last year; in 2008, it was 11.4%; in 2010 it was 10.6%; and in 2011 it was 9.1%.\n    The Conservative approach in government was to emphasize the importance of public health information and working with all aspects of society, including law enforcement, in a way that reflects the real risk associated with marijuana, and, yes, in a way that keeps it out of the hands of children. However, letting parents with children at home grow marijuana and making it legal for one child to give marijuana to another child, rather than selling it to them, is perfectly legal under the proposed legislation. This will not keep it out of the hands of children.\n    The minister might disagree on certain points philosophically, but I", "num_tokens": 2048} {"category": "common_crawl-politics", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-politics/part-000-00000.npy", "text": " But he is not a man to be messed with. By his count, he has seen action in more than a dozen conflicts around the world and been shot at more times than he can remember. With a pistol strapped to his belt whose custom grip is emblazoned with a U.S. flag and a bald eagle, Brown continues to work full-time\n\n“Boulder is 25 square miles of hippy-dippy bullshit surrounded by reality. I come down here to cleanse my soul,” Brown tells me, the words coming out of his mouth in bursts like machine-gun fire. “You know what they say about the golden years? It’s bullshit.”\n\n Dubbed “the Journal of Professional Adventurers,” Soldier of Fortune has, since 1975, chronicled a shifting, no-holds-barred world of black ops and mercenaries fighting Communism and terrorism. Its reporters have operated unlike most, carrying guns along with their pens and cameras, writing first-person accounts from battlefields around the world in what Brown likes to call “hardcore participatory journalism.”\n\n“We would create the story, gin up a lot of action, and then write about it for the glistening pages of our bad-boy magazine,” is how he de- scribed it in his 2013 memoir, I Am Soldier of Fortune: Dancing with Devils.\n\nThe December 1982 issue.\n\nThe December 1982 issue.\n\nIn many cases, its writers really were mercenaries, and six Soldier of Fortune correspondents have been killed in action over the years, in places like Angola, Nicaragua, Burma (now Myanmar), and Sierra Leone (where legend has it that the remains of reporter Robert C. MacKenzie were eaten by rebel fighters).\n\nThe small weekend gathering at Whittington has effectively replaced the annual Soldier of Fortune conventions Brown held for two decades that used to draw hundreds of camouflage-clad war buffs to the desert for displays of military firepower, weapons, tactical training, and apparently quite a lot of drinking. Brown says the showcase demanded more manpower than his downsized magazine could staff, so he pulled the plug a few years back in favor of just spending time with his close friends.\n\nSeveral members of his entourage have traveled hundreds, even thousands of miles to join the colonel for the weekend. Some he has known since his days in Special Forces in Vietnam, and others he has met on a variety of battlefields along the way.\n\n“The vast majority of the people I have been close to have had some involvement, in one way or another, with the magazine. Some of them have been with me in the shit, others I know be- cause they have written for us, and then there are guys I’ve met in fighting for gun rights,” he says. “They are an eclectic group.”\n\nWhile many of them have also known each other for years, the linchpin of the get-together is undeniably the colonel—often referred to as RKB or Maximus by friends. His colorful personality commands attention and brings out a mixture of awe, respect, and genuine affection among the gang of pretty gruff guys.\n\nPerhaps the oldest pal in the group is Robert Bernard, the Army medic who saved Brown’s life back in 1969 when he was seriously wounded in a mortar attack in the central high- lands of Vietnam. Known as “Bac si” to his buddies (which means “doctor” in Vietnamese), the soft-spoken Bernard still keeps a close eye on the colonel’s health.\n\n“He hasn’t always taken the best care of himself, so somebody has to look after him,” the 77-year-old tells me. “He was the kind of guy you wanted as your CO in Vietnam—he really stuck his neck out for the people he was in charge of— and he is the kind of guy you want to have as your friend in life. Never a dull moment with him.”\n\nFor 40 years, Brown has served as an inspirational figure for a particular brand of misfit, whether they were fighting for a cause or a price or just seeking a bit of adventure in various hot spots around the world.\n\nIt was for guys like Bernard and his generation that Brown initially created Soldier of Fortune. When he launched the magazine, he had hoped to give something to the Vietnam vets who were coming home and finding themselves spat at and being called \"baby killers\" by antiwar peaceniks.\n\n“A lot of Vietnam veterans felt they weren’t given their due, so I wanted to promote the concept of giving them recognition. We said our blood was just as red as anyone who fought in WWI or WWII or Korea, but that wasn’t the case in society at the time,” Brown says.\n\nLater the readership expanded to include a broader swath of military buffs, hard-core cold warriors, and a fair share of young men who would later join the armed forces inspired by the blood-and-guts tales of patriotic derring-do they had read in its pages.\n\n“It was reading Soldier of Fortune as a teenager that inspired me to join the Army. There are a lot of guys who will tell you that,” says Jerry Kraus, a 50-year-old insurance agent and Soldier of Fortune field editor from Colorado who has become the colonel’s right-hand man of sorts and drove down from Boulder with him for the weekend.\n\nBrown says one of his most cherished mementos is a signed copy of Chris Kyle’s American Sniper, in which the marksman (who was killed in 2013) thanks Brown in the dedication for in- spiring him to join the military.\n\nBut the troubles faced by print publishers as readers increasingly move online, plus the question of how to keep a magazine relevant that was born in the days of the Cold War and is geared largely toward men who have long been collecting social security, have begun to weigh on Brown.\n\nAds from Soldier of Fortune circa the 1980s ran the gamut from (clockwise from the top) an armed-pinup poster and mail-order blowguns to mercenary classifieds and calls to fight in Afghanistan.\n\nAds from Soldier of Fortune circa the 1980s ran the gamut from (clockwise from the top) an armed-pinup poster and mail-order blowguns to mercenary classifieds and calls to fight in Afghanistan.\n\n“Obviously we are nowhere near where we were during our heyday in the 1980s, but we bring in a little coin and cover costs,” he says. Still, Brown now finds himself having to do much more of the work, as he is down to just an associate, two part-time editors, and a contract art director from a peak of about 50 employees in the early 1980s.\n\nThat has made it hard for him to get out into the world and do what he loves to do most—fight. “You know, I just don’t have the time. We used to have a lot of people running the place. It’s hard to do all this with just a few people and still have the time to get out there. I may try to go to Ukraine or Kurdistan soon. I still have good contacts in both places,” he says. \n\nDespite the fundamental role Soldier of Fortune has played in his life (“it’s as much an extension of me as Playboy is for the guy who walks around in his pajamas all the time”), Brown says he has been negotiating to either bring in younger partners or even sell the magazine altogether.\n\nFor 40 years, Brown has served as an inspirational figure for a particular brand of misfit, whether they were fighting for a cause or a price or just seeking a bit of adventure in various hot spots around the world. But as time passed and the world changed, the colonel is the first to admit that the magazine’s hard-charging ethos may not have the same impact today.\n\n“Vietnam veterans have gotten older and settled down. Some have died. The Rambo era—whatever that amorphous phase was—is no longer. Who knows what it was, but there was something there. Of course, the Cold War is over and granted we have the War on Terror- ism, but it is not the same thing,” he says. “We never would be able to do now what we were able to do back then.”\n\nIn its early years, Soldier of Fortune regularly ran full-page recruitment ads for mercenaries willing to fight with the white supremacist government of Rhodesia against Communist-backed black guerrillas. That led some members of Congress to call for the magazine to be investigated for possibly violating the Neutrality Act (the magazine was ultimately cleared of any wrongdoing).\n\nEditorially, the magazine focused heavily on war stories and first-person dispatches, with correspondents jetting off to fight in and write about wars in the far corners of the globe. Issues in the 1970s featured regular reports on the situation in places like Rhodesia and Angola. As the 1980s rolled around, the focus moved to Central America’s bloody wars and the fight between the Mujahideen and the Soviet army in Afghanistan. In the 1990s, the focus became increasingly domestic, with an onslaught of pro–Second Amendment articles critical of the Clinton administration and its gun control efforts. The next decade the magazine turned to tales from the War on Terror and on efforts to control America’s borders.\n\nWhile it is unflinchingly pro-military and pro-police, the magazine is also deeply suspicious of government overreach, which has also made it popular among antigovernment types (Oklahoma City bomber Timothy McVeigh was a subscriber).\n\nThe magazine continues to focus on similar themes, but battlefield articles are now less often written by the ragtag group of fighter-journalists that set the magazine apart years ago. The June issue had a long feature story on South African mercenaries (“mercs” in Soldier of Fortune lingo) who were going to Nigeria to fight the radical Islamist fighters of Boko Haram, but the piece", "num_tokens": 2048} {"category": "common_crawl-politics", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-politics/part-000-00000.npy", "text": " heat for being opposed to the federally approved pipeline. Many have said that the provincial government’s power is insufficient next to the federal’s, but they may be proven wrong. According to this news, the provincial government isn’t standing down to the feds, and they’re pulling out the big guns.\n\nRobson, John. “Canadians feel for Aboriginals, but our patience for too many insults has its limits” National Post, Full Comment, June 30, 2017. http://nationalpost.com/opinion/john-robson-canadians-feel-for-aboriginals-but-our-patience-for-too-many-insults-has-limits\n\nThis is an opinion article in a newspaper.\n\nThe National Post ran an opinion piece written by John Robson in its “Full Comment” section, regarding the inequalities between Aboriginal people and Canadians, but instead of focusing on the inequalities of Aboriginal peoples focusing on the inequalities of Canadians. Robson writes that the past is the past, we must move forward as a nation to truly advance for the better, and continuing to apologize, make amends, and offer compensations to Aboriginal peoples isn’t fair or correct. Robson points out that there are many groups of oppressed people in Canada who don’t receive benefits or help, and to give one group an advantage over others for something that happened over a hundred years ago isn’t relevant to our society and culture today. This is important to our podcast because it represents the voice of Canadians who don’t believe that Aboriginal people should have more power in the court of law over any other Canadian.\n\nSlattery, Brian. \"Understanding Aboriginal Rights,\" Canadian Bar Review vol. 66, no. 4 (December 1987): p. 727-783.\n\nThis is a scholarly article.\n\nThis article from Google Scholar describes not only the legality of Section 35 of the Constitution Act of 1982, but how it has been used in the court of law before for Aboriginal people to gain power. The Constitution is a very binding act, and is almost impossible to go up against. The Supreme Court of Canada often rules in the favour of Aboriginal peoples, as the Constitution requires them to. The article describes a case in which the Musqueam band of Vancouver reclaimed damages and collateral for misconduct from the government not upholding their treaty and land agreement. This is an example of power, and how to understand the legal system is to potentially gain power. The Supreme Court of Canada ruled in the Musqueam bands favour, and the government of Canada was forced to repay the band.\n\nGhoussoub, Michelle. \"B.C. Challenges Alberta Wine Ban Under Free Trade Rules\", CBC News, British Columbia. February 19.\n\nThis is an opinion piece.\n\nThis article features the recent boycott of B.C. wine from Alberta provincial government. The British Columbia NDP government  is currently challenging the boycott in reference to the Canadian Free Trade Agreement (CFTA). The actions made by Alberta's NDP leader Rachel Notley are considered to be a violation of the obligations the province owes B.C. under the CFTA, and the dispute is currently under consultation. The boycott of B.C.'s wine is a direct response to the B.C. government's recent provincial action against the Kinder Morgan pipeline construction and oil transportation. Stakes are high, and the interests are in Alberta's favour. The battle between the two province's provincial governments is integral to our episode, as it shows that perspective differs widely from province to province. The fact that both B.C. and Alberta are governed by the same provincial political party adds depth to the debate.\n\nAudette-Longo, Trish. \"Jagmeet Singh Takes Same Position As John Horgan In Kinder Morgan Pipeline Dispute\", National Observer, News, Energy, Politics. February 18th.\n\nThis is an opinion piece.\n\nJagmeet Singh, who serves as Leader of the New Democratic Party in Ontario, recently issued his support for British Columbia Leader John Horgan in his fight to oppose the construction of the Kinder Morgan pipeline. Singh says that the pipeline needs more environmental assessment, and therefore adds to the drama of the cross-country debate. As Leader Rachel Notley continues to fight fiercely for the pipeline, that is strongly in her province's interest, it is beginning to seem that it is only in her province's interest. The transportation of diluted bitumen from Edmonton to Burnaby through the Kinder Morgan pipeline is increasingly seen to be extremely dangerous, and understood to be an impending disaster. Singh adds that the federal government is to blame for the tension, saying that as Trudeau did not do his job thoroughly and ensure a proper process for analyzing the pipeline and its risks, the consequences in the form of B.C.'s resistance are just. This article shows that this topic truly applies to all Canadians.<|endoftext|> International Science Complex \"Astana\"\n\nEng | Pyc\n\nSvetlana Kozhirova. Chinese-American relations at the current stage: security issues\n\nThe change in the correlation of forces between the East and the West becomes one of the most important trends of the modern era. Therefore, many experts believe that the main content of world politics for the next decade is referred to as the global geopolitical confrontation between China and America.\n\nThe Chinese factor in the world politics\n\nThe modern world geopolitical situation displays a remarkable enhancing of “Chinese factor” in the world politics, which has the following features:\n\n • the high dynamics of changes in the system of international relations associated with the emergence in the XXI century of influential organizations such as the G20, the SCO and the BRICS, in which China appears as the country that structures this system and takes the leading position in it;\n • critical instability in the world economy and global finance (China, with its stable annual growth again looks not only more successful, but dominant, and if you add the increase in the share of China in the IMF, China is the only country beneficiary);\n • the worsening of regional conflicts, not only in the middle East (Syria, Iran, Israel-Palestine), but also in the area of South China (China, Philippines, Vietnam) and East China sea (China – Japan), etc [1].\n\nAnalysts note that the international prestige of China in recent years greatly increased, whereby the interests of Beijing in the field of security has expanded significantly beyond the Asia-Pacific region (APR).\n\nWhere once China and the United States did not cooperate sufficiently on security issues, at the present time, this question becomes more than relevant. That is why Washington and Beijing are seeking to find ways to control their differing strategic, economic interests and security. Not coincidentally, on the meeting with the President of the United States D. Trump (FL, April 6-7), the President of China Xi Jinping claimed: “The Parties should work together to continuously strengthen mutual trust and military cooperation” [2].\n\nAccording to Xi Jinping, China and the United States must continue to use and improve the mechanism of warning each other in terms of important military operations, and also to improve the standards of conduct for security of sea and airspace, “the Military security and mutual trust in this sphere are the basis of strategic mutual trust of China and the United States. The parties must be contacted by all military levels, to develop the mechanism of dialogue and consultations between the ministries of defense and dialogue consultations on security issues in the Asia-Pacific region” [3].\n\nConflict of interest in the Asia-Pacific region\n\nThe Asia-Pacific region occupies an extremely important position in terms of peace and security. The vital interests of powers like USA, Japan, Russia and China are intersected there.\n\nOne of the key challenges of international relations in the region can be identified as the growing contradictions between the US and China, including competition in the military-strategic sphere. Modernization and increasing the military strength of the armed forces of the PRC are faced with the desire of the United States to keep its position by increasing its military presence in the region and strengthening collaboration with partners and allies.\n\nThe features of the Asia-Pacific region are that there are a large number of potential “hot spots” and the growing militarization, which, however, combined with the development of intensive economic cooperation. For many decades there are still outstanding issues concerning relations between States.\n\nThe US has many reasons for active participation in the APR: a significant market and source of capital and technology. Furthermore, there are several traditional allies of America in this region (Japan, South Korea, Australia and others). The central issues in this region are the astablishment of the conditions for long-term growth of the economy, supporting the Trans-Asian trade, investment and technology routes, ensuring the safety and prosperity of regional partners, preventing the hostile forces, terrorism, weapons of mass destruction and other global threats.\n\nNorth Korean problem\n\nThe first major problem in Asian security is the nuclear program of North Korea. In the next few years of Pyongyang may have (or already had) nuclear weapons, which can strike at the USA, Japan, and of course South Korea. This is a serious challenge to peace and the non-proliferation regime in Northeast Asia.\n\nWashington needs to work with other countries make Pyongyang stop and reverse its nuclear program. And for this you need to clearly understand the sources of leverage and the limits of American influence on North Korea, China, South Korea and Japan.\n\nResearchers believe that China is not interested in the development of the nuclear program of Pyongyang, but the US war against North Korea is not much incentive for Beijing, since if the fall of Kim Jong-un’s regime the NATO bases will be at the borders of China.\n\nAfter the recent American sanctions against Chinese banks, it became clear, that China will not get involved in an adventure with North Korea [4]. The White house is currently at a crossroads: it now either needs to recognize that Xi Jinping does not intend to disrupt the status quo, or to provide the Chinese a few months at addressing this problem. The latter option is now possible because of Pyongyang and its ballistic missile capable of reaching Alaska.\n\nIt must also be borne in", "num_tokens": 2048} {"category": "common_crawl-politics", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-politics/part-000-00000.npy", "text": "..\n\n#6. FEMA doesn't want you to know that...\nFEMA trailers were toxic (and they knew it)!\nOccupants of FEMA trailers along the Gulf Coast who were\nafflicted by Hurricanes Katrina and Rita in 2005 had breathing\ndifficulties, headaches and nosebleeds. Previously the Sierra\nclubwarned FEMA about formaldehyde levels in the trailers, but\nFEMA dismissed the problem.\n\n#7. FEMA doesn't want you to know...\nThey mailed 83,000 debt notices to Hurricane Victims\nThat's right. FEMA wanted their money back because they\noverpaid federal aid amounting to more than $385 million to\nvictims of hurricanes Katrina, Rita and Wilma at an average of\napproximately $4,622 per recipient.\n\n#8. FEMA doesn't want you to know that...\nThey have massive amounts of coffins ready.\nEvery large corporate office in America has an emergency\ncontingency plan, which includes a plan to deal with the dead,\nincluding body bags and toe tags. FEMA is no different, but they\nare certainly expecting massive calamity in ordering the coffins!\nWith all the hype\nabout Ebola, ordering coffins starts to make\nsense (and yet it is alarming).\n\n#9. FEMA doesn't want you to know that...\nThey can't send enough people to rescue everyone, and you\nmay be in double jeopardy (and FEMA is ill-equipped to handle\nsimultaneous emergencies).\nFEMA simply isn't equipped to send massive scale help during a\ndisaster, particularly disasters which pose multiple threats:\n\n • Hurricanes often present a double danger they can't\n handle. (A flood often follows a hurricane). FEMA is not\n equipped to handle a hurricane followed by a flood, because\n that's essentially two disasters and FEMA is overwhelmed.\n Such was the criticism of FEMA by Louisiana's largest\n newspaper in an open letter to President Obama on the\n failures to respond Hurricane Katrina. With flood comes\n another problem, contamination of the water supply. Even\n bottled waters are contaminated if they reach flood waters,\n and you should not drink them.\n\n • Earthquakes present a double danger, too. (Fires often\n follow earthquakes). Again FEMA is often ill-equipped to\n handle simultaneous emergencies of rescuing people who are\n entrapped and handling the fires.\n\n#10: FEMA doesn't want you to know that...\nThey'll order you out, but they won't help you get out of\nharm's way\nMany residents didn't want to leave there homes during Hurricane\nKatrina, but for the most part it was the lack of money and\ntransportation that prevented victims from following FEMA's\norders to flee during Hurricane Katrina. For this important reason,\nwe prep!\n\nWant to learn where is the FEMA camp closest to you?\nNot that you ever want to visit a FEMA camp, but in case you're\ncurious, check out this article listing the FEMA camps and you'll\nfind the one closest in your area. There are FEMA locations in\nevery state! Find the FEMA camp nearest you.\n\nIs FEMA color coding your house for death camps?\nPreppers have been reporting  mail boxes being marked with color\nstickers or marks, possibly\nFEMA is color coding homes for their\ncamp assignments. Whether or not this is true, doesn't really\nmatter. Preppers have much reason to be concerned with FEMA.\nPrepare now so you don't end up in a FEMA camp.\n\nCertainly you don't want to wait for FEMA to help you, which is\nwhy you're a prepper! Here are\n25 Reasons You're Not Crazy for\nPrepping. You can recover from adversity, ride out any\ncatastrophe and subsist on your own preps, and we're here to\n\n • Pandemic preparedness: FEMA is hoarding supplies for a\n pandemic, but only a select few will get them! Right is an\n official pandemic flu preparedness kit designed for issue to\n military families, which contains 4 Surgical Masks, 2 NIOSH-\n approved N95 Masks, 4oz Bottle of hand sanitizer and an\n information card. There are other, more comprehensive,\n pandemic kits available, but this fits nicely into the glove\n compartment of your vehicle.\n\n • Most notably, is this fact: Before September 11, 2002, FEMA\n concentrated its funds (and efforts) on preparedness for\n natural disasters; however now, FEMA has become a sort of\n step child of the Homeland Security to focus on terrorism.\n Indeed monies were diverted to fight terrorism (instead of\n natural disasters), and many preppers argue that this is the\n biggest failure of the horrific events of recent natural\n disasters, including Hurricanes Katrina in 2005 and Hurricane\n Sandy in 2012.\n\nMoney and resources were diverted from FEMA for natural\ndisasters to fund homeland security, and as a result, there are\nthings that FEMA doesn't want to divulge to the general public.\nNow you know!\n\nHappy endings...\nGenerally preppers don't need to worry about FEMA that much,\nthat's because we have backup contingencies! FEMA is for those\nwho don't prep. You can live happily ever after knowing you've\ndone everything possible to avoid FEMA camps.\n\nMore prepping articles....\n\nPrepare to live happily ever after with us at happypreppers.com - the emergency\npreparedness Web site of prepping, survival,\nhomesteading, and self-reliance.\n------------------------------------------------- Revised 09/13/18\n(C) Copyright  2012-2018FEMA secrets was archived by waybackmachine.org and saved more than 34 times between\nSeptember 13, 2014 and Sept. 13, 2018. This helps protect our copyright.\n\nDo NOT copy. (Linking is okay.)\n\nprivacy policy\nWater bob for earthquakes or hurricanes\nPandemic flu kit\nHappy Preppers site for survivalists + preppers\nFacebook: happypreppers.com\nPinterest: happypreppers.com\nGoogle + happypreppers.com\nTwitter happypreppers.com\nAre fish antibiotics safe for humans?\nFunny FEMA shirt\nPrepper Deal Alerts Check\ndaily deals for prepping\ngear and food storage.\nTen things FEMA doesn't want you to know about\n10 reasons to never microchip a human\nSurvival tabs\nHomeless survival prepping lessons\nBest used prepping books on to buy on Amazon\nTen nuke supplies to own ~ supplies necessary to survive nuclear fallout\nIndoor emergency cooking options\nChocolate for prepping and survival\nEnergy chew review\nBest cans for your food storage\nHow to prepare for a Hurricane\nFood bar for the bugout bag.\nBest water purifiers for preppers\nWaterbob ~ bathtub reservoir<|endoftext|>Yemeni Socotra.. Under the UAE Occupation\n\n2018-05-29   Reads: 3953\n\nThe United Arab Emirates, the second force in the Saudi-led Arab Coalition against the Houthis, sent military troops to Socotra Island in the Indian Ocean on April 30, 2018 without permission from the internationally-recognized government. The troops - over 300 soldiers, armored personnel carriers and tanks – took control of the island’s port and airport. UAE also deployed military forces to besiege a naval brigade stationed on the island, and prevented Yemeni officials from entering the airport to receive a Saudi delegation that arrived in the island to resolve the dispute between UAE and the government. This event launched a more difficult phase of relations within the Arab Coalition.\n\nThe dispute is the latest in a series of disputes between the internationally-recognized authority of President Abdrabbo Mansour Hadi and Abu Dhabi since the first quarter of 2016. The most prominent of these differences was in January 2018 when the National Army was fighting against paramilitary militias financed and trained by the UAE in Aden (the country's interim capital), the matter which reflected relations within the coalition and made it more fragile.\n\nThe Socotra Island has an ecological nature that is uncommon and the strangest in the world. Two thirds of creatures and trees on the island are not found anywhere else on the planet. They were added to the World Heritage List in 2008 [[1]]. The island enjoys a strategic location that tempts the colonial military forces. Throughout the modern history, the strategic island was able to avoid the setbacks of attempts to turn it into a military base in order to occupy the \"Horn of Africa\" ​​and the \"Arabian Peninsula.\" The island is located near the strategic strait (Bab al-Mandab), which makes the military concentration on the island greatly affect the Arabian Peninsula and Horn of Africa, and threatening the global trade.\n\nThe UAE presence on the island\nThe UAE began to exist on the island after two hurricanes struck the island in October 2015 in order to rescue 60,000 people. The UAE used the Red Crescent and the Sheikh Khalifa Foundation as a cover to expand and control Socotra Island and its poor people who depend upon fishing, animal husbandry and little farming.\nThe UAE has taken control of the island in many ways, most notably:\n- Government support: In February 2016, Vice President, Khalid Bahah, held a press conference on the island alongside with the UAE Red Crescent, announcing the signing of contracts with the UAE authorities for the reconstruction of Socotra Island [[2]]. About 40 days after the conference, Bahah was removed from his position. The dismissal of Bahah caused tension between Abu Dhabi and President Abdrabbo Mansour H", "num_tokens": 2048} {"category": "common_crawl-politics", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-politics/part-000-00000.npy", "text": " looked to possible confirmation hearing fights, and the new administration faced criticism for being the least diverse (and the wealthiest) in modern history.\n\nLooking ahead to the first days of the Trump administration NPR examines the Womens March on Washington, scheduled for the day after inauguration, while Marketplace looks at the feasibility of Trump's promises regarding the steel industry. PBS NewsHour looks at the implications for the future of healthcare, and Next Avenue offers some advice on taxes and finance.<|endoftext|>Previous month:\nFebruary 2016\nNext month:\nJune 2016\n\nMarch 2016\n\nHow the founding fathers' communities voted yesterday\n\nJefferson's birthplace, Goochland County, and his longtime home, Albemarle County, both went for Rubio on Tuesday.\n\nHow did the other Founders do?\n\nGeorge Washington's, James Monroe's, and Robert E. Lee's birthplaces, on Virginia's Northern Neck, all went for Trump. But their longtime and chosen homes -- Fairfax, Fredericksburg, Loudoun, Albemarle, Alexandria, and Arlington, all went for Rubio and Clinton. Fairfax was also George Mason's home and probably his birthplace.\n\nJames Madison's birthplace, King George, and his longtime home, Orange, voted for Trump and Clinton. So did Patrick Henry's birthplace and longtime home, Hanover County, and his later home, Henry County.\n\nThe Adams hometown of Quincy, Mass., and neighboring Braintree, voted for Sanders and Trump. Boston, where Ben Franklin was born and raised and many other Founders lived, voted for Clinton and Trump.\n\nOur colonial/revolutionary triangle of Williamsburg, Jamestown and Yorktown, and their counties, all voted for Rubio. But neighboring Charles City County, birthplace of Tippecanoe and Tyler, too, went to Trump.\n\nStaunton, birthplace of Woodrow Wilson, went to Rubio and Sanders.\n\nCampaign finance reform will leave you free to speak, as long as you \"use your inside voice\" and make sure no one's listening\n\nBack in the eighties, campaign finance reform  was just the pet project of a few utopian cranks, but sometime in the late 90s, somehow it was decided that all liberals, including Trump, had to be for it. Probably because the elite opinion-makers felt threatened by \"new media\" and new grassroots political groups that didn't look to them for guidance and approval.\n\nTo see what this issue is about, look at the name of the big Supreme Court opinion that all the liberals despise: \"Citizens United\". That's one of those perfectly-named Supreme Court decisions, like \"Loving,\" \"Fullilove,\" and \"Hardwick.\" The elitists' \"Campaign Finance Reform\" would basically say that individuals can speak out, and donate small amounts to candidates, but citizens are not free to unite into groups that can put together significant amounts of money for a candidate, or enough money to buy TV ads or other methods of mass communication. And that if citizens unite their resources into a corporation -- which for centuries has been the standard way of getting together to form something larger than yourself -- then that corporation has no free speech rights. And no right to be guided by the conscience or religion of its members or owners when it chooses how to do business.\n\nSo Campaign Finance Reform will leave you free to say whatever you want by yourself, to a tiny audience, but not free to get together in groups that could actually do anything significant in politics or public debate. Not unless you are a billionaire.<|endoftext|>Always With the Bang Bang….And Also With Whimpers\n\nLeave a comment\n\n11/06/2013 by syrbal-labrys\n\n1geting rid of At least the latest shooting only killed the shooter himself, allegedly paranoid and maddened by drug issues. How sad that we must count ourselves fortunate that only one died, eh?\n\nBut then, nobody will be counting those who die as a result of cuts to welfare, will they? Those don’t leave bloody holes, and can be attributed to “natural” causes. Like that time when I was in kindergarten and my mother almost died of food poisoning; because as private in the US Army, my father couldn’t make enough money to feed his family all month. So the mother ate some suspect food. Yeah, natural causes it is, sure.\n\nAnd that was a long time ago…55 years ago. And now it comes back around as Republicans fight against things like raising minimum wage or making background checks necessary for folks to buy weaponry. When I was growing up, we often had insufficient food; but my dad almost always had guns.\nSometimes he was able to kill food, poaching deer or rabbits. Sometimes he held my mother at gunpoint through the night, too. Which one of those pretty much illegal activities is it that the Holy Second Amendment crowd is oh-so-sure-is-defensible?\n\nI am really wondering how the GOP and their Tea Party fringes think this all works out; see, I have SEEN this movie before. Being poor AND armed is always more prone to end in something ugly.\nWhen my dad could not make financial ends meet, he found a way to drink and when he drank, he didn’t care what he shot. One night he shot at the neighbor’s prize bull (and missed), and a goat (hit that one), and our dog (hit that, too), and threatened his best friend and his wife.\nThe cabinets were still empty, but by gawd he had bullets.\n\nSo yeah, keep shipping jobs overseas, replace the few left with machines to do them, tell Americans to go shopping, to not get abortions, to send their children to wars in defense of corporate privilege and rapine abroad, tell them health care is Communism and that gay rights threaten their marriages. Sure, keep up the patter of batshit on all roof-tops. In the end, hungry people with guns will do more than stare through the windows of the 1%. Don’t say I didn’t tell you so<|endoftext|>Animal People: Why Do Animal Rights Activists Care About Animals and Not About People?\nAnimals: Tradition - Philosophy\n\nSyed Rizvi (Engineers and Scientists for Animal Rights) in SouthAsia Magazine\nDecember 2010\n\nOn the surface, the question appears to be quite legitimate. After all, why care about animals when so many humans are suffering? However, behind the question there lies an element of preeminence that can also be extrapolated to a purely human hypothetical: should wealthy nations - The United States, for example - offer assistance to poor countries, when their own poor also need help? One case involves crossing the species' barrier, while the other can be seen as crossing the barrier of nationality, or even race, to some extent.\n\nThe question posed above comes with the same political and racial fervor among some such as whites should help whites first. Although such bias is politically incorrect in today's pluralistic, multicultural society, a small but radical element of society do harbor such views. Fortunately, with our cultural and sociological evolution, most have risen above the \"stick- with- your-own-kind\" mind set - a vestige of our tribal days that has no place today's worldview.\n\nProponents of animal rights go a step beyond, and include animals within the sphere of their moral concern. They see animals as sentient beings with interests of their own, who wish to live a life natural to them. Like people, animals try to avoid pain and seek comfort, and have a family structure of their own. When a cow gives birth to her calf, we mercilessly drag him away from the mother while she grieves and the calf is destined to spend his entire life in restrictive confinement where he can hardly stretch or turn around. Watch Ohio Dairy Farm Brutality.\n\nThis imposition on the life of animals by humans is morally deplorable in the eyes of animal rights proponents. They do not see animals as objects to be exploited. While this view of animals has been predominant since the early days of civilization, so has been the practice of regarding women as inferior being created to serve man. The imprimatur of long-standing tradition does not justify practices considered unjust today. Alice Walker (author of Color Purple) expresses this eloquently in her preface to Marjorie Spiegel's classic \"The Dreaded Comparison: Human and Animal Slavery.\" Walker writes: \"Animals of the world exist for their own reasons. They were not made for humans any more than black people were made for whites or women for men.\"\n\nAnimal rights people see pain as pain, whosoever pain it is, and will make every effort to minimize it, irrespective of the race, sex, or species of the sufferer.\n\nIn many ways, the case on behalf of animals becomes even more compelling. Since animals cannot speak for themselves, the element of pathos is added to other moral components. Animals are handicapped when it comes to the power humans have over them. Most suffering inflicted upon animals comes from humans, over whom animals have no control.\n\nOnce compassion for animals is aroused, the starkness of their plight becomes ever more apparent. For example, in a city like Karachi the animal population is several orders of magnitude greater than human population, yet the number of animal hospitals and veterinarians in Karachi can be counted on the fingers of one hand. The number of hospitals and other medical facilities for humans can run into the hundreds if not thousands. Globally, the number of organizations dedicated to helping animals is minuscule compared with the number of organizations helping humans, although the human population is tiny compared with the number of animals in the world.\n\nThe irony is that not only do people deprive animals of their rights, they often rebuke anyone speaking on animals' behalf, with comments like \"human problems come first.\" With such a mindset one cannot help but wonder what exactly it is that", "num_tokens": 2048} {"category": "common_crawl-politics", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-politics/part-000-00000.npy", "text": " service. He learned the value, but I don’t think he ever learned the lesson.\n\n In the end, Henry was, at best, reactive. No Anne Boleyn, no reformation; no Catherine Howard, no retrospective edicts; no French invasion, no navy; no need for money, no dissolution. Yes, that’s simplistic, but arguably, that’s how it reads because that’s how it is. His capacity for self-deception and the retroactive rewriting of history is unrivalled in kings who are listed under the ‘sane’ category. His ministers were more than competent and far more than he deserved and he terrified everyone. Yes, they all played the game of thrones, but he not only wrote the rules, but he changed them all the time as well. And yet he still repeatedly lost.\n\n I’m not going to argue that good things didn’t come out of his reign, but I would absolutely argue that it was despite, and not because, of the ruler. Imagine what Elizabeth I would have done with the starting point that Henry had.\n\n (That was much longer than I expected. Please understand the strength of my feeling when I say that I’ve typed the whole thing one-handed as I’m holding a sleeping child in the other! Thanks for the episode and, indeed, all of the Henry story, as well as the discussion.)\n\n Best wishes,\n\n 1. Imagine what you’d have thought of Henry if said 5 year old had woken up! Thanks for the comment – very interesting and of course impeccably argued.\n\n 18. I voted Elton. Henry VIII comes across as a narcissist, definitely more self absorbed than self aware. While some may argue that he should only be viewed by the lens of his times, there is a danger that in doing so would be rationalizing his motives. How would have Anne Askew answered the quiz?\n\n 1. Quite possibly, Anne would have argued that while she could not but believe what she did, as the annointed king Henry had the right to have her executed – I’m busking, but it is far from impossible – and Anne was tortured not by Henry of course, and not at his orders, and not with his knowledge. I take your point though, and agree Henry was very much the narcissist – but he was a king, in a time that meant his will was supreme., It’d be difficult not to have your head turned. Surely we must rationalise his motives – otherwise characters in history are reduced to puppets, with no will of their own in our view. And what may happen to us in the future? That’s my view anyway – sometimes its difficult, but we must judge by the standards of the day. or so I think anyway!\n\n 19. I voted for Loades, but it was a tough choice. All of the quotes seemed to me somewhat un-nuanced. I think the Loades quote at least gets at the point that even “bad” people may do things that have “good” results. If this was the reason you chose them, bravo!\n\n I want to address one thing that you said during the podcast, though: that we must judge Henry by the standards of his time. I don’t entirely disagree, but I think it’s worth stating that there should be some standards that we hold that ought to be applied even to the pre-modern era. For example, judicial murder is wrong and the person who connives at it is tainted by that connivance. I grant you that Anne B. played the game of thrones (pretty adroitly) and can’t be judged as an innocent, but in my opinion Henry caused her to be judicially murdered when, for whatever reasons, he decided to be rid of her. Even if every monarch of the era did exactly the same thing — and, of course, they didn’t, which is one of the things that fascinate us about Henry — it would still show him to be monstrous. We need to hold some basic moral principles and be prepared to apply them to the past as well as the present, otherwise we lose the ability to judge anything or anyone.\n\n I agree with the consensus that the wrap-up show, as well as the series on Henry generally, was excellent. Very cogently and fairly argued. Well done, sir!\n\n 1. Thanks Lisa. I have to say that I think we should always judge people by the standards of their time. We might then make a judgement that we reject those standards for our time, and use past examples as to why we want to order our society differently. However, I think this allows your requirement that judicial murder is wrong. Anne Boleyn’s death was in all probability a put up job, with falsified evidence. By the standards of 16th century England, this was wrong, and Henry is rightly condemned for it. All I am saying is that many of those judicially murdered were complicit in this perversion of the standards, guilty themselves of trying to have their political enemies removed by the same means.\n\n 20. I note that many of the best things you had to say about H8 were the unintended consequences of his decisions. To me, this is not a reason to praise him. I agree, completely, that he was not nearly as amoral (or immoral) as we may view him from the early 21st century; and family relations were as much political as familial for him and his class than they are today. So, long and the short of it, he probably should be praised for laying the groundwork for a true navy, but condemned for most everything else – failed at any meaningful foreign policy (though he did not have too much opportunity), furthered religious chaos through indecision, perpetuated an environment of “to the death” power struggles within his advisors (although he picked good ones), and squandered his father’s endowment. Rubbish.\n\n 21. Elton! Of course, H8 may (or not) have been a rubbish person as judged by his contemporary standards. But as a king, he pursued personal goals without regard to public good (tyrant). He came to the throne with a surplus, realized the immense revenue from the dissolution of the monasteries, and left an indebted realm with little gain to justify the expense.\n\n Just because some cherry-picked accomplishments may have worked out for the better (parliamentary democracy, naval board, etc) does not excuse the overall quality of his reign.\n\n 1. Interesting – and I share your view a little I think;l what had you expected – more on the Scarisbrick, or more on Pollard’s quote?\n\n 22. I reluctantly voted Loades. I think Henry was horrible, and I think anything positive that came out of his reign was stumbled into, and definitely not by design, but there was some positive stuff, and I don’t think it was all due to others, so that pretty much ruled out the first 2 quotes.\n And I’m incredibly bummed that I just missed the deadline for the drawing (I was a bit behind and only listened to the episode this morning). Hoping you haven’t actually done it yet and might find it in your heart to squeeze my name in there with the others…\n\n 1. I am sooo sorry. I literally just did the random number generator thing, and I don’t think I should break the rules. Thanks for voting anyway – I’m going to leave it up. I think Henry was pretty horrible too. But I suspect some at least of the things I dislike derive from the fact that he was a king in a time when that meant he was at the head of the great chain of being; that would probably have turned my head too. Personally I would have gone for C.\n\n 23. I find it fascinating that 94% of the vote is on the two quotes that essentially say ‘some good turned out, but not for great reasons’. The only real distinction between Elton and Loades is that the latter ascribes to Henry the successes and the former states ‘despite’. Whichever way, he ends up as neither astounding success nor desperate failure, but somewhere in between, where the shadows lie because we cannot truly, from this distance (or arguably any distance) accurately interpret and assign intent. Which is probably why he is, and will probably always remain, so utterly fascinating. I think the reason that there are so few on the Scarisbrook and Pollard is that they are fairly absolutist views, and the reason the discussion is so interesting is that it’s nigh-on impossible to be absolutist about Henry.\n\n (Incidentally, and I know it’s due to rounding, but it amuses me hugely that, at the time of writing this, 101% of people have voted – 48%, 46%, 5% and 2%. Well done, you extra percentage of the population!)\n\n Best wishes,\n\n 1. I guess when you boil it down that’s true; though I felt that the nuance of Elton was more negative. His is description of Henry (‘ego monstrosity’) would get you into trouble down the pub on a Saturday night (try it maybe?!), and Loades is quite specific about the dramatic impact Henry had. I quite agree,m at this distance it is difficult to assign intent; though G W Bernard seems to have proved that the Reformation was driven by the king.\n\n You delivered the highjest score on the quiz by the way. Whoop! And yes,m it;’s nice isn’t it – the History of England listeners gave it 101%…\n\nLeave a Reply to Baron Ogle Cancel reply<|endoftext|>Some People Say White Liberals Made Up This Controversy. That's Just Not True.\n\nPeople are pretty divided on the issue of sports mascots and team names like the \"Redskins", "num_tokens": 2048} {"category": "common_crawl-religion", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-religion/part-00-00000.npy", "text": ", and you organize your life accordingly—so you can pursue what truly fascinates you. This makes for a roller-coaster existence, riding high one minute and feeling lost the next, but the optimistic Three recovers quickly, begins again, and is often successful. You need stimulation and distraction, so regular nine-to-five office work may not suit; you may prefer to travel for work or run your own projects or business. Threes are also great communicators and may excel at persuasion or direct selling, provided you believe in what you are offering.\n\nShadow character: Impulsiveness, overconfidence, impatience; lack of staying power.\n\nAdvice: Admit mistakes and see balance as a goal rather than a compromise.\n\nNumber 4: The Tetrad—Willpower and Order\n\nFour denotes stability, structure, order, and willpower; it also signifies the four elements of Fire, Earth, Air, and Water. Fours are loyal and practical character types who focus on creating lasting emotional and financial security.\n\nSymbol: The square\n\nBest days of the month for 4 as Life Path: 4th, 13th, 22nd, 31st\n\nCharacter influences: Order is important to a Four type, so you prefer to follow rather than flout the rules and work in environments in which conventional structures are essential to achievement. At work and at home, you do not turn away from tough work and the jobs others will not do, because you understand the value of these tasks in the greater scheme of supporting the whole. You may find fulfillment in spiritual service and enjoy being part of a large organization or network. Whatever your age, professional status, or time limitations, you do whatever needs to be done efficiently. Working as part of a team adds to your feeling of security. In relationships and friendships, Fours are outstandingly loyal and honest.\n\nShadow character: Lack of initiative; fussiness, martyrdom; difficulty adapting to new people or surroundings.\n\nAdvice: It’s fine not to follow every rule; do things your way, too.\n\nNumber 5: The Pentad—Expansion and Freedom\n\nFive is the number of vitality, discovery, and the five senses. Five character types tend to be sensual, with great energy and curiosity.\n\nSymbol: Pentagon, five-pointed star, or pyramid\n\nBest days of the month for 5 as Life Path: 5th, 14th, 23rd\n\nCharacter influences: Fives are the ultimate multitaskers, who try many things; you may not succeed in every challenge you take on, but what counts is the adventure. You thrive on tests of courage and can be led by your heart. Fives may have many passionate affairs and often have lots of good friends, as you easily connect with others and are genuinely interested in their lives. In your professional life, you make a great strategist; perceptive and fast-acting, you know how best to respond to a problem or opportunity. Fives also have the ability to make the most of any situation and often appreciate the simpler things in life.\n\nShadow character: Casual thoughtlessness, lack of consideration; irresponsibility.\n\nAdvice: Bring your focus to one or two goals and consistently pursue them.\n\nNumber 6: The Hexad—Love and Protection\n\nSix is the number of happiness, love, and idealism. It also denotes harmony, due to its geometric shape—the hexagon is perfectly balanced. Sixes are loving and seek a peaceful life. They aim to act for the higher good and are often sensitive and imaginative.\n\nSymbol: The hexagon, the Seal of Solomon (two intersecting triangles)\n\nBest days of the month for 6 as Life Path: 6th, 15th, 24th\n\nCharacter influences: The charitable Six enjoys giving to others and is motivated by love and the need for peaceful, caring relationships. If you have money, you are excited by what it can do to support those you love, how it might contribute to your community, and how it may help those who are less fortunate; wealth otherwise means little. This does not mean you are unambitious, however. You may be strongly motivated by creative projects, for example, but the goal is never financial. In relationships, you are loyal and caring, and you take your responsibility to others seriously.\n\nShadow character: Being too idealistic; neglecting good financial opportunities.\n\nAdvice: Avoid those who mistake your kindness for weakness.\n\nNumber 7: The Heptad—Mystery and Wisdom\n\nSeven is the number of knowledge, self-discipline, mystery, and fate. Sevens often have great wisdom and the resilience to stand by their ideas.\n\nSymbol: The heptagon\n\nBest days of the month for 7 as Life Path: 7th, 16th, 25th\n\nCharacter influences: Sevens are associated with philosophy, wisdom, and imagination. Small concerns may not be of interest to you; your remit is the mysteries of this world and what is beyond. Intellectually ambitious, you may be ahead of your time. As a result, you become strong, enduring the pain of being rejected or misunderstood, but you know you can contribute to society through the knowledge you have acquired, and have the determination to stand by your beliefs. You may be naturally reserved and recharge best in your own company.\n\nShadow character: Being overcritical; neglecting friendships; impracticality.\n\nAdvice: Focus on putting your knowledge into practice; manifest your ideas.\n\nNumber 8: The Ogdoad—Power and Success\n\nEight is the number of power in the material world. Eights are excellent organizers who achieve their goals.\n\nSymbol: The cube (which has eight corners)\n\nBest days of the month for 8 as Life Path: 8th, 17th, 26th\n\nCharacter influences: Eights are practical, powerful, and determined to succeed; they often have a flair for business and are fast to react to an opportunity. Their focus is stability, but Eight character types can also embrace change because they respond brilliantly to it, reorganizing and adapting to create the security they value. They are kind and loving but tend not to fall in and out of love, because this invites disruption; they prefer to nurture a deep, constant bond with a long-term partner. In friendships, they are giving and supportive but know where to draw the line if they feel they are being manipulated.\n\nShadow character: Being domineering; tactlessness; overly materialistic.\n\nAdvice: Listen to others’ opinions; deepen your understanding.\n\nNumber 9: The Ennead—Spirituality and Courage\n\nNine is the number of intensity, courage, spirituality, genius, and boundaries. It is the last single-digit number before 10, said to hold the preceding numbers within itself. Nines are often inspired, highly intelligent people.\n\nSymbol: The nonagon (nine-sided shape)\n\nBest days of the month for 9 as Life Path: 9th, 18th, 27th\n\nCharacter influences: The Nine personality is similar to that of number Seven—both types are cerebral, but the Nine has the advantage of genius. As a Nine, you may be the ideal mentor, consultant, counselor, or adviser, and you have the potential to make an outstanding contribution to your field of work. Success comes due to your inspiring ideas and sharp intellect, so you may rise quickly in your chosen profession. The Nine has the gift of discernment and knows how and where to direct his or her energy and attention. You are a supportive, sympathetic, and loyal friend, just like the Six.\n\nShadow character: Lack of focus; inconsistency; inability to complete anything.\n\nAdvice: With sustained effort, anything is possible.\n\nMaster Numbers\n\nNumbers 11 and 22 are believed to have intense vibrations. These types are often associated with having an evolved awareness.\n\nNumber 11: Intuition\n\nEleven can be considered a doubly empowered One. As Ones are associated with leadership, ingenuity, and communication, at the level of Eleven, the influence of the One expands into global communities and can also signify great faith. Elevens are believed to be visionary and charismatic individuals.\n\nCharacter influences: Eleven people often possess a special gift in a chosen subject area and a unique power of communication. You have the ability and drive to articulate your ideas, and you can passionately convince and motivate others. You have strong beliefs and values, and you’ll often put a cause above your own needs, making personal sacrifices in order to help others. Some Elevens are clairvoyants and healers and/or creative and artistic. You may feel a deep call to be of service to the world.\n\nShadow character: Overidentifying with a cause; lack of perspective; obsessiveness.\n\nAdvice: Temper your idealism so your goals remain realistic.\n\nNumber 22: Global Vision\n\nTwenty-Two is known as the number of the master builder. It adds up to Four, the number of stability and structure, so whatever the Twenty-Two makes is designed to last. It may also be impressive, even a legacy for future generations. Twenty-Twos are therefore associated with power and the realization of a vision.\n\nCharacter influences: Twenty-Two people materialize ideas; whatever you envision, you make. It is important that you see results, so you may direct your energies into a physical product, building, or other environment that represents your values and beliefs. Equally, you may put together a group or evolve a larger organization or business that delivers a service or lasting benefit to others. Twenty-Twos are therefore highly sensitive to others’ needs, with great empathy and compassion.\n\nShadow character: Stubbornness; lack of attention to important detail; intense anger.\n\nAdvice: Stay within reasonable boundaries; you don’t need to push so hard.\n\nSignificant Days\n\nTake the whole date and add it to your Life Plan number. You can use this technique when looking at potential start dates for a new job or any venture. For example, if you", "num_tokens": 2048} {"category": "common_crawl-religion", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-religion/part-00-00000.npy", "text": " random as it sounds. You’ve got these different colorful blocks (those are your shared interests, hobbies, life goals), but what do you think holds them all together? Super glue? Nah. It’s the Lego baseplate – and in your relationship, that’s your spiritual connection.\n\nHaving a spiritual connection is about praying together, growing together in God’s Word, and supporting each other in faith. It’s the bedrock of a Christian relationship. It gives depth to your connection and a sense of purpose to your relationship. Think of it as an unseen cord weaving you and your partner together in God’s love and grace. It’s the Proverbs 27:17 kind of connection: “As iron sharpens iron, so one person sharpens another.”\n\nJoin OTGateway Letters\nShort epistles on love, dating & relationships.\n\nSo next time you’re building that metaphorical Lego house, remember the importance of the baseplate – your spiritual connection. Just don’t step on any Legos barefooted – I hear that’s less fun.\n\nPhysical Attractiveness in a Christian Relationship\n\nA Face Only a Mother Could Love\n\nThere’s no denying it, we live in a world that idolizes physical attractiveness. It’s like everywhere you turn there’s another picture-perfect Instagram couple grinning back at you. Sure, physical attraction is part of the package. It’s the initial spark, the butterflies in the stomach, the reason you might sneak a second glance during the church service. “For man looks at the outward appearance…” as the good book says in 1 Samuel 16:7, right?\n\nBut we can’t forget the rest of that verse, “…but the LORD looks at the heart.” In other words, God cares about what’s on the inside, not just what’s on the outside. Now don’t get me wrong, there’s nothing sinful about thinking your significant other is a bona fide hottie. But it’s like a cherry on a sundae; nice to have, but not the main event.\n\nFURTHER READ: Is It Okay for a Christian to Date?\n\nBeauty: More Than Skin Deep\n\nHere’s the truth bomb: Physical attraction isn’t everything. It’s like a fun movie trailer; it might draw you in, but it’s not the whole story. I mean, have you ever watched a movie that had a fantastic trailer, but the actual movie was a complete snoozefest? That’s what a relationship built only on physical attraction can be like.\n\nYou see, the heart of a person, their character, is what truly defines them, not their six-pack abs or their stunning eyes. Proverbs 31:30 hits the nail on the head: “Charm is deceptive, and beauty is fleeting; but a woman who fears the LORD is to be praised.”\n\nWe’re all going to get old and wrinkly one day, folks. That’s when the inner beauty, the stuff that really matters, steps into the spotlight. Now, isn’t it better to spend a lifetime with someone whose heart mirrors the love of Christ, than to focus solely on the outer shell that fades with time? Just some food for thought.\n\nBiblical Perspectives on Beauty and Attraction\n\nThe Holy Writ on Hotness\n\nLet’s talk Bible and beauty, shall we? If we scoured the Good Book from Genesis to Revelation, guess what? We’d find no divine commandment saying, “Thou shalt only date supermodels.” Quite the opposite, actually.\n\nIn Proverbs 11:22, the Bible drops this wisdom bomb: “Like a gold ring in a pig’s snout is a beautiful woman who shows no discretion.” Ouch, right? You see, the Bible is pretty clear that physical beauty, without godly character, is about as appealing as bling on a pig.\n\nFURTHER READ: Should a Christian Remarry After His or Her Spouse Dies?\n\nThe Unseen Glow-Up\n\nEver heard of the concept of inner beauty? Sure you have. It’s the thing every beauty pageant contestant talks about when asked what truly defines a person. But let’s ditch the clichés for a moment and talk about the biblical perspective.\n\nPeter, the guy who literally walked on water with Jesus (until he freaked out, but we’ve all been there, right?), gives us a solid take on this. In 1 Peter 3:3-4, he tells women, “Your beauty should not come from outward adornment… Rather, it should be that of your inner self, the unfading beauty of a gentle and quiet spirit, which is of great worth in God’s sight.”\n\nThis is not to say you should ditch your favorite outfit for a sackcloth and ashes. It simply emphasizes that the heart—the kindness, gentleness, love, faith—should be our true glow-up. Now, that’s a beauty regimen I can get behind! And trust me, that’s the kind of beauty that truly turns heads, especially the One that matters most.\n\nGod’s Design for Relationships\n\nBeyond the Surface Level\n\nYou’ve heard it said, “God works in mysterious ways,” right? Well, when it comes to relationships, His design is intriguingly brilliant and goes way beyond six-pack abs and flawless hair.\n\nIn Genesis 2:18, God decided it wasn’t good for Adam to be alone. So, He made a helper suitable for him – Eve. God’s intention wasn’t merely to give Adam someone pretty to look at but to provide companionship, support, and unity. He created a relationship where two individuals could walk together towards a common spiritual purpose.\n\nSure, Eve probably had a million watts smile and Adam, well, he was the only guy in the world, so best by default. Still, God’s design for relationships was never just about physical attraction.\n\nFURTHER READ: Can a Christian Guy and Girl Be Just Friends?\n\nThe Divine Matchmaking Criteria\n\nWhen it comes to compatibility, the world might want you to believe that it’s all about shared hobbies, mutual friends, or even how you both enjoy pineapple on pizza (a debate for another day). But God’s divine matchmaking has a unique criterion – spiritual compatibility.\n\nEver read 2 Corinthians 6:14? Paul wasn’t talking about the perils of gym partnerships when he said, “Do not be yoked together with unbelievers.” Nope, he was talking about relationships.\n\nBeing spiritually compatible doesn’t mean you agree on every minute theological point or that your partner can recite the entire Bible backwards. It’s about sharing the same foundational faith and values, and together, striving to grow closer to God.\n\nBecause at the end of the day, your shared faith is what will hold you together when life throws its curveballs. And let’s be real, in those moments, the size of your partner’s biceps or the perfection of their eyebrows won’t matter quite as much.\n\nUnderstanding Attraction in its Broad Spectrum\n\nAttraction: It’s Not Just About the Butterflies\n\nPop quiz: When you think of attraction, what’s the first thing that comes to mind? If it’s sweaty palms and a racing heart every time you see your crush, well, you’re not entirely wrong. But, attraction isn’t just about the fizz and pop of chemistry. It’s a buffet, my friends, not a one-course meal.\n\nEnter emotional, intellectual, and spiritual attraction. Emotional attraction is that heart-to-heart connection where you just “get” each other. Intellectual attraction? It’s the meeting of minds, the thrill of deep conversations, and shared perspectives. And spiritual attraction, well, that’s the biggie for us Christians. It’s about connecting at the soul level over shared faith and purpose.\n\nFURTHER READ: The Christian Way to Deal with a Cheating Spouse\n\nAttraction that Goes the Distance\n\nLet’s cut to the chase. Why do these forms of attraction matter in a Christian relationship? Why can’t we just stick to swiping right on the cutest profile picture and call it a day?\n\nBecause, my dear friend, these deeper forms of attraction build a relationship that goes the distance. They create a connection that outlasts changes in physical appearance and circumstantial ups and downs. They’re the ingredients of a companionship where you’re not just lovers but best friends, intellectual companions, and spiritual partners. Now that’s relationship gold.\n\nRemember Ecclesiastes 4:12? “Though one may be overpowered, two can defend themselves. A cord of three strands is not quickly broken.” I’d like to think that the three strands in a relationship are emotional, intellectual, and spiritual attraction. Woven together, they form a bond that’s not easily broken. So here’s to attraction in its broad spectrum and to relationships that are not just about the fizz, but the enduring flame.\n\nThe Role of Character in a Christian Relationship\n\nHeart Before Hairdo\n\nEver heard that saying, “beauty fades, but character lasts?” Sure, it’s a cliché, but it’s got some serious truth to it. In the grand scheme of Christian relationships, it’s all about the heart, folks. I mean, think about it. You don’t fall in love with someone’s mascara or their snazzy new shoes, right?\n\nCharacter is the fabric of who we are, and it’s not something you can gloss over with a flattering filter or a stylish haircut. Remember that golden nugget from Proverbs 31:30? “Charm is deceptive, and beauty is fleeting; but a woman who fears the LORD is to be praised.” Same goes for the guys, too. Godly character trumps a jawline that could cut glass, every time.\n\nFURTHER READ: I’m a Christian. Can I live with my boyfriend?\n\nCharacter: The Secret Sauce of Fulfilling Relationships\n\nSo, why exactly is a godly character such a big deal in a fulfilling relationship? Simple. A relationship built on godly character is like a house built", "num_tokens": 2048} {"category": "common_crawl-religion", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-religion/part-00-00000.npy", "text": " the ritual prayers performed by Muslims five times a day facing the Kaaba in Mecca.\n\nThe Five Daily Prayers, known as Salat in Islam, are a fundamental act of worship and one of the Five Pillars of Islam. Muslims are required to perform these prayers daily at specific times, demonstrating their submission and devotion to Allah. The Salat acts as a direct link between the individual and God, serving as a reminder of the importance of spirituality and the presence of God in daily life.\n\nThe five prayers are as follows\n\n 1. Fajr: The pre-dawn prayer before sunrise.\n 2. Dhuhr: The midday prayer after the sun has passed its highest point.\n 3. Asr: The afternoon prayer.\n 4. Maghrib: The prayer just after sunset.\n 5. Isha: The evening prayer.\n\nThese prayers help to maintain mindfulness, gratitude, and a sense of discipline in the lives of Muslims.\n\nThe Gayatri Mantra – Hinduism\n\nA highly revered mantra from the Rigveda, it begins with “Om Bhur Bhuvaḥ Swaḥ, Tat Savitur Vareṇyaṃ…”\n\nThe Gayatri Mantra is a revered mantra in Hinduism, dedicated to Goddess Gayatri, the personification of the divine Shakti (energy) and the mother of all Vedas. It is one of the oldest and most significant prayers in Hinduism. The mantra is taken from the Rigveda, an ancient Indian collection of Vedic Sanskrit hymns.\n\nIn Sanskrit, the Gayatri Mantra is:\n\n“ॐ भूर्भुवः स्वः तत्सवितुर्वरेण्यं भर्गो देवस्य धीमहि धियो यो नः प्रचोदयात्”\n\n“Om Bhur Bhuvaḥ Swaḥ Tat Savitur Vareṇyaṁ Bhargo Devasya Dheemahi Dhiyo Yo Naha Prachodayat”\n\nWe meditate on the glory of the Creator;\n\nWho has created the Universe;\n\nWho is worthy of Worship;\n\nWho is the embodiment of Knowledge and Light;\n\nWho is the remover of Sin and Ignorance;\n\nMay He open our hearts and enlighten our Intellect.\n\nThe Gayatri Mantra is considered a powerful tool for spiritual awakening and is recited for wisdom, divine guidance, and illumination of the mind. It is chanted at dawn, noon, and dusk, transitioning between the three realms of consciousness – awake, dream, and deep sleep.\n\nThe Om Mantra – Hinduism\n\nConsidered the most sacred mantra in Hinduism, it represents the sound of the universe and is simply “Om” or “Aum.”\n\nThe Om Mantra is one of the most significant and sacred mantras in Hinduism and other Dharmic religions like Buddhism and Jainism. It is often referred to as the Pranava mantra, symbolizing the ultimate reality, consciousness, or Atman (soul, self).\n\nIn Sanskrit, “Om” (sometimes spelled as Aum) is the sacred syllable, representing the essence of the ultimate reality, consciousness, or Atman.\n\n • Om (ॐ): It represents the ultimate reality or consciousness, encompassing the three sounds A-U-M, which symbolize creation, preservation, and dissolution, respectively.\n\nThe chanting of Om is considered a spiritual icon and a representation of the divine energy or the sound of the universe. It is often chanted at the beginning and end of Hindu prayers, religious ceremonies, and meditation sessions.\n\nThe pronunciation of “Om” involves three sounds: “A” (pronounced like “awe” as in law), “U” (pronounced like “oo” in boot), and “M” (pronounced like “mm” at the end of hmm).\n\nOm is believed to bring a sense of peace, calmness, and spiritual connection when chanted or meditated upon. It is a way to connect with the divine and reach a higher state of consciousness.\n\nThe Heart Sutra – Buddhism\n\nA key Mahayana Buddhist text that begins with “Avalokiteshvara Bodhisattva, when practicing deeply the Prajna Paramita perceives that all five skandhas are empty…”\n\nThe Metta Sutta – Buddhism\n\nAlso known as the “Loving-kindness Sutra,” it is a meditation on loving-kindness and compassion.\n\nThe Serenity Prayer – General\n\nWidely used in recovery programs, it begins with “God, grant me the serenity to accept the things I cannot change, courage to change the things I can, and wisdom to know the difference.”\n\nThe Heart Sutra is not typically recited as a prayer in the same way that prayers are recited in certain religious traditions. Instead, it is primarily chanted, studied, and contemplated upon as a sacred text imparting profound wisdom and insights into the nature of reality and the path to enlightenment in Mahāyāna Buddhism.\n\nChanting the Heart Sutra is a meditative practice, and the recitation is often accompanied by a sense of reverence, mindfulness, and a deep contemplation of its teachings. It is seen as a way to connect with the core teachings of emptiness, interdependence, and wisdom within the Buddhist tradition.\n\nHere is an example of how the main mantra of the Heart Sutra\n\nOne of the most recited elements of this sutra in the Buddhist tradition, is chanted\n\nSanskrit Mantra: “Gate Gate Paragate Parasamgate Bodhi Svaha”\n\nApproximate Pronunciation:\n\n“Gah-teh Gah-teh Pah-rah-gah-teh Pah-rah-sah-mah-gah-teh Boh-dhi Swa-ha”\n\nThis mantra is repeated in a meditative rhythm during practice. Each word holds profound meaning related to the pursuit of enlightenment and the understanding of emptiness and interdependence in Mahāyāna Buddhism.\n\nThe Prayer of St. Francis – Christianity\n\nKnown for its message of peace and selflessness, it begins with “Lord, make me an instrument of your peace…”\n\n“The Prayer of St. Francis,” also known as the “Peace Prayer” or “Prayer for Peace,” is a Christian prayer attributed to St. Francis of Assisi, a revered Christian saint. Although historically St. Francis did not actually write this prayer, it is deeply associated with his teachings and spirit of humility, love, and peace.\n\nHere is the English translation of “The Prayer of St. Francis”:\n\nLord, make me an instrument of your peace.\nWhere there is hatred, let me bring love.\nWhere there is offense, let me bring pardon.\nWhere there is discord, let me bring union.\nWhere there is error, let me bring truth.\nWhere there is doubt, let me bring faith.\nWhere there is despair, let me bring hope.\nWhere there is darkness, let me bring your light.\nWhere there is sadness, let me bring joy.\n\nO Divine Master, grant that I may not seek to be consoled as much as to console;\nto be understood as to understand;\nto be loved as to love.\n\nFor it is in giving that we receive;\nit is in pardoning that we are pardoned;\nand it is in dying that we are born to eternal life. Amen.\n\nThese are just a few examples of famous prayers, and there are many more from different faiths and spiritual traditions. Each of these prayers holds deep significance for its respective followers and serves various purposes, from worship and meditation to seeking guidance and solace.\n\nCompilation of prayers by theme\n\nReady to deepen your spiritual connection through prayer? Explore more content now!\n\nMorning Prayers\n\n“Lord, thank you for this new day you’ve given me. May your light guide my steps and your love fill my heart. Amen.”\n\n“Loving God, I ask you to heal my wounds, both physical and emotional. May your healing power bring me relief and restoration. Amen.”\n\nNight and Bedtime\n\n“Thank you, Lord, for this day that comes to an end. Guide my dreams and allow me to rest in your peace. Amen.”\n\nShort Prayers\n\n 1. “God, help me.”\n 2. “Jesus, I trust in You.”\n 3. “Thank you, Lord.”\n\nOpening Prayers for Meetings\n\n“Our God, guide us in this meeting so that our words and actions reflect your love and wisdom. Amen.”\n\n“Heavenly Father, grant me strength to face the challenges of this day. Let me see the light amidst the darkness. Amen.”\n\n“Lord, grant me the strength to overcome adversities and persevere in my faith. I trust in your power and love. Amen.”\n\n“God of peace, fill my heart with your serenity and calmness. May your peace reign in my life and in the world. Amen.”\n\n“May the Lord bless us and keep us, show us his face and have mercy on us. May he turn his face towards us and give us peace. Amen.” (Based on Numbers 6:24-26)\n\n“Almighty God, I ask you to protect me and surround me with your shield of love and safety. Amen.”\n\nFear and Anxiety\n\n“Heavenly Father, free me from fear and anxiety. Help me to trust in you completely and find peace in your presence. Amen.”\n\nGuidance and Wisdom\n\n“Lord, illuminate my path and guide my decisions. Grant me wisdom to choose what is right and just. Amen.”\n\n“God, guide me in my job search. Open doors and place opportunities in my path. Help me find a job that is fulfilling and worthy. Amen.”\n\n“Thank you, heavenly Father, for all the blessings you have given me. Help me to live each day with gratitude in my heart. Amen.”\n\n“God, I thank you for life", "num_tokens": 2048} {"category": "common_crawl-religion", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-religion/part-00-00000.npy", "text": " came to be part of modern understandings of modern Paganism that extend from the “rediscovery” of Paganism during the Enlightenment into the present day. In pre-Christian Slavic polytheism, the gods were sometimes worshipped in sacred places where there were no man-made structures and the gods manifested in nature itself. For many polytheistic religions, sacred groves and forests were counted as the official centers of worship, where important community rites were carried out, and any violation of this space meant an attack on the community itself. In this, the idea that Paganism is a “nature-based religion” or that it involves “nature worship” is not really inaccurate.\n\nBut of course, to reduce Paganism to solely a sacralization of nature or natural states is reductive to the point of being ahistorical. After all, contrary to the popular idea that humans came up with the gods as reifications of natural forces that they merely didn’t understand, several of the gods of polytheism barely have anything to do with the natural world as we understand it. Insofar as we may venture to understand the gods of polytheism in terms of what they were “gods of”, there are gods of marriage (such as Hera, Hymen, Frigg, Pushan etc.), music (Apollo, Sarasvati, Ihy, Bragi etc.), law or justice (Tyr, Mitra, Lugh, Ma’at etc.), commerce or wealth (Mercury, Cernunnos, Lakshmi, Njord etc.), agriculture (Yarilo, Dagon, Sucellus, Dagda etc.). smithing and craftsmanship (Hephaestos, Ptah, Gofannon, Vishvakarman), and kingship (Horus, Anu, El, Baal etc.) to name a handful of things. Some gods are gods of both natural things and human constructs. Zeus, for example, is a god of law and order as well as the sky. Utu is a god of law as well as the sun. Demeter is also a goddess of law, as well as a goddess of the earth. Pan is a god of music as well as the wild. Ukko is a god of agriculture as well as the sky and thunder. Freyr is a god of kingship and war, as well as the weather and virility. Svarog is a god of smithing as well as the sky. Veles is a god of commerce, as well as a god of water, earth, magic, and the underworld. We can’t forget that almost none of the gods of polytheism were ever just gods of one thing or another, and sometimes multiple gods share the same domain or function. On top of that, across the old polytheistic religions, the gods had numerous epithets that represented various characteristics and functions attributed to them.\n\nIn a sense, it’s still true that Paganism, in both a modern and a historical sense, believes in a natural world that is considered divine or imbued with divine presence to some extent or another, and this likely lends itself to modern interpretations entailing nature worship, which may or may not have been applicable to the original pre-Christian religions. Though, of course, some pre-Christian traditions were arguably closer to some idea of “nature worship” than others, such as Germanic polytheism with its worship of the various nature spirits alongside the gods and the worship of gods and spirits in trees and natural environments. Pre-Christian polytheism often tended to intersect with animism in this regard, especially in traditions such as Heathenry, and some even argue that some form of pantheism is also part of this rich picture. Still, for historical Paganism, one of the larger points is the idea that divine exists in multiplicity, that divine presence is not one but many. Of course, even before Christianity emerged, later developments of pre-Christian polytheistic ended up prefiguring the monotheism that would later dominate “the West”, or later ideas of “universal religion” that would stretch from the Renaissance to Theosophy and to the New Age movement. Plutarch, for instance, argued that there were not different gods across peoples but instead one single Intelligence that rules the world that is merely called different names and worshipped in different ways as time passes. In The Metamorphoses by Apuleius, the goddess Isis presents herself as “the single power which the world worships in many shapes, by various cults, under various names”. The Roman theologian Cornelius Labeo proposed that the oracle of Clarian Apollo stated that the god Iao was the supreme god, who in winter was called Hades, in spring was called Zeus, in summer was called Helios, and in autumn Dionysos. After the Roman Empire adopted Christianity as its official state religion, defenders of paganism sometimes argued that Christians and pagans were merely worshipping the same god under different names. Neoplatonists argued that all things derived existence from a single source referred to as The One, and that the purpose of life as to become united or re-united with The One. Otherwise polytheistic philosophers such as Aristotle and Plato introduced concepts that may have prefigured the God we know today, such as the unmoved mover or Demiurge. And of course, at various points before the rise of Christianity, there were a few monotheistic cults that emerged, such as the Egyptian cult of Aten under the pharaoh Akhenaten or the Hellenistic cult of Zeus Hypsistos.\n\nMy point here is that Paganism in a historical sense (and honestly a modern sense too) was not one single set of beliefs in the way we understand Christianity to be (and, even there, Christianity isn’t necessarily as monolithic as we imagine it to be). That extends to other beliefs as well, such as pertaining to death. While modern Paganism can include a belief in reincarnation, it’s not clear that this belief was universally held in pre-Christian traditions. It is possible that some Germanic pagans did believe in a form of reincarnation; Roman sources purported that the ancient Teutons believed in rebirth and thus did not fear death, while some scholars suggest that Germanic pagans believed in rebirth within the extended clan based on some archaeological findings and exegesis of some stories in the Sagas. Many Norse polytheists, however, don’t share this concept, and have a wide array of beliefs about the afterlife that don’t necessarily end in rebirth. Indeed, the “more authentically pagan” version of Ragnarok ends not in the rebirth of the cosmos (as in the familiar post-conversion telling) but instead in its utter oblivion. Greek polytheist beliefs on this range from the arrival of most (if not all) souls to a dreary underworld, to the belief that the soul may go to a blessed afterlife upon achieving ritual purity or initiation into the mysteries of a god, to Plato’s account of how souls are judged and either admitted to a good afterlife or damned to a bad one again prefiguring Christian teaching), and of course the concept of reincarnation was sometimes proposed. What little we know about what we call the Celtic polytheists suggests that they probably believed in reincarnation, but some suggest that the soul goes to the Otherworld, a place inhabited by gods and spirits, after death. In ancient Egypt, it was believed that by living a virtuous life, the soul would be judged as being worthy to enter the field of reeds, or that by successfully undergoing a journey through the underworld and overcoming its perils, the soul would gain an immortal second life. Relevant to the conversation is the way that pre-Christian belief systems frequently advanced the concept of a cyclical cosmos, in which the cosmos is periodically formed, dissolved, and reformed again. The Norse cosmology appears to suggest cyclic time and rebirth, as did some of classical Greek philosophy such as Stoicism and Pythagoreanism, and it is very prominent in Indian religious philosophy.\n\nPaganism in a historical sense isn’t really one set of beliefs. In fact, there is as Kadmus Herschel and Jake Stratton-Kent show an opposition between distinct expressions of pre-Christian religion, linked to the development of philosophy in one case and a change in the mode of Greek society in the other case, that is relevant to how I aim to elaborate Satanic Paganism. That said, I think the way we deal with Paganism, as an idea, is sort of a compound idea in which we find and derive the premise of a natural world brimming with the multiplicitous divine presence worshipped in and through the world, and often worshipped not out of fear or even bargaining but out of awe and yearning. Paganism as a concept can also be loosely defined by its particular conception of what religion is, as will be further explored. Whereas Christianity via Lactantius frames religion as “re-ligare”, meaning to be bound, as in bound to God or to the single ultimate truth, pre-Christian religion via Cicero is based on “re-legere”, meaning to go over again, which seemed to mean to a constant return to the ancestors and the gods, perhaps denoting a consistent process of ritual observance. It’s also possible to read “re-legere” in terms of observance as meaning to observe the cycle of reciprocity, a concept that animates the bulk of the pre-Christian attitude towards the gods. This is to be understood as the relationships in which humans give to the gods through their devotion (typically offerings) so that the gods may acknowledge this devotion and typically bestow blessings to humans in various ways. Heathens understand this as the Gifting Cycle, Hellenists understand this as Kharis, but even if it doesn’t have its own distinct name or terminology, the basic concept can be found basically everywhere in P", "num_tokens": 2048} {"category": "common_crawl-religion", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-religion/part-00-00000.npy", "text": " seal of behavior, karmamudra. To see things like illusions and completely free from all mental fabrications is their seal of preventive measures, their dharmamudra. Not allowing themselves ever to be tarnished by stains of selfishness is a seal of close bond for them, samayamudra. To see that voidness and compassion are of one taste is mahamudra, the great seal for them.\n\nIn terms of tantra, the hidden measures to protect the mind, then relying on a partner to help transfer them to higher states of realization would be their seal of behavior, their karmamudra. Never to be separated from having the energy-winds and consciousness joined together is their seal of preventive measures or dharmamudra. Never to allow the close bonds with the practices and vows to degenerate is the seal of the close bond for them, their samayamudra. And to make manifest the deep awareness that is simultaneous with each moment is their great seal of reality, their mahamudra.\n\nWithin the context of the teachings on tummo, which is the inner flame of the subtle energy heat at the navel, doing the various physical exercises in order to get the energy-winds in motion and under control is the practice of the seal of behavior, or karmamudra. To gain a very blissful deep awareness based on this is the seal of preventive measures, or dharmamudra. To have no attachment toward that blissful consciousness is the seal of the close bond, samayamudra. The spontaneous fulfillment of all purposes would be the great seal mahamudra.\n\nThe nonconceptual deep awareness of voidness, voidness being the absence of all fantasized, impossible ways of existing, can also be described as the mahamudra or great seal. And how is that derived? When you look at the syllables that make up the Tibetan word for mahamudra, chaggya chenpo (phyag-rgya chen-po), the first syllable “chag” stands for the deep awareness of the absence of all fantasized, impossible ways of existing, the deep awareness of voidness. The second syllable, “kya” stands for liberation from all uncontrollably recurring phenomenon of samsara and the “chenpo,” meaning “maha” or “great,” stands for the unity of these.\n\nFurthermore, all of one’s practices from the beginning steps of taking a safe and sound direction in life, all the way up to reaching the fully enlightened state of a Buddha, all of these things are included within the sphere of this great seal of reality or mahamudra.\n\nThe actual textual sources for the teachings on mahamudra found in tantra are in the texts known as the Seven Texts of the Mahasiddhas, mahasiddhas being the adepts with actual attainments. There’s a text by the great master, Mahasukha, called Establishing the Hidden Factors. Then there’s a disciple of Mahasukha, whose name is Anangavajra, and the text that he wrote is called Establishing Method and Discriminating Awareness. The next text was written by his disciple, King Indrabhuti, and it’s called Establishing Deep Awareness. His wife or queen, Lakshmikara, wrote a text called Establishing Non-discordance. The next text, by Dombi Heruka, is entitled Establishing What Simultaneously Arises. Then the next one is by the master Darikapa and is called Establishing the Very Nature of the Reality of the Great Hidden Factors. Lastly, there’s another text by a female practitioner, the Yogini Chinto, who wrote Establishing the Very Nature of the Reality of What Follows from Becoming Clear about Functional Phenomena.\n\nThe additional sources mentioned in the text for the tantra mahamudra teachings are The Three Core Volumes of Saraha, referring to his three collections of songs or dohas: The King Dohas, The Queen Dohas and The Commoner Dohas. All of these texts speak about these essential points of mahamudra. With respect to the sutra teachings on mahamudra, this will be the subject matter for tomorrow. Are there any questions?\n\nParticipant: Have any of these texts been translated into English?\n\nAlex: Some songs by Saraha, called “The Royal Songs of Saraha,” have been translated, but I’m not really sure whether they are from these three collections or from other songs by him.\n\nParticipant 2: You mentioned that at early stages in concentration when you notice that you have many thoughts, this is a good sign. Why is that?\n\nSerkong Rinpoche: It is helpful because you have to come to recognize what is the nature of thoughts. Since you need to recognize the nature of thoughts, then having these thoughts is not a bad thing. It’s something that is helpful for being able to recognize their nature. If you look at us now, most of us are quite mindless in the sense that we don’t really notice or pay much attention to the thoughts we have. So, in a sense, it seems like we don’t have any thoughts.\n\nSo when you first sit down and examine the mind and thoughts come up, then it’s something useful. It is, for instance, like when you are trying to identify a disease, in the Tibetan medical system they apply certain methods to make the disease come to a head so they can really see what the disease is and then treat it properly. Likewise, rather than being very mindless and not having much going on in your head at all, when you sit, it is good to first start having these thoughts come up, because then you get subject matter to work on to identify what the nature of thought is. When you walk around and you don’t think much of anything at all, that’s not very good because then you have no material to gain insight into. Whereas when you sit down, and try to concentrate, getting a lot of thoughts is something that can be helpful.\n\nParticipant 3: Is it helpful or harmless, or doesn’t it matter to know what stage of concentration you have reached?\n\nAlex: Of the nine stages, you mean?\n\nParticipant 3: Yes.\n\nAlex: Rinpoche says the question is a bit strange if you think about it, it is as if while you are in grammar school you asked, is it necessary to know what grade you are in. It’s pretty strange to want to know what grade you are in when you are in that grade. When you are in the first, or the second, or the third grade, of course you know you are in the first grade or second grade. So if you ask, is it necessary to know what grade you are in when you are in school, that’s pretty weird. So Rinpoche doesn’t quite understand what point you have in mind when you ask is there a necessity to know what grade you are in.\n\nSerkong Rinpoche: If I ask you in grammar school, is it necessary to know what grade you are in while you are going to grammar school, what would you answer to my question?\n\nParticipant 3: I would give you a particular grade.\n\nAlex: No, that’s not the question. The question is not which grade are you in, the question, which is what you asked, was, is it necessary to know what grade you are in? Is it necessary to know what grade you are in while you are attending grammar school?\n\nParticipant 3: It helps.\n\nAlex: When you are in a grade, when you are in first grade or second grade, of course you know what grade you’re in.\n\nParticipant 3: So you know what room to go to. I’ll try and clarify that. If you….\n\nAlex: Of course, you have to know which room in the building each of classrooms for each of the grades is in. That’s something else, but Rinpoche doesn’t understand at all what you are driving at with the question you are asking. Is it necessary to know what grade you are in while you are going to school? Of course you know what grade you are in.\n\nSerkong Rinpoche: But if you ask, for instance, if when you reach third grade is it necessary to know that you’ve gotten to the third grade, then, yes, sure.\n\nParticipant 3: If you have attained a certain level of understanding and you fixate on that, does that mean that you lose your power of concentration over other things?\n\nAlex: Rinpoche says what’s the point of sitting and focusing on the fact that now you are in the third grade?\n\nParticipant 3: That’s why I’m asking, is it necessary to know that, because then you would lose….\n\nAlex: No, Rinpoche is saying that simply because when you know you are in the third grade, it doesn’t follow that you are going to sit there and dwell on the fact that, “It’s really great, I’m in the third grade.”\n\nParticipant 3: But I could feel proud of my achievement.\n\nAlex: Are you saying, that if you didn’t know what stage you were at, then you’d have nothing to feel proud about and, therefore, it’s better not to know what stage you’re at? What are you saying? Does anybody understand what he’s asking?\n\nParticipant 4: Are you trying to say that knowing what grade you are in, you know which particular aspect of the Dharma to approach, or which particular practice to employ?\n\nParticipant 3: Let me ask it in another way. Does an enlightened person know that one is enlightened?\n\nSerkong Rinpoche: When you are enlightened you know everything, so obviously you also know that you’ve become enlightened, you’re omniscient. When you become enlightened you know absolutely everything, so obviously you would know that as well, it’s", "num_tokens": 2048} {"category": "common_crawl-religion", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-religion/part-00-00000.npy", "text": " is believed to connect us to the natural energies of Pachamama (Mother Earth) and clear our chakras, especially the heart chakra.\n\nParticipants frequently report seeing life energy in the form of luminous fibers emanating from mountains, people, and even their fingertips. San Pedro provides a window into spiritual dimensions that are often unseen in daily life, offering a deeper understanding of the invisible world that shamans have long connected with.\n\nThe Visionary Experience and Healing\n\nSan Pedro can induce vivid, colorful visions and offer spiritual guidance to those seeking answers to their life questions. These visions are often accompanied by an inner knowing, providing clarity and insight. Additionally, the plant can trigger physical purging, particularly when individuals are processing energetic blocks or unresolved emotions. The purging process, though intense, typically brings a sense of deep relief and healing.\n\nShamanic Ceremonies and New Possibilities\n\nIn Andean shamanic tradition, San Pedro is believed to open a portal of un-manifested possibilities. Shamans use this time to identify the best potential outcomes for individuals or situations, then speak to those possibilities through their prayers and intentions. By doing so, they help manifest the best versions of people or situations into reality.\n\nDuring ceremonies, shamans often pray with tobacco and make offerings to usher in these possibilities. This sacred process is believed to transcend the fabric of time and space, creating new paths for healing and transformation. When a shaman forms a deep relationship with San Pedro, connecting with its spirit and their own intentions, spontaneous and unexplained healing can often occur.<|endoftext|>New Unitarian Universalist Hymnal Just Contains John Lennon's 'Imagine'\n\nU.S.—A new printing of the Unitarian Universalist hymnal just contains one song: John Lennon's \"Imagine.\"\n\nThe official UUA hymnal, titled Songs of Doubt, includes the popular song in a few dozen different arrangements and nothing else.\n\nNow UUA church members can sing along with deeply spiritual lyrics such as \"Imagine there's no heaven / It's easy if you try / No hell below us / Above us only sky.\" While UUA churchgoers aren't required to participate in hymn singing, the preaching of the Word, church attendance, or anything else, church leaders hope this move will encourage more parishioners to sing along.\n\n\"The old hymns were problematic because they mentioned Jesus, the cross, and God sometimes,\" said a UUA pastor of doubt formation. \"Now we can sing that there aren't any countries, nothing to kill or die for, and no religion too, just like the Great Feminine Spirit in the sky would have us do.\"\n\n\"One day all the world will live as one, as Lennon's classic hymn says,\" she added. \"Preferably under communism<|endoftext|>Greetings! I’m Moiz ul Rehman, the founder of Spiritual Radar. I am delighted to welcome you to our platform, where we delve deep into the enigmatic world of dreams.\n\nAt Spiritual Radar, we believe that dreams are not just fleeting images that visit us in our sleep but profound messages from our subconscious mind, offering insights into our innermost desires, fears, and potentials.\n\nOur Dream Teller Charges:\n\nPricing and Charges\n\nAt Spiritual Radar, we believe in making dream interpretation accessible and affordable. Our Dream Teller service is available for a nominal fee of just $15 per dream. This fee includes:\n\nCheck this also: best countries to travel for spiritual journey. \n\n • Detailed dream analysis by our expert team.\n • A personalized interpretation report.\n • Practical guidance on applying insights to your daily life.\n • An option for a follow-up session if needed.\n\nThe Importance of Dreams\n\nDreams have fascinated humanity for millennia. From ancient civilizations to modern psychology, the interpretation of dreams has always been seen as a bridge to the unknown realms of our psyche. Dreams can be:\n\n • Reflective: Mirroring our waking life experiences and emotions.\n • Predictive: Offering glimpses into potential future events or outcomes.\n • Symbolic: Using symbols to convey deeper meanings and insights.\n • Healing: Helping us process emotions and experiences, leading to personal growth and healing.\n\nAt Spiritual Radar, our Dream Teller service is crafted to help you decode these symbols and narratives, providing you with a clearer understanding of your subconscious messages.\n\nOur Dream Teller Service\n\nOur Dream Teller service is a comprehensive approach to dream interpretation, designed to provide you with detailed and meaningful insights. Here’s how it works:\n\n 1. Share Your Dream:\n • Detailed Submission: Start by sharing your dream with us. Provide as much detail as possible, including the sequence of events, emotions felt, recurring symbols, and any other significant elements. The more comprehensive your description, the more accurate our interpretation will be.\n • Confidentiality Guaranteed: Your privacy is our priority. All information shared with us is kept strictly confidential.\n 2. Dream Analysis:\n • Expert Analysis: Our team of experienced dream analysts will meticulously examine your dream. We draw upon a wealth of knowledge from various disciplines, including psychology, mythology, and spirituality.\n • Symbol Interpretation: We analyze the symbols and themes in your dream, exploring their meanings and how they relate to your waking life. This includes understanding cultural, personal, and universal symbols.\n 3. Personalized Interpretation:\n • In-Depth Report: You will receive a detailed, personalized report of your dream interpretation. This report will include an analysis of the symbols, themes, and potential messages from your subconscious.\n • Practical Guidance: Our interpretation goes beyond mere analysis. We provide practical advice on how to apply these insights to your daily life, helping you navigate challenges, make informed decisions, and pursue personal growth.\n 4. Follow-Up Session:\n • Continued Support: Dreams are dynamic and can evolve over time. We offer follow-up sessions to delve deeper into recurring themes or to address any new dreams you might have.\n • Interactive Consultation: During follow-up sessions, you can discuss your dream in detail with our analysts, ask questions, and explore further interpretations.\n\nWhy Choose Spiritual Radar?\n\n • Expertise and Experience: Our team comprises skilled dream analysts with years of experience in dream interpretation. We blend psychological theories with spiritual insights to offer a holistic approach to dream analysis.\n • Tailored Interpretations: We understand that every dream is unique. Our interpretations are personalized to reflect your individual experiences, emotions, and life context.\n • Holistic Approach: We consider not only the dream itself but also your personal life context, emotions, and experiences. This comprehensive approach ensures a more meaningful and accurate interpretation.\n • Confidential and Trustworthy: Your trust is important to us. We guarantee complete confidentiality and handle your dreams with the utmost care and respect.\n • Ongoing Support: Dreams can change and evolve, and their meanings can shift over time. We offer ongoing support to help you continue your journey of self-discovery and growth.\n\nThe Benefits of Understanding Your Dreams\n\nUnderstanding your dreams can have profound benefits for your personal and spiritual growth:\n\n • Self-Discovery: Gain insights into your innermost thoughts and feelings, helping you understand yourself better.\n • Emotional Healing: Process unresolved emotions and experiences, leading to emotional healing and well-being.\n • Decision-Making: Receive guidance and clarity on important life decisions.\n • Personal Growth: Unlock your potential and pursue personal growth and development.\n\nGet Started Today\n\nUnlock the secrets of your dreams with Spiritual Radar. Our Dream Teller service is here to guide you on your journey of self-discovery and personal growth. Contact us today to share your dream and begin your transformative journey.\n\nContact Information:\n\nFollow Us:\n\nThank you for choosing Spiritual Radar. I look forward to helping you navigate the fascinating world of dreams.\n\nWarm regards,\n\nMoiz ul Rehman\nFounder, Spiritual Radar\n\nExlore our Dream Blogs<|endoftext|>You will discover the tools to unlock the awesome powers of your subconscious mind. You can improve your relationships, your finances, your physical well-being. Once you learn how to use this unbelievably powerful force there is nothing you will not be able to accomplish. Join the race of successful people who have already unlocked the power of their subconscious mindsn the past I had a relationship, it was messy and unorganized. All I would do is worry Id lose her. That was my biggest fear. And I thought about it almost everyday. And one day I did. It was hard, but I learned from my mistake. I lost her so I could find someone better. Someone who fits perfectly to my soul. Someone who I feel so at home and comfortable with. And instead of worrying about me losing her, im celebrating with joy, and im excited to grow in life with her and get oldAnyone who is stuck in indolence and debts can notice that he has come to this by a gradual and systematic refusal to do what he likes and what he believes in as a whole. That's why we must always do the things that truly fill us with joy, and for that, you don’t usually need much money. That's what is waiting for us here and now, what all our loved ones are waiting for. It always begins with what is available, here and now, from a small to an ever-increasing thing.\n<>I’m glad you’re enjoying my book on using the law of attraction for a specific person, G! There are a couple of possibilities for why he didn’t come. 1) You had resistance. For example, you may have had some fears or doubts about what would happen once he got there. 2) You tried to control the outcome. When you bought the ticket, you decided how things were going to happen. Rather than letting the Universe determine how he would come to you, you decided how he would come.\n<>Hi Elizabeth, Ive just read the book – ive always visualised and practised gratitude and its worked well for me. However when it comes to love, not so much. I read the section on vibrational matches. When i think", "num_tokens": 2048} {"category": "common_crawl-religion", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-religion/part-00-00000.npy", "text": " thousand. \n\nOn a wooden panel from the tomb of Hesi, which probably dates from the end of the Archaic Period, we find a portion of an inscription in which the deceased prays for incense and for libations of cool water, wine, unguents, bulls, oxen, &c., by the thousand. 2 On a panel of a relief from the tomb of Hetep-her-s two tables laden with offerings are represented; on the one are fruit and flowers, and on the other joints of meat and loaves of bread and cakes, and on three lower tables, of similar shape, are two dead geese and the head of a bull. This tomb was built in the reign of Khufu. 1 In the tomb of Ptah-kha-mert is a tabulated list of offerings ninety-six in number, 2 and in the tomb of Ankh-ma-ka, who lived in the reign of User-en-Ra, (Vth Dynasty) are two tabulated lists of offerings, the one containing ninety-six objects, and the other one hundred and four. 3 From the reliefs which decorate the walls of several of the tombs of the Vth and VIth Dynasties it is certain that in addition to the bread, fruit, wine, beer, &c., which were offered to the dead, living animals were brought to the tombs and offered up as sacrifices on their behalf. In the tomb of Ptah-shepses 4 we see among those who bear gifts to the tomb ministrants leading goats, gazelle, calves, and sheep, and in one of the lower registers is depicted the slaughter of two bulls, from each of which a fore-leg is being cut off.\n\nIf we compare the lists of offerings given in the various tombs it at once becomes apparent that each list only contains a selection of names of objects; that the man who drafted the inscriptions for the mason to cut on the walls usually included only the most important names, and that the number of these depended upon the space which he had at his disposal. In the case of king Unas the various objects named as offerings are more than one hundred and forty in number, and in the pyramid of Pepi II. the number is still greater.\n\nNow in addition to supplying us with the names of the objects which pious men were expected to bring to the graves of their dead, the inscriptions on the mastaba tombs and other monuments of the Ancient Empire also tell us the names of the chief festivals of the year, during which they were expected to present their offerings. On the sarcophagus of Khufu-ankh (IVth Dynasty) the following festivals are mentioned:--\n\n1. Festival of the New Year.\n\n2. Festival of Thoth, (19th day of Thoth).\n\n3. Festival of the beginning of the year.\n\n4. Festival of Uak, (17th or 18th of Thoth).\n\n5. Great Festival, (4th of Mekhir).\n\n6. Heat Festival, (in the month of Mekhir).\n\n7. Appearance of Menu Festival, (30th day of Pashons).\n\n8. Festival of Uah-akh, (preparing the fire-altar).\n\n9. Festival of Satch.\n\n10. Festival of the beginning of the month.\n\n11. Festival of the beginning of the half month.\n\n12. Every festival on every day for ever  1.\n\nPassing now to the period of the XIIth Dynasty, we find that lists of offerings similar to those on monuments of the Vth and VIth Dynasties are not unknown, and a good example of such is given in the tomb of Amen-em-hat at Beni Hasan. Here on one of the walls is a picture of the deceased seated, with tables and stands loaded with offerings before him, and in the upper registers is a tabulated list containing the names of one hundred and twenty-one offerings. 2 This may for convenience' sake be called the Great List of Offerings. Elsewhere are given three copies of a list containing the names of twenty-two offerings, 3 this may be called the Little List of Offerings. A Great List, containing the names of fifty-four offerings, and a Little List, containing the names of twenty-two, are also found in the tomb of Khnemu-Hetep. 4 The list of the festivals given in the latter tomb is long, and contains the following:--\n\n1. Festival of the New Year.\n\n2. Festival of Thoth.\n\n3. Festival of Pert Menu.\n\n4. Festivals of Pati, 12 in number.\n\n5. Great Festival.\n\n6. Festivals of Great Heat and Little Heat.\n\n7. Festivals of the month, 12 in number.\n\n8. Festivals of the half-month, 12 in number.\n\n9. Festival of Aha.\n\n10. Festivals of Sat, 12 in number.\n\n11. Festival of Khen.\n\n12. Festival of the Nile Flood.\n\n13. Festival of the rise of Sothis.\n\n14. Festival of the rise of Sem.\n\n15. Festival of Khet kerh.\n\n16. Festivals of the 6th day of the month, 12 in number.\n\n17. Festival of [Shetchet] sha.\n\n18. Festivals of the Five Epagomenal Days.\n\n19. Good Festival of him that is on the hill, i.e., Anubis.\n\n20. Festival of Uak.\n\n2 1. Festival of Thoth.\n\n22. Great Festival and Little Festival of . . . . . .\n\n23. Great Festival and Little Festival of the Year.\n\nIt will be noticed that in the above list some seventy-three festivals are mentioned. The 1st, 6th, 15th, and one other day in each month were fixed festival days, and, if to these we add the other 25 festival days, we find that on an average every fifth day was a day of festival. We are, then, justified in assuming that offerings were made to the dead by well-to-do people about once a week, and at some seasons of the year oftener. In the lists of Festivals given in documents of later periods 1 several other Festivals are mentioned, and during the most flourishing periods of Egyptian history the offerings in the tombs of kings and wealthy folk were renewed, wholly or in part, daily. Thus to feed the spirits of the dead who belonged to him was as much the duty of a pious man as to feed the living who depended upon him, and there is no doubt that, when the country was in a settled state, a regulated portion of the produce of each man's estate was set apart for the dead.\n\nFrom several Chapters in the Theban Recension of the Book of the Dead many illustrations of the great importance attached to sepulchral offerings may be obtained. In Chapter I. the deceased beseeches the gods \"who give cakes and beer to the perfect souls\" to give him cakes and beer at the \"two seasons,\" i.e. morning and evening, daily. In Chapter LII. he prays that he may not be made to eat what is an abomination to him. \"Filth is an abomination unto me, and let me not be obliged to eat of it instead of the funerary cakes which the Kau (or, Doubles) eat. Let it not touch my body, let me be not obliged to take it in my hands, and let me not be obliged to walk thereon.\" And in answer to a question as to what be would live upon before the gods, he replies, \"Let me live on the seven loaves and cakes which are brought before Horus\" and Thoth, and let me eat my food under the sycamore tree of Hathor. Give me authority over my own fields in Tattu, and over my own crops in Annu. Let me eat bread made of white barley, and drink beer made from red grain.\" In another place he says, \"I live upon what the gods live upon, and I eat of the cakes which are in the hall of the lord of sepulchral offerings,\" (Chap. LIII.).\n\nIn the Papyrus of Nebseni, Chapter CLXXVIII., is a version of a text to which reference has already been made, but in its later form it is so instructive that one or two passages may well be quoted from it. In it Nebseni is made to say: \"The Eye of Horus hath been presented unto thee, and it feedeth thee with the food of offerings. O Osiris, let him not suffer thirst before his god, let him suffer neither hunger nor thirst, and let the god Ahu carry them away, and let him do away with his hunger, O thou that fillest, O thou that fillest hearts. O ye Chiefs who dispense cakes, O ye who have charge of the Water-flood (i.e., the Nile), command ye that cakes and ale be given unto the Osiris Nebseni, even as Ra himself commanded this thing. Moreover, Ra hath commanded those who are over the abundance of the year to take handfuls of wheat and barley and to give them unto him for his cakes, for behold, he is a great bull. . . . They shall give cakes and beer unto the scribe Nebseni, and they shall prepare for him all good and pure things this happy day, things for journeying, and things for travelling, things of the Eye of Horus, things of the Boat, and all things which enter into the sight of the god.... The Eye of Horus hath ordained these things for the scribe Nebseni, and the god Shu hath ordered that where", "num_tokens": 2048} {"category": "common_crawl-religion", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-religion/part-00-00000.npy", "text": " them, and Elijah went up to heaven in a whirlwind.\n\nRevelation 17:1-18 ESV - Then one of the seven angels who had the seven bowls came and said to me, \"Come, I will show you the judgment of the great prostitute who is seated on many waters, with whom the kings of the earth have committed sexual immorality and with the wine of whose sexual immorality the dwellers on earth have become drunk.\" And he carried me away in the Spirit into a wilderness, and I saw a woman sitting on a scarlet beast that was full of blasphemous names, and it had seven heads and ten horns. The woman was arrayed in purple and scarlet, and adorned with gold and jewels and pearls, holding in her hand a golden cup full of abominations and the impurities of her sexual immorality. And on her forehead was written a name of mystery: \"Babylon the great, mother of prostitutes and of earth's abominations.\"\n\nJohn 5: 2-4 (NKJV): Now there is in Jerusalem by the Sheep Gate a pool, which is called in Hebrew, Bethesda, having five porches. In these lay a great multitude of sick people, blind, lame, paralyzed, waiting for the moving of the water. For an angel went down at a certain time into the pool and stirred up the water; then whoever stepped in first, after the stirring of the water, was made well of whatever disease he had.\n\nMountain of God: Isaiah 37 (NIV) - 3 Now Moses was tending the flock of Jethro his father-in-law, the priest of Midian, and he led the flock to the far side of the wilderness and came to Horeb, the mountain of God.\n\nJesus on Crucification: the Cross\n\nExodus: 3 (NIV) - 2 There the angel of the Lord appeared to him in flames of fire from within a bush. Moses saw that though the bush was on fire it did not burn up.\n\nGenesis: 32 (NIV) - 24 So Jacob was left alone, and a man wrestled with him till daybreak. 25 When the man saw that he could not overpower him, he touched the socket of Jacob’s hip so that his hip was wrenched as he wrestled with the man. 26 Then the man said, \"Let me go, for it is daybreak.\" 30 So Jacob called the place Peniel, saying, \"It is because I saw God face to face, and yet my life was spared.\" 32 Therefore to this day the Israelites do not eat the tendon attached to the socket of the hip, because the socket of Jacob’s hip was touched near the tendon.\n\nRosary: Within the Roman Catholic Church, the Rosary has five sets of ten beads. Each set of ten beads is called a decade. Each decade is separated by one large bead. Different prayers are recited for different beads. The \"Our Father\" or \"Lord’s Prayer\" is recited on the large bead while the \"Hail Mary\" is prayed on each of the small beads.\n\nThe Hail Mary prayer: Hail Mary, full of grace, the Lord is with thee. Blessed art thou among women and blessed is the fruit of thy womb, Jesus. Holy Mary, Mother of God, pray for sinners now and at the hour of our death. Amen. - Catechism of the Catholic Church. Libreria Editrice Vaticana. 1994.\n\nRevelation:1 NIV) - 12 I turned around to see the voice that was speaking to me. And when I turned I saw seven golden lampstands, 13 and among the lampstands was someone like a son of man,[d] dressed in a robe reaching down to his feet and with a golden sash around his chest. 14 The hair on his head was white like wool, as white as snow, and his eyes were like blazing fire. 15 His feet were like bronze glowing in a furnace, and his voice was like the sound of rushing waters. 16 In his right hand he held seven stars, and coming out of his mouth was a sharp, double-edged sword. His face was like the sun shining in all its brilliance.\n\nRevelation:22 (NIV) - Then the angel showed me the river of the water of life, as clear as crystal, flowing from the throne of God and of the Lamb 2 down the middle of the great street of the city. On each side of the river stood the tree of life, bearing twelve crops of fruit, yielding its fruit every month. And the leaves of the tree are for the healing of the nations.\n\nRevelation 12:1-6 (ESV) -\n\nJoshua: 5 (NIV) - The Fall of Jericho - 13 Now when Joshua was near Jericho, he looked up and saw a man standing in front of him with a drawn sword in his hand. Joshua went up to him and asked, \"Are you for us or for our enemies?\" 14 \"Neither\", he replied, \"but as commander of the army of the Lord I have now come.\" Then Joshua fell facedown to the ground in reverence, and asked him, \"What message does my Lord have for his servant?\" 15 The commander of the Lord’s army replied, \"Take off your sandals, for the place where you are standing is holy.\" [Note: the same statement appeared when Moses saw god in burning bushes - Exodus:3] And Joshua did so.\n\nEzekiel: 1 (NIV) - 27 I saw that from what appeared to be his waist up he looked like glowing metal, as if full of fire, and that from there down he looked like fire; and brilliant light surrounded him. 28 Like the appearance of a rainbow in the clouds on a rainy day, so was the radiance around him. This was the appearance of the likeness of the glory of the Lord. When I saw it, I fell facedown, and I heard the voice of one speaking.\n\nBye-bulll on Idolators / Pagans\nRevelation 21: 8 But the cowardly, the unbelieving, the vile, the murderers, the sexually immoral, those who practice magic arts, the idolaters and all liars — they will be consigned to the fiery lake of burning sulfur. This is the second death.\nJesus as Son of Mary\n\nThe Catechism of the Catholic Church states, \"He became truly man while remaining truly God. Jesus Christ is true God and true man.\" Catechism of the Catholic Church says, \"The mystery of Christ's resurrection is a real event, with manifestations that were historically verified, as the New Testament bears witness.\"\n\nActs 1:14, NIV - They all joined together constantly in prayer, along with the women and Mary the mother of Jesus, and with his brothers. Luke 1:31 - You will conceive and give birth to a son, and you are to call him Jesus. Luke 11:27 - As Jesus was saying these things, a woman in the crowd called out, \"Blessed is the mother who gave you birth and nursed you.\" Luke 1:34 \"How will this be\", Mary asked the angel, \"since I am a virgin?\" 35 The angel answered, \"The Holy Spirit will come on you, and the power of the Most High will overshadow you. So the holy one to be born will be called the Son of God. Matthew 1: 18 - This is how the birth of Jesus the Messiah came about: His mother Mary was pledged to be married to Joseph, but before they came together, she was found to be pregnant through the Holy Spirit. 19-Because Joseph her husband was faithful to the law, and yet did not want to expose her to public disgrace, he had in mind to divorce her quietly.\n\nThe Hebrew Scriptures document approximately forty polygamists, including such prominent figures as Abraham, Jacob, and David. 2 Samuel 5:13 - \"After he left Hebron, David took more concubines and wives in Jerusalem, and more sons and daughters were born to him.\" 1 Kings 11:3 - \"He (Solomon) had seven hundred wives of royal birth and three hundred concubines... 4 - As Solomon grew old, his wives turned his heart after other gods, and his heart was not fully devoted to the Lord his God, as the heart of David his father had been... 5 - He followed Ashtoreth the goddess of the Sidonians, and Molek the detestable god of the Ammonites.\"\n\nKillings by God\n\nExodus 3: (NIV) - 18 The elders of Israel will listen to you. Then you and the elders are to go to the king of Egypt and say to him, 'The Lord, the God of the Hebrews, has met with us. Let us take a three-day journey into the wilderness to offer sacrifices to the Lord our God.’ 19 But I know that the king of Egypt will not let you go unless a mighty hand compels him. 20 So I will stretch out my hand and strike the Egyptians with all the wonders that I will perform among them. After that, he will let you go.\n\nExodus 4: Killing of first-born babies, Exodus 12: 12 - For that night I will go through the land of Egypt and strike down every first-born in the land of Egypt, both man and beast; and I will mete out punishments to all the gods of Egypt, I the LORD.\n\nIsaiah:37 (", "num_tokens": 2048} {"category": "common_crawl-religion", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-religion/part-00-00000.npy", "text": " where now can there be any ungenerated darkness? Or how can darkness be understood to exist at all, unless it is something simply accidental? Archelaus said: Forasmuch, indeed, as the word of the Gospel is understood much better by you than by this person who puts himself forward as the Paraclete, although I could call him rather parasite than paraclete, I shall tell you how it has happened that there is darkness. When the light had been diffused everywhere, God began to constitute the universe, and commenced with the heaven and the earth; in which process this issue appeared, to wit, that the midst, which is the locality of earth covered with shadow, as a consequence of the interposition of the creatures which were called into being, was found to be obscure, in such wise that circumstances required light to be introduced into that place, which was thus situated in the midst. Hence in Genesis, where Moses gives an account of the construction of the world, he makes no mention of the darkness either as made or as not made. But he keeps silence on that subject, and leaves the explanation of it to be discovered by those who may be able to give proper attention to it. Neither, indeed, is that a very arduous and difficult task. For to whom may it not he made plain that this sun of ours is visible, when it has risen in the east, and taken its course toward the west, but that when it has gone beneath the earth, and been carried farther within that formation which among the Greeks is called the sphere, it then ceases to appear, being overshadowed in darkness in consequence of the interposition of the bodies? When it is thus covered, and when the body of the earth stands opposite it, a shadow is superinduced, which produces from itself the darkness; and it continues so until again, after the course of the inferior space has been traversed in the night, it rolls towards the east, and is seen to rise once more in its wonted seats. Thus, then, the cause of the shadow and the night is discovered in the solidity of the body of the earth — a thing, indeed, which a man may understand from the fact of the shadow cast by his own body. For before the heaven and the earth and all those corporeal creatures appeared, the light remained always constant, without waning or eclipse, as there existed no body which might produce shadow by its opposition or intervention; and consequently one must say that nowhere was there darkness then, and nowhere night. For if, to take an illustration, it should please Him who has the power of all things to do away with the quarter which lies to the west, then, as the sun would not direct its course toward that region, there would nowhere emerge either evening or darkness, but the sun would be on its course always, and would never set, but would almost always hold the centre tract of heaven, and would never cease to appear; and by this the whole world would be illumined with the clearest light, in virtue of which no part of it would suffer obscuration, but the equal power of one light would remain everywhere. But on the other hand, while the western quarter keeps its position, and the sun executes its course in three parts of the world, then those who are under the sun will be seen to be illuminated more brightly; so that I might almost say, that while the people who belong to the diverse tract are still asleep, those former are in possession of the day's beginning. But just as those Orientals have the light rising on them earlier than the people who live in the west, so they have it also more quickly obscured, and they only who are settled in the middle of the globe see always an equality of light. For when the sun occupies the middle of the heavens, there is no place that can appear to be either brighter or darker (than another), but all parts of the world are illuminated equally and impartially by the sun's effulgence. If, then, as we have said above, that portion of the western tract were done away with, the part which is adjacent to it would now no more suffer obscuration. And these things I could indeed set forth somewhat more simply, as I might also describe the zodiacal circle; but I have not thought of looking into these matters at present. I shall therefore say nothing of these, but shall revert to that capital objection urged by my adversary, in his affirming so strenuously that the darkness is ungenerated; which position, however, has also been confuted already, as far as that could have been done by us.\n\n23. The judges said: If we consider that the light existed before the estate of the creatures was introduced, and that there was no object in an opposite position which might generate shadow, it must follow that the light was then diffused everywhere, and that all places were illuminated with its effulgence, as has been shown by what you have stated just now; and as we perceive that the true explanation is given in that, we assign the palm to the affirmations of Archelaus. For if the universe is clearly divided, as if some wall had been drawn through the centre of it, and if on the one side the light dwells, and on the other side the darkness, it is yet to be understood that this darkness has been brought accidentally about through the shadow generated in consequence of the objects which have been set up in the world; and hence again we must ask who it is that has built this wall between the two divisions, provided you indeed admit the existence of such a construction, O Manichaeus. But if we have to take account of this matter on the supposition that no such wall has been built, then again it comes to be understood that the universe forms but one locality, without any exception, and is placed under one power; and if so, then the darkness can in no way have an ungenerated nature. Archelaus said: Let him also explain the following subject with a view to what has been propounded. If God is seated in His kingdom, and if the wicked one in like manner is seated in his kingdom, who can have constructed the wall between them? For no object can divide two substances except one that is greater than either, even as it is said in the book of Genesis, that God divided the light from the darkness. Consequently the constructor of this wall must also be some one of a capacity like that: for the wall marks the boundaries of these two parties, just as among people who dwell in the rural parts a stone is usually taken to mark off the portion of each several party; which custom, however, would afford a better apprehension of the case were we to take the division to refer specially to the marking out of an inheritance failing to brothers. But for the present I have not to speak of matters like these, however essential they may appear. For what we are in quest of is an answer to the question, Who can have constructed the wall required for the designation of the limits of the kingdom of each of these two? No answer has been given. Let not this perfidious fellow hesitate, but let him now acknowledge that the substance of his duality has been reduced again to a unity. Let him mention any one who can have constructed that middle wall. What could the one of these two parties have been engaged in when the other was building? Was he asleep? Or was he ignorant of the fact? Or was he unable to withstand the attempt? Or was he bought over with a price? Tell us what he was about, or tell us who in all the universe was the person that raised the construction. I address my appeal to you, O judges, whom God has sent to us with the fullest plenitude of intelligence; judge which of these two could have erected the structure, or what the one could have been doing all the while that the other was engaged in the building.\n\n24. The judges said: Tell us, O Manes, who designated the boundaries for the kingdom of each, and who made the middle wall? For Archelaus begs that due importance be attached, to the practice of interrogation in this discussion. Manes said: The God who is good, and who has nothing in common with evil, placed the firmament in the midst, in order to make it plain that the wicked one is an alien to Him. Archelaus said: How fearfully you belie the dignity of that name! You do indeed call Him God, but you do so in name only, and you make His deity resemble man's infirmities. At one time out of the non-existent, and at another time out of underlying matter, which indeed thus existed before Himself, you assert that He did build the structure, as builders among men are wont to do. Sometimes also you speak of Him as apprehensive, and sometimes as variable. It is, however, the part of God to do what is proper to God, and it is the part of man to do what is proper to man. If, then, God, as you say, has constructed a wall, this is a God who marks Himself out as apprehensive, and as possessed of no fortitude. For we know that it is always the case that those who are suspicious of the preparation of secret perils against them by strangers, and who are afraid of the plots of enemies, are accustomed to surround their cities with walls, by which procedure they at once secure themselves in their ignorance, and display their feeble capacity. But here, too, we have something which ought not to be passed over by us in silence, but rather brought prominently forward; so that even by the great abundance of our declarations on the subject our adversary's manifold craftiness may be brought to nought, with the help of the truth on our side. We may grant, then, that the structure of the wall has been made with the purpose of serving to distinguish between the two kingdoms; for without this one division it is impossible for either", "num_tokens": 2048} {"category": "common_crawl-religion", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-religion/part-00-00000.npy", "text": " victims.\n\nFive years later, Jacobs continued, those efforts were put to the test when he discovered that a fellow inmate he’d come to know was believed to be responsible for the death of Jacobs’ brother — an event that happened within days of Jacobs’ own crime.\n\nWhen he heard this news, Jacobs said, he realized how easy it would be to reverse his progress. “I had the opportunity to change back into the kid who took a 20-year-old’s life for no reason, no justifiable reason,” he said. “I could live in the conversation that I’ve been having in my head since my brother died: Vengeance. Retribution.”\n\nBut more than anything, Jacobs said, he wanted forgiveness. “I want to be forgiven for what I had taken from this family when I was 15 years old,” he said. “And in that moment … I remember the (Biblical) scripture saying, ‘Be ye transformed by the renewing of your mind.’ The God that I believe in was not telling me to change (but to) be something new. Something completely different. Something you are not in this moment. Because in that moment, I’m mad. I’m vengeful. I’m retributive. (And) in that moment, I made the choice to transform.”\n\nHe chose to extend the same forgiveness he seeks. “Not only because he is entitled to be redeemed. Not only because I want to go home,” Jacobs said. “But because I want to be something new.”\n\nCalifornia Gov. Gavin Newsom commuted Jacobs’ sentence earlier this month to make him eligible to seek parole immediately because Jacobs “has dedicated himself to his rehabilitation and becoming a productive citizen” since he was imprisoned. “This act of clemency does not minimize or forgive his conduct or the harm it caused,” Newsom’s statement says. “It does recognize the work he has done since to transform himself.”\n\nJacobs shared his story as the CNN Original Series “This Is Life with Lisa Ling” filmed at the Correctional Training Facility in Soledad, California, for an episode about a reading program that connects prep school students with prisoners facing life sentences. You can listen to Jacobs’ speech below.\n\nHis wasn’t the only story of transformation during the making of the episode. Below, hear from two other inmates who describe how they, too, have sought restoration.\n\n‘A moral obligation’\n\nFor seven years, Palma School in nearby Salinas has partnered with the Correctional Training Facility on a reading program that brings together a small group of students and prisoners to learn from one another and foster empathy.\n\nEarlier this year, two CTF inmates were given special permission to attend an assembly at Palma and share their stories with the private school’s students. One of the two was Alfredo “Freddie” Ortega, who was incarcerated in 2008 and is eligible for parole in June 2030.\n\nIn his speech, Ortega was candid about his upbringing and the decisions he made as a teen to join a gang. Now 37 years old and facing a life sentence, Ortega reflected on how past fears and insecurities led him to where he sits today, and how he wants to live his life going forward.\n\n“Growing up, I allowed myself to develop an unhealthy desire to be accepted by my friends, who also became gang members. My childhood fears of being different, the fear of rejection, fear of not being liked, fear of not fitting in led me to seek acceptance, recognition and attention from my peers … (and) contributed to my violent behavior,” Ortega told the Palma students. “Today I am deeply ashamed that I became that selfish, impulsive and irresponsible person that cared very little for the right of others and cared nothing for their safety. Today I feel a moral obligation to live my life in a manner that displays compassion, kindness, respect and dignity towards others.”\n\nListen to Ortega’s story below.\n\n‘I’m going to do something new’\n\nVincent Rivera, 35, spoke frankly about his path toward transformation. Along with Jacobs, he shared his history, and how he found himself in a space where he wanted to become something new.\n\n“When I came to prison, I had a choice to make,” Rivera said. “What am I going to do? How am I going to fit in? … I thought like, man, this is it. I’m going to die in prison. I came to prison with 96 years to life.”\n\nBut, he said, “I made a decision for my future. I made a decision that says, ‘You know what? I’m going to do something new that I’ve never done before. I’m going to start making right decisions.'”\n\nWhile the death of his father tested his resolve, Rivera said, he remains committed to his new direction. “It (was) an invitation to do one of two things: either I could backslide a little bit and justify it by my father’s death, or I could use it to motivate me to go forward.’\n\nRivera has been in prison since 2013 and is eligible for parole in April 2035. Listen to Rivera’s story below.\n\nThere is no custom code to display.<|endoftext|>How to Stop Being Codependent in a Relationship?\n\nThe article emphasizes the importance of normality in emotions, advocating for pure love and self-realization to overcome emotional dependency. Param Pujya Dada Bhagwan's teachings highlight the transformation from emotional love to pure love through self-realization, leading to harmonious relationships and freedom from emotional bonds.\nHaving Normality in Emotions\nOur emotions should remain in normality, neither above normal nor below!\nNormality means our behaviour is just like that of actors or actresses in plays or movies. For instance, an actor acts like a good husband and is nice to his wife in the play. He says positive things to her which makes her feel happy. When he comes back home from a business trip, he says to his wife, “I missed you and I did not like being away from you.”\n‘Such positive and loving behaviour wins the wife over’ - this message is so nicely conveyed by the husband and wife via their acting that it creates pleasure and conviction in the mind of everyone who sees them (their audience)!\nYou too can act similarly in your personal life.Perform your role in life with the same degree of conviction as the actors and actresses. That will make everyone in your family happy. And more importantly, it makes you free from the bonds of emotional dependency towards your co-dependent.\nParam Pujya Dada Bhagwan says that intellect makes one emotional. Imagine what would happen if this train were to become emotional? It will cause accidents and kill many people. Similarly, when humans become emotional, countless organisms in our body die. So, remain in ‘motion.’\n\nJust imagine what would happen if the driver of a train becomes emotional? It will lead to a collision of the train and several people will die, isn’t it?! And we become responsible for it. Therefore, realize your responsibility and remain in normality!\nNot Emotional Love, Adopt Pure Love!\nWhen people say that they love each other, one is generally referring to the emotions which are an outcome of attraction and attachment for each other. Emotions, by their inherent nature, rise and over time fade out; whereas pure love is a constant phenomenon; it neither increases nor decreases.\nWhere there is pure love, one does not hurt anyone’s feelings through his actions. Even his speech does not hurt; it is without mistakes. Nobody gets hurt by his spoken words because he has genuine love for everyone! How does the pure love arise? Read\nCan Get Rid of Emotional Dependency and Fix Codependent Relationships in just Two hours\nLet’s understand how...\nIn 1958, Param Pujya Dada Bhagwan attained Self-Realization! He had a wife and was a contractor in business. Throughout his life, he took good care of his wife. Going ahead, his wife lost vision in one eye. But this didn’t affect him at all, because after Self-Realization, he had become an embodiment of Pure Love. His emotions were replaced by Pure Love now!\nHe lived an exemplary life and provided such art of living to the common masses, which made it possible even for a layman to maintain happy, peaceful and harmonious relationships with everyone. One could do this by making minimum changes in his external behaviour and yet reap maximum benefits in terms of healthy relationships. How??\nBy attaining Self-Realization and adopting the right understanding in life.\nWhat is Self-Realization? And how does it Solve the Problem of Emotional Dependency?\nDo you know we all are really a ‘Pure Soul’? And Soul itself is ‘Pure Love’!\nOwing to ignorance of ‘who am I?’ we believe ourselves to be the body or the name given to this physical body. Consequently, we develop attachment for everybody towards whom we feel above-normal emotions and we become emotionally dependent; and simultaneously harness hatred for those towards whom we have negative emotions such as anger, jealousy, envy, sadness, etc.\nThe very nature of emotions is such that it inevitably leads to more and more suffering in life. But if we can somehow do away with the ignorance and know that really ‘I am a Pure Soul’, we can find a way out of all the suffering. Want to know more about Self Realization process? Read\nTo our Best Fortune...\nParam Pujya Dada Bhagwan, after Self-Realization, also attained special divine powers, with the help of which, he was able to impart Self-Realization to people at large. Before he passed away, he blessed Pujya Deepakbhai with those divine powers too. As a result, we can easily attain Self-Realization today, with the direct grace of this Living Gnani!!!\nWith enormous compassion in His heart, Gnani removes the darkness of ignorance within us and bestows the real knowledge", "num_tokens": 2048} {"category": "common_crawl-science_math_and_technology", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-science_math_and_technology/part-00-00000.npy", "text": "including parachute) jumps off a plane and begins her descent.\nThroughout this problem use 9.80 m/s^2 for the magnitude of the acceleration due to gravity.\n\nAt some point during her free fall, the sky diver reaches her terminal speed. What is the magnitude of the drag force Fdrag due to air resistance that acts on the sky diver when she has reached terminal speed?\n\nFor an object falling through air at a high speed , the drag force acting on it due to air resistance can be expressed as\n\n,F=Kv^2\n\nwhere the coefficient K depends on the shape and size of the falling object and on the density of air. For a human body, the numerical value for K is about 0.250 kg/m.\n\nUsing this value for K, what is the terminal speed vterminal of the sky diver?\n\nWhen the parachute is fully open, the effective drag coefficient of the sky diver plus parachute increases to 60.0 kg/m. What is the drag force Fdrag acting on the sky diver immediately after she has opened the parachute?\n\nWhat is the terminal speed vterminal of the sky diver when the parachute is opened?\n\nGet this answer with Chegg Study<|endoftext|>Registration Dossier\n\nData platform availability banner - registered substances factsheets\n\nPlease be aware that this old REACH registration data factsheet is no longer maintained; it remains frozen as of 19th May 2023.\n\nThe new ECHA CHEM database has been released by ECHA, and it now contains all REACH registration data. There are more details on the transition of ECHA's published data to ECHA CHEM here.<|endoftext|>One very important thing to do before using a sensor and trying to develop an application using it is verifying that it's output is actually correct. If this does not happen to be the case we need to calibrate the sensor (alternatively it could also be broken but that's rather unlikely in this case).\n\nIn my case on two different micro:bit's the magnetometer, without calibration, was quite a bit off of what it is supposed to measure. Hence for the purposes of this chapter we will just assume that the sensor has to be calibrated.\n\nThe calibration involves quite a bit of math (matrices) so we won't cover it here but this Design Note describes the procedure if you are interested.\n\nLuckily for us though the group that built the original software for the micro:bit already implemented a calibration mechanism in C++ over here.\n\nYou can find a translation of it to Rust in src/calibration.rs. The usage is demonstrated in the default src/main.rs file. The way the calibration works is illustrated in this video:\n\nYou have to basically tilt the micro:bit until all the LEDs on the LED matrix light up.\n\nIf you do not want to play the game every time you restart your application during development feel free to modify the src/main.rs template to just use the same static calibration once you got the first one.\n\nNow where we got the sensor calibration out of the way let's look into actually building this application!<|endoftext|>Supplementary Materialscells-08-00045-s001. and had increased H2AX recruitment and cell cycle delay.\n\nSupplementary Materialscells-08-00045-s001. and had increased H2AX recruitment and cell cycle delay. Compensatory HIF-2 activity in HIF1 knockout cells is the main cause of this radioprotective effect. Under hypoxia, HIF1 knockout cells uniquely had a strong increase in lactate production and decrease in extracellular pH. Using genetically identical HIF- isoform-deficient cells we identified a strong radiosensitizing of HIF1, but not of HIF2, which was associated with a reduced extracellular pH and reduced glycolysis. 0.001) indicating that normalized RID reflects the number of -H2AX foci. 2.8. Cell Cycle Analysis For cell cycle analysis, cells were incubated either under normoxic or hypoxic conditions for 24 h, exposed to radiation and placed under normoxia for 4 h. Cells were washed with PBS, treated with trypsin and fixed in ice-cold 70% ethanol for at least 24 h. Before analysis, cells were washed with PBS and stained with propidium iodide (PI) for 30 min at room temperature. Analysis was performed using a FACS CANTO II. Data obtained from the cell cycle distributions were analyzed using a FlowJo_10. 2.9. pH and Extracellular L-Lactic Acid Measurements Changes in extracellular pH were monitored using a pH meter (Beckman Coulter, Brea, CA, USA, pH 350). Cells were seeded at different cell numbers and incubated for 24 h under 0.2% O2. Levels of extracellular L-Lactic acid were measured using the L-Lactic acid kit (Biosentec, Toulouse, France) according to manufacturers guidelines. Both pH and L-Lactic acid levels were corrected for cell counts. 2.10. Metabolic Profiling Cells were seeded at an optimized cell density of 3 104 cells/well. Metabolic profiles were generated by replacing the growth medium for assay media 1 h before using the Seahorse XF96 extracellular Flux analyzer (Seahorse Bioscience, Billerica, MA, USA) according to manufacturers guidelines. 2.11. Statistics All assays were performed at least three times, and results are expressed as means standard deviations. Analyses were performed with GraphPad Prism 5. Statistical assessments were always performed relative to WT cells. Unpaired two-tailed Students values 0.05 were considered significant. 3. Results To examine the radiobiological AS-605240 enzyme inhibitor and metabolic properties of HIF-1 and HIF-2, AS-605240 enzyme inhibitor we generated HIF loss-of-function mutants in H1299 cells using the type II CRISPR/Cas9 system. Single allele sequencing confirmed that cells carried mutations that led to premature termination of the HIF- open reading frame. Each knockout harbored two or three different mutated alleles leading to one or several STOP codons (Physique S2). We verified that H1299 clones did not have the Cas9 plasmid integrated (data not shown). Western blotting confirmed the absence of HIF proteins (Physique 1A). We observed a prominent increase in HIF-2 stabilization following hypoxia incubation in H1KO cells, but without elevated HIF-2 mRNA expression levels (Physique S3). On ZPK the contrary, HIF-2-deficiency did not influence the hypoxic induction of HIF-1 protein expression. The overall expression levels of HIF-1 were decreased in all the knockout models in comparison with WT cells (Physique 1A). Next, we decided the mRNA expression levels of the canonical hypoxia-induced genes CAIX, GLUT1, CITED2 and TWIST1. We observed that this induction of these genes was severely compromised in the absence of HIF-1 and/or HIF-2 proteins under hypoxia (Physique 1B). Furthermore, only AS-605240 enzyme inhibitor AS-605240 enzyme inhibitor small differences were seen in the proliferative capacity of single HIF mutants in comparison with WT cells, both under normoxic and low oxygen conditions. In dHKO cells, a small but significant (= 0.0124) growth delay was observed compared to wildtype cells under normoxic conditions (Figure 1C) and under prolonged hypoxic conditions (= 0.0494) (Physique 1D). Open in a separate window Physique 1.<|endoftext|>Cyber Cops\n\nCybersecurity is a critical field focused on protecting digital systems, networks, and sensitive data from cyber threats. In today’s interconnected world, businesses and individuals face increasing risks from hackers, malware, and other malicious activities. Effective cybersecurity involves implementing a range of measures, including firewalls, encryption, secure coding practices, and regular security audits. These defenses are designed to prevent unauthorized access, data breaches, and disruptions that can have serious consequences for organizations and individuals alike.\n\nIn addition to technical defenses, cybersecurity also emphasizes the importance of user awareness and training. Human error remains one of the biggest vulnerabilities, making it essential for users to recognize potential threats like phishing scams and weak passwords. By combining advanced technology with informed practices, cybersecurity plays a vital role in ensuring the safety and integrity of our digital lives, allowing us to operate securely in an ever-evolving cyber landscape\n\nSign In\n\nReset Password\n\nPlease enter your username or email address, you will receive a link to create a new password via email.<|endoftext|>The Environmental Journal of Southern Appalachia\n\nTorrential rains in Smokies destroy trails, roads and other infrastructure\n\nWritten by\n\n7.13.22 Porters Creek Road washoutA washout is seen along Porters Creek Road in Great Smoky Mountains National Park following torrential rain on July 12. National Park Service\n\nFlooding causes Smokies damage, prompts water advisory for Sevierville \n\nSEVIERVILLE — Extremely heavy rain on July 12 in the Smoky Mountains caused a cascade of problems now just coming to light.\n\nSevierville and Sevier County issued a boil-water advisory early Thursday after debris flushed by Tuesday’s floodwaters clogged the city water utility’s main intake on the French Broad River, leading to pressure decreases that opened up lines to possible outside contamination.\n\nIn Great Smoky Mountains National Park, Greenbrier campground was closed indefinitely after the swollen Middle Prong of the Little Pigeon River wiped out roads, trails and bridges in", "num_tokens": 2048} {"category": "common_crawl-science_math_and_technology", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-science_math_and_technology/part-00-00000.npy", "text": "es\n\nThe occipital lobes are to ____ as the temporal lobes are to ____ .\n\nseeing;hearing\n\nThe sens of hearing is to the ____ lobes as the sens of touch is to the ___ lobes\n\nTemporal;parietal\n\nThe motor cortex is located in the ____ lobes\n\nA laboratory cat could be made to twitch its whiskers by direct stimulation of the ____ lobes of its cereral cortex .\n\nwhich of the following body parts is associated with the greatest amount of brain tissue in the motor cortex?\n\nAn area at the front of the parietal lobes that receives information from the movement of the body parts is called the ;\n\nsensory cortex\n\nThe sensory cortex is most critical for our sense of ;\n\nwhich part of your brain receives information as to whether you are moving your legs?\n\nsensory cortex\n\nThe experience of auditory hallucinations by people with schizophrenia is most closely linked with the activation of areas in their ;\n\ntemporal lobes\n\nThe association areas are loacted in the ;\n\nCerebral cortex\n\nThe most extensive regions of the brain, which enable learning and memory, are called the ;\n\nassociation areas\n\nAfter he suffered a stroke, Mr. Santores physical coordination skills and responsiveness to sensory stimulation quickly returned to normal. Unfortunatley, howeve, he began to experience unusual difficulty in scheduling his daily activities and solving simple problems. It is most likely that Mr. Santore suffered damage to his;\n\nAssociation areas\n\nThe process of anticipating that you will be punished for misbehaving takes place withing the;\n\nassociation areas\n\nthe process of anticipating that you will be punsihed for misbehaving takes places within the ;\n\nassociation areas\n\nthe ability to recognize familiar faces is disturbed by damage to the right ___ lobe\n\nAn impaired use of language is known as;\n\nThe part of the cerebral cortex that directs the muscle movements involved in speech is known as ;\n\nBroca's area\n\nAFter miguels recent automobile accident, doctors detected damage to his cerebral cortex in Broca's area. It is likely that miguel well have diffuclty ;\n\nSpeaking fluent<|endoftext|>General information and precautions\n\nContact breaker ignition system The ignition system is divided into two circuits, low tension (primary) and high tension (secondary). The low tension circuit consists of the battery, ignition switch, primary coil windings and the contact breaker points and condenser. The high tension circuit consists of the secondary coil windings, the heavy ignition lead from the centre of the distributor cap to the coil, the rotor arm and the spark plug leads and spark plugs.\n\nWhen the system is in operation, low tension voltage is changed in the coil into high tension voltage by the opening and closing of the contact breaker points in the low tension circuit. High tension voltage is then fed, via the carbon brush in the centre of the distributor cap, to the rotor arm of the distributor. The rotor arm revolves inside the distributor and each time it comes in line with one of the four metal segments in the distributor cap, which are connected to the spark plug leads, the opening and closing of the contact breaker points causes the high tension voltage to build up and jump the gap from the rotor arm to the appropriate metal segment. The voltage then passes via the spark plug lead to the spark plug, where it finally jumps the spark plug gap before going to earth.\n\nThe distributor is driven by a skew gear from the camshaft on the OHV engine and by an offset dog on the end of the camshaft on CVH engines.\n\nThe ignition advance is a function of the distributor and is controlled both mechanically and by a vacuum-operated system.\n\nA ballast resistor is incorporated in the low tension circuit between the ignition switch and the coil primary windings. The ballast resistor consists of a grey coloured resistive wire running externally to the main loom between the ignition switch and coil. During starting this resistor is bypassed allowing full available battery voltage to be fed to the coil which is of a low voltage type. This ensures that during starting when there is a heavy drain on the battery, sufficient voltage is still available at the coil to produce a powerful spark. During normal running, battery voltage is directed through the ballast resistor to limit the voltage supplied to the coil to seven volts.\n\nElectronic breakerless ignition The fundamentals of operation of the electronic breakerless ignition system are similar to those described previously for the contact breaker system, however in the breakerless electronic ignition system, the action of the contact breaker points is simulated electronically within the distributor.\n\nControl of ignition advance characteristics is still carried out in the conventional way using mechanical and vacuum systems.\n\nProgrammed electronic ignition (RS Turbo models)\nThe two main components of the system are the electronic control module designated Electronic Spark Control II (ESC II), and a Hall effect electronic ignition distributor.\n\nThe distributor is mounted on the flywheel end of the cylinder head, and is driven directly off the camshaft by an offset dog coupling.\n\nContained within the distributor is a trigger vane, permanent magnet and position sensor.\n\nThe trigger vane is a cylindrical disc attached to the distributor shaft and having four slots on its vertical surface, one for each cylinder. The permanent magnet and position sensor are secured to the distributor baseplate in such a way that the vertical surface of the trigger vane passes between them. As the trigger vane rotates, the magnetic field between the magnet and position sensor is interrupted and a series of square wave electronic pulses are produced. This output wave form is sent to the ESC II module and from this, engine speed, ignition advance and idle speed are calculated.\n\nA small bore hose connecting the inlet manifold to a vacuum transducer within the module supplies the unit with information on engine load, and a charge air temperature sensor, which is a temperature sensitive resistor located in the air intake duct, provides information on engine intake air temperature.\n\nFrom this constantly changing data the ESC II module selects a particular advance setting from a range of ignition characteristics stored in its memory.\n\nWith the firing point established, the module switches off the ignition coil primary circuit, the magnetic field in the coil collapses and the high tension voltage is created. At precisely the right instant the ESC II module switches the coil primary circuit back on and the cycle is repeated for each cylinder in turn.\n\nAdditionally the ESC II module operates in conjunction with the fuel-injection and turbo systems to provide data on engine rpm to the fuel-injection control module, and to provide an overriding control of turbo boost pressure.\n\nProgrammed electronic ignition (1.4 litre fuel injection engines) The ignition system consists of a Hall effect distributor (as described previously for RS Turbo models), TFI IV ignition module, coil and EEC IV module.\n\nThe distributor is similar to that used on earlier CVH engine models, but has no centrifugal or vacuum advance mechanisms, the advance functions being carried out by the EEC IV module. The distributor acts as a trigger and provides a pulse signal to the EEC IV module.\n\nThe distributor performs the following functions:\na) Sends signals to the EEC IV module to trigger the ignition firing process.\n\nb) Enables the EEC IV module to calculate engine speed from the pulse signals.\n\nc) Distributes HT voltage to the spark plugs.\n\nThe TFI (Thick Film Integration) IV module functions as a high current switch by controlling the ignition coil primary LT circuit.\n\nThe module is controlled by one of two input signals, either from the Hall effect sensor in the distributor, or from the EEC IV module.\n\nThe signal from the distributor passes via the TFI IV module to the EEC IV module. The EEC IV module modifies the signal to provide ignition timing advance relative to engine speed, load and temperature, before returning it to the TFI IV module.\n\nThe EEC IV module provides total engine management via the ignition and fuel systems.\n\nFrom signals received from the various sensors, the module controls the following functions:\na) Ignition timing.\n\nb) Fuel delivery.\n\nc) Deceleration fuelling.\n\nd) Idle speed.\n\ne) Engine overspeed protection.\n\nIf the module should fail, the ignition timing will be switched by the TFI IV module (there will be no ignition advance) and fuel will be delivered at a constant rate. This state is known as the Limited Operation Strategy (LOS) and allows the vehicle to be driven, albeit with greatly reduced engine performance and fuel economy.\n\nShould any of the system sensors fail, the EEC IV module will sense this and substitute a single predetermined value for the failed input.\n\nAgain, this will allow continued engine operation, with reduced performance and driveability. Under these conditions a self-test code will be stored in the module memory to aid subsequent fault diagnosis by a Ford dealer.\n\nDistributorless ignition system (DIS)\n1.4 litre fuel injection engines The mechanical distribution of high tension voltage (by a rotating distributor) is replaced by “static” solid-state electronic components.\n\nThe system selects the most appropriate ignition advance setting for the prevailing engine operating conditions from a threedimensional map of values stored in the Electronic Spark Control (ESC) module memory. The module selects the appropriate advance value according to information supplied on engine load, speed, and operating temperature by various sensors.\n\nEngine speed is monitored by a sensor mounted in the cylinder block, which is activated by 35 equally-spaced teeth on the flywheel. A gap occupies the position of the 36th tooth, which denotes 90° BTDC for No 1 cylinder. As the engine speed increases, so does the frequency and amplitude of the signal sent to the ESC module (photos).\n\nEngine load information is provided by a pressure sensor which is integral with the ESC module. The sensor monitors vacuum in the inlet manifold via a hose.\n\nEngine temperature is monitored by an Engine Coolant Temperature (ECT) sensor screwed into the bottom of the inlet manifold.\n\nA DIS coil assembly is mounted on the cylinder block next to No 1 cylinder. The coil has two primary and two secondary windings.\n\nOne secondary winding supplies current to numbers 1 and 4 cylinders simultaneously, while the other supplies current to numbers 2 and 3 cylinders. Whenever either of the coils is energ", "num_tokens": 2048} {"category": "common_crawl-science_math_and_technology", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-science_math_and_technology/part-00-00000.npy", "text": "bellum http://hdl.handle.net/1811/58823 Circadian Variation of Locomotor Ability Mediated by Nitric Oxide in the Cerebellum Spieldenner, James M. Previous research has revealed circadian differences in locomotor ability corresponding to improved performance during active period. Nitric oxide (NO) production by the enzyme neuronal nitric oxide synthase (nNOS) exhibits circadian variation in the cerebellum. Considering the distribution and circadian variation of nNOS in the cerebellum, I hypothesized that NO could mediate daily rhythms in motor learning. The present study used the compound 7-nitroindazole (7-NI) to selectively inhibit nNOS during only times of investigative interest to circumvent the possibility for developmental compensatory mechanisms in nNOS knock-out (nNOS-/-) mice which lack nNOS throughout life. Mice were given intraperitoneal injections of either vehicle or 7-NI twice daily (1h prior to when lights were illuminated and before lights were extinguished) under a 12:12 (light:dark) photoperiod. Following lights on/off on the tenth day of injections groups were trained on an accelerating rotorod (4-40rpm) and tested 12 h later recording latency to fall. Four groups were formed based on treatment and time of behavioral analysis: A vehicle and a 7-NI group were trained in the morning and tested at night, and a vehicle and 7-NI group were trained at night and tested in the morning. I hypothesized 7-NI treatment would result in impaired locomotor ability and learning regardless of time of day and that vehicle treated groups would display the endogenous rhythm of locomotor ability. At the onset of the resting period vehicle treated mice exhibited impaired locomotor ability in accordance with the endogenous circadian rhythm, whereas 7-NI treated individuals lacked circadian variation of locomotor ability. NO expression was implicated in the circadian variation of locomotor ability. Immunocytochemical labeling of L-citrulline, a reliable marker of nNOS activity, will quantify the influence of nitric oxide expression in the cerebellum on circadian differences in locomotor ability and learning. Honors Arts & Sciences Undergraduate Research Scholarship: $5000 2012-06-01T00:00:00Z Spieldenner, James M. Investigation of Novel Curcumin Analogs as Antimalarials http://hdl.handle.net/1811/58821 Investigation of Novel Curcumin Analogs as Antimalarials Cason, Emily There are over two hundred million cases of malaria each year. Although there are effective treatments, drug resistant strains are emerging that make discovery of new antimalarials an important goal. We have developed a semi-automated assay platform to screen novel compounds for their ability to kill Plasmodium falciparum, the parasite that causes the most deadly form of human malaria. This assay was used to screen novel analogs of curcumin, a component of the spice turmeric, which is known to have antimalarial activity. Several of these analogs were found to inhibit parasite growth at low-micromolar to sub-micromolar concentrations. The compounds in this collection represent eight structural classes, and a structure-activity relationship analysis indicates a class-specific potency. Monocarbonyls had relatively high potency, while coumarins had very little activity against the parasite. The heteroaromatic and aromatic class of compounds are the most promising for future study because compounds in this class had very little activity against mammalian cell lines, indicating high selectivity for the parasite. Curcumin inhibits parasite growth at an IC50 of 6.06 μM while the most promising and selective compound in this screen, compound 47, is an aromatic compound with an IC50 of 0.512μM. We have developed an assay to investigate interactions between these compounds and current antimalarials in combination, and we hope to determine whether the promising compounds may be used effectively in combination with other existing antimalarials. 2012-06-01T00:00:00Z Cason, Emily Correlation of Bone Quality to Biomechanical Response: Large-Scale Study Methodology http://hdl.handle.net/1811/54579 Correlation of Bone Quality to Biomechanical Response: Large-Scale Study Methodology Draper, Amie J. It has been previously shown that the quality of human bone can affect its fragility. This can have important implications in the field of injury biomechanics, in which attempts are made to elucidate the conditions under which fractures may occur. To understand the results of such research, we must establish what constitutes a “normal” bone quality and how bone quality relates to biomechanical response. Prior work has shown that bone microstructure of bilateral rib pairs varies significantly between individuals but does not vary within an individual. This implies that bilateral rib pairs can be used to examine the relationship between bone quality and biomechanical response. Previously employed methods, however, are inefficient to utilize in a large population study and an efficient, standardized methodology to assess the overall quality of a bone and relate it to its biomechanical response is needed. The purpose of this work is to develop improved methodologies in order to lay the groundwork for the development of a large-sample study of the relationship between bone quality and biomechanical response. Forty cross-sectional slides of bilateral rib pairs from 10 subjects for which variable measurements are available were utilized as the initial dataset. Methods to improve construction of cross-section images, facilitate microfeature detection and standardize statistical methodology were developed and evaluated. This study defined new methodologies to automate the image reconstruction process and developed a new, standardized statistical model that can be utilized in a large-sample study. Methods to facilitate microfeature detection in the rib cross-section images were not fully developed for use in a large-sample study, but this study laid the initial groundwork for such methods. These methodological improvements can be built into the framework for an efficient, standardized methodology to investigate the relationship between bone quality and biomechanical response in a normal population of human ribs. 2013 Denman Undergraduate Research Forum, Honorable Mention 2013-05-01T00:00:00Z Draper, Amie J. A Role for Regulatory T helper Type 1 Cells in Interferon Beta Therapy for Multiple Sclerosis http://hdl.handle.net/1811/54533 A Role for Regulatory T helper Type 1 Cells in Interferon Beta Therapy for Multiple Sclerosis Jarjour, Nicholas Multiple Sclerosis (MS) is a chronic disease of the Central Nervous System (CNS) characterized by inflammatory demyelination. The resulting effects on neuronal conduction lead to functional deficits affecting gait, vision, muscular function, and other basic processes, which occur in a relapsing/remitting or progressive manner. A number of the most effective treatments for MS are formulations of the human signaling molecule Interferon-β (IFN-β). However, these treatments’ mechanism of action in the context of MS is not well established. We have previously identified a population of effector CD-4+ T cells that self-regulates via up-regulation of the immunosuppressive cytokine interleukin-10 (IL-10) in a mouse model of MS. We hypothesize that induction of IL-10+ T helper type 1 (Th1) cells is a key contributor to the efficacy of IFN-β therapy in MS. If this population is increased in MS patients receiving IFN-β treatment, this would strongly support a contribution to clinical benefit. If these cells are essential in IFN-β’s mechanism of action, IL-10+ Th1 cells could be used as a marker of therapeutic efficacy and as a target for drug development. We have developed a methodology to study effector CD-4+ T cells ex vivo to examine the expression patterns of the cytokines (signaling molecules) IL-10, Interleukin-17 (IL-17), and Interferon-γ (IFN-γ) by flow cytometry and enzyme linked immunosorbent assays (ELISAs) to establish the presence or absence of the target IL-10+ population and its characteristics. We have analyzed this population in 3 MS patients pre- and post-initiation of IFN-β therapy, as well as in an additional cohort of 2 MS patients pre- and post-initiation of the alternative MS treatment copaxone. Our data demonstrates no alteration in the IFN-γ+/IL-10+ double positive population after IFN-β or copaxone treatment.  Denman Undergraduate Research Forum Honorable Mention 2013-05-01T00:00:00Z Jarjour, Nicholas IFITM3 as a Potential Mechanism for Cyr61 Mediated Inhibition of Oncolytic Virotherapy http://hdl.handle.net/1811/53612 IFITM3 as a Potential Mechanism for Cyr61 Mediated Inhibition of Oncolytic Virotherapy Boone, Sean Oncolytic virus therapy (OV therapy) exploits naturally occurring or genetically modified viruses to kill cancer cells by lytic destruction. Cysteine-rich protein 61 (Cyr61) has been found to be upregulated by OV infection. Cyr61 was found to inhibit OV infection when using a transient transfection model and when using a tetracycline inducible Cyr61 expression model. In vivo studies using the t", "num_tokens": 2048} {"category": "common_crawl-science_math_and_technology", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-science_math_and_technology/part-00-00000.npy", "text": " paints, but also help reduce carbon emissions.\n\nPanels of pure textured paint mimicking the shades of butterfly wings on display in London's Royal Botanic Gardens, Kew.\n\nPanels of pure textured paint mimicking the shades of butterfly wings on display in London’s Royal Botanic Gardens, Kew. Recognition: Roger Wooldridge / Royal Botanic Gardens Kew\n\n“The paint itself is light, so it works well for commercial products,” he said. “If, for example, you replace the paint on a jumbo jet with a textured color, you save about a ton of weight, which is very significant in terms of fuel costs.”\n\nWhile Pure Structural Color is not yet commercially available, the Lifescaped lab is working with various companies to make paint for sale and is hoping to have some available “within the next 12 months,” Parker said.\n\nHowever, Parker’s mission goes beyond the commercial potential of the technology. The scientist and artist would like visitors to leave the exhibition and think more critically about the power of nature and how much man can learn from it.\n\n“Nature is so precious and we need to do more to protect it,” said Parker. “There are so many other things we can learn by looking at nature. With a little more effort, we can find much more sustainable solutions in the future.”\n\nNaturally brilliant color“Is on display in London’s Royal Botanic Gardens, Kew, until September 26, 2021.\nLeave A Reply\n\nYour email address will not be published.<|endoftext|>Catch up on stories from the past week (and beyond) at the Slashdot story archive\n\nForgot your password?\nCheck out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×\n\nComment Where are the links? (Score 1) 425\n\nI realize this is slashdot and all that shit, and that it is a requirement for members here to make unqualified blanket generalising comments.\n\nI see some posts here talking about holding their non-Apple phones with a camera bulge and it shows or doesn't show the bulge, and I see one post that talks about seeing the bulge in his iPhone 6, and where he also explains why he has an iphone 6 (http://beta.slashdot.org/comments.pl?sid=5713131&cid=47921957). There are probably more posts either way, but I couldn't be bothered to look for more.\n\nI went to Apple's site and saw the side view photo on the page about iPhone 6 (it's the 5th photo). And here is a linked to that image, clearly hosted on Apple.com (https://www.apple.com/iphone-6/overview/images/design_details_right_large.jpg). Although it looks like it may be a render, rather than an actual photo.\n\nSo, it's the typical Slashdot bullshit - pile on the pseudo-skepticism, and doesn't bother to make any decent effort for fact checking.\n\nClaiming that it's typical for Slashdot to hate Apple is a very standard straw man argument that was probably designed to 1) represent yourself as the voice-of-reason amongst the biased haters, 2) represent yourself as the plucky underdog, fighting against the uneducated masses, 3) rally together the Apple lovers, fighting for a common cause. Either way, it doesn't pan out. There are a lot of commentors on slashdot, plenty of them like Apple just fine, and plenty hate Apple like the plague, and even more just don't give a shit one way or the other. So please just drop that bullshit, I've seen this argument too often both for and against Apple.\n\nYou should be ashamed, given that you have such a low UID.\n\nComment Re: Ion strengthened? (Score 0, Redundant) 207\n\nI tried very hard to understand what you meant by vegetables don't contain genes, the only thing that could remotely make some miniscule sense is that you might be referring to GMO produce. Hence my preliminary conclusion is the same as the other reply to you comment, you don't know anything about genetics. But please feel free to explain further. The entire planetary scientific community would be extremely interested in vegetables that don't contain any genes.\n\nComment Re:Zeig Heil (Score 5, Funny) 709\n\nI beg to differ!\n\nPerhaps to your untrained eyes, the poster appears to have poor grasp of the English language and suffers from frequent lack of accuracy in spelling, but I am entirely convinced that this Anonymous Coward in fact wields English with such Mastery as to dethrone the Bard at his finest!\n\nLet's examine the two examples that you have brought up:\n\n\"Emporer\" appears to be an incorrect spelling of the word \"Emperor\". However, I believe the word in fact derives from \"emporium\", i.e. the \"emporer\" would in fact mean the \"shopkeeper\"! It is obvious that he or she is alluding to the rise of USA through capitalism, and making the claim that the ones of stand highest in the land are corporate CEOs!\n\n\"Assinated\" also appears to be a poor rendition of the word \"assassinated\". But the correct interpretation is that it comes from the word \"asinine\", i.e. to be \"assinated\" means to be made \"extremely foolish or stupid\", indeed the fate most feared by despots! And ironically, through your ignorance, you were correct in your guess and that the word \"assinated\" does in fact mean \"to be made an ass clown\".\n\nI pray that you will careful study this particularly fine piece of writing again and try to divine the finer meanings!\n\nComment Re:How to conduct human trials (Score 2) 190\n\nBasic experiment design:\n\n1) start large group of test subjects\n\n2) randomly divide into two groups, one will receive placebo and the other the vaccine candidate\n\n3) [double-blind] but you don't tell test subjects which they are receiving, nor the people administering the vaccines\n\n4) let everybody carrying on as they have before. In a large group, whatever non-standard behaviour will be distributed more or less evenly across the two groups\n\n5) wait a while\n\n6) see which group has fewer cases of infection and whether the differences are statistically significant\n\nSlashdot Top Deals\n\nSupport bacteria -- it's the only culture some people have!<|endoftext|>🎉 Announcing Numerade's $26M Series A, led by IDG Capital!Read how Numerade will revolutionize STEM Learning\n\nNumerade Educator\n\nProblem 78 Medium Difficulty\n\nTwo identical masses are released from rest in a smooth hemispherical bowl of radius $R$ , from the positions shown in Fig. 8.45 . You can ignore friction between the masses and the surface of the bowl. If they stick together when they collide, how high above the bottom of the bowl will the masses go after colliding?\n\n$R / 4$\n\nYou must be signed in to discuss.\n\nVideo Transcript\n\nin this problem, We're gonna talk about conservation of lunar moment. So we need to remember that the momentum off a particle is equal to its mass times its velocity V and that the total momentum of a system in the absence of external forces is concerned. So even though the individual Momenta other particles may change the total one doesn't s so what we have in our problem is a hemisphere is shown here in a picture that has a radius R and two blocks that are placed at that are they are identical and they're placed as shown here. Eso The first one is that a height are from the bottom. The second one is at the bottom and they are released. They collide at the, uh at the bottom of the hemisphere and then stick together. And our goal is to find how high the two blocks you gather Reach What is the height? H Okay, so what we have to do first is to notice that the first block, the one on the left falls while the second one since it's at the bottom, does not eso the second block just stay still until the collision happens since the block has just released, we have to find what is the velocity with which it reaches the bottom of the hemisphere. Now from conservation off energy, we have the gravitational potential energy MGH must be able to MV squared over two eso the ems Yes, watch And then we have a V is equal to the square root of two GH. Yeah, so at the bottom, when the collision happens, the velocity off the block points to the right with the speed of the square or to you th now at the bottom the collision happened. So at the collision, the momentum is concerned right at the bottom. No external forces act on the system known at external forces. Eso we can write that the mass off the falling log times its speed is equal to the total mass its final total mass times the final speed v prime So the prime is V divided by two meaning that the prime is the square root of two GH divided by Chu. Okay, so this is the speed off the system of the two blocks and what we have to find is how high this system reaches. So Basically, we have to apply conservation off energy again. So at the bottom, the kinetic energy is the mass of the system, which is two AM times the mad, temporary times view prime squared over to, and this is equal to the mass times g times the height to which the two blocks rate rise. So the two m's canceled. The prime squared is to G H over four. Then we have two divided by two. This is able to g age. And actually, I'm sorry. This shouldn't be age. Um h should be substituted by our since the initial position off the first block is are Okay, so you're subject to the height of the first block by our So sorry for that. I'm sorry. This should be our", "num_tokens": 2048} {"category": "common_crawl-science_math_and_technology", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-science_math_and_technology/part-00-00000.npy", "text": " little mutant to discover he could comb his hair in a ducktail. Or, to bring up a more sober possibility, the first to become resistant to AIDS. Three, maladaptive but not immediately fatal mutations, such as those causing certain diseases.\n\nSo yes, we're still evolving. But not very quickly. Most students of the subject say we haven't changed much in the past 30-50,000 years, except that we're now willing to eat head cheese. As for that sci-fi stuff about evolving giant brains … well, modesty prevents me from saying much about it. But it sure does make it a bitch to buy hats<|endoftext|>Environmental Analysis Webinars and Podcasts\n\nEmpower your environmental analyses with modern analytical solutions\n\nEnvironmental analysis is increasingly challenging because regulations have become more stringent requiring complex data analysis and reporting processes from sample to results. Thermo Fisher Scientific constantly innovates to produce modern instruments with lower detection limits, and better sensitivity and selectivity. With these analytical solutions, users are empowered to follow required regulatory methods and meet compliance with greater ease.\n\nThe webinars and podcasts below are invaluable resources for environmental analysts. You will hear from experienced customers and Thermo Fisher Scientific experts as they review modern analytical solutions and share their experiences.\n\nReceive updates  Join community\n\nSearch environmental analysis webinars and podcasts\n\nNo records were found matching your criteria\n\nTechniqueTitleContent type\nDiscrete AnalysisRapid Photometric Detection for Environmental ApplicationsWebinar\nLC-MS/MS, GC-MS, GC-MS/MS, IC-MS/MS, ICP-OES, ICP-MSEnvironmental Analysis Summit: Highlights from experts on hot topics and modern analytical techniquesVideos, presentations, posters\nGC-MSMonitoring Volatile Organic Compounds Using GC and GC-MS:Meeting the Challenge of Protecting the 981-Mile Ohio River Webinar\nGC-MSFully Automated GC-MS/MS Analysis of Environmental Contaminants in Surface Waters: A Recipe for Lower Cost in Your Lab - WebcastWebinar\nLC-MSAnalyzing Emerging Contaminants - Microcystins and the Challenge of the UnknownWebinar\nLC-MSFrom Sample to Knowledge: Strategies for Overcoming Challenges of Emerging Contaminants - PFC and SurfactantsWebinar\nLC-MSImpact assessment of environmental samples for organic contaminants using untargeted / targeted analysis workflowWebinar\nGC-MSAnalysis of Long - Chain Hydrocarbons and VOCs in Soil by GC-MSWebinar\nGC-MSInstrument Demands on Routine Lab Analysis of VOCs in Soil Using EPA Regulated MethodsWebinar\nGC-MSMaximizing Return for Routine Environmental Analysis, Part 1: Updating Outdated SVOC InstrumentationWebinar\nGC-MSMaximizing Return for Routine Environmental Analysis, Part 2: Overcoming Challenges in VOC Analysis with Updated TechnologyWebinar\nICP-MSTrace Element Analysis Using ICP-MS for Environmental Samples\nPart I: Regulations and Routine Monitoring\nICP-MSTrace Element Analysis Using ICP-MS for Environmental Samples\nPart II: Meeting Routine Monitoring and Research Challenges\nGC-MS single quadrupoleHow I Optimized My Solid Waste SVOC Analysis with a GC-MS WorkflowPodcast\nICP-MSFrom 2 Weeks to 2 Days: Automation Plus Speed Powers ICP-MS for ProductivityPodcast\nAccelerated Solvent Extraction (ASE)Faster Environmental Sample Analysis with Accelerated Solvent ExtractionPodcast\nIsotope Ratio Infrared Spectrometry (IRIS)Chasing Greenhouse Gases at Our Doorstep: Isotopes as a Tool to Identify Urban Carbon Dioxide SourcesPodcast\nOrbitrap GC-MSAnalysis of Emerging Contaminants Series, Part 1: Identification of Iodinated Disinfection Byproducts by GC-MS/MSWebinar\nOrbitrap LC-MSAnalysis of Emerging Contaminants Series, Part 2: Emerging Contaminant Studies in Environmental Biotechnology Using High Resolution LC-MSWebinar\nChromeleon CDS SoftwareEfficient Analytical Workflows, Part 2: Chromatography Data Management ToolsWebinar\n\nEnvironmental community members periodically get updates on our environmental analytical solutions for inorganic ions, trace elements, and organic contaminants to ensure you stay current with modern technologies and analytical methods.\n\nUX DATA-TRKR Retired - Admins, feel free to remove this reference component.\nCMD SchemaApp code<|endoftext|>A symbolic data-driven technique based on evolutionary polynomial regression\n\nCreated by W.Langdon from gp-bibliography.bib Revision:1.3872\n\n@Article{Giustolisi:2006:JH,\n author = \"Orazio Giustolisi and Dragan A. Savic\",\n title = \"A symbolic data-driven technique based on evolutionary\n polynomial regression\",\n journal = \"Journal of Hydroinformatics\",\n year = \"2006\",\n volume = \"8\",\n number = \"3\",\n pages = \"207--222\",\n keywords = \"genetic algorithms, genetic programming, EPR, Chezy\n resistance coefficient, Colebrook-White formula,\n data-driven modelling, evolutionary computing,\n ISSN = \"1464-7141\",\n URL = \"http://www.iwaponline.com/jh/008/0207/0080207.pdf\",\n size = \"16 pages\",\n abstract = \"This paper describes a new hybrid regression method\n that combines the best features of conventional\n numerical regression techniques with the genetic\n programming symbolic regression technique. The key idea\n is to employ an evolutionary computing methodology to\n search for a model of the system/process being modelled\n and to employ parameter estimation to obtain constants\n using least squares. The new technique, termed\n Evolutionary Polynomial Regression (EPR) overcomes\n shortcomings in the GP process, such as computational\n performance; number of evolutionary parameters to tune\n and complexity of the symbolic models. Similarly, it\n alleviates issues arising from numerical regression,\n including difficulties in using physical insight and\n over-fitting problems. This paper demonstrates that EPR\n is good, both in interpolating data and in scientific\n knowledge discovery. As an illustration, EPR is used to\n identify polynomial formulae with progressively\n increasing levels of noise, to interpolate the\n Colebrook-White formula for a pipe resistance\n coefficient and to discover a formula for a resistance\n coefficient from experimental data.\",\n\nGenetic Programming entries for Orazio Giustolisi Dragan Savic<|endoftext|>Relationships between CPUE fluctuation of southern bluefin tuna and ocean temperature variability in the Central Indian Ocean\n\n*Tel: 886-2-2462-2192.\nFax: 886-2-2463-2659. Email: hjlu@ntou.edu.tw\n\nIn this study, catch and effort data of southern bluefin tuna (SBT) from Taiwan longliners operating in the Central Indian Ocean (CIO) during 1982 to 2003 were compiled and their catch per unit effort (CPUE) was standardized using the generalized linear model (GLM). The GLM includes factors such as year, season, by-catch, latitude, sea surface temperature (SST) and the interactive effects among factors. The standardized CPUE and its relationship with SST fluctuation were then analyzed to understand the effects of fishing ground SST variations on CPUE of SBT, as well as their connection to El Niño–Southern Oscillation (ENSO) events. The standardized CPUE in the CIO seemed to oscillate with the sea surface temperature anomalies (SSTA) between 30 and 50°S where SSTA fluctuations were prolonged and slower than the ENSO cycle. It is then very likely that fishing conditions at the CIO fishing ground were influenced by the expansion of the cold water mass from the Southern Ocean, and the colder SST is beneficial to increasing SBT catch rate.<|endoftext|>Cimdata Logo\n\nCommentaries & Highlights\n\nTuesday, November 07, 2017\n\nDassault Systèmes 3DEXPERIENCE Forum (Commentary)\n\nicon PDF\n\nKey takeaways:\n\n • The 3DEXPERIENCE platform has elements that support uses well beyond traditional PLM solution activities in product development—including life sciences and urban planning.\n • Dassault Systèmes continues to expand the platform’s breadth and depth.\n • The POWER’BY service promises to streamline integration of older CAD solutions.\n\nCIMdata recently attended Dassault Systèmes’ 3DEXPERIENCE Forum—North America in Florida. One of the main themes of the Forum was the continuing evolution of Dassault Systèmes’ PLM product innovation platform. In the opening keynote, Dassault Systèmes Mr. Bruno Latchague, Senior Executive Vice President, Americas, welcomed the attendees and introduced Mr. Dean Marsh, the new Managing Director, North America. They discussed their center for aerospace and digital manufacturing and how eight universities are using Dassault Systèmes’ products.\n\nMs. Monica Menghini, Executive Vice President, Chief Strategy Officer, presented a challenging presentation entitled Shattering the Myths about Platforms. Ms. Menghini positioned Dassault Systèmes’ suite of products as the Business Experience Platform. She rebuked the ideas that platforms are for business process automation, that point solutions can be transformed into platforms, and that any platform is an innovation platform. She argued that the platform consists of scientific, information, manufacturing, commerce, marketing, design, and open innovation concepts. She stated that the platform must operate as the social structure of business and", "num_tokens": 2048} {"category": "common_crawl-science_math_and_technology", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-science_math_and_technology/part-00-00000.npy", "text": " making the service incredibly profitable.\n\nOfficially introduced on July 24, 1936, the British speaking clock service received approximately 13 million calls during its first year of operation, a figure that becomes doubly impressive when you realise the service was only available in London for the first six years it existed.\n\nWith the massive number of calls coming in at all hours, to make sure people didn’t clog up the lines at any given time, the Post Office issued a briefing after the system was debuted, noting:\n\nIn view of the possibility of certain members of the public becoming so enamoured of the golden voice that they are impelled to listen to it for an indefinite period, an automatic device disconnects the circuit at the end of ninety seconds.\n\nWhile the idea of people becoming “enamoured” with a recording of someone reading the time might seem silly, Brian Cobby, the third “golden voice” of the speaking clock claimed that he often received fan-mail, particularly from “older women”, who liked to call the speaking clock at night when they couldn’t sleep, just to listen to his soothing voice.\n\nPat Simmons\n\nSpeaking of Cobby, since its initial inception, there have been four “permanent” (non-guest) voices for the speaking clock, the aforementioned Ethel Jane (you can hear her time reading here), who provided the voice between 1936 and 1963; Pat Simmons (listen here), who provided it from 1963 to 1984; actor Brian Cobby (listen here), who lent his voice to the service from 1984 to 2007; and Sara Mendes da Costa (listen here, or if you live in the UK just call the number) who is the current voice of the service. All four of these individuals became the voice after entering a “golden voice” competition similar to the one previously discussed and were variously rewarded with cash prizes in addition to becoming the new voice of the service.\n\nAs for the accuracy of the speaking clock, though many maintain that the modern speaking clock is “accurate to within one five thousandth of a second”, this claim is disputed by the National Physics Laboratory who say that, owing to variable delays in the transmission actually getting to your phone: “you can probably expect the starts of the seconds pips to be accurate seconds markers within about one-tenth of a second.”\n\nThis said, the service does take an extraordinary amount of care in ensuring that the time they give is as accurate as possible, even attempting to account for the delay for the signal to reach your phone. The service is so accurate that a minor scandal was caused in 2013 when it emerged that employees at the Ministry of Defence had spent £40,000 of public money (about 130,000 calls) calling the service to synchronize their clocks over the previous three years, despite the fact that doing exactly that was explicitly banned by the Ministry of Defence in 2010.\n\nOther than MOD employee calling to synchronise watches, it has been noted that the service fields the most calls on four very specific days: The day the clocks go forward and back for daylight saving time, New Year’s Eve (with people trying to ensure they celebrate the new year at the exact right moment) and November the 11th (so that they can observe the traditional 2 minutes silence for Remembrance Day at the exact right time, 11AM).\n\nSara Mendes Da Costa\n\nDespite the huge technological leaps made in the last few decades that would seem to make such a service obsolete, the speaking clock service still fields an estimated 30 million calls every year or about 82,000 calls per day. That said, this is markedly less than a little under a decade ago before the ubiquity of smart phones, when the service was pulling in an average of about 200,000 calls per day.  With either numbers, at 30p a call, the speaking clock is still raking in the money.\n\nIf you liked this article, you might also enjoy our new popular podcast, The BrainFood Show (iTunes, Spotify, Google Play Music, Feed), as well as:\n\nBonus Facts:\n\n • At certain times of year the profits from calls to the speaking clock are donated to various charitable causes and the service has infrequently employed the use of guest voices to encourage more calls during these periods. Notable guest voices include the voice of Tinkerbell, Mae Whitman, in 2008 and a 12 year old girl called Alicia Roland in 2003 to promote the children’s charity, Childline.\n • In America, people calling the operator to ask for the time grew to be such a problem for the New England Telephone and Telegraph Company, that in 1918 they issued an official statement saying that their operators would no longer tell people the time, citing that doing so was “interfering with the efficiency of the service”. How many calls were they getting?  Despite the telephone not exactly being something everyone had at this point in history, they were receiving over 100,000 such calls per day in New England alone.\n • During the Cold War in the UK, the plan in the event of a nuclear attack was to utilise the speaking clock service to trigger the automatic warning sirens, as well as inform any callers of the attack. The reasoning for using this system was that the service was called so often that a failure in the system would be reported immediately without anyone officially needing to monitor it. So it made more sense to use it rather than create a new dedicated system that might fail without anyone noticing for a while.\n • One slight change to this general script for the UK speaking clock occurred between 1986 and 2008, when the service was sponsored by the watchmaker, Accurist, with the new line being “At the third stroke the time, sponsored by Accurist, will be [insert time here]”. Given that during these near two and a half decades the speaking clock was called a few billion times, this is likely one of the most listened to sponsored message in the history of advertising.\n • Ethel Cain starred in a movie in 1935 called, Vanity, her only known screen credit. The movie is considered lost and no known copies of it are known to exist.\nExpand for References\nShare the Knowledge!\nEnjoy this article? Join over 50,000 Subscribers getting our FREE Daily Knowledge and Weekly Wrap newsletters:\n\nSubscribe Me To:  |<|endoftext|>The Future Is Here\nWe may earn a commission from links on this page\n\nGeoengineering Could Be a Disaster for Astronomy\n\nWe may earn a commission from links on this page.\n\nGeoengineering is one of those things that sounds like maybe a good idea on paper but could also go horribly, apocalyptically wrong. But if the prospect of plunging Earth’s weather systems into chaos isn’t enough to convince scientists we need to tread very cautiously with the ultimate global warming tech-fix, perhaps this will: geoengineering could be a disaster for science.\n\nThat’s according to new models by Charlie Zender, an atmospheric physicist at the University of California, Irvine who presented the provacatively-titled research poster “Death of Darkness: Artificial Sky Brightness in the Anthropocene” at the the American Geophysical Union conference this month. In a nutshell, Zender found that injecting light-scattering particles into the stratosphere—one of the most widely-discussed strategies for rapidly cooling the planet—would have the unintended side-effect of messing with the incoming light from distant stars and planets.\n\nAs you might imagine, this would be very bad news for the scientists who study said stars and planets. “If we geoengineered globally, this would affect all telescopes around the world,” Zender told Gizmodo.\n\nThe idea behind stratospheric aerosol injection (SAI) is pretty simple: if we can get a bunch of sulfate particles high enough into sky, they’ll spread around the Earth and act like sunscreen, scattering light back into space and yielding a cooling effect. (SAI was inspired in part by volcanic eruptions, which do essentially the same thing.) Although our planet could really use some help cooling off right now, SAI has come under heavy fire for an obvious reason: conducting a worldwide experiment on our one and only shared global atmosphere is inherently dangerous.\n\nAmong the more frightening possibilities critics have raised, SAI could alter weather patterns, suppressing summer monsoons in parts of the world where crops are utterly dependent on monsoon rainfall. Much more speculatively, SAI could work too well and trigger a runaway cooling scenario, a la Snowpiercer.\n\nThere’s one other rather obvious side-effect of SAI that’s received scant attention, and that’s the impact on incoming starlight. Zender’s models, which are not yet published, suggest this effect could be big. When he added a few megatons of sulfur dioxide to a computer model of the stratosphere—an amount that may be required to cool the Earth back to pre-industrial temperatures—Zender found that the night sky over urban areas would become roughly 25 percent brighter. That’s because our stratospheric shield would backscatter light from ground sources, namely, electricity. “It’s like when you’re driving through fog with your high beams on,” he said.\n\nOf course, most astronomy doesn’t take place anywhere near cities. The best observatories in the world are located on remote mountaintops, high above air pollution and far away from light pollution. Here, Zender’s models show a somewhat different, but equally bad effect: SAI would actually make the sky darker.\n\n“Our telescopes are in positions where most of the [night] light comes from the stars,” Zender explained. “There, what the aerosols do is they backscatter light", "num_tokens": 2048} {"category": "common_crawl-science_math_and_technology", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-science_math_and_technology/part-00-00000.npy", "text": " maximum NSDU lifetime, local to remote\n\n Mrl = maximum NSDU lifetime, remote to local\n\n T1 = bound for maximum time local entity will wait for\n acknowledgement before retransmitting a TPDU\n\n R = bound for maximum local entity will continue to transmit a\n TPDU that requires acknowledgment\n\n N = bound for maximum number of times local entity will transmit\n a TPDU requiring acknowledgement\n\n L = bound for the maximum time between the transmission of a\n TPDU and the receipt of any acknowledgment relating to it.\n\n I = bound for the time after which an entity will initiate\n procedures to terminate a transport connection if a TPDU is\n not received from the peer entity\n\n W = bound for the maximum time an entity will wait before\n transmitting up-to-date window information\n\n These symbols and their definitions correspond to those given in\n Clause 12 of IS 8073.\n\n8.1.1 Give-up timer.\n\n The give-up timer determines the amount of time the transport\n entity will continue to await an acknowledgement (or other\n appropriate reply) of a transmitted message after the message\n\nTop       Page 53 \n has been retransmitted the maximum number of times. The\n recommendation given in IS 8073 for values of this timer is\n expressed by\n\n T1 + W + Mrl, for DT and ED TPDUs\n\n T1 + Mrl, for CR, CC, and DR TPDUs,\n\n T1 = Elr + Erl + Ar + x.\n\n However, it should be noted that Ar will not be known for either the\n CR or the CC TPDU, and that Elr and Erl may vary considerably due to\n routing in some conectionless network services. In Part 8.3.1, the\n determination of values for T1 is discussed in more detail. Values\n for Mrl generally are relatively fixed for a given network service.\n Since Mrl is usually much larger than expected values of T1, a\n rule-of-thumb for the give-up timer value is 2*Mrl + Al + x for the\n CR, CC and DR TPDUs and 2*Mrl + W for DT and ED TPDUs.\n\n8.1.2 Inactivity timer.\n\n This timer measures the maximum time period during which a\n transport connection can be inactive, i.e., the maximum time an\n entity can wait without receiving incoming messages. A usable value\n for the inactivity timer is\n\n I = 2*( max( T1,W )*N ).\n\n This accounts for the possibility that the remote peer is using a\n window timer value different from that of the local peer. Note that\n an inactivity timer is important for operation over connectionless\n network services, since the periodic receipt of AK TPDUs is the only\n way that the local entity can be certain that its peer is still\n\n8.1.3 Window timer.\n\n The window timer has two purposes. It is used to assure that the\n remote peer entity periodically receives the current state of the\n local entity's flow control, and it ensures that the remote peer\n entity is aware that the local entity is still functioning. The\n first purpose is necessary to place an upper bound on the time\n necessary to resynchronize the flow control should an AK TPDU which\n notifies the remote peer of increases in credit be lost. The second\n purpose is necessary to prevent the inactivity timer of the remote\n peerfrom expiring. The value for the window timer, W, depends on\n several factors, among which are the transit delay, the\n acknowledgement strategy, and the probability of TPDU loss in the\n network. Generally, W should satisfy the following condition:\n\nTop       Page 54 \n W > C*(Erl + x)\n\n where C is the maximum amount of credit offered. The rationale for\n this condition is that the right-hand side represents the maximum\n time for receiving the entire window. The protocol requires that all\n data received be acknowledged when the upper edge of the window is\n seen as a sequence number in a received DT TPDU. Since the window\n timer is reset each time an AK TPDU is transmitted, there is usually\n no need to set the timer to any less than the value on the right-hand\n side of the condition. An exception is when both C and the maximum\n TPDU size are large, and Erl is large.\n\n When the probability that a TPDU will be lost is small, the value of\n W can be quite large, on the order of several minutes. However, this\n increases the delay the peer entity will experience in detecting the\n deactivation of the local transport entity. Thus, the value of W\n should be given some consideration in terms of how soon the peer\n entity needs to detect inactivity. This could be done by placing\n such information into a quality of service record associated with the\n peer's address.\n\n When the expected network error rate is high, it may be necessary to\n reduce the value of W to ensure that AK TPDUs are being received by\n the remote entity, especially when both entities are quiescent for\n some period of time.\n\n8.1.4 Reference timer.\n\n The reference timer measures the time period during which a\n source reference must not be reassigned to another transport\n connection, in order that spurious duplicate messages not\n interfere with a new connection. The value for this timer\n given in IS 8073 is\n\n L = Mlr + Mrl + R + Ar\n\n R = T1*N + z\n\n in which z is a small tolerance quantity to allow for factors\n internal to the entity. The use of L as a bound, however, must be\n considered carefully. In some cases, L may be very large, and not\n realistic as an upper or a lower bound. Such cases may be\n encountered on routes over several catenated networks where R is set\n high to provide adequate recovery from TPDU loss. In other cases L\n may be very small, as when transmission is carried out over a LAN and\n R is set small due to low probability of TPDU loss. When L is\n computed to be very small, the reference need not be timed out at\n all, since the probability of interference is zero. On the other\n hand, if L is computed to be very large a smaller value can be used.\n\nTop       Page 55 \n One choice for the value might be\n\n L = min( R,(Mrl + Mlr)/2 )\n\n If the reference number assigned to a new connection by an\n entity is monotonically incremented for each new connection through\n the entire available reference space (maximum 2**16 - 1), the timer\n is not critical: the sequence space is large enough that it is likely\n that there will be no spurious messages in the network by the time\n reference numbers are reused.\n\n8.2 Flow control.\n\n The peer-to-peer flow control mechanism in the transport protocol\n determines the upper bound on the pace of data exchange that occurs\n on transport connections. The transport entity at each end of\n a connection offers a credit to its peer representing the number of\n data messages it is currently willing to accept. All received\n data messages are acknowledged, with the acknowledgement message\n containing the current receive credit information. The three\n credit allocation schemes discussed below present a diverse set\n of examples of how one might derive receive credit values.\n\n8.2.1 Pessimistic credit allocation.\n\n Pessimistic credit allocation is perhaps the simplest form of flow\n control. It is similar in concept to X-on/X-off control. In this\n method, the receiver always offers a credit of one TPDU. When the DT\n TPDU is received, the receiver responds with an AK TPDU carrying a\n credit of zero. When the DT TPDU has been processed by the receiving\n entity, an additional AK TPDU carrying a credit of one will be sent.\n The advantage to this approach is that the data exchange is very\n tightly controlled by the receiving entity. The disadvantages are:\n 1) the exchange is slow, every data message requiring at least\n the time of two round trips to complete the transfer transfer, and 2)\n the ratio of acknowledgement to data messages sent is 2:1. While not\n recommeneded, this scheme illustrates one extreme method of credit\n\n8.2.2 Optimistic credit allocation.\n\n At the other extreme from pessimistic credit allocation is optimistic\n credit allocation, in which the receiver offers more credit than\n it has buffers. This scheme has two dangers. First, if the\n receiving user is not accepting data at a fast enough rate, the\n receiving transport's buffers will become filled. Since the\n credit ", "num_tokens": 2048} {"category": "common_crawl-science_math_and_technology", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-science_math_and_technology/part-00-00000.npy", "text": " Summer normal elevation: 682.0 feet.  Winter normal elevation: 676.0 feet. Current elevation: 682.5 feet. The water surface temperature is 83 degrees. Largemouth Bass: Good. Over 20 pounds is winning most evening tournaments. Plastic worms and crankbaits are being used along ... (click for more)\n\nClock Is Ticking To Apply For Georgia Deer Quota Hunts\n\nHunters wishing to apply for a chance at a deer quota hunt need to get online soon. An online quota application must be in before midnight Sept. 1, according to the Georgia Department of Natural Resources’ Wildlife Resources Division.  “Georgia’s deer quota hunts provide a diversity of opportunities on some well-managed properties,” said John Bowers, chief of the Game<|endoftext|>About 2,500 manatees have perished in Florida over the past four years, heightening tension between conservationists and property owners as federal officials prepare to decide whether to down-list the creature to threatened status.\n\nConservationists say the deaths are evidence of the vulnerability of the walrus-like mammals, which were included on the endangered species list in 1967 because of boat collisions and destruction of sea grasses in the shallow coastal inlets they inhabit.\n\nBut owners of waterfront property and businesses filed a lawsuit in April in federal court accusing the U.S. Fish and Wildlife Service of failing to adhere to its own 2007 recommendation that down-listing is warranted because there are now more manatees than ever.\n\nMost of the 4,800 pudgy sea-grass-munching mammals in the U.S. gather each year in Florida, where warm, temperate coastal water, power plant discharges and warm-water springs act as buffers to the lethal effects of icy winters.\n\nThe agency’s delay in implementing the recommendation prompted the Pacific Legal Foundation to sue on behalf of a group called “Save Crystal River Inc.”\n\nThe group takes its name from the Crystal River, a destination about 100 miles north of Tampa, known for sport fishing and manatee tours in the vicinity of its headwaters.\n\n“Environmentalists want to turn the entire Crystal River into a sanctuary, which would hurt our clientele,” said Christina Martin, a Pacific Legal Foundation lawyer representing property owners in the case. “Our clients simply want the federal government to pay attention to what its own biologists are saying and down-list.”\n\nOpponents of down-listing argue that the agency’s recommendation came before two major mortality events. They also fear that decreasing protection would leave manatees more vulnerable to potentially catastrophic die-offs.\n\nIn 2010, 766 of an estimated 5,077 U.S. manatees died, largely because of cold stress. In 2013, 830 manatees died amid red tide blooms. In the meantime, dozens of manatees are killed each year in boat collisions, despite rules and regulations enacted to safeguard the animals.\n\n“We’re up against an antigovernment group that wants to roll back the very protections that have prompted a comeback of a species once hunted to near extinction,” said Pat Rose, executive director of the nonprofit Save the Manatee Club. “Then they could run their boats where they want, when they want and as fast as they want.\n\n“We’re trying to get as many people as possible to put pressure on the Fish and Wildlife Service before the public comment period on this matter ends,” he said. “We want the agency to base its final decision on the most up-to-date scientific information available.”\n\nThe Fish and Wildlife Service is expected to take comments until Sept. 2, then make a final decision within a year<|endoftext|>Find all your DIY electronics in the MakerShed. 3D Printing, Kits, Arduino, Raspberry Pi, Books & more!\n\nkk Maker Birthdays: Kevin KellyThis year, we decided, besides covering the birthdays of icons of technology and science who are no longer with us, we’d celebrate some of the living icons who’ve directly influenced our lives as makers.\n\nWhen I started brainstorming my list, Kevin Kelly was one of the first people on it. Kevin was an editor of Whole Earth Review and the Whole Earth Catalog, publications that had a profound impact on me and helped set the course of my DIY life. He was also a founding editor of Wired and was instrumental in setting the tone of that hugely influential publication.\n\nKevin’s books include Out of Control: The New Biology of Machines, Social Systems, and the Economic World. This book was a big influence on my own Absolute Beginner’s Guide to Building Robots and my continued interest in biologically-inspired technology (e.g. behavior-based robotics). Kevin’s recent projects include the indispensable Cool Tools mailing list, Street Use (a site of folk technology and clever street hacks), and the Quantified Self (self-knowledge through self-data tracking).\n\nHappy Birthday, Kevin. And thanks for decades of inspiration, thought-provocation, and “access to tools.”\n\nKevin Kelly’s websit<|endoftext|>Could some of you Creationists explain to me why being related to a chimp is insulting?\n\nI mean, I often hear the argument \"because they fling their poo at each other!\" But how is that worse than some of the terrible things human beings do? Human beings throw ATOMIC BOMBS at each other, for Pete's sake. That's even worse!\n\nThe next argument I hear is \"because chimps are ugly!\" Well, besides the fact that that's just plain old mean and utterly subjective, have you seen Keith Richards? That man's a walking geriatric heroine-chic sack of bones! (No offense, Keith - I love you!!!). I'd much rather look at a cute little chimp than poor Keith.\n\nAnd lastly, I hear the argument \"because chimps are stupid!\" Come on, haven't you ever heard Sarah Palin try to explain her foreign policy qualifications? You gotta admit, humanity has some pretty stupid members. Besides, chimps are actually very intelligent - enough to learn sign language and how to read, and how to recognize themselves in the mirror. That's smarter than most young children! Personally, I like the idea of being a member of the smartest animal species on the planet (humans).\n\nJesus, why are you assuming that evolution is anti-God? I'm not debating the existence of God; I'm just arguing for evolution!\n\nAnd as I said before, chimps are capable of brain processes that ARE superior to some humans.\n\n13 Answers\n\n • 9 years ago\n Favorite Answer\n\n i just don't like monkeys. not sure why but monkeys and elephants just bother me for some reason.\n\n human throw atomic bombs at each other. if a chimp is so fn smart then why don't the go makes some fn airplanes and atomic bombs to throw at each other.\n\n you act like monkeys don't fight. but i guarantee you that if you taught monkeys to how to shoot guns they would ******* end up killing each other.\n\n • 9 years ago\n\n its not...\n\n The part that is in dispute is not how a physical body is made or evolved etc, the part that is debated is the existence and origin of our souls.\n\n You think we came into existence by chance, and that life is a random occurrence. And further that we didnt exist before, nor will we exist after this life.\n\n I believe we have a Creator, that life was organized (and evolution may be a part of that creation) and that we will live after death.\n\n So, its not really offensive. I just dont think we are the same as other animals...we are humans and were created by God, as His children, in His image.\n\n (also, you must admit, if you are being serious...even our less intelligent humans have far superior cerebral prowess than chimps. We're happy that they can use 'tools' to eat ants. We humans shoot 4K HD video documentaries of these chimps, store the footage on SSD plates, process them with 12 core microprocessors and broadcast this via the internet. We then discuss the emotional and cultural relevance of the project itself, debate it in Universities and television shows etc.\n\n We are more than a little different than the chimps.\n\n Source(s): common sense\n Lv 4\n 3 years ago\n\n Of the macaque's almost 3 billion DNA base pairs, ninety 3.5 per cent are clone of those interior the human genome. this isn't unpredicted for a species whose lineage diverged from our personal about 25 million years in the past. The human and chimp genomes, which diverged basically 6 million years in the past, are about ninety 8 per cent same. One complicated discovery is that countless mutations that reason genetic ailments in human beings - such as phenylketonuria and Sanfilippo syndrome, which deliver about psychological retardation - are the conventional kind in macaques and, likely, our personal ancestors.\n\n 9 years ago\n\n Cant seem to see any problem with sharing an ancestor with a chimp, I mean things could be a whole lot worse I could be related to George Bush , or (shudders) Sarah Palin ((A))\n\n • How do you think about the answers? You can sign in to vote the answer.\n • 9 years ago\n\n Since chimps are superior to humans and humans are quite depraved compared to chimps, it is insulting to us chimps to be compared to humans.\n\n • 9 years ago\n\n Its not so much insulting as it is untrue. Nobody is going to accept your warped version of reality without some sort of evidence to back it up.\n\n Saying 'God cannot exist so we must have come from monkeys' is a logical fallacy.\n\n • 9 years ago\n\n My question is if we came from a Monkey who made the Monkey? who made the pond with the", "num_tokens": 2048} {"category": "common_crawl-science_math_and_technology", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-science_math_and_technology/part-00-00000.npy", "text": " record told us long ago that we differ physically from Neandertals, in various ways. But at the level of genes and the proteins that they encode, new research published online today in the journal Science reveals that we differ hardly at all. It also indicates that we both Neandertals and modern humans differ from the chimps in virtually identical ways.\n\n\"The astonishing implication of the work we've just published,\" says Prof. Gregory Hannon, Ph.D., of Cold Spring Harbor Laboratory (CSHL), \"is that we are incredibly similar to Neandertals at the level of the proteome, which is the full set of proteins that our genes encode.\"\n\nCollaboration with a paleogenetics pioneer\n\nHannon, who is also an Investigator of the Howard Hughes Medical Institute and is well known for his work on small RNAs and RNA interference, was invited this past year to help examine Neandertal DNA by Dr. Svante Pbo, a pioneer in paleogenetics, a field that employs genome science to study early humans and other Paleolithic-era creatures. In a separate paper, Pbo's team today publishes in the same issue of Science the first complete genome sequence for Neandertal, an achievement that builds on work he has led since 2006 at the Max Planck Institute for Evolutionary Genomics in Leipzig.\n\n\"Dr. Pbo's publication of the full Neandertal genome is a watershed event, a major historical achievement,\" Hannon says. \"The work we conducted in collaboration with his team is only a small part of the larger effort, but it helps us put the Neandertal genome into better perspective, relative to the modern human genome and those of our nearest common ancestor among the apes, the chimpanzees, from whom we diverged about 6.5 million years ago.\"\n\nThe CSHL team contributed a technology developed by Hannon, postdoc Emily Hodges, Ph.D., and others at CSHL in 2007. \"We call it \"Array capture re-sequencing,\" says Hannon, \"and it enables us to extract from genomes important information, on a very selective basis, rapidly, very accurately, and at low cost. We always anticipated that it might help in the analysis of evolutionary relationships, so when Svante offered us the opportunity to apply it to a Neandertal sample, we were very excited and grateful for the opportunity.\"\n\nThe technique enabled Hannon's CSHL team, working with Pbo's team in Leipzig, to greatly amplify intact bits of DNA from a Neandertal sample that was 99.8% contaminated -- mainly by bacterial DNA-- and regarded by Pbo as not likely to yield useful data. The sample studied was considerably more impure than that used as the basis for Pbo's full Neandertal genome sequence. \"Our technology is particularly useful in enabling us to work with the most contaminated samples,\" says Hannon. \"We identify and then greatly amplify just those portions of the target DNA called exons. Exons are stretches of DNA that encode proteins. They comprise only a small fraction of the total genome of modern humans, about 1%.\"\n\nThe Neandertal genome, like that of modern humans, contains about 3 billion base-pairs of nucleotides often referred to metaphorically as \"letters\" in the genome's \"book of life.\" The Hannon-Pbo collaboration focused on obtaining the most accurate possible sequence of only 14,000 protein-coding segments within the full genome. \"These,\" Hannon explains, \"are exons that give rise to the 14,000 proteins that we know are different in modern humans and chimpanzees.\" The question was what those 14,000 proteins would look like in our Neandertal relatives.\n\n\"The overwhelming majority of chimp proteins about 75% -- are different from ours in at least one amino-acid 'letter,\" according to Hannon. These amino-acid changes are in most instances slight, but the resulting functional differences the way they affect what proteins do in cells can be great, and presumably help to explain many of our differences from chimpanzees.\n\nEighty-eight amino-acid differences and what they might signify\n\nHannon's team applied its focused sequencing method on those areas in the Neandertal sample obtained from Dr. Pbo, and, after several rounds of refinement, they arrived at the number 88: they found only 88 changes in Neandertal protein sequences compared with the modern human. Hannon calls this number \"astonishing.\"\n\nAt an early stage of the study, the team identified many more protein differences -- about 1000 -- between modern man and the specific Neandertal individual sampled, a male who died about 49,000 years ago in a cave called El Sidrn, in Spain. But that initial figure was based on comparing the Neandertal sequence to that of the modern human reference genome. When the teams incorporated into their calculations variations in the modern human code that they catalogued in 50 individuals from a range of modern ethnic groups, the number of human-Neandertal protein differences dropped from over 1000 to only 88.\n\nAlthough Hannon says it will be important to study the functional role of the 88 proteins, he expects that many may prove \"neutral,\" functionally. These would be changes in the genetic code that do not issue in any difference in the function of the associated proteins. If even more human genome samples -- say, from 500 contemporary individuals rather than 50 -- were included in the comparison, the number of differences might drop again, Hannon believes. And if additional Neandertal samples were factored into the comparison, he says, \"it's possible that the number of differences could approach zero.\"\n\nIn short, Hannon says, \"the news, so far, is not about how we differ from Neandertals, but how we are so nearly identical, in terms of proteins.\" In addition to following up on the functional associations of the 88 proteins identified in the current study, Hannon says new research is likely to address other portions of the genome particularly those segments responsible for regulating what genes do. In effect, the search for what distinguishes us from our nearest hominid ancestors will shift to from differences in sequence to differences in function.\n\nContact: Peter Tarr\ntarr@cshl.edu\n516-367-8455\nCold Spring Harbor Laboratory\n\nRelated biology news :\n\n1. 4-D software helps adjust for breathing when treating lung cancer with radiotherapy\n2. New tool helps scientists see molecular signals of eye disease before symptoms arise\n3. U.S. Preventive Medicine Helps Participants of the State of Nevada Public Employees Benefits Program (PEBP) Become Healthier\n4. Social networking helps hermit crabs find homes\n5. New Scripps Research and GNF study helps explain how we can sense temperatures\n6. Hops helps reduce ammonia produced by cattle\n7. Common PGR helps creeping bentgrass weather drought\n8. Eating like a bird helps forests grow\n9. Young salamanders movement over land helps stabilize populations\n10. New mathematical model helps biologists understand how coral dies in warming waters\n11. New assay helps track termites and other insects\nPost Your Comments:\n(Date:3/2/2016)... March 2, 2016 ... addition of the  \"Global Biometrics Market in ... ,     (Logo: http://photos.prnewswire.com/prnh/20130307/600769) , , Global biometrics ... at a CAGR of around 27%   ... has announced the addition of the  \"Global ...\n(Date:3/1/2016)... March 1, 2016 ... addition of the  \"Global Biometric Access ... to their offering. --> ... of the  \"Global Biometric Access Control ... their offering. --> Research ...\n(Date:3/1/2016)... and SAN FRANCISCO , March ... HYPR Corp. and BitGo, Inc. extends biometric authentication to ... and private keys. Bitcoin transactions ... billion per month in digital assets with over 10,000 ... for any startup. HYPR enables enterprises to keep encrypted ...\nBreaking Biology News(10 mins)<|endoftext|>Home » Solar Panel Fyffe, Alabama\n\nSolar Panel Fyffe, Alabama\n\nElectric bills in your area and the metering policy of your local grid can also affect the total cost of a solar system. The best solar panel option for your home will depend on your budget and solar installation cost, roof space, sun exposure and desired energy efficiency. Let’s take a look at the main types of panels and what you need to know to be a smart solar shopper.\n\nWith proper maintenance, solar systems can be less expensive and can provide power for over 30 years. The rising cost of electricity from traditional sources has made installing solar panels a breeze for many homeowners. The main factor in determining how much a solar panel system will save you in the long run is your electricity bill, which can vary based on your location.\n\nHowever, solar panel efficiency is something that most homeowners looking to install a rooftop system want, as they are likely to have less room to work with than commercial solar projects or ground-mounted solar panel systems. Plus, with fewer high-efficiency panels, you’ll have room to expand your solar system if you buy an electric vehicle or add one to your home. More sun means more energy generated and more savings potential from solar energy.\n\nSolar panels can be used for a wide variety of purposes, including remote power systems for cabinets, telecommunications equipment, remote sensing, and of course for generating electricity from residential and commercial solar power systems.\n\n", "num_tokens": 2048} {"category": "common_crawl-science_math_and_technology", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-science_math_and_technology/part-00-00000.npy", "text": " believe an open approach to research and innovation – especially when it comes to transformative AI technologies – is better than leaving the know-how in the hands of a small number of big tech companies. That’s why we’ve released over 1,000 AI models, libraries and data sets for researchers over the last decade so they can benefit from our computing power and pursue research openly and safely. Openness is also crucial to ensuring developers, entrepreneurs and startups can use foundation models built by big companies to create new tools and to enhance the safety of AI through continuous and open innovation. Few things have captured the public imagination more in recent months than the significant breakthroughs we’ve seen in Artificial Intelligence, and generative AI in particular.\n\nAR is still a nascent technology, mostly used to play games, to dress-up selfies with virtual decorations, and for more interactive shopping. Snap, Meta and other tech companies, though, are developing mixed reality devices that could make AR features available anywhere, through glasses. DALL-E translates text prompts into images, and ChatGPT writes fast responses to complex queries, like a more dynamic search engine. Google and Meta have already been working for years on similar technology, but they have not quite entered the consumer conversation.\n\nChina successfully launches a pilot reusable spacecraft, state media report\n\nAdditionally, Metamate, an internal productivity assistant driven by users’ text prompts, is being developed to help employees perform various tasks. Meta’s own metaverse platform, Horizons, is built around creativity and in particular, has been designed to allow users to build their own homes and environments within the VR environment. The company has strongly hinted that this is where its generative AI technology will come into its own. CTO Andrew Bosworth has said, “In the future, you might be able just to describe the world you want to create and have the large language model generate that world for you. Meta, the company that owns Facebook, has made an important announcement that has created excitement in advertising. With the positive quarterly results for Q1 2023, Meta has uncovered another addition to their money-making projects.\n\nYakov Livshits\nFounder of the DevEducation project\nA prolific businessman and investor, and the founder of several large companies in Israel, the USA and the UAE, Yakov’s corporation comprises over 2,000 employees all over the world. He graduated from the University of Oxford in the UK and Technion in Israel, before moving on to study complex systems science at NECSI in the USA. Yakov has a Masters in Software Development.\n\n • And it helps Meta to take on board a wide range of diverse perspectives from our users as we build our systems and products.\n • Snap’s Lens Studio has 300,000 creators building augmented reality filters, which are animated 3D digital creations.\n • Meta’s release of its generative AI music tools comes shortly after Google launched similar tools that turn text into music, called MusicLM.\n • It’s selling them directly and through iFixit, giving users a cheaper and more sustainable option than just buying a new unit when something goes wrong with the old one.\n\nMeta has more advanced projects in the works for consumers to test AI-generated content. Last year, Meta teased a service called Make-A-Video, which has limited Yakov Livshits availability to the public. The service could spin up any type of artwork a person requests, say, a dog flying in a cape, or a spaceship on Mars.\n\nIn an internal all-hands meeting this morning, Meta CEO Mark Zuckerberg said Meta is building generative AI into all of its products and reaffirmed the company’s commitment to an “open science-based approach” to AI research. Meta has made this generative AI Sandobx features available to a select group of advertisers. Yakov Livshits The second feature of the AI sandbox is a background generation tool that simplifies the creation of uniquely different campaign materials. Based on text prompt as an inference input, This allows brands to create unique ads with trendy and engaging backdrops that align with the ad’s core idea.\n\nFacebook users are now able to delete some personal information that can be used by the company in the training of generative artificial intelligence models. Meta plans to first release its AI agents on Messenger and WhatsApp but sees a broader future for such technologies that may see them expanding across its family of applications, and eventually to smart glasses, Zuckerberg told employees. In those cases, the vision is that consumers would wear some sort of smart glasses — similar to Meta’s Ray-Ban Stories — to interact with the agents via voice. It consists of three AI models, all tackling different areas of sound generation.\n\nHowever, Meta believes its new model can usher in a new wave of songs in the same way that synthesizers changed music once they became popular. Prior to joining The Verge, she covered the intersection between technology, finance, and the economy. Most notably, the model was able to generate a rather realistic human hand, save for a few glitches, which A.I. Merging the two has been difficult and, though OpenAI released its multi-modal GPT-4 in March, A.I.\n\nDeja un comentario\n\nTu dirección de correo electrónico no será publicada. Los campos obligatorios están marcados con *\n\nCarrito de compra<|endoftext|>Wednesday, April 14, 2010\n\nAre squirrels rare in Ireland??\n\nI was walking through the park today and this rather non-crazy looking woman stopped me, causing me take out my headphones, and pointed out a gray squirrel. WTF?? Don't get me wrong, I'm an animal lover. Had she pointed out a rare bird or small mammal (it was the center of Dublin after all) I would have been appreciative of this. But a gray squirrel?? Ever since the summer we were camping on the Outer Banks and squirrels chewed through our CAMPER to get to our Oreo cookies, I've considered them rodents. That's right, rats with bushy tales. And I don't want to relive the horror of the demonic squirrel that used to bury breadsticks in my flower pots at my apartment in Baltimore. The woman upstairs was TERRIFIED of this squirrel. Today, I feigned interest in the stupid squirrel and carried on my merry way, but it was all I could do to not say to her, 'Seriously? That's why you stopped me?? Show me a Delmarva Fox Squirrel THEN I'll get excited!'\n\nI'm a biology snob. \n\n 1. I think the gray squirrel is not native to the UK or Ireland. It's displaced the red squirrel in many areas. But if she knew that, you'd have think she'd have said so and be more likely to point out a red squirrel to you!\n\n 2. That explains why my husband also gets excited about squirrels.\n\n 3. My family gets that way about deer.\n OOOOHHHHH. Look!! A deer!!\n Really? Here in the woods or Northern Michigan?\n You. Don't. Say.\n Tell me when you STOP seeing deer. Now THAT would be news.\n\n 4. wow- my husband was all excited about a squirrel the other day! I was also like, wtf?!<|endoftext|>为了您获得更好的浏览体验,请将您的浏览器更新到最新版本!\n2020年3月18-20日\n上海新国际博览中心\n\nCassandra Melvin\n\nCassandra Melvin\nGlobal Product Manager, SC/FEC, Atotech\n\n个人简介\n\nCassandra Melvin received her BS in Business Management and Neuropsychology at Rensselaer Polytechnic Institute and is Global Product Manager for Semiconductor and Functional Electronics Coatings at Atotech Deutschland GmbH. She is responsible for a product portfolio that includes electrolytic and electroless plating processes used in chip manufacturing and packaging, as well as lead frame and connector production.\n\nPrior to joining the Atotech team, she held the position of Business Manager at the SUNY Polytechnic Institute (formerly the College of Nanoscale Science and Engineering) focusing on technical programs for semiconductor chemistry and equipment. She also held various project and program management roles in (semiconductor) operations and IT at SUNY.\n\nCassandra's written work has been published in leading technical magazines and presented at key conferences globally. She is a member of the SEMI Power Electronics Committees for Europe and is Chairwoman of the SEMI Women in Technology group.\n\n摘要\n\nAs electro-mobility gains momentum, there is increasing pressure on the power semiconductor supply chain to enhance existing technologies. To satisfy the requirements for next generation power semiconductors in HEV/EV and e-mobility products, power packages must provide higher reliability and power density, better energy efficiency and management, and reduced package size.\n\nA new electroplating system addresses these requirements. The new system enables a more efficient and cost effective method for embedding power chips with simultaneous metal deposition on both wafer sides. Additional system features provide technical benefits for embedded technologies and enable further miniaturization of power semiconductor packages to comply with future product requirements. Power management is a primary concern – particularly for thick Cu heat sink requirements – and the new tool delivers the benefit of thick Cu deposition up to 50µm for optimized dissipation.\n\nAdditional tool benefits include: 1) handling and processing of Taiko wafers with ≥50µm thickness, 2) significant warpage compensation using dual side metallization 3) individual control of plating parameters for each wafer side for plating on different design layouts and Cu thicknesses, 4) plating of up to 50µm Cu on wafer scale, and 5) improved manufacturing efficiency with 25 percent fewer process steps, thereby leading to 6) a cost per wafer reduction of 25 percent.\n\nThis paper will discuss how the new system's features enable these benefits and will present key process results as demonstrated in the EmPower consortium.", "num_tokens": 2048} {"category": "common_crawl-social_life", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-social_life/part-00-00000.npy", "text": " live without sharing. I'm grateful for it no matter how tough it was. \n\nAll in all, the week was tough but I always look for the lessons and messages in everything I grow through. I'm just beyond grateful to be back and motivated than ever to continue growing with my online community behind me.\n\nMYOUTFITONLINE set | MYTHOPTICAL sunglasses | Zara bag\nEarrings bought from Greece\n\namandasig.jpg+(1) (1).jpeg\nStyleAmanda KorinaComment<|endoftext|>Authors on Issues: Valerie Francisco on “My Family’s Slave”\n\nThis is the inaugural post of our new series, Authors on Issues, in which UIP authors weigh in on current events.\n\nValerie Francisco, author of The Labor of Care: Filipina Migrants and Transnational Families in the Digital Age, responded to the recent cover story in the Atlantic by Alex Tizon entitled “My Family’s Slave”. Labor of Care examines the impact of global care chains on the families of migrant women from the Philippines and the emergence of new forms of intimacy and care work as the women navigate and negotiate the emotional and material consequences of family separation. Labor of Care will be available in Spring 2018.\n\nLola’s Community\n\nEudocia Tomas Pulido was her name. In Alex Tizon’s recent cover story in The Atlantic, he revealed that his family called her Lola. In his melancholy and beautiful writing, Tizon captured what Lola’s life was like from his gaze. She was “gifted” to his mother at a young age; a practice stemming from a history of colonialism and the ongoing system of feudalism in the Philippines. As Tizon traces Lola’s life braided into his mother’s marriage and his upbringing, his heart wrenching account demonstra\n\nted that she was mostly isolated, subjugated and dejected. Her role as a domestic worker in his family, although essential, was often constrained by abuse and exploitation. At the end of Lola’s life, and sadly with Tizon’s untimely death as well (the story was published posthumously), Lola was a solitary character who lived a life that was hard and desolate.\n\nThere are and have been millions like Lola. Filipinas who have been bought, sold, traded and have chosen domestic servitude as work. The current politics and economic systems in the Philippines treat Filipinas as if they were goods, shipped all over the globe for the price of remittances. In fact, the Philippine’s labor export policy has made a $25 billion-dollar industry on Filipinas working as domestic workers in over 150 countries. So in all intents and purposes, Lola was not alone.\n\nThis is the tricky part for me.\n\nTizon captured Lola as a lonely and alone character in his life. And for the most part, I would agree that the lives of Filipinas working as domestic workers are often exhausting and back-breaking with little to no reprieve. But there were and are so many of them. So why was she so alone? Lola’s life was tiring and grim, like perhaps so many other Filipinas working as domestic workers.\n\nBut they are also indefatigable. Their spirits bafflingly resolute. Persistent. And often, in the midst of the mundane tasks of sustaining the life of a family—whether it be picking up or dropping off children from school or daycare, or collecting groceries for meals, or washing and drying laundry—Filipinas are also keen, almost strangely skilled, at finding one another. In aisles of grocery stores, benches in playgrounds, and pick up points in front of schools, they assess one another’s faces and accents sniffing out provinces and dialects. They find respite in one another, even in the ten-to-twenty minute wait before their charges come charging out. They exchange phone numbers, and before then letters, to connect with one another.\n\nMaybe because Filipinas feel alone in the doldrums of their daily work; when they see someone who could be remotely Filipino, they are quick to throw a “kamusta?” out into the crowd like a fisherman casting a line out to the water. I’m sure Lola did this. If not her, someone must have done it to her. After all, she raised four children in a major U.S. city on the west coast, known ports of entry for Filipino migrants. A conversation must have started about her situation. Lola must have met someone she confided in. Someone she shared the contradiction of loving the family she worked for and hating that she couldn’t—wouldn’t—be able to imagine her life without working for them.\n\nIn my book Labor of Care: Filipina Migrants and Transnational Families in a Global Digital Age, I found that Filipinas in similar situations as Lola—trapped in domestic servitude by co-ethnic employers who brought them here to the U.S.—were often weary. However, it was a “community of care” that brought them respite and even, laughter, if they allowed it. Filipina migrants working as domestic workers would pool together in shared geographies of play dates and pick-ups. They’d share their daily tribulation mixed with their often transnational victory—a child’s graduation, a parent’s medical bill paid or a house bought in the Philippines. But they would share their innermost feelings over a train ride or a waiting session.\n\nSo perhaps Lola was lonely in her eyes, in the eyes of the family she served, in the words of Alex Tizon. But what if Lola was to tell her story? Maybe even a Filipina from her community? How, then, would her story be told?\n\n–Valerie Francisco\n\nAbout michael\n\nMarketing & Sales Manager since 2012<|endoftext|>Table of Contents\n\nInternational Women's Day is a day dedicated to celebrating the social, cultural, economic, and political achievements of women all around the world. It is a time to acknowledge the importance of women in our lives and to show appreciation for their contributions to society.\n\nIf you are looking for a unique and fun way to celebrate Women's Day in the office, then games are the perfect way to do so. They not only provide an opportunity to engage in team-building activities, but also create a fun and relaxed environment where colleagues can come together to celebrate and appreciate the achievements of women in the workplace.\n\nIn this article, we will explore 12 exciting games that can be played in the office to make your Women's Day celebration a success. Whether you are a manager planning an event or an employee looking for ideas, these games will surely add an element of fun and excitement to your Women's Day celebration.\n\nDownload our Women's Day Celebration Kit now!\n\nGet ready to celebrate International Women's Day in style! Our Women's Day Celebration Kit is the ultimate resource for companies looking to recognize and celebrate the women in their workplace.\n\nDownload now\n\n12 Interesting games for women's day celebration in office\n\nHere are 12 amazing games for women’s day celebration in office that will surely add an extra spark to your Women's Day celebration.\n\n1. The guessing game\n\nPeople Needed: There are no boundaries; this game is ideal for up to 15 females.\n\nItems needed: A clear bowl, paper, and pens.\n\nInstructions: Give each woman a pen and a piece of paper. Have them list two or three self-reflections on paper. Put the papers you collected from all the women in the bowl.\n\nBring one woman to the middle and let her to choose a folded piece of paper from the bowl. She has to read the truths aloud and identify the author. Note the points in writing. The woman with the most points in the end wins.\n\n2. Guess the thing\n\nPeople needed: No rules, ideal for 20 ladies playing in pairs.\n\nItems needed: A few standard home goods, papers, and pencils.\n\nInstructions: Form two women into a pair, and have them sit with their backs to one another. The domestic item bag will belong to one of the partner, and the pen and paper to the other. Without giving away the specific name of the object, the woman carrying the bag must explain it to her partner while asking her to identify what kind of object it is.\n\nShe must record her guess on paper when she has made one. 90 seconds pass between each round. Whoever correctly answers the most questions at the conclusion of the game wins. You might plan to give the winners some presents.\n\n3. Bottle spinner\n\nPeople needed: No limits are necessary, and this game is ideal for 15 or more females.\n\nThings needed: A bottle and nail paints\n\nInstructions: This cute twist makes it different from the standard Spin the Bottle game. Place some nail polish bottles in a circle on your table for this activity, allowing enough room in the centre for a bottle to spin. Gather around the table in a circle. Each woman in the group must spin the bottle one at a time. After the bottle stops spinning, the woman it is pointing at gets one minute to paint her nails with the nail polish in front of her.\n\nIn a minute, try to paint as many nails as you can. The bottle should be spun until each lady has a turn. The lady with the most painted nails wins after each woman has had a turn.\n\n4. Music puzzle game\n\nPeople needed: No limit, perfect game for 20 or more women\n\nThings need: Phone/music player, paper, pen and 2 buzzers\n\nInstructions: This game requires some preparation, so make a playlist before you plan the game to play during. Also write some questions about the songs, such as \"Who is the singer of this song?\", \"What is the hook of this song?\", \"Who was the guest on this song?\" etc. when the guests arrive, divide the women into pairs. If there are more than four ladies in your company, divide into additional groups and conduct the game in batches. Call the first batch ie. two groups of four women each.\n\nGive each track", "num_tokens": 2048} {"category": "common_crawl-social_life", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-social_life/part-00-00000.npy", "text": " flipping through a few photos. Why not put in effort after a match was made, when you were guaranteed the other party was interested in you? As for the two spikes in 2016 and 2018, well those actually coincided with when I shaved my head for St. Baldricks, it’s funny how our perception of ourselves affects our behavior. Even though you’re exactly the same person, even with no bald photos online, it still affected my behavior subconsciously. And of course the last spike, it occurred when I moved to Barcelona. I was there for only three months attending a coding bootcamp and I have no regrets. It truly was the summer of love. ![](https://miro.medium.com/max/1400/1\\*TByJJj\\_UEd0Lck3VTT0wNQ.png) But for all the increases in swiping and shenanigans, my matches simply weren’t keeping pace. It would make sense that as I swiped more I should receive more matches, but the data never really supported it. There could be a million reasons as to why this happened, potentially the rise of other dating apps, people getting pickier, or heck maybe I fell down another branch on the ugly tree, who knows? 🤷‍♂️ So at this point, you like me are a little bar charted out. Let’s instead, take a look again at the old Sankey diagram, specifically that one portion we glossed over last time. ### OK… No More Graphs… ### Please… ![](https://miro.medium.com/max/1400/1\\*a11NE3XqgVbpUm2wl0IRcQ.png) I want to dive deeper into the what happens after we match. So let’s say it’s Friday night, you’re about to go out for drinks, but you’ve got 20 min before you meet your friends at the bar; so you decide to hop on Tinder to kill some time. You’re swiping, you’re swiping, left swipe there, swiping some more, right swipe there, and boom, suddenly you stumble across this profile. ![](https://miro.medium.com/max/1400/1\\*aliAMnvv\\_GWB8U957hRLWA.png) And you think to yourself, “huh, he doesn’t look like he fell off the ugly tree and hit _every_ branch on the way down, seems adventurous, good with birds (probably knows bird law), likes snacks. I’m gonna swipe right.” ![](https://miro.medium.com/max/1400/1\\*MyOGoGtEl5v3uGp4rrd9Pw.png) But after the message, how exactly did my odds look? ![](https://miro.medium.com/max/1400/1\\*yzmWKspBO\\_QEv13bmq8hSg.png) Honestly, I was pretty happy about this. And it was around this point I learned a valuable lesson about myself… ![](https://miro.medium.com/max/1400/1\\*K1CZiVNyVyd4KTx\\_aN-JNw.png) ###### Some back of the envelope calculations, but they get the point across I want to emphasize here, this is just time spent swiping, this doesn’t include anything related to setting up a profile, getting those pics where I looked like a damn snack, or coming up with the wittiest content for my profile. These numbers are purely based off time just swiping, and swiping alone. With all this time spent, clearly there must have been some “highlights”. What exactly were these? ![](https://miro.medium.com/max/1400/1\\*boRfyFnas7fLTP93w8H2ig.png) ![](https://miro.medium.com/max/1400/1\\*QwVAQ1qiO81N3ycoztQL-w.png) In my defense the cutecumber line did work for me, and I did end up striking a wonderful conversation with someone. But the real question that kept popping up for me was, for all the effort and time I was putting in, was I becoming more successful ? ![](https://miro.medium.com/max/1400/1\\*8Q122Bnj1cwcSQ\\_PFxt-xg.png) Mind you this is a completely made up metric, but I reckon it does a pretty good job of estimating how successful you are over time. It is calculated by considering success as the ratio of your monthly matches over your monthly right swipes. With 100% being you match every right swipe, and 0% being extremely close to what my actual number was. 😭 As I charted these by month, it’s pretty clear to see my prime in Tinder fell somewhere in 2016 and 20017, where I hit upwards of 10% twice. However, as 2018 and 2019 dragged on, I at one point hit less than 1%… ![](https://miro.medium.com/max/1200/1\\*vT3Macv2cn-mBeT5zn-zbA.gif) Now as I mentioned earlier there could be a lot of reasons for this, but I had to be sure no matter what it was, that it wasn’t my looks. ### My Opus Magnum… So I did one of the most complex breakdowns for the presentation and analyzed photos of myself over time to see if I could figure out what’s going on. I even did a complex visual aging extrapolation to see what I’d look like in 2030. ![](https://miro.medium.com/max/1400/1\\*YF6crYU7xKNnFMpypOhw9g.png) ###### Please see all the science I did Clearly, something was wrong, given these photos I assume it was something to do with Tinder or just modern culture as a whole, we will probably never know. ### A Few Final Thoughts… As I wrap up this tinder-novella, you’re probably asking “But Sy, what did you learn? Are you telling me I just spent 30 minutes reading this, and my only take away is that you’ll make an incredible Eddie Murphy impersonator circa 2030?” To this, I would say of course not. Below I’ve summed up my hot takes for Tinder use for all you folk out there: ![](https://miro.medium.com/max/1400/1\\*\\_OVeOK86dDFCK-7qtko\\_AQ.png) ![](https://miro.medium.com/max/1400/1\\*xx3juSMgxIuxDQTjKP\\_EOw.png) The slides do it better justice than I ever could. Don’t try and take anything from this, don’t try and pull out some hidden meaning, just don’t. If anything I would leave it at this. Everyone’s experience on Tinder is going to be different, and what works for some people will crash and burn for others. What makes some people cringe, will make other’s swoon. My advice; experiment, have fun, and make crazy charts to scare your friends; life is too short to listen to same internet randos take on what’s right and what’s wrong for Tinder. All I really took away from all of this is; it was really fun to use my coding skills for something actually fun, as opposed to just getting another exercise to spit out “Hello World!” With that being said, as I was building all of this out, I realized some of you may also want to see some of this info for your own data. And again, because I love making things that have no real productive value in society, I started building an app with a few friends to do just that. Once we finish we’ll be posting the app [here](https://github.com/mangotreedev) on our github repo. Send us an email at hello@mangotree.dev with the tagline “TINDER PROJECT” and we’ll let you know when it’s ready!<|endoftext|>jueves, febrero 15, 2007\n\nLa gente era más feliz cuando solo celebraba el Día del Amor y la Amistad en Septiembre.\n\nSe jugaba al \"amigo secreto\", se proponían citas para comer en Von Glacet o en Crepés y Waffles o en Le Grillé o en D'Omo o Pizza Hut. Uno regalaba un bono de la Librería Nacional y quedaba como un príncipe o compraba rosas al lado de cualquier Carulla y las metía en una caja vacía proviniente de una floristería más fina (¿Alguien se acuerda de la famosa Floristería La Rana René?). Los que más, compraban algún producto Hershey's y, los que menos, se defendían con confitería nacional como Italo o Triunfo - productores de los famosos cigarrillos de chocolate.\n\nPero con la globalización ya he visto a más de uno deprimido por no tener un \"sweet valentine\". Más de una niña emo se quiere cortar las venas con un Cocosette porque ese chico emo con el piercing en el labio inferior no llamó ni apareció con una flor marchita.\n\nLos invito a dejar la maricada. El Día de San Valentín", "num_tokens": 2048} {"category": "common_crawl-social_life", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-social_life/part-00-00000.npy", "text": " something to hurt your feelings, but he can give a joke just as well as you can.\n\nfem sub dating-32\n\nBy definition, you'd think that she should want an Alpha Male, but he can provide only passion, not steadiness.She also doesn't get along with Beta Males because they're too weak to keep her or pique her interest. What kind of man can keep her grounded while still challenging her to grow and be the best she can?You're not afraid your embarrassing stories are going to come back to you when you meet his family or when you meet his friends for drinks.What's said between the two of you stays between the two of you. When you're angry, he somehow knows how to deal with you with more grace than anyone else.You learn from him in many ways, but you never feel like he's pushing you or judging you.\n\nYou both teach other lessons that make you better people and better citizens of the world.\n\nWhether in his current career or his lofty life goals, he always seems to be moving at the same speed you are. He's never pushy or demoralizing — just steadily moving from one goal to the next with a very bright future in sight. He doesn't idolize you but doesn't make you feel small. He also likes to spoil you, but would never give you everything you want. The best partnerships are the ones in which both people can learn from each other.\n\nHe's a well of knowledge and loves to provide you with new information and insights on things he's passionate about.\n\nInstead, he encourages you to spend time with them whenever you want to because he knows whom you're coming home to.\n\nHe has your full trust, and you can tell each other anything.\n\nHe loves that you're popular because you're a person he's very proud of.<|endoftext|>How tall are Petra’s wedding dahlias?\n\nA ball type dahlia with bright white, round blooms with tightly rolled petals. Grows 3′ tall with 3″ blossoms.\n\nWhat is Jonathan doing?\n\nHe has been giving speeches at Night of Hope events in stadiums and arenas across America. Jonathan is an accomplished music producer.\n\nWhat happens on the first night of the wedding?\n\nSuhag Ratnat is a significant ritual in married life in India. The first night when a marriage is completed is referred to. In this ritual, the bed of the couple is made decorated with some flowers.\n\nDo you think Nikki DeLoach has Pick’s disease?\n\nPick’s disease was the cause of the brain tumors thatNikki thought was abrain tumor. It was not possible forNikki to lose him in one day.\n\nIs vibranium a reality in real life?\n\nIs theranium real? It’s believed to be an imitation of a real meteorite called the “Gibeon Meteorite”, which is a real type of meteorite. It was created when a large meteorite hit during prehistoric time.\n\nIs music playing before a bride walks down the aisle?\n\nOn the other hand, the average song length is 3-6 minutes. It takes 30 seconds for a person to walk down the aisle. Each person will have only one tiny bit for a song.\n\nWhat is the meaning of wedding rings made out of sapphires?\n\nAn engagement ring containing gemstones means honesty, trustworthiness and faithfulness. It is thought that it keeps marriage strong and healthy. The sapphires have a beautiful meaning behind them.\n\nWhat service is The Wedding Ringer on?\n\nTwo weeks shy of his wedding, a socially awkward guy gets into a lie by hiring the owner of a company that sells best men for grooms in need. You can get all of the Disney+, ESPN+ and Hulu networks with ads for $12.99. All four of the companies use free ads to make their brands.\n\nDo you know what happened to Kathie’s meteorologist?\n\nOn Thursday, she announced that she is the lead of the station’s weather team. “Hey everyone!” I thought I told you I’m on weeknights at 4 and 11 on ABC6 in MovingOnup. It is the promotion of Bates.\n\nAre black rings fashionable?\n\nBlack rings have become more popular over the last couple years. If a man wants a touch of elegance and sophistication, he can wear sleek and stylish jewelry. Black rings hold a deepe.\n\nIs it acceptable for customers to have jewelery on their wedding rings?\n\nThe answer is no, it’s just a matter of taste. Those diamond bands without anything were more meaningful to the lovers than the wedding Diamonds they depict.\n\nWhy do people get married?\n\nThe bride and groom have the opportunity to make promises in a wedding ceremony. Their promises form the basis of their marriage, and the clergy can pronounce them if they choose to do so.\n\nWhich model features a signature fragrance about love memoir?\n\nIman’s first fragrance is Love Memoir.\n\nThere are two WEDDINGS called assailants.\n\nA sequel wedding is a two part marriage where there are several ceremonies on top of one. The first ceremony usually has close families and friends but you can possibly expand it to include large guest lists and a second ceremony.\n\nIs rose quartz expensive?\n\nNatural rose quartz, one of the rarer colors ofcrystalline minerals, is one of the most common minerals. It’s not an expensive gemstone\n\nThe dress is ecru\n\nWhat is Ecru? Ecru is an beige colored colour that is a bit different than white and blue. This shade is a lot softer and colder than stark white, and also very easy on the eye.\n\nAt an Italian wedding what should we expect?\n\nA typical Italian wedding is a party except for the older crowd. The tarantella or pizzica is a dance that plays on the southern part of Italy.\n\nWhat church hosted the wedding of Frida Aasen?\n\nThe 12th-century Catholic church, Chiesa del Diva Martino, is a perfect location for a church wedding.\n\nHow much is it to get married?\n\nFree destination wedding packages are offered by a majority of our featured resorts. The average wedding package in the Caribbean is around $1,000. It costs between $4 and $7 per day to stay a full week in a resort.\n\nThere is a black wedding.\n\nThis tradition of marriage recognition in the US South used to be symbolic, but now it is used to honor those that preceded them.\n\nHow do you shoot a wedding while the sun is shining?\n\nShoot in manual You should be able to see your efficiency. They should put their backs at an opposing location to the sun. MATCH THEIR PARTICULARS TO THE PREVIOUSS… Use spotting for hiking. Excess for the body. Use your utensils to wash the dishes.\n\nWho were the best friends at my friend’s wedding?\n\nTwins Samantha and Mandy Newhouse were portrayed by Rachel and Carrie.\n\nWho makes them?\n\nIt is a major distributor in Canada and owns the brands of Luxart and Mainline.\n\nWill you mix metals during the wedding?\n\nAlthough a wedding band has to reflect your relationship, you don’t feel like you have to go with just one metal. Whether you’re after a subtle mix or a major contrast, mixing metals is a great example.\n\nWhat can Jonathan Olsteen do?\n\nHe has spoken at the Night of Hope events every week since. On top of that, Jonathan is also a music producer.\n\nThe traditional anniversary gift is 4 years.\n\n4th anniversary: fruit or flowers. Just as a gift of fruit or flowers can provide a similar ripening after four years, so can your relationship after four years. Your florist can recreate the same bouquet from yours.\n\nWhat is the lifespan of a dog?\n\nThe lifespan of the all species was over 3decades. 300 years.\n\nWhy should you do Grizzleheim?\n\nThe Grizzleheim Spell is for Level 35. When we reach level 35, we will be given initialSpells after we reach Mirkholm Keep in Grizzleheim. Old Town in Wizard City has a spell quest.\n\nWhy do widowers wear their rings?\n\nThe widow wears her ring on the right ring finger while the husband wears his ring on the little finger. The surviving spouse allows the spouse to express how much they cared for the widowed person. The combine\n\nHow old was Calvin Ridley?\n\nThe player ran the 40-yard dash in a fast 4.30 seconds and tacked on a 110.0-inch broad jump.\n\nWhat do I need to bring for a wedding.\n\nCocktail dress and semi final attire go together. The dress codes have differing sizes, so you can have more practicality in regards to the sizes available. While not quite as formal as dress, you can opt for a slightly larger bag.\n\nWho is the father of Jackie Crawford?\n\nMy parents were in Illinois where they did the rodeo. My dad and his brother are from Illinois and won the high school team roping national finals. The foam pillowJackie’s mom cut the edge of from was used for the saddle horn\n\nIs 5000 too much for a wedding venue?\n\nOne of the biggest expenses you’ll have to contend with is the wedding venue. One of the differences between weddings in a bar and weddings in a venue is the cost.\n\nNavy blue andSage green do they mix it up?\n\nBlue and green are great for a cool and calming combination. navy blue is an accent color if you want to use it as an accent color in your main color theme.\n\nHow much do people living in Australia make a living?\n\nthe Photographer with least two years of experience gets a salary of $27,400AUD. A professional that receives a masters degree is paid an average of $75,700 every year.\n\nDid you know that a bridal boudoir is a place that contains items for brides to buy?\n\nA bride in bridal boudoir is posed in revealing clothing\n\nPeople wonder what to expect at a Spanish wedding.\n\nThere are no speeches coming", "num_tokens": 2048} {"category": "common_crawl-social_life", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-social_life/part-00-00000.npy", "text": " almost certainly going to be disappointed.\n\nTo have expectations and ideals concerning a relationship partner, will only invite disappointment and prevent you from accepting others just as they are. To not be accepting, you lose the richness of that 1.2% difference than can prove to be quite invaluable - what another can bring to the relationship that you may need and want - perhaps not at the moment - but at some point in the future. You will miss out on what they can provide when it is needed. What they can share with you when you want it.\n\nIt serves no purpose to disagree with others, when they state how they feel - to disagree with someone about their feelings will often be considered an insult to them. If they feel that you said something that they find to be insulting to them, and you disagree with them, you only add to the problem. Listen to them when they tell you that they are hurt or feel insulted. Whether you meant to be insulting or not makes no matter - to the individual their thoughts and feelings will be of utmost importance to them - and should be to you. They are making every attempt to be sincere and you should understand the importance of their sincerity.\n\nIf your actions or acts of insincerity hurt others, they will not want to be with you, let alone be your friend. Accept their feelings and attempt to find out what was said that made them feel the way they do. Then move to correct your approach if you want to have a sincere relationship with them.\n\nAnd, yes, there will be times when the other person's actions hurt you. If it is your desire to be in a relationship with them, then it is your turn to show your sincerity and let them know that their words or actions hurt you. Remember, that running away from your problems or the other person's problem never solves anything - other than to create pain for both individuals.\n\nIf you continue to insist that others say and act only as you want them to, then neither of you will be happy. Love is unconditional and to create conditions, to be controlling or manipulative in order to attempt others to be the person you need or want them to be, will be seen as a negative insult to their desire to be just who they are. It sends the message that they are not needed, unwanted and undesirable.\n\nBe yourself, but only when it is positive for both individuals and not a one sided game where you are the only winner and right no matter what. No one likes to play games in a relationship for long. Be happy but not at the expense of others.\n\n[1] Understanding Human Genetic Variation\n[2] Genetics of the Chimpanzee\n\nPlease follow and like us:\n\nYou Can’t Judge…\n\nGlass RoomMost have heard some version of the adage, \"You can never tell a book by its cover.\" The phrase first appeared in print in the 1946 novel, \"Murder in the Glass Room, by Edwin Rolfe and Lester Fuller.  Even then it was an adaption of \"You can't judge a book by its binding\", from the Journal of American Speech (1944). Some purport that the phrase can be traced to Roman author Juvenal who wrote in Satires, \"Fronti nulla fides,\" which translates as, \"Never have faith in the front.\" as far back as the 1st or 2nd century AD.\n\nLike many adages, this is not uniquely true. You can read the entire book and as you close the cover, you will note that the words on the cover describing what's inside has not changed. And, no matter how many times you read the book, nothing about the book changes. Neither the cover nor the content change with multiple readings. The cover looks the same and the description remains the same. The words inside say the same thing.\n\nWhat does change is our understanding of the book. As with our relationships with others, every time we open the book and study it, we learn a bit more about the author's original intent. Or, in some instances, we mistakenly come to believe the opposite of what the author intended, depending on just how vivid our imagination is and how much we want to believe our own version of truth rather than accepting what is real and intended.\n\nThe words in books can form ideas in some readers that spread like a virus, infecting and destroying the truth of the matter. The same thing may happen with relationships as we allow our imagination to wander in search of our own truth. That truth will depend on how we perceive what it is that we want or need at the moment.\n\nThose who attempt to judge you with either a single or multiple reading, for the most part, rely on the adage that the outside and inside are somehow different and that the outside is not to be trusted. That they somehow need to construe what they will about character. For those who believe that you cannot judge a book by its cover, they will never know who others really are - only their own ideas - which can never be correct.\n\nPlease follow and like us:\n\nPerfection is a state of mind – a choice.\nYour success in all things begins with your will,\nIf you think you can, your will can pull you through.\nIf you have no will, it is almost certain you cannot.\n\nWithout will, you assign yourself to failure.\nIf you wish to win, but think that you cannot,\nYou have already lost all chance of winning.\nIt is all a state of mind.\n\nIf you think that you will lose whatever you attempt,\nYou will think that winning is impossible,\nYour attempts to find success will be minimal,\nAnd you will fail to realize your true potential.\n\nThe person who thinks well of themselves,\nThe one who think highly of their potential,\nWho gets better with each and every day,\nWill always emerge as the winner.\n\nLife is a battle began at birth,\nThe winner is not the fastest or stronger person,\nSurely not the weakest either,\nAnd, the winner is the one who thinks they can win.\n\nTheir precious, perfect life occurs at birth,\nTo do with as they see fit in their accomplishments or failures.\nSome will never try, others will not try hard enough,\nBut those with the will to win will always live a perfect life.\n\nIt's up to you to make your own choices in life,\nTo make the right choice to be as perfect as you should,\nEither you will or you won't be successful,\nBut in the end it is your choice and no other can help you.\n\n- Bill Hood\n\nPlease follow and like us:\n\nEliminating Negativity From Your Life\n\nHow to rid your life of negativity and be truly happy\n\nI greatly dislike the root word NO! It has a way creating problems for me and creating a ton of anxiety in my life. Then there is also the word not, as in cannot “can’t”, do not “don’t”, and will not “won’t”. And, for good measure I will add “never” and “always” to the list of my dislikes. Note, that this the last time you will find any of those words in this article. Why, because I am at peace and happy in my life and I can write in a positive tone when I want.\n\nWhat do all those words have in common?\n\n1. They all have negative connotations.\n2. They are commonly used by negative people.\n3. They destroy happiness.\n4. They destroy trust between two people.\n5. They drive a stake into any relationship\n6. And, they create stress for all involved in a relationship\n\nThe Beginning\n\nUnlike most of the columns on This Week I Learned, I have a personal stake in this column. Let me take you back to February 28, 1961. I was a teenager and anxious to get on with my life after school, get a job, earn some money of my own, and find my self.\n\nUnfortunately, the U.S.A. was in the middle of the Cold War. The Kennedy administration remained essentially committed to the Cold War foreign policy inherited from the Truman and Eisenhower administrations, which opposed any government that thought differently than that of the U.S.A.\n\nIn his inaugural address, Kennedy made the ambitious pledge to \"pay any price, bear any burden, meet any hardship, support any friend, oppose any foe, in order to assure the survival and success of liberty.\"\n\nWhile Kennedy was against the deployment of American combat troops and observed that to introduce U.S. forces in large numbers, while it might have an initially favorable military impact, would almost certainly lead to adverse political and, in the long run, adverse military consequences. However, Kennedy, acting on advise from Vice President Lyndon B. Johnson and his advisors John Kenneth Galbraith, Maxwell Taylor and Walt Rostow recommended that U.S. troops be sent to South Vietnam. By November 1963, there were 16,000 American military personnel in South Vietnam.\n\nAnd, thus I found myself as a young teenager, embroiled in a war that was beyond my understanding, and my personal support.\n\nDuring the Vietnam Era it is has been estimated that as many 1,170,476 people died and another 608,200 were wounded, although the actual numbers could be much higher as these are only the reported casualties.\n\nUnless you have personally been involved in the killing of massive amounts of individuals, including innocents; men, women and children you have little idea how that can impact a young impressionable teenager. And, how it continues to haunt those involved for decades, until they pass on.\n\nThe Journey\n\nAfter Vietnam, I was changed forever. Today, I have put behind me the negative aspect of war or for that matter any form of negativity. It was after experience the horrors of war that I began my search for peace, serenity and tranquility.\n\nSri AurobindoMy journey was to take much longer than I thought, and it would eventually take me to the southeast coast of India, where I became a follower of Aurobind", "num_tokens": 2048} {"category": "common_crawl-social_life", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-social_life/part-00-00000.npy", "text": " an intelligent leader again. Now I'm going to have to find something else to be annoyed about besides politics. I'm sure it won't be hard.\nI'm seeing a new chiropractor. The first time I went to the office I noticed a giant poster of falling leaves with an italicised caption that read \" Without Chiropractic, fall comes early\"\nChiropractic controls the seasons? Chiropractic Care prevents untimely tumbles?\nThen I saw another poster of a waterfall that said,\" Every drop of intelligence is a treasure to be cherished.\"\nWhen I see this kind of stupidity I always imagine the discussion marketing and design executives must have had before giving the go ahead to print or produce thousands of something with an idiot slogan. In a company large enough to produce a series of cheap posters, surely it took the agreement of several individuals to go to print, several people said,\" Sure that makes sense. Lets go ahead with that.\"\n\nToday I went and as I was waiting for my appointment I spied a book called \" How to adjust your cat\". It had illustrations of how to crack your cat's back. The font for the instructions was sort of goofy like a spoof-book, but nowhere could I find any real irony or the overboard sort of \"I'm just kidding!\" tongue an cheek quality that you would expect from a joke book. It just seemed to be really sort of technical illustrations and instructions for how to give your cat a chiropractic treatment, which sort of stuck with me. I mean, I couldn't stop thinking of a cat getting that neck twist thing on the table and the mewly fuck-you sound it would make. It would be the sound that would really make it funny.\nThen the chiropractor showed me a chart and said something about how I'm having \"catabolic\" problems, which completely distracted me from anything else he said after that. I am indeed having Catabolic problems today.\nI did pay attention when he said I am allergic to milk products, because that may signal the end of my marriage. You may know that jeff and I met on the internet, but what you don't know is that one of his deal breaker questions was whether or not I liked cheese. He asked me in the first 10 minutes. I thought he was joking,and I didn't even think it was really that funny of a joke, but I've discovered it's actually kind of a big deal for him. I put cheese on a lot of things in this house that others maybe wouldn't think to cheddar up. I don't know if we'll break up, but it certainly won't help with the tension.\nBut the new milk-free diet is fine. I've been on diets that restrict what you can have so severely that all you can do is drink water and chew on your own hand. You may lick the salt from the tears running down your face for dessert. As long as you check their glycemic index first.\nThanks natural chiropractor!\nI'll spend 200 dollars on supplements that I'll take for one week and then cave spectacularly with a Chicago style pizza. At that point, I have failed, so I will push the bottles of vitamins into the back of the medicine cabinet pretending that soon I will go back on the regimen, really detox from all this chocolate. Then six months later we will move, and I will try to sneak them into the Goodwill giveaway bags so Jeff won't see. Let the handicapped deal with my vitamins of failure.\n\nSpeaking of the handicapped, last week we went out on child free date night courtesy of my mother in law, who drives up here to sleep on our couch, change the babies diapers, clean our kitchen and fold our clothes. Oh and tell me over and over how pretty I am. I might be the only woman in the world who secretly longs to have her mother in law move in with her.\nSo we went to Club de Ville, which is still a pretty mellow bar and sat down on a long bench outside to try to drink enough so that we wouldn't freeze to death. I went wingman with my friend Megan on a \"whore lap\" around the bar to see if there was anything cute( there wasn't)and when I got back I saw that our group on the bench was enhanced by two, a 30-ish Mary Lou Retton with something distinctly fetal alcohol syndrome about her features who was gyrating on the lap of a young man who beamed as though he had just won the Pussy Lottery.\nNow, I am no prude. If anything, I think the world would be a better place if there was much more sex and less violence. I am also no judge of slutty behaviour. Our species evolved with one overwhelming drive- reproduction. Men shouldn't be the only ones allowed to admit they enjoy it.\nHowever, even I felt some desire to censor our neighboring lovers. As people stared and muttered \" get a room!\" they pretended to do it in every position imaginable. I haven't seen so much clothed humping since my high school guidance counselor's office. And it went on and on. Until I really thought in all seriousness, you should get a room. As she laughed hysterically bumping on his privates like a trampoline, I began to see his delight turn into torment. Maybe he lived with Mom and couldn't bring her home. Maybe she lived on Fetal Alcohol Island. Neither of them looked like the caliber of individual who anyone would employ or extend credit to, so maybe all they had was this cold outdoor patio to hump on. Which was probably for the best, since after that kind of build up the actual intercourse would surely be a disappointment.\nThey looked like they were having more fun than anyone at our table, that's for sure. Our only fun was watching them out of the corner of our eyes while pretending to be sick of it. Really, it was fascinating. I hope that retarded people will hump and give pretend blow jobs the next time I'm in line at the pharmacy or the DMV.\n\nRuby is beginning to potty train, which means we all make a big deal out of going to the bathroom and talking to her while she sits on the potty and reads Jeff's Benefit's Manager Weekly. After 10 minutes I have to drag her from the bathroom to put another diaper on. Only once has this resulted in a tiny stream of urine and when it did we went ballistic, screaming and high fiving and covering her little hand with about 25 doggie stickers. Then nothing.\n\nWe bought her a Princess potty, which she loves and tries to take into bed with her at night.\n\nI wish there were adult potties that celebrated themes I am interested in. I would appreciate, for example, a Lost potty. Mine would have to have Saiid, and the polar bear on it.\nA zombie potty would be pretty cool, if it had that zombie baby from Dawn of the Dead and the zombie dogs from Resident Evil.\n\nI would also enjoy a potty that played contemporary jazz as I peed in it, you know to encourage me to do it again. Or a little electronic voice that said as I sat down, \" Damn, you have the ass of a twenty year old! You are still WAY too hot for your husband!\"\n\nJeff's potty would have Ben Bernanke and the members of the Senate sub Committee on the financial crisis, which has now eclipsed Spongebob as our family's most watched TV experience.<|endoftext|>Nobody wins in situations where a customer complains so much that it escalates into a big scene. The customer will forever be known as the infamous patron that ruined everyone's day and is probably banned from the store for life. The employee trying to alleviate the situation is stuck dealing with an irrational customer who isn't going to take no for an answer. The customer's family is too humiliated to even admit their related to that monster.\n\nAt some point in their lives, these people witnessed their parents become \"THAT\" customer and experienced every ounce of secondhand embarrassment and drama you can imagine. These are their stories. Content has been edited for clarity.\n\nNever Going To The Bank With Dad Again\nNever Going To The Bank With Dad Again\n\n\"My dad is a union tire worker. He is gruff, logical, and curt. He doesn't appreciate people. He hates banks, conservatives, and corporations. One day, we went to Wells Fargo. He was depositing $3,000 in cash. He deposited the cash at the teller and we turned around to leave. At just that moment he remembered that he wanted to go to the junkyard to pick up tires or something.\n\nHe turned back around and went to the same cashier. He said, 'Oops. I forgot I needed some cash to get some stuff. Can I get back $200 of that cash?'\n\nThe cashier said, 'Sure! Just a second.'\n\nShe then went to the drive-thru area and talked to another cashier for a second. My dad was annoyed that she left, but waited like a champ. A few minutes later, she returned to tell my dad that because he didn't have $200 in his account prior to the deposit that he would have to wait 24 hours before his deposit 'cleared.'\n\nHe instantaneously burst into a fit of rage, screaming expletives about how much bull it was that 'cash' had to 'clear.' They somehow got him corralled into the manager's office where a long screaming match ensued and the cops were called. Before the cops could get there, my dad put his arm on the manager's desk and 'swept' the desk clean, including his computer and everything else on the desk. We then left immediately. I assume that they closed his account and sued him, but I have no idea how it ended.\n\nI was around 10 at the time, but I've never gone back to a bank with my father.\"\n\nDad Loves A Good Deal\nDad", "num_tokens": 2048} {"category": "common_crawl-social_life", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-social_life/part-00-00000.npy", "text": "'s not. It's bizarrely exhilarating. Either way, the command and control part of my brain gives up with a final whimper. I stand there, naked, in front of him. He reaches out and runs one finger down the length of my body from neck to groin.\n\n'You're beautiful, Ollie. Come on.'\n\nHe takes me by the hand and leads me to his bed. There, he strips off the rest of his clothes and we lie down beside each other. His body is firm and smooth. This time he runs his whole hand over my chest and down into my groin. Then back behind my balls until he finds my hole. He rubs a finger across it. It sends a thrill through my body. He rolls onto his back and pulls me on top of him. I lower my head and put my lips against his. We kiss. He wraps his arms round me and then runs them over my back and down over my buttocks. He slides a finger back between my cheeks and fingers my pucker again.\n\nI know what he wants.\n\n'Ollie,' he says gently, 'would you let me fuck you?'\n\nI really don't know if I'm ready for this yet. And, wonderful boy that he is, he senses my hesitation and immediately recognises it for what it is.\n\n'No...it's too soon, isn't it? That's fine, Ollie. I said we didn't need to rush things and here's me, rushing you. Forgive me.'\n\nHe is so lovely.\n\n'Thanks, Noah. I'm sure it will be wonderful to have you inside me, but...would you mind if we didn't do it quite yet?\n\n'Of course not, Ollie. '\n\nHe kisses me. Then I see him smile.\n\n'But perhaps you'd like to do it to me?'\n\nI can't pretend I haven't thought about that. And the idea makes my cock twitch. But it doesn't seem fair to make him wait for me and not to do the same for him.\n\n'I think I'd like it best if we could both take that step together, Noah.'\n\nHe gives me a little hug.\n\n'Perfect, Ollie. It's a deal,' he says.\n\nI roll off him.\n\n'But in that case we find something else to do with these,' He says, rubbing himself gently against me.\n\n'I'm sure you'll think of something,' I say.\n\n'I think I know just the thing,' he says, with a grin.\n\nHe flips himself around until his head is in my groin and his cock is virtually brushing against my lips. We take each other in our mouths and bring each other to another electrifying climax. Afterwards we just lie there, kissing and cuddling and holding each other. To my surprise, he gets hard again; it seems a shame to waste it, so I take my time stroking him to a third, much slower, orgasm. He ruffles my hair.\n\n'You're definitely very talented Ollie.'\n\n'I hate to see something so impressive go to waste. How come you seem to stay permanently hard?'\n\n'Don't know Ollie....maybe it's just the effect you have on me.'\n\nI smile, and he kisses me. I look at my watch.\n\n'I hate to say it, Noah, but I need to go.'\n\nHe pouts. It's charming.\n\n'No fair.' He sighs. 'This has been a wonderful afternoon, Ollie. Thank you so much.'\n\n'It's been wonderful for me too. Noah. But I really do need to get back. Tutorial in about an hour.'\n\n'I understand.'\n\nReluctantly, I get up and collect my clothes off the floor. I dress slowly. Noah watches me, still lying there naked on the bed. Fully-clothed, I cross over to the bed and lean down and kiss him.\n\n'When will I see you again, Ollie?'\n\n'Fancy taking in a film this weekend?'\n\n'Sure. Why not? Anything in mind?'\n\n'People keep telling me La La Land is worth a look.'\n\n'OK...sounds good. Meet up for a drink in the bar opposite beforehand?'\n\n'Great. I'll check the timings and message you.'\n\nHe slips his hands down my back and we embrace. I slip a hand into his groin and give him a squeeze.\n\n'Mmmm...are you sure you can't stay?'\n\n'I wish I could. See you Saturday. Or drop in anytime.'\n\n' 'K Ollie. Take care.'\n\n'Bye Noah.'\n\nI let myself out and walk out and down the stairs. I feel like I'm floating on ai<|endoftext|>Marriage Blog\n\nTrials in marriage life\n\nAim that trials in marriage life Mitchell about drag\n\nWhat we need is meaning in life, which then leads to happiness. More often than not, financial problems-including the inability to discuss purchases or debts-are a symptom of other issues affecting the marriage. Nor will we try to resolve here trials in marriage life what it is that may survive death. I prayed for a house in Kerala and prayed for my kids's education. Also is it laminated or simply plain paper. To make matters worse, my choice in life-partners is not the choice at least half of my family approves of (I am a 42 trials in marriage life old independant woman, with a career, own house, car, etc) so I have to either listen to endless lectures about what I should do OR I get icey silence and evil trials in marriage life. So if you feel that you are in trils position that you are way more invested than your man, act quick to reverse the situation and get your relationship back to equilibrium in which both parties are as attracted and interested in the other and the longevity of the relationship. Thank you Sarah, travel can definitely fire up people's lives single or couples, it only makes life more exciting for everyone. Then, the next mwrriage is to upload your horoscope and photos. Sleep deprivation can be caused by a number of factors related to your work. Low cost, high profit, and a variety of products to choose from are the lufe why there are dedicated websites and offline marketing efforts built rtials this trials in marriage life sector of the wedding market. People hog on trials in marriage life whatever comes their way, being least bothered about the consequences. Trials in marriage life a paper cutter for best lice, or take the printed invitations to an instant print shop, or a copy center to be cut. I really need assistance and strength to interrupt up with him and transfer on. I have been raised a Christian my whole life and in the bible God clearly states that a man and a outside wedding venues williamsburg va, and a woman and a woman, are trials in marriage life to be together, she said. A simple you actually made me chuckle in the prayers for spiritual warfare in marriage day or I appreciated your assist marriate the dishes actually goes a long way. If you are brought up in a cultural group that has the same or similar beliefs, the transition is a lot easier for couples and it makes it a lot easier for them to design their lives and day-to-day routines. In a hurry. So they go out of their way and do things to make others like them. OFW has become so popular that many divorce lawyers are now offering the app as part of their services. For a few hours, I'm swept away by a handsome hero and his lovely heroine. While you do not need any fancy tools or electronic gadgets, most people do need some help and advice to diagnose the problems and to figure out how to fix them. If these are the crucial intangible benefits created by the social meaning of marriage, the assumption that marriage is the union of amrriage man and one woman has no real importance. I know wine themed wedding favor ideas isn't one single verse that even HINTS at trials in marriage life sex unions,I was trying to get Gundees answer. Though you may treat him or her as your enemy when you fight, don't stop loving himher. While the clan shares many of the beliefs of other polygamous groups in Utah, incest, for many of the Kingston leaders, is their indelible trials in marriage life. They can't eat, sleep, work, think, or function in any substantial way. So you have a great topic for an ebook you want to write but do not know where to begin. But there are other more significant, priscilla of boston wedding dresses on sale consequential examples of this as well. The counter argument is that states increasingly have viewed divorce as a legitimate matter of public concern because trials in marriage life its extensive costs and the havoc it causes to primary and extended social and economic relationships. Showing or expressing a deficiency of veneration, especially for sacred things.\n\n09.08.2013 at 08:35 Dami:\nI can consult you on this question. Together we can find the decision.\n\n18.08.2013 at 15:57 Magor:\nYes, really. It was and with me. We can communicate on this theme.\n\n20.08.2013 at 17:22 Bragore:\nYes, really.\n\n29.08.2013 at 21:36 Shakale:\nYou are not right. I am assured. Let's discuss it. Write to me in PM.\n\n07.09.2013 at 01:07 Gardahn:\nIt is a pity, that I can not participate in discussion now. I do not own the necessary information. But with pleasure I will watch this theme.\n\n09.09.2013 at 09:25 Faezragore:\nIn my opinion it already was discussed\n\n11.09.2013 at 11:52", "num_tokens": 2048} {"category": "common_crawl-social_life", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-social_life/part-00-00000.npy", "text": " her response, Mr. Haruna, who was moved to tears, thanked the association and other people who contributed toward rebuilding her house, and prayed Allah to reward them for the gestur<|endoftext|>Name of Person: RON BENNETT\nDate of death: Thursday 25th January 2024\nArea: Myrtleville, Crosshaven, Cork\nNotice: “Ron Bennett passed away peacefully on January 25th, 2024 at Haven Bay Care Centre, Kinsale. He was the beloved husband of the late Jean and the loving father of Juliet and Michelle. He will be greatly missed by his daughters, son-in-law, grandchildren, great-grandchildren, relatives, and friends. Reposing at Fordes Funeral Home, Old Waterpark, Carrigaline on Tuesday {30th} from 1.30pm until service at 2.00pm, followed by cremation at The Island Crematorium at 3.00pm. In lieu of flowers, please donate to a charity of your choice in Ron’s memory. May he rest in peace.”<|endoftext|>I was eleven years old when I met you.\n\nIt was sixth grade, and I spent six weeks in your music class. Your legendary knowledge of music, extraordinary teaching abilities, and, most of all, your voluminous capacity for kindness preceded you. I anxiously awaited experiencing your class.\n\nEveryone remembers middle school.\n\nThey are the most awkward years of life, smack dab in the middle of kid and young adult. Every day is an internal struggle, bursting with confusion and humiliation. Your heart is pumping emotions through your veins all the way down to the tips of your toes. Your head, your intellect, is telling you to shut it all off, because DON’T LOOK AT ME, creating a leaky faucet.\n\nPut a whole herd of these kids together in the institution that we call school, and it makes for humiliation and torture every day.\n\nThe quad is the battlefield. You don’t know who your allies or enemies are, because everyone is constantly changing sides. The deadliest weapons are the words spat at you like venom, augmenting your internal battle. The confusion is palpable, and you just want to hide under your covers in the safety of your bed until the hormones abate.\n\nI was thought of as easy prey, because my desire to stay out of the chaos surrounded me like a cloud. This seemed to draw the others towards me. I was taken down and fed on every day by my peers, and I’d lie awake at night, every muscle tensed with the dread of facing the next day.\n\nYour class provided the lantern in this dark, dismal tunnel.\n\nIn sixth grade, our first year, we did a rotation of extra curricular classes. This allowed us to choose the class that we wanted to take for the seventh and eighth grades. Each class was a six week period, and then we would switch over to the next.\n\nI arrived at your six-week class. Entry into either band or choir for the next two years was by invitation-only from you, awarded to us at the end of the six weeks. When the time came, you called me into your office alone and proudly extended to me an invitation to join choir. I felt so accomplished, and I accepted the invitation. I later figured out that you privately invited everyone into either band or choir, leaving nobody out.\n\nYou made every, single, little, tiny, mixed-up, eleven-year-old kid feel special.\n\nSo, for both seventh and eighth grades, I got to head to the sanctuary of your classroom first thing every morning and sing. I felt safe in your class. I was happy, getting to be expressive with my body, with my vocal cords, with music. You insisted to the principal every year that choir be first period because you wanted us to start the day off with music. You would always say,\n\nThink about all of the other kids who have to start their day in math class, or writing an essay. You get to start your day singing.\n\nYou have made permanent pathways in my brain with what you taught us. I will never forget the “kee-kaw” vocal exercise that you did with us every day, nor “shoulders back, hands at your sides, feet planted firmly on the ground, toes pointed forward.” You would have us make eye contact with you at all times while we were singing, which made many people uncomfortable. But, your willingness to connect with us and treat us like equals, which was rare with most adults, was what made you so special. Your empathy and gentleness towards your students proved your ability to teach beyond music. The life lessons you wove into each class helped me feel braver in the world that I viewed as so treacherous. Plus, you had an unrivaled sense of humor.\n\nYour humbleness also set you apart. I did not find out until much later about your skill on the trumpet. All you wanted to do was bestow the gift of music on all of us. If you ever had a bad day, you did not show it. It was never about you, and always about us.\n\nThe relationship that you and I shared was especially great. You seemed to see something in me, and made it a point to nurture whatever it was you saw. You were generous with your time with me, calling me into your office every morning. When you would ask me “how are you?”, you meant it; you genuinely wanted to know. We’d talk about music and life. Then, you gave me my first-ever solo, and always made it a point to tell me how much I was improving. Your encouragement helped me find belief in myself. But, the thing that I appreciated most was when you said that I was “a kind and good person in a time of life when most kids are not.” You would tell me this often. It helped me fine-tune my moral compass, and know that doing the right thing takes priority.\n\nYou made your retirement announcement a year after I graduated, signifying the end of a career teaching music spanning over 35 years.\n\nYou asked me to sing at your retirement concert, which was special for me. The band was entirely composed of your past students, young and old. Many of your students have gone on to be incredibly successful in the professional world of music, playing their various instruments in well-known TV shows and films. Perhaps, the most profound element was that every, single seat in the 1,800 seat theater was filled.\n\nThat’s at least how many lives you touched.\n\nI’ve only seen you a handful of times since then, but I hope that you are enjoying a much-deserved retirement. Mr. Leff, you are one of those rare people in life who leaves a trail of magic wherever you go, whatever you touch. You made an irreversible impact on my life. I will always remember you.\n\nPhoto by David Beale on Unsplash\n\nOne Reply to “Thank You For Sharing Your Magic Through Music”\n\nLeave a Reply<|endoftext|>How Your Donation Helps\n\nBig Brothers Big Sisters receives more than half of its operating income from private donations. The program’s success depends on contributions that it receives from individuals, corporations, and foundations. Big Brothers Big Sisters of the Bridge serves hundreds of children in Northeast Pennsylvania, however there are so many more that are still waiting for a Big Brother or Big Sister. With your donation, we can recruit, screen, train and match Big Brothers and Big Sisters with the children that are on the waiting list.We are committed to matching as many children as we can. The generosity of individuals like you allows us to match more children in your community.\n\nThank you for your support.<|endoftext|>Pheus and Mor\nRatings: 5/5 from 1 users\nPheus and Mor 5 5 1\nPheus and Mor have been the best of friends ever since their fated meeting. They do things together and they put each other first than themselves. Their friendship is the true model of how friends should be with one another. Torn from each other by the changing times, they are determined to find each other despite the numerous obstacles blocking their path. Numerous time wherein you will have to work together to complete each level. A perfect example would be that Pheus can jump really high but can't swim. Meanwhile Mor is unable to jump high but is adept at swimming. Only by cooperating with one another can they find and finish each puzzling level.<|endoftext|>How many photos you can expect\n\nHello guys, this is Paul. And today I want to tell you how many photos you can expect from your wedding day. For lots of couples it’s a very important question because they want to have more.\n\nThey want to have everything from the wedding as much as they can in most cases. Why? Because your editors, our editors can skip some for us, that may be very important for them.\n\nSo usually we submit around 800, for us it’s average amount. It depends on what exactly happening on the wedding day. If you will have lots of different performances, speeches, dances, live band, DJ, some kind of violin players, whatever, lots of guests and so on, so in this case you will get much more photos because we will have lots of material to work with.\n\nBut, if on your wedding day your people will be just sitting, eating and talking on the tables, you cannot expect many photos. Why? Because people usually don’t like when we take photos of them eating. It’s disgusting and it’s annoying for your guests.\n\nSo if you want to have photos with your guests it’s much better if you will entertain them somehow, so they can stand and do something on your wedding day. In this case, it will get much more photos.\n\nThen after the wedding we will need to select around 60 photos for the album. So pretty much 800 is more than enough in most cases. Sometimes, usually on Asian", "num_tokens": 2048} {"category": "common_crawl-social_life", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-social_life/part-00-00000.npy", "text": " lives.\n\nThe advantages of social media include connection, education, and creativity. Cyberbullying, privacy violations, and exposure to inappropriate information are some risks. Pre-teens and teenagers who use social media responsibly, politely, and securely benefit from written rules.\n\nRisks of social media\n\nExpressVPN’s survey made on 2,000 children aged 4 to 13 who have access to the internet in the U.S. and the U.K., as well as their parents or guardians, concluded the following risks for the teenagers who use social media platforms:\n\n1. Targeting Children\n\nAccording to the National Center for Missing & Exploited Children, reports of online child predator cases increased by over 97% in 2020. Moreover, one criminal may sexually extort dozens, sometimes even hundreds, of young victims, according to the FBI.\n\nIt could begin with a straightforward friend request or message. Predators sway children with promises and pretend common interests. Later, they take advantage of that curiosity and move into sexual terrain. With this “grooming,” they eventually win their victims’ confidence and use them for their ends. \n\n2. Identity Theft Scams\n\nOn social media, scammers and fraudsters are equally active, and all it takes for them to connect with your children is a straightforward friend request or follow request. Most people have seen enough phishing emails, robocalls, and scams to know better than to divulge their Social Security numbers or click on dubious websites. Unfortunately, every year hundreds of young people fall victim to identity theft frauds, which frequently originate on social media. \n\n3. Exposure to Inappropriate Content\n\nUnprotected social media feeds can contain violence, racism, drugs, and sexual content. Is it that bad? Facebook and YouTube moderators sign documents indicating their risk of post-traumatic stress disorder from their job. \n\n4. Sharing of inappropriate content \n\nChildren might need to be made aware of the long-term effects of the things they choose to post online. After all, frequently, all that is required is to apply a filter and click the “publish” link. Posting personal information can be bad enough since it might attract fraudsters and predators, but kids sometimes need to realize the impact of their social media decisions. Tell them that everything posted online should be seen as permanent even though they can erase it. Whether or not they wish to, others may readily download and distribute their posts publicly by taking screenshots of them or in another way.\n\n5. Wrong information\n\nYour children could encounter outright lies presented as facts every day thanks to fraudulent accounts and bots that distribute everything from false political information to spurious health science. Make careful to examine and discuss the information that is posted to your children’s newsfeeds. \n\n6. Cyberbullying\n\nCyberbullies use the online community to discredit their peers. About 60% of students have experienced bullying or harassment online, according to a Pew Research survey. Today’s youth build accounts for school-specific gossip, casually send abusive messages, and post destructive content about one another. Children may act out because of the nature of social media, but you can educate them on how to moderate their behavior and stop cyberbullying. \n\n7. Social Media Addiction\n\nFundamentally, social media is tailored to keep youngsters browsing. Using the persuasive design, expert psychologists create social networks that teach users to stay connected. Platforms may draw users in at a young age and keep them securely looped in by taking advantage of children’s social instincts. Then, it can progress to something close to an addiction that can influence judgement and, when eliminated, even cause withdrawal. \n\n8. Victim to Targeted Ads and Marketing\n\nMore time spent on the app means more exposure to advertising targeting consumers with highly targeted marketing. Little children are particularly vulnerable to laser-focused advertising tactics because they struggle to discriminate between enjoyment and commercials. There’s bad news if this makes you uneasy: You can’t completely shield your kids from this type of social media advertising.\n\nEven for younger children, banning social media might be challenging. Social media is becoming more prevalent in kid-friendly applications, games, websites, and learning settings. It is preferable to instruct your youngster on social media etiquette and how to avoid common pitfalls.<|endoftext|>Customer Service: +1.954.806.6775\n\ntell a guy what you are looking forGoing on a first date can be somewhat tricky, not really knowing what the guy sitting across from you is all about, hoping that the two of you will be able to connect, to avoid awkward silences and that conversation will flow naturally. When the date does happen to be going well, and you start to imagine a future with the guy that you are with, you then could start to over think about how you can convey to the guy what you are hoping for or to get out of the date. Stress no more, we are here to help!\n\nWhether you are looking to settle into a long term relationship, hoping to just get as single night of pleasure out of a good time out followed by a one night stand, or even if you are looking for a “fuck buddy” to have occasional casual sex with no strings attached, we will share with you the best way to ensure that you get out of the dating experience exactly what you so desire, by learning how to tell a guy what you are looking for on the first date!\n\nHow to tell a guy that you are looking for a long term relationship\n\nA lot of women find themselves facing the issue of not being able to communicate their needs and desires to men when looking for a long and stable relationship. If you happen to be in this situation, you may have encountered men who do not want to commit or even may have had a bad experience or two with a guy who wasn’t up front about is true intentions. Such past experiences could have left some scars and make you pause the next time you mean a man with whom you have genuine intentions of potentially being in a committed relationship.\n\nOur expert advice in this case is the following; First ensure that the guy that you are on a date with fits a certain profile that you are into or that he has certain attributes or sets of values that could fit with who you are and the type of relationship that you are looking for in order not to waste your time and his. Dating takes a partner and be mindful not to hurt his feelings if you can along the way too.\n\nSecondly, once you feel like there could be a potential match, don’t be afraid to tell him directly and unequivocally that you are strictly looking to find a potential life partner or at the very least someone looking to settle down. You could tell him this during the first date or at a later time but before the first hook up. The point here is only to plant a seed in his mind about where you hope that this encounter will go.\n\nHow to renew love in a relationship?\n\nLastly you must ensure that you not have sex with him until you have a sense of commitment; by that we mean the assurance or feeling that you are already in a committed relationship with him. If you continuously go on dates with someone, the longer you wait before having sex and the better your chances will be that the story will end in a commitment on his part. As such, time will work in your favor during “the chase” or the period leading up to the commitment, and then to the first sexual intercourse. Furthermore before the two of you connect on a sensual level, you will have been able to connect on an emotional level, while laying the proper foundation for a relationship for years to come; one where you are able to be intimate without sex, and create a space for feelings to rapidly flourish.\n\nWhen looking for a one night stand\n\nIf you happen to be looking for a one night stand, the trick is usually being able to go above and beyond social norm and stigma that can often time be associated with women looking to engage in a single night sexual encounter. It is perfectly understandable for women, just like men, to have the desire to engage in a sexual act with someone that they may have an attraction too or simply for the fun or to relieve stress.\n\nWhen you happen to be on a date with a guy that you happen to want to spend the night with, we suggest that you activate certain triggers that will arouse him or open his sexual appetite. This can be done through the touch; making physical contact by putting your hand on top of his or slowly rubbing you thighs against his under the table. A sexual connection can also be made by giving a brief but intense look into his eyes or again by speaking about sex, sexuality or sexual subjects.\n\nAfter having planted that seed in his mind, your next goal will be to make him as comfortable as possible and to extend the night past a simple dinner. You could even suggest going for a walk after the meal, going to a bar or even offering him to go back to your place for a drink. From there, the best way to communicate is through actions, make sure that you provide him with the opportunity to make a move to start being intimate.\n\nGoing Through Your First Love Break Up\n\nIf the two of you happen to spend the night together and wake up in the same bed, make sure to tell him that you had a fun night but that you are not looking to engage into any sort of commitment. We assure you that more times than not, the guy will not protest and he will simply be happy to have gotten lucky the previous night!\n\nWhen looking for a “fuck buddy”\n\nIf you are on a date and happen to think that the person sitting across from you would make for a great sexual partner, one that you can engage with in casual encounters with no strings attached as you are not looking for commitment, your overall attitude should be similar to the one described above in the section on “one night stand”.\nThe difference here is that in the days following the “hook up” you will send sexy late night messages to the guy. Furthermore, once you feel the need and desire to engage in another sexual encounter", "num_tokens": 2048} {"category": "common_crawl-social_life", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-social_life/part-00-00000.npy", "text": " save you now is the greasiest food you can possibly find. You reach for your card…\n\nThere is no card.\n\nShit. Where is my card? You think, panicked and ready to throw up. Did I lose it in the bar? Did I leave it in the taxi? Maybe I gave it to someone to hold… but who...\n\nLet’s be honest, this situation happens on a weekly basis. But with Loot, you don’t need to panic. If you know where you left your Loot contactless card and you know you’ll be able to retrieve it, then you can temporarily pause your card (just to make sure so if it gets into the wrong hands, your money is secure). Then when you get it back, you can unpause it.\n\nIf you’ve been quite unlucky and you suspect your card has been completely lost or stolen, then go onto the app and click Report card lost or stolen. This locks your card and prompts us to send you a brand new one. When it arrives, you just need to activate your card. (Open Card tab, press Activate card and either scan the card or type in the long number. Enter the confirmation code we send you by text and then you can view your pin and start using it).\n\nNow if, during this night out, you also lose your phone or you drop it down the toilet (etc) then don’t worry, you can sign into your account via Loot’s webapp and report your card missing on there. Broken your laptop as well? Then take yourself to one side and have a word because you, my friend, have had a shocker.\n\nSo, download the app here if you don’t already have it and good luck soothing your hangover.<|endoftext|>First:   Mid:   Last:  City:  State:\n\nPatrick Wrisley  in Celebration, FL\n\nGet up-to-date info on FL resident, Patrick Wrisley, by subscribing to USA-People-Search.com. Not only can you access billions of public records data here with us, but you can also find trustworthy and reliable data. Our search results include info such as age, recent addresses, names of family members, and phone numbers.\n\ny locate the Patrick Wrisley you're in search of, try adding more details, such as their past addresses or other known names, into the search fields. If you still don't see the Patrick you want , don't worry! You can also browse a comprehensive list of everyone named Patrick Wrisley who is also from FL. Once you find Patrick, subscribe to USA-People-Search.com to gain full access to their contact information as well as any other public records we might have on hand.\n\nTo make sense of all the info available on Patrick Wrisley, use our powerful search engine to quickly cut through the blur of names and find the right Patrick Wrisley. Simply key in any additional info you have on Patrick, like a nickname, prior address, phone number, or anything else you can think of. Once you find correct Patrick Wrisley, sign up to get full access to their detailed profile.\n\n Name/AKAsAgeLocationPossible Relatives\n1. Wrisley, Patrick H Rev54  University Place, WA\nSummerville, GA\nKissimmee, FL\nCelebration, FL\nAlpharetta, GA\nWRISLEY, KELLY T (age 54)\nWRISLEY, LAUREN (age 30)\nWRISLEY, LAUREN J (age 29)\nView Details<|endoftext|>tagNovels and NovellasThe Outsider Ch. 19\n\nThe Outsider Ch. 19\n\nChapter 19 - The Sinclairs' Houseguest\n\nRuthie returned to her mother's apartment while Doña Lisette was still at work. In spite of the quiet, she had a premonition that something unpleasant awaited her as soon as her mother returned. The feeling was so strong that Ruthie was tempted to call Mike, apologize for being rude to him, and beg him to return and get her out of Salinas. She took a deep breath and decided that no...it would be better to see what was the problem. She assumed that her mother might be mad about her trip to Nebraska...or maybe it was something having to do with Mike.\n\nWhen Doña Lisette returned home, she did not say anything to her daughter. No hello, no asking how the trip to Nebraska went. Ruthie knew right away that her premonition about a problem was dead-on. She could tell that her mother was furious at her. She had one of those dark looks that in the past would have preceded a vicious slap across the face, a lecture, and several hours sitting at the kitchen table. Ruthie, because she was an adult, no longer was subject to outright punishment, but it was obvious she faced a very unpleasant afternoon. She nerved herself to face whatever it was that had so upset Doña Lisette:\n\n\"Mom...what's wrong?\"\n\n\"You really are a deceitful girl, aren't you?\"\n\n\"Deceitful? Why? What'd I do?\"\n\n\"Do you know where Rosa is?\"\n\nRuthie took a breath, momentarily relieved it wasn't something else.\n\n\"I...I think she's in the Army...\"\n\n\"Exactly. She's in the Army! She ran away! And you knew about it! You knew what she was planning to do!\"\n\n\"Yes, mom...I knew.\"\n\n\"And you didn't have the decency to tell anyone...the decency to warn us!\"\n\n\"She asked me to keep it a secret.\"\n\n\"She asked you to help her lie to us! And because of you and your lies, she's gone!\"\n\n\"Mom...it was her choice! It's her life! She's 18! She's sick of things around here and she left!\"\n\n\"She left because of you! If you had just said something, we could have stopped her!\"\n\n\"Why? Why stop her? Why should I? Her life sucked...just like everyone's life around here sucks...and she wanted out...and the Army gave her that chance!\"\n\n\"Now my brother's not speaking to me! Because of you!\"\n\n\"That's his problem! Maybe if he'd treated her better she wouldn't have left! And I really don't give a shit about what...\"\n\nRuthie was interrupted when Doña Lisette hit her across the face with a vicious slap.\n\n\"You will NOT talk to me in the language of the Devil!\"\n\nRuthie stunned by the blow, covered her burning cheek with her hand.\n\n\"Stop hitting me! Stop fucking hitting me!\"\n\nDoña Lisette's eyes lit up with fury upon hearing her daughter swear a second time. She struck at the girl again, but this time Ruthie warded off the blow with her free arm. Ruthie's fist connected with the bone just above her mother's wrist. Doña Lisette fell back, shocked at the pain and at the fact that her daughter had actually struck her. She nursed her arm and gave Ruthie a tearful look.\n\n\"Mom! I'm sorry! I didn't mean to do that...but...\"\n\n\"Get out of my sight! Just get out of my sight!\"\n\n\"Mom...please!\"\n\n\"I mean it, Ruthie! Get your lying face out of my sight! If this is the way you want to be, if you are gonna lie and hit your own mother, then you're not welcome in my home! Get out!\"\n\n\"Mom! Please! I didn't mean to hit you!\"\n\nRuthie picked up her backpack and carry-on. It was very lucky that she had not yet unpacked. The moment she stepped outside, the door slammed behind her. She gasped from the shock of what had just happened. Finally she made her way to the main office of the apartment complex, sat down in the waiting area, and called Mike.\n\n\"I...kinda need you to come get me...\"\n\n\"Right now?\"\n\n\"Is something wrong?\"\n\n\"Yeah. Everything here's fucked up.\"\n\n\"OK...on my way. Are you gonna be OK 'til I get there?\"\n\n\"I 'spose.\"\n\nAs soon as she hung up, she buried her face in her hands. The receptionist of the complex glanced at her, so Ruthie picked up her stuff and went outside. She leaned on the sign of the main office, feeling too numb to even cry.\n\nWelcome back to Salinas, Ruthie...\n\nMike was elated that his girlfriend had called him and that she had been forced to set aside whatever it was that had made her so silent and moody on the trip back from San Jose. Once again Ruthie's circumstances had forced her to be dependent on him. For the next half hour he drove southward in an upbeat mood, thinking about how the latest crisis in Ruthie's life would once again force her into his arms.\n\nHe pulled into the complex and immediately saw a very forlorn-looking young woman leaning on the sign near the main office. He popped the trunk and grabbed her luggage. She hugged him and started crying. Finally she took her place in the passenger seat and they departed. Tears rolled down her cheeks as she sat silently watching the vegetable fields pass by. Mike now knew his partner well enough to realize that he needed to stay quiet until she was ready to tell him what had happened.\n\nThey returned to the Sinclairs' house. Both of Mike's parents were still at work, much to their relief. He took her luggage to the guest room while she listlessly followed him. When he suggested a swim, she shrugged her shoulders and casually took off her clothes. She tossed her stuff into the guest room while Mike undressed as well. He grabbed two towels and she followed him to the pool. They didn't need to worry about taking anything with them to put on, because Mike knew his parents were at work and would not be home for", "num_tokens": 2048} {"category": "common_crawl-social_life", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-social_life/part-00-00000.npy", "text": " In this stage, there may be little disagreement and the two are very upbeat about the future. However , the bond must be strengthened ahead of the couple can move on to the next step.<|endoftext|>06 April 2012\n\nLoyal until betrayed\n\nTo whom it may concern,\n\nThere's something that has been bugging me for a while now and I just don't know how to solve it. You cannot control life, but you can control the people who you let in and out of your life. I have issues with letting things (and people) go. If I was able to do this as easy as I wanted, my life would probably be so much less complicated than it is now.\n\nI'm one of those people who is extremely loyal and trustworthy towards the people who she loves and cares for. I will probably go to the moon and back for them if they wanted me to do so. But… once I've been betrayed, I can be tremendously horrible. I'm all for second (and sometimes even third or fourth) chances, but when the limit has been reached, I know that I can be extremely mean. It's not a good thing, I know, but it's who I am.\n\nI'm standing at one of those crossroads where I need to decide whether to keep calm or to act out and be mean. I really want to be the bigger person, but I also want justice to be served. I can't stand it when I've been done wrong, especially when I've done nothing but good in return.\n\nUgh… I need to get over this and let it go, but my mind and heart are too stubborn to do so. I really wished that I could get into it, but since this is a public blog, it's better for me not to do so. See, even when I'm venting about the situation, I'm still bloody loyal by not providing any personal information.\n\nMy cousin used to tell me that some people are simply not worthy of my time and that I need to stop caring so much. 'Life goes on, you'll find other people to love and care about. People who won't take your heart for granted.' Gosh… I can still hear him say this like it was yesterday. If he was here, he would probably smack me over the head and yell: 'get over it and go get some sleep!' . So I better go and do so.\n\nSo keep in mind folks… If I happen to like you, please don't give me reason to not like you. I really don't want another situation to keep on bugging me and you really don't want me to be mean towards you, seriously.\n\nThanks for letting met vent… signing off.\n\nBao-Nhi\nRelated Posts Plugin for WordPress, Blogger...<|endoftext|>main + fandom + writing + tech + journal + icons\nfanfic + resources\n\nSigned, Sealed, Delivered\n\nDear Raine,\n\nWell, it looks like another year has gone by. Another year, another letter, right? It's a New Year's tradition, or something.\n\nI'm sorry. I never know how to start these. It's like how every time I try to talk out loud, I trip over my words, but as soon as you put a pen and paper in my hand I'm fine. Well, as long as the pen and paper isn't writing a letter to you. I guess I'm just bad at talking to people that I love.\n\nIt's been a busy year. They're all busy years, in one way or another, but this one's been eventful.\n\nI don't know where to start.\n\nI met our son, Raine. He's eighteen.\n\nGive me a minute to indulge in a little bit of fantasy, okay? I'd like to imagine you picking up this letter, unfolding it, maybe lifting it and sniffing at it to see if I was wearing that godawful aftershave you gave me for Year's Turning the first year I was in Winhill. I'd like to imagine you waiting to open it until everything was quiet, until there was no one in the bar, until you could sit down and put your feet up and have Ellone make you a cup of tea. But neither of us is in our twenties anymore, or even in our thirties. The babies are all grown up, Raine. The babies are grown up, and the bar is silent, and I know that you're never going to actually unfold this letter after all.\n\nWell, I don't know that. But I'm pretty sure.\n\nI'm delaying.\n\nI knew it was him as soon as I saw him. I've been looking for him for so long, and he turns around and just walks right into my palace, plain as can be. He's got your face. That's how I knew. His eyes are his own, though. They might be your color (and oh, how I could see your eyes looking back at me the moment his met mine) but yours were never that cold.\n\nHe's grown into being a good man. A little rough around the edges; more like you than like me when it comes to talking to other people, a lot more like you than like me when it comes to communicating with other people. I don't think I got more than four words out of him the entire time he was in my office. I've told you a little bit about the SeeD, and the sorceresses -- well, written you a little bit about the SeeD and the sorceresses, but that's more or less the same thing, isn't it? after all, I've written you almost all the important things I ever had to say. Well, anyway. He's a SeeD, and I nearly choked when I found that out, because it's the last thing I would have expected from someone that you and I brought into this world together. But from what I could see he's a pretty good one, and he's got a lot of pretty good friends, all of whom are nice and determined that he's going to actually go out and live his life even if they have to drag him kicking and screaming.\n\nI mean, what parent could really ask for more?\n\nAnd we didn't get a chance to talk much, but Kiros and Ward and I went along with him and his friends when they went off to save the world. Because every story should involve someone saving the world, right? If I'd tried to write this whole thing as a story and sent it off to one of my editors back then, though, they wouldn't have bought it. Murdoch would have turned around and bounced it back to me with \"Nice try, but a little less fiction next time\" scrawled across the top of it in that stupid red pen of his.\n\nThey did it, though. They saved the world. ...Or made everything happen so that the world needed saving. I'm not sure. I never really payed attention much in school, and Doc Odine (remember, I told you about him?) can't seem to explain it without resorting to a lot of handwaving and incomprehensible words and he loses me at about the fourth time he grabs a piece of paper and starts drawing equations. So I just decided about halfway through this whole thing that I would just play the proud papa and wait for the right time to have The Talk.\n\nYou know. The Talk. For most parents, I guess that it's The Talk that starts with \"let me tell you about how boys and girls work\". I never got to give that one, and I guess that I'm overall pretty happy about that fact -- can you see me stammering my way through the birds and the bees? But now I get to give the one that starts with \"Squall, I'm the father that you've been looking for\" and goes from there, and I really don't even know where to start that one. Knowing me, I'd wind up tripping over my tongue and turning bright red until someone told me to sit down before I hurt myself.\n\nI've never been able to talk to people. You remember that, I'm sure.\n\nI still remember taking you out onto that hill and trying to ask you to marry me. It's been nearly twenty years, and the memory still makes me blush a little. Looking back at it, I seemed so young, even though if you'd said that to me then, I would have laughed at you. I was a soldier, after all. I'd seen the world -- well, the parts of it that Galbadia controlled. And I thought I was ready to settle down and fall in love and raise a toddler and maybe have a baby or two with a woman who would always be too good for me but I'd try my best to be worthy of her. And then things happened and I had to go out and do things in the rest of the world again. I thought that all I was doing was finding Ellone and taking her home. I guess world-saving runs in the family.\n\nWhen it's all over, when it's finally all over, I'm going to look back and count the moment that you said \"yes, of course, you idiot, what took you so long?\" to be among the happiest of my life, you know? I take it out and run that little clip of mental video whenever I start getting too depressed.\n\nAnd you know, between the two of us, we made a pretty good son. Oh, I know that there are those who'll say that we didn't have anything to do with it, that we didn't raise him, we didn't have any input in his upbringing and so we can't take any credit. I'm sure that he'd be one of those people. But we did have some part in it. He's got your face and my ... I don't know what he's got from me. No man can look into his own soul, or some metaphysical stuff like", "num_tokens": 2048} {"category": "common_crawl-software", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-software/part-00-00000.npy", "text": "001.\n\nMicrosoft developers managed to get the three selected departments online in just under four months.\n\nThe company also developed an XML-based architecture that would allow 800 separate departments running \"virtually every operating system in existence and their 13,000 different pieces of software,\" to communicate with each other and with U.K. citizens and businesses, a feat that Goffe said required \"many all-nighters.\"\n\nGoffe also noted that XML's ability to integrate all of these various applications proves that \"XML and .NET is not a closed standard, despite Scott McNealy's ravings.\"\n\nSun did not reply to requests for comment.\n\nRelated Topics:\n\nTech Biz , Media<|endoftext|>DDoS Attacks Taking Aim at Linux – But is it a Linux Problem, or a Human One?\n\nThere’s a certain amount of cackling that happens when one operating system has a vulnerability exposed, is hit with a major security breach or is targeted by attackers while other operating systems go untouched. It isn’t malicious, it’s more a matter of rivalry. Windows vs. Mac OS X vs. Linux is a tale as old as the digital age.\n\nDDoS attack in progress\n\nHowever, when it comes to the XOR botnet which is composed of infected Linux computers that’s taking aim at up to 20 targets a day with potent DDoS attacks, non-Linux users may need to hit pause on any feelings of superiority. Here’s what you need to know about the XOR botnet, the human error element, and how to keep from contributing to or getting hit with a DDoS attack.…\n\nContinue reading<|endoftext|>Modal Title\nSoftware Development\n\nAutomation Is No Silver Bullet: 3 Keys for Scaling Success\n\nCommit to Delivering High-Quality Software — Painlessly\nMar 24th, 2022 10:00am by\nFeatued image for: Automation Is No Silver Bullet: 3 Keys for Scaling Success\nFeature image via Pixabay.\n\nThoroughly testing a software product as it evolves is as dire as it is daunting. Tech giants like Amazon Web Services, where a release takes place every 11.6 seconds, are heavily focused on deployment with testing seamlessly integrated in the delivery pipeline.\n\nSuch excellence can only be observed at the most mature technology companies though, while smaller startups struggle with testing delays to a certain extent. For many of them, introducing automation seems like the obvious answer, but there is an operational cost. Test automation is no silver bullet. Below are the three main drivers when transitioning to test automation that will help test engineers and software delivery teams.\n\nRamiro Millan\nRamiro is an automation testing strategist and has over 20 years of experience in software development, QA and management. He has worked with small startups and large multinational enterprises. Ramiro has spent over a decade at Telerik and Progress in roles including product management, sales engineering, testing product leadership, and as recently as 2017, leading professional services for DevTools and for Sitefinity. Ramiro currently leads Progress’ automated testing solutions division.\n\nReleases are stressful when the market demands continuous delivery of stable software. Any product flaws can ruin a team’s hard work, which is why automation should play a key role. Managers, developers and QAs get quick feedback on every code change, minimizing the risk of introducing bugs and regressions into new software releases.\n\nFor most organizations, moving fast and breaking things is not an option in the development pipeline. They have not achieved a mature software delivery process that tolerates glitches, allows for easy roll backs or enables incremental releases for a small group of users to test on production, then fix and update. By committing to test coverage from the unit tests to the APIs, UI, and even load/performance scenarios, the entire team is kept in the loop, even if there are silos.\n\nError-prone, repetitive and tedious manual testing tasks can be eliminated with minimal efforts thanks to automated testing. Automated test environments ensure the top quality, regardless of the number of software versions. This is why test automation is often referred to as the solution to inefficient low-quality manual testing. The way to harness its real potential is commitment.\n\nThink Long-Term Speed\n\nCommitting to great quality software throughout development is the starting point for pivoting towards automated testing. Testers should be aware that transitioning from manual to automated will take time. There is no hack that can be done well in five or 10 days. QA takes time to build a very robust and rigid test case program.\n\nTo combat the slow start, take this advice: Start with actionable steps. A vital part of the QA engineering responsibilities is understanding the business layer and making sure that all testing efforts verify certain functionality against a set of business requirements the software product needs to fulfil from a user’s perspective.\n\nThat is also known as end-to-end testing or testing through the user’s eyes. The way this can be achieved is by applying the Act-Verify pattern, known from unit testing. Start by recording action steps. Follow these actionable steps with verification steps. This will help ensure the test is rigid and can be robust. It will also increase success with the end-product.\n\nThe long-term results of this commitment to automated testing results in getting to market faster than competitors. As long as teams are willing to make the commitment and build stable, future-proof test infrastructures, they will succeed with automated testing long term.\n\nDon’t Procrastinate, Automate\n\nMany organizations think automation is an easy way to enter the market. Although it’s a starting point, automated testing warrants prioritization. Automated testing doesn’t just speed up QA processes, but also speeds up internal processes.\n\nMaintenance is also an area that benefits from automation with intelligent suggestions and searches. Ongoing feedback needs to improve user expectations. It’s a must-have for agile continuous integration and continuous delivery cycles.\n\nPlus, adopting automated testing ensures more confidence in releases and lower risks of failures. That means less stress and happier times for developers. That is increasingly important given the current shortage of developers amid the great reshuffle. Automated testing can help fight burnout and sustain a team of developers who make beautiful and high-quality applications.\n\nSome of the benefits of test automation include the reduction of bugs and security in final products, which increases the value of software delivered. Automated testing makes for better products in smaller batches, which is why it should be the priority throughout the continuous delivery cycle.\n\nThe Success of Test Automation Explained\n\nThere is value in automation if organizations make the commitment. For example, at Progress, users trust Telerik Test Studio for basic automation needs all the way to complex problems. We can take a simple test case and convert it to an automated test case, or a series of test cases, and turn it into a full regression suite.\n\nWith or without code, Test Studio enables automated testing for everyone. The blend of codeless and code-based automation with an intuitive UI enables testing that delivers outstanding results for QAs, developers and managers.\n\nFor example:\n\n • EBSCO Industries increased their automated testing from 5% to 30%. Test Studio was so easy and stable to run in their existing testing environment.\n • RevSpring was able to take a regression test cycle from an entire week to a single day. That’s an 80% increase in time. They were able to get 100% coverage of all payment methods their platform supports.\n\nOrganizations need to understand it requires a lot of effort to successfully implement automated testing, but it also requires the right tools and skillset. Build very stable, very robust test case programs to ensure automated testing success. With these three key factors in mind, software delivery teams can reap all the benefits of test automation.\n\nGroup Created with Sketch.\nTHE NEW STACK UPDATE A newsletter digest of the week’s most important stories & analyses.<|endoftext|>How To Sync Iphone With Icloud\n\nAccording to polls, more than 60% of users of Apple iPhone smartphones store phone book data only on the device. Perhaps this is a banal carelessness, the awareness of which often comes after the destruction of the list of numbers. This happens due to a software error on the device or, for example, the loss of the phone.\n\nFortunately, Apple’s services provide an opportunity to avoid the sad consequences. For each user, free disk space is allocated. a “cloud” data storage. Syncing iPhone contacts with iCloud is an easy way to avoid losing your phone book.\n\nConfigure Contact Sync\n\nIf the smartphone has been used for a long time, and the question “How to synchronize iPhone with icloud?” nobody asked before, you must first prepare the contacts for synchronization. To do this, at the first stage, you need to make sure that the phone book is stored on the device, there are no entries on the SIM card. For this:\n\n 1. Find and click the settings icon on one of the screens, select the “Contacts” menu item.\n 2. Inside this setting there is an option to import contacts from a SIM card. Click on the corresponding inscription.\nRead more:  Transfer Data From iPhone To Samsung\n\nNow there is confidence that the phone book data is stored in the internal memory of the device, and synchronization with iCloud will be complete.\n\nAt the second stage, synchronization with your own Apple account is activated. To do this, go back to the settings. the gear icon. to the iCloud item.\n\nIndicate the details of the account with which you are logging into the App Store, email and password, click the “Login” button. If for some reason there is no account, select the Create Apple ID menu item. If the device is successfully connected to the cloud service, the email address will glow near the iCloud menu item.\n\nNext, proceed to synchronization. First, check if the iPhone is connected to the Internet. Open “Settings”. iCloud, opposite the “Contacts” item, activate the green switch.\n\nSynchronization occurs in the background. It usually takes from 10 to 30 minutes, it all depends on the size of the address book.\n\nRead more", "num_tokens": 2048} {"category": "common_crawl-software", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-software/part-00-00000.npy", "text": " builder<|endoftext|>Fiverr Community Forum\n\nRevisions disclaimer & Dynamic queue\n\nOk guys,\nIf you ask me what I’d quote as a feature (maybe with some balance first)\nI can think of:\n\n 1. Stop with the “unlimited revisions”.\n I think when a seller set NO revisions or just, when the buyer ends with the revisions included on the order and s/he request for a new revisions, instead leaving all to the seller, the site itself should pop up a window or a desclaimer warning the buyer s/he run out of revisions requests, inviting her/him to add more to the cart if any further change is required.\n\n Who had the problem to switch from a regular week, to a super rushy one with several extra fast?\n Don’t tell me to manage to disable-enable them every time. it is long, sometimes updating the gig is also glitchy.\n\nIt would be amazing (In my opinion) to have a DAILY limit of orders in queue, instead of a general limit.\nMaybe warning the customer that if s/he orders in that busy schedule, the delivery might have a delay of 1 or 2 days .\nThis should be something automatic, generated from a daily limit we can set, to avoid to receive maybe an insane amount of orders all in the same night maybe, when we sleep maybe, and find ourself late with all the consequences.\n\nWhat you think?\n\n*** With a dynamic queue, I mean we might set a daily limit for some gigs, and the system should maybe show a sort of calendar which shows the availability for the seller. idk if it makes sense!\n\n1 Like<|endoftext|>Design: 7 Elements of Our Creative Process\n\n1. Clarify goals, personas, and target demographic.\n\nThrough a creative brief, we identify the goal of the project. By getting as much insight as we can beforehand and understanding what the problem is that we are solving, we can brainstorm solutions to the problem. We have a kickoff meeting with team members and help identify the message or goal of the project, discuss what success will look like for the project, and begin to establish creative direction and art direction.\n\n2. Define project scope.\n\nScope can vary greatly depending on a project’s complexity or goals. We are fairly dialed in on estimating projects we’ve done before. New projects or content types are often more unpredictable and have larger scopes, as we develop a process or new tech to support our designs. We use the Agile process, which helps the whole team organize accordingly and stay true to the project’s defined scope.\n\n3. Research designs, styles, code, etc.\n\nSpend some time researching possible solutions that already exist, design styles, code framework, etc. This is especially useful for things like interactives, where researching what technologies and code libraries are available can help make time more efficient and gives us a better understanding of what will be feasible for the project in our time frame. By researching the designs that are out there, it helps us get a better idea of what is possible, helps us communicate what ideas we have in mind through a mood board of examples, and allows us to see what is out there so we can stand out.\n\nClick the images below to view the corresponding story in Jira.\nNote the subtasks, communication, and time required to take each project from concept to finished product.\n\n4. Use a grid to establish a visual rhythm, make sketches, wireframes, blockframes, and sitemaps.\n\nAfter identifying goals, researching possible solutions, and deciding on the best direction for a piece, we then jump to pen and paper (or mouse and screen). One of the first steps is Art Direction, which involves design inspiration and design research. The art direction is discussed with designers and writers to, as a group, define the final design of the project.\n\n5. Create one or more visual designs.\n\nNext comes the hands-on process. Content we make can be in the form of a landing page, a flyer, a highly-designed infographic, or even a motion graphics video. This usually is a collaboration between designers, copywriters, content strategists, and other stakeholders.\n\nWhen a project involves coding, we code in an MVP process (Minimum Viable Product). With that method, we start coding the general skeleton of the project and slowly build on details, assets, and animations. In this way, we can start getting a feel for the copy and design while minimizing the risk of an unwanted increase in scope (scope creep).\n\nFor projects that require coding, an extra design pass will be done to ensure that the coded version still has the intended effect, and to ensure that it is user-interaction friendly.\n\n6. Test thoroughly, and iterate to improve.\n\nOnce the piece is ready to go, we always check it for quality. The piece is combed through by one or more people outside the process to ensure fresh eyes can catch typos, bugs, and ways the piece can be improved from the user’s point of view. Improvements are implemented before the project wraps up.\n\nFor testing feedback, we tend to use InVision for design/copy changes, and Google Docs for coding QA/Browser testing changes.\n\nIdeally, we strive always to have a bit of outside testing go through our projects as well. To get started, we had to make assumptions about what the best solution to a problem would be. This is the step where we test that assumption. This can be user-testing a landing page, looking for page scrolls or clicks, sending out surveys, or getting feedback via internal interviews. Once the results are in, we review the feedback for trends that we can implement.\n\n7. Deployment time: ship, share, and celebrate.\n\nAll done? Proofed, packaged, and ready to go? Let’s rock n’ roll! Deploying a piece of content can involve delivering a project to a department like the dev team, the marketing team, or the content team, pushing a webpage or website live, or ordering a print job.<|endoftext|>Beefy Boxes and Bandwidth Generously Provided by pair Networks\nDo you know where your variables are?\n\nRe^4: Code tags warning\n\nby Tanktalus (Canon)\non Mar 15, 2005 at 15:31 UTC ( #439655=note: print w/ replies, xml ) Need Help??\n\nin reply to Re^3: Code tags warning\nin thread Code tags warning\n\nFiguring out that there are missing code tags is much easier than figuring out where they should go. For example, if I have: $blah[0] = $blah[1], is that: $blah[0] = $blah[1], or is it $blah[0] = $blah[1], or is it $blah[0] = $blah[1], or is it $blah[0] = $blah[1], or is it ... you get the idea. Figuring out that the ['s and ]'s are supposed to be in code tags is solvable. Figuring out where those codes should have been ... probably is not solvable.\n\nGiven the ++/-- score of my post and ambrus' post, it seems that there is no clear majority on this, which, IMO, means the status quo wins. (Without a clear majority, the gods would be ill-advised to spend time on a feature that would likely take much effort for little return.) That's fine by me - I was just expanding on the OP, in the way I understood it anyway.\n\nComment on Re^4: Code tags warning\nSelect or Download Code\n\nLog In?\n\nWhat's my password?\nCreate A New User\nNode Status?\nnode history\nNode Type: note [id://439655]\nand the web crawler heard nothing...\n\nHow do I use this? | Other CB clients\nOther Users?\nOthers studying the Monastery: (5)\nAs of 2014-12-28 14:29 GMT\nFind Nodes?\n Voting Booth?\n\n Is guessing a good strategy for surviving in the IT business?\n\n Results (181 votes), past polls<|endoftext|>NOW:53122:USA01012\nhttp://widgets.journalinteractive.com/cache/JIResponseCacher.ashx?duration=5&url=http%3A%2F%2Fdata.wp.myweather.net%2FeWxII%2F%3Fdata%3D*USA01012\nH 64° L 50°\nRain<|endoftext|> Citrix Breaks Away From OpenStack | ZDNet\n\nCitrix Breaks Away From OpenStack\n\nCitrix Breaks Away From OpenStack\n\nSummary: Today's move by Citrix to put its CloudStack IaaS solution into the Apache Foundation says more about the state of the cloud market than it does about OpenStack.\n\nTOPICS: Open Source\n\nToday's move by Citrix to put its CloudStack IaaS solution into the Apache Foundation says more about the state of the cloud market than it does about OpenStack. As our Fall 2011 Forrsights Hardware Survey shows, about 36% of enterprise IT leaders are prioritizing and planning to invest in IaaS this year. That means they need solutions today and thus service providers and cloud software vendors need answers they can take to market now. OpenStack, while progressing well, simply isn't at this point yet.\n\nSecond, Citrix needed to clarify the position of its current open source-based solution. Ever since Citrix joined OpenStack its core technology has been in somewhat of a limbo state. The code in cloudstack.org overlaps with a lot of the OpenStack code base and Citrix' official stance had been that when OpenStack was ready, it would incorporate it. This made it hard for a service provider or enterprise to bet on CloudStack today, under fear that they would have to migrate to OpenStack", "num_tokens": 2048} {"category": "common_crawl-software", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-software/part-00-00000.npy", "text": " we connect our learners. Each JavaScript training ends with career consulting\n\nMinimum 2-3 projects of industry standards on JavaScript will be provided\n\nYes, we provide our own course completion certificate to all students. Each JavaScript training in bangalore ends with training and project completion certificate\n\nYou can pay by card (debit/credit), cash, cheque and net-banking. You can pay in two installments\n\nWe take immense pride to provide post training career consulting for JavaScript training\n\nRecommended Courses\n\nRecommended Courses\n\nJavaScript-training-in-bangalore-by-zekelabs\n  More Info  \nJavaScript-training-in-bangalore-by-zekelabs\n  More Info  \nJavaScript-training-in-bangalore-by-zekelabs\n  More Info<|endoftext|>What Is The Importance Of Automation Testing\n\nSoftware are not entirely deployed right after the programs are done. There still are few tests and integrations being done before this is implemented and accessed by users. Well, everyone in the development team knows how important this stage is to ensure that everything is ready and there are no more bugs to ruin the program anymore. Atlanta GA automation testing could pretty much help in this particular stage to better check the effectiveness of any program.\n\nNow, there are specific professionals who would try and narrow everything down before the release of specific programs. They are the test engineers. Several testing are being manipulated, striving quite hard to somehow catch those bugs before the users of the interface does.\n\nThey do know how such problems can affect the integrity and reputation of the program or software if they will not do anything about. Users are often in need of tools which they could use to perfection. No one would like to make do of buggy ones, if anything it makes these users annoyed about the service.\n\nTendency is that, they either find another software that could provide them better service or for clients, they try and look for other developers and programmers who is capable of providing them a better finished product. It is important to understand that everything nowadays are revolving inside the technology which is pretty much digital.\n\nBeing unable to provide a better program could mean everything including business failure and so on. That basically is what every test engineers are trying to avoid which is why all forms of testing is done. Initially a manual testing would be somehow needed as well to assess an application.\n\nSo, for manual testing, it is normally through having a person use the computer and test application over and over again with different syntax, combinations then taking note of results. By the end of tests, the results are compared and from there it is determined whether the responses are of the expected syntax or not.\n\nThen there is automated testing which from the name itself is done through testing tools to automate the process. This tool is capable of making playback pre recorded as well as predefined actions. Then it will automatically have the results compared to the expected responses and provide feedback.\n\nFeedback are always either of success or a massive failure. Though, if it fails, the good thing is that it can still be edited. Few changes on the source code may still be applied and possibly fix the syntax that went wrong so that all the expected results will be possible on the next tests done. With that, it certainly is agreeable that making the tests automated is a huge help.\n\nThis method of testing does go beyond those areas which manual test is not capable of harnessing. This is even way more savvy and efficient. Although, you cannot take out the rule of manual means because it usually has something to do with interface testing. There still is a huge role on the interface especially in the friendliness of the application towards the users it is meant for.<|endoftext|>Group misbehavior in 9.5\n\ndoc hawk dochawk at gmail.com\nFri Jun 28 20:19:16 EDT 2019\n\nI can’t come up with a recipe for this one, either . . .\n\nWhen using the group editor and cutting a subgroup, it seems not to lose all of its information. I then paste back in, and it frequently becomes part of its prior owner, and sometimes part of another group.\n\nSo if I edit group A, and from group B of A I cut group C, the expected behavior on paste is to become part of group A, but it seems to have an affinity for B.\n\nOther times, it may become part of D of A. \n\nI’ve even seen it become part of another subgroup that itself incorrectly attached.\n\nAdditionally, fresh pasting from elsewhere can attache to a subgroup of the group being edited.\n\nThere are also inconsistencies at times between what the message box thinks, and what the application browser and engine things (the latter two seem to agree).\n\nSo fir I cut C of B of A, and then paste, the message box may report that it is indeed C of A, while the application browser and other things done by the engine (e.g., moving) show that it is C of B of A again.\n\nI managed to come up with a workaround of creating a new stack, and pasting there to form my new top level group, and then pasting that back to the original card (outside of the group editor).\n\nMore information about the Use-livecode mailing list<|endoftext|>=head1 NAME dgit-user - making and sharing changes to Debian packages, with git =head1 INTRODUCTION dgit lets you fetch the source code to every package on your system as if your distro used git to maintain all of it. You can then edit it, build updated binary packages (.debs) and install and run them. You can also share your work with others. This tutorial gives some recipes and hints for this. It assumes you have basic familiarity with git. It does not assume any initial familiarity with Debian's packaging processes. If you are a package maintainer within Debian; a DM or DD; and/or a sponsee: this tutorial is not for you. Try L, L, or L and L. =head1 SUMMARY (These runes will be discussed later.) =over 4 % dgit clone glibc jessie,-security % cd glibc % wget 'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=28250;mbox=yes;msg=89' | patch -p1 -u % git commit -a -m 'Fix libc lost output bug' % gbp dch -S --since=dgit/dgit/sid --ignore-branch --commit % sudo apt-get build-dep glibc % dpkg-buildpackage -uc -b % sudo dpkg -i ../libc6_*.deb =back Occasionally: =over 4 % git clean -xdf % git reset --hard =back Later: =over 4 % cd glibc % dgit pull jessie,-security % gbp dch -S --since=dgit/dgit/sid --ignore-branch --commit % dpkg-buildpackage -uc -b % sudo dpkg -i ../libc6_*.deb =back =head1 FINDING THE RIGHT SOURCE CODE - DGIT CLONE =over 4 % dgit clone glibc jessie,-security % cd glibc =back dgit clone needs to be told the source package name (which might be different to the binary package name, which was the name you passed to \"apt-get install\") and the codename or alias of the Debian release (this is called the \"suite\"). =head2 Finding the source package name For many packages, the source package name is obvious. Otherwise, if you know a file that's in the package, you can look it up with dpkg: =over 4 % dpkg -S /lib/i386-linux-gnu/libc.so.6 libc6:i386: /lib/i386-linux-gnu/libc.so.6 % dpkg -s libc6:i386 Package: libc6 Status: install ok installed ... Source: glibc =back (In this example, libc6 is a \"multi-arch: allowed\" package, which means that it exists in several different builds for different architectures. That's where C<:i386> comes from.) =head2 Finding the Debian release (the \"suite\") Internally, Debian (and derived) distros normally refer to their releases by codenames. Debian also has aliases which refer to the current stable release etc. So for example, at the time of writing Debian C (Debian 8) is Debian C; and the current version of Ubuntu is C (Yakkety Yak, 16.10). You can specify either the codename C or the alias C. If you don't say, you get C, which is Debian C - the main work-in progress branch. If you don't know what you're running, try this: =over 4 % grep '^deb' /etc/apt/sources.list deb http://the.earth.li/debian/ jessie main non-free contrib ... % =back For Debian, you should add C<,-security> to the end of the suite name. Hence, in our example C becomes C. (Yes, with a comma.) =head1 WHAT DGIT CLONE PRODUCES =head2 What branches are there dgit clone will give you a new working tree, and arrange for you to be on a branch named like C (yes, with a comma in the branch name). For each release (like C) there is a tracking branch for the contents of the archive, called C (and similarly for other suites). This can be updated with C. This, the I, is synthesized by your local copy of dgit. It is fast forwarding. Debian separates out the security updates, into C. Telling dgit C means that it should include any updates available in C. (You can also dgit fetch in a tree that wasn't made by dgit clone. If there's no C you'll have to supply a C<-p>I option to dgit fetch.) =head2 What kind", "num_tokens": 2048} {"category": "common_crawl-software", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-software/part-00-00000.npy", "text": "\n\nSchrijf de eerste review over dit product<|endoftext|>How to Migrate a WordPress Site to a New Host or Domain\n\nHow to move WordPress to a new Host\n\nThis could be considered to be shooting one’s self in the foot, as we’ve gained hundreds of clients over the years because there wasn’t clear instructions in a step by step format to move WordPress from one server,  to another properly without the usage of backup plugins.    Although backup plugins may suit some people to me they are a complete nightmare,  businesses rely on these plugins without checking the backups on a regular basis, only to find out that the backups are corrupt or never actually worked in the first place.   Following the instructions in this “how to” will teach you how to save your site and database to your computer ( for safe keeping  ) and reupload the files and database to your new host.\n\nPre-Migration Checklist\n\nBefore initiating the migration process, it is crucial to prepare adequately. The following checklist serves as a preparatory guide:\n\n • Backup Current Website: Ensure you have a complete backup of your website, including all files and databases.\n • Check Compatibility: Verify that the new hosting environment meets your website’s technical requirements.\n • Inventory of Assets: Enumerate all plugins, themes, and custom code changes.\n • Downtime Planning: Plan the migration during hours that will have the least impact on your audience.\n\nCommon Pitfalls and How to Avoid Them\n\nEven with meticulous planning, certain issues can arise during the migration process. Awareness of these pitfalls can facilitate a more seamless transition.\n\n • Database Import Errors: Should the database fail to import correctly, consult your hosting provider for assistance.\n • File Permission Issues: Incorrect file permissions can lead to various issues. Consult the WordPress file permissions guidelines for proper settings.\n • Broken Links: Utilise tools like Broken Link Checker to identify and fix any broken links.\n • SEO Concerns: Use SEO tools like Ahrefs to monitor your website’s performance and make any necessary adjustments.\n\nPost-Migration Steps\n\nAfter successfully migrating your website, several steps should be taken to ensure optimal functionality.\n\n • Check Website Functionality: Navigate through your website to confirm that all features are operational.\n • Update DNS Settings: Update your Domain Name System (DNS) settings to point to the new server. Consult your hosting provider for specific instructions.\n • Monitor Website Performance: Employ monitoring tools such as Pingdom to keep track of website speed and uptime.\n • Test Interactive Elements: Verify that all forms, buttons, and e-commerce functionalities are in working order.\n\n1. Backup and Download your site files.\n\nI always recommend using an FTP client over a host provided web based file editor.  There are some great FTP programs out there that allow you to upload and download files to your server/host.  One of my favourites is Filezilla which can be downloaded here : https://filezilla-project.org/download.php\n\nOnce you have opened your FTP client,  entered your server/host details and have found your WordPress install, it should look similar to this :\n\nEverything in the above folder ( the main WordPress root folder that contains folders such as wp-admin, wp-content ) you need to download to your computer,  often easy to create an empty folder on your computer and put all the files into that folder,    you should also have your new server/host setup and the new FTP open ready to use.   You may now upload all of the files you just downloaded to your new host.\n\nNow all the files are download and uploaded,  its time to get your database from the old host/server. We like to do this manually again rather than using any plugin.\n\n2. Export your database from phpmyadmin\n\n(We use cpanel with the images captured below,  but if your host uses something different you may need to locate things slightly differently to the images outlined )\n\nLogin to your hosts cpanel account,  normally accessed via browsing to your domain such as ( yourdomain.com/cpanel )\n\nYou next click phpMyAdmin, you will then be presented with a column on the much like below,  you need to click on the database which your wordpress install is using,  for us this is rivmedia_2017.\n\nOnce clicked you should see the expanded database tables,  this contains all of your wordpress data,  from core to plugins.\n\nNow in the right hand window you will see some navigational items,  one of those is “export”\n\nOnce one the export page,  press “Custom – display all possible options”\n\nThen make sure all tables are ticked for export :\n\nNow scroll down the page slightly and find the “compression” tab,  if you have a large database its a good idea to use the compression because your new host may have a limit on SQL uploading.\n\nNow your ready to export your database,  press the “go” button at the bottom,  depending on your server / host it may take a moment to process,  you will then be prompted to “save” the file to your computer.\n\n3. Create new database on your new server.\n\nYou now have all the data you need from your old host/server.   You can save all the files you downloaded from FTP and the database you just downloaded for long term storage as a backup if you need to ( its always good to keep historical backups ).   Now lets move on to uploading to your new server.\n\nLogin to your new server/host’s control panel. The first step is to create a new database that will be used for your new WordPress Blog.\n\nClick on “MySQL Databases”.\n\nUnder “Create New Database”, enter a name for your new WordPress database, then click the “Create Database” button.\n\nOnce the database has been created ( should take seconds ),  we need to add a user to that database with the correct permissions.  This is normally on the same screen, but further down.\n\nEnter a name and password for the WordPress database user and click the “Create User” button.\n\nNow you have to give the user you have just created permission to use your WordPress database. So on the same screen again, you will have the options given in the screenshot below. Select your user that you’ve just created,  and the database and click add.  Take a note of the database name,  user ( including the prefix ) and password as you will need these later.\n\nOn the next screen, you have the option to grant which permissions this user has to your blog’s database. Be sure to grant this user total access to the WordPress database by checking “All Privileges”, then click the “Make Changes” button.\n\n4. Import your previously saved database\n\nNow its time to go and locate the compressed database you downloaded from the old server,  because we are going to import it to the new database and user that we’ve just created.\n\nSo back to the main cPanel screen click on “phpMyAdmin”.\n\nIn the drop-down box in the left column, select your new WordPress database that you’ve just created. It should say that there are no tables in the database yet, since it’s a blank database that you’ve just created.\n\nClick the “Import” tab in the navigation. Below you will see a  “Browse” button and select the .sql or .sql.gz file that you downloaded from your old WordPress database, then click the “Go” button.\n\nThis part can take some time depending on the size of your database, after waiting for the WordPress database to import, you should get a green notice saying that your database import has competed.\n\nUsing a different domain than the original ?\n\nIf you have moved domains as well as hosts,  then there are some additional changes you need to make otherwise you will continuously get redirect loops when trying to access the site. We need to modify a couple of values. Still in phpmyadmin,  and still looking at your database tables.  You now need to find the “options table” ( wp_options )\n\nAfter you click the wp_options table you will find yourself landed on the “browse” tab,  scrolling down you will see an option for “siteurl” under the “options_name” column.  You will see your old WordPress URL in that field. If your new WordPress blog is on a new domain name, you need to edit that value to your new domain name,  If the domain name is the same then you can skip these sections until the final point.\n\nYou can do so by clicking the “Edit” button, which looks like a pencil.\n\nOnce you click the “Edit” button, just enter your new WordPress domain and then click the “Go” button to save the changes.\n\nYou now need to repeat that same process for a different field,  so head back to the “browse” tab,   now look for the field “home” instead of “siteurl”,  this is sometimes located on page two of the options,  You can change the page numbers at the bottom of the options table list.  Repeat the same process above,  changing your URL to the new domain. Click Go.\n\n5. Database work complete – Final Point\n\nNow the last thing todo is to edit your wp-config.php file which you previously uploaded to the new host. This is in the root folder of your WordPress blog (usually /home/ or /public_html/). You can do this with your FTP client you’ve used previously.\n\nFind the file “wp-config.php” , open the file in a plain text editor or something like Dreamweaver,  notepad++ or similar.\n\nOnce the the wp-config.php is open you will see something a little like the image below.  Half way through I asked you to take a note of the database credentials that you created for the new database/user,  you now need to use those details to make the connection from the files, to the database.\n\nMake sure you keep your details inbetween the ‘ ‘  brackets.\n\nThis IS NOT your WordPress admin username and password! This is your database’s name and password which you just created for your new host/server.\n\nSave your changes,", "num_tokens": 2048} {"category": "common_crawl-software", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-software/part-00-00000.npy", "text": " Pd externals with it, so I put together a \"hello world\" external, which showcases things like printing to console, working with symbols, and sending floats through an outlet.\n\n Getting it to work required using a local copy of m_pd.h and making a small change to the t_text struct, since Zig's C-translator apparently doesn't like bit fields.:\n\n - unsigned int te_type:2; /* from defs below */\n+ unsigned char te_type; /* from defs below */\n\n Currently, the build file is catered to a Linux installation, but probably all that would need to be changed for a different platform is the system include path and the library extension.\n\n To do a build, just run:\n\n zig build -Doptimize=ReleaseFast\n\n EDIT: Changed the struct to an extern struct to guarantee the ordering of its fields.\n\n EDIT2: Functions are now inside the struct. This seems to be more idiomatic to Zig, plus it looks nicer.\n\n EDIT3: Link with libc during the build process.\n This keeps the external's size small, even when adding math functions like log or exp to it. Otherwise, there's an increase of about 115KB because those functions get baked right into the external.\n\n EDIT4: Replace m_pd.h with custom definitions that allow many functions to be called as methods. Some examples:\n\n adding a method to a class:\n\n pd.class_addbang(myclass, @ptrCast(&bang)); // old way\nmyclass.addBang(@ptrCast(&bang)); // new way\n\n creating a new instance of an object\n\n // old way\nconst self: *Self = @ptrCast(pd.pd_new(myclass));\n_ = pd.outlet_new(&self.obj, &pd.s_float);\nself.sym = pd.gensym(\"world\");\n\n// new way\nconst self: *Self = @ptrCast(myclass.new());\n_ = self.obj.outlet(pd.s.float);\nself.sym = pd.symbol(\"world\");\n\n sending a float through the main outlet:\n\n pd.outlet_float(self.obj.te_outlet, f * 2); // old way\nself.obj.out.float(f * 2); // new way\n\n hello-zig.zip\n\n repo: https://github.com/myQwil/pd-zig-external\n\n More examples can be found on my library's Zig rewrite branch:\n https://github.com/myQwil/pd-quilt/tree/zig-rewrite\n\n posted in extra~ read more\n\n @pajzd said:\n\n so, what does this mean for os X\n\n Same thing. It should work for both OS X and macOS.\n\n If gme(s) are not working as expected, let me know. There's a gme post where we can continue that discussion: https://forum.pdpatchrepo.info/topic/11828/gme-gmes-game-music-emu\n\n Also, bear in mind that the latest version of the quilt library switched from using ffmpeg@4 to just ffmpeg. That's if you download the library through deken, which I would recommend from now on.\n\n posted in extra~ read more\n\n @tatsuya_yamada That would probably prove to be quite difficult. The packets would have to be retrieved in reverse order, but FFmpeg doesn't index the packets. So for the time being, reverse playback is not a feature.\n\n posted in extra~ read more\n\n @whale-av You should be able to find those missing objects in the original zip of the first post\n\n posted in extra~ read more\n\n Performing a static build is also an option. That would make it so that the libraries are built into the external. I've always been on the fence about distributing a static build though because I've read that some of the decoders used in the ffmpeg library are proprietary. Their site talks about that near the bottom of this page: https://www.ffmpeg.org/legal.html\n\n It sounds like it's only a problem if someone, as they put it, \"starts trying to make money from patented technologies\" but since this is being distributed freely, it's probably not an issue.\n\n posted in extra~ read more\n\n Okay, I think I've found out the problem. Here's the list of dependencies of ffplay~.m_amd64:\n avcodec-58.dll\n avformat-58.dll\n avutil-56.dll\n swresample-3.dll\n\n But all the libraries have been updated since I built it, so the version numbers in their names have been incremented to 59, 57, and 4.\n\n So, you could probably just rename the dll's and my guess is it'll still work.\n\n posted in extra~ read more\n\n My guess is it either needs a fresh build or it's missing some other dependency from MSYS2/MinGW.\n I recommend trying Dependency Walker. It might be able to shed some light on which dependencies aren't being met. Their site: https://www.dependencywalker.com/\n\n If that doesn't work, I'll see about doing a fresh build tomorrow\n\n posted in extra~ read more\n\n ffplay~.m_amd64 can be found inside of ffplay.zip\n It's basically a dll with a special naming convention so that 64 and 32-bit builds of the same external can reside in the same folder\n\n posted in extra~ read more\n\n Also, thank you for sharing your OSX build\n\n posted in extra~ read more\n\n This should be what you need for the Windows version: https://www.gyan.dev/ffmpeg/builds/ffmpeg-release-full-shared.7z\n\n Inside the zip, there's a 'bin' folder and you just need to extract the .dll files and place them in the same folder as ffplay~.m_amd64. I'm assuming it'll still work. Even though the ffmpeg libraries are newer than when I built it, no big changes have been made to how any of the functions are called.\n\n posted in extra~ read more\n\nInternal error.\n\nOops! Looks like something went wrong!<|endoftext|>Skip to main contentSkip to navigationSkip to search\n\nIdentity Security  \n\nZero Trust Methodology\n\nWhat is Zero Trust? Zero trust is a mindset and long-term approach to security and governance that addresses the vulnerabilities in today’s work environment.\n\nThis highly complex strategy is being adopted by government agencies and businesses worldwide. But for many starting the journey, it's difficult to wrap your head around. For the next step on your journey, we're here to get you there.\n\nGet Started\n\nZero trust starts with identity.\n\nOur increasingly interconnected world of remote work, multiple devices and cloud-based applications and resources has rendered traditional perimeter-based network defenses unfit for attacks. This means that the foundation for your zero trust methodology must start with identity.\n\nHere at MajorKey, our goal is to help you identify where you are on the zero trust security journey... while sharing the good news, you may be further along than you think!\n\nIs a Zero Trust Methodology Right for Your Business?\n\nThe uniqueness of a businesses culture, policies, and customers means there's no one size fits all solution.\n\n • The solutions that align with a zero trust methodology can be incredibly complex.\n • Initiatives must support the formation of your zero trust strategy over several years.  \n • There's no one size fits all solution for zero trust and integrations are needed across adopted technologies.\n • Many businesses are new to the cloud journey. And on-premise and cloud environments work very differently – making a robust game plan that caters to both very difficult.\n • Securing and governing your business is an ongoing initiative. You must have a long-term roadmap and sophisticated planning to properly support your security posture.\n • Businesses aren’t leveraging automation to manage identities with more scrutiny.\n\nThis means that the foundation for your zero trust methodology must start with identity.\n\nBut how do you trust people, systems, software, and cloud apps?\n\nZero Trust Methodology\n\nSingle Sign-on Implemented with a Zero Trust Mindset \n\nOur client, a world leader in dental instrument manufacturing, created an online community for their customers. MajorKey was able to assist them in implementing a scalable SSO solution that would support future needs as well as their current ones\n\nRead more\n\nDental Instrument Manufacturer - World Leader\n\nOur client created an online community for their customers to connect with peers, share information and gain education credit, but required assistance with their SSO solution.\n\nImplementing Zero Trust for Your Business\n\nSuccessfully implementing a zero trust methodology means going beyond rolling out a series of integrated tools and technologies, which are supported by a set of operational policies and authentication requirements.\n\nZero trust should be looked at much more strategically.\n\nComplexities arise when outlining authorization to specific resources both on-premises and in the cloud, as well as how technologies will interact with data, threat intelligence, public key infrastructure, identity management, and vulnerability management systems.\n\nOnce this foundation has been established, companies can determine more sophisticated automation parameters like software-defined perimeters, micro-segmentation, by identity, or a combination therein.\n\nMajorKey delivers successful technology solutions that align with zero trust, including:\n\n • Single-Sign On\n • Multifactor Authentication\n • Cloud Governance\n • CI/CD Management\n • Privileged Access Management\n • Zero Trust Strategy and Roadmap\n • Identity Access Management\n\nZero Trust Article Contributions \n\nFrom MajorKey Experts\n\n\"Why Identity is the Foundation\"\n\nFeatured in:  Security Magazine\n\nWith zero trust methodology that starts with identity in mind, users get the minimal access they need and no more. Read more..\n\n\"Mission Zero Trust is Not Impossible\" \n\nFeatured in:  Enterprise Security Tech \n\nIt’s an iconic movie scene: Tom Cruise dangles on a rope lowered from a", "num_tokens": 2048} {"category": "common_crawl-software", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-software/part-00-00000.npy", "text": "0004132: [Server] Server crash after someone quits. (Arc)\n0004284: [Client] Login Request window doesnt work (Arc)\n0004283: [Server] Trailer Server crash (Arc)\n0004278: [Client] Waterlevel not reset on disconnect\n0004260: [Client] Entering an ambulance as driver gives the player 20hp (carried over from SP) (lucasc190)\n0004217: [Client] setSkyGradient Glitch\n0004043: [Client] Client side peds copy other players on the server (Arc)\n0004172: [Client] Handle dynamic objects properly (ccw)\n0004286: [Client] Map download progress bar too obtrusive (ccw)\n0004303: [Client] Some breakable objects have the incorrect animation (ccw)\n0004342: [Client] createWater has huge problems with minus values and the 0 0 axes (Arc)\n0004343: [Server] isTimer() or equivalent\n0004372: [GUI / Menus / Console] Stopping a resource can cause key binds to stop working in other resources (ccw)\n0004100: [Client] Sniper not causing damage after certain distance (ryden)\n0004330: [General] Tab (action key) should not make radar disappear (ryden)\n0004373: [Client] When a car has more than 1 occupant, sirens bug out (ryden)\n0003090: [Vehicles] Make engineLoadDFF more safe or split into vehicle and non-vehicle loading functions (Arc)\n0003429: [Scripting] getElementsByType(\"player\") in onClientResourceStart may not return all players for joining players (Arc)\n0004031: [Installer] Add an option in installer to prevent creation of start menu item (Arc)\n0004317: [Client] Passworded server problem (mabako)\n0004351: [Client] Changing nickname in-game problem (\"=\" as first letter) (Cazomino05)\n0004360: [General] AC kicks on exessive setElementHealth (Cazomino05)\n0004177: [Server] isPedDead always returns false when used on peds\n0004307: [Server] ase functions loaded after onResourceStart in startup-scripts happened (mabako)\n0004346: [Scripting] onClientPedWasted does not trigger reliably (Cazomino05)\n0004280: [Synchronization] Invisibility and desync on respawn (ryden)\n0004289: [Server] Implement \"fun-bugs\" server setting that can be enabled (Talidan)\n0004329: [Server] Minor bugs with setGlitchEnabled\n0004301: [Client] onClientPlayerExitVehicle & onClientVehicleExit do not fire if you fell off a bike (Cazomino05)\n0003963: [Scripting] after using removeAccount on an account that is in use, and then the client trying to login or logout crashes the server (Fenix1053)\n0004016: [Server] Contact client-side element and getElementPosition()\n0004279: [Client] resetMapInfo resets the state of nametags without the server being aware (Cazomino05)\n0004257: [Server] setWaterLevel isn't synched on join (Cazomino05)\n0004203: [Server] Serverside setPedHeadless not synced for new Clients (Cazomino05)\n0004259: [General] \"Host game\" and \"Map editor\" buttons result in connection timeout message box (ryden)\n0003944: [GUI / Menus / Console] Poor GUI Performance (ccw)\n0004254: [Multi Theft Auto : San Andreas] Client-side Tick Count Accuracy Patch (ryden)\n0004214: [Scripting] Setting the dimension of an icon'd blip will cause it to dissappear for ever on f11 map (Fenix1053)\n0004253: [Multi Theft Auto : San Andreas] Underwater Colour Alpha Patch\n0004256: [Server] setElementAlpha isn't synched on join for peds (ryden)\n0004157: [Client] Getting into Skimmer stops Jump from working if you fall into water instead of getting in. (Cazomino05)\n0004176: [Client] Custom Textures for Buildings no longer load atall. (Arc)\n0004221: [Client] Server crash when shooting a clientside vehicle with HS rocket (ryden)\n0004206: [General] Stopping a resource stops all its included resources, even if those includes were started beforehand (ryden)\n0004213: [Client] Custom vehicles and models have pixelated textures (Arc)\n0004088: [Client] playSound3D panning left to right is too extreme (Arc)\n0004078: [Client] Texts are at the wrong place after changing screen resolution (Talidan)\n0004113: [Client] distance is not calculated on z axis when using playSound3D (Arc)\n0004127: [Resources] Some global variables missing - a bit of a feature request (Arc)\n0004187: [Client] MTA does not save the GTA path on Win Vista (ccw)\n0004204: [Client] setPedCameraRotation (lil_Toady)\n0004180: [Client] keyBind crashes gta instead of transfering (a) table(s) (Arc)\n0004002: [Client] onClientPedDamage - cancelling is messed up (ryden)\n0004208: [Client] Setting an object's alpha crashes the game (ryden)\n0004200: [Client] Weapon projectiles should be created in the same interior as the creator interior (lil_Toady)\n0004192: [Client] Feature request: Close splash screen if errors are outputted (Arc)\n0004041: [Server] warpPedIntoVehicle glitch (ccw)\n0004119: [Server] Light states of a vehicle's back lights cannot be set separately (Arc)\n0004161: [Maps] upgrades=\"\" are delimited by spaces rather than commas. (lil_Toady)\n0004070: [Server] CLuaFunctionDefinitions::ExecuteSQLQuery pushes column index instead of colName (Arc)\n0004135: [Client] Add setPlayerBlurLevel Clientside (Arc)\n0004069: [Server] aclGet and aclGetGroup output error when specifying non-existing ACL or ACL group name (lil_Toady)\n0004097: [Client] Make setElementParent work properly with GUI elements (lil_Toady)\n0004136: [Server] Network trouble after 'onVehicleStartExit' used removePlayerFromVehicle (Arc)\n0004190: [Client] Clothes do not reset after game session (lil_Toady)\n0004142: [Server] isObjectInGroup (ACL function req.) (Arc)\n0003064: [Scripting] textures dont load for custom objects unless the object already exists and is streamed in for the player (Arc)\n0003768: [Scripting] Server crash with onVehicleStartEnter and CancelEvent (lil_Toady)\n0003959: [General] Download Error 9 and 10 when starting resources\n0003040: [General] Mouse freezing issues (lil_Toady)\n0001719: [GUI / Menus / Console] Show taskbar and alt-tab window when minimizing (lil_Toady)\n0001158: [General] Spraying gang tags possible (ryden)\n0004006: [Server] Command line startup options to bind a server to a specific port and slot amount (Arc)\n0003043: [GUI / Menus / Console] Add \"connection type\" option to Settings window (lil_Toady)\n0004116: [GUI / Menus / Console] F11 map always draws blips with a border outline of 255 (lil_Toady)\n0004089: [Scripting] Consider the removal or fix for setCameraInterior (lil_Toady)\n0003515: [General", "num_tokens": 2048} {"category": "common_crawl-software", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-software/part-00-00000.npy", "text": "’ll be more to come sometime next week.  I think I’ll do Feedback nexFeatured. Bookmark the permalink. Follow any comments here with the RSS feed for this post.<|endoftext|>Android, Design, Mobile\n\nMDM Introduction\n\nThis is the first blog in the series on building a custom MDM solution.\n\nFirst of all, what are we trying to build?\n\nWe are building an instructional platform for K-12 education based on Android tablets. These tablets will be used by teachers and students, primarily in a classroom. The tablet helps the teacher in facilitating a class and provides various tools and applications to interact with the students and help them learn better.\n\nSo, what is a MDM and why do we need it?\n\nMDM stands for Mobile Device Management. Given that these tablets will be deployed in various schools, the MDM solution lets us manage them remotely. This includes downloading various learning content, installing educational apps, setting password policy on the tablet, et al, remotely. Because the tablet is used in a school environment, the MDM solution is also responsible for providing a safe and secure container for running the applications. This includes enabling/disabling certain settings on the tablet. The MDM solution also provides a single sign on solution for the tablet user. This allows us to capture the user credentials once and use it for the course of the user’s lifetime. This also gives us the ability to customize the content on the tablet to that specific user.\n\nSo, how did we implement it?\n\nmdm-server-architecture\n\nThe MDM solution has two primary components, first, the MDM agent, that lives on the tablet and second, the MDM server. At a high level, an Admin user interacts with the MDM server to perform an “operation” on a tablet (or a group of tablets) via a web portal. An example of an operation would be “install an application” on a tablet. In order to execute this operation, the MDM server notifies the tablet via GCM, the MDM agent on the tablet receives the notification, requests the MDM server for its operations via HTTP, the MDM server sends the operations and then the MDM agent executes those operations on the tablet and sends the status back to the server. The status is then displayed to the Admin user on the web portal.\n\nOther examples of operations include:\n\n • Blocking the settings on the tablet\n • Enabling VPN\n • Reset the password on the tablet\n • Sending a message\n • Unregistering the user on the tablet\n • Factory resetting the tablet\n\nand many more.\n\nIn order to build some resilience in to the system, we have introduced retry mechanism on the server. If the server does not get a response from the tablet in a configured amount of time, we retry sending the notification to the tablet. We have also built some “pull” in to the tablet, which means, every time the tablet is rebooted, it will request for its operations from the server. The operations are idempotent which means if they are executed multiple times, the end system state is the same.\n\nIn the next part, I will talk about the tablet architecture, which requires some cool “hacking” on the Android operating system. Here’s how!\n\nAndroid, architecture, Design, Mobile\n\nMobile Device Management\n\nFor the last year or so, I have been incredibly lucky to be working on building a custom MDM (Mobile Device Management) solution for Android tablets. This is a blog series, where I talk about the general architecture of the MDM solution and the specifics of the Android tablet component and the server component of the MDM solution.\n\nIts broken down in to 5 parts. Here they are:\n\nTablet Architecture\nOperation Serialization\nTablet Compliance\nOperation Processing Workflow\n\nHope you enjoy the series. Comments welcome.\n\narchitecture, Craftsmanship, Design, Java, Refactoring\n\nSoul coding\n\nYesterday I had a 12 hour non-stop[1] code fest to refactor a thin slice of 2-tiered web application into a 3-tiered one. It was very productive and I must say this is the kind of stuff that soothes my developer soul and hence the name. 🙂\n\nThe primary driver for the refactoring was that the core logic of the application was tightly coupled on both ends to the frameworks being used. On one side, it was tied to the web application framework, Play and on the other end the ORM, Ebean. We managed to move the business logic in to a separate tier, which is good on it own, but also let us unit test the business logic without bothering with the frameworks, which can be frankly quite nasty. As a follow on effect, we also managed to split the models into 2 variants, one to support the database via Ebean and the other to generate JSON views using Jackson. This let us separate the two concerns and test them nicely in isolation. Similarly, we could test the controllers in isolation. We got rid of bulk of our functional tests that were testing unhappy paths for which we had unit tests at the appropriate place viz., the controller, view model, service and database models.\n\nI was quite amazed at how much we could get done in a day. Here are some of the important take aways from this experiment:\n\n • We had a discussion the previous day about how we wanted to restructure the code, primarily focusing on separation of responsbilities and improving unit testability of the code. We agreed upon certain set of principles, which served as a nice guideline going into the refactoring. On the day of refactoring, we realized that not all the things we discussed were feasible, but we made sensible adjustments along the way.\n • Keep your eye on the end goal. Keep reminding yourself of the big picture. Do not let minor refactorings distract you, write it down on a piece of paper so you dont forget.\n • Pairing really helps. If you are used to pairing, when you are doing refactoring at this scale, it doubly helps. Helps you keep focused on the end goal, solves problems quickly due to collective knowledge and also decision making cycle time is considerably reduced when making adjustments to the initial design. Also I would say pick a pair who is aligned with you on the ground rules of how you are going to approach development. You don’t want to get into a discussion of how or why you should be writing tests and what is a good commit size.\n • Having tools handy that get you going quickly. Between me and my pair, we pretty much knew what tool to use for all the problems at hand. At one point, we got stuck with testing static methods and constructors. My pair knew about PowerMock, we gave it a spin and it worked. And there it was, included in the project. Dont spend too much time debating, pick something that works and move on. If it does not work for certain scenarios, put it on your refactoring list.\n • Thankfully for us, we had a whole bunch of functional tests already at our disposal to validate the expected behavior, which was tremendously useful to make sure we weren’t breaking stuff. If you dont have this luxury, then pick a thin slice of functionality to refactor which you can manually test quickly.\n • Small, frequent commits. Again the virtuosity of this is amplified in this kind of scenario.\n • Say no to meetings. Yes, you can do without them for a day, even if you are the president of the company. 🙂\n\nHave you done any soul coding lately? 🙂\n\n[1] Ok, not quite 12 hours, but it was on my mind all the time. 😉\n\nPragmatism hurts too…\n\nI spent quite a bit of my early career learning pragmatism. Frankly I did not know the word until I entered the industry. ;). I got this as a feedback, quite a few times, from my colleagues and more so from clients. They would say “You need to be more pragmatic”. What that really meant is, stop being so obsessed with you software engineering “craft” (my clients didn’t even think it was craft :)). Its ok to not have some part of the code tested before it hits production. Its ok to not have automated tests for some part of the code. Its ok to not pair program on critical code. Its ok to have 2000 lines of classes, with no tests, if it “already works”. Now I get it, right. All this does make sense, in a given context.\n\nBut, pragmatism hurts too. In this context, pragmatism means implicitly consenting to bad behavior. And again this might be ok, when you are in a bit of crunch, but when it starts becoming the norm, it begins to hurt, hurt a lot. When you see it becoming a norm, you need to start becoming a zealot for code quality. Best would be to have a good mix of zealots or for positive connotation, “craftsmen or craftswomen” on the team.\n\nSo, dont forget to promote craftsmanship just as you would promote pragmatism, especially if you are the leader of your software team.\n\nCloud computing, Infrastructure\n\nCloud vendor migration\n\nRecently we migrated our cloud infrastructure from Amazon to a different cloud vendor. I won’t get into the details of why we had to do it, but the experience of the migration itself was interesting and I want to provide some guidelines around the things you should consider, particularly around infrastructure automation, if you find yourself in a similar situation.\n\nGoing into this migration discussion, we clearly knew that Amazon was a better cloud vendor than the new one. We looked at a comparison site[1] to compare the features of the two cloud vendors. Amazon was a clear winner. This comparison gave us some pointers of where the new cloud vendor would be lacking. But rather than focusing on individual features, we decided to come up with own “requirements spec” for our infrastructure, and then see how the other cloud vendor fares. We knew we would have to make some compromises,", "num_tokens": 2048} {"category": "common_crawl-software", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-software/part-00-00000.npy", "text": " browser programmers, casual programming, portability.\n\nSummary: Great for Dynamic HTML! The recursion limit can be a pain, however.\n\nWhat: An interpreted language executed by Web servers such as Apache or nginx.\nHow: Like other languages compatible with the Common Gateway Interface, which\n are many and varied, it's executed by the server.\n\nWhere: PHP can be written in conjunction with HTML, within the same document.\n Dynamic Web forms and dynamically generated pages \"feel\" more natural.\nWhen: PHP is useful for the server-side (\"back end\") of Web applications,\n especially where the user must never know how passwords are validated and\n where the server can take some bandwidth load off of the transaction by\n computing something on its side rather than transmitting a massive JS lib\n to the client side and asking the client to compute for it.\n\nWhy: Because it's server-side, the end user never sees what it's doing, and so\n it's fantastic for bookkeeping on your side of the transaction.\n HOWEVER! Always remember that you need to keep a careful eye on security,\n especially where the user supplies any input at all. You'll need to escape\n and/or sanitize this input in other ways, to avoid clever little hacks like\n Johnny \"; DROP TABLE *; \".\nWho: Writers of CAPTCHAs, Web shopping carts, members-only galleries, etc.\n\nSummary: Like other CGI tongues, PHP is a Webmaster's vade mecum.\n\nWhat: A formatting language used for writing HTML pages on the Worldwide Web.\nHow: HTML marks up a hypertext document for rendering by a Web browser.\n\nWhere: On the WorldWideWeb, or a mirror on your local file system, etc.\nWhen: HTML documents are the markup format of choice for Web browser rendering.\n\nWhy: Web pages, GUIs for DHTML apps, front ends for business.\nWho: Web developers, casual rich text writers, authors of technical documents.\n\nSummary: Good for quick GUIs, reference manuals, and writing (w/o MS Office).\n\nWhat: CSS (not to be confused with the DVD content encryption scheme of the same\n name) is a formatting (markup) language with programming-like abilities.\nHow: It is an interpreted language. Its facilities exclude iteration/recursion.\n\nWhere: Web pages, résumés, and other such documents.\nWhen: Whenever HTML formatting is insufficient to the task.\n CSS, AFAIK, lacks loops, and can't use HTTP. Supplement it w/Javascript.\n\nWhy: CSS is a faster, prettier way to mark up Web pages.\nWho: Web developers, publishers, résumé formatting, etc.\n\nSummary: Useful to format your curriculum vitae, if LaTeX is too much trouble.\n\nWhat: C is a procedural programming language that's near to machine language.\n C is \"sorta\" object-oriented. C++ is more conducive to OO design. I use C.\nHow: The programmer works with bytes & system interfaces to effect his design.\n C is compiled to assembly language and then assembled to machine code.\n\nWhere: Unix and Unix-like systems, such as MacOS 10+ and Linux.\n C can also be compiled on other systems, like Windows: Dev-C++, mingw.\n The Linux Programmer's Manual, included with Ubuntu's \"build-essential\"\n package, contains the complete Posix specification described by the ISO\n 538 Committee Draft, August 3, 1998 WG14/N843, titled C '98, as well as\n by the Single Unix Specification. C is, substantially, Unix.\nWhen: The C programming language is close to machine language in many respects:\n therefore, and because compilers have been written and optimized much, it\n is blazing fast. C is most fruitfully employed in operating system design\n because the computer's hardware must be spoken to in machine code.\n\nWhy: If I need a fast program or a portable one, C is the lingua franca.\nWho: Operating system designers, simulation/game programmers, hackers.\n\nSummary: C and C++ are the Speedy Gonzales of the programming world.\n\nWhat: Python is a procedural programming language with functional capabilities.\n It contains all of C++'s object-orientation, with additional benefits.\n Python is an interpreted language, and can be compiled.\nHow: Using its substantial standard library, and extra OO benefits, Python is\n quite able to solve the vast majority of information technology woes.\n Python's an interpreted language. Its interpreter runs on Windows & Linux.\n\nWhere: Python's extensive manual (& library reference) describe convenient fixes\n for most IT-related problems. My only problem with it: unlike, e.g., the\n Haskell language, programs can't be described in pseudo-EBNF.\nWhen: Just about anytime for fun & profit. However, if you use it commercially,\n Python's author would like you to contact him. If you'd like to write a\n program more like a flowchart than an algorithmic procedure -- e.g., if\n recursion & parsing are your cup of tea -- you might try Haskell?\n\nWhy: Like C, but don't like malloc? Python's for you! :) See also: python.org\nWho: Information technologists, discrete mathematicians, C programmers, etc.\n\nSummary: Easier than C, with all the phenomenal cosmic power, in a box.\n Python also executes nearly as quickly as C, even when interpreted.\n\nActually I know next to nothing about this language. Ask Glasgow University?\nAlso you might try the book \"Learn You A Haskell For Great Good!\"\n\nJava is not Javascript. That's about all I know. Read more @ Sun Microsystems.\n\nWhat: Functional programming languages, suitable for lambda calculus etc.\n I believe these are interpreted, but can probably also be compiled.\nHow: Unlike object-oriented languages, in which the programmer arranges data in\n groups (structures, objects) that are sensible to the human mind's spatial\n orientation perceptions and its imagination, functional programming uses a\n calculus-like notation to make all programs function()s of other programs.\n\nWhere: Because all programs are functions of other programs, the transformative\n idea of the computer program (parser) as a finite state automaton that\n manipulates other such automatons finds an easy home here.\nWhen: The program itself is also data and object-orientation is (to some minds)\n easier to understand from a functional perspective. So, lisp is a good\n language for programs that have to change their code a lot.\n\nWhy: Calculus, I think, and iteration.\nWho: The Knights of the Lambda Calculus.\n\nSummary: I haven't much used functional languages. This entry is guesswork.\n\nWhat: Several varieties of mnemonic languages used to write machine code.\nHow: Mnemonics are \"assembled\" to machine language, or some form of executable\n code, based on the assembler's translation table.\n\nWhere: Assemblers are like compilers; but, instead of parsers, they're scanners.\nWhen: Therefore, they're easier to write. Also, see \"MACHINE CODE\" below.\n\nWhy: Because you don't want to write machine code yourself.\n After all, only a simplistic scanner is required to do this for you.\nWho: Manly men, womanly women, and all sorts in between.\n\nSummary: Just write this part after you write your compiler. (It's easier.)\n\nWhat: All computermachines speak electronically via binary ones and zeroes.\nHow: \"Machine language\" is the coded sequences of binary numbers that are used\n to instruct a computer's computational circuitry (its ALU, or CPU).\n\nWhere: Primitive machinery, new interfaces, low-level hacking & intrusion.\nWhen: Whenever flowcharts and buzzwords just aren't enough to get you hired.\n\nWhy: Compilers do most of this work for us these days. Sometimes needed, though.\nWho: \"Real Programmers,\" electrical engineers, chipset architects.\n\nSummary: Don't bother unless you're an electrician. (It's tedious / dangerous.)\n\nWhat: A stack-heavy programming language similar to assembly language.\n FlAS is an interpreted language, and it's pretty slow.\nHow: A FlAS is embedded in a Shockwave (Adobe) Flash file to animate parts and\n provide for user interaction. \n\nWhere: Because Javascript is no good for complicated rendering tasks, Flash AS\n is often employed to write Web games to be played in browsers using the\n Macromedia Shockwave -- ahem -- Adobe Flash plugin.\nWhen: If you need a Web game in a browser, or if you must format your gallery\n in such manner as to make it less scrutable to text-mode scraping 'bots.\n Scrapers can still take your gallery to pieces even if you use encrypted\n Javascript or amusing cryptographic puzzles in Flash, but I'll bet SWF is\n just about the end of the line for the casually-scraping archivist.\n\nWhy: Probably just because Javascript is no good for Web games.\n Flash's \"tween motions\" are very amusing, too, and I keep wondering whether\n Adobe will implement a Disney-like strech-and-squish. Technically, so could\n any programmer, and perhaps you too might like to take a crack at Mickey?\nWho: Game programmers, paranoid gallerias, art students.\n\nSummary: I've used this language less than Lisp, but it's popular.\n\nWhat: A formatting language used for writing technical manuals and textbooks.\nHow: DocBook is converted via DB -> TeX -> DVI pipeline, then rendered as PDF.\n\nWhere: Dissertations (M.S., Ph.D., ...), portfolios, scientific documents.\nWhen: Particularly opportune for automatic compilation of reports, such as in\n my report.sh, where formatting several thousand documents as individual", "num_tokens": 2048} {"category": "common_crawl-software", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-software/part-00-00000.npy", "text": "збранные Стихи\nPrice: $0.99 USD. Words: 3,880. Language: Russian. Published: August 31, 2012. Categories: Poetry » Russian & Former Soviet Union\nКнига включает избранные стихи на Русском языке. Сергей Скудаев родился в Забайкалье. Школьные годы и большую часть жизни он провел в городе Иркутске. Его стихи печатались в местных газетах, в Иркутском альманахе Сибирь, в Красноярском журнале День и Ночь, в Новосибирском журнале Новосибирск. С 1991 года Сергей Скудаев живет в США. Он член клуба Русских писателей Нью Йорка.\n\nSergey Skudaev's tag cloud<|endoftext|>Software architecture optimization: Acting the way human architects do it\n\nDesigning a software system in such a way that it meets its main quality-attribute requirements (e.g., performance, modifiability, etc.) is a complex, and error-prone activity, even for experienced architects. This complexity stems from the existence of multiple alternative solutions for the same requirements, which make tradeoffs inevitable. Design can be seen as a search through a large space, in which the solution space is n-dimensional and each dimension represents a different quality attribute to be optimized. In this context, tool support for exploring alternatives becomes an essential asset for assisting architects to make design decisions. Since the design space has many degrees of freedom, it is usually not possible for a tool to enumerate all possible alternatives. Thus, tools need to resort to heuristic search strategies. Furthermore, since many tradeoffs can be generated by such tools, human architects “in the loop” play a key role in the optimization process.\n\nOver the last years, several heuristic optimizations for software architectures have been developed [1]. Existing approaches have focused on specific qualities (e.g., performance, availability, or modifiability) and have assumed an underlying architectural model (e.g., Palladio or AADL). However, a common limitation of most works is that the knowledge for analyzing and optimizing a predefined (and small) set of quality attributes tends to be hard-wired in the tools, with a high coupling between quality-attribute models. Therefore, evolving a tool to consider new quality attributes and corresponding models is difficult. We argue for a more modular strategy, in which loosely coupled quality-attribute models can be integrated into an architecture optimization platform. The ArchE approach [2] was an early effort in this direction. Furthermore, another limitation of existing works is that (automated) search engines do not often allow for architect´s interventions to drive the search based on the architect's preferences and goals, which hinders human acceptance of the resulting solutions.\n\nIn our collaborative research project SQuAT (Search Techniques for Managing Quality-Attribute Tradeoffs in Software Design Optimizations) — conducted by the University of Stuttgart and the UNICEN University — we jointly investigate semi-automated techniques for software design optimizations, particularly focusing on i) distributed search strategies, ii) modularization of design knowledge, and iii) application of negotiation techniques for managing quality-attribute tradeoffs.\n\nThe approach builds on the DesignBots approach [3], which divides the design knowledge into a set of cooperative agents, each of which encapsulates a body of knowledge for analyzing and optimizing architectural scenarios for a particular quality attribute. Like in ArchE, each agent is equipped with architectural transformations (tactics) for changing a given architectural model and acts as a recommendation system (for improvements) to the human architect. The underlying agent architecture of DesignBots ensures a flexible integration of quality-attribute models. Moreover, we have extended the approach with support for concession-based negotiation techniques, so that the agents can interchange their (local) optimal solutions in order to derive (global) architectural solutions with quality-attribute tradeoffs that better reflect architect's expectations.\n\nWhile our approach is not tied to specific quality attributes, we are currently focusing on tradeoffs between performance and modifiability in Palladio models [6]. To this end, we are leveraging on existing work on KAMP [5] and PerOpteryx [4]. As for the tactic-based transformations of Palladio models, we are exploring the Henshin engine [7]. The results of the project will be publicly available as open-source software: github.com/SQuAT-Team\n\n1. A. Aleti et al.: Software Architecture Optimization Methods: A Systematic Literature Review. IEEE Trans. Software Eng. 39(5): 658-683 (2013)\n2 .J. Diaz-Pace et al.: Integrating Quality-Attribute Reasoning Frameworks in the ArchE Design Assistant. In Proceedings of QoSA '08. Springer-Verlag, 171-188.\n3. J. Díaz-Pace et al.: Exploring Alternative Software Architecture Designs: A Planning Perspective, IEEE Intelligent Systems, vol.23, no. 5, pp. 66-77, 2008.\n4. A. Koziolek: Automated Improvement of Software Architecture Models for Performance and Other Quality Attributes. KIT Scientific Publishing. PhD thesis, Karlsruhe Institute of Technology (2014)\n5. K. Rostami et al.: Architecture-based Assessment and Planning of Change Requests. Proc. QoSA 2015: 21-30\n6. S. Becker et al.: The Palladio component model for model-driven performance prediction. J. Syst. Softw. 82, 1 (January 2009), 3-22.\n7. T. Arendt et al.: Henshin: Advanced Concepts and Tools for In-place EMF Model Transformations. Proceedings of MoDELS'10, LNCS 6394, 121-135, Springer-Verlag, 2010.<|endoftext|>Tips to Deal Successfully with Tough Project Deadlines\n\nPublished by: 0\n\nTips to Deal Successfully with Tough Project Deadlines\n\nDeadlines can be stressful enough to give you those horrifying nightmares. Dreams that can scare you like anything. You won’t be wishing for the same and thus the idea is to ensure you meet project deliverables dates. It is not a cakewalk to meet the deadline on the time. Sometimes, you have got a little time to finish the project within a week. A project that is actually meant to be concluded in a month.\n\nEvery one of us, especially those dealing with IT sector are sure to have experienced such a situation once or several times in their jobs. Clients, on the other hand, are never going to accept the delay in any of their projects and thus the only solution left is to submit the project before the deadline. A little bit of planning and juggling can help one create a never ending impression on clients, of course, by delivering projects on time.\n\nDepending upon the industry, the nature and the size of the project, the delivery time is always going to differ. But the question is how to remain successful in doing all the attempts in the right direction.\n\nHere are the ideas to consider for Project Deadlines projects successfully:-\n\nGet Involved in the Project\n\nExpectations, often for IT projects tend to get set by higher management even without considering the fact that how much time is required to finish the project. This creates additional pressure on the developers who are actually working on the project. Therefore, it is critical to show your involvement in the project as soon as it arrives. This gives ample time to think of the strategy and work accordingly.\n\nREAD  Smart Steps to Outsource Mobile App Development ?\n\nBreak the Project Development Phase\n\nBreaking project development into smaller manageable phases is always going to work for you. Thus, try to set deadlines for these projects and work towards accomplishing the same. It helps you achieve the goal much before estimated time frame. This also provides much room for introducing the changes if required later in the project. This will also keep your stress level in check.\n\nLearn What to Prioritize\n\nKnowing what to conclude first gives an idea of the works that are the most important. Commitments that must be concluded on the urgent basis. Investing a few minutes to prioritize your work will help to figure out the important section of the project to finish at the very first place. This strategy works exceptionally well when you have got a huge project to manage.\n\nBrief Your Colleagues\n\nThere is nothing better than planning a strategy with your colleagues about your next project. Brief your colleagues on the most important concern and together plan out a strategy to work on the same. Having a single vision helps to take the project forward in the right direction.\n\nIn the Conclusion\n\nHandling a project is, of course, managing a massive task. Well, the above-defined points can help in dealing successfully with the tough project deadlines. And, by applying all these points successfully, you can easily manage the projects. Talking to the clients about their specific needs to be fulfilled will further help to manage the work perfectly.<|endoftext|>Beefy Boxes and Bandwidth Generously Provided by pair Networks\nDo you know where your variables are?\n\nComment on\n\n( #3333=superdoc: print w/ replies, xml ) Need Help??\n\"If I would like to print the output with localtime instead of epoch time (in the output) can I use this function : ...\"\n\nInstead of asking if you can use it, just use it. If it does what you want, you've learnt something; if it doesn't do what you want, you've still learnt something; and, if you make a mistake and get", "num_tokens": 2048} {"category": "common_crawl-software", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-software/part-00-00000.npy", "text": " 80'ies was the main topic of the ftrst TAPSOFT conference in 1985.  ...  Finally let us mention two other activities at TU Berlin: the design and efficient implementation of the language OPAL (by the group of Peter Pepper) which can be considered as a significant progress towards  ... \ndoi:10.1007/3-540-59293-8_184 fatcat:vydozuun3fajhpxgakow7btv64\n\nCompiling language definitions: the ASF+SDF compiler\n\nM. G. J. Van Den Brand, J. Heering, P. Klint, P. A. Olivier\n2002 ACM Transactions on Programming Languages and Systems  \nThe ASF+SDF Meta-Environment is an interactive language development environment whose main application areas are definition and implementation of domain-specific languages, generation of program analysis  ...  It can handle large (10,000+ rule) language definitions and uses an efficient run-time storage scheme capable of handling large (1,000,000+ node) terms.  ...  ACKNOWLEDGMENTS We would like to thank Hayco de Jong for his contribution to the implementation of the ATerm library, Jurgen Vinju for looking into the efficiency of list matching and maintaining the current  ... \ndoi:10.1145/567097.567099 fatcat:esq4htdlejejhfljvpbgrbdrk4\n\nA Review of Object Oriented Database Concepts and their Implementation\n\nNarciso Cerpa, Roy Dean\n1993 Australasian Journal of Information Systems  \nObject Oriented design and databases has attracted a great deal of attention in recent years.  ...  To illustrate and lend substance to this discussion a list is presented of OODBMS implementations. Their weaknesses and strengths are analysed.  ...  The implementation of Opal as the data definition language for Gemstone, had as an objective to implement a computationally complete data manipulation language.  ... \ndoi:10.3127/ajis.v1i1.428 fatcat:5g63cm2k4zewbpoakrvgswxsb4\n\nTypes and persistence in database programming languages\n\nMalcolm P. Atkinson, O. Peter Buneman\n1987 ACM Computing Surveys  \nThe design of these languages is still in its infancy, and the purpose of writing this review is to identify the areas in which further research is required.  ...  Traditionally, the interface between a programming language and a database has either been through a set of relatively low-level subroutine calls, or it has required some form of embedding of one language  ...  FQL [Buneman et al. 1982a ] is a functional algebra designed for the implementation and optimization of functional languages.  ... \ndoi:10.1145/62070.45066 fatcat:53smnvabyvdydhfwvdtfofiuha\n\nComputer codes for beam dynamics analysis of cyclotronlike accelerators\n\nV. Smirnov\n2017 Physical Review Accelerators and Beams  \nThe basic features of the programs available to users and limitations of their applicability are described.  ...  The description of the programs prepared in the worldwide known accelerator centers is provided.  ...  Francois Méot for continuous and fruitful discussions about ZGOUBI and a detailed explanation of the methods and algorithms that are used in the code. I also wish to acknowledge Dr.  ... \ndoi:10.1103/physrevaccelbeams.20.124801 fatcat:3bcilx2l5zgvharscxitmmttqi\n\nMaking standard ML a practical database programming language\n\nAtsushi Ohori, Katsuhiro Ueno\n2011 Proceeding of the 16th ACM SIGPLAN international conference on Functional programming - ICFP '11  \nThis paper describes the necessary extensions to the type system and compilation, and reports on the details of its implementation.  ...  Integrating a database query language into a programming language is becoming increasingly important in recently emerging high-level cloud computing and other applications, where efficient and sophisticated  ...  We note that SQL is an algebraic language based on the relational algebra.  ... \ndoi:10.1145/2034773.2034815 dblp:conf/icfp/OhoriU11 fatcat:7qaly4tinjhkplmrmwiang263y\n\nMaking standard ML a practical database programming language\n\nAtsushi Ohori, Katsuhiro Ueno\n2011 SIGPLAN notices  \nThis paper describes the necessary extensions to the type system and compilation, and reports on the details of its implementation.  ...  Integrating a database query language into a programming language is becoming increasingly important in recently emerging high-level cloud computing and other applications, where efficient and sophisticated  ...  We note that SQL is an algebraic language based on the relational algebra.  ... \ndoi:10.1145/2034574.2034815 fatcat:e2izvav3c5bqde4a2yzegmwpgm\n« Previous Showing results 1 — 15 out of 294 results<|endoftext|>'. PHP_EOL; } elseif ( strpos( $page_path, \"deutsch\") !== false) { echo ''. PHP_EOL; } elseif ( strpos( $page_path, \"francais\") !== false) { echo ''. PHP_EOL; } elseif ( strpos( $page_path, \"italiano\") !== false) { echo ''. PHP_EOL; } ?>\n\nDeltaV InSight Control Performance Software Screencast\n\nby | Mar 7, 2007 | Services, Consulting & Training\n\nJim Cahill\n\nChief Blogger, Social Marketing Leader\n\nThis week’s DeltaV News RSS Feed announced the DeltaV InSight integrated control performance software package. The news release described the method for improved control performance:\n\nDeltaV InSight automatically learns users’ processes with embedded learning algorithms running at the controller level and develops process models based on day-to-day operations. These models allow users to identify operational benchmarks, diagnose problems and calculate optimum loop tuning across the entire control system.\n\nUpon process changes like an operator setpoint change or a sequential logic-induced change which causes the process to move to a new operating state, the software learns the dynamics of the process from this change and provides recommendations on new tuning calculations. I discussed his capability in detail in an earlier post with DeltaV Advanced Control product manager, John Caldwell.\n\nOver the years, I’ve become a fan of blogger and new Microsoft employee, Jon Udell and his use of screencasts. These short screen-captured videos really save thousands of words and help quickly demonstrate something he is discussing.\n\nI spoke with John Caldwell and he agreed to give it a go and do a quick screencast of DeltaV InSight.\n\nThe screencast begins with a one-slide overview of DeltaV InSight followed by a demonstration of the software. I hope it conveys in its 3:22 second run-time a sample of this process of recognizing, learning, recommending, and implementing the change. There is also a product data sheet and whitepaper now available presenting additional capabilities.\n\nJohn adds that the development team worked closely with several process manufacturers in developing and testing this functionality. We developed a video from one of the manufacturers, Lubrizol, last fall to document some of the initial results they sa<|endoftext|>What Is the Difference Between Next Week and Following Week When Specifying Condition for the Date or Date and Time Field?\n\nWhen specifying condition for the Date field or the Date and Time field, displayed options might differ (\"Next week\" and \"Next month\", or, \"Following week\" and \" Following month\") depending on the setting screens. Example screen of Next week and Following week\n\nWhen the result of specifying condition is immediately reflected (for example, when filtering views), condition is specified based on the day of such action (i.e., \"Today\").\n\nIn this case, the option to select is \"Next week\".\n\nWhen specifying condition before performing an action against a record (for example when managing a process), condition is specified based on the date when such action is actually performed against that record (i.e., \"on That date\").\n\nIn this case, the option to select is \"Following week\".\n\nAs described above, displayed option differs when the result of specifying a condition is immediately reflected and when the condition is specified beforehand (there are some exceptions).<|endoftext|>Under what circumstances are SQL statements not logged when enabling tidb_general_log?\n\nThis topic has been translated from a Chinese forum by GPT and might contain errors.\n\nOriginal topic: 开启tidb_general_log时,什么情况下不记录SQL语句\n\n| username: TiDBer_6WpezJsp\n\n[TiDB Usage Environment] Production Environment\n[TiDB Version] 5.4.1\n[Encountered Issue] Seeking advice: When enabling a specific tidb-server, under what circumstances or what kind of SQL statements are not recorded in the general_log?\n\n[Reproduction Path]\nThe DBA accesses the Zabbix service using a script, and Zabbix connects to a specific tidb-server instance to store and manipulate its metadata. Specifically, the script accesses the Zabbix service API to indirectly delete certain records from a table. However, even though tidb_general_log is enabled on that tidb-server,", "num_tokens": 2048} {"category": "common_crawl-sports_and_fitness", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-sports_and_fitness/part-00-00000.npy", "text": "azard secured the football on the Buccaneers’ ensuing onside kick, sending the Packers to 2-1 on the season.\n\nRodgers finished the game 27-for-35 passing for 255 yards, two touchdowns, and an interception. Doubs was his most frequent target, catching all eight of his passes for 73 yards and a touchdown. Campbell’s pass breakup added another notch to a stat sheet that he filled up with a team-high 14 total tackles, while Kenny Clark picked up a pair of sacks.\n\nGreen Bay will return home to face Brady’s old team, the New England Patriots, next week before their first trip to London in week five. The Bucs will get another elite quarterback at home next week, as Patrick Mahomes and the Kansas City Chiefs come to town.<|endoftext|>Connect with us\n\nMitchell’s NJPW G1 Climax 34 Results & Report! (8/3/24)\n\nA Block, Round 6!\n\nTime to roku ‘n’ roll!\n\nOf all people to lead the G1 Climax’s A Block, it’s EVIL! Will the King of Darkness continue to cheat his opponents until he wins it all?\n\n • 8 Man Tag: Konosuke Takeshita & The United Empire VS Hirooki Goto, Tomoaki Honma, Shota Kato & Katsuya Murashima; Konosuke & The United Empire win.\n • Boltin Oleg & Toru Yano VS David Finlay & Gedo; Oleg & Yano win.\n • El Phantasmo & Jado VS Yuya Uemura & Taka Michinoku; Yuya & Taka win.\n • Yota Tsuji & BUSHI VS Ren Narita & Yoshinobu Kanemaru; Yota & Bushi win.\n • G1 Climax 34 A Block: Callum Newman VS Jake Lee; Jake wins.\n • G1 Climax 34 A Block: Great-O-Khan VS EVIL; Khan wins.\n • G1 Climax 34 A Block: Tetsuya Naito VS Gabe Kidd; Naito wins.\n • G1 Climax 34 A Block: Shota Umino VS SANADA; Sanada wins.\n • G1 Climax 34 A Block: Shingo Takagi VS Zack Sabre Jr; Takagi wins.\n\nHere are the current A Block standings!\n\nEvil: 5-0, 10 points\nZack Sabre Jr: 4-1, 8 points\nGabe Kidd: 3-2, 6 points\nShota Umino: 3-2, 6 points\nCallum Newman: 2-3, 4 points\nShingo Takagi: 2-3, 4 points\nTetsuya Naito: 2-3, 4 points\nSanada: 2-3, 4 points\nGreat-O-Khan: 1-4, 2 points\nJake Lee: 1-4, 2 points\n\nHere are the current B Block standings!\n\nDavid Finlay: 3-2, 6 points\nKonosuke Takeshita: 3-2, 6 points\nHenare: 3-2, 6 points\nJeff Cobb: 3-2, 6 points\nYuya Uemura: 3-2, 6 points\nRen Narita: 3-2, 6 points\nHirooki Goto: 2-3, 4 points\nYota Tsuji: 2-3, 4 points\nBoltin Oleg: 2-3, 4 points\nEl Phantasmo: 1-4, 2 points\n\nG1 Climax 34 A Block: Callum Newman VS Jake Lee!\n\nThe Prince of Pace is stuck in the middle of the pack, but better than being at the back. Will Callum even out at 3-3? Or will the Smart Bastard find a way to slow Callum down?\n\nThe bell rings and they both rush in! Callum gets around to waistlock. Jake elbows free then snapmares, but Callum avoids the Penalty Kick! Jake avoids the roundhouse and bails out! The fans cheer, and even Jake applauds Callum on that opening exchange. Jake takes his time returning, Callum taunting that he’s in a hurry, let’s get going. The fans rally up, the two reset and circle. They feel things out, and Jake taunts Callum with height and long arms. Jake goes low but Callum kicks the hand away. They knuckle lock and Jake wrenches. Callum wrenches back, but then Jake wrenches back. Callum wrenches, slips through, and waistlocks.\n\nJake standing switches, but then Callum wrenches out to headlock. Callum brings Jake to the mat, but Jake fights up. They end up on ropes and the ref calls the break. Callum lets off slowly, fakes a chop, then backs off. The fans cheer, but Jake storms up to kick low! Jake whips, Callum ducks ‘n’ dodges to build speed and BOOT! Jake tumbles away and the fans fire up! Jake gets on the apron but Callum BOOTS him again! Callum goes out, goes up, but Jake YANKS Callum down! The height comes in handy there. Jake then pushes Callum through the gap in the railing and pulls him back against the railing!\n\nThe ref reprimands and counts, Jake lets go while telling the ref to shut up! Jake drags Callum up but Callum fires forearms! The fans rally, but Jake eggs Callum on. Callum fires more forearms, so Jake kicks low! Jake POSTS Callum, then rolls into the ring. The count starts and Jake waits on Callum. Callum rises slowly, and Jake taunts him to hurry up. Callum stands at 10 of 20, rolls in at 13, and the fans cheer. Jake cravats Callum for a neck wrench, but Callum fights up. Jake keeps Callum from ropes, then pushes him down, to drop a leg, brother! Cover, TWO! Jake clamps right on with a chinlock and he grinds Callum down.\n\nThe fans rally while Callum endures. Jake pushes Callum down so he can stomp him! The fans rally and Jake smirks. Callum gets up to CHOP! Jake mockingly plays up the pain, and he taunts Callum. Callum CHOPS again, and Jake again plays it up. Callum dares Jake to try then! Jake winds up, to poke Callum in the eye! Jake then whips Callum, but Callum rolls off his back! Jake kicks low, runs, but Callum trips him and DOUBLE STOMPS him! The fans fire  up while both men are down. Jake goes to a corner, Callum rolls up to his feet and UPPERCUTS! Then GAMANGIRIS! Snapmare, and PENALTY KICK!\n\nJake roars as he sits up, so Callum grins. Callum PENALTY KICKS again! Jake rises again, so Callum fakes and KICKS! Then STANDING MOONSAULT! Cover, TWO! The fans fire up as Callum grabs the legs. Callum works to turn Jake over but Jake gets a leg free and BOOTS back! Jake TOSSES Callum out, then storms out after him. Jake aims from the apron to PENALTY- NO! Callum blocks the kick, trips Jake up, then goes up and up to ASAI MOONSAULT! Down goes Jake and the fans fire up again! Callum feeds off that energy to fire himself up, and he puts Jake in the ring. Callum aims, runs up, DREAMCAST KICK! Cover, TWO!\n\nThe fans rally as Callum considers his options. Callum drags Jake up, chicken wings the arms, but Jake stomps Callum’s foot! Callum fires a forearm, then whips. Jake reverses to KNEE low! Callum sputters while he’s down on the mat, but the fans rally up again. Jake rises, fakes a kick, and then clamps on a SLEEPER! Jake laughs while he leans on the hold. But Callum endures, fights up, and JAWBREAKERS free! The fans fire up and Callum goes Around the World to DROPKICK! Callum then goes up and up, but Jake avoids the jump! Jake swings, Callum dodges but the CHOP knocks him down!\n\nCallum kips up to ENZIGIRI! Then OSC- CHOKE SLAM!! Jake slam dunks Callum and covers, TWO!! The fans boo Jake but Jake takes aim again. Callum slowly rises as Jake stomps the mat. The fans clap along, Jake clamps on, CHOKE- RANA!! Cover, TWO!! Callum ROUNDHOUSES! HEEL KICKS! Callum runs, into a GIANT KILLING KNEE! Then the FACE BREAK SHOT!! Cover, Jake wins!\n\nWinner: Jake Lee, by pinfall (gains 2 points; Callum earns 0)\n\nThe Smart Bastard used Callum’s own speed against him and comes away the winner! Will he find that outside shot to get into the playoffs? Is the Prince of Pace already out of the running?\n\nG1 Climax 34 A Block: Great-O-Khan VS EVIL w/ Dick Togo!\n\nThe Dominator finally got going in this G1 with his win over Jake", "num_tokens": 2048} {"category": "common_crawl-sports_and_fitness", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-sports_and_fitness/part-00-00000.npy", "text": " with the Zamberletti Park Capital Improvement Commission have worked raffles and other projects to help raise funds to improve the park.\n\n“Our main goal and initiative right now is to work together with each of the leagues to provide much-needed upgrades, which includes an expansion to the existing concession stand and a new announcer’s booth for youth football,” Gary Delhaye, Zamberletti Park Committee chairman, said. “Both leagues would also benefit from the additional storage space.”\n\nIn addition, there are plans to include a new restroom with the expansion of the concession stand. The group also needs to repair some of the siding, replace doors and paint the existing structure. Installation of new security cameras and HVAC repairs have been completed.\n\nWith the high cost of everything, and the uncertainty of village funds due to the pandemic, everything has slowed down, Westville Mayor Mike Weese said.\n\n“However, we are committed to help and support these fundraising efforts. We have one of the nicest parks around and have done a lot of things already, such as all the restroom upgrades,” he said.\n\nThe groups are selling remaining raffle tickets for a chance at one of the 14 guns or $300 cash daily through June 30. The drawing will begin July 1 based on the Illinois mid-day pick three lottery.\n\nSome of the guns may be delayed due to availability and the pandemic, but eventually all will be received. Tickets may be purchased at the Westville Gas and Water Office between 7:30 a.m. and 4:30 p.m., Latoz Hardware in Westville, or from representatives from each league. People also may contact Jeff Slavik at 304-1404.\n\nThe groups are securing donations for sponsors, selling VIP tables and raffle baskets. Anyone interested in this event or raffle tickets may contact Delhaye at (304) 917-1823 or Chris Gallion at 474-3100.\n\n“Our community has always been great to us during our fundraising efforts. We hope to sell the remaining raffle tickets and progress with each of these upgrades,” Delhaye said.\n\nRecommended for you<|endoftext|>• Kevin Mullins\n\nCoaching Excellence: Simplicity is Consistency\n\nAnyone who has ever spent time trying to recreate a recipe has at one time or another muttered to themselves, “Damn, this doesn’t look/taste/smell right.” It could be your grandmother's famous soup, your first Thanksgiving turkey, or trying to recreate a delicious plate from a five-star restaurant for half the price at home - the result isn't matching the intention because of the increased complexity of the process.\n\nNow, throwing together some mac and cheese from a box, or baking a few lightly seasoned chicken breasts; just about anyone with a functioning brain and a kitchen can do that. The simplicity of the intention and process does not fog the pathway to the desired result.\n\nIn the first example, there is a noted desire to create, or in this case, cook something special that matches a memory or experience that was enjoyable. The reason a particular meal stood out in your brain, and to your taste buds, is due to the increased complexity of the recipe and cooking instructions. Moreover, an increase in variability in the products used to create the meal, such as the stock for a soup, or the freshness of the herbs in a blend - makes it harder for even a trained chef to repeat a taste profile.\n\nThus, no matter how much you care, or how hard you try, it is significantly harder to recreate such an intricate dining experience. You may only try this complex of a recipe once in a blue moon.\n\nIn the second example, you'll find a lack of emphasis. Maybe you just really want some mac and cheese, or maybe you don't give a damn what your chicken tastes like; you just need your protein and it takes thirty minutes at three-hundredish degrees to get some.\n\nThere is no process to follow except the simple instructions to boil water and add pasta, or put the chicken in the oven long enough it doesn't poison you. There are no expectations of grandeur; just a simple motivation to eat food.\n\nThus, no matter how much you don't care, or how little you pay attention, it is significantly harder to screw up such a bachelor-like dining experience. You could cook like this every dern night.\n\nOK, you are thinking, enough with the analogy - what is your point?\n\nThe point is this:\n\n\"It is imperative to keep the processes you employ simple and repeatable to ensure consistency.\"\n\nWhether you are training clients, giving advice to a loved one, or even pushing yourself to actualize a healthier lifestyle - Don't sign up to climb a mountain when you've never seen the top of a hill. There is no sense providing the recipe to the greatest dish in history when the cook in question has never cooked a three course meal.\n\nCoaching Programs\n\nOften times clients will ask for things to do on their own, homework if you will. As a coach it can be incredibly tempting to design them a program with all of the appropriate exercises and necessary volume to elicit the changes they seek. Every set and repetition can be scrutinized repeatedly until you settle on the \"perfect\" plan.\n\nOnce the client is in charge of that plan, however, how likely are they to create the sort of result that you intended? More likely than not they will butcher form, skip the things they don't understand, or waste time texting and finding their favorite song.. Sure, there are those studs that work out alone with the same quality as they do with you, but they are incredibly rare.\n\nThus, a \"perfect\" plan goes to complete waste because the trainee is incapable of mirroring the expectations. Sure, there will be sweat and possibly some sore muscles, but more likely than not no real progress was made. The proverbial needle did not move.\n\nA great coach will understand the gap between what their client can perform when under their watch, and what that same person can probably do on their own. This coach will question themselves, the client, and the program with equal intention.\n\n • Do they understand the exercises?\n\n • Can they do 'X' exercise safely?\n\n • Do they ENJOY working out, or do they just do it because they have to?\n\n • Do they push themselves or tend to slack?\n\n • Hell, do they even know what a dumbbell is at this point?\n\n • Do I want them to do this exercise because I want them to, or is it best for them, now?\n\nOver programming exercises or putting together complex repetition/set schemes does more to inhibit this client's progress than it does to benefit it. Like a recipe in a kitchen this complex plan can not be repeated easily.\n\nSimplicity, then, is the best method to improve a client's performance when doing their own workouts. There are so many ways, all dependent upon a client's abilities and goals, that a coach can better program \"off-days\".\n\n • Removing a compound lift from the program and focusing on accessory work is one option a coach could do.\n\n • Emphasizing mobility, stretching, and cardiovascular work\n\n • Keeping sets simple, and utilizing visual cues to emphasize HOW they should feel\n\n • Forgetting the gym altogether and putting something together that can be done anywhere.\n\nPersonal Note:\n\nI've recently had a client come back to after her first pregnancy. She still has time away from work, but a newborn baby doesn't exactly allow for two hours of personal gym time. Instead of prescribing her a complex workout that will absolutely drop the weight and get her feeling great - I gave her my \"Nappy-Kitchen\" workout.\n\nWhat is it?\n\nIt is all the moves she could do in a kitchen, quickly, with body weight in those beautiful moments that the baby sleeps peacefully. She can still see her daughter, but will be able to elevate her HR, burn some calories, and feel better. That's a freaking WIN.\n\nCoaching an Exercise\n\nAs a coach you can also make the mistake of being a bit too complex in the way you teach a particular exercise. A client might barely understand a hip hinge, but you are talking about dialing in your feet, taking the tension from the bar, and breathing dynamics. All of these points are valid coaching cues, and are necessary at some point to excel at a deadlift. However, are you coaching simple enough for them to make progress - today?\n\nOne Step at a TIme - with minimum distraction\n\nIf you keep your cueing simple - knees out, tall spine, big chest, push the floor away - then, you'll see a quick growth in ability, and a consistent application of quality effort. At this point you can think about layering in the advanced cues.\n\nBut keep it simple silly!\n\nCoaching Nutrition\n\nSimilarly, with diets - are you prescribing your clients to eat specific macros right off the bat? Are they counting carbs, and fasting, and doing paleo/atkins/dietoftheweek?\n\nOr, can you simply coach them to make one improvement a week. Eat more vegetables, make sure every meal has protein, and avoid alcohol in non-social situations are great stepping stones for those who may struggle with the particular focus.\n\nIf you keep your tasks simple, then a client doesn't feel overwhelmed. They won't feel like a failure for not meeting your ridiculous standards. They'll lock in on a few specific things and make sure they crush that shit like a 3-1 fast ball.\n\nThey'll do their best when they can consistently focus on something simple!\n\nWrapping it UP\n\nThis post could have easily ran on for a bunch of non-essential words to only further validate the position of the text. I could have used more illustrations, or gave more personal examples. However, what point is there in writing a post about simplicity if I'm not going to keep it simple myself?\n\nA coaches goal is not to make a client perfect. It is to properly progress", "num_tokens": 2048} {"category": "common_crawl-sports_and_fitness", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-sports_and_fitness/part-00-00000.npy", "text": " State)\n[New coach; previous position] Joe Dooley;\nassistant coach, East Carolina, 1991-95\n\n[Date] April 12\n[School] Delaware\n[Former coach] Steve Steinwedel (resigned)\n[New coach; previous position] Mike Brey;\nassistant coach, Duke, 1987-95\n\n[Date] April 12\n[School] Tulsa\n[Former coach] Tubby Smith (took job at Georgia)\n[New coach; previous position] Steve Robinson;\nassistant coach, Kansas, 1989-95\n\n[Date] April 25\n[School] Murray State\n[Former coach] Scott Edgar (took job at Duquesne)\n[New coach; previous position] Mark Gottfried;\nassistant coach, UCLA, 1988-95\n\n[Date] May 5\n[School] SMU\n[Former coach] John Shumate (resigned)\n[New coach; previous position] Mike Dement;\nhead coach, UNC Greensboro, 1991-95\n\n[Date] May 18\n[School] UNC Greensboro\n[Former coach] Mike Dement (took job at SMU)\n[New coach; previous position] Randy Peele;\nassistant coach, UNC Greensboro, 1991-95\n\n[Date] July 1\n[School] Michigan State\n[Former coach] Jud Heathcote (retired)\n[New coach; previous position] Tom Izzo;\nassistant coach, Michigan State, 1983-95\n\n[Date] July 20\n[School] St. Joseph's\n[Former coach] John Griffin (resigned)\n[New coach; previous position] Phil Martelli;\nassistant coach, St. Joseph's, 1985-95\n\n[Date] Sept. 6\n[School] Penn State\n[Former coach] Bruce Parkhill (resigned)\n[New coach; previous position] Jerry Dunn;\nassistant coach, Penn State, 1983-95\n\nCOLOR PHOTO:DOUG PENSINGER/ALLSPORT USA COVER PHOTO ON THEIR HEELS? Or are Dante Calabria and North Carolina better than people think? [Dante Calabria]COLOR PHOTO: BOB DONNANCalabria and the Heels will take more lumps than usual, and Tark (below) is steeped in controversy, as always. [Dante Calabria and University of Maryland player struggling for basketball]\nCOLOR PHOTO: STEVE R. FUJIMOTO [See caption above--Jerry Tarkanian]COLOR PHOTO: ALLSPORT USA (4) THE HEAT IS ON MEYER OF DEPAUL [Joey Meyer] COLOR PHOTO: ALLSPORT USA (4) [THE HEAT IS ON] MACLEOD OF NOTRE DAME [John MacLeod] COLOR PHOTO: ALLSPORT USA (4) [THE HEAT IS ON] HARRINGTON OF COLORADO [Joe Harrington] COLOR PHOTO: ALLSPORT USA (4) [THE HEAT IS ON] ROBINSON OF N.C. STATE [Les Robinson] COLOR PHOTO: JOHN W. MCDONOUGH[THE HEAT IS ON] AYERS OF OHIO STATE [Randy Ayers] COLOR PHOTO: NATHANIEL S. BUTLER [THE HEAT IS ON] MAHONEY OF ST. JOHN'S [Brian Mahoney] COLOR PHOTO: DAVE BURESH/DENVER POST Moore (above), an ex-Yellow Jacket, should bolster the Buffaloes, while a Tractor plows his way into Ann Arbor. [Martice Moore] COLOR PHOTO: PAUL WARNER/ANN ARBOR NEWS [See caption above--Robert (Tractor) Traylor] COLOR PHOTO: DAMIAN STROHMEYER Tulsa's Smith has gone to the Dawgs. [Tubby Smith] COLOR PHOTO: RICHARD MACKSON With Wilson and his mates hot items, Starkville has turned from hick to chic. [Darryl Wilson] COLOR PHOTO: MANNY MILLAN Allen (left) and Iverson lead a kinder, gentler Big East, and Knight's Hoosiers may get a little juice from some jucos. [Ray Allen] COLOR PHOTO: DOUG PENSINGER/ALLSPORT USA [See caption above--Allen Iverson] COLOR PHOTO: JOHN BIEVER [See caption above--Bob Knight]\n\nEagle (-2)\nBirdie (-1)\nBogey (+1)\nDouble Bogey (+2)<|endoftext|>Challenge Flow\n\nWarming the Body\n\nStart your practice standing in mountain pose and take 10 slow deep breaths. Flow through 5-10 slow sun salutations to warm the body.\nWarrior 3\nStanding on the left leg, begin to straighten the right leg behind you and lift into warrior 3 pose. Stretch the arms and lengthen the trunk forward and the left leg back. Stay in the pose for 5-10 deep breaths. Move with the breath into the opposite side for 5-10 breaths.\nStanding Wide Legged Forward Bend\n\nFrom standing mountain pose, step the legs 3-4 feet apart. With a flat back gently fold forward and bring the palms to the floor under the shoulders. Bring your forehead down towards the floor and release through the spine. As you inhale lengthen through the spine, and as you exhale fold over deeper and feel a deep opening through hamstrings. Press the feet down into the floor and lengthen through the legs,holding this deep forward bend. Stay in this pose for 5-10 deep breaths. To go deeper place the hands in reverse prayer position for the forward fold.\nCrow Pose\n\nFrom downward dog come down into a squat position with your feet a few inches wider than hip distance apart. If you have any issues with flexibility and can not place your heels down to the floor, then add a folded blanket under the heels. In the squat pose your knees should be wider than your hips. Stay in this squat for 10-15 breaths or challenge yourself with crow pose. From the squat, lean the torso forward and stretch your arms forward, bend your elbows and place your hands on the floor. Come up onto the balls of your feet and lean forward, putting the weight of your body onto the upper arms. Round your back and draw your belly in super tight to support your balance. Try to feel the legs squeezing against the arms as you press the hands firmly to the floor. Gaze forward or lift your head slightly finding a focus point for balance. Try to hold each pose for 3-5 breaths.\n*Yogi’s Tip- grab a few pillows to place in front of your body so you have a place to crash if needed for arm balances.\nFirefly Pose\nCome in to a squat pose again at the top of your mat. Bring your hands flat on the floor under your feet. Bend the elbows back as you shift your weight back to rest on your upper arms. Tighten the core as you gain balance to lift the feet up off the floor, and hook one foot in front of the other. Try to hold the pose for 3-5 deep breaths.\nChallenge Flow: move through these poses linking each pose with breath for 5 cycles.\n\nOn your back or supported with props for your level of comfort, begin to close the eyes and relax the breath. Progressively go through the body relaxing and releasing with each exhale. Stay here for at least 10 minutes or as long as you wish. To come out, roll off to your side coming to a seated position and taking a few breaths, noticing the difference in your internal state.<|endoftext|>November 27, 2021\n\nnews and update\n\nMcLaughlin escapes first-lap IndyCar carnage\n\n3 min read\nAustralia's Will Power has finished second in the season opening IndyCar race in Alabama, while...\n\nAustralia's Will Power has finished second in the season opening IndyCar race in Alabama, while Supercars champion Scott McLaughlin narrowly avoided a first-lap crash to come home 14th.\n\nPower finished less than half a second behind Alex Palou, who scored the first win of his IndyCar career.\n\nChaos reigned on the opening lap of the season, eliminating a number of drivers expected to contend for the championship this season.\n\nPenske driver Josef Newgarden ran wide exiting turn three, spinning him around sending the chasing pack scattering in all directions.\n\nhttps://twitter.com/rinusveekay/status/1383900862767013900?ref_src=twsrc{41767989f7681a3f3f7462574348d8166572b8b066bc7ba9c6cb13c83813675a}5Etfw\n\nAndretti Autosport drivers Ryan Hunter-Reay and Colton Herta were left with nowhere to go and made heavy contact with Newgarden, while Felix Rosenqvist's McLaren was briefly airborne, as Carlin's Max Chilton also suffered damage.\n\n\"I got loose coming over the hill and then touched the grass. I think once I touched the grass I'm basically sideways,\" said Newgarden, a two-time series champion and last year's runner-up. \"I feel really bad for anyone who got involved in that. Obviously my mess created a bigger mess, so any of the cars that got involved I'm really sorry because it was us that tipped it off.\"\n\nHerta, who finished third in the championship last year, was philosophical about the early dent to his title hopes,", "num_tokens": 2048} {"category": "common_crawl-sports_and_fitness", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-sports_and_fitness/part-00-00000.npy", "text": " off the side\n\nPushing off the side is more of a niche problem that can be caused by a couple of things. It may be that your opponent is adding sidespin to the ball and you are not adjusting for it. This is often the case if you are pushing serves off the side but good players are also able to add sidespin to their pushes to make things more difficult. The only other reason is that you are aiming your push off the side of the table. This might sound stupid but if you are off balance or out of position you may think you are aiming at the table whereas in fact your bat is facing off the side of the table.\n\nSidespin-backspin serves are very common at all levels of table tennis. When pushing these back you need to make sure you are aware of the sidespin on the ball so that you can take it into account when you decide your placement. The sidespin added to the ball is going to drag the ball to one side. If you aim to hit the centre line of the table it may land 6 inches to the right or left (depending on which type of sidespin was used), maybe more if there is lots of spin. At a basic level aiming for the middle of the table is a safe tactic if you are confused by sidespin but after a while you will just have to learn how to adjust for the spin so that you can still place the ball anywhere on the table.\n\nIf you feel you are missing off the side because you are out of position then it is time to work on your footwork, probably. The faster you can move around the table the less likely you’ll be missing shots in this way. If you have a weak forehand push and are trying to play mostly backhand pushes this can be a common problem. All that moving around means that eventually you will probably get thrown off balance and end up playing a bit of a wild push that could go anywhere. Perhaps improving your forehand push is the answer.\n\nIf you find you are pushing lots of balls off the side of the table you need to think carefully about why that is. Consult a recent video of yourself if you have one.\n\n4. Pushing too high\n\nThe final common leak is pushing too high. It isn’t as simple to diagnose as the others as it does immediately lose you the point. Instead, it gives your opponent a chance to take the point, if they are good enough. This means that often beginners get used to pushing too high as they aren’t punished for it. It’s only when they move up a level and start playing better players that they realise they are not pushing low enough to the net.\n\nI think this is something that Sam has realised is a leak in his game recently. His pushes will often go high but up until recently he has either been playing against me (and I haven’t been smashing these past him as my focus has been on whatever he is doing and not on what I should be doing in that situation) or a local club player (who perhaps pushes that high push back or plays a drive/topspin which gives them the advantage but doesn’t win the point there and then).\n\nAt Bristol Sam played plenty of players who were good enough to quickly step around and kill any push that was a little too high. The younger players were particularly good at this. This meant that pushing high was about as bad as making an unforced error, because they very seldom missed their smashes!\n\nPushing too high is almost always a ‘feeling’ issue. I don’t really like that word as it is so hard to define but it’s difficult to call it anything else. You see, you could say, “well I pushed that high because it had less backspin on it” or “they had a funny rubber that meant the ball was very floaty” but the problem is that the spin on the ball isn’t really the problem. A good player can push any ball low because they have the ‘feeling’ to subconsciously adjust their push and still brush the ball. The only way to get this is with lots of practice pushing different kinds of balls. It’s also important to relax your wrist, arm and body. When Sam is tense his pushes pop up high and get smashed past him. Good players don’t make stiff pushes, they are smooth and relaxed.\n\nIf you find you are pushing lots of balls high it’s time to work on your ‘feeling’ and get used to being relaxed when you push so that you can make all those tiny adjusts needed to keep the ball low.\n\nSo those are the things you should be looking out for. If you have any video of a recent match you played why don’t you watch it back and note down any pushing errors you make. Chances are they will fall into one of those four categories. Which one are you most susceptible too? Some people put lots of pushes in the net (and fixing that should be their number one priority), while others (like Sam) probably struggle most with pushing too high and giving their opponent an easy ball to kill.\n\nHow to fix them… pushing-only games\n\nOne exercise you can use to improve your pushing, and fix your leaks, is the pushing-only game. Some of you have probably done these before but I’m sure many of you haven’t. They are a brilliant way to improve your pushing and are also quite fun.\n\nSo, what are pushing-only games?\n\nPushing-only games are a way to overload and overlearn the pushing part of your game. Instead of only playing one or two pushes per point, and thinking of them as a way to set up your attacking shots, the push becomes the focus of the game. It is the only weapon at your disposal so you will need to use it to start the point, set up your winning stroke, and win the point with.\n\nDon’t think of pushing only games as simply a test of concentration and consistency. You shouldn’t just be pushing and hoping your opponent makes a mistake before you do. Instead, actively use the push to create opportunities. Vary your pushes and look for ways to be aggressive with your pushing. Do this for a few games, against a range of different players, and you’ll learn that the push can be just as aggressive, and just as effective, as any of your strokes.\n\nHere is a video of me and Sam playing a pushing-only game last week in the kitchen. I am playing left-handed and my forehand push is a bit iffy so as a result I am trying to play as many backhand pushes as possible. A lot of players struggle with their forehand push so that is something to look out for, and try to exploit, when pushing.\n\nPlaying these pushing only games is going to…\n\n • Help you quickly decide whether to play a forehand or backhand push\n • Improve your footwork, especially moving in and out\n • Teach the importance of having a lose wrist and using your wrist in your pushes\n • Show you the importance of variation, in placement, length, amount of spin, height\n • Give you a chance to work on deception when pushing\n • Get you used to pushing without making mistakes\n\nJust this week I’ve seen a big improvement in Sam’s pushing. He is now much better at digging (he really struggled to dig anything last weekend at Bristol) and he has learn to play a sort of drop-shot push (when he first started trying this during our games he put about ten of them in the net, in a row). I can tell that he is much more comfortable with his pushes and if we continue to play these games a few times a week I’m sure he’ll be an excellent pusher by the end of the year.\n\nLearning to push can be so boring. I remember reading the section in Alex Polyakov’s book Breaking 2000 where he talks about the week he spent pushing. He hated it. He loved to loop the ball and doing little pushes all day almost sent him crazy.\n\nIt’s easy to switch off when you are pushing. This is especially easy when it is the other persons drill and you just need to push to a certain place as part of their exercise. Doing these pushing only games, and keeping the score, really helps to keep you engaged. It stops you from just pushing on autopilot. When we practice on autopilot it isn’t deliberate practice and we aren’t really getting any improvement from it. It feels comfortable but it isn’t very valuable. A pushing only game gives the practice the purpose, and purposeful practice is what it is all about if you want to improve a skill.\n\nHave a go yourself\n\nI encourage everyone reading this (yes that means you too) to have a go at playing a pushing only game the next time you play table tennis. You may think your pushes are pretty good already. If that’s the case you’ll find out in a pushing game. You may know you need to work on them and this could be the solution to your problems.\n\nDon’t spend too much time doing it. It’s important that you don’t develop the bad habit of pushing lots of long balls. In a match it is good to have an attitude where you always first try to attack and resort to a push if that is not possible. But playing a pushing game, or two, every time you practice is definitely a good idea.\n\nPerhaps you can add it to the end of your standard knock up. Instead of just doing forehands and backhands, why not finish with a pushing game to get those shots sharp and warmed up too.\n\nAnd let me know how you get on. Leave a comment below or drop me an line. It’s great hearing how everyone is doing with their practice.<|endoftext|>To Top\n\nWhat is the Best Home Gym Equipment for a Full Body Workout?\n\nWorking out at home has become increasingly popular in recent years, and for a good reason. You can get a full-body workout without leaving your house with the right home gym equipment. This article discusses the benefits of home gym equipment and the various types of equipment", "num_tokens": 2048} {"category": "common_crawl-sports_and_fitness", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-sports_and_fitness/part-00-00000.npy", "text": "-10 foul shooting, Jones said:\n\n\"It's not good enough to get to the line just 10 times all night and then only going 50 percent is certainly not good enough.\"\n\nOn his team's offensive woes late, Jones said:\n\n\"We didn't make shots, we didn't execute, we didn't run our press-break stuff very well. We like to get transition points out of it and instead, we turned it over. That was disappointing, but the kids played hard and fought to the very end. Still, it's very disappointing because we  expected to be here. It's something we talked about going back to the very beginning of the season.\"\n\nOn  the George Williams 3-point shot that put Allen ahead with 1:31 left, Jones said:\n\n\"That was huge. We were up one at that point. We were doubling down on the post and they weren't kicking it out too often. But they kicked it out there and he hit it. If you're going to give up a shot in the match, it's going to be from the corner. Give the kid credit because he made it.\"\n\n(Morning Call photos by Kevin Mingora)\n\nTrackback URL for this entry: http://www.typepad.com/services/trackback/6a00d8341c4fe353ef0120a8aac41f970b\nListed below are links to weblogs that reference LVC leftovers from an entertaining semifinal round\n\nCurrent Comments\n\nMore excuses from Jeff Jones today. Time for him to go.\n\nIt's just not the players that blow a 4th quarter lead but the coaching too. Take some responsibility!\n\nDMK - Why are you taking shots at the Zephyr coaches? Seems like you have a personal vendetta.\n\nFor such a small community, the Zephyrs have been battling for league championships for the past 30 years. The main reason for this is because we have been blessed with outstanding coaching.\nDick Tracy, Ron Hassler, Jerry Radocha and now Jeff Jones. You might not agree with thier style of play however come playoff time the Zephyr fans still have a team to root for.\n\nThis years team has been very exciting to watch. They can play up tempo or a more disciplined style.\nThe kids play hard for the coach.\n\nCoach Jones stands up pretty well with his predecessors. He'll make his own mark in due time.\n\nEnough already about Whitehall. Lets talk about the real winner...ALLEN! They are rolling and they will beat Liberty. I love the final...Allentown vs. Bethlehem. What more could be asked for besides pitt6rings being kicked off the blog site.\n\nCalifornia UofP should be ashamed of themself! How can they accept loan payments from a graduate who cannot type a coherent thought?\n\nCanary, Allen will be facing Nazareth, not Liberty in the finals. Be prepared for a hard fought game\n\nEric, The coaches like Hassler, Tracy and Radocha all have done something in coaching that Jones has not and that is win a league and District Title.\n\nWhitehall should be better than this. I hope I am wrong but I just don't see Whitehall returning to championship form under Coach Jones.\n\nWhitehall is just 4-4 over it's last 8 games. Not the way you want to be headed into Districts.\n\nCould someone please tell me why Dante Holmes didn't come off of the bench until the start of the 2nd quarter. In my opinion, that forced them to play catch-up for the rest of the game. Also, a wise basketball coach once told me \"You live by the 3, you die by the 3\". Right on!\n\nDante sat out the first quarter as a disciplinary action for coming late to a practice. This info was in one of the early-edition stories last night, but had to be cut later for space. I agree that him not starting was a factor early for Liberty.\nHowever, it was still 25-25 early in the 3rd quarter and Nazareth dominated from there.\n\nChampionship game should be a thriller! Nazareth is playing hungry right now. They're playing good basketball at the right time. It will come down to the team who doesn't turn the ball over as much.\n\nEric, are you serious? Jeff Jones is 36-35 at Whitehall. Name the last boys basketball coach who was 36-35 at the same point in their tenure? Jeff Jones is now 31 game UNDER .500 as a head coach, first at Northern Lehigh and now Whitehall.\n\nIf you believe that this Whitehall team plays with the same discipline and smarts that Tracy, Hassler and Radochas teams played with, you must be either blind or an apologist for Jones. This is a DUMB basketball team, coached by a guy who is WAY over his head.\n\nWhitehall is now just another miserable Lehigh Valley team. You know, one that has almost no shot at winning any state playoff games. I can tell you that Whitehall was respected and feared statewide. Why? Because of their style of basketball. They would frustrate more talented teams with their ferocious matchup defense and their disciplined offense. That ship has sailed.\n\nWelcome to mindless court length passes which turn into turnovers, wild shots that have no rhyme or reason, and MOST OF ALL, welcome to LOUSY DEFENSE. Allen made so many layups that I thought I was watching the Sixers defense.\n\nBut hey, the kids probably like him. He demands nothing from them.\n\nWhitehall won almost 700 games, 11 league, 10 district titles and a state title over the last 30 years. As long as this guy stays, they will not add to the league and district title lists.\n\nHe was shoved down the throats of Whitehall fans by an arrogant Superintendent and incompetent Athletic Director, aided and abetted by a dysfunctional School Board.\n\nDontcha just love it when people hold back???\n\nDeiruff won a game and three wrestling meets!! Nicely done!!\n\nThank you Geekadodle for posting that! I couldn't agree more. This Whitehall team has as much if not more talent than most of the great Zephyr teams of the past. It certainly has more athleticism. They will not win any championship under Jones. This is the most undisciplined Whitehall team ever. They had that game won last night depsite awful defense and missed opportunties and still found a way to blow it. They got the lead and then decided to throw the ball all over the court. Allen scored at will when it needed to. Also, Whitehall misses more layups and easy shots than most elementary school teams. What was even more comical is everytime Whitehall made a mistake Jones trying to act all dramatic on the sideline line it was drama class or something. This guy cannot go fast enough. Whitehall used to be feared statewide. Under this guy they are becoming an embarrassment. You cannot compare him to legends like Tracy, Hassler, and Radocha. If either one of them were coaching this team they would be playing Fri night and well through states.\n\nNazareth vs. Allen should be a great game but I like Nazareth in this one. Allen turns the ball over to much and Nazareth plays tough defense if nazareth plays 1-3-1 thats the perfect defense to stop Allen. Also that kid from Nazareth Kris Kent is a beast that was a nasty layup.\n\nAgreed Whitehall does have a load of talent but i think with that talent comes undisiplined basketball.\n\nOn Jones defense what do you suggest he does about this if his kids who are more of a city basketball oriented team rush offense?\n\nI believe that it shouldnt be complete stall ball and slow down the pace to nothingness because the kids want to score and keep the game fun.\n\nI do think Whitehall also has some egos on their team which is holding them back\nHow can Whitehall get better?\n\nWhy is everyone acting as if the sky is falling at Whitehall? This years team played very good basketball for most of the season. Who cares if we are not respected through out the state like we were years ago.\n\nAsk opposing coaches how much they respect Whitehall and you will here a different tune.\n\nFrom what I see, I believe Jeff Jones does give these kids a little more wiggle room when it comes to shot selection. With that comes good and bad.\n\nSure 'talent\" is the main ingredient to succeeding on the court, however, leadership and discipline\nis needed to make a team complete. That is what i see the coaching staff provide.\n\nI hope the zephs can put a few good games together and not run into a hot shooting team like Allen was that night. Allen was the better team and deserved thier win.\nDon't blame Whitehall for the loss. Give Allen credit.\n\nAnd as far as a coaching change. Stop already.\n\nKnock off the witch hunt.\n\nYou are correct leadership and discipline is what is needed to make a complete team. That is exactly what Jones is not providing. That is why this talented team has been so up and down this year. This was and hopefully still is a season of high hopes for Whitehall. You act like Allen shot lights out!\n\nWiggle room is one thing, stupidity is quite another. This team takes STUPID shots. It makes STUPID passes. It has no basketball smarts. Even an extremely smart kid like Bet makes unbelievably STUPID plays. They are not held accountable for it.\n\nJone is 36-35 at Whitehall. What part of that record don't you understand? It is MEDIOCRE, just like his coaching. He is 31 games UNDER .500 for his career. Did you gloss over that part", "num_tokens": 2048} {"category": "common_crawl-sports_and_fitness", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-sports_and_fitness/part-00-00000.npy", "text": "manda: Yep.\nLisa: How many swimmers come from the continent of Africa?\nAmanda: Not a lot> i think there is at least one male Ethiopian swimmer.\nLisa: One thing I love about marathons is that me, a non-entity in the world of marathons, can run in the exact same race as those who will win. You can’t do that with other sports. That’s probably one reason why more countries have track and field athletes than other sports.\nAmanda: That makes sense. And for a lot of those distance runners, it’s not about winning.\nLisa: For the majority of them it’s just about finishing.\nAmanda: Yep. Phelps last race!\nLisa: John Stephen Akhwari: The Greatest Last Place Finish in the Olympic History Go Phelps! That marathon story still makes me tear up.\nAmanda: That’s a great story. There’s a swimmer’s story like that. I’ll find it. Eric the Eel: The Olympic Swimmer Who’d Never Been in an Olympic-Size Pool\nLisa: Cool!\n\nPolitical ads, designed to divide us, should not be allowed during the Olympics, designed to unite us.\n\nLove the heptathlete bow at the end. All the heptathletes lined up with the winners in the middle, held hands, and took a bow. It was great.\n\nBrett watching the women’s marathon: It’s amazing when you think what our bodies are capable of and then when you see what other human bodies are capable of, like running 12mph for 26 miles.\n\nIf you train for a marathon wearing running shorts and then race wearing running briefs, your tan lines are going to be a bit distracting.\n\nI like that they use safety pins on their bibs just like us normal people do.\n\nAmanda: I’m thinking Olympic golf might be a good time for a nap. Woke up in time for equestrian! Show jumping is cool.\n\nAmanda: Aww. A US men’s gymnast’s wife washed all his gear in baby detergent before he left. They have a new 6-month-old and she and the baby stayed in AZ. But he has put up all the photos she has sent him in the room. All this is to remind him that his journey has been a family accomplishment.\n\nAmanda: Either Bob Costas is really short or Usain Bolt is really tall or standing on something.\nLisa: The sprinters are tall.\n\nAmanda: The 41-year-old gymnast is out of medal contention, but the fact that she is still doing what she does at 41 is amazing.\n\nAmanda: There is a Visa Checkout commercial featuring the Eatons that I think is cute.\nLisa: I like the Eatons.\nAmanda: Speaking of athletes we like – did you see Mo Farrah’s race?\nLisa: I saw it. That was awesome.\nAmanda: He fell! Could have been trampled! And then he won!\n\nAmanda: Walsh Jennings ran under the net to the other side to save the ball. They explain why that’s legal. It was cool. And their tops are a lot better tonight.\n\nTrack athletes have more tattoos than swimming athletes.\n\nWhy is there a llama in the Geico commercial with Marco Polo?\n\nWomen’s open swim is easier to explain to Iddo than wrestling. Although she does find it interesting there are people who don’t need boats in the ocean. And she wants to be in a buoy.\n\nIddo has decided Brett could run the steeple chase. He’s decided she could play table tennis.\n\nIddo isn’t impressed by or interested in hurdles after seeing the steeple chase because they just jump over things and don’t run through pools as well.\n\nAmanda: Synchro swimming is simultaneously cool and weird.\n\nI love Amanda’s preview of coming attractions. It threw Brett off Sunday night when I knew they’d explain the legality of going under the net as she was going under the net.\n\nI told Iddo that synchronized swimming is dancing in the water. She did a little wiggle and asked if they danced like that. Then we went to watch it. After seeing it she said it was kind of funny. I fully expect her to demonstrate in the wading pool or bath tub soon. One of the commentators said “We’ll see if the judges liked it,” and Iddo replied “I didn’t like it.” During another routine the commentators said “There are such small differences,” about a pair and Iddo repeated “There are small differences Mom. But they have matching hair.”\n\nI’ve never heard a jellyfish report during the Olympics before.\n\nWe watched the men’s 800m and I commented, “Go white boy.” The winners were Kenya, Algeria, and a white boy from the States.\n\nMiller’s diving finish in the 400m! That’s commitment!\n\nLisa: I didn’t realize horses have a blind spot right in front of their faces and so when they approach a gate to jump over it that it completely disappears. I always think the jump designs are pretty.\nAmanda: Way prettier than human hurdles. :)\n\nIddo has been asking for more flipping swimming and they just aren’t broadcasting enough of that for her. So I pulled up Tuesday morning’s men’s springboard for her and she was happy. Plus, it’s not every Olympics you get to see a belly flop. Defending Olympic champ even.\n\nPoor Bob Costas having to do a time filling interview with giggly girls.\n\nI am very Olympic Today\n\nCategories: Featured, Olympics, With the Kiddos\n\nOlympic ringsWe’ve found several ways to incorporate the Olympic Rings in our week. And now Iddo is pointing out the Olympic circles every time she sees them.\n\nMonday afternoon we pulled out the paint and the kids all did an Olympic Rings art project. We were even able to do a 3-year-old version and a 1-year-old version. Iddo used a small cup to stamp circles on her paper with the Olympic colors. For Shimri and Shimei I put tiny blobs of paint on the paper in the positions of the rings and they got to finger paint them around. I liked the results from both versions.\n\nRandom Giggles | Olympic Rings Printing\nRandom Giggles | Olympic Rings Finger Painting\nRandom Giggles | Olympic Rings Finger Painting\n\nI’ve been able to convince Iddo to let me try different things with her hair. When we use elastics they’re called “fancies” in our house. Friday she let me do Olympic circles fancies, as long as we pretend that purple is black because, as she pointed out, we don’t have any black fancies.\n\nRandom Giggles | Olympic Rings Hair\n\nAnd for dinner Friday night we had Olympic Rings dips.\n\nBlue – blue colored ranch dressing\nBlack – chocolate sauce\nRed – salsa\nYellow – creamy lemon fruit dip\nGreen – guacamolé\n\nRandom Giggles | Olympic Rings Dips\n\nWe dipped apples, strawberries, grapes, carrots, celery, broccoli, cauliflower, tortilla chips, and tiny sugar cookies.\n\nRandom Giggles | Olympic Rings Dips Dinner\n\nIddo said it best after dinner Friday, “I am very Olympic today.”\n\nOlympic ponderings\n\nCategories: Olympics\n\nOlympic ringsThoughts from me, Amanda, Brett, and Iddo on the Olympics from Monday through Thursday night. Because we are awesome Olympic commentators. Enjoy! Also, clearly I should do these more often because this one gets long.\n\nThere’s a German men’s beach volleyball player with a fun white hat.\n\nThe Olympics is the place to be undefeated if you’re going to be undefeated. Walsh Jennings picked her undefeated place well.\n\nI saw an article that would show me the 20 most beautiful female athletes. The photos gave no indication of their sports. And they’d never do an article like that for the male athletes. If they did, it would be obvious what their sports were. Amanda saw an article about Phelps balancing swimming and fatherhood, which was a nice change. It would be nice if they brought up Olympic fathers as much as they do mothers. Parenthood doesn’t do the same to their bodies that it does to the moms, but it’s still an adjustment. Also, the male gymnasts should have to do their floor routines to music too. And what’s with the beach volleyball uniforms? Men are decently covered, but there’s just way too much cleavage for sand to get into, both front and back, for sand to get in for my taste, and way too many wedgie pickings per point compared to any other sport.\n\nWe had to figure out why they were listing Cammile Adams as “N. Adams” in the overlay on her lanes on Tuesday. Turns out her first name is Natalie. And in the process we discovered that she has a twin sister named Ashley. So then I had to figure out who the multiples are at the Olympics. This is what I’ve found out so far:\n– Cammile Adams (USA, swimming). Her sister Ashley isn’t in the Olympics.\n– Leila, Linna, and Lily Luik (Estonia, marathon)\n– Lucija and Ana Zaninović (Croatia, taekwondo)\n– Monica Rokhman (USA, rhythmic gymnastics). Her sister Jenny is the team alternate\n– Bia and Branca Feres (Brazil, synchronized swimming)\n– Jonathan and Kevin Borlee (Belgium, track and field). Younger brother Dylan and older sister Olivia are also competing.\n– Lisa and Anna Hahner (Germany, marathon)\n– Sanne and Lieke Wevers (Netherlands, gymnastics)\n– Sven and Lars Bender (Germany, soccer)\n– Megan Rapinoe (USA, soccer). Twin sister isn’t in the Olympics.\n– Roger Federer (Switzerland, tennis). Not a twin himself, but he has", "num_tokens": 2048} {"category": "common_crawl-sports_and_fitness", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-sports_and_fitness/part-00-00000.npy", "text": "pires is your go-to spot! Just sign up for free, and you’re in – they stream Thoroughbred, Harness, and Quarter Horse racing live. It’s like having your own personal trackside seat, minus the dirt!\n\nHow long are Quarter Horse races?\n\nHow long are Quarter Horse races?\nQuarter Horse races might be over quicker than a New York minute, but they pack a punch! These sprints can range from 220 to 770 yards. Yet, true to their namesake, the classic Quarter Horse race hits the sweet spot at 440 yards – that’s a quarter-mile of pure speed.\n\nWhen can you start riding a QH?\n\nWhen can you start riding a QH?\nHold your horses, eager beaver! Before you saddle up, a Quarter Horse (QH) needs to be at least two – that’s when they’re ready to start light training. But always remember, patience is a virtue; don’t rush ’em, and you’ll have a friend for life.\n\nWhy are Quarter Horses so popular?\n\nWhy are Quarter Horses so popular?\nWell, why not? Quarter Horses are the jack-of-all-trades in the equine world. They’re like the cool kids on the block — versatile, nimble, and faster than a hot knife through butter over short distances. Plus, they’ve got a temperament that’s as golden as a California sunset.\n\nWhy is King selling Queen’s horses?\n\nWhy is King selling Queen’s horses?\nHere’s the scoop! Since the Queen passed away, the King’s got more horses than a western movie – it’s only practical to sell some off. It’s a bit like downsizing a majestic, royal collection; precious, but perhaps too much to handle for the Crown.\n\nWhat happens to the queens horses after her death?\n\nWhat happens to the queens horses after her death?\nAfter the Queen’s last post, her beloved horses didn’t just hoof it to the nearest pasture! The plan’s to keep the regal racing legacy going, but some may be sold at auction. Rest assured, they’ll find homes fit for, well, a queen!\n\nWhat happened to Queen Elizabeth’s horses after her death?\n\nWhat happened to Queen Elizabeth’s horses after her death?\nWhen Queen Elizabeth trotted off into the sunset, her prized horses didn’t just ride off into the great unknown. The royal stable’s still in race-winning shape, with some horses potentially heading to auction. They’ll keep living the high life, just with new postcodes!\n\nDo quarter horses still race?\n\nDo quarter horses still race?\nYou bet your boots they do! Quarter Horses are still tearing up tracks faster than a hiccup. They’re a crowd-pleaser, offering some of the most thrilling blink-and-you’ll-miss-it races. So yes, the need for speed lives on with these equine athletes!\n\nDo they still race quarter horses?\n\nDo they still race quarter horses?\nAs sure as the sun sets in the west, Quarter Horses are still racing like there’s no tomorrow. These compact powerhouses keep the tradition alive, zipping down the tracks in a thunderous display of speed and agility that keeps fans on the edge of their seats.\n\nWho won all American Futurity 2023?\n\nWho won all American Futurity 2023?\nOh, you’ll have to hold your horses for that nugget of info! The All American Futurity is the grand event of Quarter Horse racing, and the 2023 winner will be etched in history come race day. So keep your eyes peeled and ears to the ground – it’s gonna be a barn burner!\n\nWhat two breeds make a Quarter Horse?\n\nWhat two breeds make a Quarter Horse?\nHoofbeats and heritage, folks! The Quarter Horse is an all-American blend, stirred up from English Thoroughbreds and native American Chickasaw horses, which were themselves a mix of Arabian, Barb, and Iberian horses. It’s like a melting pot with a mane!\n\nCan a Quarter Horse outrun a Thoroughbred?\n\nCan a Quarter Horse outrun a Thoroughbred?\nWell, it’s apples and oranges, my friend! Over a short sprint, a Quarter Horse can leave a Thoroughbred in the dust, no sweat. But stretch that track out, and the Thoroughbred will come charging back, outpacing the QH with their long-distance stamina.\n\nWhat does 6F mean in horse racing?\n\nWhat does 6F mean in horse racing?\nAh, the ol’ racing lingo! 6F in horse racing means six furlongs, which is equal to three-quarters of a mile. That’s like taking a leisurely stroll turned competitive sprint that has the horses flying faster than a speeding bullet for those six parts of a mile.\n\nWhat does QH mean in horse terms?\n\nWhat does QH mean in horse terms?\nQH stands for Quarter Horse, and aren’t they a dandy breed? Known for quick bursts of speed, these horses are like the sports cars of the equine world – sleek, muscular, and just raring to go when it comes to a sprint!\n\nWhat does QH mean in horses?\n\nWhat does QH mean in horses?\nQH in horse speak simply means Quarter Horse. It’s the breed that packs a serious punch in small packages, giving you the heart and hustle for a quick quarter-mile that’ll leave you cheering faster than they can run – which is saying something!\n\nWhat’s the difference between Quarter Horse and Thoroughbred?\n\nWhat’s the difference between Quarter Horse and Thoroughbred?\nThink of it this way: a Quarter Horse is like a sprinter—built for explosive speed over short distances. Thoroughbreds, on the other hand, are your marathon runners—lanky, enduring, and made for the long haul. Different races, different paces!\n\nIs a Quarter Horse a Warmblood?\n\nIs a Quarter Horse a Warmblood?\nNope, that’s apples to oranges! Quarter Horses are considered ‘stocky’ with a need for speed, falling into the ‘hot-blooded’ category due to their sprinting skills. Warmbloods? They’re more the European dressage and jumping types—cool, calm, and collected.\n\nLeave a Reply\n\nYour email address will not be published. Required fields are marked *\n\nGet in the Loop\nWeekly Newsletter\n\nYou Might Also Like\n\nSponsored Content\n\nGet the Latest\nWith Our Newsletter<|endoftext|>Brunswick Golf Club\n\nPO Box 246 Brunswick, ME US 04011\n\n207-725-8224\n\n18 holes / 6,300 yd. / Par 72.\n\nSeason: April 1-November 15.\n\nOpen to the Public.<|endoftext|>Golfers want big change for Westview Golf Course\n\n Kristen Aguirre taking a swing at Westview Golf Course\n\n It's tee time at the Westview Golf Course. But if you're not ready to get on the green just yet, the facility has something in the works to warm you up.\n\n Right now if you play 18 holes on a weekend it's between four and five hours,\" Matt Burry said. \"Families don't have that time anymore so they're looking for fast, friendly, family oriented golf courses.\"\n\n If you've been to the Westview Golf Course you may have noticed it's missing something.\n\n \"We get a lot of golfers that say 'we want to hit a bucket of balls before we go play,' we get a lot of that on the weekends from people who are from out of town,\" he said. \"We tell them we don't have a driving range and everyone is always surprised when they hear that.\"\n\n Westview Golf Director Matt Burry wants to help change that. He and the Quincy Park District which owns the facility is proposing a course renovation.\n\n The plan calls for the back nine holes to be redone and the construction of a driving range/practice facility. It's expected to cost at most, $500,000.\n\n \"Building a driving range would be a positive impact for revenue,\" Burry said.\n\n But making these changes to the golf course isn't just about creating more money.\n\n \"We've got to find ways to generate new golfers,\" Burry said. \"There is no First Tee program anymore and we don't have the space without a driving range to be able to do group lessons.\"\n\n Burry, a PGA Golf Pro, will give private lessons at the new range if the plan goes through.\n\n \"I like see more kids out here,\" he said. \"We don't have as many kids as we use to and nationally golf numbers are dwindling. Golf is a sport you can play for a lifetime.\"\n\n The Park District is holding an open forum to hear public input before any plans are finalized. The Westview Golf Course will have that public forum at its open house May 21st.\n\n Plans for the renovations will be available for you to see.\n\n component-story-more_media_horiz-v1-01<|endoftext|>FTRS Q&A Special: History Lesson\n\nDaniel Miller doing what he does best. - Joshua S. Kelly-USA TODAY Sports\n\nWe asked reader Vespula, a basketball-obsessed Jacket since her days as a student in the 70s, to compare the current beesketball team to the ones of yore and give us some perspective on how things have changed. Bone up on your history, or you're doomed to repeat it.\n\nVespula made this interesting comment on a story a while back, and it jumped out of the page to us here at FTRS. Her experienced perspective is one we value here, so we decided to ask her a few questions about the current iteration of beesketball so we might better gauge where we are historically. Her fascinating and vivid answers are below, marginally edited. Enjoy!\n\nFTRS", "num_tokens": 2048} {"category": "common_crawl-sports_and_fitness", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-sports_and_fitness/part-00-00000.npy", "text": " focused on by my family. Games were always on the TV. My father, a Dodger’s fan, he would always catch the L.A. games when they were on. When my dad told me bedtime stories, I heard about Babe Ruth and Lou Gehrig, Fenway Park and Yankee Stadium instead of fairy tales.\n\nHe taught me how to throw, catch, and bat, but he also taught me the history of the game. All through my youth I was a never- ending fountain of questions about baseball, and Dad always seemed to have the answers.Given the way I grew up, it isn’t surprising that my and my dad’s family tradition is going to a major league baseball park each year. We go in August, the dog days of summer when the boys of summer are racing for the pennant and baseball is at its classic point.\n\nThe trip lasts a weekend, Friday through Sunday, so we can catch a weekend three game series. In the spring of each year, Dad and I decide on where we should go. The only requirement is that the park we visit is one filled with tradition and that represents the soul of baseball. Our first trip, two years ago, was to Fenway Park in Boston, Massachusetts. This year’s trip was to Oriole Park at Camden Yards in Baltimore, Maryland. The idea for our tradition came from a trip that my brother and father took to the College World Series in Omaha, Nebraska. Our family was on vacation in north Georgia when we got news that the Seminoles had made it to Omaha. Two days later, my mom and I were dropping my father and brother, Keith, off at Hartsfield International Airport in Atlanta, Georgia so that they could catch their flight to Omaha to see the CWS. After that incident I was jealous, and I decided that a father son baseball trip was in line for Dad and 1. In order to “get back” at Keith for the CWS trip, I play a good- natured joke on him each year. Where and when Dad and I go to the ballparks, are kept secret from my brother. Then, when we get to the park for the first game and the starting lineups are being announced, I call Keith and tell him where we are. The humor, quite obviously, is more on my side than his, but he bears it well. Nothing is left out on the trips that Dad and I take. We get to the ballpark early so we can walk around and see the famous spots of the park. For instance, at Fenway our first stop was the bleacher section next to the Green Monster, and our next was the infamous Triangle in center field and the bullpen abnormally put out in the open of right field. “Seeing the Triangle and how right field really angles in was very unique,” my Dad said of Fenway. At Camden Yards we strolled down Eutaw Street and checked out the plaques cemented into the ground where players’ homeruns had bit. My Dad’s favorite part of Camden Yards was Eutaw Street because “it was like an endless mall.” We also hit up the shops for various sports souvenirs during the first game and sport our new purchases to the last two games, pretending we’re die hard fans of the team. Fenway Park was the first place we went to because of the history surrounding the Red Sox. I first heard of the Green Monster and the Curse of the Bambino when I watched Field of Dreams when it came out in 1988. Also, as I watched the Red Sox stumble though their seasons I became even more intrigued by their history and the legendary park in which they played. When the Red Sox organization announced their plans to build a new stadium, Dad and I knew we had to go see Fenway before it was torn down. Dad was interested in seeing Fenway because of the history of the ballpark, not to mention how small it is for a major league park. Tom Yawkey, savior and former owner of the Red Sox, perhaps said it best when he said “… we’ve got tradition, and amazing years you remember. (Smith 339)” Fenway Park is the oldest stadium in major league baseball. Built in 1912, its features have made it one of the most recognizable throughout the years. Each part, from the left field wall to the right field foul pole, has a piece of history attached to it. The Red Sox beat the New York Highlanders, (now the New York Yankees), by a score of 7-6 on April 14, 1912 in the first game ever at Fenway Park. Coincidentally, this game didn’t make headlines because the papers were reporting on the sinking of the Titanic (redsoxbaseball.com). The park is sandwiched in the middle of Boston, Massachusetts across the river from Cambridge. The massive left field wall, known as the Green Monster, rises 37 feet above the only manual scoreboard left in the majors. A 23 foot screen was added to it in 1936 to prevent baseballs from flying onto Lansdowne Street. The Green Monster got its name from its size, obviously, but also from the green coat of paint that was added to it in 1947 to cover up existing advertisements on it (redsoxbaseball.com). The wall has proved to be a formidable opponent for many hitters in the past, however some Red Sox greats learned to use it to their advantage. Boston legend Carl Yastrzemski, an outfielder, picked up on the nuances of the Green Monster quickly. Yastrzemski, affectionately knows as “Yaz,” played when the Green Monster was still just plywood covered with tin. Yaz was famous for being able to dupe a hitter into thinking he had hit an easy out pop fly, when the hitter had really hit a potential double play ball off of the Wall. Yaz would trot towards the ball, and wing it in to second base, only allowing the hitter a single, and not the double he should have gotten (redsoxbaseball.com). Yaz knew the ins and outs of the Green Monster better than almost anyone. “That was my baby, the left field wall. The Green Monster. And you had to know that a ball hit by a left handed batter would spin off it differently from a right hander’s shot. I’m not even taking into account what would happen when it hit an exposed rivet. Or the two- by- fours. Or the tin. Or the holes in the scoreboard. (Yastrzemski 3)” Part of the mystique that surrounds the Boston Red Sox is the ballplayers that have played for them. Ted Williams, Carlton Fisk, Yaz, Babe Ruth, Pedro Martinez, and Rodger Clemens are just a few of the greats on Boston’s long roster. Experiencing a game in the same stadium that these ballplayers played in was a huge factor for Dad and I to consider. The story of Pudge Fisk’s crazy waving on October 25, 1975 is one that I heard many times when I was little and saw replayed even more often on TV. Boston is the place where Rodger Clemens and Pedro Martinez, two pitchers that Dad assured me from day one would be Hall of Fame boys, pitched Cy Young caliber seasons. And we knew that just seeing the plate where Babe Ruth started his career and Ted Williams hit .400 would surly be an out of body experience. When I was little the questions I had for my father were more about the fundamentals and rules of baseball. I can remember Dad explaining to me what a batting average meant and what was considered a good BA. Batting .400, he used to tell me, was nearly impossible to achieve and that only a few people had ever done it for a season. Naturally he told me about Ted Williams, one of the greatest hitters in baseball. Williams ended up providing yet another reason why Fenway Park was the place to visit on our first trip. Williams played left field from 1939- 1961 for the Red Sox, before he passed the place in front of the Green Monster on to Yaz. He set hitting records and often lead the league in BA, runs, RBIs, and home runs. Williams, known as the “Splendid Splinter,” is most famous for being the last batter in the major leagues to bat .400 for a season. In 1941 he hit .406 while hitting a league leading 37 home runs. Williams won two American League MVP awards (one in 1946, the other in 1949), had a lifetime BA of .344, and belted 521 homeruns in his career (Smith 170). He also won the Triple Crown, given to the player with the best BA, most HRs, and RBIs in a season, in both 1942 and 1947 (Adomites 112-3). Upon Williams’ retirement, Ed Linn wrote “And now Boston knows how England felt when it lost India. (Smith 59)” Another famous part of Fenway Park that both Dad and I wanted to see up close is the left field foul pole. Only in Boston would such an ordinary part of a ball field carry historical significance. It was Game 6 of the 1975 World Series between the Red Sox and the Cincinnati Reds and a catcher named Carlton “Pudge” Fisk that sent the pole down in history. The series was at 3-2 in favor of Cincinnati. The Red Sox were down in Game 6 with two outs in the bottom of the twelfth when Pudge stepped up to the plate and knocked Pat Darcy’s curveball over the Green Monster. The ball sailed high to the left", "num_tokens": 2048} {"category": "common_crawl-sports_and_fitness", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-sports_and_fitness/part-00-00000.npy", "text": "I caught three fish yesterday.\nI caught a beautiful butterfly.\nI caught a glimpse of her face.\nI caught him stealing the money.\nI seem to have caught a bad cold.\nThat old man caught a large fish.\nHe caught a boy stealing his watch.\nThe boy caught the dog by the tail.\nThe policeman caught him by the arm.\nI was caught in a shower on my way home.\nTom was caught sneaking out of the room.\nTom is caught between a rock and a hard place.\nHe caught the nine-o'clock shuttle to New York.\nI seem to have caught cold. I'm a little feverish.\nHe caught the first train and got there just in time.\nHe narrowly escaped from the bus when it caught fire.<|endoftext|>Scottish Bouldering #New Glasgow climbing wall: The Prop Store\n\nTimeline Walks of Scotland #Culbin Sands\n\nPlato's Cave<|endoftext|>Redbridge including:\n\nSafety Nets IG1 ILFORD Ilford, Cranbrook, Loxford Redbridge\nSafety Nets IG2 ILFORD Gants Hill, Newbury Park, Aldborough Hatch Redbridge\nSafety Nets IG3 ILFORD, CHIGWELL Seven Kings, Goodmayes, Hainault, Chigwell (parts) Redbridge, Epping Forest\nSafety Nets IG4 ILFORD Redbridge Redbridge\nSafety Nets IG5 ILFORD Clayhall Redbridge\nSafety Nets IG6 ILFORD Barkingside, Hainault (south) Redbridge\nSafety Nets IG7 CHIGWELL Chigwell, Chigwell Row, Hainault (north) Epping Forest, Redbridge\nSafety Nets IG8 WOODFORD GREEN Woodford Green, Woodford Bridge, Highams Park (part) Redbridge, Waltham Forest<|endoftext|>For the first time in twenty years, the National Hockey League will not be sending players to the Winter Olympics. As the ceremonies begin in PyeongChang, NHL players will remain playing for their teams, rather than their countries. The move was made after careful deliberation of the Olympics’ impact on the league. According to NHL Commissioner Gary Bettman, supporting the Olympics is not in the NHL’s favor. This may mean that the Olympic Games in 2018 will not feature hockey at the highest level, but the NHL will undoubtedly be better off, and most likely more entertaining for fans of the NHL.\nThe main conflict between the NHL and the Olympics is one of scheduling. If the NHL wishes to accommodate the Olympic schedule, as it has done in the past, it would essentially need to take a 17 day break from standard competition. The alternative would be to send out NHL teams that do not feature the best players, who are often the ones fans want to see the most. Neither of these options are ideal. By taking a break, the NHL actually stands to lose money, both from advertisers who normally would place ads on televised NHL games, and also from lost ticket and concession sales. If the NHL continues its schedule while half of the league is playing in the Olympics, then it would be offering a substandard product for its fans.\n\nYour 20% discount here!\n\nUse your promo and get a custom paper on\nThe NHL Says ‘No’ to the Olympics\n\nOrder Now\nPromocode: SAMPLES20\n\nHowever, the second problem created when NHL players compete in the Olympics is the very real chance of injury. During the 2014 Sochi Olympics, several notable players from playoff-contending teams suffered season ending injuries, including Henrik Zetterberg of the Detroit Red Wings, John Tavares of the New York Islanders, and Tomas Kopecky of the Florida Panthers. Many other players suffered minor injuries that very well may have cost their team a chance at even making the playoffs. The Winter Olympics therefore present a very real chance of injury for NHL players, and the NHL has nothing to gain in return. By playing in the Olympic tournament, players who do not suffer injuries will still more likely be overextended from having to play extra games, and the players who guide their national teams the furthest in the tournament will be the ones most affected by the extra-long schedule. However, because the Winter Olympics take place in February, this is the time of year when NHL teams begin jockeying for playoff seeding.\n\nAs a result of all the challenges created in accommodating the Olympic schedule, the NHL has decided to say no to the Olympics, and that is a good thing if one is a fan of NHL hockey. Players will not be exhausted, matches will be more exciting, and every fan can count on his or her favorite team making its best possible effort in winning the Stanley Cup. Although some may lament not seeing their favorite players playing for a national team, there simply isn’t enough benefit for the NHL in allowing its players to leave mid-season. The Olympics may have given us some exciting moments in the past, but perhaps the most famous Olympic hockey team of all time, the 1980 team, was also comprised of amateurs. No one was complaining when non-professional hockey players took home the gold; their non-professional status was what contributed to their place in history as one of sport’s most inspirational teams ever assembled. And as for those who might complain that the Olympics will not feature the best hockey imaginable, they can still catch the greatest level of competition being played in the NHL.<|endoftext|>Stone: shooting at slower than box speed is more exposure and will give you thicker negs, not thin, unless you're reducing development far, far too much. It's the opposite of pushing. Shooting it at lower speed means you can reduce development and therefore tame the contrast a bit. Gives you a longer tonal scale and less risk of unprintable negs.\n\nAnyway, my typical Pan-F (EI25) development is 6:30 in Rodinal 1+50, rotary. What also looks good at EI25 is D76 1+3 (therefore no solvent action) for 14:00, traditional inversion development.\n\nDefinitely agree that you should shoot, develop and print a test roll or two beforehand to make sure you have the process at least approximately dialed-in.<|endoftext|>17 Jun 2024\n\nJürgen Falke, former Merida R&D Center CEO and Head of Product, has passed away\n\nIt is with deep sadness and a heavy heart that we have to announce the death of our esteemed colleague Jürgen Falke. The long-standing CEO and co-founder of MERIDA R&D Center GmbH, who recently stepped down from his position for health reasons, passed away much too early on the 13th of June 2024 at the age of 61 after a short, serious illness. Our thoughts and condolences are with Jürgen’s wife, children, family and friends.\n\nInitially working for the CENTURION brand, Falke successfully transferred his passion for triathlon to the traditional Swabian brand under the leadership of company founder Wolfgang Renner. In 1997, Thomas Hellriegel won the Ironman in Hawaii with the Helldrive he developed. A passionate triathlete himself, Falke took part in this legendary competition twice. He was also instrumental in the success of the ground-breaking No Pogo MTB model, which was voted ‘Bike of the Year’ in 1997. Under Falke's aegis, the Shimano European Design Contest was also won twice. Together with CENTURION founder Wolfgang Renner, he negotiated the joint venture between MERIDA and CENTURION in 2000.\n\nAnother milestone in his career was the success story of the MULTIVAN MERIDA BIKING TEAM with cycling legends such as Gunn-Rita Dahle Flesjå, José Hermida and Ralph Näf. Multiple World Championship titles, numerous World Cup victories, as well as a silver and a gold medal at the Olympic Games on the NINETY-SIX and BIG.NINE have cemented its reputation as the best and most successful mountain bike team in the world. For Falke as a developer, there was no greater honour than to see the bikes he designed, such as the SCULTURA, REACTO and WARP, win at the highest level. With stage wins at the Tour de France, the Giro d'Italia, victories at cycling monuments such as Paris-Roubaix and Milan-San Remo or the 2023 Gravel World Championships, Falke has continued this success story until recently.\n\nWhen the MERIDA R&D Center GmbH was founded in 2014, Jürgen Falke was appointed Managing Director and played a key role in the development and design of the entire MERIDA product range, up to and including the most recent, highly successful racing bikes of the BAHRAIN VICTORIOUS WorldTour team.\n\nWith the passing of Jürgen Falke, MERIDA Taiwan and the MERIDA R&D Centre GmbH have lost a visionary at the height of his creative powers, who shaped and influenced the development of the brand for over 20 years.<|endoftext|>People often wonder, \"Why do I need a running coach?\" Or sometimes, \"I think I need a coach, but are you a good match?\"\n\nGlad you asked! Let's cover some simple stuff.\n\nI offer personalized service and not a one-size fits all plan from a book. Someone who works full time and has a special circumstance will have a different plan than someone who has a more free daily schedule. Each goal is athlete-client specific, so why wouldn’t the plan to reach said goal be just as specific?\n\nWhat do people ask me most often?\n\n\"Have you always run?\", \"Do you run the whole thing?\", \"How long does it take you to run (some specific distance)?\"\n\nWhat SHOULD people ask more often?\n\n\"How do you prepare?\", \"What else does it", "num_tokens": 2048} {"category": "common_crawl-sports_and_fitness", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-sports_and_fitness/part-00-00000.npy", "text": "berg makes the 500 in two broad categories: field models for hunting purposes, and special-purpose models. Field models are available in a variety of barrel lengths and finishes (including modern camouflage patterns), and with sights or optics.\n\nIT IS IMPORTANT:  Can you shoot sabot slugs through a smooth bore with a rifled choke?\n\nWhats the difference between a Mossberg 500 and 590?\n\nThe Mossberg 590 Shotgun is the upgraded version of the Mossberg 500 that is specifically designed for LEO, Military, self-defense, and 3-Gun competitions. the 590 can be used for hunting, but it’s not recommended because the barrels are shorter and there is less adjustment in the choke.\n\nWho makes Mossberg shotguns?\n\nO.F. Mossberg & Sons\nMossberg 500\nИскать: Who makes Mossberg shotguns?<|endoftext|>Super League score at the end of the league regular season\n\nTop for PAOK! Or after the “geles” AEK and Panathinaikos before the playoffs, but also Olympiacos’ victory over Volos. The normal duration of the Super League was completed on Sunday (03.03.2024) with the simultaneous conduct of the seven games and PAOK and Olympiacos being the big winners, while AEK and Panathinaikos “left” points away. PAOK’s 2–0 victory in Lamia and the incredible 3–3 in Mars – AEK, threw the union from the top of the scoreboard, with the Thessaloniki players going up to first place. Olympiacos “trodden” Volos (3–0) and went up to third place, in front of Panathinaikos who brought a tie to the seat of OFI (2–2). We recall that on Monday (04/03) at 15:00 the draw of the playoffs will take place and a quarter later the playouts will follow. The center in the two mini leagues is scheduled for the weekend 9 and 10 March and the 2nd race for the 16 and 17 of the same month. However, it should be recalled that there is a request for the EPO in the League in order to postpone the 2nd race, so that international players can gather earlier in view of the EURD playoffs for our National Team. A request, which will also be discussed tomorrow… The results of the last (26th) race: Kifisia-Panatolic 2-2 Lamia-PAOK 0-2 Olympiacos- Volos 3-0 The final score in the regular duration of Super League 1 PAOK 60 2 AEK 59 3 Olympiacos 57 4 Panathinaikos 56 5 Mars 42 6 Lamia 34 7 Star of Tripoli 31 8 Atromitos 28 9 Panseraikos 27 10 OF 25 11 Panetolikos 20 12 Volos 20 13 Kifisia 19 14 PAS Giannina 18\n\nExit mobile version<|endoftext|>Rowing Getty Generic General\nGetty Images\n\nAfter 34 days and more than 2,400 nautical miles, four female rowers made history on Tuesday morning by wrapping up their journey from California to Hawaii in record time. \n\nLibby Costello, Sophia Denison-Johnston, Brooke Downes and Adrienne Smith -- part of team LAT35 -- were a little wobbly when getting off the boat but they couldn't stop smiling as they were greeted by leis and hundreds of cheering fans. They began the Great Pacific Race in San Francisco on June 21 and finished in Honolulu on July 26.\n\n\"I feel totally overwhelmed in the best way by love. And I'm also exhausted,\" Denison-Johnston said in an interview with Good Morning America.\n\nThe women documented their trip on social media, and shared the not-so-glamorous parts of breaking a world record. The full trip took a total of 34 days, 14 hours and 11 minutes, breaking the previous record of 35 days 12 hours and 22 minutes set by Ocean Sheroes in the 2021 Great Pacific Race. To accomplish this, the four women endured seasickness and rough seas while taking turns doing two-hour shifts and only averaging 90 minutes of sleep per day. \n\nOnce in a while, the women jumped in the water to check for barnacles and other growths because that build up could slow them down. Otherwise, their time was fully spent on the boat.\n\nThe feat required immense energy, so even though each woman was consuming between 4,000 and 6,000 calories per day, they still lost weight. Most of their food consisted of canned goods, boil-to-order meals and even baby food because it is easily storable. There were a lot of dehydrated meals, but sometimes they treated themselves with fruit. To keep things positive and fun, Denison-Johnston even got her teammates to deliver \"Uber Eats\" to her during her break.\n\nThis was not an easy journey, but the rowers made the best of it and even took time to make fun social media content, including a video about how they are \"living life.\"\n\nIn their interview with GMA, LAT35 said they were glad they got to share their journey on social media because they wanted to inspire others to go after their goals.\n\n\"I think something that I want people to take away is that these women are so incredible but we're not superhuman. There's nothing that we were born with that makes us any different than anybody else,\" Downes told GMA.\n\nWhile their main goal was to break the women's world record for the fastest four-rower team, the women also took advantage of their growing popularity and decided to raise money for the Anxiety and Depression Association of America.<|endoftext|>Breaking Exclusive: Titans Issue Statement\n\nRyan Clark\n\nWrestleZone.com just received the following statement moments ago from the Tennessee Titans:\n\nRegarding Adam Jones\n\n“In June we stated that we didn’t expect to comment on Adam Jones until his suspension was complete. Regrettably, we feel it necessary to explain our action today.\n\n“Today we filed a motion in Williamson County asking for a court order preventing Jones from participating in any wrestling activity. All NFL players have language in their contracts that prohibit them from engaging in activities ‘which may involve a significant risk of personal injury.’ We certainly believe wrestling to be hazardous and it is obvious from the player’s conduct that he is ignoring this aspect of his agreements with the club. As an organization, we feel it is our obligation to protect our rights in this instance.”\n\nHave a news tip? Attended an event and want to send a live report? Submit it now!\nmonitoring_string = \"851cc24eadecaa7a82287c82808f23d0\"<|endoftext|>Amar’e Stoudemire: How Will The Bench Fare Without New York Knicks’ Forward\n\nAmar’e Stoudemire has been on a windy road during his time in New York. When he signed here, he was our savior. When we traded for ‘Melo, he was our number 2. Last season, he was our burden. And this year, he’s been our seventh man? It’s interesting to look back at all the different roles STAT has played since joining the Knicks, and how he has changed as a player. Sadly, yesterday the team announced that STAT would be out for 6 weeks due to a right knee debridement he needs later this week.\n\nFrom the face of the franchise to the face of the bench. Stoudemire has battled through injuries for a sizable amount of his time in New York. He has had back problems, a self-inflicted hand laceration, and more recently his surgically repaired and uninsured knees have been bothering him. He had been playing terrific as of late, and seemed to be in top form.  He accepted his role on the bench after returning from injury, and impressed many with his poise and play.\n\nHe’s averaging 14.2 PPG and 5.0 RPG, and his shooting percentage is the 2nd highest of his career at 57.7%. These are impressive numbers when you consider he plays just under 24 minutes a game. When you look at his stats per 40 minutes, he is averaging 24 points and 9 rebounds, which would make people think twice about calling him past his prime and a non-elite player.\n\nAmar’e’s play has given a huge boost to the bench, and allowed for Coach Woodson to have a player to run his offense through when ‘Melo is resting. The bench has recently been playing a factor in wins due to the increased strength of its play. J.R Smith, Steve Novak, Pablo Prigioni, newly signed Kenyon Martin, and newly benched Jason Kidd have played extremely well while the team went 6-2 in the last eight games.\n\nWith Amar’e gone, the bench will need to continue their improved production, especially while ‘Melo is still out with his knee injury. That means that players like Kenyon Martin and Marcus Camby need to step up their game and anchor down the front court. Last night against the Jazz, they did exactly what they were needed to do. K-Mart had 10 points, 6 rebounds, and 2 steals, while Camby did a little bit of everything recording an assist, steals, a block,", "num_tokens": 2048} {"category": "common_crawl-transportation", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-transportation/part-00-00000.npy", "text": ".<|endoftext|>Three more modernized L-39ZA Albatros to boost Nigeria’s air power\n\nThe Nigerian Air Force has received three L-39ZA Albatros jet trainers from the Czech Republic that were sent in 2020 for repair and modernization.\n\nThe three Albatros underwent extensive overhauling and modernization at the Aero Vodochody Facility in Pardubice airbase, Czech Republic to enhance their aerial capabilities.\n\nThe delivery is part of a contract signed two years ago to upgrade the three Nigerian Air Force aircraft.\n\nAn Antonov An-124 transport plane loaded them and transported them to the Pardubice base in the Czech Republic.\n\nFollowing two years of overhaul, the aircraft flew on their axis to reach the Kano home base.\n\nThe upgraded features of the Nigerian aircraft include an electronic flight instrument system that facilitates the digital display of flight data in the cockpit and a heads-up display.\n\nThe new additions will enable pilots to train in a fully digital cockpit before operating the JF-17 fighter aircraft.\n\nThree Aero test pilots covered the 5,000km route from Vodochody to Kano in four days.\n\nWhile each pilot spent 13 hours in the air, they stopped over at Dijon (France), Valencia (Spain), Ghardaie (Algeria), Tamanrasset (Algeria), and Agadez (Niger), before reaching Nigeria.\n\nAero regional sales director Vladan Resner said: “Flights on their own axis are much more demanding organisationally, especially in terms of logistics and the requirements for coordination of individual activities.\n\n“Not only is it necessary to arrange permission for military aircraft to fly over the territory of all states, but also to provide additional support such as escort aircraft with crew and mechanics, fuel and oxygen supply at all stops, or to ensure the safety of the crew during stopovers.\n\n“All of this requires the perfect synergy of the entire team of experts not only from Aero, but also from other external institutions, which in this case worked perfectly.”\n\nThe three L-39ZAs joins another three that were earlier overhauled and upgraded in Czech on 2020. These batch arrived in July.\n\nOne of the three pilots shared that the last stage seemed to be the most difficult. Before the planes headed for the runways at Kano Air Force Base, the weather conditions were very poor.\n\nThunderstorms over the airport and heavy downpours complicated the landings of the three planes. However, the three successfully landed using a suitable meteorological timeframe.\n\nGenesys Aerosystems’ avionics systems\n\nAt least, six L-39ZAs have been modernized with the Genesys Aerosystems’ avionics systems. The contract for the upgrade was awarded to Aero Vodochody last year.\n\nGenesys Aerosystems is a provider of integrated avionics systems for military and civil customers, the company’s Genesys EFIS is an avionics solution for special-mission aircraft.\n\nThe 3D Synthetic Vision IDU EFIS, according to Genesys Aerosystems enhances safety, reduces pilot workload, increases flexibility, and lowers cost of of operations.\n\nAdditionally, for convenience during piloting, the Czechs have installed a heads-up digital display.\n\nNigeria’s L-38ZA Albatros fleet\n\nNigeria purchased 24 Aero L-39 Albatros armed jet trainers in 1986 to 1987 to replace its aging fleet of eight Aero L-29 Delfín jet trainers, and 10 P-149D trainers.\n\nEarlier, to enhance its aircraft availability ratio, the Nigerian Air Force (NAF) completed the in-country reactivation of five L-39ZA combat trainer aircraft.\n\nThree L-39ZAs were reactivated in 2019, while an additional two reactivation were completed the next year.\n\nThe aircraft reactivation was conducted in collaboration with Aero Vodochody of the Czech Republic -the Original Equipment Manufacturers, with the active participation of NAF engineers and technicians.\n\nSo far, eleven airframes are airworthy and fit for combat, including six modernized with the with the Genesys Aerosystems’ avionics systems.\n\nSubsequently, four Nigerian Air Force (NAF) pilots completed their air combat training at LOM Praha’s CLV flight-training center in September 2021.\n\nState-owned Czech company LOM Praha began training the Nigerian pilots in the first half of 2018 at the CLV Pardubice air training center in the Czech Republic to improve their air-to-air and air-to-ground combat skills.\n\nThe NAF pilots completed 150 hours of training on the L-39C at LOM Praha flight training centre (CLV) Pardubice in Czech Republic.\n\nThe L-39ZA Albatros will be used by Nigerian airmen for training before they sit in the cockpit of the CAC/PAC JF-17 Thunder. Nigeria acquired three fighters of this type in late 2020.\n\nExit mobile version<|endoftext|>Toyota's sterling quality and resale reputation could never quite overcome the Japanese automaker's emphasis on \"mini\" with its family conveyances. The original, tiny-wheelbase Toyota minivan, the Previa and even the last-generation Sienna were always smaller than the segment leaders.\n\nLessons learned by admittedly scrutinizing the Dodge Caravan and Honda Odyssey have resulted in an all-new Sienna that is larger in every significant measurement than the model it replaces. And, the Sienna incorporates most of the segment's popular features and clever concepts. Designed, engineered, and built in America, the 2004 Sienna rolled out of the Indiana factory swinging.\n\nMeasuring 200 inches from nose to liftgate, the new Sienna stretches six inches longer than the model it replaces, with a 5.1-inch-longer wheelbase and four-inch-wider stance. Now, Toyota has a product sized like segment leaders, Grand Caravan and Odyssey, being within an inch of most exterior dimensions. The Sienna interior reflects the increased dimensions by claiming 45 more cubic feet of volume than its predecessor, offering noticeably more people and cargo toting space.\n\nLooking like the overgrown progeny from a Previa and RAV4 mating, the large Sienna attempts to set the benchmark for minivan design. All the basics are represented, including standard V-6, powered dual sliding doors, seven- and eight-passenger configurations, available side-sliding second row, fold-away third row, parking assist, power liftgate, optional all-wheel drive, and enough cupholders to accommodate all riders and fistfuls of Legos.\n\nCloser inspection reveals a well-thought-out minivan, resplendent with Toyota hallmarks of quality, low NVH, and operational smoothness. Our XLE Limited tester was dressed in faux wood trim, leather upholstery, satin-finish metal accents, and chrome highlights, granting the interior an upscale, daresay Lexus, feel. The strong, clear 360-watt JBL Synthesis audio system with 10 speakers, including a center channel and subwoofer, added to the premium experience. However, the LCD audio display is hard to read in broad daylight. Other upscale features include tri-zone automatic climate control, HomeLink, rear audio controls, heated seats, trip computer, anti-theft system, automatic cruise control, high-intensity discharge headlamps, and stability control.\n\nThe front bucket seats are wide and soft, like most Americans, shaped with gentle contours. Among the finest minivan seats, these perches offer generous arm and legroom. Likewise, the second row offers abundant space in all dimensions. Move back to the third row to discover adequate room for an average-sized adult on limited excursions -- high praise for what are often considered the penalty seats. Access is aided by a second-row, passenger-side bucket seat that can slide inboard, though a traditional bench is also available.\n\nStorage space is abundant, with a change holder, large console, and sizable map pockets to swallow road trip sundries, still leaving seven cupholders accessible from the front row for beverages or small items. The length of the rear cargo space (behind third row) is limited, but Toyota overcompensates with deep wells that could accommodate very tall items, keep groceries in place, or house the rear 60/40 seats when folded back.\n\nThe conversion to flat-floored cargo hauler allows for the requisite 4x8-foot sheet to fit within the vehicle. The process is straightforward, with second-row removal and rear folding back, though the Honda \"magic\" rear seat is slightly easier to operate.\n\nMotivation for the 4300-pound minivan comes from a new corporate 3.3-liter V-6 producing 230 horsepower and 242 lb-ft of torque. Matched to a five-speed automatic transmission, the Sienna fuel mileage is rated at 19 city/27 highway while earning the distinction of being an ultra-low-emissions vehicle.\n\nInitial response is gentle, allowing for a smooth launch and easy modulation for parking lot patrols -- both important for a family vehicle likely to be regularly at school or the mall. Step into it like you're late for a PTA meeting and the silken V-6 delivers satisfying thrust, proving the strength of this powerplant in every application. Heavy acceleration has the tranny holding the gear for maximum power, but modest driving is met with near-imperceptible shifts.\n\nSteering effort is higher than most Toyotas, which for us is a good thing. It is relatively responsive yet remains isolated from harsh feedback. Likewise, the suspension is Camry compliant and the vehicle is quite controlled for its weight, height, and damping.\n\nNo minivan would be complete these days without a few \"surprise", "num_tokens": 2048} {"category": "common_crawl-transportation", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-transportation/part-00-00000.npy", "text": " doing this, the auto glass computer chip guards the chips from staying damaged in the accident maybe in a visible impact.\n\nAutomobile goblet vehicle repairs can be a requirement for virtually any motorist. Most major maintenance to the window on the vehicle are performed for an automatic window repair shop. Repair shops are capable of take away the chips, breaks and blemishes and potato chips in a very auto’s windshield correctly and easily. In many instances, car windows fixes can be completed in some day.\n\nWhen gonna an automobile a glass repair shop, be sure you inform your staff regarding your precise windows challenge. Face it about the difficulty you have and make sure they know you will want their assistance when you get the job performed correctly initially.\n\nSince auto glass vehicle repairs are incredibly vital, many vehicle wine glass repair centers impose by scheduled appointment, if you do not want them to be removed and consider your car. To get a good go shopping, complete a detailed search online. Additionally you can try wonderingfamily, or company-staff for advice.\n\nWhen going to an auto a glass fix, be sure to pack your car or truck’s insurance policy and in order to register files for them to find out contrary is inappropriate while using vehicle. In most declares, they will often also need to reveal to you proof of liability insurance.\n\nIn an automatic cup fix, the specialists will substitute all chips, dents and chips or poker chips inside car windows. Most blemishes and snacks is usually remedied by exchanging the cup with new and quality fabric.\n\nOnce the automobile wine glass repair, your goblet needs to be cleaned out and washed decrease ahead of concerning-utilizing the chip guard. whether it is provide. You must use it at the very least 1 day in advance of generating yet again.\n\nWhen driving a vehicle, constantly stick to all visitors indicators and signals for basic safety uses when taking your window vehicle repairs in your car, unless you have it. Be sure you put on your safety belt and maintain the glass windows right down to stay away from impacting any person or something. Whether it is ruined, achieve this if you can.\n\nIf you treasured this article and you simply would like to receive more info regarding hightech-autoglass.com i implore you to visit our own website.\n\nHad you been considering the material for this report, here are some far more pages with a similar content material:\n\nClick through the up coming article\n\nsimply click the up coming webpage<|endoftext|>Mobility MeetUp @Marseille by Padam Mobility\n\nSee you in Marseille on Thursday, March 9, 2023, for the Mobility MeetUp, starting at 2:00 pm.\n\nPolicy makers, transport operators, digital solution providers, consultants, urban planners, sociologists, entrepreneurs…\n\nWe all agree that thinking about mobility requires the association of 360° expertises. As a player in the mobility sector, we have decided to launch our first ever MeetUp event, based on the observation that the opportunities for inter-expert meetings are sometimes lacking, because the formats are either too specific or too broad.\n\nOn the agenda, experts from various backgrounds will speak on the following topic: what kind of public/private dialogue is needed to provide better service to users in low-density areas?\n\nThe idea? To bring together different points of view and make known initiatives with a focus on the challenges encountered in the southern region:\n\nAlternation between high and low population densities in a complex territory\nGeological and topographical constraints: coastal areas, mountains…\nSeasonality of mobility needs\nAging population\n\nJoin us for a friendly exchange followed by a networking moment.\n\nThe detailed and definitive program will be communicated to you very soon.\n\nRegister: Here!\n\nCheck out more events: https://mobilitymakers.co/mobility-events-calendar\n\nThe event is finished.\n\nThis website uses cookies to enhance your overall experience. By using this site, you consent to the use of cookies per our cookie policy<|endoftext|>After the shocks that emerged in a Senate committee hearing last Friday concerning pilot training and airline safety in Australia, the inquiry has been extended to May 4.\n\nIt is understood the inquiry, chaired by Senator Bill Heffernan, will recall the CEO of Qantas, Alan Joyce, the Jetstar Group CEO, Bruce Buchanan, the chief commissioner of the Australian Transport Safety Bureau, Martin Dolan and the CEO of the Civil Aviation Safety Authority, John McCormick, and seek the attendance of Virgin Blue CEO, John Borghetti, who did not attend last week’s hearings at which his airline offended some of the committee with the dismissive brevity of its written submission.\n\nIt is further understood that some of the those the inquiry wishes to question further are keen to be recalled, after a hearing that was crammed with fresh information and gave rise to dozens of additional questions on notice including to representatives of a range of private pilot training organisations.\n\nDuring that hearing Senator Heffernan raised an incident involving a near wheels-up landing by an Australian registered A330. Heffernan’s disclosure caused confusion at the witness table for the Qantas entourage in which Joyce said there was no incident, and Buchanan said he thought it was a Jetstar A330 at Singapore Airport. (Which it was, and which is being investigated by CASA.)\n\nThere was similar disarray when Senator Nick Xenophon, who had instigated the inquiry, ambushed Joyce over the existence of a letter from CASA demanding an explanation of a series of 15 “stick-shaker” incidents involving Qantaslink Dash 8 turbo props in which the airliners, which operate many of the flights politicians use to complete their trips to Canberra, were put in imminent danger of stalling.\n\nOnly one of those incidents had been previously disclosed to the travelling public through a report in Crikey blog Plane Talking, and that involved a first officer disobeying the instructions of a captain to abandon an unstable approach to Sydney Airport and go around.\n\nInstead, the junior pilot persisted with the dangerous approach, causing two “stick-shaker” warnings within 10 seconds while it was dropping towards the airport from the direction of Botany Bay.\n\nThis incident was of major safety concern yet air-brushed in the ATSB report into a short document that escaped general media attention, after being released too late in the day to make any of the papers.\n\nThe senators are also understood to have unfinished business in relation to their reference to examine the near crash of Jetstar A320 during a missed approach to Melbourne’s main airport on July 21, 2007.\n\nCritiques of the differences between the Qantas/Jetstar submission to the Senate inquiry over this incident and the testimony of the ATSB and CASA, have been published by Plane Talking.\n\nPeter Fray\n\nInoculate yourself against the spin\n\nGet Crikey for just $1 a week and support our journalists’ important work of uncovering the hypocrisies that infest our corridors of power.\n\nIf you haven’t joined us yet, subscribe today to get your first 12 weeks for $12 and get the journalism you need to navigate the spin.\n\nPeter Fray\nEditor-in-chief of Crikey<|endoftext|>See-Through System turns view-blocking vehicles transparent\n\nSee-Through System turns view-...\nAn LCD built into the driver's windshield allows them to \"see through\" the bus that they're behind\nAn LCD built into the driver's windshield allows them to \"see through\" the bus that they're behind\nView 1 Image\nAn LCD built into the driver's windshield allows them to \"see through\" the bus that they're behind\n1/1\nAn LCD built into the driver's windshield allows them to \"see through\" the bus that they're behind\n\nNobody likes being stuck behind a large, slow-moving vehicle on the highway. Not only does it hold you up, but it's also difficult to see around, in order to check whether or not it's safe to pass. Prof. Michel Ferreira and his team from Portugal's University of Porto, however, have come up with what could someday be a solution to that problem. It's an augmented reality system that lets drivers see right through the vehicle that they're following.\n\nThe technology is known as the See-Through System, and it works – or could work, in its finished form – as follows ...\n\nLarge vehicles such as transport trucks and buses are equipped with a forward-facing webcam on their windshield. Cars, meanwhile, have a transparent LCD screen built into their windshield. When a driver gets stuck behind one of those bigger vehicles, they have the option of wirelessly receiving a live video feed from its windshield camera. The transmitted footage is displayed on the car's windshield LCD in such a way that it lines up with the actual through-the-glass view of the back of the larger vehicle.\n\nAs a result, the driver is able to see what the road in front of the blocking vehicle looks like, in the position that the vehicle occupies on the road.\n\nSo far, the system has been tested in both a driving simulator, and on an actual vehicle traveling on the road. While it definitely shows promise, there's currently still a 200-millisecond delay in the video transmission. That might not seem like much, but as pointed out in a report in New Scientist, it's enough to make an oncoming car appear 10 meters (33 ft) farther way than it really is, if both vehicles are traveling at 90 km/h (56 mph).\n\nThe See-Through System has been in development since at least 2010, although it gained new attention when it was presented at the International Symposium on Mixed and Augmented Reality this month. It's demonstrated in the video below.\n\nSource: Instituto de Telecomunicações (paper) via New Scientist\n\nSee-Through System: an overtaking assistance system\n\nVery ambitious with a lot of single points of failure. The burden being largely on the driver of the bus to keep his camera equipment clean and functional. Additionally, the bobbing window can be distracting in", "num_tokens": 2048} {"category": "common_crawl-transportation", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-transportation/part-00-00000.npy", "text": "boat was launched at 12.10pm to a Kayaker in difficulties 300-metres off Island Wall, Whitstable. A second Kayaker was nearby waving for assistance. The lifeboat crew had observed that the casualty was ‘slumped forward onboard his craft and then seen to overturn.\n\nThe lifeboat came alongside the male casualty 1-minute after launching and he and his kayak brought onboard the lifeboat, conscious and breathing but exhausted and taken ashore at the lifeboat station. No immediate casualty care was needed but advice was given to seek medical attention if there were any later signs of feeling unwell. He was then released into the care off his fellow kayaker who had made his own way ashore.\n\nWhitstable lifeboat trainee helmsman Liam Sidders said ‘The casualty did all the right things, he was wearing a good quality lifejacket and stayed close to his friend and signalled for help when he became incapable of making it back to the shore. It was a relatively straightforward job for us and all ended well’.\n\nAn hour later the lifeboat was launched again to a report of an inflatable kayak drifting off Admiralty Walk, Seasalter. The lifeboat arrived at the location but found no trace of the craft and the crew therefore commenced a search of the area but were ‘stood down’ when the coastguard confirmed that the 1st informant had reported that the occupant of the craft was now safely ashore.\n\nThere have now been 56 calls on the stations volunteer lifeboat crews so far this yeariss Lewis of London who passed away in 2006.\n\nShe is what is known as a rigid inflatable inshore lifeboat, the boat’s rigid hull being topped by an inflatable sponson. She carries a crew of four people.\n\nRNLI media contacts\n\n • Chris Davey, Volunteer Lifeboat Press Officer, Whitstable Lifeboat Station.\n 07741 012004/ nativephoto@hotmail.com\n\n • Paul Dunt RNLI Press Officer London/southeast/east Tel: 0207 6207416 Mob: (07785) 296252 Paul_D<|endoftext|>Hit-and-Run Crashes the Norm in Chicago Pedestrian Deaths\n\nStandout site Grid Chicago is doing the dirty work of a safe streets blog, keeping a “fatality tracker” to count how many lives are claimed between Windy City curbs. The tracker measures three things: pedestrians killed, cyclists killed, and transit riders killed.\n\nA woman was killed in Chicago this year trying to cross this intersection at 17th Place and Halsted Street. The hit-skip driver was not apprehended. Photo: Grid Chicago\n\nOf course, this is sad business, and it brings some outrageous statistics to light. Today’s shocker: 83 percent of this year’s known Chicago pedestrian fatalities have been hit-and-run collisions. Steven Vance reports:\n\nFour weeks later and three blocks away from a doubly-deadly car crash in March, 50-year old Cynthia Hoff was killed while crossing 4200 South block of Western Boulevard (the street on the east side; the west side street is Western Avenue). This makes the sixth pedestrian death and fifth hit-and-run pedestrian death in 2012, bringing our rate to 83%. While researching for this article, I came across a hit-and-run pedestrian death that I didn’t previously report, that of Aaliyah Kalimullahdunn at 80th Street and Ashland Avenue.\n\nWhenever I talk about traffic safety, I, without pause or reservation, bring up the fatality statistics the Netherlands “enjoys”. And it is enjoyment that so few people will have to die on their roads in a year compared to the United States, Illinois, and Chicago, even after adjusting for population and time or distance spent on the road. I can imagine how outraged the people of the Netherlands would be if they saw that their traffic safety rate was degrading. See how citizens reacted to a particularly bad crash (that had zero fatalities). The country is such a model for safe transportation that Alderman Solis and two CDOT workers were sent there.\n\nWe should be outraged that a single person dies. We can change our culture (see what transportation commissioner Gabe Klein has to say about our culture), and we can change our roads.\n\nElsewhere on the Network today: The Urbanophile looks at the workings of infrastructure banks and wonders why this transportation financing method has gained such cachet. Burning the Midnight Oil wonders whether a “cap and trade” fund could be used to finance California high-speed rail. And M-bike.org examines Amtrak’s efforts to be more bike friendly.<|endoftext|>1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.\n\nTire pressure/temp rule?\n\nDiscussion in 'RACE 07 - Official WTCC Game' started by Mike Coleman, Mar 18, 2009.\n\n 1. Let's say my inner tire temp is 8 degrees too low. So I want to raise my tire pressure. But how much do I raise it to get 8 degrees of heat?\n\n Is there a rule? e.g. every pound of psi = x degress of temperature?\n\n I usually click the plus sign once for every degree of heat I need to go up lol or click the minus once for every degree of heat I need to go down.\n\n It's not totally accurate but it's close :p\n\n What do you guys do?\n 2. Warren Dawes\n\n Warren Dawes\n Premium Member\n\n I find it varies greatly depending on the track and type of car I'm driving. Normally I do it by trial and error but the amount of adjustment is about the same order as you.\n 3. If you want to cause effect in your inner/outer temperatures, use the camber to do it. If you want to raise the center temperature, use the tyre pressure.\n Note that the best results will be achieved when you you get inner>center>outer temperature (like 95>92>88). But sometimes, depending on the track and on your driving style, this can't be achieved.\n But ok, knowing that, how much should you alter those parameters to get the exact response you want? Then I think exactly like Niklas, you have to try every change on track.\n 4. Ok, I'd like to add that camber more creates difference between inner and outer temps, not raising them, but increasing the difference.\n\n Pressure raises the middle temp compared to outer / inner temps, and probably raising the temps overall too, but not that dramatically compared to middle temp raise difference.\n\n But how do one inrese tyre temp overall? Higher springs? Caster? Toe in? in which way ?\n Can somebody add their 2 cents?\n 5. Dave Stephenson\n\n Dave Stephenson\n Technical Administrator Staff Member Premium Member\n\n stiffer springs can help but of course you need to balance that, as it can have a detrimental effect on the handling and speed of wear of the tyre.\n 6. Petr,\n your question is the 1 million dolar question. Almost everything have some impact on tyre temperature, but certain things have more impact.\n If you want to increase the temps overall, stiffen your springs, but the change is not gonna be dramatic.\n The same thing can be said about decreasing tyre temps. What to do if you're with softer springs, and everything else to decrease the tyre temps, but they still don't decrease??? There are some tracks that cause this effect on the tyres and it's not possible to do anything. You're gonna have to do more pitstops than usual unfortunately. The same thing hapen to the low tyre temps. There are some tracks that are gonna make some of the tyres stay too low...\n 7. I think the best you can do is, that to accept, that overall tyre temp is what it is, depends on the track, the track temp conditions and driving style, and dont try to influence it with car setup, just adjust the inner outer and middle to optimal.\n Maybe with dramatic suspension changes you can achieve 1-2 C difference, but with this you are sacrifising your otherwise nice balanced setup. It simply does not worth the hassle, and you are loosing with it more, then with a good balanced setup.\n 8. Excelent point, Attila. Pretty well said! That's it!\n 9. Nice to see you lurking around and paying some interest again lately Atti, and I believe we have done this \"dance\" on tyres once before..\n\n Mike ... see this thread for a huge discussion on tyre pressures and temps, what affects them and how etc etc :thumb:<|endoftext|>The Acura MDX offers an outstanding V6 powertrain, seven-passenger seating and an all-wheel-drive system that prevents skids almost before they happen. Neat styling, attention to detail, excellent crash protection and competitive pricing increase the appeal of this luxury SUV.\n\nIntroduced in 2001, MDX was named North American Truck of the Year by a panel of 50 independent automotive journalists. Through the five model years since, the MDX has been steadily improved in all areas.\n\nThe body has grown more rigid, allowing better vibration control and a smoother ride. Power has increased, and a more compact five-speed automatic transmission shifts even more smoothly than before. The MDX's four-wheel-drive system was remapped to work seamlessly with a Vehicle Stability Assist system to improve handling on slippery surfaces and to enhance stability in all conditions. Side curtain airbags covering all three seating rows were added, as were tire pressure monitors. Front and rear end styling has been redone, with a more aggressive edginess.", "num_tokens": 2048} {"category": "common_crawl-transportation", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-transportation/part-00-00000.npy", "text": " inches shorter than a Volkswagen Golf. This means the largest Mini ever is still pretty small. And more important, the Countryman still feels like a Mini.\n\nSupersizing It\n\nThe Countryman is to the rest of the Mini lineup as anything American is to its European counterpart. Take our refrigerators, for example. The basic operating principle, a box in which to keep your vegetables, meat, and beer cold, is the same as in Europe. It’s just that the American fridge is scaled up one size. Such is the case with the Countryman. It’s longer, wider, and taller than the Cooper hardtop and the Clubman, but it still looks like a Mini. There are some subtle changes, like the oval headlamps that have been squared off, but the Countryman fits in visually with the rest of the Mini family.\n\nThe interior, although unique to the Countryman, is easily recognizable as that of a Mini as well. Oval-shaped door cutouts like those in the smaller Minis are stretched out along the front and rear doors. And rear-seat power windows are operated via a toggle switch, just as in the front. The Countryman’s biggest feature, aside from the four doors, is its center rail system that runs between the front and rear seats and can accommodate everything from an armrest and sunglasses holder to as many cup holders as you want to buy. And speaking of rear seats, the Countryman will only be available in the U.S. with a four-passenger configuration—Mini cites our stringent crash standards as the reason for a lack of an optional rear bench. The rear seats fold flat and travel fore-and-aft 5.1 inches.\n\nThe Countryman’s H-point is 2.8 inches higher than in the other Minis, and the raised driving position is noticeable. Mini might market the Countryman as an alternative to small crossovers, but the feeling is definitely carlike. Shoulder room is four inches wider in the front seats, and the extra elbowroom is nice. Think of the Countryman as a Mini you can actually stretch out in. The width difference is even more apparent in the back seat, with 7.6 more inches of shoulder space than in the Clubman. And all seating positions are more chairlike; your knees are at hip height instead of above. Still, six-footers will need to slouch in the second row to keep their hair from brushing the roof. Our exposure was limited, but it looks like all four seats in the Countryman are adult-friendly, even for long trips.\n\nAs one would expect, the Countryman comes with more space for cargo: 12.4 cubic feet in the smallest configuration and 41.3 cubic feet at maximum capacity. As in the Clubman, there’s a false load floor with extra storage underneath. And taking a cue from the BMW 5-series Gran Turismo, the Countryman has a foldable vertical wall that closes off the luggage compartment from the rest of the cabin.\n\nEngine Enhancements\n\nThe Countryman goes on sale early next year in three different versions: base Countryman, turbocharged Countryman S, and top-banana all-wheel-drive (another first for Mini) Countryman S All4. The engines are the same as in the rest of the Mini lineup and share the updates and power increases that all Minis receive for the 2011 model year.\n\nThe 1.6-liter in the base Countryman is rated at 121 hp, an increase of 3 hp. Major changes include an electronically controlled oil pump that is no longer tied directly to engine speed, a switchable water pump, and internal friction reductions. Torque gets a four-unit bump (hey, another four!), up to 118 lb-ft.\n\nBoth S versions come with the turbocharged version of the 1.6-liter, which gets the aforementioned upgrades and now features BMW’s Valvetronic system in addition to variable intake- and exhaust-valve timing and direct injection. Valvetronic uses variable lift—in the Countryman it ranges from 0.2 to 9.0 mm—to control the volume of air going into the cylinders. This eliminates the need for a throttle butterfly and improves efficiency and engine response. Output is increased to 181 hp, up 9 hp, and torque goes from 177 lb-ft to 192. As an added bonus, the turbocharged Countryman achieves almost the same combined fuel-economy rating as the naturally aspirated version in the European combined cycle. EPA figures haven’t been announced yet, but Mini is hoping the cars will achieve nearly 34 or 35 mpg on the highway.\n\nTransmissions, like the engines, are the same as those used in the rest of the lineup, with some enhancements. The six-speed manual now has heavy-duty carbon synchros in all gears, new shift cables, a self-adjusting clutch, and a dual-mass flywheel. The six-speed automatic adds a neutral-idle control feature that basically shifts the transmission out of gear at a stop when your foot is on the brake pedal. The shift logic also now has a “stop and go” mode that holds second gear for smoother movement through traffic jams.\n\nNot shared with others in the Mini lineup is the Countryman’s four-wheel-drive system, branded All4. A wet multiplate clutch at the rear axle, developed specifically for Mini by GKN, controls the amount of engine torque sent aft. The Countryman operates as a front-wheel-drive car in normal driving, although the rear prop shaft is always rotating. As soon as the front wheels spin faster than the rear wheels, a ball ramp inside the differential forces a small pilot clutch to automatically engage and send torque rearward. If the slip continues, a servo acts to send up to 50 percent of the engine torque to the rear.\n\nThe Mini That Drifts\n\nWe spent some time on a wet test track driving a Countryman S All4 with a manual transmission. The good news, as we mentioned before, is that the Countryman still feels like a Mini: responsive and agile. The even better news is that with all-wheel drive and stability control switched fully off, the Countryman is capable of power oversteer, increasing the hooligan potential beyond that of front-wheel-drive Minis. We didn’t have a chance to fully evaluate the Countryman, but our early impression is that it’s slightly softer than the rest of the Mini lineup, with slightly slower steering and a bit more body roll. The ride is a lot like your average American: a bit soft but very affable. Anybody familiar with the bone-jarring suspension in other Minis, like that of our long-term Mini JCW convertible, will find the Countryman’s ride to be sweet relief.\n\nStacking Up against the Competition. Wait, What’s the Competition?\n\nThe Countryman shares a similarity to other Minis with its incongruity to the rest of the market. Mini wants the Countryman to compete mostly against small crossovers like the Subaru Forester, Nissan Rogue, Toyota RAV4, and Volkswagen Tiguan. It should at least compete well on price. We’ve been told the Countryman will start at a base price between that of the Clubman and convertible, or about $24,000. We’re guessing an upgrade to the S model will be about $3000, and all-wheel drive should cost another two grand, give or take. But of course there will be hundreds of small customization options that are sure to inflate the sticker price even further. The issue is that the Countryman is generally underpowered (especially the base model) and slightly smaller than the vehicles listed above; the Tiguan, for instance, is 12.5 inches longer. Size-wise, the Countryman is almost an exact fit with the Volkswagen Golf, which starts at a much lower base price.\n\nSo on a strictly empirical level, the Countryman doesn’t stack up, but neither have the other Minis, and that hasn’t hurt sales. In fact, Mini remains an anomaly in the U.S. market as the only successful premium-priced compact car. The good news for Mini is that the Countryman should be able to pull off the same feat. It’s bigger, but the Countryman retains the fun character of the rest of the brand in design and driving experience.\n\nPrice Starting at\n\nGet the Best Deal on a Mini Cooper Countryman / S\n\nPrice Starting at\n\nMini Cooper Countryman / S News and Reviews\n\nThe Best and Others to Consider<|endoftext|>Fast Kia\n\nFast Kia Sports Cars – All you need to know!\n\nKia Motors is a South Korean automobile company that was founded back in 1944. It has since been one of the best car manufacturers in the world, providing a variety of vehicles to different types of consumers. They are known for their economical selection; over time, they have dipped their toes in some faster cars as well. Now, in 2020 if you are interested in buying a fast car then look no further than the wide variety of vehicles available from Kia. We will be looking over one of the more fast Kia sports cars that one can purchase in multiple price ranges.\n\nJust to be clear, Kia is not primarily a sports car company. Their selection is mostly commercial based. However, the few fast cars they do offer are very good and can satisfy most car enthusiasts.\n\nFast Kia Sports Cars – The best ones!\n\n2021 Kia Stinger GT – The Fastest Kia yet!\n\nIf you are familiar with Kia at all then you will automatically recognise this vehicle. The 2021 Kia Stinger GT is the fastest car offered by Kia. This vehicle has a 3.3L V6 Twin Turbo engine, with a horsepower of 365, and torque of 376. It also features the 8-Speed Automatic Transmission, and that is consistent in the entire GT lineup. Something", "num_tokens": 2048} {"category": "common_crawl-transportation", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-transportation/part-00-00000.npy", "text": " Jaguar I-PACE has a wading depth of 500mm and features safety systems designed to deal with a flood situation.\n\n6. Can you buy or sell second-hand electric cars?\n\nYou can buy or sell a second-hand electric car, just like you would any other type of vehicle. However, there are a few things to look out for when purchasing an EV second-hand.\n\nThe first thing to check is how well the battery keeps its charge. You can also check the battery warranty – this usually lasts longer than the car warranty and it'll give you peace of mind. \n\nGet the EV thoroughly checked in a similar way to a petrol or diesel car. Make sure all functions and electrics work and the wheels aren’t too worn down.\n\nYou should also check if the EV has a lease plan that goes with it.\n\nLease an electric car with us\n\nWe've teamed up with DriveElectric to offer you affordable EV leasing options. There's an electric car to suit all needs:<|endoftext|>Train derails in Wisconsin, sends 2 cars into river\n\nApr 27, 2023, 1:20 PM | Updated: 4:10 pm\n\n Norfolk Southern train derailed in East Palestine, Ohio. Officials there decided to release and burn toxic vinyl chloride from five tanker cars to prevent a catastrophic explosion.\n\nHundreds of people had to evacuate in Raymond, Minnesota, last month after a BNSF train hauling ethanol and corn syrup derailed and caught fire.rain derails in Wisconsin, sends 2 cars into river<|endoftext|>Driver escapes unhurt after car catches fire in Lundu\n\nWhat's left of the car after it caught fire.\n\nFollow and subscribe to DayakDaily on Telegram for faster news updates.\n\nKUCHING, May 8: A car was completely razed after it caught fire at Jalan Kilang Sempadi, Lundu, yesterday evening.\n\nAccording to the Fire and Rescue Department, the incident happened at around 5.40pm when the owner tried to start the car.\n\nThe department immediately responded to the distress call and managed to put the fire under control.\n\n“The car suddenly catches fire after the owner attempted to start the car several times,” it said in a statement.\n\nNo injuries were reported in the incident. — DayakDaily<|endoftext|>UNION CITY – On April 7, 2023 at approximately 3:21 p.m, Darke County Deputies along with Rossburg Fire and Union City Rescue responded to the 13,100 block of State Route 49 North in reference to a semi tractor/trailer rollover accident.\n\nPreliminary investigation revealed a blue 2006 Peterbilt semi tractor/trailer, driven by Muhumed Hassan Abade 64, of Eden Prairie, Minnesota was traveling northbound on State Route 49. Abade traveled off the right side of the roadway striking the dicth causing the semi tractor/trailer to rollover.\n\nAbade was treated and released from the scene.\n\nAt approximately 3:40 p.m., State Route 49 North was closed between Rossburg-Lightsville Road and McFeeley-Petry Road. This section of roadway remains closed while crews work to clean up the debris.\n\nAbade was issued a citation for failure to maintain reasonable control.\n\nNo posts to display<|endoftext|>Jump to content\n\nAttention: In order to reply to messages, create topics, have access to other features of the community you must sign up for an account.\n\nVeteran Member\n • Content Count\n\n • Last visited\n\nCommunity Reputation\n\n110 Excellent\n\nAbout Jsunflyguy\n\nProfile Information\n\nRecent Profile Visitors\n\n615 profile views\n 1. Jsunflyguy\n\n LIRR locomotive Engineer Trainee job\n\n Just finished the Phase 1 Exam and passed, anyone from a previous test here about their class date?\n 2. Jsunflyguy\n\n CBTC - General Discussion\n\n I wouldn't say \"just fine\" is an appropriate view of it. This number required a lot of what would be considered \"cheating\" now, with keying every automatic, actually entering a station on ST, etc. But yes it is true longer trains can be run at a higher throughput than now. Though I don't think that number is achievable any longer, and running the schedule to 100% capacity has the consequence of never being able to recover from a disruption. Although Lexington maintains 28tph which isn't bad considering every A division express that doesn't end at Utica passess over a single switch at Rogers. Fun point of research has ATS with its computer controlled automatic line-ups improved the A Division on time performance, it doesn't seem so, but the changeover happened in 2009 so no data that have to hand goes back that far. The funny thing about Management Bulletins is that they don't make crew appear to do it. Although it was issued months ago the new pick went into effect three weeks ago, which moved some Station Switching (relay crew) jobs around. In fact it added some where they didn't exist at all, such as Pitkin, and a few extra at 168th. The place where this problem primarily exists, Continental received no recent schedule modifications to accommodate this, the last update to the schedule essentially moved some late PM jobs to midnight jobs that wrap around to the morning rush. While the schedule has improved slightly from the perspective of average hours work (8.24 from 8.28) which, from a cursory glance, seems to be due to some changes in reporting points and modifications to how the shuttle is crewed. The which was already everybody's favorite line rose from an average of 8.76hrs to 9.1, and in addition to that the now wants those same crews to extend their inbound trip 6-10 minutes depending on how long the train will rot in the relay AND start your outbound trip that much sooner. I can see why no one is enthusiastic about enforcing the policy. If Transit wants to continue down the path of ambiguous training and policies in addition to menacing crews for minor infractions like putting a door panel out (which in the 'good ole days' was a 60 second delay as the t/o keyed the first door or two, but is now a 15 minute ordeal, with the requisite trip to 2 Broadway). Now that they are getting bad press for the policies that they chose, they simply expect the crews to just 'work harder', well I can't see how the crews tolerate it, but I reckon another 1966 is coming in the not-too-distant future. With the Tower Camera thing, I believe we've stumbled into another issue that could have been solved into the past, and can still be now, but hasn't. That is the use of train describers. http://photos.signalling.org/picture?/7498/category/639-earls_court_control_room The identity of the train can be maintained between multiple signal boxes even in a rapid transit application, and the technology has existed since the 50s, it absolutely boils my blood that we have CCTV camera (which has to read an LED that will appear as a red blur in a dark tunnel). Why punching at Pacific isn't good enough, no idea. I suspect that since the doesn't use workstations for its NX machines (that I've seen) it's just one operator running the whole show and getting overwhelmed (or two people constantly in each other's way)....that would sound about right. The other issue is towers were individually manned with slightly more autonomy than now. At this point one or two people in a master tower supervise an entire line with no realistic way of tracking where trains specifically are, and if that one person is distracted by another issue the whole line suffers, even if they aren't involved in the problem. I only calculated the core cars, so R68s on the and 46s on the were ignored. So it would add 578 core bound cars, which is a 9% decrease from the nominal figure of 4221, I didn't catch the typo on my phone until the edit window closed.\n 3. Jsunflyguy\n\n CBTC - General Discussion\n\n I see it now, I searched the word \"Third\" and forgot to check '3rd' after the reading, so my oversight on that. The length still has meaning at the terminal ends since the crews are told they're up next when their equipment is leaving the penultimate station during disruption otherwise they are there 2 minutes prior, so the distance may or may not apply, more likely that is a wash, but the time penalty for longer trains still applies for clearing the interlocking, clearing out trains (a recent procedural addition), etc. Also I'd be a little incredulous about IRT Claiming the signal system could handle 30 10-car trains, the same company famously claimed to the City that the Els couldn't be signalized because it would no longer be able to run its 30tph headway on the local tracks. In the absence of the math being shown that isn't definitive. As for Dekalb, the interlocking was slowed by the oft-maligned timers, but throughput is also constrained by the Manhattan bridge being. Trains exiting the interlocking at slow speed constrain the area in the same way a backed up exit cascades down a highway and backs up the nearby interchange. Dekalb will never reach those rates again as trains over the Manhattan Bridge are constantly checked by timers (which disturbs smooth operation) enforcing a lower speed limit because the Bridge was not designed to handle trains going over it at Maximum Speed, a problem that was known but never properly addressed which lead to the critical failure in", "num_tokens": 2048} {"category": "common_crawl-transportation", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-transportation/part-00-00000.npy", "text": " one of Maersk’s container vessels. The retro-fitting potential and the matureness of using ORC units for maritime applications will be evaluated. The project is funded by the Danish Maritime Fund and A.P. Moeller - Maersk.<|endoftext|>Why not learn more about ?\n\nHeavy Crude Hauling Professionals: Fulfill the Specialists Behind the Market\n\nIn the world of oil and gas, hefty crude describes a type of crude oil that has a high thickness and viscosity, making it more difficult to extract and transport. As the need for power continues to grow, the duty of heavy crude hauling experts has actually become increasingly essential. These professionals are accountable for the safe and efficient transport of heavy crude oil from extraction sites to refineries, playing an important part in the energy supply chain.\n\nHefty crude carrying specialists possess a special collection of abilities and proficiency that are essential for managing the complexities connected with transporting this type of oil. They commonly work with specialized transport automobiles and devices developed to take care of the features of heavy crude, which can be extra corrosive and may need specific handling strategies. Their expertise of security policies and ideal practices ensures that these operations are conducted effectively while reducing dangers to both employees and the atmosphere.\n\nAlong with technical abilities, heavy crude carrying experts have to additionally understand the logistics associated with delivering their cargo. This includes path planning, managing shipment routines, and working together with different stakeholders, such as oil manufacturers, refineries, and regulatory firms. Their ability to work with these components is essential for enhancing transportation procedures and guaranteeing that hefty crude reaches its location on schedule and in conformity with sector laws.\n\nThe importance of this occupation expands past just the transport of heavy crude; it likewise plays a substantial duty in supporting the broader energy industry. As the globe changes to greener power options, heavy crude hauling experts are adjusting, employing advanced technologies and methods that promote sustainability. This evolution demonstrates their commitment to not just meeting current energy needs but additionally adding to a more eco-friendly future.\n\nFinally, hefty crude hauling professionals are crucial to the oil and gas industry, working as the foundation of heavy unrefined transportation. Their experience in logistics, safety, and innovation is essential for the effective and accountable distribution of this important resource. As the industry continues to evolve, these professionals continue to be at the leading edge, making sure that we meet the globe’s energy needs while also welcoming sustainable methods.\n\n– My Most Valuable Tips\n\nHow I Achieved Maximum Success with<|endoftext|>453\nExperience:  Lincoln Senior Master\nType Your Lincoln Question Here...\nKenny Z. is online now\nA new question is answered every 9 seconds\n\nLincoln Continental: Kenny, I have a 99 continental and replaced\n\nCustomer Question\n\nKenny, I have a 99 continental and replaced the cat's about 17,000 miles ago. I was driving recently and suddenly lost power like I did the first time when the cats failed. I discovered that the DPFE sensor had been melted and blew off the vaccum line. I replaced that but it seems like there is still a lack of power. I put about 1200 miles a week on this thing and don't want to be stuck out in the boondocks again. I did run some Cataclean through the tank and it seemed to help but I am wondering if the bad DPFE has damaged the new cats? can you give me some direction to start looking? Thanks\nSubmitted: 2 years ago.\nCategory: Lincoln\nExpert:  Kenny Z. replied 2 years ago.\nHello my name is***** and thanks for your question.\nIt sounds like the cats are plugged again. Usually a melted DPFE is a clear indicator of restricted exhaust, the exhaust backs up and melts the DPFE.\nExpert:  Kenny Z. replied 2 years ago.\nIf you need more help, please use the reply tab to continue our conversation. If you do not require further assistance, kindly rate my service as you see fit. Rating does not close the question if you have follow up questions. Thanks!<|endoftext|>Search results\n\n 1. B\n\n Winch Bumper ID\n\n Shrockworks. https://www.shrockworks.com/Front-Winch-Mount-Bumper-for-4th-Generation-4Runner-2003-2009-pr-16148.html\n 2. B\n\n Master Cylinder Rebuild - DIY\n\n I believe you are correct, Skidoo... i think this can of worms may be more like pandora's box. Just out of curiosity... you mention \"earlier models w/o ECU/ABS\" - Do you happen to know of any Toyota electric MC's w/o ABS? That could solve my challenge, if it exists!\n 3. B\n\n Master Cylinder Rebuild - DIY\n\n that won't work. I physically cannot install the unit w/ the ABS control module attached. So i need to find a way to convert the MC to non-ABS. But looking at the hydraulic diagrams, I'm not sure it can be done??\n 4. B\n\n Master Cylinder Rebuild - DIY\n\n Sorry for taking this thread in perhaps an odd direction, but I've been working on adapting this MC/Booster to a Tacoma. Does anyone know if it's possible to completely eliminate the ABS control module? My application doesn't require ABS... and frankly, I need the room (i.e. the control model...\n 5. B\n\n What year is this Tacoma?\n\n That's about as bad as posting a square bodied k10 and asking the same... It's between an 05 and 11\n 6. B\n\n 2010 Tundra probs\n\n my 11 crewmax could only do 8.5mpg max towing my Tacoma and later a JD2305. The tow mode also sucked - tranny hunted like hell.\n 7. B\n\n 2006-2008 tundra\n\n I've owned an 04 dcab, 06 dcab, 08 crewmax and 11 crewmax. The 06 is the one I miss.\n 8. B\n\n Anyone done Tundra brakes on a early Solid Axle.\n\n http://frontrangeoffroadfab.com/nfoscomm/catalog/product_info.php?cPath=27&products_id=136 + Tundra 231mm rotors (powerslot) and calipers = profit.\n 9. B\n\n buying used taco question\n\n Nope... doublecabs were offered with the 3rz\n 10. B\n\n Frame Porn\n\n doing that will ensure it rusts from the inside out; any scratch or abraision will wick water between the coat and the metal. Pwodercoating belongs on street cars.\n 11. B\n\n 2wd to 4x4 SAS 1986 Toyota Chinook camper build\n\n Yup... the front spring hanger. IMHO, replace it with something with less leverage on the frame.\n 12. B\n\n 2wd to 4x4 SAS 1986 Toyota Chinook camper build\n\n I really like this build... but please... please... please... get rid of that frame hanger before it rips itself off... Please.\n 13. B\n\n any one ever done a frame off?\n\n This is the right way to do it...\n 14. B\n\n are can-backs really weather-proof?\n\n Driven in rain, taken to car washes... never had an issue.\n 15. B\n\n are can-backs really weather-proof?\n\n neer had any weather issues with the two that I owned.\n 16. B\n\n 96 4runner lift ?'s\n\n lift blocks? Your 4runner doesn't use lift blocks. Are you talking about coil spacers?\n 17. B\n\n 2010 Tundra bumpers\n\n 18. B\n\n IFS 3\"lift options??? Don't want to drop my diff...\n\n Why don't you want to drop the diff? Not really a big deal. I really liked my 4\" trailmaster and 4\" superlift kits (pickup/4runner). You won't get 3\" w/o a dropped diff... Just not practical unless you're going long arm.\n 19. B\n\n 85 Chinook!\n\n killer deal... 3.4, AT, duals, SAS... done.\n 20. B\n\n Running narrow axles/35's, will it work?\n\n Stop overthinking... let's do some math... Narrow axles are 55\" IFS Axles are 58\" most aftermarket wheels are 3.5\" backspacing So if we do some math, running a 2\" backspaced wheel on a narrow axle is effectively the same as running a 3.5\" backspaced wheel on an IFS axle...\nTop Bottom<|endoftext|>New LS1 Owners - Newbie Tech - Installed clutch master cylinder now turn signal doesnt work?\n\n03-30-2009, 02:14 PM\n:bang: they were working fine untill i was driving home after installed my clutch master cylinder... i dont think anything got disconnected\n\n03-30-2009, 04:16 PM\nis there anything under the steering column that might have been moved that could cause this or a fuse that went out? or bad turn signal lever? cuz i had to move it from the left to middle a few times to get the left turn signal to work for a while but just", "num_tokens": 2048} {"category": "common_crawl-transportation", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-transportation/part-00-00000.npy", "text": " 1978 Ford Econoline suspension upgrade will also install components that make dropping their 1978 Ford Econoline car or lifting it up easy, such as 1978 Ford Econoline lift springs that can help raise a car sky high. For showing off or for easier rough road driving, new 1978 Ford Econoline suspension components can make a critical difference.\n\n  Cordaro Stewart  -  (Cleveland,ohio)\nThe fitment of these talights, I give it 8.5/10 they look great. And were easy to install. They are nice and bright and the chrome finish looks amazing on my mercedes.\n  Erwin Y.  -  (Kent, WA)\nbody shop said this is one of the best wide body kit in the market. It fits good without much modifications.\n  Timothy G.  -  (Fort Plain, NY)\nBest combo deal for my accord. the installation is very straight forward..Just a pain to take down my stock exhaust & header since its so rusted. I enjoy the sound and noticeable improvement in response.\n  Maria S.  -  (Chicago,illinois)\nfits good, no complain\n  Roark91  -  (Providence, RI)\ni can see!! these things are intense<|endoftext|>A man so tired of a 40-minute round trip detour after a bridge has been closed for four years has resorted to rowing across the River Tees to go and care for his elderly mum.\n\nEddie Peat, who lives in the County Durham village of Wycliffe, Teesdale, is primary carer to his 88-year-old mum Jane who lives on the other side of the river in Whorlton, just a mile away.\n\nThe easiest way for Eddie to visit his mum is a trip over the 150ft Whorlton Suspension Bridge, but that closed to drivers in 2019, and then pedestrians in December 2020 leaving him making a 14-mile round journey instead. Repair work is currently underway.\n\nWhorlton Suspension Bridge is currently closed to traffic. (Image: SARAH CALDECOTT)\n\nSick of a detour which adds 20 minutes to the previously five-minute journey, the 66-year-old has turned to rowing about 100ft over the river to visit his mum, friends or go to the shops.\n\nEddie, a semi-retired chartered surveyor, said: “I go and see my mum five times a week.\n\n“It’s much more difficult in an emergency since the closure.\n\n“If she doesn’t answer the phone I get worried and I have to go see her to check she’s alright. She might be in the garden, but she might have fallen.\n\n“She’s fallen out of bed a couple of times and not been able to get up.\n\nEddie Peat in his boat on the banks of the Tees. (Image: SARAH CALDECOTT)\n\n“She’s 88, coming up to 89 – I like to call in and see her as much as I can. I’m her primary family carer. She’s very much isolated by the closure.\n\n“Before it was easy, probably a mile there and a mile back. I’d either drive or walk. Now it’s a 15 or 20 minute drive one way.\n\n“In the boat, it’s very quick to get across the river.\n\n“I’ve had a boat for 20 or 30 years and the children played with it, but it’s actually come into its own now.\n\n“This is an ancient crossing point on the river. There would have been people travelling across here by boat historically – I am just continuing with that tradition.”\n\nEddie has resorted to rowing over the river as the bridge works continue (Image: SARAH CALDECOTT)\n\nWhen the Grade II*-listed crossing is open the journey is about a mile. But since the closure four years ago the easiest route between the two villages has been a seven-mile diversion, crossing the river by the next crossing at either Winston Bridge to the east or Eggleston Abbey Bridge to the west.\n\nWhorlton Suspension Bridge is reportedly the UK's oldest unaltered suspension bridge having opened in 1831.\n\nWhorlton Suspension Bridge.\n\nDurham County Council said work is now underway to dismantle parts of the bridge and repair them.\n\nIt involves dismantling the bridge and carefully removing, cataloguing, inspecting, and repairing its 1,800 individual components, The work is due to be completed by December 2024.\n\nEddie, who first spoke to the BBC, added: “It will be an enormous relief when it reopens. I believe it’s intended to be completed this year.\n\n“I’m just pleased the work has started. My wish is that this is the last time that I see this bridge closed.\n\nThe closure makes Eddie's one-mile journey a seven-mile trip. (Image: SARAH CALDECOTT)\n\nMark Readman, the council’s head of highways said: “We understand the importance of Whorlton Bridge to residents and appreciate the impact its closure has had on travel.\n\n“As one of the UK’s oldest road suspension bridges, restoring Whorlton Bridge has been an incredibly complex project involving structural assessments, extensive design, and ensuring consents are in place with the appropriate bodies.\n\n“Preparations are now underway to dismantle the bridge, which involves carefully removing, cataloguing, inspecting, and repairing the 1,800 individual components.”\n\nThe repair work is said to be costing £8.4m with funding coming from Levelling Up cash.\n\nThe council last month insisted levelling up projects are on track to be delivered despite criticism from MPs that the flagship funding scheme had been hit by “astonishing delays\".\n\nLast week the BBC reported that councils are struggling to pay increasing repair bills for bridges which are closed or at risk of becoming dangerous. Durham councillor John Shuttleworth told the broadcaster it was a \"a major concern\".<|endoftext|>next generation of Apple CarPlay will power your entire car, riding the trend of all-screen autos\n\nApple is taking CarPlay to an entirely new level with a huge announcement at WWDC 2022. In what it called a \"sneak peek,\" Apple showed off an entirely new generation of CarPlay that expands beyond infotainment and becomes the car's entire interface, from a gauge cluster screen to the center stack and including every car function.\n\nAlmost every car from the past handful of years has CarPlay, and it's one of the most-requested features from car buyers. Even still, it's a pretty disjointed experience that transports you to an entirely different interface and leaves you jumping back and forth to the car's own operating system anytime you want to perform \"car\" functions and not entertainment functions. With this shift, that all goes away: Apple wants to make CarPlay the only interface in your car.\n\nRead more\nHow do electric cars work? EV motors and batteries explained\n\nElectric vehicles function in fundamentally different ways than traditional cars. Internal combustion engines have loads of moving parts, and while EVs have their own complexities, they're much more digital than mechanical. Let's take a closer look at exactly how electric vehicles work.\nHow does an EV battery pack work?\nInstead of gasoline, EVs derive their power from a battery pack, which usually stretches along the underside of the car to keep the weight as low as possible. It's composed of multiple modules, which are in turn broken down into individual battery cells, similar in size to AA batteries. A layer of coolant runs between cells since hot batteries are explodey batteries. A battery management system regulates that coolant and ensures that each cell drains at the same rate, which prolongs the life of the pack.\n\nRead more\nThe best cars for camping\n\nA night under the brilliant, undiluted stars is one of the best ways to escape the stresses of daily life, but to do it right, you’ll need supplies. Firewood, graham crackers, and chocolate are obvious choices, but the right vehicle can be the gooey marshmallow that brings it all together.\n\nA lot goes into choosing the ideal camping car. It has to get you there, for starters, so it must be adventurous and at least somewhat tough. It should also be reliable, with lots of cargo room and seating for all your friends and gear. We’ve already done a list of our favorite trucks and the best 4x4s, so when we set out to choose the best cars for camping, we focused on fun. That’s the point of camping, right?\n\nRead more<|endoftext|>logo for print\n\n5 steps to extricate patients from modern vehicles\n\nRip and blitz challenges: use your cutter/spreader for car side removal extrication\n\nYou arrive on scene, and you’re confronted with a 2017 four-door sedan that has been T-boned by another vehicle. Victims are entrapped in both the front and rear seats, and you need full access to the damaged side. This would often result in a “rip and blitz” or a side removal technique in which we would start at the rear door and finish with both doors and the B post folding out and away from the vehicle on the front hinges.\n\nYou start your extrication and things aren’t going as planned. Unfortunately, you’re 15 minutes into it and you’ve been slowed down by the vehicle material not reacting the way you expected it to. What’s changed?\n\nModern vehicle technology keeps evolving and is always challenging extrication tools and techniques. We are always chasing the progress of the automotive industry and we can only hope to be prepared by constantly researching and learning. Reinforced or high-strength structural steel is not just improving in strength, but is also being added to more locations within vehicles", "num_tokens": 2048} {"category": "common_crawl-transportation", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-transportation/part-00-00000.npy", "text": " with the Mediterranean flights and allow for an ability to seek newer markets, specifically the Cape Verde Islands. The L-1011s were flown until the mid-1990s when they were replaced with the Boeing 767 and McDonnell-Douglas MD-11s.\n\nFlorida, Asia, and Africa came to be popular options for the airline in the 1990s, with Miami and Tampa service coming to the Dusseldorf hub. Asian routes to Singapore, Sri Lanka, and the Maldives helped expand the carrier eastward while staying true to their leisure market priorities. Service to Cuba, the Dominican Republic, Mauritius, and South Africa continued to show the airline’s ability to serve the corners of the earth.\n\nLTU, known for their ability to give reasonable fares to leisure routes, also had a very noticeable livery. The carrier focused on the color red, with the airline’s livery being nicknamed the “red rood” due to its overall red color. The planes had a red top and tail; a white cheatline surrounded the windows but was enclosed by another red stripe. The belly and lower fuselage was gray, with white engines. The word “LTU” appeared in three locations, on the tail in white, on the engine in red, and between the forward door and cockpit in red. The livery would fly with LTU from the 1970s until their buyout in 2007.\n\nAs the new century started, LTU transitioned to become an all-Airbus fleet, as A320s and A321s replaced the Boeing 757s, and Airbus A330s took over long haul operations. Route expansion slowed and the carrier only added Phuket, Thailand to the route map, but a codeshare with Bangkok Airways allowed for a way to reach more destinations. One Airbus A320 would be transferred to a new airline, LTU Austria, who would operate between Vienna and the Mediterranean. LTU Austria was formed in 2004, but dissolved in 2008. In 2007, Air Berlin announced they would take over LTU, allowing the merged airline to be the fourth largest European airline by traffic count. LTU continued to operate as normal but the aircraft were painted into an Air Berlin livery with LTU titles.\n\nIn 2006, just prior to the merger with Air Berlin, LTU made an agreement with Deutsche Polarflug to fly one Airbus A330 on a thirteen-hour flight to the North Pole. The flight was titled the Arctic and North Pole Sightseeing Flight, leaving Dusseldorf and flying over Norway, the North Pole and coming back by way of Greenland and Iceland before returning to Dusseldorf. The flights would operate once a year in the spring and would not land at any point of the flight except for the arrival back to Dusseldorf. LTU operated the first flight in May 2007, with one occurring each April or May of every year since.\n\nIn 2008 Air Berlin announced they would finish the merger with LTU and cease to use the LTU name. The carrier’s last flight was in 2009 and was dissolved in 2011 when LTU’s air operator’s certificate expired. All LTU aircraft were given the full Air Berlin livery, removing the LTU logo before the airline’s AOC was terminated in 2011.\n\nAir Berlin continues to operate most of LTU’s former fleet and most of LTU’s former routes, even adding more to the previous hub at Dusseldorf. The Arctic and North Pole Sightseeing Flights previously operated by LTU are now flown by Air Berlin with the next scheduled for April 23, 2016. One aircraft still wears the LTU logo, with a de Havilland DH-104 (D-INKA) being preserved in LTU colors and being used for sightseeing flights in northern GermanyHow Airline Marketing And Advertising Has Changed\n\nThe ongoing Covid-19 complication remains a significant disturbance to the airline industry, forcing several notable airlines to alter and modify…\n\nCubana Suspends Buenos Aires, Gets Suspended From IATA’s BSP\n\nThe national flag carrier of Cuba, Cubana de Aviación, announced via Facebook that it would suspend flights from Havana to…\n\nAeromexico Serves Record 270 ‘Chiles en Nogada’ On Mexico City-Madrid Flight\n\nIn celebration of Mexico's upcoming Independence Day (celebrated on the 15th and 16th of September), Aeromexico joined forces with Mexican…<|endoftext|>Shine Air import and export business\n\nOur air service including import and export cargo in world.We take a collaboration with famous airline for get advantage of price.\n\nLearn more\n\nOur Air service advantage\n\nWe will arrange the nearest flight for you, depending on your timeliness requirements.\n\nWe have one-on-one customer service for you to keep track of your goods for safety.\n\nYou may need other special services, such as DDP or DDU.\n\nShine air service instruction\n\nTalk about your brand\n\nFocus on truthfully stating the contents of the goods to the agent:\n\nIndicate whether the goods delivered are goods transported under certain conditions, with particular attention to whether the goods delivered are dangerous goods or may contain dangerous goods. If it is or contains dangerous goods, it shall be handled in accordance with the relevant agreement between the carrier and the agent and the relevant provisions of the provisions of the International Aviation Association on dangerous goods.\n\n2. Destination of goods (Chinese and English)\n\nWhen the consignor indicates to the agent the destination of the goods delivered and if the destination is not a navigable airport, the agent advises the consignor to change the destination of the goods to a navigable airport closest to the destination, but the consignee column is still required to fill the destination of the goods.\n\n3. Packing and volume of goods\n\nThe agent inspects the packing of the goods and the size of the goods while they are being transported by air. Shippers will be required to repackage packages that are poorly packaged, pose safety risks to the aircraft, are too rudimentary, and carry the old logo. In addition, to check that the volume of the cargo meets the requirements of the loaded model, consider the type used in the transfer terminal for the intermodal cargo.\n\n4. Customs formalities\n\nCheck whether the customs declaration, inspection and customs clearance procedures are complete.\n\nWhen the above four points meet the requirements, the shipper is requested to fill in the international consignment, and the shipper should carefully fill in and check the relevant columns on the international consignment:\n\n1. Product name column (including volume and size) (Chinese and English)\n\nThe product name in the product name column should not be too general. For example, \"car taillights\" should not be generally filled in as \"car parts\" or \"lights.\" In addition, the size of the goods to be filled in should indicate the unit of measurement, and in the case of dangerous goods, the specific name and packing level should be specified.\n\n2. The name and address column of the consignee (Chinese and English)\n\nThe consignee carefully fills in the exact country where the consignee is located, the name of the city, the name of the airport and the contact address and telephone number of the consignee. In particular, attention should be paid to whether it belongs to the name of the city of the same name in different countries, and if so, it must be checked whether the nationality is correct. The word \"to order\" must not appear in this column because air cargo orders cannot be transferred.\n\n3. Shipper signature column\n\nFill in the sender signature column with the identity and address of the sender and contact information, telephone number and signature. (If the unit is to be sealed and signed).\n\n4. Payment of freight and related agency costs after confirmation of weight.\n\nWarm Tips:\n\nThe above information is for information only, and specific matters are subject to the circumstances.\n\nIn addition, when you ship abroad, you must write down the consignee's address, zip code, telephone number (2 as much as possible) in detail and accurately. The consignee cannot be reached if the address is incorrect. The cost of destroying goods and returning them abroad is an unacceptable high cost. And all these costs need to be borne by the shipper himself. It is important to remind foreign trade personnel to pay more attention to whether the consignee confirms that the goods will be cleared after arrival, so as to avoid difficulties for the consignee to change his mind and not pick up the goods.\n\nContact Us<|endoftext|>The new Audi A7 Sportback 2018\n\nAudi A7 Sportback has a new clear line with four rings\n\nAudi A7 Sportback\n\nThe new Audi A7 Sportback is a conqueror for both youth and older crowd, for those who want more dynamic drive or cruising on the highway. Five door Sportback with lots of practicality and ton of technology, made this car perfect for those who want both comfort and sport style for everyday needs. A whole new experience with a sense of space, with new high quality glass and optional panoramic roof with 60% more viewing area.\n\nDesign of the new Audi A7\n\nThe new Audi A7 Sportback has a more aggressive front and rear bumper than the previous model, combination from its bigger brother the Audi A8 and the Audi A5. A combination of dynamic sport car with lots of practicality, comfort and technology. The new A7 has the front S-Line bumper from the A8 and the new Audi A6, front newly designed BiLED Matrix Headlights, and Rear full LED back and tail lights covering the whole bumper, took from the Audi A8 as well. ", "num_tokens": 2048} {"category": "common_crawl-transportation", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-transportation/part-00-00000.npy", "text": " and Brussels should all be applauded for work on offering more individual transport options like e-scooters.\n\nHe said: “Cologne has already taken measures to expand its bike lanes and impose a speed limit, making this a great environment for us to launch our first international market.\n\n“We look forward to collaborating with Cologne and other cities in their newfound approach to use micromobility as a solution to help communities move around without crowding.”\n\nIn response to COVID-19, Spin has introduced safety and health measures for its employees to follow during operations such as increasing the frequency of disinfecting its scooters.\n\nEvery time a scooter enters the warehouse or is redeployed on the street, the upper mast and handlebars are cleaned with disinfectant. Spin employees are also being provided with personal protective equipment (PPE) such as single-use face masks, safety glasses and gloves for wear during every shift. \n\nAs a precautionary measure, riders are encouraged to wear gloves or clean their hands with soap or hand sanitizer before and after each ride and practice physical distancing by staying at least 1.5 meters of distance from other people.\n\nThe UK has fast tracked trials of e-scooters to start before the end of June and this has prompted a mixed reaction from PACTS, the transport safety advisers to the Government and transport authorities. PACTS has said it sees 'few benefits' to the legalisation of e-scooters in the UK, while transport authorities have said they welcome the fast tracked trials, as long as there are safeguards in place.\n\nSpin recently posted a safety video for its users in the US market:<|endoftext|>Request Traffic Calming Devices\n\nThe Neighborhood Traffic Calming Program is intended to provide realistic and flexible solutions to speeding and cut-through traffic, and to enhance pedestrian and bicycle safety using tactics and strategies that have broad neighborhood support.\n\nHow it works\n\n 1. Determine whether your street qualifies.  To qualify, a street must be classified as “residential” or “collector” in the City’s General Plan with a posted speed limit of 35 miles per hour or lower.  You can check the classification and posted speed limit of your street on the City’s Street Attributes Map.\n 2. Complete and submit application for City data collection and traffic-condition evaluation.  An application form with instructions for how to complete and submit the form is available here on the City of Hayward website or by calling the Engineering and Transportation Division of the Department of Public Works at (510) 583-4730.\n 3. Approval or denial of application for acceptance into program.  Upon receipt of a completed application, the City will collect data and evaluate traffic conditions, including a speed survey, traffic volume counts, and reviews of historical collision data, area land-uses and geometric conditions.  At the conclusion of the evaluation, a decision will be made whether to accept the street into the program.  Please allow four to six weeks after submission of an application for a decision on acceptance.\n 4. Design and engineering of potential solutions.  Upon acceptance of a street into the NTCP, Hayward staff will develop potential design solutions.  In most cases, the traffic-calming measure or measures will be drawn from a traffic-calming toolbox.  The design will either be classified as a Tier I, II, or III solution.  Tiers are defined by the improvement cost with Tier I as the lowest cost and Tier III as the highest cost.\n 5. Gather additional petition signatures from neighbors.  Because Tier II and III solutions have higher costs and typically involve some of type of physical improvement, a special project petition with signatures of at least 60 percent of the households on the block specifically agreeing to the proposed changes must be submitted.  The petition form with instructions will be provided to the applicant by the City Engineering and Transportation Division.  This step helps ensure community-at-large support for the project.\n 6. Placement on project priority list.  Tier I solutions, not requiring a petition and relatively low cost, will be put immediately into the City maintenance crew’s schedule.  Tier II and III projects will be placed into a project priority list.\n 7. Project implementation.  As funding becomes available, projects will be implemented starting with the top-ranked project.  A timeline for implementation of individual projects will not be provided as the ability to carry out work is dependent on funding availability, weather and overall demand on City construction crews.  Applicants for approved Tier II and III projects will be notified when project funding has been identified.\n\nRequesting a Re-Evaluation\n\nIf you feel the implemented solution did not fully address your concern, a request for re-evaluation can be made by email to NTCP@hayward-ca.gov with a subject line “Request for Re-Evaluation.”\n\nRequests for re-evaluation must be made at least one year after the project installation.  The requesting party may be asked to fill out a new application.\n\nQuestions | Clarifications | Concerns\n\nTelephone: (510) 583-4783\nVisit us in person: Public Works Department Engineering and Transportation Division, 777 B Street, 2nd Floor, Hayward, CA, 94541.<|endoftext|>Free transit: a solution for Waterloo Region?\n\nFind our election survey for Waterloo Region, Cambridge, Kitchener, and Waterloo candidates at tritag.ca/election2014\n\nA new candidate , John Wolf, has officially entered the race for Regional Chair. Wolf claims that as Chair, he would try to cancel light rail, and as an alternative, investigate making transit free in an effort to boost ridership.\n\nLast month, TriTAG investigated the claims of (as of yet unregistered) Regional Chair candidate Jay Aissa concerning the light rail project. Today, we will explore the issue of free transit and try to address two questions that arise from Wolf’s platform: is free transit a viable alternative to light rail and rapid transit, and what would the impact of free public transit be on Waterloo Region?\n\nIs free transit a viable alternative to light rail and rapid transit?\n\nNo. Free transit may have its own merits, but it does little to address the Region’s intensification needs or the capacity concerns Grand River Transit will face in the coming years.\n\nAs part of its Growth Management Strategy, the Region needs rapid transit to encourage development along the central transit corridor and slow the pace of sprawl. Anticipation of light rail has drawn hundreds of millions of dollars of investment into the cores. Free transit would not provide the same kind of incentive to develop in core areas.\n\nTransit ridership has also been growing rapidly, already exceeding forecasts for 2016. As ridership grows, and parts of the central corridor see as many as 48 buses per hour, conventional buses have begun facing limitations. Buses can only hold around 50-60 people, and when these become full, people get left behind to wait for the next bus. More buses may be added to routes to meet passenger demand, but we’re quickly approaching the limits of what we can add. When there are too many buses on the road, they tend to bunch up, snarling up traffic and leading to significant delays in following their routes.\n\nLight rail as a transit technology addresses these capacity concerns. Light rail vehicles can hold over 200 people (or 400 doubled-up). Since the trains will run in their own separate lanes, they won’t get slowed down by cars or other buses, nor will they interfere with traffic. Making buses free on the other hand, doesn’t do anything to improve the capacity of transit vehicles or the free movement of buses and traffic.\n\nIn fact, if free transit is successful in Wolf’s stated aim of increasing ridership, then the need to increase the capacity of the Region’s core routes becomes all the more urgent. Buses would become overcrowded, as would our roads with frequent “bus jams.” Consequently, free transit has the potential to escalate our need for light rail.\n\nWhat would the impact of free public transit be on Waterloo Region?\n\nIf we assume that GRT maintains the exact same level of service after making fares free as before, TriTAG estimates the average annual property tax bill would need to increase by about $150. (For comparison, this is 4-5 times last year’s property tax increase.) If ridership were to increase and service levels had to also increase to keep pace with demand (more on that in a moment), even greater tax increases would be required.\n\nWolf expects that free transit would increase ridership. To evaluate this claim, we can look at cases both locally and globally.\n\nIn 2013, the Estonian capital of Tallinn made its transit network free to residents. The city is the largest thus far to attempt free  public transit, with a population of 430,000, which is smaller than, but still comparable to Waterloo’s. Unfortunately, the ridership increase attributed to the gratuity was estimated at a meagre 1.2%. It remains popular despite not appearing to have had a significant impact on traffic.\n\n(Several smaller European cities have also introduced free public transit, with greater success. However, the smaller size of these municipalities make them more difficult to compare with Waterloo Region.)\n\nA recent study of employees in Washington D.C. investigated the impacts of commuter benefits such as free parking or free transit passes. The study found that if an employer provided free parking, it resulted in reduced transit usage from no commuter benefits, even if free transit was also offered. This suggests that the costs and difficulty of driving may have a greater impact on transit ridership than the cost of transit itself.\n\nLocally, we can consider the impact of providing all University of Waterloo and Wilfrid Laurier students with bus passes. (While not strictly ‘free’, the inclusion of a ", "num_tokens": 2048} {"category": "common_crawl-transportation", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-transportation/part-00-00000.npy", "text": " an inch) in \"Aero Mode\" and the steering feel is more rigid and responsive when the car is set to Sport mode.\n • CORSA mode (only on Trofeo): offers the driver the most extreme experience and the option of enjoying the true embodiment of the Grecale without any compromises. The pedals are highly sensitive and responsive. Gear changes are faster than ever. Kickdown is powerful enough for maximum enjoyment. Traction control is much less active and Launch Control is switched on.\n • OFF-ROAD mode: to improve all-terrain performance and driving control, efficiency is slightly reduced compared to the Comfort and GT modes. Gear changes are gradual. The rev limiter is activated and ride height is set to \"High\", +30 mm (+1.18 of an inch).\n\nThe Grecale therefore stands out for its driving pleasure and performance, while ensuring driveability, comfort and safety. The performance is exceptional, combined with off-road capabilities and uncompromised handling.\n\nMaserati Intelligent Assistant (MIA) Multimedia System\n\nThe latest Maserati Intelligent Assistant (MIA) multimedia system comes with a 12.3\" screen, the largest ever included in a Maserati, with a resolution of 15 million pixels in Ultra HD.\n\nAt the heart of MIA is the Android Auto operating system, offering speed, great operating performance and data processing similar to a tablet's, as well as more memory, for a highly responsive user experience.\n\nProviding each customer with a simple, intuitive and customizable user experience, MIA can be configured with multiple tab-based screens with your favourite functions or the most commonly used ones, to optimise quick access and enable operations with just one tap. Once inside a tab, you can quickly access information and icons.\n\nThe Android Auto operating system makes further customization possible by storing up to five different user profiles. Each customer can build their own profile with their personal details, including music preferences and vehicle operation functions. The system also links other vehicle settings to the driver's profile, such as temperature and seat/mirror positioning. Switching from one user profile to another is extremely simple, with just one tap on the main menu.\n\nMIA lets you connect two smartphones at once via Bluetooth, providing the option to manage various priority functions such as phone calls, music selection and text messages. Passengers can use Apple CarPlay and Android Auto to use their smartphone apps quickly, easily and wirelessly, leaving their phones safely put away.\n\nVoice control of on-board functions is a key technology to prevent any driver distractions; the Grecale is equipped with a new voice recognition system with software, microphone technology and natural voice functionality. By saying \"Hey Maserati, set temperature to 21 degrees\" for example, there is no need to press a button to start the voice recognition system.\n\nMaserati Connect\n\nMaserati Connect offers an all-encompassing experience inside the car and out. Performance, comfort and safety can be managed intuitively, to transform every journey into a unique, exciting experience.\n\nAlways staying connected to your Maserati Grecale means innovative services and features throughout the car's lifespan. Keep up to date on status and position at all times, in contact with the car via your smartphone, smartwatch or virtual assistant (Alexa or Google Assistant) from the comfort of your own home.\n\nEnjoy the always-connected satnav with real-time traffic information and map updates. Take advantage of the Wi-Fi hotspot (free 3 GB package) and activate Alexa in-car. Information on vehicle health status is sent regularly, so you can plan your next service easily online. Last but not least, dedicated support is available in an emergency or if the car breaks down or is stolen.\n\nAll-round sound experience: the Sonus faber sound system\n\nThe Maserati Grecale sound system guarantees a superior listening experience. Designed and engineered by the specialists at by Sonus faber, the Italian Artisans of Sound, the sound system offers two levels of customisation, the highest of which boasts 21 speakers and 3D sound with an output of up to 1,000 W, for depth of field and truly unique roundness of sound.\n\nNatural materials and exclusive speaker design result in an outstanding natural sound in the cabin, with specific attention paid to distance and time alignment between the tweeters and mid-range speakers to create the distinctive \"Voice of Sonus faber\" (VoS) tone.\n\nThe subwoofer technology has been modified: no longer encased in the boot, now in the open air, paired with the external cavity to optimise performance and space.\n\nThe authentic Sonus faber natural sound experience is immersive and exceptional, thanks to 21 speakers overall (total output of 1,285 watts): 7 x 45-W tweeters; 3 x 60-W mid-range speakers; 2 x 45-W surround mid-range speakers; 2 x 100-W front woofers; 2 x 60-W rear woofers; 4 x 45-W height mid-range speakers; 1 x 200-W subwoofer.<|endoftext|>We're just going to say it. People who ride make better drivers. There are exceptions to every rule, but in general we notice more, are more courteous and practice more defensive driving. And for some reason, Harley® riders seem to be in the upper echelon when it comes to learning from their bike riding experience. Maybe it's because we put such a high value on our bikes. Perhaps its because reliable performance and superior handling allows us to ride with more confidence and precision. Maybe it's both. But here's how riding makes us better drivers.\n\nThe first time you get on a bike, you suddenly realize things you didn't before. It's like a moment of revelation about your frailty and humanity. Your skin is paper thin and tears easily. Your elbows and knees seem incredibly pointy and prone to whacking on every available surface. You realize what could happen to your skull and brain if you hit the pavement even at low speed. All that before flashes through your mind before the first time you let out the clutch. \n\nA motorcycle training course or your first few riding lessons don't take long, but you make mistakes. You learn how quickly unexpected things can happen. It changes you for life.\n\nWhether you become a lifelong motorcycle rider or you just ride for a season, you're never the same. Just one day on a bike makes you more aware of the world around you. You don't ever \"check out\" like when you're driving. You know if you do, it could mean your life.\n\nMotorcycle riders become confident in their abilities as skill improves. But the wise ones never feel untouchable. We know what we're doing is more dangerous than riding in a car. That's a risk we accept because we're also willing to take responsibility for our own safety. And frankly, we trust our ability to ride a motorcycle well more than we trust other drivers to pay attention to what they're doing.\n\nBefore we set out, we know what we're facing. We ride with gear to help us stay safe and comfortable. We seldom just hop in the car and hope for the best, instead we know how to ride safely on wet Dallas roads.\n\nStudent driver courses preach defensive driving, but nothing brings it home faster than a few minute on a motorcycle. No one has to tell you you're smaller than the other traffic. You feel it. So you make adjustments.\n\nIt goes hand in hand with not zoning out. Riders are always looking for potential risks and escape routes. We know exactly what we can expect from our bike if we need to make a sudden stop or reach peak acceleration.\n\nCar drivers sometimes merge, change lanes or turn like they're the only vehicle on the planet. They either never see you, or if they do they get that shocked look. \"Oh my gosh, I'm so sorry I didn't see you there,\" they seems to say, as if that makes it okay to drive with your head up your backside. Motorcycle riders don't do that. They never assume vehicle drivers will notice what they're doing and make adjustments. The ones who do, unfortunately, don't ride very long.\n\nThat makes us better drivers across the board, because we give others space. We don't ride too close hoping to push other drivers along. We're acutely aware of our lane position, so we don't crowd other drivers or drift into their space.\n\nIn a lifetime of riding, I've seen maybe one guy on his phone riding a motorcycle. I fear for his future. In contrast, you can usually count at least half a dozen Dallas drivers texting, taking selfies, watching videos and everything else when you ride from point A to point B. \n\nThe difference isn't just that you don't need both hands the whole time you're driving a car. Plenty of us have cruise control, we could text and ride if we really wanted to. But if you bump the vehicle in front of you in a car, you have steel reinforcement and airbags. On a bike, we have leather and a helmet. We can wait to check messages the five minutes it takes to get to the coffee shop. Plus, part of the reason we ride is to get away.\n\nUsually, that behavior carries over into regular driving. We realize the folly of it on a bike, so we don't do it in our car or truck either.\n\nOkay, you've seen that guy in Dallas traffic that realizes his exit is on the other side, so he darts across four lanes of heavy traffic. Somehow he usually survives, it's mystifying. Motorcycle riders don't do that. \n\nWatch a biker next time you're behind them in traffic. They're constantly scanning the lanes ahead and checking their mirrors to know what's on every side. They never make sudden changes without knowing what's in their blind spots.\n\nIf you've ever been on a road with no room to pass", "num_tokens": 2048} {"category": "common_crawl-travel_and_tourism", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-travel_and_tourism/part-00-00000.npy", "text": "negga serves as the starting point for the Five-Lakes hike. You can also visit the adorable marmots at the nearby marmot-watching station. To the west of Sunnegga Jumptrail, a hiking trail leads to a bird’s eye view of the town of Zermatt, situated 500 meters below.\n\nJust a seven-minute walk from Sunnegga, you’ll find Leisee, a small lake. It’s easy to spot from Sunnegga; simply follow the muddy trail heading southeast. The lake features a tiny beach with a few benches, an ideal spot to sit back and take in the scenery.\n\nLake Leisee is one of the few places in Zermatt where you can capture the reflection of the Matterhorn on the water’s surface. There are two other locations mentioned in this post that are worth exploring.\n\n3. Riffelalp Resort\n\nWhile I haven’t come across any accounts of people swimming in Lake Leisee in Sunnegga, our third scenic spot in Zermatt offers a unique swimming experience, provided you’re willing to splurge. Nestled at an elevation of 2,222 meters above sea level in the mountains south of Zermatt, Riffelalp Resort 2222m is a haven of tranquility amidst the mountains.\n\nAs per the Riffelalp Resort’s website, it boasts the highest spa in Europe. The spa features a pool that provides breathtaking views of the Pennine Alps and the Matterhorn. Picture yourself floating in a heated pool, with the Matterhorn in your sight and the majestic Pennine Alps surrounding you, all while basking in the serenity of the moment. Sounds like a dream, doesn’t it?\n\nYou can check the price of a night of stay in Riffelalp Resort here.\n\n4. Riffelsee\n\nWhile I may not have the means to stay at the Riffelalp Resort just yet, I’m all for embracing the thrill of outdoor adventures. Who’s with me?\n\nNext on our list is Riffelsee, a picturesque lake renowned for its stunning reflections of the Matterhorn. This scenic spot in Zermatt is a must-visit for photography enthusiasts.\n\nPerched at an elevation of 2,757 meters above sea level, Riffelsee is the most accessible lake from Zermatt for capturing breathtaking images of the Matterhorn. The lake’s close proximity to the Matterhorn, coupled with its size, reflectivity, and tranquility, provides an ideal setting for showcasing the grandeur of the Matterhorn.\n\nWhen is the best time to visit Riffelsee? While there’s no specific time that’s considered the best for visiting Riffelsee, sunrise or sunset can provide a spectacular view of the Matterhorn. However, keep in mind that Riffelsee is typically frozen during winter. When the lake is frozen, the reflection of the Matterhorn on the water isn’t visible, so it might be better to avoid visiting during the colder months.\n\nIs it possible to visit Riffelsee for sunrise? Yes, it is possible to watch sunrise in Riffelsee! In fact, Riffelsee is one of the prime locations for watching the sunrise, offering unparalleled views of the Matterhorn. The Gornergrat Bahn from Zermatt offers a Sunrise Trip to Rotenboden early in the morning. Regular prices for the Sunrise Trip start from 135 CHF for adults.\n\nPicture this: the clear skies gradually brighten, and the first ray of sunlight illuminates the peak of the Matterhorn. As minutes pass, half of the Matterhorn is bathed in a golden hue. The highlight? The reflection of the Matterhorn on the calm surface of Riffelsee. It’s an awe-inspiring sight that you can only witness in Zermatt!\n\nIf you’re visiting Riffelsee outside of sunrise, a short stay might suffice, provided the skies are clear and the Matterhorn is fully visible. However, if the Matterhorn is obscured by clouds, it’s worth lingering at Riffelsee. Wait for the sky to clear, if there’s a chance. The sight of the Matterhorn mirrored in Riffelsee is an iconic image, and it’s worth the wait for a clear day to experience it.\n\n5. Gornergrat\n\nGornergrat, a scenic spot in Zermatt, has been Switzerland’s most visited excursion destination since 1898. This observation deck is perched on a rocky ridge of the Pennine Alps, situated east of the Matterhorn and overlooking the Gorner Glacier to the southeast.\n\nWhy is Gornergrat a must-visit? Aside from the stunning mountain views, there are two main reasons: the opportunity to see Gorner Glacier, the second-largest glacier in the Alps, and the journey to the top on Europe’s highest open-air cogwheel train.\n\nEven if the Matterhorn is hidden by clouds, the breathtaking Gorner Glacier can be admired from the other side of the observation deck. At the same time, visitors to Gornergrat are often left speechless by the scenery, even before they reach the top. The views along the train tracks are stunning, and the mountain breeze is invigorating.\n\nThat said, while Gornergrat may not be the best place to view the Matterhorn (in my opinion), it still offers outstanding view of Matterhorn and an overall rewarding experience.\n\nTo reach Gornergrat from Zermatt, take the cogwheel train. The journey should last for 30 to 35 minutes, with stops at Findelbach, Riffelalp, Riffelberg, and Rotenboden.\n\nWhen is the best time to visit Gornergrat? It’s advisable to avoid visiting Gornergrat if the weather forecast predicts poor visibility. The Zermatt tourism website provides a webcam for checking the conditions above. The Gorner Glacier may not be clearly visible during winter as it can be covered in thick snow. However, from late spring to autumn, the glacier should be easily visible from Gornergrat.\n\n6. Schwarzsee\n\nLocated to the west of Gornergrat, over the Gorner Glacier valley, lies Schwarzsee.\n\nThis lake, situated halfway between the Matterhorn and the town of Zermatt, serves as the starting point for the Matterhorn ascents and the Matterhorn Glacier Trail. While you won’t see a reflection of the Matterhorn in Schwarzsee due to its deep location, the calm surface often mirrors the Maria zum Schnee chapel, creating a scene reminiscent of a fantasy novel you wouldn’t want to miss.\n\nMaria zum Schnee chapel is a favored destination for Matterhorn climbers, who visit after a successful climb to express gratitude for a safe journey.\n\nThe best view of Schwarzsee can be found from the Matterhorn Glacier Trail, located south of the lake. On clear, calm days, the reflection of the Maria zum Schnee chapel in Schwarzsee is visible, along with the peaks of Zinalrothorn, Wellenkuppe, and Ober Gabelhorn.\n\nBefore embarking on the hike to the Matterhorn or heading to the best view of Schwarzsee, consider stopping to enjoy the view of Zermatt from the vantage points located east of Hotel Schwarzsee. The area around Schwarzsee offers some of the best perspectives of Zermatt from above.\n\nWhen is the ideal time to visit Schwarzsee? If you’re not planning to hike the Matterhorn, consider visiting Schwarzsee before sunset. As dusk falls, you’ll be treated to stunning views of the town of Zermatt in the valley below, illuminated by twinkling lights. Just remember to check the cable car schedule to ensure you catch the last ride back down to the valley, if you’re not planning to hike down from Schwarzsee.\n\nHow do you get to Schwarzsee? It’s accessible by cable car from Zermatt. The journey, which includes two stops at Furi and Schwarzsee, takes around 14 minutes in total.\n\n7. Matterhorn Glacier Paradise\n\nNo bucket list of scenic spots in Zermatt would be complete without Klein Matterhorn, the highest peak accessible by aerial tramway. This location serves as the climax of our list, as it’s the highest point we can reach without climbing the Matterhorn.\n\nWhy should you visit Klein Matterhorn? Despite the expensive cable car ride, priced at CHF 100+, the views from the top are absolutely worth it, particularly on clear days. Klein Matterhorn is the only location in Zermatt where you can conveniently see the highest peaks of three countries at once: Switzerland, France, and Italy. If you’re seeking an unforgettable experience, Klein Matterhorn is a must-visit.\n\nOn a clear day, you’ll have a panoramic view of the entire Pennine Alps, as well as Mont Blanc, which stands at 4,810 meters above sea level in France, and the Gran Paradiso, at 4,061 meters above sea level in Italy. Most importantly, Klein Matterhorn offers the best view of the south face of the Matterhorn, a feature that sets it apart from all other scenic spots in Zermatt.\n\nBeyond the stunning views, Klein Matterhorn also offers other experiences. You can explore the Glacier Palace inside the mountain or watch a film in the Cinema Lounge. The world’s highest 3S cableway, known as the Matterhorn Glacier ride, services Klein Matterhorn and connects to another station linked to Zermatt.\n\nTo reach Klein Matterhorn from Zermatt, follow these cable car segments: Zermatt to Furi via the Matterhorn-Express, Furi to Trockener Steg via cable car, and finally, Trockener Steg to Matterhorn glacier paradise.\n\nWhen is the best time to visit Klein Matterhorn? It’s worth visiting if the skies are clear and sunny. However, given its altitude", "num_tokens": 2048} {"category": "common_crawl-travel_and_tourism", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-travel_and_tourism/part-00-00000.npy", "text": " as well.\n\n8. Send personalised Emails Campaigns\n\nYou can reach potential guests via email marketing using online email marketing software. First, you'll need to get potential clients' email addresses so you can start a targeted email marketing campaign. Guests who have stayed at your establishment before can be kept in the loop about what's happening there with email marketing for hotels. You can ease all these tasks with some great email marketing software.\n\nIn an ideal world, everyone in the hotel sector would actively seek out industry news and surf the web to learn about the most recent developments in the field. We know this isn't feasible. Customers can learn more about your company and its products through newsletters. So, you'll be able to build strong relationships with your current and future customers. Email marketing software likes Hubspot, Mailchimp, ActiveCampaign, MailerLite can help with successful marketing strayergies.\n\n9. Build interactive website\n\nOn hotel websites with a lot of high-quality photos, conversion rates go up by 15%. One of the most crucial promotional resources for your hotel is its website. Visitors to your website are looking for information about your hotel before deciding whether or not to reserve a stay. If you want to attract and keep customers, it's important to keep your website up-to-date with the latest information about your hotel. Rates, room availability, hotel amenities, and contact details should all be listed here.\n\nIn a few easy steps, you can have your own website up and running with the help of property management software with website integration. There are some free platforms that can help you make a website for your hotel. Whereas several platforms can help you create attractive websites with paid subscriptions. Some of them are:\n\n10. Influencer marketing for hotels\n\nThose with a huge online following, or \"influencers,\" can spread the word about your hotel to their followers. Start working with influencers by reaching out to them and asking if they would be willing to promote your hotel on their social media pages. Offer to pay influencers to spread the word about your hotel if you have the marketing funds to do so. Influencer marketing for hotels is in style these days and can draw attention to your hotel business.\n\nare a few of the many online platforms and services made just for hotels' influencer marketing.\n\n11. Use tools to improve hotel guest experience\n\nWhen guests receive outstanding service before, during, and after their stay, they are more likely to return to the hotel. To do this, you have to go above and beyond what is needed to meet their needs and go above and beyond what they expect. Business travelers could be accommodated in a number of ways, including early check-in and late check-out. Guests who stay for multiple nights might appreciate a free breakfast. The quality of the service your customers get affects both how happy they are and how likely they are to stay at your hotel again. This enhances the hotel guest experience and, in return, builds brand loyalty.\n\nTo attract more guests, you can use a variety of hotel marketing strategies. Applying these methods will increase the number of potential guests at your hotel and the number of people who book a night there. Examine how putting even one of these hotel marketing strategies into practice might boost your establishment's bookings.\n\nLet Quoality help you with improving guest experience\nKnow How!\n\nHow Does Marketing Create Hotel Brand Awareness?\n\nAs the travel industry adapts to new technology, it will get harder for older businesses to stand out, please customers, win their loyalty, and set themselves apart from the competition. Hotel guests are becoming increasingly accustomed to receiving personalized service. Also, some of the most well-known hotels in the world already offer similar services. This means that hotels need new ways to stand out from the crowd, build their own brand recognition, and create hotel brand awareness.\n\nA recent example, we can see in the hotel industry is Google's free booking link.\n\nGoogle launched a new feature. Started in March 2021, you are now able to find free hotel booking links on Google Search and Google Maps. The Google Free Booking Link is a great way for hotels to compete with OTAs in brand searches and boost direct bookings by attracting more visitors to their website.\n\nDespite the obvious benefits, many hotels have yet to make use of the Google Free Booking Link, despite the fact that it has been available for over a year. Having said that, it is still not too late to become a Google FBL user.\n\nHotels can now meet the needs of their guests better with the help of technology. As a result, the hotel's brand recognition, hotel brand awareness, customer loyalty, occupancy rate, and income will all go up as guests become brand advocates and work with the hotel's staff. Hotel owners can maximize both brand recognition and revenue by implementing these practices and offering the best possible rate through their booking engine in order to encourage more guests to book their accommodations directly with them.\n\nTo Sum Up\n\nWhen it comes to assisting hotel businesses in maximizing bookings and income, hotel advertising plays an essential role. It is the primary means through which the hospitality sector can make contact with prospective clients and communicate their distinct selling proposition as well as the values associated with their brand. It's hard to say how important it is to have the right hotel marketing strategies. It's a key part of launching a hotel, getting the most bookings, building hotel brand awareness, and keeping your reputation in check.\n\nOver the years, the most important marketing trends in the hospitality business have changed. And despite this, it seems that every day there is a new trend that emerges on the internet and becomes a tool for marketing. The key to standing out is creating smart, unique hotel marketing strategies and hotel marketing ideas. Selecting the right marketing strategy for your hotel business requires a lot of specificity and care.\n\nSubscribe to our newsletter\n\nThe only end-to-end suite to transform your hotel and brand\n\nThe ultimate hospitality guest experience platform for\nVerified Increased guest satisfaction\nVerified Revenue growth\nVerified Improving staff efficiency\n\nLearn how Quoality can help your property thrive ⚡️<|endoftext|>Get ₹200 cashback on mobile app download\nNo return fare\nOne-Way cab fare | No hidden charges\nMinimal advance\nNo over-pricing\nCheapest costs | Competitive prices\nPay as you go\n\nBook Nagpur to Vikarabad Cab\n\nNagpur to Vikarabad distnce : 557 km\n\nEstimated travel time : 10.4 hours\n\nVikarabad is a prominent city located in the state of Telangana, India. It serves as the headquarters of the Vikarabad district and is situated at an elevation of about 698 meters above sea level. With its rich historical background and picturesque surroundings, Vikarabad has emerged as a popular tourist destination in recent years. The city is well-known for its serene lakes, verdant forests, and ancient temples, making it a haven for nature lovers and history enthusiasts alike.\n\nVikarabad, nestled amidst the lush greenery of Telangana, offers a perfect blend of natural beauty and cultural heritage. This city, which was once ruled by the Kakatiya dynasty and later by the Nizams of Hyderabad, boasts a fascinating historical background. The remnants of a fort built during the reign of the Kakatiya dynasty serves as a testimony to its glorious past. The fort, now in ruins, attracts visitors with its architectural marvels.\n\nVikarabad's unparalleled scenic beauty is one of its main attractions. The city is surrounded by the Eastern Ghats and is home to several breathtaking lakes. Ananthagiri Hills, located just 5 kilometers away from Vikarabad, offers captivating trails, verdant forests, and cool weather that are sure to rejuvenate any weary traveler. The Nagasamudram Lake, another popular spot, provides a tranquil and picturesque setting for boating and picnicking.\n\nApart from its natural charm, Vikarabad is also famous for its ancient temples. The Anjaneya Swamy Temple, located near the fort, is a revered place of worship for locals and devotees from all over the region. The temple, dedicated to Lord Hanuman, is known for its beautiful architecture and spiritual aura. Another prominent religious site is the Koti Lingeshwara Swamy Temple, which houses hundreds of Shiva Lingas.\n\nVikarabad also hosts an annual festival called Nagarjuna Sagar Sammakka Saralamma Jatara, which attracts thousands of devotees who come to pay homage to the deities. This vibrant festival showcases the cultural diversity of Telangana, with music, dance, and other traditional performances.\n\nIn recent years, Vikarabad has witnessed significant development in terms of infrastructure, making it more accessible to tourists. The city offers various accommodation options, including resorts and guesthouses, catering to the needs of different travelers. With its serene surroundings, historical significance, and religious sites, Vikarabad has gained recognition as a hidden gem of Telangana and is a must-visit destination for those seeking solace in the lap of nature and an exploration of the region's rich cultural heritage.\n\nTaxi from Nagpur to Vikarabad is readily available at CabBazar.\n\nNagpur to Vikarabad Cab Route\n\nNagpur to Vikarabad by car is well connected by road and is very convenient and comfortable drive. Nagpur to Vikarabad distance is 557 Km and is 10.4 hours journey. Other famous tourist places on this route and nearby are :\n\n1. Adilabad - Adilabad is a town located in Telangana and is known for its natural beauty, waterfalls, and ancient temples. You can visit Kala Ashram, Jainath temple, Kadam Dam, and Pochera Waterfalls.\n2. Ramoji Film City - Located near Hyderabad, Ramoji Film City is the largest film studio complex in the world. You can take a tour of the studio and enjoy various entertainment shows, rides, and attractions.\n3. Hyderabad - The capital city of Telangana, Hyderabad offers a", "num_tokens": 2048} {"category": "common_crawl-travel_and_tourism", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-travel_and_tourism/part-00-00000.npy", "text": " known as the Independent State of Samoa, this country consists of two main islands: Upolu, home to the city of Apia, and the larger Savai'i. This tropical paradise is an excellent choice for travelers seeking a unique holiday experience.\n\nThe capital city of Apia, located on the island of Upolu, is considered the heart of Samoa. The city is renowned for its colonial architecture, colorful markets, and delicious local cuisine. During your time in Apia, you can immerse yourself in Samoa's vibrant culture, purchase handmade souvenirs, and create beautiful memories while interacting with the locals.\n\nSamoa's natural beauty is evident in every corner of the islands. Lalomanu Beach, located on the northern coast of Upolu, is famous for its white sands and turquoise waters. Moreover, you can marvel at the unique natural formations, such as the To Sua Ocean Trench.\n\nSavai'i Island is covered with volcanic mountains, waterfalls, and tropical forests. This island is a paradise for nature lovers and adventure enthusiasts. In Savai'i, you can explore natural wonders like the Afu Aau Waterfall and Alofaaga Blowholes, and hike through the island's interior to observe endemic plant and animal species.\n\nTo discover Samoa's rich cultural heritage, it is essential to visit traditional villages and historical sites. In particular, you should stay in villages to experience the local lifestyle known as Fa'a Samoa. By doing so, you can witness the daily lives of the locals and participate in traditional dances, music, and handicrafts.\n\nAccommodation options in Samoa range from luxury holiday resorts to charming guesthouses. On the islands, you can savor delicious local dishes prepared by experienced chefs and cool off with fruit cocktails. Additionally, Samoan cuisine offers healthy and tasty dishes enriched with seafood and local products. You can also buy fresh fruits and vegetables at local markets to prepare your own meals.\n\nTransportation to Samoa is usually provided by direct flights from neighboring countries such as Australia, New Zealand, and Fiji. Furthermore, ferry services operate between Upolu and Savai'i, allowing for easy inter-island transfers.\n\nSamoa's warm and hospitable people organize local events and festivals that leave unforgettable memories for visitors. You can join energetic celebrations accompanied by traditional Samoan dances and music, witnessing this unique culture up close.\n\nSamoa's stunning marine life and coral reefs provide an ideal environment for water sports enthusiasts. You can explore Samoa's fascinating underwater world through activities such as diving, snorkeling, and canoeing. Additionally, you can hike or cycle through the islands' natural beauty in mountainous areas.\n\nSamoa is also an unforgettable destination for romantic honeymooners. You can create romantic memories by walking hand-in-hand on quiet beaches at sunset, pampering yourself in luxury spa centers, and enjoying romantic dinners overlooking the islands' unique landscapes.\n\nFor families with children, Samoa offers a safe and fun holiday option. At family-friendly hotels and beaches, you can spend quality time with your children and introduce them to the beauty of this exotic island nation through entertaining and educational activities.\n\nIn conclusion, Samoa is a fantastic destination offering unforgettable holiday experiences with its natural beauty, rich culture, and warm-hearted people. To explore this tropical paradise, be sure to plan a visit to this enchanting corner of the South Pacific and create memories that will last a lifetime.\n\nPopular Airlines Flying to Samoa\n\nFiji Airways\nSamoa Hotel\nSamoa Cars\nSamoa Tours\nSamoa Bus\n\nSamoa Flights Top Questions\n\nTezfly searches tour operators, major booking sites (consolidators) and hundreds of airline sites to find the cheapest Samoa flight ticket prices. With a single search on Tezfly site, you can search many suppliers, find and compare cheap Samoa flight tickets and choose the most suitable ticket.\nAirfare to the Samoa varies the airline company, your travel dates, your ticket class, and the booking period. By making early reservations and following promotions, you can find more affordable tickets.\nIf you want to buy Samoa flight tickets, do not leave your reservation until the last minute. If you buy your Samoa flight ticket at least 2 weeks in advance, you will save much more money.\nTo buy cheap Samoa flight tickets, you can sign up for Tezfly newsletter or follow Tezfly social media accounts. In this way, you will be the first to hear about both airline and Tezfly campaigns. By using a discount coupon, you can buy your flight ticket to Samoa much cheaper.\nCookies are used on our website to provide a better experience for our customers. Details<|endoftext|>08 April 2024\n\nviews: 141\n\nHotel for recreation with children in Lviv\n\nLink to the hotel's Instagram page: https://www.instagram.com/swiss_hotel/\nThe Swiss Hotel is an ideal place to relax with children in Lviv. Located in a quiet and cozy area of the city, this hotel offers comfortable conditions for the whole family.\n\nOne of the main advantages of the hotel is the presence of special areas for children. There is a children's room where children can play safely under the supervision of their parents. In addition, the hotel offers the services of a babysitter who can take care of children at a time when parents want to rest or go on an excursion.\n\nFor the convenience of guests with children, the hotel has family rooms equipped with everything necessary for a comfortable stay. There is a separate children's room for children with toys, as well as a spacious bedroom for parents.\n\nThe Swiss Hotel also offers entertainment for the whole family. Here you can use the Roman-Turkish steam room, and find a fitness room nearby. Various workshops and games are organized for children so that they are not bored.\n\nIn addition, the hotel is located in a convenient location, close to the most prominent sights of Lviv. Thus, you can combine rest with interesting excursions and walks around the picturesque city.\n\nThanks to its friendly atmosphere and special conditions for children, the Swiss Hotel will be an ideal choice for a family vacation in Lviv. Come and enjoy quality service and unforgettable moments with your family.\n\nIn addition, the Swiss Hotel has at its disposal the panoramic restaurant Valentino, where guests can enjoy a wonderful view of the city during a delicious lunch or dinner. The restaurant offers a wide selection of Italian, Ukrainian and European dishes, as well as a special children's menu with favorite dishes for little gourmets.\n\nFor the convenience of parents and children, the Valentino restaurant has a separate children's room, where the little ones can play safely and have fun under the supervision of specialized employees if necessary and for an additional fee. This way, parents can enjoy a delicious lunch or dinner, knowing that their children are supervised and safe.\n\nThanks to such conditions and service, the Swiss Hotel together with the Valentino restaurant create an ideal atmosphere for a family vacation in Lviv. Come and enjoy quality service, delicious food and unforgettable moments with your family.\n\nThe Swiss Hotel also offers the organization of children's birthday parties in the Valentino restaurant. For this, the restaurant has the opportunity to order a special children's menu with favorite dishes for small guests, as well as a themed decoration if desired. In addition, professional animators will help create a fun and unforgettable celebration for children by organizing games, contests and entertainment.\n\nParents can calmly enjoy the celebration, knowing that all the details of the event will be worked out to the smallest detail. The large hall of the Valentino restaurant can accommodate a large number of guests, so that your celebration will be comfortable and satisfying for all participants.\n\nThus, the Swiss hotel provides an opportunity to organize a bright and fun celebration of a children's birthday for your child, where every moment will be remembered for a long time.\n\nYou can book a room on the website: https://swiss-hotel.lviv.ua/uk/\n\nYou can also book a room by phone:\n\n+38(032)240-37-77\n\n+38(096)240-37-77<|endoftext|>1. Australia\n 2. QLD\n 3. Queensland Islands\n 4. Hamilton Island\n 5. #9171650\n\nYacht Club Villa 28 - Hamilton Island\n\nVilla, Hamilton Island\n\nConfirmation within 24hr\n\nAverage $1,472 per night {{quote.pricing.message}} Total {{quote.pricing.price | format:'currency':'short'}} forhildren welcome Clothes dryer Dishwasher DVD player Indoor pool Iron and board Kitchen Linens provided Microwave Non-Smoking Outdoor grill<|endoftext|>Historic Cities & Places in Rhode Island\n\nRhode Island is not only known for its beautiful coastline but also for its rich history. There are several historic cities and places in Rhode Island that offer a glimpse into the state’s colonial past. From Newport’s stunning gilded age mansions to Portsmouth’s preserved colonial era homes, these cities and towns are a haven for culture, architecture, and history. Let’s explore some of the best historic cities and places in Rhode Island.\n\nKey Takeaways:\n\n • Rhode Island is home to numerous historic landmarks and cultural heritage sites.\n • Newport is renowned for its gilded age mansions and colonial homes.\n • Portsmouth offers a chance to explore preserved colonial architecture.\n • Wickford Village in North Kingstown is a charming coastal village with historic buildings.\n • Pawtucket played a significant role in the Industrial Revolution.\n\nNewport is a must-visit destination for history enthusiasts. It is famous for its series of stunning gilded age mansions along Ocean Drive, which showcase the opulence of the past. In addition, Newport is home to Rhode Island’s first state house, centuries-old taverns, and well-preserved colonial homes. Walking through the streets of Newport is like stepping back in time.\n\nWhen exploring Newport, be sure to visit the famous Breakers mansion, a symbol of the Gilded Age. This opulent mansion was built by the Vanderbilt family and features grand interiors and beautiful gardens", "num_tokens": 2048} {"category": "common_crawl-travel_and_tourism", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-travel_and_tourism/part-00-00000.npy", "text": " from their outdoor tank. Inside, the new “touch tank” takes over welcoming duties–you can start your visit by getting up close to stingrays and even petting them on their backs–they’ll swim right up to you! One of the Aquarium’s knowledgeable staff will be there talking about the animals and can answer any questions you have.\n\nIn addition to the interactive touch tank, you’ll get to see a variety of penguin species playfully jumping into and out of the water and/or feeding on fish. The rest of the aquarium is designed around a circular glass, four-story coral reef tank teeming with colorful fish, turtles, and even sharks!\n\nAs you make your way up to the top of the tank, where you can watch the staff feed the turtles or divers enter the tank, you’ll pass lots of exhibits along the way with everything from giant octopi to cuttlefish, seahorses, crabs, and more.\n\nSome highlights of the aquarium include a shark and ray touch tank, and of course, a giant ocean tank, which is home to a vast Caribbean coral reef, green sea turtles, sand tiger sharks and Great Pacific octopus.\n\nA su llegada:  Entradas para el New England Aquarium están incluidos en la tarjeta Go Boston.\n\nStop #3: Museum of Fine Arts (Indoor Option)\n\nMuseum-of-Fine-Arts-3\nAnother popular Boston attraction that’s worth a visit if you only have one day in Boston is the Museum of Fine Arts. This renowned art museum boasts a collection of nearly 450,000 works of art, featuring everything from Ancient Egyptian sculpture to contemporary painting.\n\nTheir particular strengths lie in their new “Art of the Americas” wing, which contains over 50 galleries that span the gamut from Pre-Colombian art to the end of the twentieth century.\n\nIn addition to their impressive permanent collections, the MFA also offers diverse, rotating special exhibits that showcase new acquisitions, items on loan, and important trends or eras in art. Check out their calendar for any unique programming that may also be available during your visit.\n\nA su llegada: Museum of Fine Arts tickets are included with the Go Boston Card.\n\nStop #3: Freedom Trail Walking Tour (Outdoor Option)\n\nthe-freedom-trail-sites-1\n\nWhile you’re unlikely to have time to fit all four attractions we’ve listed here in your itinerary, you can choose between one of the first three and this delightful outdoor option depending upon what time of year you’re visiting.\n\nThis 90-minute, guided Freedom Trail Tour is a quintessential Boston experience that showcases both Boston’s rich history and culture and its beautiful landscapes and greenspaces, starting with the Boston Common where the tour begins.\n\nThis legendary path is a red brick line that physically leads you through the city, passing by the most important historical sites of the early days of American Revolution that led to independence from Britain.\n\nAlgunos de los lugares incluidos en este recorrido a pie incluyen la Casa del Estado de Massachusetts, la Iglesia de la calle Park, el lugar de la masacre de Boston y Faneuil Hall.\n\nBe sure to checkout our guide for tips for taking a walking tour and an overview of the Freedom Trail sites you will see.\n\nA su llegada: Freedom Trail Boston Tour tickets are included on the Go Boston Card.\n\nLet’s Recap\n\nIt couldn’t be easier to save big on your one day in Boston.\n\nRemember, when you build your own Boston attraction pass you can save up to 20% off admission prices following this popular itinerary.\n\nLa tarjeta Boston® Go es la mejor opción para máximo ahorro y flexibilidad durante sus vacaciones.\n\nGo Boston Card\n\nLa información que se incluye en esta publicación era, al leal saber y entender del autor, correcta y precisa en el momento de la publicación. Haremos nuestros máximos esfuerzos por garantizar y conservar la exactitud de la información.\n\nHacer un comentario\n\nNo se publicará su dirección de correo electrónico. Los campos obligatorios están marcados con un *<|endoftext|>, on the other hand, is quieter and more traditional, making it ideal for families and those looking to relax. Like the other Canary Islands, Lanzarote's climate varies little throughout the year with temperatures consistently between 20-30C. Apart from the many tourist amenities, Lanzarote is home to a selection of unique flora and fauna as well as some of the most stunning natural scenery found on the Canary Islands. The island's volcanoes have created some stunning vistas and the entire island is designated a UNESCO Biosphere Reserve.\n\nThings to see and do in Lanzarote\n\nLanzarote is teeming with incredible beaches to relax on, however, there are plenty of attractions, local places of interest and more to explore. Whether you want to discover the psychedelic caves of Jameos del Agua, explore the unusual Jardin de Cactus or head to Tequise, the oldest settlement in the Canaries - there's plenty for everyone to marvel at.\n\nCesar Manrique is Lanzarote's most famous artist and is best known for transforming Jameos del Agua caves into a transfixing tourist spot with a truly funky aesthetic. The cave system is home to a restaurant, curvy pool, an auditorium and a bar with seats built into the rocks. With ferns cascading from the walls and openings in the ceiling, this location is perfect for a leisurely drink under the stars.\n\nFor those that love a beautiful garden, the unique concept of Jardin de Cactus won't disappoint. Packed with cacti of all shapes and sizes, the old quarry that now houses these intriguing plants is laid out like an amphitheatre and provides visitors with over 450 species to discover. If you?re feeling a little parched after exploring the park, then head to the care/bar for a fresh juice and a cactus burger made from prickly pear cactus and potato.\n\nFounded in 1402, Tequise was Lanzarote's capital for 450 years, primarily due to its elevated position. An ideal location to wander around and enjoy various pottery shops, bars and a wonderful market on Sundays which offers local cheese and leather bags; Tequise is the epitome of charm.\n\nH10 Suites Lanzarote Gardens\n\nH10 Suites Lanzarote Gardens\n\nCosta Teguise, Lanzarote\nBlueBay Lanzarote\n\nBlueBay Lanzarote\n\nCosta Teguise, Lanzarote\nHD Beach Resort\n\nHD Beach Resort\n\nCosta Teguise, Lanzarote\nLabranda Alyssa Suite Hotel\n\nLabranda Alyssa Suite Hotel<|endoftext|>You can tell you’re far from home when the moon looks like the vanishing Cheshire cat’s smile from Alice in Wonderland. On other evenings, it’s huge and red. There’s that saying that even though you’re far from your loved ones, you’ll still see the same moon. I wonder what my friends see, in their homes in different parts of the world. For someone, it’s going to be small and white, for another, large and red, for a third, it can’t be seen because of vegetation/firecrackers in the sky/they’re living in a cave, for a fourth, a cheese-resembling ball where you can see the seas on its surface. I’ve been here for almost one month, and I’ve experienced all these sides of the moon’s changeable nature. I guess you need to start thinking about satellites romantically instead: they circulate around Tellus too, and everyone can see them, but they don’t change their appearance.\n\n“China” is a new name to call the middle kingdom of the east, only about 200 years old. If you want to see the change China has seen in the last 100 years, go to Shanghai. 100 years ago, Shanghai was nothing but a small fishing village. If you want to see the change China has seen in the last 2000 years, go to Xi’an. 2000 years ago, at the beginning of the first of the imperial dynasties — the Qin dynasty — the emperor united China as we know it for the first time. (Although he was lurid as a person, and when he died, the townsfolk were so angry with him they tried to beat his dead body. This really goes to show that no amount of prestige or status can define a person’s true character. He’d apparently been aware of his unpopularity, and ordered a terracotta soldier army to be established before his passing to guard his tomb, which is the largest in the world. It is yet to be found and opened!) Xi’an, “Western peace”, became the capital, which was then gradually strategically moved eastwards until it finally settled in Beijing. The city wall surrounding Xi’an still resides and can be biked around (challenge accepted!). Beijing used to have several city walls too: they were turned into ring roads 1, 2 and 3 in the 50’s and 60’s.\n\nThings learned:\n\n 1. There are animated, moving advertisements in metro tunnels. The animation “follows” the train in the tunnel, and passengers can watch the ad through the windows. 9 out of 10 times the advertisement is about weddings and marriage.\n 2. In restaurants, after you’ve been seated, one of the waiters/esses covers your belongings with a cloth. The cloth is removed only when you’ve finished eating.\n\nSimatai and Jingshanling are two of the more unpopular sections of the wall to visit because of their steepness and hard accessibility from a ground level, but for this reason they’ve managed to maintain their original structure quite well and", "num_tokens": 2048} {"category": "common_crawl-travel_and_tourism", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-travel_and_tourism/part-00-00000.npy", "text": " cityscape. The city also hosts the Museum of Nature and Humankind (Museo de la Naturaleza y Arqueología)showcasing the island’s natural history and pre-Spanish era artifacts.\n\nEconomic and Administrative Center\n\nAs the capital city, Santa Cruz serves as the administrative and economic heart of the island. It hosts the joint capital of the Canary Islands (shared with Las Palmas) and is a significant port in the Atlantic Ocean.\n\nVibrant Urban Life and Leisure\n\nThe city’s streets are lined with a variety of shops, cafes, and restaurants, offering both local and international cuisines. The Parque García Sanabria is a central urban park, a green oasis perfect for leisurely strolls.\n\nFestivities and Events\n\nSanta Cruz de Tenerife is renowned for its colorful and energetic Carnival, one of the most significant in the world. The city transforms into a hub of music, dance, and parades, attracting visitors globally.\n\nBeaches and Coastal Charm\n\nThe city boasts several beautiful beaches, such as Playa de las Teresitas, known for its golden sand and serene waters, ideal for relaxation and water sports.\n\nTransportation Hub\n\nSanta Cruz serves as a transportation nexus, with a well-developed network of buses and trams, making it an accessible starting point for exploring the rest of Tenerife.\n\nThe Architectural Diversity of Santa Cruz de Tenerife\n\nFrom historical buildings, like the Church of the Immaculate Conception, to modern structures, the city’s architecture reflects its diverse history and contemporary spirit.\n\nGreen Spaces and Recreation\n\nBeyond the urban landscape, Santa Cruz offers lush green areas and recreational spaces, such as the Palmetum, a botanical garden specializing in palm trees.\n\nCommunity and Lifestyle\n\nThe city’s community is a blend of tradition and modernity, reflected in its lively markets, such as the Mercado de Nuestra Señora de África, where locals and tourists alike mingle.\n\nArt and Culture\n\nArt lovers will find a rich scene here, with numerous galleries, theaters, and cultural centers like TEA Tenerife Espacio de las Artes, presenting a range of artistic expressions.\n\nSanta Cruz de Tenerife is a city that encapsulates the essence of Tenerife – a place where history, culture, and modernity converge against a backdrop of stunning natural beauty. It’s a city that invites exploration, offering experiences that cater to a wide range of interests, from the historically inclined and culturally curious to the beach lovers and urban explorers.<|endoftext|>Dad's museum mania\n\nOn each museum trip, my sister and I were handed a quiz. If we did well, we got ice cream.\n\nMary Knox Merrill – Staff/File\nName that painting: Visitors view Impressionist works at the Metropolitan Museum of Art in New York City.\n\nMost people go to a museum and just kind of window shop, strolling casually past portraits of 13th-century queens, old hunting rifles, and decaying remains of clothing worn by royals. Some people take photos instead of really looking. Others can't help but defy \"do not touch.\" And then there are the sleepers.\n\nOnce, during a movie at the Air and Space Museum in Washington, D.C., I thought that a man's snoring was actually the sound of an airplane taking off. But the snorer wasn't missing much – his wife was recording the entire film on a camcorder. Besides, I'd rather visit a museum with a snorer than with the kind of person my father is: a devoted learner.\n\nTo my father, skimming is a dirty word. He treats everything in a museum as if it were Magna Carta. He can stand for hours rocking back and forth on the heels of his appropriately named Rockport boots, studying museum plaques and posters on anything from Civil War battlefields to anthropology.\n\nA museum is to my father what football is to normal fathers. He can't get enough. While other fathers are exclaiming over touchdowns and fumble recoveries, my father is spitting out statistics on everything from Monet to Mount St. Helens. If he were going to be a contestant on \"Jeopardy,\" it wouldn't be so bad. But he does it out of a genuine love of learning. And that's embarrassing to a kid.\n\nDuring lunch breaks from his banking job at Northern Trust in Chicago, he'd go to museums, write down facts from the exhibits, and turn them into questions my younger sister and I had to answer.\n\nEvery weekend we'd dutifully pile into the Ford Taurus and trek to another Chicago museum. On these \"Father's Famous Field Trips\" we were handed a copy of the appropriate quiz. Written in pencil in all capital letters on yellow office paper, each question demanded close attention not only to museum relics, but also to deciphering my father's handwriting.\n\nUpon answering the questions to his satisfaction, we were awarded a trip to the ice-cream shop, which was a big deal when you were a child of parents who would allow you to have only two gum balls a week.\n\nWhile our neighbors went island hopping, we went museum hopping. On vacations, which consisted of 20-hour car rides in the Taurus, we'd pack in as many museums as humanly possible: the Edgar Allen Poe Museum, the Virginia Historical Society, the White House of the Confederacy.\n\nThe only benefit of these \"vacations\" was that my father did not have time to scope out the museums in advance, so instead of having to take a quiz, my sister and I could slip away to the gift shop, usually the most entertaining part of any museum. I often wondered if there was life outside of big, imposing concrete buildings, as everything that mattered to my father seemed to be contained in a rectangular glass case with overhead track lighting.\n\nMy mother would tell my father she wanted to go to Hawaii, to which he would say, \"Hawaii, why would anyone want to go there? There's nothing to do.\"\n\nBut what he really meant was that Hawaii wouldn't be intellectual enough. So we went to places like Colorado. And not to ski, mind you, but to explore more innards of concrete buildings. Like the Pro Rodeo Hall of Fame.\n\nAfter a half hour at this cowboy museum, my father was studying the information on the third cowboy, which was unfortunate because there were 40 featured, so I tried the snoring approach. But the bench in the museum was wooden and not fit for sleeping. So I wandered into the courtyard. My sister followed. Then my mom. Soon, the only one left in the museum was my dad and 40 dead cowboys.\n\nThe courtyard was nothing but a slab of concrete and a couple of benches. But then, to our surprise, the most entertaining subject of the cowboy museum showed his beady eyes.\n\nNormally, people run from mice. But given that we had nowhere to go but back into a museum with a devoted learner, we stayed put. I had crackers, my sister had Sour Patch Kids candy, and the mouse had both.\n\nAfter our 2,000-mile road trip, my father asked what I had learned. I tried to remember any little tidbit, any fact about flora, fauna, or cowboys that I had read but came up with nothing. Then, suddenly, it hit me.\n\n\"I learned that I'm not afraid of mice,\" I said.\n\nI hadn't regurgitated any hard facts or demonstrated superior intellect, but somehow it was the best thing a Father's Famous Field Trip had ever taught me – something about myself. As my father shook his head and walked away, I couldn't help but smiling.\n\nof 5 stories this month > Get unlimited stories\nYou've read 5 of 5 free stories\n\nOnly $1 for your first month.\n\nGet unlimited Monitor journalism.<|endoftext|>50km (31 miles) S of Munich\n\nThe historic spa town of Bad Tölz offers something for every traveler. Situated where the rolling foothills become the mountains of the Alps, the town flanks both sides of the Isar River, which divides it into two distinct sectors. On the eastern side of the river stands the historic medieval town, complete with chapels, turrets, and walls. Older than Munich, this section offers fine examples of medieval and baroque art and architecture. The major attraction here is Stadtpfarrkirche, a church built in 1466 -- it's an exquisite example of German late-Gothic architecture.\n\nOn the western bank of the Isar lies the Kurverwaltung, or modern spa, whose iodine-rich waters are known for their soothing and healing powers.<|endoftext|>Our Story\nHow did we meet?\nSimple. eHarmony.\nWe love to participate in outdoor activities where we can enjoy God's amazing creation. Hiking. Cycling. Kayaking. Climbing (indoor). As you can see from some of our pictures, getting out on a trail, waterfall, lake, etc. We've explored much of North Georgia (Cloudland Canyon, Yona, Sawnee Mountain, Black Rock Mountain, Kennesaw Mountain, Chattahoochee National Forest, Olde Rope Mill park, Lake Chatuge, DeSoto Falls, and Rabun Bald)and Western North Carolina (Mt Pisgah, Dupont State Park, and Mount Mitchell), Virginia, and a very quick visit to our Nation's Capitol together.\nThe Wedding\n\nSaturday, March 11, 2017\nChrist Presbyterian Church (PCA)\n495 Terrell Mill Road SE, Marietta, GA 30067, USA\nPiedmont Baptist Church\n570 Piedmont Rd, Marietta, GA 30066, USA\nWedding Party\n\nChrista Slyman - Matron of Honor\nAlicia Argo - Bridesmaid\nBethany Sauers - Bridesmaid\nStella Budkoski - Bridesmaid\n", "num_tokens": 2048} {"category": "common_crawl-travel_and_tourism", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-travel_and_tourism/part-00-00000.npy", "text": "ingtonpost.com/mimsie-ladner/\nThis adventure has been incredibly fun, but it has also taught me a number of invaluable life lessons: lessons that have opened my mind and my heart; lessons that have changed me; lessons that I'm quite certain I would have never learned in my home country. Conveying all of them (including how to avoid creepy old men, lice remedies and universal charades) would require I write a book, but for time's sake, I've decided to include the more valuable of the lot:\n\nHumanity is more trustworthy than we imagine. Though the media tries to make us think otherwise, the world is not a terrible place. Tragic events happen everyday and there are plenty of bad apples scattered across the planet, but in the grand scheme of things, we humans are pretty incredible creatures.\n\nI've found that more often than not, the people of the world are more than willing to reach out and help those in need. Traveling isn't always easy and I feel incredibly blessed to have had more positive human interactions than I can count.\n\nDuring a trip to Japan, I had a middle-aged couple adopt me as their American daughter for a day at a sumo wrestling competition, eager to teach me the rules of the sport, share their snacks and shower me with gifts. I've gone hiking with a family in Taiwan, was escorted around Bangkok by a group of lively ladyboys and have shared countless meals with complete strangers on multiple continents. The travel gods have watched over me, and I'm certain my journeys would not have been the same without these incredible people so beautifully intertwined in them.\n\nFrom the nameless faces who have guided me through airports, train stations and bus terminals to ensure that I arrive at the correct destination to the shy but genuine smiles I've received as I've wandered exotic lands, I've felt the undeniable connection that exists between us as humans. Furthermore, I've regained a sense of hope for our world's future in spite of all the darkness that exists in it.\n\nEveryone we meet has something to teach us. When traveling, one crosses paths with a number of people from various corners of the world, with different lifestyles and mentalities. Some of them only pass through our lives. Some of them stick around for much longer. Either way, whether a result of destiny or coincidence, these strangers, companions and friends are also our teachers, if we are willing to listen to what they have to say.\n\nI once agreed to join a group of acquaintances at a hole-in-the-wall bar in Ho Chi Minh City, Vietnam. I began chatting with an expat over a bottle of 333, the local beer. We didn't have much in common, but as our conversation carried on, I recognized that this guy had something to say. I'm embarrassed to admit that I can't recall his name and I probably wouldn't be able to pick him out of a crowd, but I'll never forget what he told me: \"It's our job to help others to realize their greatest potentials. Because if we don't do it, who will?\"\n\nI only had the pleasure of chatting with said guy for a couple hours, but three years later, I remember his words as clear as day.\n\nIn addition to keeping our ears open, our eyes are just as important, as there are a number of lessons to be learned that don't require words at all.\n\nOur problems are insignificant compared to those in other parts of the world. Life's tough. Everyone's got their own troubles. In fact, we would never be happy if we didn't experience disappointment from time to time. Yet, I never realized the extent of how fortunate I was -- and am -- until I looked poverty, cultural genocide, suppression, war and prejudice square in the eye.\n\nHearing the stories of North Korean defectors and Tibetan refugees who were forced to escape their home countries to survive. Meeting child prostitutes. Chatting with the \"comfort women\" of South Korea who were used as sex slaves during the Japanese occupation. Watching beggars starve their children to elicit more sympathy (and money) from passersby. Riding through Mumbai's Dharavi slums on a motorbike at 4 a.m., and witnessing the sight of hundreds of sleeping bodies sprawled across the streets, seeking sanctuary from the Indian summer heat. As heartbreaking as these experiences were, I am fortunate to have witnessed such honest tragedy, as it has put my life and petty problems into perspective.\n\nAlthough I'll never understand why or how I ended up being born into such fortunate circumstances, I've also come to learn that with greater privilege comes greater responsibility and to waste my fortune on myself would be a waste of life itself.\n\n2014-04-18-learn7.jpg\n\nAn open mind is essential for growth. I was never aware of how naive I was about the world until I dived into it, inhibition-less and wide-eyed. Having grown up in an ultraconservative homogeneous community, my exposure to the world was limited. I took everything I learned from my parents, my friends, my teachers and even the news at face value, never once questioning their logic's validity and failing entirely to think for myself. It didn't take long after my move for me to realize that everything I had learned my entire life was all relative and that in order to grow, I had to challenge my own thoughts and beliefs.\n\nI've been blessed to have had stereotype after stereotype shattered throughout my travels. In wandering mosques with a group of giddy Muslim teenagers eager to talk about boys in Malaysia, busting out Bollywood dance moves with a Sikh gentleman in India and cracking jokes with witty Buddhist monks at a temple stay in South Korea, I've realized that religion plays a very small part in who we are as people. Yet, there is valuable insight to be learned from each.\n\nI've found that the poorest of the poor (like the children in the barrios of Mexico willing to share with me their meals when they barely had enough for themselves) are usually far more generous than the wealthy.\n\nMost importantly, I've recognized that just because a culture does something differently, it doesn't make its people inferior or repulsive or backwards. In fact, diversity is what makes our world such a beautiful place to live, explore and discover.\n\n2014-04-18-learn5.jpg\n\nYet, despite our differences, we are all still human. Body image issues, heartbreak, regret, pressure to succeed, insecurity, uncertainty about the future, desire to love and be loved in return. We may have different words to express these concepts, but we all experience them in the same way.\n\n2014-04-18-984085_10100361859492899_1213534548_n.jpg\n\nWe are more than capable of overcoming tribulations independently. When we challenge ourselves to get out of our comfort zones and to throw out our safety nets, we are able to more easily recognize the vulnerability that exists within ourselves. It can be scary at first -- terrifying, even.\n\nI was once hospitalized with an E. coli infection in Agra, a mere 24 hours shy of going into septic shock. I was quite certain that I was going to die there, in that crappy hospital room, smack dab in the armpit of India, thousands of miles away from my family and loved ones. I stuck it out and, after a few days of powerful antibiotics, cheesy Hindi soap operas and suspected anti-anxiety pills, I left a new person. Or, a less fearful one at least.\n\nWhether it's being robbed, hospitalized, lost or even unable to read a menu, we encounter situations that require us to respond without the assistance of others, forcing ourselves to make our own decisions, which ultimately increases our confidence and certainty of our abilities.\n\nWe need a lot less than we think we need. I grew up in a world submerged in consumerism and excess and was taught that I needed the most fashionable clothes, the latest technology and a beautiful home and car to be happy.\n\nAfter spending countless nights in homes with minimal electricity, taking showers with a maximum of two buckets of water and not having a car or a TV or a dryer for five years, I can honestly say that those widely-believed ideologies are nothing but bullcrap. I've come to learn that we do not need stuff to have an enriched life; in fact, when we own less, we are slaves to less.\n\nThe lack of creature comforts is irritating at times, but after getting accustomed to a simpler lifestyle, we are able to focus on more important things, like our relationships and life experiences. Sometimes, like in my case, it takes traveling to countries that force us to live under these circumstances to realize this.\n\n2014-04-18-learn1.jpg\n\nThe universe opens up doors (and windows and gates) when we put ourselves out there. Traveling isn't just about seeing landmarks, flirting with the locals and sampling regional cuisine. (Though, don't get me wrong, those are all added bonuses.) Traveling is about the people we meet, the experiences we encounter and the misfortunes we overcome. It's about the lessons we learn from others, about life and about ourselves. The world is our classroom; travel teaches us more than we could ever expect to learn in the comfort of our homes. We just have to be ready and willing to let it happen.]]>\nExploring the Hidden Market Streets of Seoul tag:www.huffingtonpost.com,2014:/theblog//3.4671596 2014-01-27T16:15:02-05:00 2014-03-29T05:59:01-04:00 Mimsie Ladner http://www.huffingtonpost.com", "num_tokens": 2048} {"category": "common_crawl-travel_and_tourism", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-travel_and_tourism/part-00-00000.npy", "text": "’ll experience the vibrant culture of Limon at its liveliest.\n\nSuggested activities to do in Limon during high season\n\nVisiting Limon during low season\n\nLow season in Limon brings a quieter ambiance, perfect for travelers seeking a more laid-back experience. The lower visitor numbers mean you’ll enjoy uncrowded attractions, shorter lines, and lower accommodation rates. The relaxed pace of low season lets you explore the natural beauty and cultural offerings of Limon at your own pace, making for a refreshing and intimate travel experience.\n\nRecommended activities to do in Limon during low season\n\nPopular routes flying to Limon\n\nTravelers from around the globe can easily reach Limon with convenient flights from major cities. Popular routes to Limon (LIO) are available from several international hubs, including direct and connecting flights. eDreams enables you to search and book these routes with ease, helping you find the best flight options and schedules for a seamless travel experience to Limon.\n\nAirlines flying to Limon\n\nA variety of airlines operate flights to Limon (LIO), giving you plenty of options for both direct and connecting flights. Whether you prefer full-service carriers or budget airlines, eDreams makes it easy to compare fares, travel times, and amenities to find the right choice for you. Some airlines may offer seasonal promotions or discounts, allowing you to book a great deal on your flight to Limon.\n\nGet your cheap flights to Limon now at eDreams\n\nReady to make your travel dreams a reality? Book your flights to Limon (LIO) with eDreams and enjoy the ease of finding the best fares, whether for business, leisure, or spontaneous adventures. Don’t forget to sign up for eDreams Prime to unlock even greater savings on flights, hotels, and more. Start planning your trip today, and book your affordable flights to Limon now to embark on an unforgettable journey!\n\nFrequently asked questions about flights to Limon\n\nHow can I find cheap flights to Limon on eDreams?\neDreams combines different technologies to find the cheapest options to Limon based on real searches from customers in our platform. Our offers provide a combination of different airlines so you can pick the flight that better suits your needs.\nWhat is the weather like in Limon?\nIf you're looking for summer vibes, the best time to travel to Limon is in January, February and March, when the average temperature reaches 30.48 °C, while September, October and August are the 3 sunniest months of the year, with an average of 69.16 hours. However, if you prefer colder temperatures, make sure you visit Limon during January, February or March to experience an average of 21.46 °C. For those who don't care too much about temperatures, but want to avoid getting wet in the rain, it's important to avoid travelling during January, February and March, when the average precipitation in Limon is 9.75 mm, while the months of January, February and March are drier, with an average of 0 mm.\n\nPlan your trip<|endoftext|>Nominations open for VisitScotland's Scottish Thistle Awards\n\n15 March 2023\n\nThe very best of Scotland’s tourism and events industry will be celebrated once again as nominations for the Scottish Thistle Awards 2023 open.\n\nFor more than 25 years, the Scottish Thistle Awards has helped shine a spotlight on individual businesses, people and partnerships working in this vital part of the Scottish economy, worth £11.5 billion.\n\nAnd now for 2023, the nominations are open.\n\nNominations are open\n\nWhy don't you show a fellow tourism business some love and nominate them for a Scottish Thistle Award? There are 14 regional categories which cover all elements of the industry.\n\nNominate today\n\nThe categories\n\nThe Scottish Thistle Awards champion innovation, collaboration and sustainable practices, in line with the ambitions of the national tourism strategy, Outlook 2030.\n\nThere are a total of 14 regional categories in this year’s programme, celebrating the very best of Scotland’s accommodation sector, food and drink, outdoor experiences, and visitor attractions.\n\nThe three national-only categories celebrate Scotland’s outstanding sporting events, business events, and luxury experiences.\n\nResponsible tourism remains at the heart of the Scottish Thistle Awards, supporting the aim for Scotland to be recognised globally as a leader in this field. Every entry will be required to provide evidence on how their businesses addresses key areas of responsible tourism.\n\nRegional categories\n\nBest Bar or Pub\n\nBest B&B or Guest House Experience\n\nBest Eating Experience\n\nBest Hotel Experience\n\nBest Outdoor or Adventure Experience\n\nBest Self-Catering Accommodation Experience\n\nBest Visitor Attraction\n\nCelebrating Thriving Communities Award\n\nClimate Action Award\n\nInclusive Tourism Award\n\nInnovation in Tourism\n\nOutstanding Cultural Event or Festival\n\nTourism & Hospitality Employer of the Year\n\nTourism Individual of the Year\n\nNational categories\n\nBest Business Event\n\nOutstanding Sporting Event\n\nBest Luxury Experience\n\nNew categories for 2023\n\nNew categories introduced for the first time this year include the Celebrating Thriving Communities, Inclusive Tourism, and Climate Action Awards.\n\nThe Celebrating Thriving Communities award recognises the partnerships, collaborations, and teams that come together to protect and enhance our environment, whilst growing social, cultural and economic wealth.\n\nThe Inclusive Tourism Award celebrates a business that has developed an outstanding welcome for all customers.\n\nThe Climate Action Award celebrates businesses, events and destinations who have made demonstrable progress on their climate action journey to net zero.\n\nShare the news<|endoftext|>The weather in Bucharest and Romania to plan your trip! ✈️\n\nPlanning a trip involves considering multiple factors to ensure a smooth and pleasant experience. One of the most important aspects to take into account is, without a doubt, the weather. In this sense, knowing the weather in Bucharest and the rest of Romania is crucial for any traveler wishing to explore this country rich in history, culture and natural beauty.\n\nIn this article, we will provide you with a comprehensive guide to the weather conditions you can expect to encounter at different times of the year in Romania. We'll give you practical advice on the best season to visit, what to wear and how the weather can influence your travel itinerary. Whether you're looking to wander the history-filled streets of Bucharest, explore the picturesque castles of Transylvania, or relax on the beaches of the Black Sea, having a clear idea of the weather will help you plan the perfect trip. Be prepared to immerse yourself in the beauty of Romania, confident that you are fully prepared for any weather conditions that may arise.\n\nClimate and Seasons in Romania: An Overview\n\nBefore packing your bags, it is essential to understand Romania's climate and seasons, as they vary considerably from region to region. In this section, we will explore the general climatic characteristics of the country, divided by season, to give you an idea of what to expect in winter, spring, summer and autumn. From cold, snowy winters to warm, sunny summers, we will guide you through the particularities of each season so you can choose the best time for your visit.\n\nPacking your suitcase: What to bring according to the season\n\nOnce you have a clear idea of the weather, the next step is to properly prepare your luggage. In this section, we will offer you specific advice on what to bring on your trip to Romania, depending on the time of the year you decide to travel. We will provide you with clothing recommendations for each season, as well as a list of essential items that should not be missing in your suitcase to face the Romanian climate, thus ensuring a comfortable and pleasant experience.\n\nWeather-related activities and destinations: Make the most of your trip\n\nThe weather can significantly influence your travel plans and the activities you can enjoy in Romania. In this section, we will highlight the best activities and destinations for each season, allowing you to plan your itinerary according to the weather. Whether you prefer outdoor activities in the mountains, exploring historic castles or enjoying the beaches, we will give you all the keys to make the most of your stay, no matter the weather.\n\nPractical tips for traveling in Romania: How weather can affect your trip\n\nFinally, we will offer you a series of practical tips to make your trip to Romania as pleasant as possible, taking into account the weather conditions. We will discuss how the weather can affect transportation and the accessibility of certain areas, as well as tips for staying safe and healthy in different weather conditions. With this information, you will be better prepared to face any weather-related eventuality and enjoy an unforgettable travel experience in Romania.\n\nIn conclusion, understanding the climate and weather conditions in Romania is essential to planning a successful trip and enjoying all that this beautiful country has to offer. By choosing the best time of year to visit, preparing your suitcase accordingly, and selecting activities that align with the weather, you will be able to maximize your experience and avoid unnecessary setbacks. In addition, being equipped with knowledge and practical tips will allow you to adapt to any weather situation and explore Romania with confidence and safety.\n\nDon't let the weather take you by surprise. By following the recommendations and tips provided in this article, you'll be sure to have a memorable trip, regardless of the season you choose to explore Romania's rich culture, breathtaking landscapes and vibrant history. So pack your bags, prepare your itinerary and get ready for an unforgettable adventure in the heart of Eastern Europe. Romania awaits you with open arms, any time of the year.<|endoftext|>So you don't have a ticket for Super Bowl XLII but you still want to go to the game in Phoenix? Believe or not, it is possible. It just depends on how much you want to spend. It will cost you, but it might not be quite as much as you think. If you want to go the bargain-basement route, leaving Friday and returning Monday, you might be able to do it for $4,00", "num_tokens": 2048} {"category": "common_crawl-travel_and_tourism", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-travel_and_tourism/part-00-00000.npy", "text": " capturing Albania's history, showcasing the work of the Marubi dynasty and other photographers.\n\nWith Happytripz, your excursion in Shkodër will be filled with unforgettable moments. Whether you're exploring ancient fortresses, enjoying the natural beauty of the lake, or delving into the city's artistic soul, Shkodër is a destination that promises to enchant and inspire. Let us take you on a journey through the heart of this historic city.\n\nOur Advantages\n\n24/7 Help Desk\n\nOur customer support is ready to assist you 24/7\n\nWide Range of Excursions\n\nDiscover and book from a vast selection of over 100,000 worldwide excursions\n\nFlexible changes or cancellations without any fees\n\nModify your excursion without any cost up to 24 hours before they begin\n\nRating 4.7\nbased on 7244 reviews\n\nWesson Hardy\n\nOur day trip to the breathtaking Rozafa Castle and Shkodra Lake couldn't have been more perfect. Our guide was knowledgeable, sharing interesting facts and stories, making the history of this beautiful area come alive. Transport was comfortable and timely, ensuring a smooth experience throughout.\n\nPrincess Cameron\n\nExploring Shkoder's rich history and stunning landscapes with our local guide was the highlight of our trip to Albania. From the mesmerizing views at the castle to the serene beauty of the lake, every moment was unforgettable. Highly recommend for anyone wanting a deep dive into the culture and beauty of this region.\n\nMoses Hardin\n\nThe cycling tour around Shkoder offered by the team was absolutely fantastic. The route was well thought out, showcasing the best views and hidden gems of the area. Their attention to detail and safety made us feel at ease, allowing us to fully enjoy the experience.\n\nRogelio Delgado\n\nA hike to the secluded mountain villages around Shkoder was a journey back in time. The guide's passion for the local history and culture was infectious, making every step of the trek educational and fascinating. The scenery was spectacular, definitely a must-do for nature lovers.\n\nJournee Hartman\n\nOur boat trip on Shkodra Lake was serene and utterly beautiful. Organized by a top-notch team, it was a wonderful opportunity to relax and soak in the stunning natural surroundings. The crew was friendly and professional, ensuring a pleasant and memorable experience.<|endoftext|>Call 1.877.844.7873\n\nBreakfast Cook... chef@longbeachlodgeresort.com\nGarde Manger/Forno cook... chef@longbeachlodgeresort.com\nSaucier/Entremetier... chef@longbeachlodgeresort.com\n\nBartender... andy@longbeachlodgeresort.com\nFood & Beverage Server...\njob description - andy@longbeachlodgeresort.com\nFood & Beverage Supervisor... andy@longbeachlodgeresort.com\n\nGuest Services Agent...\njob description - heather@longbeachlodgeresort.com\nNight Auditor... job description - heather@longbeachlodgeresort.com\n\nLaundry Attendant...\njob description - housekeeping@longbeachlodgeresort.com\nRoom Attendant... job description - housekeeping@longbeachlodgeresort.com\nPublic Space Attendant...job description - housekeeping@longbeachlodgeresort.com\nHousekeeping Supervisor... housekeeping@longbeachlodgeresort.com\n\nSurf Club Attendant...job description -\nchance@longbeachlodgeresort.com\nSurf Instructor...job description -<|endoftext|>Cheap Flights to Des Moines\n\nThese prices were available within the past 7 days. Prices quoted are per person, round trip, for the period specified. Prices and availability are subject to change. Additional terms apply.\n\n\" PHX Phoenix to DSM Des Moines $307.20 \"\n\n\" DEN Denver to DSM Des Moines $280.70 \"\n\n\" DFW Dallas to DSM Des Moines $305.42 \"\n\n\" PHL Philadelphia to DSM Des Moines $383.13 \"\n\n\" EWR Newark to DSM Des Moines $329.30 \"\n\n\" LAX Los Angeles to DSM Des Moines $391.20 \"\n\n\" DAL Dallas to DSM Des Moines $449.36 \"\n\n\" MCO Orlando to DSM Des Moines $455.29 \"\n\n\" ORD Chicago to DSM Des Moines $312.20 \"\n\n\" AUS Austin to DSM Des Moines $335.82 \"\n\nDes Moines Flights & Plane Tickets\n\nIf you are dreaming of a relaxing vacation to America's Heartland, you might want to consider a getaway to Des Moines, Iowa. As you fly into Des Moines International Airport (DSM) and gaze out the plane's window, you will be lulled by the relaxing expanses of farmland and the glistening metropolis of the city. Upon your arrival in the Iowa capital, you will be itching to start exploring. Des Moines has an abundance of adventures such as the Greater Des Moines Botanical Garden, the 500-acre Living History Farms, and the Hoyt Sherman Place. No matter what your adrenaline rush--riding a fast-paced roller coaster at Adventureland or galloping on a horse across Jester Park--you are sure to have a great experience during your Des Moines getaway.\n\nTransportation from DSM\n\nMost hotels next to Des Moines International Airport offer free transportation from and to the airport. The metro transit, interstate bus lines, and the Heart of Iowa Regional Transit Agency all offer bus services for arriving flights to Des Moines. The buses serve all of Polk County and parts of other Iowa counties. You can also rent a car at a rental kiosk in the airport. Numerous limousine services and taxis are available for hire at the airport to take you into Des Moines.\n\nGive Your Heart to the \"City Beautiful\"\n\nIn recent years, Des Moines has undergone a beautification program and has become known as the \"City Beautiful.\" To bundle vacation packages to Des Moines, look no further than Travelocity. At Travelocity, you save up to $537 when you book a hotel and flight at the same time. Cheap flights to Des Moines have never been more affordable. With a bit of shopping, you can find the perfect Des Moines flights and hotels to fit your budget and make your vacation getaway a memorable event.\n\nExperience Des Moines\n\nTraveling to Des Moines? Travelocity makes planning your next trip easy with access to the best hotels, top vacation packages, deals on car rentals and more!\n\nDes Moines Airports\n\n • Des Moines Intl. (DSM)<|endoftext|>Looking for something?\n\nWednesday, August 8, 2018\n\nDoubleTree Suites by Hilton - Disney Springs Area - Resort Review\n\nby: guide4wdw - Collin\n\nDoubleTree Suites by Hilton - Disney Springs Area - Resort Review \n\nEvery once in a while we do something a little out of the ordinary compared to our typical Disney vacations for a variety of reasons. On our last trip to the parks, we decided to re-visist a hotel we'd stayed at a few times many years ago, long before this site was a reality. First and foremost, notice how I don't call this particular property a resort, but rather a hotel. The DoubleTree Suites in the Disney Springs Resort area isn't really designed to be anything more than a hotel \"plus.\" It's not a sprawling resort with a grand theme or amazing pools like you may find at a Disney resort or even neighboring Waldorf Astoria, Marriott, and even other Hilton owned properties (the parent company of the Double Tree). However, while it does lack a certain resort quality it functions largely as what I called a hotel \"plus\" above. It's not a Hilton Garden type hotel designed for short stays and simply a nice clean place to stay, but rather it shares a lot of qualities of that resort style draw. The Double Tree offers an above average pool (nothing super special but it works), a great location, large rooms, and an extremely friendly staff. If I had to describe it in a sentence, it is the resort I check when I want to book a budget friendly vacation when even the value tier resorts on property are a bit more than we're interested in paying. \n\nDont get me wrong, I am and always will be a firm proponent of guests staying on property and do so almost exclusively myself. However, if your dates are at just the right time and you want a little extra space compared to a value resort run by Disney this is and has always been our go to pick. If you catch it on the right dates, the prices can be incredibly low  and on our most recent stay we spent less than $700 for a four night stay. Couple that with the Hilton Honors points we had saved up from other non-Disney vacations and using the Hilton Honors card itself and our costs continued to drop below that original number. It's not the ideal Disney accommodation but it's far better than hundreds of other options in the Orlando area. \n\nLocation, Location, Location! \n\nThis single factor alone is one of the very best aspects of this resort. Disney does not own the resort, but the resort is technically still within \"Disney Property\" and sits less than 2 miles from Disney Springs. An Uber ride will cost you about $5 to ride to Disney Springs but you can easily make the walk at night in around 15 minutes. It's a tough walk in the heat of the day in the summer but there's a second added benefit of being \"on property\" while still being \"off property\" in a  elative sense. Due to its location and relationship with Disney the Double Tree, along with other properties in the vicinity, fall into", "num_tokens": 2048} {"category": "common_crawl-travel_and_tourism", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-travel_and_tourism/part-00-00000.npy", "text": "-sport habit. For all of its conical symmetry from afar, Mount Bachelor is, in fact, full of subtle irregularities: lateral ridges, nubs of volcanic rock, short slots through the rocks, and all manner of swoops and rolls. Which is why new-school skiers and snowboarders flock to this natural-terrain park.\nCOOL DIGS: The Pine Ridge Inn (doubles, $130-$275, including breakfast; 800-600-4095, www.pineridgeinn.com) has romantic gas-flame fireplaces in each room, but it's the view from the balcony above the Deschutes River that will really warm your spirits.\nMOUNTAIN STATS: summit, 9,065 feet; vertical drop, 3,365 feet; skiable acres, 3,683; annual snowfall, 350 inches\nLIFT TICKET: $44 Contact: 800-829-2442, www.mtbachelor.com\n\nAlyeska Resort, Alaska\nWHEN IT COMES TO SKIING in Alaska, heli-skiing tends to hoard the attention. And in a state with so many mountains, so much snow, and so few lifts, one can see why. But Alyeska's five-minute tram gets you to the goods on the North Face, a chillingly steep fall-line pitch of about 2,000 vertical feet. On a powder day (when helicopters can't fly anyway), this is the place to be, and huge winter dumps assure a season running well into May. Long northern days, warm temperatures, plenty of snow, and scintillating views of the Turnagain Arm make this a late-season winner.\nCOOL DIGS: With a three-story lobby of cherry wood and a river-rock fireplace, the Alyeska Prince Hotel (doubles, $145-$200, including breakfast and lift tickets; 800-880-3880, www.alyeskaresort.com) and its sushi bar look and feel like they were shipped in from downtown Tokyo.\nMOUNTAIN STATS: summit, 3,939 feet; vertical drop, 2,500 feet; skiable acres, 1,000; annual snowfall, 789 inches\nLIFT TICKET: $45 Contact: 800-880-3880, www.alyeskaresort.com\n\nMore at Outside\n\nElsewhere on the Web<|endoftext|>Google Groups no longer supports new Usenet posts or subscriptions. Historical content remains viewable.\n\nWhat is the Cheapest Day to Buy Delta? - 1-844-402-8105\n\nSkip to first unread message\n\nLiam Livingston\n\nDec 4, 2023, 12:42:49 AM12/4/23\nWhat is the Cheapest Day to Buy Delta? - 1-844-402-8105\n\nNote :- You can usually book cheaper tickets during a shoulder season or during the middle of the week, such as a Tuesday, Wednesday or Thursday. According to Expedia’s report, Sundays are the most expensive days, on average, to travel.\n\nFlying can be an expensive endeavor, but savvy travelers know the secret to securing the best deals lies in understanding the intricacies of airfare pricing. In this guide, we'll delve into the world of Delta Airlines and uncover the answer to the burning question: What is the cheapest day to buy Delta tickets?\n\nFactors Affecting Ticket Prices\nAirfare pricing is a complex equation influenced by various factors. Seasonal variations, day of the week trends, and the advantage of booking in advance all play crucial roles in determining the cost of your Delta ticket.\n\nUnderstanding Delta's Pricing Algorithm\nDelta employs a dynamic pricing model, constantly adjusting fares based on historical pricing data and real-time market conditions. Understanding this algorithm is key to unlocking the secrets of finding the most affordable tickets.\n\nThe Cheapest Day to Buy Delta Tickets\nWhile there's no one-size-fits-all answer, midweek days like Tuesdays and Wednesdays often present sweet spots for lower prices. However, exceptions abound, and variations exist, making it essential to stay vigilant.\n\nUtilizing Fare Alerts and Price Tracking\nStaying informed is half the battle. Explore the best tools for fare tracking and set up personalized alerts to receive timely notifications when prices drop.\n\nBooking Strategies for Savings\nFlexibility in travel dates, considering alternative airports, and even combining one-way tickets are all strategies that can lead to significant savings on Delta flights.\n\nLeveraging Loyalty Programs and Miles\nDelta's SkyMiles program offers a wealth of opportunities for savvy travelers. Discover tips for maximizing miles to score cheaper tickets and learn how to combine loyalty points with promotions.\n\nCommon Myths About Airfare Pricing\nDispelling myths is crucial for making informed decisions. Explore the fixed price fallacy, debunk the last-minute deals misconception, and understand that exclusive discounts on certain days might not be as prevalent as believed.\n\nCustomer Testimonials and Success Stories\nReal-life success stories from travelers who employed these strategies can serve as inspiration. Share your own experiences and read about others who managed to snag incredible deals.\n\nExpert Tips from Travel Agencies\nGain insights from travel professionals who navigate the intricate landscape of airfare pricing daily. Their recommendations can be invaluable for budget-conscious travelers.\n\nStay Informed About Delta's Promotions and Sales\nDelta regularly offers promotions and sales, but staying informed is key. Explore social media channels, subscribe to newsletters, and unlock exclusive offers if you're a frequent flyer.\n\nNavigating Through Delta's Website for Deals\nDelta's website hides hidden gems. Discover hidden discounts, explore the flexible date calendar, and take advantage of exclusive online promotions for additional savings.\n\nDebunking Common Misconceptions About Delta’s Pricing\nSeparate fact from fiction by exploring the truth behind popular myths. Understanding the factors influencing pricing empowers you to make well-informed decisions about when and how to book your Delta flights.\n\nIn conclusion, finding the cheapest day to buy Delta tickets requires a combination of strategy, flexibility, and staying informed. By leveraging the insights shared in this guide, you can embark on your next journey without breaking the bank.\n\nFrequently Asked Questions\nIs there really a specific day that's always the cheapest to buy Delta tickets?\n\nWhile trends suggest midweek days like Tuesdays and Wednesdays are often cheaper, it's not a strict rule. Exceptions exist, so it's essential to stay vigilant.\nAre last-minute deals always more expensive?\n\nContrary to popular belief, last-minute deals aren't always more expensive. Sometimes airlines release unsold seats at lower prices close to the departure date.\nHow can I maximize Delta's SkyMiles for cheaper tickets?\n\nMaximizing Delta's SkyMiles involves strategic planning, taking advantage of promotions, and combining miles with other discounts when possible.\nAre online promotions on Delta's website genuine and worthwhile?\n\nYes, Delta often provides genuine online promotions on its website. Exploring these can lead to significant savings on your airfare.\nWhere can I find exclusive offers and promotions for Delta flights?\n\nSubscribing to Delta's newsletters, following their social media channels, and being a part of their loyalty program can grant you access to exclusive offers and promotions.\nFor more information or to book your Delta tickets, call us at 1-844-402-8105.\nSources:- https://www.toursntravelpro.com/\n0 new messages<|endoftext|>the best & easy\n\nJardines de la Reina is the name of an archipelago lying 50 miles south of Cuba and 80 miles north of the Cayman Islands. The name means Queen’s gardens and was invented by Christopher Columbus who discovered them in 1492 and named them in honour of the Queen of Spain, Isabella of Castile. The archipelago, which is sometimes called as THE GALAPAGOS OF THE CARIBBEAN, is composed of 230 small isles, and is about 150 miles long. In 1996, a marine reserve was established there, and now it is the most extensive protected area in the Caribbean Sea. The area is entirely closed - zero number of permanent population, commercial fishing prohibited, only one base allowed, entry only with a special permit, and strictly limited number of visitors. Detailed information about the base, accommodation possibilities and the AVALON fleet is available HERE.\n\nAs the area is closed, we can see the Caribbean as it was during Christopher Columbus times: undamaged reefs full of life and no other divers far and wide, just you and the sea. We can safely enjoy there, from very close range, 15-30m deep, Caribbean reef shark 1.5-3m long, close to the surface their somewhat bigger relatives, silky shark, and those who are lucky may run into whale sharks 7-12m long.\n\nCaribbean Shark Caribbean reef shark, also called Peréz shark (Carcharhinus perezi). These beautiful creatures reach a length up to 3m and a weight up to 60kg. When diving, we can normally be 50cm from it or closer, so we can watch its ocular membranes (similar to our eyelids) with which it protects its eyes at the moment of attacking its fish victim. It apparently looks as if it closes its eyes as a gourmet when eating. Žralok karibský\nŽraloci hedvábní okolo potápěčské lodě The second most frequent shark in Jardines de la Reina is silky shark (Carcharhinus falciformis). Unlike Caribbean reef shark,", "num_tokens": 2048} {"category": "common_crawl-travel_and_tourism", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/common_crawl-travel_and_tourism/part-00-00000.npy", "text": " wildlife including the endangered Hangul and offers stunning landscapes. Its diverse terrains offer opportunities for sightseeing, hiking and bird watching making it an ideal destination for nature lovers.\n\n3. Is it safe to visit wildlife sanctuaries in Kashmir?\n\nVisiting wildlife sanctuaries in Kashmir like Dachigam National Park is generally considered safe. However it’s always crucial to check the latest travel advisories and local news, follow rules and guidelines for wildlife interaction and respect local customs for a safe and enjoyable visit.\n\n4. How can one reach Gulmarg wildlife sanctuary?\n\nTo reach Gulmarg Wildlife Sanctuary in Kashmir you can first fly into Srinagar International Airport, the nearest airport. From Srinagar hire a taxi or take a local bus to Gulmarg which is approximately 50 kilometres away. The journey offers scenic views of Kashmir’s beautiful landscapes.\n\nRecommended Posts\n\nLeave a Comment<|endoftext|>Privacy Policy\n\nYour Privacy is important to us\n\nYou trust us by using touress services and we value that trust. That means we’re committed to protecting and safeguarding any personal data you give us. We act in our customers’ best interest and we are transparent about the processing of your personal data.\n\nIf you’ve used us before, you know that touress offers online holiday-related services through our own websites and mobile apps, as well as other online platforms such as social media. We’d like to point out that all the information you are about to read, generally applies to not one, not two, but all of these platforms. This privacy policy applies to any kind of customer information we collect through all of the above platforms or by any other means connected to these platforms, including emails.\n\nIf you disagree with this Privacy Policy, you should discontinue using our services, and if you agree with our Privacy Policy, then you’re all set to book your next holidays through us. \n\nTerms we use in this Privacy Policy\n\nTour means the various different tour packages and services that can be ordered, acquired, purchased, bought, paid, rented, provided, reserved, combined, or consummated by you from touress.\n\nTour Service means the online purchase, order, (facilitated) payment or reservation service as offered or enabled by touress in respect of various products and services as from time to time made available by touress on our platform.\n\nTour Booking means the order, purchase, payment, booking or reservation of a Tour Package.\n\nWhat kind of personal data does touress collect?\n\nWe can’t help you book the holiday without information, so when you use our services there are certain things we ask for. This is typically routine information – your name, preferred contact details, the names of the people travelling with you and your payment information. You might also decide to submit additional information related to your upcoming Tour.\n\nIn addition to this, we also collect information from the computer, phone, tablet or other device you use to access our services. This includes the IP address, the browser you’re using and your language settings. There are also situations in which we receive information about you from others or when we automatically collect other information.\n\nThis is the general overview but if you’d like to know more about the information we collect, we go into more detail below.\n\nWhy does touress collect and use your personal data?\n\nThe main reason we ask you for personal details is to help you organise your online Tour Reservations and ensure you get the best service possible.\n\nWe also use your personal data to contact you about the latest deals, special offers and other products or services we think you might be interested in. There are other uses, too. If you’d like to find out what they are, read on for a more detailed explanation.\n\nHow does touress share your data with third parties?\n\nThere are different parties integrated into touress’ holiday services, in various ways and for various reasons. The primary reason we share your data is to supply touress’ tour operators and travel partners with the relevant information to complete your Tour Reservation.\n\nWe also involve other parties to provide you with the Tour services. This includes, for example, financial institutions, advertisers, subsidiaries of the touress corporate group. Or, in some cases, if we’re required to by law, we might share your data with governmental or other authorities.\n\nBelow, we go into more detail about how the information you share with us is used and exchanged with these parties.\n\nHow does touress make use of mobile devices?\n\nWe offer free apps, through which we also collect and process personal data. This works in much the same way as our website, but they also allow you to benefit from the location services available on your mobile device(s). \n\nHow does touress make use of social media?\n\nThe use of social media may be integrated into touress services in various ways. These will involve us collecting some of your personal data or the social media provider receiving some of your information. If you’d like to learn more about how this information is used and exchanged, read on.\n\nWhat security and retention procedures does touress put in place to safeguard your personal data?\n\nWe have implemented a range of procedures to prevent unauthorised access to, and the misuse of, personal data that we process.\n\nHow does touress treat personal data belonging to children?\n\nUnless indicated otherwise, touress is a service you are only allowed to use if you are over 18 years of age. We only process information about children with the consent of their parents or legal guardians, or when the information is shared with us by the parents or legal guardians themselves.\n\nHow can you control the personal data you’ve given to touress?\n\nYou have the right to review the personal data we keep about you at any time.\n\nWho is responsible for the processing of personal data on the touress website and apps?\n\nConnect World Pte Ltd is located in Singapore, controls the processing of personal data for the provision of its services. That includes its websites and mobile apps, except for some exceptions that are clarified in this privacy statement. \n\nWhat kind of personal data does touress collect?\n\nDepending on the law that applies to you, we might be required to provide some additional information. If you’d like to know more, please read on.\n\nPersonal data you give to us.\n\ntouress collects and uses information you provide to us. When you make a Tour Reservation, you are (at a minimum) asked for your name and email address.\n\nDepending on the Tour Reservation, we may also ask for your home address, telephone number, payment information, date of birth, the names of the people travelling with you and any preferences you might have for your Tour (such as dietary or accessibility requirements).\n\nYou might also be invited to write reviews to help inform others about the experiences you had on your Tour. When you write a review on the touress platform, we’ll collect any information you’ve included, along with your display name and avatar (if you choose one).\n\nThere are other instances where you’ll provide us with information, as well. For example, if you’re browsing with your mobile device, you can decide to allow touress to see your current location or grant us access to your contacts. This helps us to give you the best possible service and experience by, for example, showing you our city guides, suggesting the nearest restaurants or attractions to your location or making other recommendations.\n\nIf you create a user account, we’ll also store your personal settings, uploaded photos, and reviews of previous bookings. This saved data can be used to help you plan and manage future Tour Reservations or benefit from other features only available to account holders (such as incentives or other benefits).\n\nWe may offer you referral programs or sweepstakes, and participating in these will mean providing us with relevant personal data.\n\nPersonal data you give us about others.\n\nOf course, you might not simply be making a Tour Reservation for yourself. You might be taking a Tour with other people or making a reservation on someone else’s behalf. In both those scenarios, you will provide their details as part of the Tour Reservation.\n\nIn some cases, you might use touress to share information with others. This can take the form of sharing a wishlist or participating in a referral programme, as described when you use the relevant feature.\n\nAt this point, we have to make it clear that it’s your responsibility to ensure that the person or people you have provided personal data about are aware that you’ve done so, and that they have understood and accepted how touress uses their information (as described in this Privacy Policy).\n\nPersonal data we collect automatically.\n\nWhether or not you end up making a Tour Reservation, when you visit our websites or apps we automatically collect certain information. This includes your IP address, the date and time you accessed our services, and information about your computer’s hardware and software (such as the operating system, the internet browser used, software/application version data and your language settings). We also collect information about clicks and which pages have been shown to you.\n\nIf you’re using a mobile device, we collect data that identifies the device, as well as data about your device-specific settings and characteristics, app crashes and other system activity. When you make a Tour Reservation using this kind of device, our system registers how you made your reservation (on which website), and/or which site you came from when you entered the touress website or app.\n\nPersonal data we receive from other sources.\n\nIt’s not just the things you tell us, though – we may also receive information about you from other sources. These include business partners, such as affiliate partners, subsidiaries of touress corporate group, and other independent third parties.\n\nAnything we receive from these partners may be combined with information provided by you. For example, touress’ Tour Reservation services are not only made available via touress and touress apps, but are also integrated into services of affiliate partners you can find online. When you use any of these services, you provide the reservation details to our business partners who then forward your details to us.\n\nWe also integrate with third party service providers to facilitate payments between you and touress. These service providers share payment information so we can administer and", "num_tokens": 2048} {"category": "dolma1_7-wiki-en", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/dolma1_7-wiki-en/part-00-00000.npy", "text": "ja with the reading \"hoon\" on the South Korean government's official list of hanja which may be registered for use in given names.\nPeople with this name include:<|endoftext|>The Man Who Found Himself (1925 film)\n\nThe Man Who Found Himself is a 1925 American silent drama film directed by Alfred E. Green and written by Thomas J. Geraghty based upon a story by Booth Tarkington. The film stars Thomas Meighan, Virginia Valli, Frank Morgan, Ralph Morgan, Charles A. Stevenson, and Julia Hoyt. The film was released on August 23, 1925, by Paramount Pictures.\nPreservation.\nWith no prints of \"The Man Who Found Himself\" located in any film archives, it is a lost film.<|endoftext|>List of Bluey (2018 TV series) episodes\n\n\"Bluey\" is an Australian animated television series for preschoolers that premiered on ABC Kids on 1 October 2018. The series was created by Joe Brumm with Queensland production group Ludo Studio. The show follows Bluey, an anthropomorphic six-year-old Blue Heeler puppy who is characterised by her abundance of energy, imagination and curiosity about the world. The young dog lives with her father, Bandit; mother, Chilli; and younger sister, Bingo, who regularly joins Bluey on adventures as the pair embark on imaginative play together. Other characters featured are each depicted as a different dog breed, some inspired by dogs from Brumm's childhood. Overarching themes include the influence of a supportive family, Australian culture, and the importance of play throughout childhood. The program was created and produced in Queensland; its capital city, Brisbane, inspires the show's setting. The series was co-commissioned by the Australian Broadcasting Corporation and the British Broadcasting Corporation. BBC Studios hold global distribution and merchandising rights. The international broadcasting rights to the series were acquired by The Walt Disney Company in 2019.\nSince its debut on 1 October 2018, \"Bluey\" has broadcast 141 episodes, and its third series first aired on 5 September 2021. Two Christmas-themed episodes have aired, as part of both the first (\"Verandah Santa\") and second series (\"Christmas Swim\"). An Easter-themed episode (\"Easter\") aired as part of the second series, and a Father's Day-themed episode (\"Perfect\") aired as part of the third. Richard Jeffery won an Australian Directors' Guild Award in 2021 for his direction of the episode \"Sleepytime\"; the episode itself won the 2022 Prix Jeunesse International Award in the category of TV – Up to 6 Years Fiction (Children's). The musical scores for specific episodes of \"Bluey\" have been nominated for APRA Screen Music Awards, credited to Joff Bush as the composer. These include \"Teasing\" and \"Flat Pack\", which were both nominated for Best Music for Children's Television in 2019 and 2020 respectively. Selected episodes have also been adapted into picture books, including \"The Beach\", which won the Australian Book Industry Awards for Book of the Year and Children's Picture Book of the Year (Ages 0–6) in 2020. Episodes from the first and second series have also been on DVD in Australia, distributed by BBC Studios, in volumes.\nSeries overview.\n<onlyinclude></onlyinclude>\nReferences.\nNotes\nCitations<|endoftext|>Mastixis anthores\n\nMastixis anthores is a species of moth in the family Erebidae. The scientific name of this species was first published 1891 by Herbert Druce. It is found in Panama.\nThe forewings are pale brown, slightly irrorated (sprinkled) with grey scales, crossed between the base and the end of the cell from the costal to the inner margin by two waved indistinct brown lines. There is a large oval reddish-brown spot at the end of the cell, beyond which a distinct brown line crosses the wing. There is a dark brown spot close to the apex and the marginal line is black. The hindwings are dull brown, crossed from the costal to the inner margin below the middle by a faint brown line. The marginal line is black.<|endoftext|>Roomsharing\n\nRoomsharing is where two or more people occupy a room, typically a bedroom. Roomsharing is the norm in some cultures, such as by Mayan families in rural Guatemala. In cultures where it is not normal, it may be comported out of viability, perhaps due to impoverishment. In some developed parts of the world, it may be illegal for siblings of the opposite sex to share a room if they are above a certain age, while it would be fine to do so with a sibling of the same sex or gender identity.<|endoftext|>Suwa Kanenori\n\nSuwa Kanenori (1897–1932) was a Japanese painter and woodblock print artist associated with the sōsaku hanga (\"creative print\") movement.\nBorn 1897, he spent his youth in Kobe, and started printing from the age of sixteen. In 1914 he moved to Tokyo to study at the Hongo Painting Institute.\nFrom 1920 his prints appeared in \"Yomigaeri\" magazine, which brought him to the attention of Un'ichi Hiratsuka, one of the leaders of sōsaku hanga movement, and Fukazawa Sakuichi whom he tutored in the craft. In 1921 he exhibited with the Sosaku Hanga Kyokai and in 1923 released his set of prints \"Suwa Kanenori surie awase\" (roughly translated as \"Grinding the rough edges\").\nHe became a member of the Nippon Sosaku Hanga Kyokai in 1928 and participated in the \"One Hundred Views of New Tokyo\" series, to which he contributed twelve prints, \"notable for their spiky, stark quality.\" Un'ichi Hiratsuka, a friend of Suwa's who worked with him on the series, remarked that his prints had \"a feeling of poetry, perhaps because he was a great poet all his life.\" \nHe worked as a designer for Shiseido, the cosmetics company, from June 1921 until his death in 1932 of appendicitis.<|endoftext|>Newell Orton\n\nNewell Orton, (1915 – 17 September 1941) was a British flying ace of the Royal Air Force (RAF) during the Second World War. He was officially credited with the destruction of 17 enemy aircraft.\nBorn in Warwick, Orton served in the Royal Air Force Volunteer Reserve before joining the RAF in 1937. Posted to No. 73 Squadron, he was sent to France with the squadron on the outbreak of the Second World War. He flew extensively during the Phoney War and the subsequent Battle of France. He was wounded on 15 May 1940 when his Hawker Hurricane was shot down and was repatriated to England for hospital treatment for burns. In 1941, after recovering from his injuries, he was appointed commander of No. 54 Squadron and flew numerous operations on the Channel Front until his death.\nEarly life.\nNewell Orton, nicknamed Fanny, was born in 1915 in Warwick, England, and was educated locally at King's High School and then proceeding to Leamington Technical College. He joined the Royal Air Force Volunteer Reserve in 1935 and was soon a qualified pilot with the rank of sergeant. Two years later he received a short service commission in the Royal Air Force (RAF) and was posted to No. 73 Squadron as a flying officer. At the time, the squadron operated Gloster Gladiators but in July 1938, it was re-equipped with Hawker Hurricanes.\nSecond World War.\nOn 24 August 1939, as tensions escalated between Britain and Germany, No. 73 Squadron was mobilised for war. It was intended to send the squadron to France as the Air Component of the British Expeditionary Force (BEF), designated as part of No. 60 Mobile Wing along with No. 1 Squadron. On 8 September 1939, the Second World War now underway, it deployed to France. Operating from Rouvres, not far from the border with Germany, the squadron flew regular standing patrols and were involved in infrequent engagements with the Luftwaffe during the Phoney War. On 23 November, Orton helped in the shooting down of a Heinkel He 111 medium bomber and claimed another as destroyed. Towards the end of the year and into the early part of 1940, weather often affected flight operations and little action was seen.\nConditions began to improve into February and operations were more frequent the following month. On 26 March Orton shot down two Messerschmitt Bf 109 fighters near Trier. His own aircraft was damaged, reportedly by the German flying ace Werner Mölders. On 21 April he destroyed a Bf 109 that attacked his flight while it was pursuing two other enemy fighters. Later, in the same patrol, he shot down a Messerschmitt Bf 110, one of a group that intercepted his flight, and damaged another. It was a successful day for the squadron, with several enemy aircraft shot down. Orton also became a flying ace, credited with five German aircraft destroyed. He was the squadron's second ace of the war, his fellow pilot Edgar Kain being the", "num_tokens": 2048} {"category": "dolma1_7-wiki-en", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/dolma1_7-wiki-en/part-00-00000.npy", "text": " 2018 in Fresno, California is a single subject museum on the writer William Saroyan. The museum is located at 2729 W Griffith Way, the last occupied Fresno residence of the writer.\nHistory.\nThe home was purchased by William Saroyan in 1964. It was a newly built tract home in a developing area of Fresno. In that same year, Saroyan also purchased the adjacent home, which he used for storage. Following his death on May 18, 1981, the home was sold to private owners. On April 2, 1989, the house was placed on the historical registries of the City of Fresno and Fresno County.\nAn unsuccessful attempt was made to turn the home into a museum, which resulted in a foreclosure on the property. The home was purchased in 2016 by the Renaissance Cultural and Intellectual Foundation, a foreign corporation registered in Armenia, and established by Artur Janibekyan. The Renaissance Cultural and Intellectual Foundation US branch is registered in California as a nonprofit under Internal Revenue Code (IRC) Section 50l (c)(3), and is the legal owners and operators of the museum. The Renaissance Foundation was granted a permit to reconstruct the home at 2729 W. Griffith Way for eventual operation as a museum, following a formal approval process with the City of Fresno for a Conditional Use Permit (CUP).\nConstruction on the museum was completed in 2018, and a ribbon cutting ceremony and official opening was held on August 31, 2018, the 110th anniversary of the writer’s birth. A bronze plaque (Saroyan Historical Marker No. 3) was affixed to the face of the home in 1989, noting the published works created by Saroyan from the period of 1964 until 1981, and listing the individuals of the William Saroyan Festival Committee who had been instrumental in having the home placed on the historic registry. The original plaque disappeared in 2015, and as part of the re-dedication and official opening, a new plaque was installed on August 31 2018, with the original information plus listing the information for the re-dedication.\nConcept.\nThe proposed concept of the museum was to present the character and nature of William Saroyan, through several technical exhibits. The museum contains 2 motion activated walls. One wall displays photos of Saroyan, his family, friends, and residences. A second wall displays a sampling of sketches and paintings by Saroyan. In addition, a variety of videos are displayed, as well as a sampling of published Saroyan books. A final display contains a hologram with an actor portraying Saroyan in the form of a hologram image, and original audio of Saroyan’s voice.<|endoftext|>Creek Bank\n\nCreek Bank is the fourth album to be released (but fifth album recorded) by blues/jazz pianist and vocalist Mose Allison which was recorded in 1958 and released on the Prestige label. It was reissued on CD, coupled with \"Young Man Mose\", by Original Jazz Classics.\nReception.\nScott Yanow, in his review for Allmusic, says it is his \"typically ironic vocals that are most memorable, particularly Allison's classic \"The Seventh Son\" and \"If You Live.\" His piano playing, even with the Bud Powell influence, was beginning to become original and he successfully performs both revived swing songs and moody originals\".\nTrack listing.\nAll compositions by Mose Allison except where noted.<|endoftext|>Kimi no Uta\n\nKimi no Uta may refer to:<|endoftext|>William Smith Warner\n\nWilliam Smith Warner (February 1, 1817 – January 6, 1897) was a member of the Wisconsin State Assembly.\nBiography.\nWarner was born on February 1, 1817, in Hector, New York. He settled in Appleton, Wisconsin, in 1849. He died in Fond du Lac on January 6, 1897.\nCareer.\nWarner was a member of the Assembly during the 1878 session. While a member, he was identified as an Independent Democrat. He was defeated for re-election as a Democratic candidate by John C. Petersen. Other positions Warner held include Postmaster, City Attorney and an alderman of Appleton, and justice of the peace.<|endoftext|>Asahi Inoue\n\nis an announcer for NHK.\nBiography.\nInoue is from Tamano, Okayama Prefecture. After graduating from Okayama High School and Ochanomizu University, she joined NHK in 2004. She was a manager of the baseball club while she was in high school.\nShe served as Ambassador for Promotion of Digital Terrestrial Broadcasting for both the Tottori and Hiroshima stations. Since she is from Okayama Prefecture, she also had many opportunities to be appointed in regional programmes throughout the Chugoku region. She also served as an ambassador for terrestrial digital broadcasting and carried out public relations activities with female announcers of commercial stations. In an advert she wore a uniform of Hiroshima Toyo Carp and launched a terrestrial digital broadcasting promotional release. She professed that she is a Carp fan even in private.\nHer hobbies are playing with her two nephews and the playing the koto. She is good at remembering people's faces, but not good at remembering their names. Since she acquired a teaching license for primary schools and junior high schools, she \"I could have become an elementary school teacher if I did not become an announcer.\"\nShe usually listen to the radio often, and listens to the TBS Radio series \"Hikaru Ijūin: Shinya no Bakajikara\" on a timer and listens to it without hesitation. She even told Hikaru Ijūin himself that she is a fan of the programme.\nSynchronous female announcers.\nEveryone served as Ambassador for Promotion of Digital Terrestrial Broadcasting (ambassador of terrestrial digital broadcasting) in one of the workplaces. Boldface is the station that served as terrestrial digital ambassador.<|endoftext|>List of lighthouses in Tonga\n\nThis is a list of lighthouses in Tonga.<|endoftext|>Cothocidae\n\nCothocidae or Kothokidai () was a deme of ancient Attica, originally of the \"phyle\" of Oeneis, but between 307/306 BCE and 201/200 BCE of the \"phyle\" of Demetrias, sending two delegates to the Athenian Boule. \nIts site is tentatively located near Ag. Ioannes, north of modern Aspropyrgos.<|endoftext|>Ikakogi\n\nIkakogi is a genus of frogs in the family Centrolenidae. It has been tentatively placed in the subfamily Centroleninae, although more recent analyses suggest that it is the sister group of the clade Centroleninae+Hyalinobatrachiinae.\nTaxonomy.\nUntil 2019, the genus was considered to be monotypic, but now contains the following two species:<|endoftext|>Pak Kyong-sun\n\nPak Kyong-sun (born 23 June 1985) is a North Korean women's international footballer who plays as a forward. She is a member of the North Korea women's national football team. She was part of the team at the 2003 FIFA Women's World Cup.<|endoftext|>Karl Johnson (wrestler)\n\nKarl Johnson (13 September 1883 – 6 November 1952) was a Swedish wrestler. He competed in the lightweight event at the 1912 Summer Olympics.<|endoftext|>Thomas Petrou\n\nThomas Petrou is an American social media personality and entrepreneur of Greek descent, known for his TikTok and YouTube channels. Petrou is a founder of The Hype House, a group of online-content creators and the Hollywood Spanish-style mansion that they reside in together. Thomas also briefly lived in the Team 10 house before being fired for unknown reasons in August 2019. As of August 8, 2022, Petrou has amassed over 1.87 million subscribers on YouTube and 7.9 million followers on TikTok.\nCareer.\nPetrou joined YouTube in 2015. Petrou joined Team 10 in May 2019 before announcing that he had been fired three months later for \"no reason.\" Seven months after concluding his time at Team 10, he co-founded The Hype House, a collective of creators who live in a large-house in Los Angeles and make content together, with Alex Warren, Kouvr Annon, Daisy Keech, and Chase Hudson.\nAlongside other Hype House members, Petrou starred in a reality television series about the collective, also titled \"Hype House\", which premiered on Netflix on January 7, 2022.\nPersonal life.\nPetrou began dating fellow social media personality and Hype House member Mia Hayward in 2020.\nControversies.\nIn March 2020, Daisy Keech left The Hype House after claiming she felt as though she was being left out of important decisions regarding the group, before suing Petrou and other founding member Hudson. In May 2020, controversy arose between Bryce Hall, a member of another online-content creator collective called the Sway House, and Petrou. Hall accused Petrou of stealing money from members of The Hype House and handling his personal financials poorly. After Petrou direct messaged Hall suggesting that they should work through their problems on Hall's podcast,", "num_tokens": 2048} {"category": "dolma1_7-wiki-en", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/dolma1_7-wiki-en/part-00-00000.npy", "text": "Satomi defended her Women's Meijin title for the twelfth consecutive time when she defeated Momoko Katō 3 games to none to win the 47th Women's Meijin title match in JanuaryFebruary 2021. The victory gave Satomi her 43rd women's major title overall which tied her with Ichiyo Shimizu for the most ever.\nSatomi successfully defended her Women's Ōi crown in June 2021 by defeating Kotomi Yamane 3 games to none to win the 32nd Women's Ōi title match. The victory was Satomi's 44th major title and made her the all-time Women's professional shogi major title leader. She returned to 5-crown status in November 2021 after defeating 2 games to 1 to win the 43rd Women's Ōshō title. Later that same month, however, she was unable to defend her Seirei title against and lost the 3rd Seirei title match (SeptemberNovember 2021) 3 games to 2. Satomi and Katō also faced each other in the best-of-three 29th Kurashiki Tōka Cup title match (November 2021) with Satomi winning 2 games to 1 for her her twelfth Kurashiki Tōka Cup title overall. A few weeks later, Satomi returned to 5-crown status after defeating Nishiyama in the 11th Ōza title match (October 2021December 2021) 3 games to none. The win was Satomi's fifth Ōza title overall which qualified her for the \"Queen Ōza\" title.\nIn February 2022, Satomi lost the 47th Women's Meijin title (JanuaryFebruary 2022) to 3 games to 1. It was the first time since 2009 that she was unable to successfully defend her Women's Meiiin title.\nSatomi successfully defended her Women's Ōi title in June 2022 by defeating 3 games to 1 to win the 33rd Women's Ōi title match (April 2022June 2022). In AprilJune 2022, she also challenged Nishiyama for the latter's Jo-Ō in the 15th Mynavi Women's Open title match, but Nishiyama won the match 3 games to 2 to defend her title. Satomi, however, did recapture the Seirei title by defeating in the 4th Seirei Title Match (JulyAugust 2022) 3 games to none to return to 5-crown status. \nOn October 21, 2022, Satomi returned to 6-crown status after defeating in the best-of-seven 2nd title match (August 2022October 2022) 4 games to 3. The win was Satomi's 50th major title overall. Satomi's return to 6-crown status, however, was short-lived after she lost the 34th Women's Ōshō title match (October 2022) a week later to Nishiyama 3 games to 2. Satomi and Nishiyama faced each other yet again in a major title match a few days later with Nishiyama challenging Satomi for her Kurashiki Tōka Cup title. This time, Satomi was able to successfully defend her title by winning the 30th Kurashiki Tōka Cup title match (November 2022) 2 games to none. A few weeks later on December 23, 2022, Satomi successfully defended her Women's Ōza title by defeating 3 games to 2 in the 12th Women's Ōza title match (OctoberDecember 2022).\nPromotion history.\nSatomi has been promoted as follows.\nNote: All ranks are women's professional ranks.\nMajor titles.\nSatomi has appeared in major title matches 66 times and has won a total of 52 titles. She has won the Women's Meijin twelve times, the title thirteen times, the title eight times, the title eight times, the title six times, the title three times and the and title once each. She has been awarded the lifetime titles of Queen Meijin, , and . In September 2019, she became the first 6-crown title holder in women's professional shogi.\nAwards and honors.\nSatomi has received a number of Japan Shogi Association Annual Shogi Awards and other awards in recognition of her accomplishments in shogi and contributions made to Japanese society.\nNotable results against regular professionals.\nOn June 28, 2019, Satomi defeated shogi professional Ryūma Tonari in the preliminary round of the 91st Kisei tournament to become the first women's professional to win four consecutive official games against regular professionals. She was, however, unable to extend winning streak to five games when she lost to Takahiro Ōhashi in her next game against a regular professional. On July 21, 2019, Satomi became just the third women's professional to win a NHK Cup TV Tournament game against a male professional when she defeated Issei Takazaki in Round 1 of the tournament.\nOn May 27, 2022, Satomi defeated Yūta Komori in the preliminary round of the 48th Kiō tournament to become the first women's professional to qualify for the main challenger tournament of a major title. Her record against regular professionals after this win improved to 10 wins and 4 losses over the last 14 games, satisfying the criteria to qualify for the Professional Admission Test. In addition to Komori, the regular professionals Satomi defeated during this period included former Kiō challenger Kei Honda, B1 class professional Shingo Sawada, and 2022 Ōi league winner Takashi Ikenaga. Satomi is the first women's professional to qualify for the professional admission test.\nApprentice professional.\nIn April 2011, Satomi, who was already quite successful as a women's shogi professional, informed the Japan Shogi Association of her desire to enter its apprentice school at the rank of apprentice professional 1-kyū in an attempt to obtain full professional status. A series of three official games against existing shogi apprentices were arranged as her entrance exam. She split the first two games held on May 3, 2011, but then won the third game on May 21, 2011, to pass the exam. She was awarded the rank of apprentice 1-kyū that same day.\nIn January 2012, Satomi became the first female under the current apprentice system to be promoted to the rank of apprentice 1-dan after she achieved the threshold of 12 wins and 4 losses in apprentice school play. In July 2013, Satomi then became the first female to be promoted to apprentice 2-dan after once again reaching 12 wins and 4 losses. In December of that same year, she became the first female to be promoted to apprentice 3-dan, thus earning her the right to be the first female to participate in the 3-Dan League: the final stage for those aspiring to be awarded regular professional status.\nSatomi's first season of 3-dan league play was supposed to be the 55th 3-dan League (April 2014September 2014), but health issues forced her to take a leave of absence from all professional games from April 1, 2014, until August 31, 2014. Satomi's health problems did not improve, so her leave of absence was subsequently extended to December 31, 2014; this meant she would miss the 56th (October 2014March 2015) 3-dan League as well. On November 10, 2014, the JSA announced that Satomi would be returning to official women's professional shogi play as of January 1, 2015, but that she was being allowed to withdraw from the 57th (April 2015October 2015) 3-dan league.\nSatomi's returned from her leave of absence for the 58th (October 2015March 2016) 3-dan League, and finished with a losing record of 5 wins and 13 losses. Her records in the 59th (April 2016September 2016), 60th (October 2016March 2017) and 61st (April 2017September 2017) 3-dan Leagues were 711, 810 and 711 respectively.\nSatomi was already 25 years old when she started 62nd (October 2017March 2018) 3-dan league play which meant she needed to either win the league outright and obtain full professional status, or finish with a winning record (10 wins) to avoid losing her qualifications for the apprentice school due to the 26-year-old age limit set in place by the JSA. Satomi's record", "num_tokens": 2048} {"category": "dolma1_7-wiki-en", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/dolma1_7-wiki-en/part-00-00000.npy", "text": "ichardtii is a moth in the family Erebidae. It is found on Fiji, Tonga, the Loyalty Islands Samoa and in northern Australia.<|endoftext|>Manimaran Siddharth\n\nManimaran Siddharth (born 3 July 1998) is an Indian cricketer who plays domestic cricket for Tamil Nadu. He is a left-arm orthodox bowler. \nDomestic cricket.\nSiddharth made his Twenty20 debut on 22 November 2019, for Tamil Nadu in the 2019–20 Syed Mushtaq Ali Trophy. He made his first-class debut on 9 December 2019, for Tamil Nadu in the 2019–20 Ranji Trophy. He made his List A debut on 20 February 2021, for Tamil Nadu in the 2020–21 Vijay Hazare Trophy.\nIndian Premier League.\nIn the 2020 IPL auction, he was bought by the Kolkata Knight Riders ahead of the 2020 Indian Premier League. In February 2021, Siddharth was bought by the Delhi Capitals in the IPL auction ahead of the 2021 Indian Premier League. He was replaced by Kulwant Khejroliya after an injury.<|endoftext|>The Anomalous\n\n\"The Anomalous\" is an American television series created, co-written, and executive produced by Chuk Otakpor and Richard Odilu for CeeRO World Productions. Set in Lagos, \"The Anomalous\" is a television drama that follows the professional practice of two young psychologists, Dr. Kelenna (Michael Uchegbu) and Dr. Oluchi (Keira Hewatch), a husband and wife team – whose own demons are brought to the fore while striving to help others face theirs.\nPlot.\nDr. Kelenna (Michael Uchegbu) and Dr. Oluchi (Keira Hewatch) are behavioral psychotherapists confronted with mostly bizarre clinical cases that put their skills on trial while trying to grow their relatively young business in an environment that seldom defies logic. Having worked hard and successfully in separating their business and personal life, the fabric holding it together comes apart at the seams with one wrong move creating a domino effect.\nRelease.\nThe series will premiere on 31 December 2022.\nAccolades.\nThe first season of the series has received eight nominations and eight wins in some film festivals. It is in the Best Series category at the Skiptown Playhouse International Film Festival, 2020 which will take place in June, 2021. Also, it received three nominations at the New Vision International Film Festival, Amsterdam for Best Actress (Keira Hewatch), Best Actor (Michael Uchegbu) and Best Series. It won the September award for Best Pilot at the Cyrus International Film Festival of Toronto, 2020, and the September, 2020 award for Best Episodic at Phoenix Monthly Short Film Festival.\nMichael Uchegbu was awarded the Best Actor at Hollywood International Golden Age Festival, 2020 September edition. At the November 2020 edition of the Indie Short Fest Los Angeles Film Festival the series was nominated for Best Web Series/TV Pilot, Best Original Score, Best Costume Design, and Best Makeup and Hairstyling, and it won for Best Original Score and Best Makeup and Hairstyling. Also, Indie Fest awarded the series Award of Recognition in African-American Film, Television - Pilot Program, and Television - Program/Series at its 2020 Indie Fest Film Awards.<|endoftext|>Wayne Van Rooyen\n\nWayne Van Rooyen (born 14 June 1978), is a South African actor and voice artist. He is best known for the roles in the films \"Fiela se Kind\", \"Mayfair\" and \"Seriously Single\".\nPersonal life.\nHe was born on 14 June 1978 and raised in suburb Eldorado Park, in Johannesburg, South Africa. He graduated with a BA in Dramatic Art with Honours at the University of the Witwatersrand in 2003.\nCareer.\nAfter the graduation, he joined theater and appeared in many stage plays such as \"Sophiatown\" and \"The King of Laughter\". He later won the Naledi Theatre Award for Best Supporting Actor for his critically acclaimed role in \"The King of Laughter\". He also joined the world premiere of Athol Fugard's play \"Victory\" and the Royal Shakespeare Company's South African collaboration of William Shakespeare's \"The Tempest\" with the Baxter Theater.\nIn 2008, he played the role as 'Brandon \"BB\" Bonthuys' on the medical drama series \"Hillside\" aired on SABC 2. He played the role of 'Vernon “Stokkies” Jacobs' on soapie \"Scandal!\" aired on ETV in 2005. His role became highly popular among the public. Then he starred in the variety comedy show \"Colour TV\" in 2011 on SABC 2. Meanwhile, he appeared in the drama series \"Geraamtes in die Kas\", in 2013.\nIn August 2020, he starred in the comedy film \"Seriously Single\" co-directed by Katleho Ramaphakela and Rethabile Ramaphakela. It was released on July 31, 2020 on Netflix.<|endoftext|>Georgina Cowper-Temple, Lady Mount Temple\n\nGeorgina Elizabeth Cowper-Temple, Lady Mount Temple (née Tollemache; (1822 – 17 October 1901) was a British religious enthusiast, humanitarian, and animal welfare campaigner. She was the second wife of William Cowper-Temple, 1st Baron Mount Temple. Lady Mount Temple was active in the Temperance Movement and the Royal Society for the Prevention of Cruelty to Animals and was a co-founder of the Plumage League.\nEarly life and family.\nLady Mount Temple was born Georgina Elizabeth Tollemache on 8 November to Admiral John Richard Delap Tollemache and Lady Elizabeth Stratford. One source says she was probably born in 1821. Her father, whose original surname was Halliday, assumed by royal license the surname and arms of his mother, Lady Jane Tollemache, who was the daughter and co-heiress of Lionel Tollemache, 4th Earl of Dysart. Her mother was the daughter of John Stratford, 3rd Earl of Aldborough. She was the sister of John Tollemache, 1st Baron Tollemache. Lady Mount Temple was a close friend and distant cousin of Constance Lloyd, the wife of Oscar Wilde.\nHumanitarianism and animal welfare.\nLady Mount Temple was one of the leaders of the Torquay Anti-Vivisection Society. She also co-founded the Plumage League.\nShe was active in the Band of Mercy, whose first president was her husband, and the Royal Society for the Prevention of Cruelty to Animals. Lady Mount Temple was also involved in the Temperance Movement.\nIn 1903, a birdbath with a bronze statue of Lady Mount Temple, designed by Arthur George Walker, was erected in Babbacombe. A horse trough near the Torre railway station is also dedicated to her.\nPersonal life.\nOn 22 November 1848, she married The Honourable William Cowper, son of the 5th Earl Cowper. She and her husband had no natural children, but adopted a daughter named Juliet Latour Temple, in 1869. In 1880, her husband was elevated to the peerage as Baron Mount Temple.\nLady Mount Temple was a friend of the writer John Ruskin, the poet Dante Gabriel Rossetti, and the suffragist Frances Power Cobbe.\nShe lived at Babbacombe Cliff and also owned properties in Ireland. She died in 1901. After her death, part of her estate was bequeathed to the Church Army and to the Victoria Street Society of Protection of Animals from Vivisection.<|endoftext|>Weronika Murek\n\nWeronika Murek (born 1989) is a Polish playwright, short story writer and essayist.\nEarly life and education.\nWeronika Murek was born in 1989, in Bytom. She graduated from the Faculty of Law and Administration of the University of Silesia. \nCareer.\nMurek has written plays, short stories and essays. She won the Gdynia Drama Award 2015 for the play \"Feinweinblein\" set in the 1950s Upper Silesia. Her debut collection of short stories \"Uprawa roślin południowych metodą Miczurina\" was nominated for the Paszport Polityki 2015 in the literature category, the Nike Award 2016, the Gdynia Literary Prize 2016 and the Conrad Award 2016. The collection won the Witold Gombrowicz literary award in 2016. Murek gained her second Paszport Polityki nomination with the 2019 collection of plays called \"Feinweinblein\".\nApart from writing her own plays, Murek has also worked on adaptating the work of others to the stage. For example, she cooperated with Grzegorz Jarzyna to adapt a work by Lu Xun or create together a new production of \"The Tempest\".\nMurek's works have been translated into Czech, French, Serbian", "num_tokens": 2048} {"category": "dolma1_7-wiki-en", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/dolma1_7-wiki-en/part-00-00000.npy", "text": "etlands was an operational commander of the Royal Navy. He was charged with the administration of the Orkney and Shetland Islands and operating and defending the fleet base at Scapa Flow that was the main anchorage for both the Home Fleet and Grand Fleet at various times.\nHistory.\nAn Admiral Commanding for the Orkneys and Shetlands was appointed twice, on the outbreak of war, to provide for the defence and administration of the main base for the Home Fleet. The Admiral Commanding was responsible, under the orders of the Commander-in-Chief, Home Fleet, for administration of naval defences, naval establishments, and shore duties generally in Orkney and Shetland.\nDuring the First World War and the Second World War the Rear-Admiral, Scapa Flow served under him, with a position similar to that of an Admiral Superintendent of a dockyard port. Directly under his orders were the Northern Patrol, Shetlands Patrols, the Officer Commanding Troops Orkney, the Officer Commanding Troops Shetlands, the Admiralty Port Officer Kirkwall, the Rear-Admiral commanding the local minefields and the officers responsible for the extended defences, the local defence flotilla and the Orkney Trawler Patrols. He was responsible for the patrolling of the area from Wick to Cape Wrath.\nShore establishments included HMS Pyramus (shore establishment) at Kirkwall; HMS Proserpine (shore establishment) at Lyness; and HMS Fox (shore establishment) at Lerwick.\nDuring the Second World War the Rear-Admiral, Scapa Flow continued to serve under him.\nFirst World War.\nIncluded:\nSubordinate commanders First World War.\nSource:\nFlag Officer Scapa Flow/Rear Admiral Scapa.\nThis officer's role was similar to that of Admiral Superintendent of a dockyard port.\nNaval units, First World War.\nIncluded:\nSecond World War.\nWatson lists the 6th M/S Flotilla 7.41-12.42, which may have been under direct command of the Home Fleet, and the 15th M/S Flotilla 4.42-2.44 [Bangors] operated under the orders of the Admiral Commanding. The Admiral's flag was flown aboard HMS in Scapa Flow.\nThe Northern Patrol was based within the Orkney and Shetlands area, but was not responsible to the Admiral Commanding Orkneys and Shetlands. Its ships were dispersed by 1941.\nAdmirals Commanding:<|endoftext|>Rajyotsava Awards (2016)\n\nThe 2016 Rajyotsava Awards ceremony took place at the Ravindra Kalakshetra on 1 November 2016. Awarded annually by the government of Karnataka, the ceremony saw 61 individuals being awarded for achievements in various fields. The number was chosen to mark the 61st anniversary of the formation of the State of Karnataka.\nList of awardees.\nThe selection committee adhered to the yardstick of minimum age of 60 while selecting individuals for the awards. However, norms were relaxed in the field of sports and social sector.\nWinners:<|endoftext|>Severina (Rey Rosa)\n\nSeverina is a novella by Guatemalan writer Rodrigo Rey Rosa, originally published in 2011. The work is written using the first person narrative mode and is dedicated to Beatriz Zamora.\nPlot summary.\nThe story is told from the point of view of a bookseller who finds himself romantically drawn to a young woman he catches stealing books from \"La Entretenida\", the bookstore where he works.\nEnglish translations.\n\"Severina\" has been translated, with an introduction, into English once by Chris Andrews for Yale University Press's Margellos World Republic of Letters series.\nReferences.\nRey Rosa, Rodrigo: \"Severina\". New Haven and London: Yale University Press, 2014.<|endoftext|>Elegestolepis\n\nElegestolepis is a primitive shark from the Mongolepidida that lived during the Silurian and Devonian periods in Russia with only one species, \"E. grossi\", known to date. It was closely related to \"Mongolepis\" and \"Polymerolepis\". It is only known from fragmentary placoid scales discovered in Russia before 1973. The oldest of these scales have been dated back to the Ludlow epoch (427.4 Ma to 423 Ma), making \"Elegestolepis\" the oldest known shark.\n\"Elegestolepis\" dates back to about 420 years ago, but some scales that may yet represent another shark ancestor are known from 450 million years ago.\nDescription.\nAlthough the placoid scales of \"Elegestolepis\" are accepted to be those of a shark, subtle differences in the scales suggest that \"Elegestolepis\" itself may have been quite different in appearance to modern sharks. It is not known what \"Elegestolepis\" looked like due to the fragmentary nature of the known remains.<|endoftext|>Stanley-Woodruff-Allen House\n\nThe Stanley-Woodruff-Allen House is a historic house at 37 Buena Vista Road in West Hartford, Connecticut. Built about 1752, it is one of West Hartford's oldest surviving buildings. It was listed on the National Register of Historic Places in 1986. It is now part of the suite of buildings of the West Hartford Art League.\nDescription and history.\nThe Stanley-Woodruff-Allen House is located in western West Hartford, on the south side of Buena Vista Road, just east of the some of the town's athletic fields and the northern end of the Buena Vista Golf Course. It is set facing east near the road, from which it is screened by mature trees. It is a -story wood-frame structure, with a gabled roof, central chimney, and clapboarded exterior. The main facade is three bays wide, with symmetrical placement of windows around the center entrance. The entrance is sheltered by an enclosed shed-roof portico finished mainly in glass. The interior has been extensively altered for use as an art gallery, but it retains some original features, including window mouldings and one wall of wooden paneling. A shed-roof leanto extends to the rear, giving the building a saltbox profile; it is a later addition.\nThe house was built about 1752 by Samuel Stanley, the second of that name, for his son, also named Samuel. This was one of the first farmhouses to be built in what later became West Hartford, and is now one of its few remaining 18th-century buildings. The house was purchased by the town in 1943 as a home for the caretaker of the golf course, and was given to the West Hartford Art League in a long-term lease in 1976. The League now uses it as a gallery space aptly called the Saltbox.<|endoftext|>Zhang Xuejie\n\nZhang Xuejie (; born August 1961) is a lieutenant general (\"zhongjiang\") of the People's Liberation Army (PLA) serving as political commissar of the Tibet Military District, succeeding Wang Jianwu in May 2018. \nBiography.\nZhang was born in Shou County, Anhui, in August 1961. He served in the 31st Group Army for a long time. In 2013, he was made political commissar of the 12th Group Army, replacing Bai Lü. In 2017, he given the position of political commissar of the 31st Group Army. In 2017, he became deputy director of Political Work Department of the Eastern Theater Command. In May 2018, he succeeded Wang Jianwu as political commissar of the Tibet Military District. In January 2020, he was admitted as a member of the standing committee of the CPC Tibet Regional Committee, the region's top authority.\nHe was promoted to the rank of major general (\"Shaojiang\") in July 2010 and lieutenant general (\"zhongjiang\") in June 2019. \nPersonal life.\nHis elder brother (born 1955) is a politician and the current vice chairman of the Anhui Provincial Committee of the Chinese People's Political Consultative Conference.<|endoftext|>Land district\n\nA land district is a type of administrative division in some countries.\nAustralia.\nThe lands administrative divisions of New South Wales refers to the 141 counties within the Colony of New South Wales, that later became the Australian state of New South Wales.\nCanada.\nLand districts are the cadastral system underlying land titles in the province, and used by the provincial gazetteer in descriptions of landforms, administrative areas, and other information. Those on Vancouver Island were established via a Lands Act of the government of the Colony of Vancouver Island, from 1843 onwards; those on the Mainland were established by the Lands Act of 1860 by the Colony of British Columbia.\nNew Zealand.\nThe land districts of New Zealand are the cadastral divisions of New Zealand, which are used on property titles. There are 12 districts, six in the North Island and six in the South Island. The land districts are similar to, but different from, the 16 local government regions. The current legislation for the land districts is the Land Transfer Act 1952.<|endoftext|>Neri Bandiera\n\nNeri Ricardo Bandiera (born 3 July 1989) is an Argentine professional footballer who plays as a winger for Atlético Grau.\nCareer.\nBandiera", "num_tokens": 2048} {"category": "dolma1_7-wiki-en", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/dolma1_7-wiki-en/part-00-00000.npy", "text": "02, she was recognised as Australia's Most Collectible Artist by the magazine \"Australian Art Collector\". In 2006 she received an Honorary Doctorate in Literature from Murdoch University.\nSelected exhibitions.\nDowling has exhibited in Australia and internationally, including solo exhibitions at:<|endoftext|>Audarya\n\nAudarya (foaled 21 April 2016) is a French-bred British-trained Thoroughbred racehorse. After running second in her only start as a juvenile in 2018 she showed promising, but unremarkable form in the following year, winning two minor events and finishing second in a Listed race. As a young four-year-old in 2020 she was well beaten in her first two appearances but then made relentless progress, taking a minor handicap race in early August before moving up to Group 1 class to win the Prix Jean Romanet, finish third in the Prix de l'Opera and win the Breeders' Cup Filly & Mare Turf.\nBackground.\nAudarya is a bay mare with no white markings bred in France by the Boucé, Orne-based Haras d'Ecouves a breeding farm owned by Francois Doumen. As a yearling in 2017 the filly was consigned to the Arqana Deauville October Yearlings Sale and was bought for €125,000 by Stroud Coleman Bloodstock. She entered the ownership of Alison Swinburn, and was sent into training with James Fanshawe at the Pegasus Stable in Newmarket, Suffolk.\nShe was from the fourth crop of foals sired by Wootton Bassett who won the Prix Jean-Luc Lagardère in 2010. Wootton Bassett's other foals have included Almanzor and Wooded. Audarya's dam Green Bananas showed durability, but little talent in her six seasons on the track, recording one minor win from 33 starts. Green Bananas' grand-dam Gigawatt was a full-sister to Jim And Tonic and a distant, female-line relative of the Irish Derby winner Prince Regent.\nRacing career.\n2018: two-year-old season.\nOn her racecourse debut Audarya started a 50/1 outsider for a novice race (for horses with no more than two previous wins) over one mile on the synthetic Polytrack surface at Kempton Park Racecourse on 16 November 2018. Ridden by George Wood she raced in mid-division before producing a strong late run but narrowly failed to catch the favourite Lady Adelaide finishing second by a nose.\n2019: three-year-old season.\nAudarya finished second in a maiden race over one mile at Nottingham Racecourse on her first appearance as a three-year-old on 10 May and then ran second again in a novice race three weeks later at Yarmouth Racecourse, beaten a length into second place by the odds-on favourite Velorum. Daniel Muscutt then took over as the filly's regular jockey and partnered her in her next seven races. On 21 June Audarya went off the 1/2 favourite for a novice race over ten furlongs at Redcar Racecourse and recorded her first victory as she went to the front three furlongs from the finish and won \"easily\" by almost four lengths from six opponents. In July she was matched against older fillies and mares as she contested a handicap race over ten furlongs at York Racecourse and came home fifth behind the five-year-old Ladies First. On 23 August Audarya was brought back in distance for a one-mile handicap at Goodwood Racecourse. Carrying 125 pounds and starting the 100/30 second favourite she produced a sustained run in the last quarter mile to gain the advantage in the closing stages and win by a length from the favourite Infanta Isabella. For her final race of the year the filly was sent to France and stepped up in class for the Listed Prix Coronation over 1600 metres at Saint-Cloud Racecourse on 18 September and finished second of the twelve runners, beaten two lengths by the winner Alzire after staying on well in the closing stages.\n2020: four-year-old season.\nThe flat racing season in Britain and Ireland was restructured as a result of the COVID-19 outbreak with the racing being cancelled in March before resuming behind closed doors in June. On her seasonal debut Audarya finished eighth of the fourteen runners behind Nazeef in the Snowdrop Fillies' Stakes over one mile on Kempton's polytrack on 3 June making good progress in the closing stages. At Pontefract Racecourse in July she started 9/2 third choice in the betting for the Pipalong Stakes but ran disappointingly to come home in sixth place behind Romola, beaten more than eight lengths by the winner. On 2 August Audarya was dropped back in class for a handicap over ten furlongs on the Tapeta surface at Newcastle Racecourse in which she was assigned a weight of 140 pounds and started at odds of 12/1. After tracking the leaders she stayed on strongly to gain the advantage in the final strides and won by a short head from Prejudice. Three weeks later the filly was sent to France and moved up sharply in class to contest the Group 1 Prix Jean Romanet over 2000 metres on soft ground at Deauville Racecourse in which she was ridden by Ioritz Mendizabal. She started a 48/1 outsider in an eleven-runner field which included Nazeef (the odds-on favourite), Ambition (Prix Corrida), Soudania (Prix du Prince d'Orange), Nausha (Musidora Stakes), Bolleville (Silver Stakes) and Dariyma (Prix de la Pepiniere). Audaya raced close behind the leaders before moving up to take the lead 200 metres from the finish and held off a sustained challenge from Ambition to win by a neck with the pair finishing four lengths clear of the rest. After the race Fanshawe said \"She's a filly I've always loved but we were going nowhere earlier this year. She was unlucky at Kempton and then I don't know what happened at Pontefract. It's a race we've always loved... but I must admit I've been walking my box the last two days wondering if I'd made a mistake.\"\nOn 4 October Audarya returned to France for the Group 1 Prix de l'Opera over 2000 metres on heavy ground at Longchamp Racecourse. Ridden by Mendizabal she made steady progress in the straight to finish third, beaten a short neck and three quarters of a length by Tarnawa and Alpine Star. For her final run of the season the filly was sent to the United States and started at odds of 12/1 for the Breeders' Cup Filly and Mare Turf over nine and a half furlongs at Keeneland on 7 November. Mendizabal was scheduled to take the ride but tested positive for COVID and was replaced by Pierre-Charles Boudot. The Diana Stakes winner Rushing Fall went off favourite, while the other contenders included Sistercharlie, Peaceful, Starship Jubilee, Mean Mary (New York Stakes), Terebellum (Dahlia Stakes), Cayenne Pepper (Blandford Stakes) and Harveys Lil Goil (Queen Elizabeth II Challenge Cup Stakes). Audarya tracked left soon after the start to settle on the inside rail as Cayenne Pepper set the early pace from Mean Mary. Rushing Fall took the lead in the straight but Audarya, having been switched to the outsite by Boudot, produced a sustained run, overtook the favourite in the final strides and won by a neck. Her winning time of 1:52.72 was a new track record. Fanshawe commented \"She's a very good mover, and I think she goes on any ground... She is not an easy filly. She's a big filly, but she does hang on... she's very special and we're very happy to have her\".<|endoftext|>La vita comincia ogni mattina\n\nLa vita comincia ogni mattina (\"Life begins every morning\") is a play by Italian playwrights Terzoli & Vaime. It is set in Milan in 1981.\nSynopsis.\nThe protagonist (Gino Bramieri) is Giulio Cogliati a married man, owner of a little factory, (in the play his wife Lucia is played by Carmen Scarpitta), who follows all his habits and his daily routine. Suddenly, his life is turned upside down by the passion for a Brazilian girl (Silvia Regina), much younger than him.\nGiulio must decide, in two hours, to pack his bags and leave with Isabel, or stay with Lucia.\nThe play was performed in 1981, directed by Pietro Garinei, with Gino Bramieri, Carmen Scarpitta, Edi Angelillo, Roberto Bonanni, , Gabriella Belli, Antonella Diana, Paola Guadagni, Ivonne La Bozzetta and Paola Marzi.\nTelevision adaptation.\nThe 1983 television adaptation was directed by the same Pietro Garinei that directed the theatre play.<|endoftext|>Iridomyrmex anceps\n\nIridomyrmex anceps is an ant species of the genus \"Iridomyrmex\". It has a very large distribution on multiple continents, but it is mainly distributed in northern Australia. Some specimens were found on multiple islands, and some were even found and collected in the United Arab Emirates.\n", "num_tokens": 2048} {"category": "dolma1_7-wiki-en", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/dolma1_7-wiki-en/part-00-00000.npy", "text": "enden on the 2001 horror film \"Wendigo\" and was involved with the Millennium Film Workshop, where he learned how to work with 16mm film under the supervision of underground filmmaker Mike Kuchar.\nAfter the events of September 11, Ojala found it difficult to obtain any type of work in New York, eventually forcing him to seek out career options in California. Only a few days into a week-long visit to Los Angeles, Ojala was hired on the spot as a lab and on-set technician for the visual effects studio Almost Human, Inc., providing various functions including moldmaking, makeup application and puppeteering for film, commercials and television series including \"Buffy the Vampire Slayer\", \"Angel\" and \"Firefly\". Since leaving Almost Human in 2005, Ojala has worked with several special effects companies including Autonomous FX, Animal Makers, Spectral Motion and Legacy Effects, and has worked on mainstream productions including ', \"2012\", \"Where the Wild Things Are\", \"Thor\", ' and \"Pacific Rim\".\nIn 2005, Ojala established his own independent special effects studio and film production company Ojala Productions, specializing in makeup and creature effects for film and television as well as producing in-house projects written and directed by Ojala himself. Among others, Ojala Productions contributed special effects work for films like \"\" and the critically acclaimed \"Deadgirl\", television shows including \"Tim and Eric Awesome Show, Great Job!\" and the music videos for Snoop Doggs \"Malice n Wonderland\" album. During this time, Ojala wrote and directed the short films \"The Incredible Torture Trio\", which played at the TromaDance Film Festival and was later distributed internationally on a \"Best of TromaDance\" DVD compilation, the 48 Hour Film Festival entry \"Truthus: A Family Holiday\" and \"Marvel Zombies: The Movie\", a fake trailer based on the Marvel Comics property of the same name. \"Marvel Zombies: The Movie\" drew high praise and recognition from online comics communities and eventually went viral, later being featured on the G4 pop culture news series \"Attack of the Show!\" where hosts Kevin Pereira and Chris Hardwick called it \"one of the most amazing fan movies we've ever seen\".\nWith Monty Broussard, Ojala wrote and directed the 2011 science fiction thriller short \"Harvest\", a proposed pilot for a television or web series. The following year, Ojala was featured in Craig Chenery's book \"Blood Spatter: A Guide to Cinematic Zombie Violence, Gore and Special Effects\" and in 2013, he directed the music video for comedy punk band The Radioactive Chicken Heads \"Deviled Egg\", which was highlighted on horror channel Fearnet as their \"Music Video of the Week\". In 2016, Ojala provided make-up effects for popular indie pop band Lucius music video \"Gone Insane\"; the video received notable mainstream recognition, with \"Rolling Stone\" describing the effects \"strange [and] striking\" and the \"Village Voice\" calling them \"exceptional\".\nBeginning in 2017, Ojala has served as co-producer for the Shudder original talk show \"The Core\", in which he also appears as a regular on-screen guest detailing the secrets and artistry behind practical special effects.\nIn October 2018, after four years in production, Ojala released his first feature film as a writer-director, \"Strange Nature\".<|endoftext|>Shreveport Rafters FC\n\nShreveport Rafters FC was a soccer team based in Shreveport, Louisiana. Founded in 2016, the team most recently played in the National Premier Soccer League (NPSL), a national semi-professional league at the fourth tier of the American Soccer Pyramid. The team plays its home games at Independence Stadium. The team's colors are blue, white, and yellow, based on the city's flag.\nHistory.\nIn 2015, Shreveport-based brothers announced they would be bringing the first professional soccer team in the history of the city. The team is named for the infamous Great Raft log jam which clogged the Red and Atchafalaya Rivers from the 1100s to early 1900s.\nRafters FC played their inaugural season in 2016, garnering an 8–7–3 record.\nRafters FC debuted a customized jersey that became a viral sensation in soccer media as it featured a printed seersucker jacket and pink bowtie.\nStadium.\nRafters FC currently play their home matches at Independence Stadium. They previously played at Graf Orthodontics Field at Messmer Stadium, a local stadium used primarily for high school sporting events and community events. Max capacity of the stadium is estimated at 3,500 with the Rafters averaging 2,000–3,000 in attendance each match for the 2016 season.\nCoaches.\n\"As of October 23, 2016.\"\nAssociated Clubs.\nLady Rafters FC.\nIn July 2016, the Rafters announced they would be fielding a Women's Premier Soccer League team, the Shreveport Lady Rafters FC, starting in 2017. The team will be coached by Northern Ireland native Ryan McConville.\nRafters Reserves.\nIn September 2016, the Rafters announced a reserves team, the Shreveport Rafters FC B team, would play in the Gulf Coast Premier League.<|endoftext|>1888 Worcester Tech football team\n\nThe 1888 Worcester Tech football team was an American football team that represented Worcester Polytechnic Institute in the 1888 college football season. The team compiled a 1–5 record.<|endoftext|>Chandi Moore\n\nChandi Moore is an American health education specialist, transgender rights activist, HIV/AIDS activist, and reality television personality. Moore was a former cast member of the documentary series \"I Am Cait\" and works as the Health Education Associate at Children's Hospital Los Angeles.\nCareer.\nMoore works as the Health Education Associate at Children's Hospital Los Angeles and works within the hospital's Center for Trans Youth and Development. As a health educator, she advocates for transgender and gender-non conforming people to receive proper testing and care for HIV/AIDS. Moore leads a trans youth-specific program called Brave Leaders Unified to Strengthen Our Health.\nMoore previously served as Co-Chair for the Transgender Service Providers Network. In 2015, she was named one of Top 25 Trans Pioneers by \"The Advocate\". In 2015, Moore also worked with the Centers for Disease Control and Prevention for their Act against AIDS initiative campaign \"Doing It\", encouraging community members to get tested for HIV.\nMoore is a recipient of the 2015 Positive Images Statement of Courage Award and the 2018 Better Brothers Los Angeles Advocate Award.\nIn 2016, Moore was a regular Cast member of the American documentary television series \"I Am Cait\", which followed the life of former Olympian Caitlyn Jenner after she came out as a transgender woman. She partnered with Jenner to make a video about Transgender Day of Remembrance.\nIn 2022, Moore was one of the transgender activists who took the stage with Lizzo at the 48th People's Choice Awards.\nPersonal life.\nMoore is from Los Angeles, California. She is a transgender woman and is HIV positive.<|endoftext|>Billy Glide\n\nBilly Glide (July 25, 1970 - May 24, 2014) was a pornographic actor. He began appearing in adult films around 1995 and appeared in over 1300 movies.\nPersonal life.\nBilly Glide was born Tad Douglas Nolen in Los Angeles, California, United States. He started his career in 1995. Nolen died on 24 May 2014 in Huntington Beach, California. It was initially reported that he had been bitten by a rattlesnake, while helping a friend move, and had refused medical treatment. However, it was later confirmed that, although he had suffered a venomous bite, the actual cause of death was alcohol intoxication. Glide never married but left behind a daughter at the time of his death.\nGlide was posthumously inducted into the AVN Hall of Fame in 2015.<|endoftext|>Richard C. Franklin\n\nRichard C. Franklin is a sound editor. He was nominated at the 63rd Academy Awards for Best Sound Editing for the film \"Flatliners\". The nomination was shared with Charles L. Campbell.\nHe has done over 90 films to date, including \"E.T. the Extra-Terrestrial\".<|endoftext|>Troy Browns\n\nThe Troy Browns were a minor league baseball team based in Troy, Kansas in 1895. The Troy Browns played as members of the Kansas State League, winning the league championship in their only season of play.\nHistory.\nMinor league baseball in Troy, Kansas began during the 1895 season. In 1895, the Troy Browns played as members of the four–team Independent level Kansas State League. The Emporia Maroons, Leavenworth Soldiers and Topeka Giants teams joined Troy in beginning league play on May 16, 1895.\nTroy was noted to be the smallest city in the four–team league, with the team first forming in March, 1895. The Browns were noted to have played exhibition games against the nearby St. Joseph Saints, losing the games by scores of 12–7, 20–18 and ", "num_tokens": 2048} {"category": "dolma1_7-wiki-en", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/dolma1_7-wiki-en/part-00-00000.npy", "text": " earning them a spot on the \"Inc.\" 5000 list as one of America's fastest growing companies.\n2015–present: Continued growth and beyond.\nIn early 2015, Sun teamed with VH1 to create the VH1 Radio Network. Sun primarily handles advertising and affiliate sales for the VH1-run network. Later that year, Sun added \"The Hit List with Fitz\" to its \"Shazam for Radio\" platform, which was the first interactive country music countdown and allowed listeners to discover content and interact with the show in real time.\nIn August 2015, Sun again made the \"Inc.\" 5000 list as one of America's fastest growing companies with revenue increasing by 629%. Additionally, Sun was named the fastest growing business in the broadcast radio industry and the 11th fastest growing company in all of media in 2015. Sun Latino was also named the largest independent Spanish-language radio network in the United States. In December 2015, Sun CEO, Jason Bailey, was named an Honorary Trustee by the Alliance for Women in Media.\nIn January 2016, Sun acquired the syndication rights to \"The House of Hair with Dee Snider\". Sun also partnered with Radio Express in February 2016 in an ad sales and affiliate agreement that brought 10 new programs (including \"La Piedra\", \"La Mex-Cha\", and \"Jacapps\") to the network.\n2020–present: Birth of G Networks.\nIn February 2020, Sun Broadcast Group announced that it acquired Cleveland based Envision Networks.\nEnvision's Danno Wolkoff and Laura Orcan Wolkoff were named Chief Operating Officer and VP/Operations, respectively, at Sun, but were both terminated June 23, 2021, for \"gross negligence and gross incompetence … in the performance of their duties.\"\nOn August 16, 2021, Sun Broadcast Group's parent company, Gen Media Partners, rebranded Sun Broadcast Group as G Networks.\nIn July 2021, the Wolkoff's sued G Networks alleging the firm owes them $2.1 million.<|endoftext|>2001 Liga Perdana 2\n\nThe 2001 Liga Perdana 2 season is the fourth season of Liga Perdana 2. A total of 12 teams participated in the season.\nSabah and Brunei were relegated from Liga Perdana 1 while Kedah JKR and PDRM were promoted from Liga FAM to a now increased total number of teams competing in the league from ten to become 12 teams. \nThe season kicked off on 2 April 2001. Johor FC won the title and was promoted to Liga Perdana 1 alongside Sabah and NS Chempaka.\nTeams.\n12 teams competing in the fourth season of Liga Perdana 2.\nLeague table.\n1.Johor FC - 47 PTS (2001 Liga Perdana 2 Champions)\n2.Sabah - 45 PTS (Promoted to Liga Perdana 1)\n3.NS Chempaka - 37 PTS (Promoted to Liga Perdana 1)\n4.Brunei - 33 PTS\n5.Kelantan TNB - 32 PTS\n6.TM - 31 PTS\n7.Kelantan JKR - 29 PTS\n8.KL Malay Mail - 24 PTS\n9.Kedah JKR - 24 PTS\n10.PDRM FA - 22 PTS\n11.Kedah - 21 PTS\n12.ATM - 18 PTS<|endoftext|>Paula Fondevila Castro\n\nPaula Fondevila Castro (; born 16 May 1984) is a Spanish former tennis player.\nFondevila Castro has career-high WTA rankings of 303 in singles, achieved in July 2009, and 299 in doubles, reached in August 2009. In her career, she won one singles title and two doubles titles on the ITF Circuit.\nFondevila Castro made her WTA Tour main-draw debut at the 2009 Morocco Open. In October 2009, she played her last professional match on the ITF Circuit.<|endoftext|>Rebrikha, Rebrikhinsky Selsoviet, Rebrikhinsky District, Altai Krai\n\nRebrikha () is a rural locality (a selo) and the administrative center of Rebrikhinsky District of Altai Krai, Russia. Population:<|endoftext|>Theodore Constantine, Baron Constantine of Stanmore\n\nTheodore Constantine, Baron Constantine of Stanmore (15 March 1910 – 13 February 2004) was a British businessman and Conservative political activist who served as both the Chairman and the President of the National Union of Conservative and Unionist Associations.\nBorn to a tobacco importer of Greek origin, Constantine was educated at Acton College. During World War II, he served with the Royal Auxiliary Air Force as a plotter at Fighter Command's headquarters at Bentley Priory; he was awarded the Air Efficiency Award in 1945. After he was demobilized, he founded a hearing aid company that counted Sir Winston Churchill among its clients.\nIn 1965, Constantine was involved in a public controversy as Chairman of the Harrow East Conservative Association. The sitting Conservative MP, Anthony Courtney, had been entrapped in Moscow by the KGB in a honeypot operation. Constantine urged Courtney to step down, but the latter refused; when Courtney was re-adopted as the Conservative candidate, Constantine resigned from the constituency party's executive. Courtney subsequently lost the seat in the 1966 general election, as Constantine had predicted. Courtney later successfully sued Constantine for slander, and was awarded £200 in damages.\nHe served as the Chairmen of National Union of Conservative and Unionist Associations during 1967-8 and its President from 1980–1.\nConstantine was appointed CBE in 1956, knighted in 1964, and made a Deputy Lieutenant for Greater London in 1967. He served as High Sheriff of Greater London in 1967. He was made a life peer on 21 July 1981, as Baron Constantine of Stanmore, \"of Stanmore in Greater London\".<|endoftext|>Diane Griffin (conservationist)\n\nDiane Griffin, OPEI (born March 18, 1947) is a Canadian conservationist from Prince Edward Island. Griffin is a former provincial deputy minister of environmental resources and a recipient of the Governor General's Conservation Award, the Queen Elizabeth II Diamond Jubilee Medal and the P.E.I. Environment award. She also served as executive director of the Island Nature Trust.\nIn 2010, Griffin was awarded the Prince Edward Island Medal of Merit for her contributions to the environment of the province.\nOn October 27, 2016, Griffin was named to the Senate of Canada by Prime Minister Justin Trudeau to sit as an independent. Until her appointment, she served as a councillor on the Stratford, P.E.I. town council. Griffin assumed office on November 10, 2016. She subsequently jointed the Independent Senators Group. On November 4, 2019, she joined the Canadian Senators Group.\nAfter turning 75 on March 18, 2022, Senator Griffin retired from the senate due to mandatory retirement rules.<|endoftext|>Shelby Earl\n\nShelby Earl is an American singer-songwriter and musician based in Seattle, Washington. Earl's first solo album, \"Burn the Boats\", was produced by John Roderick (featuring members of Telekinesis, The Long Winters, Fleet Foxes and more) and released on Local 638 Records (owned and operated by Visqueen's Rachel Flotard). In 2011 NPR's Ann Powers named Earl her \"new favorite songwriter\" and Amazon.com dubbed her album the \"#1 Outstanding 2011 Album You Might Have Missed\".\nSince the release of her debut album, Earl has opened for Benjamin Gibbard of Death Cab For Cutie, Loudon Wainwright III, Rhett Miller of the Old 97s, Crooked Fingers, Lavender Diamond, The White Buffalo, Felice Brothers, Tom Brosseau, Aaron Lee Tasjan and more.\nIn April 2013, Rolling Stone suggested Earl's song \"Everyone Belongs to Someone\" be included on Zach Braff's Garden State follow-up film.\nEarl released her second solo album, \"Swift Arrows\", produced by Seattle indie folk artist Damien Jurado, in July 2013. The album was recorded live at Seattle's Columbia City Theater and was well received by such outlets as NPR (\"Music For Folks Who've Been Through a Few Things\"), Salon.com (\"SXSW: Meet Shelby Earl, the singer you need to know\"), and Rolling Stone (\"Shelby Earl Comes Out Firing in 'Swift Arrows\")\nEarl's version of Michael Jackson's \"P.Y.T. (Pretty Young Thing)\" was featured on the “Everything I Try to Do, Nothing Seems to Turn Out Right” episode of Grey's Anatomy (season 10, episode 23), which aired on May 8, 2014. Jackson was very influential in Earl becoming an artist. The song was produced by Eric Howk.\nIn May 2014, Earl performed at the Sasquatch! Music Festival and was highlighted in", "num_tokens": 2048} {"category": "dolma1_7-wiki-en", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/dolma1_7-wiki-en/part-00-00000.npy", "text": ".com\".\nPersonal life.\nBorn in Cambridge, UK of Italian parents (from Brisighella in the Emilia-Romagna region in North East Italy and Sorrento near Naples), she is bilingual in English and Italian and resides in London, England with her partner Gerald Heward. She also speaks French and Spanish. From 1997, she was the London Correspondent/translator and presenter for the Bandini Committee (an outfit which awards rookie Formula 1 drivers in the name of the legendary F1 driver Lorenzo Bandini who lost his life at the Monte Carlo Grand Prix of 1967).<|endoftext|>Regiment "Nizza Cavalleria" (1st)\n\nThe Regiment \"Nizza Cavalleria\" (1st) () is a cavalry unit of the Italian Army based in Bellinzago Novarese in Piedmont. The regiment is the reconnaissance unit of the Alpine Brigade \"Taurinense\".\nHistory.\nFormation.\nIn 1690 the Duke of Savoy Victor Amadeus II joined the Nine Years' War against the Kingdom of France. On 4 July 1690 the Regiment Dragoons of Piedmont ()was formed for service in the war. The regiment consisted of eight companies and fought in 1690 at Avigliana and in 1693 in the Battle of Marsaglia.\nAfter the war the Regiment Dragoons of Piedmont was disbanded on 22 November 1699.\nCabinet Wars.\nThe regiment was reformed on 14 April 1701 with eight companies, which were grouped into four squadrons. Each company fielded 50 horses. The same year Duke Victor Amadeus II joined the War of the Spanish Succession and the regiment fought in 1706 in the Siege of Turin and then in the Duchy of Savoy. On 27 March 1713 the regiment received two companies from the Regiment Dragoons of His Royal Highness and now consisted of ten companies, which were grouped into five squadrons. The same year the war ended with the Peace of Utrecht, which transferred the Kingdom of Sicily and the regiment moved to Sicily to take possession of the new territory. In October 1713 Victor Amadeus II and his wife, Anne Marie d'Orléans, travelled from Nice to Palermo, where the king and queen were crowned in the cathedral of Palermo on 24 December 1713.\nThe regiment was garrisoned in 1715-16 in Messina, in 1716-18 in Palermo, an in 1718-20 in Syracuse. In July 1718 Spain landed troops on Sicily and tried to recover the Kingdom of Sicily from Savoy rule. On 2 August 1718 Britain, France, Austria, and the Dutch Republic formed an alliance to defeat Spain in the War of the Quadruple Alliance. The Dragoons of Piedmont fought against Spanish forces on Sicily until 1720, when the Treaty of The Hague restored the position prior to 1717, but with the Savoy and Austria exchanging Sardinia and Sicily. On 16 October 1720 the Dragoons of Piedmont moved from Sicily to Sardinia, where the regiment remained until 1722.\nIn 1733 King Charles Emmanuel III joined the War of the Polish Succession on the French-Spanish. The regiment fought in 1734 in the Battle of San Pietro and the Battle of Guastalla against Austrian forces.\nIn 1742 King Charles Emmanuel III joined the War of the Austrian Succession on the Austrian side and the regiment fought in the Battle of Tidone.\nIn July 1774 the Regiment Dragoons of Piedmont ceded two of its companies to help form the Regiment Dragoons of Chablais\" and from then on consisted of eight companies grouped in four squadrons.\nFrench Revolutionary Wars.\nIn 1792 King Victor Amadeus III joined the War of the First Coalition against the French Republic. From 1792 to 1796 the Dragoons of Piedmont fought against the French Army of Italy. In March 1796 Napoleon Bonaparte arrived in Italy and took command of the French forces, with which he defeated the Royal Sardinian Army in the Montenotte campaign within a month. On 28 April 1796, King Victor Amadeus III had to sign the Armistice of Cherasco and on 15 May 1796 the Treaty of Paris, which forced Sardinia out of the First Coalition. Victor Amadeus III also had to cede the Duchy of Savoy and the County of Nice to France. On 16 October 1796 Victor Amadeus III died and his eldest son Charles Emmanuel IV ascended the throne. On 26 October 1796 King Charles Emmanuel IV ordered to reduce the Kingdom's cavalry forces and the Dragoons of Piedmont was reduced to four squadrons. On the same date the company level was abolished.\nIn fall 1798 France invaded the remaining territories of King Charles Emmanuel IV. On 6 December 1798 French forces occupied Turin and on 8 December 1798 Charles Emmanuel IV was forced to sign a document of abdication, which also ordered his former subjects to recognise French laws and his troops to obey the orders of the French Army. Charles Emmanuel IV went into exile on Sardinia, while his former territories became the Piedmontese Republic. On 9 December 1798 the Sardinian troops were released from their oath of allegiance to the King and sworn to the Piedmontese Republic. The same month the Regiment Dragoons of Piedmont was renamed 3rd Cavalry Regiment.\nIn January 1799 the regiment was renamed 3rd Piedmontese Dragoons Regiment. The same month the 2nd Cavalry Regiment, the former Regiment Dragoons of the Queen, was disbanded, and two of its squadrons were transferred to the 3rd Piedmontese Dragoons Regiment. In spring 1799 the regiment fought for the French in the War of the Second Coalition against the Austrians. On 26 March 1799 the regiment fought in the Battle of Verona and then on 5 April in the Battle of Magnano, which the Austrians won, forcing the French out of Italy. With the French retreat the Piedmontese Republic dissolved and the 3rd Piedmontese Dragoons Regiment, like all regiments of the Piedmontese Republic, was disbanded in May 1799.\nRestauration.\nOn 11 April 1814 Napoleon abdicated and on 20 May 1814 King Victor Emmanuel I returned from exile in Sardinia to Turin. On 24 May 1814 Victor Emmanuel I ordered to reform the cavalry regiments disbanded in 1799, including the Regiment Dragoons of Piedmont, which was renamed Regiment \"Cavalleggeri di Piemonte\" (Chevau-légers of Piedmont). On 1 January 1815 the regiment consisted of six squadrons grouped into three divisions.\nOn 26 February 1815 Napoleon escaped from Elba and on 1 March 1815 he landed in Golfe-Juan in France. This triggered the War of the Seventh Coalition, which Sardinia joined against France. The Regiment \"Cavalleggeri di Piemonte\" participated in the Hundred Days campaign, during which the regiment fought on 6 July at Grenoble.\nOn 1 January 1824 the regiment formed two new squadrons, which were grouped into a newly formed division. On 24 December 1828 the Cavalleggeri di Piemonte provided some of its personnel to help form the new Regiment \"Dragoni di Piemonte\". On 29 August 1831 the regiment was reduced to six squadrons and a depot squadron, which would have been formed in times of war. On 3 January 1832 the regiment became a heavy cavalry unit again and was renamed Regiment \"Nizza Cavalleria\" after the County of Nice, which had been returned to the Kingdom of Sardinia after the fall of Napoleon.\nItalian Wars of Independence.\nIn 1848-49 the regiment participated in the First Italian War of Independence, fighting in 1848 in the battles of Mantua, Santa Lucia, Goito, Castellucchio, and Milan, and in 1849 in the battles of Mortara and Novara. For its conduct at the battles of Goito, Mortara, and Novara the regiment was awarded three Bronze Medals of Military Valour.\nOn 3 January 1850 the regiment was reduced to four squadrons. In 1859 the regiment participated in the Second Italian War of Independence and fought at Borgo Vercelli. On 16 September 1859 the Nizza ceded one of its squadrons to help form the Regiment \"Cavalleggeri di Lodi\" and on 19 October of the same year the regiment was redesignated as Cuirassiers unit and renamed Regiment \"Corazzieri di Nizza\". Already on 6 June 1860 the regiment resumed to use its previous name Regiment \"Nizza Cavalleria\".\nIn the 1860-186", "num_tokens": 2048} {"category": "dolma1_7-wiki-en", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/dolma1_7-wiki-en/part-00-00000.npy", "text": " to fine-tune his concept, and requested a patent on his invention in 2015. The patent was granted in December 2017. After two years of product development, it was launched on Kickstarter and raised more than £100,000. \nName.\nPokito is derived from the Spanish for \"a little\" - poquito - but is spelled with a \"ki\" for ease of pronunciation. It is also a reference to \"pocket\" in English, alluding to its ultra portability.\nDescription.\nPokito is an ultra portable reusable cup that can be collapsed to a few centimetres when not in use and so can be stored easily in a pocket or purse. It can also be unfolded into different sizes: \"grande\" (16oz or 475ml), \"medio\" (12oz or 350ml) or \"espresso\" (8oz or 230ml). Once a drink has been consumed in the cup, the remaining dregs of coffee are kept inside without leakage, even when the cup is folded back.\nPokito has been designed to reduce the usage of disposable cups. It also saves energy if the cup is used more than 15 times. It is made of a synthetic rubber called thermoplastic elastomer which has been independently tested and compliant to EU and FDA regulations. Pokito is manufactured entirely in the UK from materials that have been designed especially for durability and safety. Omega Plastics manufactures the cups which are sold £15 per unit.<|endoftext|>Anton Alekseev (mathematician)\n\nAnton Yurevich Alekseev (Антон Юрьевич Алексеев, born 9 August 1967) is a Russian mathematician.\nAlekseev was a student of Ludvig Faddeev. Alekseev worked at the Steklov Institute in Saint Petersburg and at the beginning of the 1990s at Uppsala University. He is now a professor ordinarius at the University of Geneva.\nAlekseev does research on representation theory of Lie groups and algebras, moment theory, symplectic geometry and mathematical physics.\nIn 2006 he, with Eckhard Meinrenken, published in \"Inventiones Mathematicae\" a proof of the Kashiwara-Vergne conjecture. In 2008 he gave a new proof with Charles Torossian.\n2014 Alekseev was an invited speaker with talk \"Three lives of the Gelfand-Zeitlin integrable system\" at the International Congress of Mathematicians in Seoul.<|endoftext|>Bailey's Cafe\n\nBailey's Café is a 1992 novel by award-winning American author Gloria Naylor. The novel consists of a loosely intertwined group of stories, all told in first person, about the owners and patrons of \"Bailey's Cafe\", an apparently supernatural establishment, set nominally in New York City, whose entrance can be found from different places and times.\nPlot summary and settings.\nThe unnamed owner of Bailey's Cafe (he is called \"Bailey\" as a nickname) acquires the cafe after his return from World War II and claims that it is magical and it saved him. Though the cafe is nominally set in New York City as per Naylor's earlier novel \"Mama Day\", patrons wander into it from different times and places. The cafe also has a back door that apparently opens onto infinity (or death). The stories he tells include his own and his wife, Nadine's, as well as those of several of the patrons of the cafe who live in a nearby brownstone including Eve (who owns the brownstone down the street that harbors mostly fugitive women and serves as a bordello), Ester (the victim of sexual and emotional abuse), \"Miss Maple\" (a male cross-dresser), Jessie Bell (a bisexual drug-addict), Mary (a self-mutilated beauty), and Mariam (a mentally challenged, pregnant, virgin, teenager). Each person's back story is told by the owner as they come into the cafe.\nBailey frames the first-person narrative of each character but one: Nadine opens and closes the story of Mariam (Mary).\nCharacters.\nNote: none of the characters have surnames. All characters excepting Gabe (who is Jewish) and Mariam (who is an African) are presented as African American.\nThemes.\nIn an interview with \"The Seattle Times\", Naylor explained that \"the underlying theme [of \"Bailey's Cafe\"] is how people define femaleness and female sexuality, how women have been cast in sexual roles since Eve.\" Thus, the guests at Eve's boarding house do not fit the \"easy sexual labels\" used to control women's bodies. Another theme within \"Bailey's Cafe\" is the combination of collective and individuals traumas throughout World War II. Bailey's references of various key battle locations such as Guam, Pearl Harbor, Japan, and more allude to the fact that the violence was a collective experience from multiple characters and the general American population during wartime.\n\"Bailey's Cafe \"is the first of Naylor's novels to spotlight male characters. \"Bailey\", the owner of the café, frames the patrons’ stories with his running commentary as well as narrates the story of his courtship of Nadine, his wife. In addition, Miss Maples, a cross-dressing male housekeeper and bouncer, tells the story of why he came to wearing dresses. This shift in Naylor’s exclusive interest in the stories of women has been interpreted as her desire “to portray a different kind of male identity as well as . . . to cultivate a different relationship with her male characters.\"\nCritical reception.\n\"Bailey's Cafe\", which is sometimes referred to as a collection of interrelated short stories, has been well received by critics.\nAdaptation.\nGloria Naylor worked with director Novella Nelson to adapt \"Bailey's Cafe\" for the stage. \"Bailey's Cafe\" the play was produced by the Hartford Stage in March and April 1994.<|endoftext|>British Rail Class 803\n\nThe British Rail Class 803 \"AT300\" is a type of electric multiple unit built by Japanese rolling stock manufacturer Hitachi Rail for open-access operator Lumo. Based on the Hitachi A-train design, a total of five units comprising five cars have been produced. The class is used to operate passenger services on the East Coast Main Line between and .\nBackground.\nIn 2015, following an announcement from the Office of Rail and Road that it would be allowing open-access operators to bid for additional rail paths on the East Coast Main Line, FirstGroup submitted a proposal to operate services between London and Edinburgh. Under its plan, First would seek to directly compete with existing road, rail and air services by offering all standard class seating with an average ticket price of approximately £25. The proposal for the new service was approved in May 2016.\nIn March 2019, First announced that it had signed an agreement with Hitachi to procure a total of five new five-car trains from its A-train product line for its new service. The units are financed by Beacon Rail with a ten-year maintenance contract. The first body shell arrived at Hitachi's Newton Aycliffe Manufacturing Facility in April 2020.\nThe first test runs on the national network were held on 26 May 2021, with the class entering public service on Lumo's launch day of 25 October 2021.\nOperation.\nWhile sharing a bodyshell with the previous UK A-train variants, the Class 803 differs in that it has no diesel engines fitted. They are fitted with batteries to enable the train's on-board services to be maintained, in case the primary electrical supplies have failed. Other changes include seating being standard class only, and the lack of a galley area, although catering services are provided through the use of a trolley service. The units also feature air conditioning, power sockets and free Wi-Fi.\nAccidents and incidents.\nOn 17 April 2022, a Lumo-operated Class 803 passed through a set of points at at where there was a speed restriction of . Several passengers sustained minor injuries. The Rail Accident Investigation Branch opened an investigation into the incident.<|endoftext|>2023 Volta ao Algarve\n\nThe 2023 Volta ao Algarve \"(English: Tour of the Algarve)\" was a road cycling stage race that took place between 15 and 19 February 2023 in the Algarve region of southern Portugal. The race was rated as a category 2.Pro event on the 2023 UCI ProSeries calendar, and was the 49th edition of the Volta ao Algarve.\nTeams.\n12 of the 18 UCI WorldTeams, four UCI ProTeams, and nine UCI Continental teams made up the 25 teams that participated in the race. were the only team not to enter a full squad of seven riders.\nUCI WorldTeams\nUCI ProTeams\nUCI Continental Teams<|endoftext|>Ionikos Nikaias B.C. in international competitions\n\nIonikos Nikaias B.C. in international competitions is the history and statistics of Ionikos Nikaias B.C. in FIBA Europe and Euroleague Basketball Company European-wide professional club basketball competitions.\nGame notes.\nFIBA Korać Cup (3rd-tier).\n1979–80.\nIonikos Nikaias (coach: Kostas Anastasatos): Panagiotis Giannakis 32, Stathis Sarantaenas 22, Tasos Bezantakos ", "num_tokens": 2048} {"category": "finemath-3plus", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/finemath-3plus/part-00-00000.npy", "text": " the same results:\n\n(For the proof by induction you only need to check the case when k = 1 but I like to check a few cases just to see if the expression seems to be correct.)\n\nThese all work, but what about ALL the larger values of k?  Let’s assume that it does work for all the values of k up to and including p (which we just demonstrated is indeed true for p up to 3).  That is,\n\nfor k = 1, 2, ··· , p\n\nIn particular, we are assuming that\n\nWe want to show that if the statement above is true, then the next possible p (which is p+1) is also true.  That is, can we show that\n\nequals\n\nIf it is, this argument applies to the next p, and the next – in other words, for all larger values of p (completing the proof).\n\n Let Z = But we earlier showed  so Z\n\nCan you complete the proof by showing Z = ?\n\nStephen La Rocque><|endoftext|>Oct 15 2013\n\n## The Impact of FIFA World Rankings\n\nAfter the conclusion of the World Cup, a new cycle of FIFA World Rankings begins. Every month, FIFA releases an updated list ranking every national football team — #1 to #207. For most fans, myself included, these rankings seem arbitrary. What does it matter that Croatia is ranked #10 and USA is #13? What does that even mean? Portugal has 1029 points compared to Mexico’s 839. So what? How does FIFA arrive at these point totals? Well, after scouring the internet and solving some middle-school-level math equations, I’ve finally figured out how it all works. To my surprise, it actually makes sense. I could attempt to summarize and simplify the process, but FIFA actually does a pretty good job with explaining how they arrive at each team’s point total.\n\nThe basic logic of these calculations is simple: any team that does well in world football wins points which enable it to climb the world ranking.\n\nA team’s total number of points over a four-year period is determined by adding:\n\n· the average number of points gained from matches during the past 12 months;\nand\n· the average number of points gained from matches older than 12 months (depreciates yearly).\n\nCalculation of points for a single match\n\nThe number of points that can be won in a match depends on the following factors:\n\n• Was the match won or drawn? (M)\n• How important was the match (ranging from a friendly match to a FIFA World Cup™ match)? (I)\n• How strong was the opposing team in terms of ranking position and the confederation to which they belong? (T and C)\n\nThese factors are brought together in the following formula to ascertain the total number of points (P).\n\nP = M x I x T x C\n\nThe following criteria apply to the calculation of points:\n\nM: Points for match result\n\nTeams gain 3 points for a victory, 1 point for a draw and 0 points for a defeat. In a penalty shoot-out, the winning team gains 2 points and the losing team gains 1 point.\n\nI: Importance of match\n\nFriendly match (including small competitions): I = 1.0\n\nFIFA World Cup™ qualifier or confederation-level qualifier: I = 2.5\n\nConfederation-level final competition or FIFA Confederations Cup: I = 3.0\n\nFIFA World Cup™ final competition: I = 4.0\n\nT: Strength of opposing team\n\nThe strength of the opponents is based on the formula: 200 – the ranking position of the opponents\nAs an exception to this formula, the team at the top of the ranking is always assigned the value 200 and the teams ranked 150th and below are assigned a minimum value of 50. The ranking position is taken from the opponents’ ranking in the most recently published FIFA/Coca-Cola World Ranking.\n\nC: Strength of confederation\n\nWhen calculating matches between teams from different confederations, the mean value of the confederations to which the two competing teams belong is used. The strength of a confederation is calculated on the basis of the number of victories by that confederation at the last three FIFA World Cup™ competitions (see following page). Their values are as follows:\n\nUEFA/CONMEBOL = 1.00 CONCACAF = 0.88\nAFC/CAF = 0.86 OFC = 0.85\n\nSo, now that we understand the math, we can talk about the bigger issue — the impact of the FIFA World Rankings on the World Cup. First, it is important to explain how the World Cup draw works. There are 32 teams that play in the World Cup — 8 group of 4. To determine which nations end up in which group, one pot is created of the top 7 nations, ranked by FIFA, and the host nation, in this case, Brazil. The remaining 24 teams are placed in pots separated by “geographic and sports criteria“.\n\nBy being one of the top 7 teams, a nation is arguably given an easier road to advance as they do not have to play the 7 other FIFA-ranked “soccer-powerhouses” in group play. Thus, besides qualifying for the World Cup, every nation’s goal is to be one of the top 7 seeds.\n\nThis year’s World Cup seeding hinges on the upcoming October 17th FIFA World Rankings. As of today’s World Cup qualifying matches, Brazil, Spain, Argentina, Germany, Belgium, and Switzerland (right?! who would of thought?) have all clinched a seed for the World Cup finals draw. Fighting for those last two spots are Colombia, Uruguay, Netherlands, and Italy. ESPNFC’s Dale Johnson has thoroughly outlined what must happen in order for two of these teams to clinch a seed.\n\nTo say the least, the entire process is not easy. While there are a lot of factors and variables that go into the FIFA World Rankings, there is just as much ambiguousness when it comes to how these rankings are employed. The last several qualification matches will determine the final rankings and where each nation will end up. The 2014 World Cup Draw will take place December 6th.\n\nOct 08 2013\n\n## An Uneven Playing Field\n\nI’ve lived in the United States for over ten years now, and yet somehow I still struggle to remember the name of my hometown’s American football team (give me a sec… oh that’s right, Atlanta Falcons – Rise up!). Being a Greek South African (born in SA, but 100% of Greek descent), my sports upbringing was dominated primarily by soccer (with rugby and basketball coming in close second). However, the stop-and-go pace of American football as compared to the rhythmic flow of “the beautiful game” has always deterred me from ever watching more than one full quarter of a game.\n\nI’d be lying if I told you I knew which NFL team won the most recent Super Bowl or who the best quarterback in the league is right now. In fact I’d be lying if I told you I even cared. But there is one thing that I do envy about American football (the NFL in particular), and that’s the fact that, unlike most European soccer leagues, it embraces an even playing field.\n\nI’m a huge fan of the underdog. Ask me which team I want to win in a match and (unless it involves my beloved Olympiakos) I’m almost always rooting for the non-favored team. Perhaps it stems from being both the only daughter and youngest child in a loud, obnoxious Greek family, but there’s something about an unforeseen victory by an underrated opponent that gives me the utmost satisfaction. With all this being said, those of us who are avid European soccer fans know that the chances of an underdog team ever winning a domestic league championship are slim to none.\n\nIf we take a look at the champions of both La Liga and the English Premier League since the start of the 21st century, we see both leagues are dominated by less than a handful of teams. Since 2000, Real Madrid and Barcelona have been the two most undoubtedly successful teams in La Liga (with the rare occurrence of Valencia breaking through El Clasico barrier). Real and Barça have won 32 and 22 titles, respectively, since the establishment of La Liga in 19291. In fact, no other club has won the title on more than nine occasions1.\n\nIn the EPL, a similar trend can be seen, although it is not quite as strong or as historically rooted.\n\nHowever, if we take a look at the winners of the Super Bowl over the same time frame, we see a trend that falls on the total opposite end of the spectrum. In the last decade, 9 different teams have won the Super Bowl.\n\nWhat constitutes for this stark difference in playing fields? In essence, it is the drastically different economies of the NFL and European soccer.\n\nFirstly, the NFL’s revenue-sharing model is what makes it possible for the sport to survive in any size market across the US. The majority of the league’s revenue comes from TV broadcast deals, and that income, in addition to any revenue made from licensing deals, is shared equally among all teams in the league5.\n\nSecondly, the NFL consistently rewards mediocre franchises with the most talented young prospects through a reverse-order draft2. Any team from any city has the same opportunity to compete, and in order to ensure this, the NFL has created a variety of mechanisms to prevent a free market for talent2.  Player movement and salaries are severely restricted: a rookie draft denies young players the opportunity to have teams bid for their services, a salary cap prohibits teams from", "num_tokens": 2048} {"category": "finemath-3plus", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/finemath-3plus/part-00-00000.npy", "text": "ii.fmph.uniba.sk ³\n³ Program tema : Shnee flake drawed with recusion ³\nÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ *)\n\n{ This program draw shneeflake with rekusive from first level to\nnine. If is level higher then 9 then time for work is very large.\nIt is worked in turtle graphic. (Unit Okor, static metods) Principe\ndrowing : There are tree parts :\nIn first part draw 1/3 of picture. Then turtle rotate 120 degrees\nright. When is first part working then are realising all rekusions.\nIf you don't undestand it, then is better in MojaKor.flake in cycle\ngive parameter 1 to 1, then just draw only 1/3 of picture.\nIn part two (primitive case (level rekusion =1) is drawing only\none line. (dopredu, lenght s is from input)\nIn higher level how one draw -/\\- (in correct rotation) in line\none rekusive later. (for example : last level : ---- and at the present\nis -/\\-. For next level - is how ---- there. The lenght there is s/3.\nWhy s/3 ? Equilateral triangle is first s/3 and two lines are --. (how in\npicture -/\\-) Consenguently all of lines (in picture muth have s in last\nlevel of rekusion. For level 1 : s=input For\nlevel 2 : s=s/3\n\nIn triangle are only two parts drawed, but one is part of line last level.\nFor example : s /\\\n---- = - - - s/3 3 * s/3 = s\ns/3 I\ns/3\n}\n\nUses oKor,crt;\n\nType MyKor=object(Kor)\nProcedure Flake(n:integer; s:real);\nProcedure Flake_pom(n:integer; s:real);\nEnd;\n\nProcedure MyKor.Flake(n:integer; s:real);\nVar i:integer;\nBegin\nFor i:=1 to 3 do Begin\nZmenFP(i); {If you don't wand colors Clr this line}\nFlake_pom(n,s);\nVpravo(120);\nEnd;\nEnd;\n\nProcedure MyKor.Flake_pom(n:integer; s:real);\nBegin\nif n=1 then Dopredu(s)\nelse\nBegin\nFlake_pom(n-1,s/3);\nVlavo(60);\nFlake_pom(n-1,s/3);\nVpravo(120);\nFlake_pom(n-1,s/3);\nVlavo(60);\nFlake_pom(n-1,s/3);\nEnd\nEnd;\n\nVar k:MyKor;\ni:integer;\n\nBegin\nWith k do Begin\nFor i:=1 to 9 do\nBegin\nInit(-100,-200,0);\nIf ukazana=true then write(#7);\nFlake(i,400);\nPresunXY(-300,230); Pis('Snee flake of level '+chr(i+48));\nCakajKlaves;\nZmaz1;\nEnd;\nKoniec;\nEnd;\nEnd.\n\n``````<|endoftext|># EssayNICE | 24/7 Homework Help\n\nAssignment help 7499\n\nby | Jun 24, 2023 | Posted Assignments\n\nHello,\n\nI recently did an experiment in chemistry where we performed a titration of an unknown weak monoprotic acid with NaOH. We took an aliquot of 25ml of this (stock) acid and diluted it with 225mL of distilled water so that the volume becomes 250mL. We then poured 25mL of this diluted acid into a plastic cup to use in our titration, and then added another 100mL of distilled water. We also measured the pH at every point in the titration. One of our jobs is to calculate the concentration of this diluted acid solution, and I was wondering how we would do that (when I say the concentration of the diluted acid solution, I mean the concentration of the diluted acid BEFORE the 100mL of distilled water was added into the plastic cup to use for in the titration)? The initial pH of the solution (when the total volume of NaOH added from the buret to the solution is 0) was 2.72, so I was thinking you do 10^-2.72 to get the initial concentration. Please let me know if I am wrong, and if so, how I can determine this.\n\nThe volume of NaOH added and the pH at the equivalence point is 15.19mL and 8.172 respectively, and the volume of NaOH added and the pH at the half-equivalence point is 7.595mL and 3.60 respectively.\n\nThank you very much.\n\n#### Why Place An Order With Us?\n\n• Certified Editors\n• Profesional Research\n• Easy to Use System Interface\n• Student Friendly Pricing\n\n#### Have a similar question?\n\n##### Services that we offer\n\nYour Paper Is In Safe Hands\n\nPLAGIRAISM FREE PAPERS\n\nAll papers we provide are well-researched, properly formatted and cited.\n\nTOP QUALITY\n\nAll papers we provide are well-researched, properly formatted and cited.\n\nHIGHLY SECURED\n\nAll papers we provide are well-researched, properly formatted and cited.<|endoftext|>Congruence Worksheet\n\nIn Free Printable Worksheets207 views\n4.10 / 5 ( 186votes )\n\nTop Suggestions Congruence Worksheet :\n\nCongruence Worksheet What does it mean to be symmetrical what about congruent covering the concepts of symmetry and congruence in geometry this worksheet is perfect for third graders who need a quick review Effective design of executive compensation contracts involves choosing and weighting performance measures as well as defining the mix between fixed and incentive based pay components with a view to The use of worksheets that are aligned with looking at tactical approaches to applying the strategies outlined in the first book enable the reader to apply the concepts specific to their.\n\nCongruence Worksheet\n\nCongruent Shapes Worksheets Questions And Revision Mme\n\nSimple Congruence For Most Shapes Saying Something Is Congruent Is As Simple As Determining If They Are The Same Size And Shape Example Identify Two Pairs Of Congruent Shapes From The Options Below Shape A If We Were To Rotate It By 90 Degree Then It Would Fit Perfectly Onto Shape C So They Must Be Congruent Shape A Shape C\n\nCongruence Worksheet 2 Of 3 Helping With Math\n\nCongruent Worksheet 3 Of 3 Similar To The Above Listing The Resources Below Are Aligned To Related Standards In The Common Core For Mathematics That Together Support The Following Learning Outcome Understand Congruence And Similarity Using Physical Models Transparencies Or Geometry Software\n\nCongruences Free Math Worksheets\n\nThis Means The Congruence Relation Equiv Pmod M Is An Equivalence Relation On The Set Mathbb Z Therefore The Residue Classes Partition The Integers Therefore The Residue Classes Partition The Integers\n\nTriangle Congruent Worksheets Lesson Worksheets\n\nWorksheets Are 4 S Sas Asa And Aas Congruence 4 Congruence And Triangles Triangle Congruence Work Congruent Triangles Work 1 Congruent Triangles 2 Column Proofs Proving Triangles Congruent Assignment Date Period Assignment Click On Pop Out Icon Or Print Icon To Worksheet To Print Or Download 4 Sss Sas Asa And Aas Congruence\n\nCongruence In Triangles Worksheets Lesson Worksheets\n\nWorksheets Are 4 Congruence And Triangles 4 S Sas Asa And Aas Congruence Assignment Date Period Congruent Triangles Work 1 Congruent Triangles 2 Column Proofs Triangle Congruence Work Proving Triangles Congruent Congruent Triangles Proof Work Click On Pop Out Icon Or Print Icon To Worksheet To Print Or Download\n\nCongruent Triangles Worksheets\n\nA Collection Of Congruent Triangles Worksheets On Key Concepts Like Congruent Parts Of Congruent Triangles Congruence Statement Identifying The Postulates Congruence In Right Triangles And A Lot More Is Featured Here For The Exclusive Use Of 8th Grade And High School Students A Prior Knowledge Of Triangle Congruence Postulates Sss Sas Asa Aas And Hl Is A Prerequisite To Work With The Problems In This Set Of Printable Worksheets Tap Into Some Of These Worksheets For Free\n\nCongruent Triangles Worksheet Onlinemath4all\n\nProving Triangle Congruence Worksheet Special Line Segments In Triangles Worksheet Proving Trigonometric Identities Worksheet Properties Of Triangle Worksheet Estimating Percent Worksheets Quadratic Equations Word Problems Worksheet Integers And Absolute Value Worksheets Decimal Place Value Worksheets Distributive Property Of Multiplication Worksheet I Distributive Property Of\n\nGcse Congruent Triangle Proofs Teaching Resources\n\nComes With Powerpoint And Worksheet Includes Harder Follow Up Questions Where You Use A Completed Congruence Proof To Make Subsequent Justifications\n\nCongruent Triangles Ks3ks4 With Solutions Teaching Resources\n\nCongruent Triangles Ks3 Ks4 Non Claculator Includes Examination Style Questions Some Challenging Questions Includes Areas Of Kite And Rhombus Pythagoras Theorem Some Basic Circle Theorems Isos", "num_tokens": 2048} {"category": "finemath-3plus", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/finemath-3plus/part-00-00000.npy", "text": " 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 492 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 12 123 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 13 134 14 14 14 14 14 14 14 14 14 14 14 14 14 14 14 14 14 14 14 14 14 14 14 14 14 14 14 14 14 14 14 14 14 14 14 14 14 14 14 14 14 14 14 14 14 14 14 14 14 141 0 2 3 4 1 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 492 16 16 16 16 16 16 16 16 16 16 16 16 16 16 16 16 16 16 16 16 16 16 16 16 16 16 16 16 16 16 16 16 16 16 16 16 16 16 16 16 16 16 16 16 16 16 16 16 16 163 17 17 17 17 17 17 17 17 17 17 17 17 17 17 17 17 17 17 17 17 17 17 17 17 17 17 17 17 17 17 17 17 17 17 17 17 17 17 17 17 17 17 17 17 17 17 17 17 17 174 18 18 18 18 18 18 18 18 18 18 18 18 18 18 18 18 18 18 18 18 18 18 18 18 18 18 18 18 18 18 18 18 18 18 18 18 18 18 18 18 18 18 18 18 18 18 18 18 18 181 0 2 3 4 5 1 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 492 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 203 21 21 21 21 21 21 21 21 21 21 21 21 21 21 21 21 21 21 21 21 21 21 21 21 21 21 21 21 21 21 21 21 21 21 21 21 21 21 21 21 21 21 21 21 21 21 21 21 21 214 22 22 22 22 22 22 22 22 22 22 22 22 22 22 22 22 22 22 22 22 22 22 22 22 22 22 22 22 22 22 22 22 22 22 22 22 22 22 22 22 22 22 22 22 22 22 22 22 22 221 0 2 3 4 5 6 1 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 492 24 24 24 24 24 24 24 24 24 24 24 24 24 24 24 24 24 24 24 24 24 24 24 24 24 24 24 24 24 24 24 24 24 24 24 24 24 24 24 24 24 24 24 24 24 24 24 24 24 243 25 25 25 25 25 25 25", "num_tokens": 2048} {"category": "finemath-3plus", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/finemath-3plus/part-00-00000.npy", "text": "frac{x^3}{2} - \\frac{x^6}{2^2 \\cdot 2!} + \\frac{3x^9}{2^3 \\cdot 3!} - \\frac{15x^{12}}{2^4 \\cdot 4!} + ...$$\nBut now what? I can't find what $\\sum a_n$ is equal to.. So I have no way of determining the convergence.\n\nAs for the second series, I don't even know where to start.\n\nLast edited: Sep 21, 2009\n2. Sep 21, 2009\n\n### xaos\n\nsuch type of questions rely on a very small set of paradigm examples upon which we use substitution, so rewrite what you have into a form that is more familiar.\n\n3. Sep 21, 2009\n\n### LCKurtz\n\nIn your attempt at a solution, write out a couple more terms of the binomial expansion. And in the numerator don't simplify the constant. Starting with the x^6 term the constant in the numerator is 1, then 1*3, then 1*3*5, then... You should see a pattern emerging. It doesn't matter if the pattern works for the first few terms because they don't affect convergence.\n\nFor the second example I would write the fraction as (-1 + x^2)/ (1 + x^2) and divide it out long division, and I would use the trig identity for cos^2(x/2).\n\n4. Sep 21, 2009\n\n### manenbu\n\nOk, so for the first one I get:\n\n$$1+\\frac{x^3}{2}+\\sum_{n=1} (-1)^n x^{3n} \\frac{1 \\cdot 3 \\cdot 5 \\cdot ... \\cdot (2n-1)}{2^n \\cdot n!}$$\n\nHow do I treat the 1*3*5*...*(2n-1)? Can I just factor it outside of the summation and ignore it while making one of the limit test (probably ratio, since I have the factorial)?\n\n5. Sep 21, 2009\n\n### manenbu\n\nbtw, can I use binomial expansion when $(1+m)^{\\frac{1}{2}}$?\n\n6. Sep 21, 2009\n\n### LCKurtz\n\nNo, because it depends on n. Just include it in the ratio test. Most of the terms will cancel out.\n\n7. Sep 21, 2009\n\n### HallsofIvy\n\nSince it depends on n, not you cannot \"factor it outside the summation\"!\nYou can write it as 1*3*5*...*(2n-1)= 1*2*3**5*6*...*(2n-1)(2n)/(2*4*6*...*2n)= 2n!/(2*4*6*...*(2n))= 2n!/((2^n)(n!))\nNow cancel.<|endoftext|># The number circuit\n\nThe image circuit uses only positive integers. When a number enters this circuit it is placed in the Entry box and following the arrows it advances until it reaches the Exit. In each box you must perform the operation indicated and continue your journey.\n\nIf we arrive at the exit with the number 17. What number have we started with?\n\n#### Solution\n\nIf it reaches the exit with 17, the last operation may have been to divide by 2 and in that case, we would have arrived at that box with 34, so we could not have arrived from the center (adding 37) nor multiplying by 6.\n\nThat is to say, that we arrive from another side to the exit, adding 8, so we have arrived at that box with a 9, and we can only arrive from the multiply by 3 box, which we will have reached with 3, from which a number is added its following.\n\nThe only way to reach 3 by adding a number to your next one is starting from 1, so that it has come out with 1, it has added 2 to the multiply by 3 box, it has gone to the box add 8 and it has arrived with 17.<|endoftext|># problem with ginput when having 2 axes in the same figure\n\n5 vues (au cours des 30 derniers jours)\nAlexander le 9 Jan 2013\nI have a figure containing 2 axes, the first axes ax(1) contains a line object, it is a spectrum y = y(k). The x-axis here is inverse. The second axes ax(2) ('color','none') is just overlaid and does not contain any graphic object. It's x-axis on top is the (not reversed) wavelength.(The x-limits of the second are adjusted, so that both x-axis have the appropriate positions, e.g. k=0.1 --> x=10 stacked) However, this is to my knowledge the only way in MATLAB to achieve a second reverse x-axis for the same curve in a loglog diagram.\nMy problem: I want to get two x-coordinates in ax(1) by [x,~]=ginput(2); To be sure it is the right axes I use set(gcf,'CurrentAxes',ax(1))\nNow, when I look at the resulting x values, they do come from ax(2), not from ax(1). I haven't any clue why this doesn't work.\nAny help is much appreciated.\n##### 3 commentairesAfficher 1 commentaire plus ancienMasquer 1 commentaire plus ancien\nWalter Roberson le 9 Jan 2013\nTry setting HitTest off for the second axis.\nAlexander le 10 Jan 2013\nThanks Walter. With\nset(ax(2),'HitTest','off')\nit works. But why this behaviour?\nIn the help page for \"ginput\" is stated that \"ginput raises crosshairs in the current axes\". Has this to do with the stack of the two axes?\nThanks.\n\nConnectez-vous pour commenter.\n\n### Réponse acceptée\n\nWendy Fullam le 11 Jan 2013\n\"Try setting HitTest off for the second axis.\"\nset(ax(2),'HitTest','off')\n##### 0 commentairesAfficher -2 commentaires plus anciensMasquer -2 commentaires plus anciens\n\nConnectez-vous pour commenter.\n\n### Catégories\n\nEn savoir plus sur Graphics Object Properties dans Help Center et File Exchange\n\n### Community Treasure Hunt\n\nFind the treasures in MATLAB Central and discover how the community can help you!\n\nStart Hunting!\n\nTranslated by<|endoftext|>#### FAQ: How Far From The Center Of Earth Is The Sun?\n\nStudent Characteristics\n\nPlanets: Earth Mars\nDistance from the Sun* 149,600,000 kilometers (km) or 92,900,000 miles 227,940,000 km or 141,600,000 miles\nTime it takes to go around the Sun* 365.3 days 687 days\nDistance across* 12,800 km or 7,900 miles 6,800 km or 4,200 miles\nAtmosphere Nitrogen Oxygen Carbon Dioxide\n\n3 •\n\n## How far is the center of the Sun from the center of Earth?\n\nEarth travels around the Sun at an average distance of 92,955,807 miles every day (149,597,870 km). Using this average distance between the centers of the Sun and Earth as a unit of measurement, the Astronomical Unit is used to quantify the size of the universe (AU).\n\n## How far exactly is the Sun from the earth?\n\nAs previously stated, the average distance between the Earth and the Sun is around 93 million miles (150 million kilometers). That’s equal to one AU. Planet Mars is located on the three-yard line of our fictitious football pitch. The average distance between the Sun and the red planet is around 142 million miles (228 million kilometers).\n\nYou might be interested:  FAQ: When The Earth And Sun Are Far Apart?\n\n## Is the Sun at the Centre of the earth?\n\nThe Sun is not at the center of the Earth’s orbit, as is often believed.\n\n## Is Earth getting closer to the sun?\n\nHowever, scientists have discovered that the distance between the sun and the Earth is shifting. This does not imply that we are moving closer to the sun. As the sun’s mass diminishes, its gravity weakens, causing the Earth to gradually recede away from it. Microscopically little movements are being made away from the sun (about 15 cm each year).\n\n## How many years away is the sun?\n\nThe Sun is 0.00001581 light-years distant in light-years, but it is 8.20 light-minutes away in light minutes, or 500 light-seconds away in light minutes from Earth in light minutes. According to the metric system, the Sun is 150.4 billion meters distant from the Earth, or 150.4 billion kilometers.\n\n## Can we land on Sun?\n\nHowever, if you glance about, you’ll notice that there’s nothing here for you to really land on because the sun doesn’t have any solid surfaces to speak of. It’s nothing more than a massive ball", "num_tokens": 2048} {"category": "finemath-3plus", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/finemath-3plus/part-00-00000.npy", "text": " is the transfer of thermal energy by particles moving through a fluid. Lesson 3 kinetic and gravitational potential energy.\n\nComplete the blue Ch. A lit match light a light bulb or sound a guitar. Form and Properties of energy by garciavaleroeva.\n\nHeat is the transfer of thermal energy from one object to another object. A burning candle is a source of heat energy. Thermal energy is particles in a substance that are kinetically charged.\n\nThe specific heat capacity of iron is 0444 JgC. This activity is a great way to engage all of your l. Explain what is happening.\n\nSome of the worksheets for this concept are thermal energy temperature and heat work thermal energy and heat chapter 3 thermal energy temperature and heat answers thermal energy part 1 of 3 thermal physics geothermal energy 5. Materials and heat transfer. Worksheet to focus on how thermal energy works.\n\n1642 kJ A 100 x 102 g sample of ethanol at 250C is heated until it reactions 500C. Construct States of Matter Graph -discuss graphical representation on board 4. Just before referring to thermal energy temperature and heat worksheet you should understand that knowledge is definitely the factor to a more rewarding the day after tomorrow and studying won t just quit as soon as the school bell rings.\n\nFun with dry ice -demonstrate that. Identify each variables by name the. Thermal Energy is the total potential and kinetic energy of a substance.\n\nBrain Pop Video 2. Chapter 14 section 1 matter and thermal energy worksheet answers. The concise format helps you efficiently cover a lot of material in a clear organized and engaging way.\n\nAdd to my workbooks 7 Download file pdf Embed in my website or. Homework from last class. Heat And Thermal Energy.\n\nThermal energy is the internal energy contained by a substance because of the vibration and movement of the atoms and particles of the object. Worksheets independently so how does heat worksheet answers with silver lining on. Provide a real life example as to how we use temperature to alter reactions for our benefit.\n\nSources of heat light and sound. Heat And Temperature Worksheet Answers Unit Review – Thermal Energy Heat and Temperature by Science With Mr Enns. Thermal energy transfer worksheet they used the extensive information from these educational web sites to research energy heat transfer aborption students knowledge on the subject matter was assessed with worksheets and a quiz grade 4 demonstrate and explain different methods of energy.\n\nSpecific heat worksheet name in ink. Conductors and insulators by rocioga93. It is a great addition to thermal energy heat weather or plate tectonics convection in the mantle units.\n\nUnit 5 Heat and Thermal Energy Physical Science. This interactive set contains 6 pages of cards 4 questions per page for a total of 24 different questions. In this activity students use the word bank to fill in the blank spaces completing the sentences on thermal energy.\n\nThis worksheet includes 20 different scenarios of heat transfer. Challenge your students to learn the fundamentals of thermal energy heat and heat transfer. Thermal energy temperature and heat worksheet lesson 1.\n\nThermal energy transfer worksheet. With more related ideas such heat conductor and insulator worksheets 3rd grade thermal energy transfer worksheet answers and temperature and thermal energy worksheet. Do not stare directly into the light bulb.\n\nMatter and thermal energy states of matter the four states of matter. How much thermal energy does the. Thermal Energy Heat Transfer Convection Worksheet.\n\nTemperature is a measure of the average kinetic energy of the particles in an object. The specific heat capacity of steam is 2010 JgC. Section 1 matter and thermal energy expansion of matter the kinetic theory can be used to explain the contraction in objects too.\n\nTemperature and heat energy worksheet. Introduction to Thermal Energy Worksheet. Displaying top 8 worksheets found for Heat And Thermal Energy.\n\nWhen the light blub turns on two forms of energy are being released Thermal Energy and Visible light. When the light releases Thermal Energy the molecules in the air begin to move faster hence them. Thermal energy Other contents.\n\nUnderstanding how energy works will help keep your students. This is called conduction and is a very effective method of heat transfer in metals. 101 Temperature Thermal Energy and Heat worksheet Slideshare uses cookies to improve functionality and performance and to provide you with relevant advertising.\n\nStart studying section 1. Heat always moves from areas of high temperature to areas of lower temperature until it reaches thermal. Objects can give off heat eg.\n\nStudents will later learn that heat light and sound are all forms of energy. Thermal energy worksheet -worksheet 6-7 Phase Changes. Make you have what you need.\n\nThermal Energy I Have Who Has Activity. MATTER 4 – Energy by tercerocossio. Our main purpose is that these Heat and Temperature Worksheets photos gallery can be a hint for you give you more inspiration and most important.\n\nThermal conductor and insulator. It is not how hot or cold something is. Heat sound light Heat light and sound are forms of energy.\n\n7 Electrical to Thermal- 8 Chemical to Thermal- 9 Electrical to Mechanical- 10 Radiant to Chemical- Energy Transformation Worksheet. A measure of how hot or cold something is. As more heat is applied the temperature increases.\n\nSome of the worksheets for this concept are lesson 2 thermometers temperature scales content grade 7 thermal energy temperature and heat work revision work class vii science heat document resume ce 065 784 title heat 7th and 8th materials content. Brain Pop Quiz -on states of matter 3. Insulators And Conductors Anchor Chart Science Electricity Teaching Science Science Lessons Thermal conductor and insulator displaying top 8 worksheets found for this concept.\n\nThermal energy is the sum of the kinetic and. Hot and cold are relative. Demo on thermal energy vs.\n\nLets look at what these words mean and some. Provide your students with review and reinforcement over energy transfer with this conduction convection radiation worksheet. Thermal energy conductors and insulators worksheet.\n\nThermal energy and heat worksheet. In these science worksheets students identify objects which are giving off heat light or sound.\n\nThermal Energy And Heat Worksheets Thermal Energy Physical Science Energy\n\nPin On Physics\n\nThermal Energy Transfer Thermal Energy Transfer Thermal Energy Heat Transfer Science\n\nSources Of Heat Worksheet Sources Of Heat Energy Science Lessons Teaching Energy<|endoftext|># Calculus II: double integral\n\n• Mar 27th 2009, 08:08 PM\nNonCommAlg\nCalculus II: double integral\nEvaluate $\\int \\int_R (x \\cos(x^3) + y^4 \\sin y + 1) \\ dx \\ dy,$ where $R=\\{(x,y) \\in \\mathbb{R}^2: \\ x^2 + y^2 \\leq 1 \\}.$\n• Mar 28th 2009, 12:36 PM\nbkarpuz\nQuote:\n\nOriginally Posted by NonCommAlg\nEvaluate $\\int \\int_R (x \\cos(x^3) + y^4 \\sin y + 1) \\ dx \\ dy,$ where $R=\\{(x,y) \\in \\mathbb{R}^2: \\ x^2 + y^2 \\leq 1 \\}.$\n\nodd+odd+even :p\nthe integral value is $\\pi$ the area of the domain.\n• Mar 28th 2009, 12:45 PM\nNonCommAlg\nQuote:\n\nOriginally Posted by bkarpuz\n\nodd+odd+even :p\n\nthe integral value is $\\pi$ the area of the domain.\n\nthat is correct! some students might need to think a little bit about what you said though! (Nod)<|endoftext|>Cody\n\n# Problem 47. Extract leading non-zero digit\n\nSolution 11826\n\nSubmitted on 28 Jan 2012\nThis solution is locked. To view this solution, you need to provide a solution of the same size or smaller.\n\n### Test Suite\n\nTest Status Code Input and Output\n1   Pass\nx = [100 23 -34 0.005 -0.466664 -0.555 1 134534]; y_correct = [1 2 3 5 4 5 1 1]; assert(isequal(leadingDigit(x),y_correct))\n\ny = 1 2 3 5 4 5 1 1\n\n2   Pass\nx = [57 -0.2 8913 -63 0.838127]; y_correct = [5 2 8 6 8]; assert(isequal(leadingDigit(x),y_correct))\n\ny = 5 2 8 6 8\n\n3   Pass\nx = [-0.4336 0.3426 3.5784 2.7694 -1.3499]; y_correct = [4 3 3 2 1]; assert(isequal(leadingDigit(x),y_correct))\n\ny = 4 3 3 2 1\n\n4   Fail\nx = [0.3000 -0.1 -0.00000002 0.5 0.002]; y_correct = [3 1 2 5 2]; assert(isequal(leadingDigit(x),y_correct))\n\ny = 2 1 2 5 2\n\nAssertion failed.<|endoftext|># Electrical potential\n\nPhysical size\nSurname electrical potential\nSize type electrical potential\nFormula symbol ${\\ displaystyle \\ Phi, \\, \\ phi, \\, \\ varphi, \\, V}$\nSize and\nunit system\nunit dimension\nSI V", "num_tokens": 2048} {"category": "finemath-3plus", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/finemath-3plus/part-00-00000.npy", "text": " int\nleft, right *tree\n}\n``````\n\n# 比较结构体对象\n\nGo中不能重载==操作符,对于要比较(同一种)结构体的两个对象,则要求其每个field都是可以比较的。而且在比较的时候,是按照每个field依次比较。也可以自定义比较的函数,比如Equals()。\n\n``````package main\n\nimport (\n\"fmt\"\n)\n\ntype Point struct {\nx, y int\n}\n\nfunc (p Point) GetX() int {\nreturn p.x\n}\n\nfunc (p Point) GetY() int {\nreturn p.y\n}\n\nfunc (p *Point) SetX(ix int) {\np.x = ix\n}\n\nfunc (p *Point) SetY(iy int) {\np.y = iy\n}\n\nfunc (p *Point) Equals(point Point) bool {\nreturn p.x == point.x\n}\n\nfunc Equals(p1 Point, p2 Point) bool {\nreturn p1.x == p2.x\n}\n\nfunc main() {\np1 := Point{1, 2}\np2 := Point{x:1, y:2}\np3 := Point{1, 3}\n\nfmt.Println(p1 == p2, p2 == p3) // true, false\nfmt.Println(p1.x == p2.x && p1.y == p2.y) // true. Equals to \"p1 == p2\"\nfmt.Println(p1.Equals(p3)) // true\nfmt.Println(Equals(p2, p3)) // true\n}\n``````<|endoftext|>0\n\n# What is the LCM of 23 and 8?\n\nWiki User\n\n2008-10-26 22:30:43\n\nThe LCM is 64. It goes 23 and then 64. When counting by eights it goes, 8, 16, 24, 32, 40, 48, 56, and then finally 64.\n\nWiki User\n\n2008-10-26 22:30:43\nStudy guides\n\n20 cards\n\n## A number a power of a variable or a product of the two is a monomial while a polynomial is the of monomials\n\n➡️\nSee all cards\n3.8\n2513 Reviews\n\nWiki User\n\n2013-06-26 00:29:30\n\nThe Least Common Multiple (LCM) for 8 23 is 184.<|endoftext|>##// END OF EJS Templates\nMerge pull request from SylvainCorlay/Meta...\nMerge pull request from SylvainCorlay/Meta Use isinstance to check for types\n\nFile last commit:\n\nr20541:1e566dcc\n r21631:3ac9be53 merge\nLorenz Differential Equations.ipynb\n290 lines | 6.9 KiB | text/plain | TextLexer\n/ examples / Interactive Widgets / Lorenz Differential Equations.ipynb\n\n# Exploring the Lorenz System of Differential Equations¶\n\nIn this Notebook we explore the Lorenz system of differential equations:\n\n\\begin{aligned} \\dot{x} & = \\sigma(y-x) \\\\ \\dot{y} & = \\rho x - y - xz \\\\ \\dot{z} & = -\\beta z + xy \\end{aligned}\n\nThis is one of the classic systems in non-linear differential equations. It exhibits a range of different behaviors as the parameters ($\\sigma$, $\\beta$, $\\rho$) are varied.\n\n## Imports¶\n\nFirst, we import the needed things from IPython, NumPy, Matplotlib and SciPy.\n\nIn [ ]:\n%matplotlib inline\n\nIn [ ]:\nfrom IPython.html.widgets import interact, interactive\nfrom IPython.display import clear_output, display, HTML\n\nIn [ ]:\nimport numpy as np\nfrom scipy import integrate\n\nfrom matplotlib import pyplot as plt\nfrom mpl_toolkits.mplot3d import Axes3D\nfrom matplotlib.colors import cnames\nfrom matplotlib import animation\n\n\n## Computing the trajectories and plotting the result¶\n\nWe define a function that can integrate the differential equations numerically and then plot the solutions. This function has arguments that control the parameters of the differential equation ($\\sigma$, $\\beta$, $\\rho$), the numerical integration (N, max_time) and the visualization (angle).\n\nIn [ ]:\ndef solve_lorenz(N=10, angle=0.0, max_time=4.0, sigma=10.0, beta=8./3, rho=28.0):\n\nfig = plt.figure()\nax = fig.add_axes([0, 0, 1, 1], projection='3d')\nax.axis('off')\n\n# prepare the axes limits\nax.set_xlim((-25, 25))\nax.set_ylim((-35, 35))\nax.set_zlim((5, 55))\n\ndef lorenz_deriv(x_y_z, t0, sigma=sigma, beta=beta, rho=rho):\n\"\"\"Compute the time-derivative of a Lorenz system.\"\"\"\nx, y, z = x_y_z\nreturn [sigma * (y - x), x * (rho - z) - y, x * y - beta * z]\n\n# Choose random starting points, uniformly distributed from -15 to 15\nnp.random.seed(1)\nx0 = -15 + 30 * np.random.random((N, 3))\n\n# Solve for the trajectories\nt = np.linspace(0, max_time, int(250*max_time))\nx_t = np.asarray([integrate.odeint(lorenz_deriv, x0i, t)\nfor x0i in x0])\n\n# choose a different color for each trajectory\ncolors = plt.cm.jet(np.linspace(0, 1, N))\n\nfor i in range(N):\nx, y, z = x_t[i,:,:].T\nlines = ax.plot(x, y, z, '-', c=colors[i])\nplt.setp(lines, linewidth=2)\n\nax.view_init(30, angle)\nplt.show()\n\nreturn t, x_t\n\n\nLet's call the function once to view the solutions. For this set of parameters, we see the trajectories swirling around two points, called attractors.\n\nIn [ ]:\nt, x_t = solve_lorenz(angle=0, N=10)\n\n\nUsing IPython's interactive function, we can explore how the trajectories behave as we change the various parameters.\n\nIn [ ]:\nw = interactive(solve_lorenz, angle=(0.,360.), N=(0,50), sigma=(0.0,50.0), rho=(0.0,50.0))\ndisplay(w)\n\n\nThe object returned by interactive is a Widget object and it has attributes that contain the current result and arguments:\n\nIn [ ]:\nt, x_t = w.result\n\nIn [ ]:\nw.kwargs\n\n\nAfter interacting with the system, we can take the result and perform further computations. In this case, we compute the average positions in $x$, $y$ and $z$.\n\nIn [ ]:\nxyz_avg = x_t.mean(axis=1)\n\nIn [ ]:\nxyz_avg.shape\n\n\nCreating histograms of the average positions (across different trajectories) show that on average the trajectories swirl about the attractors.\n\nIn [ ]:\nplt.hist(xyz_avg[:,0])\nplt.title('Average $x(t)$')\n\nIn [ ]:\nplt.hist(xyz_avg[:,1])\nplt.title('Average $y(t)$')<|endoftext|># Search by Topic\n\n#### Resources tagged with Rigid Bodies similar to Wobbler:\n\nFilter by: Content type:\nAge range:\nChallenge level:\n\n### There are 5 results\n\nBroad Topics > Mechanics > Rigid Bodies\n\n### Wobbler\n\n##### Age 16 to 18 Challenge Level:\n\nA cone is glued to a hemisphere. When you place it on a table in what position does it come to rest?\n\n### Lunar Leaper\n\n##### Age 16 to 18 Challenge Level:\n\nGravity on the Moon is about 1/6th that on the Earth. A pole-vaulter 2 metres tall can clear a 5 metres pole on the Earth. How high a pole could he clear on the Moon?\n\n### Bridge Builder\n\n##### Age 16 to 18 Challenge Level:\n\nIn this short problem we investigate the tensions and compressions in a framework made from springs and ropes.\n\n### More Bridge Building\n\n##### Age 16 to 18 Challenge Level:\n\nWhich parts of these framework bridges are in tension and which parts are in compression?\n\n### Euler's Buckling Formula\n\n##### Age 16 to 18 Challenge Level:\n\nDerive Euler's buckling formula from first principles.<|endoftext|># Modern Intermediate Arithmetic\n\nD.C. Heath & Company, 1918 - 254 σελίδες\n\n### Τι λένε οι χρήστες -Σύνταξη κριτικής\n\nΔεν εντοπίσαμε κριτικές στις συνήθεις τοποθεσίες.\n\n### Δημοφιλή αποσπάσματα\n\nΣελίδα 95 - LIQUID MEASURE 4 gills (gi.) = 1 pint (pt.) 2 pints = 1 quart (qt...\nΣελ", "num_tokens": 2048} {"category": "finemath-3plus", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/finemath-3plus/part-00-00000.npy", "text": "10 if its unit digit must be 0. i) 639210 639210 has 0 in its unit place. ∴ it is divisible by 5 and 10. ii) 17852 17852 has 2 in its unit place. ∴ it is not divisible by 5 and 10.\n\nSuggest Corrections\n4\nJoin BYJU'S Learning Program\nRelated Videos\nDivisible by 2 or 5 or Both\nMATHEMATICS\nWatch in App\nExplore more\nJoin BYJU'S Learning Program<|endoftext|># Search by Topic\n\n#### Resources tagged with Interpreting data similar to What's in a Name?:\n\nFilter by: Content type:\nStage:\nChallenge level:\n\n### There are 20 results\n\nBroad Topics > Handling, Processing and Representing Data > Interpreting data\n\n### What's in a Name?\n\n##### Stage: 1 Challenge Level:\n\nHere's a very elementary code that requires young children to read a table, and look for similarities and differences.\n\n### If the World Were a Village\n\n##### Stage: 1 and 2 Challenge Level:\n\nThis activity is based on data in the book 'If the World Were a Village'. How will you represent your chosen data for maximum effect?\n\n### Going for Gold\n\n##### Stage: 2 Challenge Level:\n\nLooking at the 2012 Olympic Medal table, can you see how the data is organised? Could the results be presented differently to give another nation the top place?\n\n### Class 5's Names\n\n##### Stage: 2 Challenge Level:\n\nClass 5 were looking at the first letter of each of their names. They created different charts to show this information. Can you work out which member of the class was away on that day?\n\n### Birdwatch\n\n##### Stage: 2 Challenge Level:\n\nHave a look at this data from the RSPB 2011 Birdwatch. What can you say about the data?\n\n### Guess the Houses for Two\n\n##### Stage: Early years, 1 and 2 Challenge Level:\n\nGuess the Houses game for an adult and child. Can you work out which house your partner has chosen by asking good questions?\n\n### Our Sports\n\n##### Stage: 2 Challenge Level:\n\nThis problem explores the range of events in a sports day and which ones are the most popular and attract the most entries.\n\n### The Domesday Project\n\n##### Stage: 2 Challenge Level:\n\nTake a look at these data collected by children in 1986 as part of the Domesday Project. What do they tell you? What do you think about the way they are presented?\n\n### The Car That Passes\n\n##### Stage: 2 Challenge Level:\n\nWhat statements can you make about the car that passes the school gates at 11am on Monday? How will you come up with statements and test your ideas?\n\n### In the Playground\n\n##### Stage: 1 and 2 Challenge Level:\n\nWhat can you say about the child who will be first on the playground tomorrow morning at breaktime in your school?\n\n### Being Curious - Primary Statistics\n\n##### Stage: 1 and 2 Challenge Level:\n\nStatistics problems for inquiring primary learners.\n\n### Being Resourceful - Primary Statistics\n\n##### Stage: 1 and 2 Challenge Level:\n\nStatistics problems at primary level that require careful consideration.\n\n### Being Resilient - Primary Statistics\n\n##### Stage: 1 and 2 Challenge Level:\n\nStatistics problems at primary level that may require resilience.\n\n### Meaningful Statistics\n\n##### Stage: 1 and 2\n\nThis article for teachers describes an activity which encourages meaningful data collection, display and interpretation.\n\n### Being Collaborative - Primary Statistics\n\n##### Stage: 1 and 2 Challenge Level:\n\nStatistics problems for primary learners to work on with others.\n\n### Birds in the Garden\n\n##### Stage: 1 and 2 Challenge Level:\n\nThis activity asks you to collect information about the birds you see in the garden. Are there patterns in the data or do the birds seem to visit randomly?\n\n### Match the Matches\n\n##### Stage: 2 Challenge Level:\n\nDecide which charts and graphs represent the number of goals two football teams scored in fifteen matches.\n\n### Avalanche!\n\n##### Stage: 2 and 3 Challenge Level:\n\nInvestigate how avalanches occur and how they can be controlled\n\n### Three Spinners\n\n##### Stage: 2 Challenge Level:\n\nThese red, yellow and blue spinners were each spun 45 times in total. Can you work out which numbers are on each spinner?\n\n### Guess the Houses\n\n##### Stage: 1 Challenge Level:\n\nThis task depends on learners sharing reasoning, listening to opinions, reflecting and pulling ideas together.<|endoftext|># Difference between revisions of \"Shootout/Binary trees\"\n\n## Proposals\n\nPort the Clean entry.\n\n## Proposed entry\n\nUnboxes the strict fields\n\n```{-# OPTIONS -fbang-patterns -funbox-strict-fields #-}\n--\n-- The Great Computer Language Shootout\n-- http://shootout.alioth.debian.org/\n--\n-- Contributed by Don Stewart\n--\n\nimport System\nimport Data.Bits\nimport Text.Printf\n\ndata Tree = Nil | Node !Int Tree Tree\n\nminN = 4\n\nio s !n !t = printf \"%s of depth %d\\t check: %d\\n\" s n t\n\nmain = do\nlet maxN = max (minN + 2) n\nstretchN = maxN + 1\n\n-- stretch memory tree\nlet c = check (make 0 stretchN)\nio \"stretch tree\" stretchN c\n\n-- allocate a long lived tree\nlet long = make 0 maxN\n\n-- allocate, walk, and deallocate many bottom-up binary trees\nlet vs = depth minN maxN\nmapM_ (\\((m,d,i)) -> io (show m ++ \"\\t trees\") d i) vs\n\n-- confirm the the long-lived binary tree still exists\nio \"long lived tree\" maxN (check long)\n\n-- generate many trees\ndepth :: Int -> Int -> [(Int,Int,Int)]\ndepth !d !m\n| d <= m = (2*n,d,sumT d n 0) : depth (d+2) m\n| otherwise = []\nwhere !n = 1 `shiftL` (m - d + minN)\n\n-- allocate and check lots of trees\nsumT :: Int -> Int -> Int -> Int\nsumT !d 0 t = t\nsumT d i t = sumT d (i-1) (t + a + b)\nwhere a = check (make i d)\nb = check (make (-i) d)\n\n-- traverse the tree, counting up the nodes\ncheck :: Tree -> Int\ncheck Nil = 0\ncheck (Node i l r) = i + check l - check r\n\n-- build a tree\nmake :: Int -> Int -> Tree\nmake i 0 = Node i Nil Nil\nmake i d = Node i (make (i2-1) d2) (make i2 d2)\nwhere i2 = 2*i; d2 = d-1\n```\n\n## Newly submitted to shootout\n\nThis is a trivial modification of Don Stewart's to add parallelism.\n\n```{-# OPTIONS -fbang-patterns -funbox-strict-fields #-}\n--\n-- The Computer Language Shootout\n-- http://shootout.alioth.debian.org/\n--\n-- Contributed by Don Stewart\n-- Modified by Stephen Blackheath to parallelize (a very tiny tweak)\n--\n\nimport System\nimport Data.Bits\nimport Text.Printf\nimport Control.Parallel.Strategies\n\n--\n-- an artificially strict tree.\n--\n-- normally you would ensure the branches are lazy, but this benchmark\n-- requires strict allocation.\n--\ndata Tree = Nil | Node !Int !Tree !Tree\n\nminN = 4\n\nio s n t = printf \"%s of depth %d\\t check: %d\\n\" s n t\n\nmain = do\nlet maxN = max (minN + 2) n\nstretchN = maxN + 1\n\n-- stretch memory tree\nlet c = check (make 0 stretchN)\nio \"stretch tree\" stretchN c\n\n-- allocate a long lived tree\nlet !long = make 0 maxN\n\n-- allocate, walk, and deallocate many bottom-up binary trees\nlet vs = parMap rnf id \\$ depth minN maxN\nmapM_ (\\((m,d,i)) -> io (show m ++ \"\\t trees\") d i) vs\n\n-- confirm the the long-lived binary tree still exists\nio \"long lived tree\" maxN (check long)\n\n-- generate many trees\ndepth :: Int -> Int -> [(Int,Int,Int)]\ndepth d m\n| d <= m = (2*n,d,sumT d n 0) : depth (d+2) m\n| otherwise = []\nwhere n = 1 `shiftL` (m - d + minN)\n\n-- allocate and check lots of trees\nsumT :: Int -> Int -> Int -> Int\nsumT d 0 t = t\nsumT d i t = sumT d (i-1) (t + a + b)\nwhere a = check (make i d)\nb = check (make (-i) d)\n\n-- traverse the tree, counting up the nodes\ncheck :: Tree -> Int\ncheck Nil = 0\ncheck (Node i l r) = i + check l - check r\n\n-- build a tree\nmake :: Int -> Int -> Tree\nmake i 0 = Node i Nil Nil\nmake i d = Node i (make (i2-1) d2) (make i2 d2)\nwhere i2 = 2*i; d2 = d-1\n```\n\n## (Old) Current entry\n\nPorted", "num_tokens": 2048} {"category": "finemath-3plus", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/finemath-3plus/part-00-00000.npy", "text": "), Total Interest Amount, and total payable amount.\n\nRs\n%\nYr\n\n## What is EMI Calculator?\n\nThe full form of EMI is Equated Monthly Installment. This means you have to repay the loan amount in a monthly installment. The installment amount consists of interest amounts and Loan amounts.\n\nAn EMI calculator is a tool that helps individuals calculate the monthly installment payments on a loan. It is a useful tool for anyone taking out a loan to purchase a car, house, or other high-value item, as it allows them to see exactly how much they will need to pay each month and how long it will take to pay off the loan.\n\nEMI calculators can be a valuable resource for anyone considering taking out a loan. They allow individuals to see exactly how much they will need to pay each month and can help them plan their budget accordingly. By using an EMI calculator, individuals can make informed decisions about their financial future and ensure that they are able to make their monthly loan payments on time.\n\nIf you want the loan then using this EMI calculator you can calculate the loan monthly Payable amount, total payable interest amount, and total payable amount (Which means total interest amount + Loan amount).\n\nTo use an EMI calculator, you will need to input several pieces of information, including the loan amount, the interest rate, and the loan term (in months or years). The calculator will then use this information to calculate the monthly installment amount, or EMI. Some calculators may also provide additional details, such as the total interest paid over the life of the loan and the overall cost of the loan.\n\nAlso using this EMI calculator you can 1 to 10 years loan tenure EMI details. So that you can correctly choose tenure according to EMI amount.\n\n## How Loan EMI calculate?\n\nThe formula of EMI is : E= P.r.(1+r)^n/((1+r)^n-1) [Where E = EMI, P=Loan Amount (Here loan amount), r= rate of interest amount (r is calculated on monthly basis. r= rate of annual interest/12/100., Example: annually 9% interest rate., So r= 9/12/100, r=0.0075%), n = Loan tenure in month's.]\n\nExample of EMI calculation: For example, you want 5 lakh of a loan at a 9% interest rate for 6 years. Then P=500000. r=9/12/100=0.0075%. n=6×12=72 months. Then calculation will be: E=500000×0.0075×(1+0.0075)^72/((1+0.0075)^72-1) E=9012.77<|endoftext|>## XloBorg – compass & accelerometer for the Raspberry Pi\n\n### Posted by Mike Redrobe | Posted in Technology | Posted on 20-06-2013\n\n#### 0\n\nThis week, PiBorg released XLoBorg – a 3 Axis Accelerometer and 3 Axis Magnetometer add-on for the Raspberry Pi\n\nSince its so new the current software only gives the raw magnetometer x y z values:\n\n`mX = +00371, mY = -00053, mZ = +02539`\n\nMagnetic flux strength values aren’t much use to us mere humans,\nwhat we really want is a nice easy 0-360 degree heading value.\n\nMaths to the rescue !\n\nWe can find the angle from those “lengths” with arc tan Y/X\n\n`heading = math.atan2 (mY,mX)`\n(For simplicity I’m assuming the Pi is level… a more complicated method would include accelerometer data)\n\nHere’s my full python code to read the sensor, and convert to degrees:\n\n`#!/usr/bin/env python`\n\n``` # Load the XLoBorg library import XLoBorg # Load maths library import math # Tell the library to disable diagnostic printouts XLoBorg.printFunction = XLoBorg.NoPrint # Start the XLoBorg module (sets up devices) XLoBorg.Init() # Read and display the raw magnetometer readings mx,my,mz = XLoBorg.ReadCompassRaw() print 'mX = %+06d, mY = %+06d, mZ = %+06d' % XLoBorg.ReadCompassRaw() # get the heading in radians heading = math.atan2 (my,mx) # Correct negative values ```\n\n```if (heading < 0): heading = heading + (2 * math.pi) # convert to degrees heading = heading * 180/math.pi; print 'Heading: ', heading ```\n\nMuch better:\n\n```mX = +00371, mY = -00053, mZ = +02539 Heading: 351 degrees```<|endoftext|>## Roll 3 dice how many combinations are possible\n\nIf we throw three dice at the same time and see a sum of numbers. 6 -> (1, 3 Possible Combinations:10. 7 -> (1, 3, 3).\nSums for rolling 2 dice and possible outcomes. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. (1, 1) (1, 3) (3,6) (3,1).\nFor example, with 3 dice with 2 dice with 2 Assume the number of combinations for any total less than 1 is 0.\n\n### Free: Roll 3 dice how many combinations are possible\n\n Alex elledge The best boy games in the world online Advantage apparel michigan Fullmetal alchemist lab 5 episode Roll 3 dice how many combinations are possible 589 Watch archer online free season 1 Since each die is american online gambling laws from the others, a sum such as four can be obtained in three different ways: Further counting arguments can be used to find the number of ways of forming the other sums. Book Review: The Unwritten Rules, The Six Skills You Need to Get Promoted to the Executive Level. In it, you'll get:. In some role-playing games, characters have various attributes, such as. Dice provide great illustrations for concepts in probability. 8 SIDED DICE SIMULATOR C# CHORD PIANO 2003 Arena Football League season\nGet the weekly newsletter! By Whiplasher Post-MBA I became very intrigued by how senior leaders navigated their career progression. Receive a detailed analysis of your performance on the exam, including strengths and weaknesses by question type. Official Answer and Stats are available only to registered users. The Ascent of Money. Three plain, apparently identical, dice are more versatile. So, we can calculate the probabilities of each outcome:.\nProbability Distribution Table - Intro with tossing a coin 3 times<|endoftext|>### Home > MC2 > Chapter 9 > Lesson 9.3.1 > Problem9-75\n\n9-75.\n\nSasha saved $\\850$ from her summer job last summer. She put it in an account that earns simple interest each month. After $9$ months, her account is worth $\\1003$. What percent interest did she earn each month?\n\nFind the amount of money Sasha gained over the $9$ months (the interest).\n\n$\\1003-\\850=\\153$\n\nUse the equation $I=Prt$, where $I$ is the interest, $P$ is the principle (original amount she had), $r$ is the rate (percent interest per month), and $t$ is the time (number of months that have passed).\n\n$153=(850)$ $r(9)$Solve for $r$.\n\n$r=\\frac{153}{850(9)}$\n\n$2\\%$ interest<|endoftext|>Miscellaneous\n\n# How many pounds is 7.6 kilograms?\n\nOne kilogram (1000 grams) is 2.2 pounds. If you have 7.6 kilograms you multiply that number by 2.2. The answer is the number of pounds that equal 7.6 kilograms. Since 1 kilogram is more than 2 pounds, you know your answer should be a bit more than 2 times the number of kilograms. 7.6 * 2.2 = 16.72.\n\n{{ relativeTimeResolver(1665100551984) }}\n\nLIVE\n2\n\n##### Similar Questions\n\nHelp make Alexa smarter and share your knowledge with the world<|endoftext|>Welcome Guest.\nYou haven't logged in yet. If you don't have an account you can register now.\n\n## 3puttssuck\n\n297 posts\n\nUltimate Geek\n\nSubscriber\n\n Topic # 106061 17-Jul-2012 17:54 Maths was not my strong subject at school. Number 1; 1234 Number 2; 1056 How do you work out what percentage to take off number 1 to arrive at number 2 ? I'm look at how to do, not the answer, so I can use it on other numbers in the future. I googled this but a lot of what it threw at me was hurting my brain. lol. Thanks team.\n\n## freitasm\n\nBDFL - Memuneh\n53333 posts\n\nUber Geek\n\nTrusted\nGeekzone\nSubscriber\n\n Reply # 6", "num_tokens": 2048} {"category": "finemath-3plus", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/finemath-3plus/part-00-00000.npy", "text": " to Cartesian Coordinates (x,y) 😡 = r × cos( θ )y = r × sin( θ ) How do you find the polar Cartesian equation? Convert the polar equation r = 2sec θ to a rectangular equation, and draw its corresponding […]<|endoftext|>Reversing a Declined B-School Offer? : The B-School Application\nCheck GMAT Club Decision Tracker for the Latest School Decision Releases http://gmatclub.com/AppTrack\n\n It is currently 23 Jan 2017, 00:10\n\n### GMAT Club Daily Prep\n\n#### Thank you for using the timer - this advanced tool can estimate your performance and suggest more practice questions. We have subscribed you to Daily Prep Questions via email.\n\nCustomized\nfor You\n\nwe will pick new questions that match your level based on your Timer History\n\nTrack\n\nevery week, we’ll send you an estimated GMAT score based on your performance\n\nPractice\nPays\n\nwe will pick new questions that match your level based on your Timer History\n\n# Events & Promotions\n\n###### Events & Promotions in June\nOpen Detailed Calendar\n\n# Reversing a Declined B-School Offer?\n\nAuthor Message\nTAGS:\n\n### Hide Tags\n\nIntern\nJoined: 04 Feb 2013\nPosts: 2\nFollowers: 0\n\nKudos [?]: 0 [0], given: 0\n\nReversing a Declined B-School Offer? [#permalink]\n\n### Show Tags\n\n04 Feb 2013, 08:41\nAbout a month ago I declined a business school offer because I was recently promoted. After some thought, I was thinking I should still go to school. Has anyone gone back to a school to try and \"take back\" a declined offer? I figured I have nothing to lose, but wanted to see if anyone has done this.\nDirector\nStatus: Can't wait for August!\nJoined: 13 Sep 2011\nPosts: 988\nLocation: United States (MA)\nConcentration: Marketing, Strategy\nGMAT 1: 660 Q44 V37\nGMAT 2: 680 Q45 V38\nGMAT 3: 710 Q45 V42\nGPA: 3.32\nWE: Information Technology (Retail)\nFollowers: 24\n\nKudos [?]: 349 [0], given: 109\n\nRe: Reversing a Declined B-School Offer? [#permalink]\n\n### Show Tags\n\n04 Feb 2013, 09:33\nI've never heard of it being done, but agreed... nothing to lose at this point.\nCurrent Student\nStatus: Too close for missiles, switching to guns.\nJoined: 23 Oct 2012\nPosts: 788\nLocation: United States\nSchools: Johnson (Cornell) - Class of 2015\nWE: Military Officer (Military & Defense)\nFollowers: 17\n\nKudos [?]: 316 [0], given: 175\n\nRe: Reversing a Declined B-School Offer? [#permalink]\n\n### Show Tags\n\n05 Feb 2013, 05:21\nYou've got nothing to lose, but I wouldn't count on getting it back. Especially if the deposit deadline has passed.\n\nMay I ask what led to such a rash decision? What's more common is someone puts a deposit down to hold his/her spot and then he/she decides not to go to B-school and forfeits the deposit.\n_________________\nIntern\nJoined: 04 Feb 2013\nPosts: 2\nFollowers: 0\n\nKudos [?]: 0 [0], given: 0\n\nRe: Reversing a Declined B-School Offer? [#permalink]\n\n### Show Tags\n\n05 Feb 2013, 06:31\nCobraKai wrote:\nYou've got nothing to lose, but I wouldn't count on getting it back. Especially if the deposit deadline has passed.\n\nMay I ask what led to such a rash decision? What's more common is someone puts a deposit down to hold his/her spot and then he/she decides not to go to B-school and forfeits the deposit.\n\nIt certainly wasn't a rash decision, but was probably the wrong one in retrospect. After being promoted to VP, my compenstation was even further above what most MBA grads make right out of school. Which means if I graduate into an associate program, I'll be taking a step back in my career. However, looking at my goals, it is still probably the best move to make even with the temporary setback.\nCurrent Student\nStatus: Too close for missiles, switching to guns.\nJoined: 23 Oct 2012\nPosts: 788\nLocation: United States\nSchools: Johnson (Cornell) - Class of 2015\nWE: Military Officer (Military & Defense)\nFollowers: 17\n\nKudos [?]: 316 [0], given: 175\n\nRe: Reversing a Declined B-School Offer? [#permalink]\n\n### Show Tags\n\n05 Feb 2013, 07:06\nnyrunner2013 wrote:\nIt certainly wasn't a rash decision, but was probably the wrong one in retrospect. After being promoted to VP, my compenstation was even further above what most MBA grads make right out of school. Which means if I graduate into an associate program, I'll be taking a step back in my career. However, looking at my goals, it is still probably the best move to make even with the temporary setback.\n\nFair enough. I would have at least waited until the deposit deadline to say \"no thanks.\"\n_________________\nRe: Reversing a Declined B-School Offer?   [#permalink] 05 Feb 2013, 07:06\nSimilar topics Replies Last post\nSimilar\nTopics:\n1 Declining after accepting the offer 7 12 Mar 2011, 09:58\nquestion on declining an offer 2 18 Feb 2010, 13:17\nwhen is the best time to decline admission offer? 4 30 Mar 2009, 07:46\nHow do you politely decline an offer? 3 06 Apr 2007, 06:53\n12 When to break up? (or decline offer of admission) 43 15 Mar 2007, 06:07\nDisplay posts from previous: Sort by<|endoftext|># optimal rotations around 3D sphere using only two axes\n\nThis is an optimization problem and I am wondering if there's any intuitive (geometric) way to understand the solution of the problem. More complex analytical solutions are also appreciated.\n\nIn a 3D sphere, let's start from an initial point located at coordinates $$(1, 0, 0)$$, where each element corresponds to the $$(x, y, z)$$ coordinates in the plane. Our only allowed actions are rotating the point around either the $$X + Z$$ or $$-X + Z$$ axis (the axis of rotations would be $$(X+Z)/\\sqrt{2}$$ and $$(-X + Z)/\\sqrt{2}$$ respectively. They are vector addition of $$X$$ and $$Z$$ and $$-X$$ and $$Z$$). The total rotation amount (i.e. the total angle of rotation) must be equal to $$\\theta ~ (< \\pi)$$.\n\nWhat is the optimal strategy in order to minimize the Euclidean distance between the final point and the initial point?\n\nUpon numerical investigation, it appears that rotating by an angle of $$\\theta/2$$ around the $$X + Z$$ axis, followed by an additional rotation of $$\\theta/2$$ around the $$-X + Z$$ axis, gives the optimal solution for this problem. An example of this solution is depicted in the figure below.\n\nIf this is indeed an optimal solution, why would it be? What is a good way to understand this solution in terms of the geometry of the problem, or any other tools?\n\nFigure\n\n• Did you want to minimize the distance or maximize it? Commented Oct 3, 2023 at 1:35\n• @DavidK minimize it Commented Oct 3, 2023 at 5:36\n• Suppose $\\theta=1.998\\pi$. A single rotation by $\\theta$ around either axis will bring you almost back to the starting point. Two rotations of $0.999\\pi$ each will take you almost to the farthest point on the sphere. It seems to me you are maximizing distance whether you intended to or not. Commented Oct 3, 2023 at 12:59\n• Oh, you're absolutely right. I believe that I was thinking about the case of $\\theta < \\pi$, not $2\\pi$. I edited my question. Commented Oct 3, 2023 at 16:03\n• @Cesareo Could you elaborate more? Commented Oct 3, 2023 at 17:22\n\nTo simplify the computations, let's make a transformation of the coordinate system, such that the new coordinate system has its $$x'$$ axis along the (world coordinates)", "num_tokens": 2048} {"category": "finemath-3plus", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/finemath-3plus/part-00-00000.npy", "text": "10 19 C) a. 4.8 10 14 N c. 2.2 10 24 N b.\n\n### 12. The current in an inductor is changing at the rate of 100 A/s, and the inductor emf is 40 V. What is its self-inductance?\n\n12. The current in an inductor is changing at the rate of 100 A/s, and the inductor emf is 40 V. What is its self-inductance? From Equation 32-5, L = -E=(dI =dt) = 40 V=(100 A/s) = 0.4 H. 15. A cardboard\n\n### Solution Derivations for Capa #11\n\nSolution Derivations for Capa #11 Caution: The symbol E is used interchangeably for energy and EMF. 1) DATA: V b = 5.0 V, = 155 Ω, L = 8.400 10 2 H. In the diagram above, what is the voltage across the\n\n### Slide 1 / 26. Inductance. 2011 by Bryan Pflueger\n\nSlide 1 / 26 Inductance 2011 by Bryan Pflueger Slide 2 / 26 Mutual Inductance If two coils of wire are placed near each other and have a current passing through them, they will each induce an emf on one\n\n### PS-6.2 Explain the factors that determine potential and kinetic energy and the transformation of one to the other.\n\nPS-6.1 Explain how the law of conservation of energy applies to the transformation of various forms of energy (including mechanical energy, electrical energy, chemical energy, light energy, sound energy,\n\n### EE301 Lesson 14 Reading: 10.1-10.4, 10.11-10.12, 11.1-11.4 and 11.11-11.13\n\nCAPACITORS AND INDUCTORS Learning Objectives EE301 Lesson 14 a. Define capacitance and state its symbol and unit of measurement. b. Predict the capacitance of a parallel plate capacitor. c. Analyze how\n\n### Eðlisfræði 2, vor 2007\n\n[ Assignment View ] [ Print ] Eðlisfræði 2, vor 2007 30. Inductance Assignment is due at 2:00am on Wednesday, March 14, 2007 Credit for problems submitted late will decrease to 0% after the deadline has\n\n### Chapter 13: Electric Circuits\n\nChapter 13: Electric Circuits 1. A household circuit rated at 120 Volts is protected by a fuse rated at 15 amps. What is the maximum number of 100 watt light bulbs which can be lit simultaneously in parallel\n\n### STUDY GUIDE: ELECTRICITY AND MAGNETISM\n\n319 S. Naperville Road Wheaton, IL 60187 www.questionsgalore.net Phone: (630) 580-5735 E-Mail: info@questionsgalore.net Fax: (630) 580-5765 STUDY GUIDE: ELECTRICITY AND MAGNETISM An atom is made of three\n\n### Ohm's Law and Circuits\n\n2. Conductance, Insulators and Resistance A. A conductor in electricity is a material that allows electrons to flow through it easily. Metals, in general, are good conductors. Why? The property of conductance\n\n### Diodes have an arrow showing the direction of the flow.\n\nThe Big Idea Modern circuitry depends on much more than just resistors and capacitors. The circuits in your computer, cell phone, Ipod depend on circuit elements called diodes, inductors, transistors,\n\n### Episode 126: Capacitance and the equation C =Q/V\n\nEpisode 126: Capacitance and the equation C =Q/V Having established that there is charge on each capacitor plate, the next stage is to establish the relationship between charge and potential difference\n\n### People s Physics Book\n\nThe Big Ideas: The name electric current is given to the phenomenon that occurs when an electric field moves down a wire at close to the speed of light. Voltage is the electrical energy density (energy\n\n### Objectives 200 CHAPTER 4 RESISTANCE\n\nObjectives Explain the differences among conductors, insulators, and semiconductors. Define electrical resistance. Solve problems using resistance, voltage, and current. Describe a material that obeys\n\n### CHAPTER 28 ELECTRIC CIRCUITS\n\nCHAPTER 8 ELECTRIC CIRCUITS 1. Sketch a circuit diagram for a circuit that includes a resistor R 1 connected to the positive terminal of a battery, a pair of parallel resistors R and R connected to the\n\n### 7. What is the current in a circuit if 15 coulombs of electric charge move past a given point in 3 seconds? (1) 5 A (3) 18 A (2) 12 A (4) 45 A\n\n1. Compared to the number of free electrons in a conductor, the number of free electrons in an insulator of the same volume is less the same greater 2. Most metals are good electrical conductors because\n\n### PHYSICS PAPER 1 (THEORY)\n\nPHYSICS PAPER 1 (THEORY) (Three hours) (Candidates are allowed additional 15 minutes for only reading the paper. They must NOT start writing during this time.) ---------------------------------------------------------------------------------------------------------------------\n\n### 45. The peak value of an alternating current in a 1500-W device is 5.4 A. What is the rms voltage across?\n\nPHYS Practice Problems hapters 8- hapter 8. 45. The peak value of an alternating current in a 5-W device is 5.4 A. What is the rms voltage across? The power and current can be used to find the peak voltage,\n\n### Candidate Number. General Certificate of Education Advanced Level Examination June 2014\n\nentre Number andidate Number Surname Other Names andidate Signature General ertificate of Education dvanced Level Examination June 214 Physics PHY4/1 Unit 4 Fields and Further Mechanics Section Wednesday\n\n### ES250: Electrical Science. HW7: Energy Storage Elements\n\nES250: Electrical Science HW7: Energy Storage Elements Introduction This chapter introduces two more circuit elements, the capacitor and the inductor whose elements laws involve integration or differentiation;\n\n### Direction of Induced Current\n\nDirection of Induced Current Bar magnet moves through coil Current induced in coil A S N v Reverse pole Induced current changes sign B N S v v Coil moves past fixed bar magnet Current induced in coil as\n\n### AP1 Electricity. 1. A student wearing shoes stands on a tile floor. The students shoes do not fall into the tile floor due to\n\n1. A student wearing shoes stands on a tile floor. The students shoes do not fall into the tile floor due to (A) a force of repulsion between the shoes and the floor due to macroscopic gravitational forces.\n\n### DC Circuits (Combination of resistances)\n\nName: Partner: Partner: Partner: DC Circuits (Combination of resistances) EQUIPMENT NEEDED: Circuits Experiment Board One Dcell Battery Wire leads Multimeter 100, 330, 1k resistors Purpose The purpose\n\n### Electric Field Mapping Lab 3. Precautions\n\nHB 09-25-07 Electric Field Mapping Lab 3 1 Electric Field Mapping Lab 3 Equipment mapping board, U-probe, resistive boards, templates, dc voltmeter (431B), 4 long leads, 16 V dc for wall strip Reading\n\n### Candidate Number. General Certificate of Education Advanced Level Examination June 2012\n\nentre Number andidate Number Surname Other Names andidate Signature General ertificate of Education dvanced Level Examination June 212 Physics PHY4/1 Unit 4 Fields and Further Mechanics Section Monday\n\n### Student Exploration: Circuits\n\nName: Date: Student Exploration: Circuits Vocabulary: ammeter, circuit, current, ohmmeter, Ohm s law, parallel circuit, resistance, resistor, series circuit, voltage Prior Knowledge Questions (Do these\n\n### Introduction to Electricity & Magnetism. Dr Lisa Jardine-Wright Cavendish Laboratory\n\nIntroduction to Electricity & Magnetism Dr Lisa Jardine-Wright Cavendish Laboratory Examples of uses of electricity Christmas lights Cars Electronic devices Human body Electricity? Electricity is the presence\n\n### Lab 3 - DC Circuits and Ohm s Law\n\nLab 3 DC Circuits and Ohm s Law L3-1 Name Date Partners Lab 3 - DC Circuits and Ohm s Law OBJECTIES To learn to apply the concept of potential difference (voltage) to explain the action of a battery in\n\n### Physics 2102 Lecture 19. Physics 2102\n\nPhysics 2102 Jonathan Dowling Physics 2102 Lecture 19 Ch 30: Inductors and RL Circuits Nikolai Tesla What are we going to learn? A road map Electric charge Electric force on other electric charges Electric\n\n### Resistors. Some substances are insulators. A battery will not make detectible current flow through them.\n\nResistors Some", "num_tokens": 2048} {"category": "olmocr_science_pdfs-adult_content", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-adult_content/part-000-00000.npy", "text": " 4.41) counts of a sexual crime and had been arrested on sexual charges on an average of 1.6 (SD = 1.6) separate occasions, including the index offense or offenses.\n\nTen subjects from the same institution with no history of sex offenses served as the institutional control group. Eight were diagnosed as psychotic, 1 as personality disordered, and 1 as having a chronic brain syndrome. All 10 were receiving major tranquilizers. They averaged 25.8 years of age (SD = 5.59) and all reported exclusive heterosexual experience, save 3 who claimed predominantly heterosexual experience. Ten additional control subjects from the local community were recruited by newspaper or through local employment agencies. Most of these men were unemployed. Their average age was 24.6 (SD = 5.82). Nine reported exclusively heterosexual experience and 1 reported predominant heterosexual experience. None of the community control subjects reported having been arrested (with the exception of one drunk-driving charge).\n\nApparatus\n\nSubjects were seated in a reclining chair located in a sound-attenuated and electrically shielded room equipped\nwith a one-way mirror and intercom. Skin resistance was recorded but not scored. Penile responses were measured using a mercury in rubber strain gauge that the subject fitted on the shaft of his penis. The strain gauge was periodically calibrated and the relationship between circumference and deflection was found to be linear within the working range of the gauge. The leads from the gauge were connected to a Parks Electronics Model 270 Plethysmograph. Penile responses were recorded at two levels of amplification on a Beckman R511A Dynograph. Auditory stimuli were presented by a programmable tape recorder through a speaker in the subject's chamber. All programming and recording equipment was located outside the subject's chamber.\n\n**Instructions**\n\nRapists were instructed that we were interested in finding an assessment technique that might be helpful in treating Oak Ridge sex offenders. Non-sex-offenders were told the same, but it was added that we had to find out how non-sex-offenders reacted to our procedure. Patients were paid $4 for participating, and nonpatients $40 for their participation. Complete confidentiality was promised to all control subjects but not to rapists. After a brief explanation of the apparatus, all subjects were told: \"During this session, which will last approximately one hour, you will hear a number of situations described on tape. I want you to listen closely to what is said and imagine you are the person saying it.\" The instructions were read and all testing was performed by one of two male research assistants who each ran approximately half of the subjects in each group.\n\n**Stimuli and Procedure**\n\nThere were 40 audiotaped stories that were each narrated by a male in the first person. These stories were of 10 types of categories with four stories per category. The categories were as follows: neutral situation, consenting sex with a female partner, rape with a female victim, nonsexual violence with a female victim, consenting sex with a male partner, rape with a male victim, nonsexual violence with a male victim, consenting bondage and spanking with a female partner, masochistic consenting bondage and spanking with a female partner (where the male was tied up and spanked), and nonconsenting bondage with a female victim. Representative transcripts follow that illustrate the differences between story categories, and the offensiveness of some of the material.\n\n**Neutral situation with a female**\n\nThe laundromat is humming with activity as people do their washing. An attractive woman with long blonde hair is folding her clothes. Selecting the two washing machines beside hers, I begin sorting my clothes and distributing them between the two machines. Once they are loaded I add powdered soap. I notice that I do not have enough change. \"Excuse me, do you have change for a dollar?\" I ask. The woman searches in her change purse and offers me 4 quarters. I thank her, take the change and insert the quarters in the machine. I relax and wait as the washer begins filling with hot water. A while later the machine gradually comes to a stop, having completed the wash and rinse cycles. I carefully remove the damp clothes and place them in an empty dryer.\n\n\"That machine is not working,\" advises the woman. I thank her, and move my clothes to another machine. Selecting the hottest temperature to dry my clothes, I insert some dimes and push the start button.\n\n**Consenting sex with a female partner**\n\nI was lying in bed in the morning with my girlfriend. Only the sheet covered the seductive curves in her sensuous body. She rolled towards me and slipping her warm hand under the sheet began to caress my stomach. She started to fondle my hardening prick and pubic hair at the same time she slid her hot darting tongue into my mouth, she whispered \"I want you right now. I'm going to do it to you. I want you so bad.\" She began to explore my body with her tongue as I hungrily sucked her engorged nipples and my fingers probed the slippery folds of her cunt. Rising up she straddled me and lowered herself over me, enveloping my cock with her warm wet cunt. \"Oh yes, I love it. I want you so bad,\" she moaned. She rose and fell over me panting in ecstasy and straining her thighs apart engulfing me further inside her. Her breasts bounced provocatively and her breath came in short gasps of pleasure as she furiously pumped towards a fiery climax.\n\n**Rape with a female victim**\n\nThe apartment hallway is quiet and dim. I wait at the stairway. The elevator door opens and a woman with long slender legs exits. She walks to her door and fumbles with her keys. As the door opens I rush up behind her, grab her around the throat, and push her inside. She begins to struggle and attempts to break free. I squeeze her throat tightly with both hands which temporarily quiets her. Quickly I lock the door and begin tearing off her clothes. \"Don't hurt me, please leave me alone,\" she gasps as I yank off her bra, exposing her creamy white breasts. I begin licking and licking her warm soft skin. As my tongue surges into her cunt she tenses and tries to push my head away. With anger I punch her a few times in the stomach. Then, grabbing her hair, I batter her head against the floor. As I ram my hard cock into the moistness of her warm snatch, she screams in pain. \"Oh no, that hurts, that hurts.\" Undaunted I fuck her with deeper and deeper strokes.\n\n**Nonsexual violence with a female victim**\n\nIt was dark and deserted as I waited in the alley. There she was—slim and pretty, and obviously rich. I needed money for a fix. This broad should be worth lots. As she passed I reached out and grabbed her by the throat, dragging her into the alley. \"Give me your money, bitch.\" \"Take my money, but leave me alone. Please don't hurt me,\" she whimpered. I shoved her against the wall, grinding her face into the bricks and with one hand I wrenched her purse from her grip. She began to struggle so I punched her hard in the head, knocking her to the pavement. I kicked her several times in the ribs as she withered in agony. \"Please stop. Let me go. You're hurting me,\" she sobbed. Grabbing her by the hair I dragged her further into the alley and rammed her head against a wall. I ground my heel into her hand hearing the crunch of the bones, then kicked her again before running with her purse.\nConsenting bondage and spanking with a female partner\n\nMy girlfriend and I are alone in her room necking. She has soft brown hair and a very appealing figure. She asks me if I will play a little game with her. I say \"OK.\" She hands me some rope and says \"Tie me up and spank me. Be mean and hurt me. I really like that. It turns me on!\" I order her to strip. She looks excited and horny as she quickly removes her clothes. I tie her hands behind her back and force her into a kneeling position with her ass high in the air and her face near the floor. I grab a large flat hairbrush and begin to spank her really hard. She begins to cry and says, \"Please, please hit me some more.\" Her body begins to tremble with excitement as I continue to spank her. Her hips are writhing and wriggling with each smack of the brush. She sobbs and moans in ecstasy as she begs me to hit her again and again.\n\nNonconsenting bondage and spanking with a female victim\n\nI am necking with my girlfriend alone in my room. Her slender body is tanned a beautiful golden brown. I ask if she will play a little game with me. She says \"no.\" I take some rope and say \"I'm going to tie you up and spank you, be mean and hurt you.\" She says \"OK.\" But she really doesn't like that, it turns her off. I order her to undress. She looks frightened and unhappy as she disrobes. I tie her hands behind her back and force her into a kneeling position with her ass high in the air and face near the floor. I grab a large flat hairbrush and begin to spank her really hard. She begins to cry and says \"Please, please stop hitting me.\" Her trembling body begins twisting to avoid the blows as I continue to spank her. Her flesh reddens with each lash of the brush. She sobbs and moans in discomfort as she pleads with me to stop hitting her.\n\nStory duration varied between 45 and 55 s and the largest magnitude penile response in the 2-", "num_tokens": 2048} {"category": "olmocr_science_pdfs-adult_content", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-adult_content/part-000-00000.npy", "text": " terms. After taking the time to do so, we then return to the issue of sex robots, and conclude the chapter by reflecting on some of the key lessons from this “killer robot” analysis for the debate over the CASR.\n\n4.3.1 Arguments Opposing the Development of AWSs\n\nThere are three main families of argument against the development of AWSs. The first is pragmatically oriented and is concerned with the *consequences* of deploying AWSs in lieu of human soldiers. Proponents of this objection are concerned with the practical limitations of the current and prospective technologies. For instance, they worry about the targeting systems of AWSs and their ability to adapt to dynamic battlefield conditions, in particular their ability to make fine-grained and context-sensitive distinctions between who is and is not an enemy combatant. The fear is that AWSs will be more indiscriminate in their administration of lethal force than human operators would be, and hence responsible for worse outcomes. In making this argument, then, distinctions\nneed to be drawn between AWSs, which operate entirely independently of human controllers, and teleoperated unmanned weapons systems, which are still under remote human control. One can favor the latter on the ground that their use poses less risk to human soldiers, while still opposing the former.\n\nThese pragmatically oriented objections are important, and certainly fears about targeting systems and battlefield adaptability will need to be addressed. But the general utility of such objections is limited. As the underlying technology improves, the consequentialist fears dissipate.\n\nThe second family of arguments is concerned with the need for moral agency and responsibility in warfare. They can be grouped under the general heading of “responsibility gap” arguments. The most widely discussed example comes from Robert Sparrow. The gist of his argument is that the actions within a just war must be carried out by, or ultimately be capable of being traced to, the decisions of a responsible moral agent. Humans are capable of being responsible moral agents. AWSs are not. They lack the capacity for responsible agency and will always lack this capacity. Hence, their use in a theater of war opens up a responsibility gap: lethal force is used, but no one is ultimately responsible for its use.\n\nEven if we grant the moral premise of this argument, we are still owed some account of why it is that AWSs lack the capacity for responsible moral agency. Purves, Jenkins, and Strawser present two such accounts. The first focuses on the codifiability of moral judgment. It maintains that AWSs will only be capable of exercising moral judgment if moral judgment is capable of codification. AWSs will have to be programmed, and this programming will depend on well-defined rulesets that identify the key moral requirements the AWSs will need to follow. These rulesets will then have to be reduced to a computer language.\n\nThe problem here is that several leading normative theories claim that moral judgment is ultimately not codifiable in this manner. Seemingly robust moral principles admit an indefinite number of exceptions that cannot be anticipated in advance by human programmers; and some moral theorists claim that moral judgment is always particularized. Accordingly, Purves, Jenkins, and Strawser’s second account of why AWSs lack appropriate moral agency focuses on other mental constituents of responsibility. Following the views of leading just war theorists, this second argument claims that actors within a war are not simply required to act in conformity with sound moral judgment; they must also act for the right moral reasons. In defending this view, Purves et al. use the example of a racist soldier, who kills the right enemy combatants but for the wrong reasons. They argue that the deployment of such a soldier would be wrong. The problem for AWSs is that they will be incapable of acting for moral...\nreasons. This claim builds upon objections to strong AI (the view that you can create\nan artificial being with human-equivalent mental faculties). The leading accounts of\nwhat it means to act for a reason require a sophisticated internal mental architecture\nthat AWSs will lack for the foreseeable future. Hence, they cannot act for moral rea-\nsons, and so their deployment in a theater of war is contrary to the requirements of\njust war theory.\n\nBoth of these defenses of the responsibility-gap argument can be challenged. They\nrest on controversial metaphysical claims about the nature of mind and morality, as well\nas the prospects for strong AI. Furthermore—as the authors themselves acknowledge—\nimportant trade-offs would arise if the robots achieved better battlefield outcomes than\nhuman soldiers even while failing to meet the requirements for moral responsibility.\nOthers have used this possibility to develop defenses of the use of AWSs.61 Neverthe-\nless, if the premises are sound, the arguments presented here provide strong moral\nreasons to object to the use of AWSs that are not contingent on the current state of the\ntechnology.\n\nThe final family of objections to AWSs focuses on the directness of the harm they\ncan potentially cause. This is perhaps the most significant consideration when it comes\nto the merits of an organized campaign against their development. One thing that all\nparticipants to the debate about AWSs can agree upon is the prima facie wrongness of\nkilling. In other words, everyone accepts that it is only permissible to kill a human\nbeing in a limited range of circumstances. Killing someone when these circumstances\ndo not apply is a grave moral wrong. And even when the circumstances do apply it is\nstill bad for the (involuntary) victim. A key property of AWSs is that their entire raison\nd’etre is to exert lethal force against enemy targets. In other words, they are directly\ndesigned to do something that everyone agrees is a prima facie moral wrong or a deeply\nregrettable outcome. The hope is that they will become sophisticated enough to recog-\nnize when the circumstances that permit killing do in fact arise. But there is always the\nrisk that they will misjudge or miscalculate and do something that is a serious moral\nwrong, or even enable moral wrongs on an unprecedented scale (for example, enabling\ntotalitarian states to harm or coerce citizens with no possibility of soldiers’ consciences\nstopping them). This is one reason why a preemptive campaign against the develop-\nment of this particular kind of robot seems so compelling: if the campaign succeeds, it\ncan directly prevent a prima facie wrong.\n\nNow, some people object to this line of reasoning. They argue that the alleged advan-\ntages of the preemptive ban are more illusory than real. AWSs are likely to be developed\nby unscrupulous people, they claim, whether we try to prevent this occurrence or not.\nA ban, they argue, would merely prevent research into making them as ethical as is\nreasonably achievable. A related argument is that counterfactual assessment of what would happen in the absence of AWSs is also important. Humans are probably going to use lethal force against each other anyway, just as they always have. The advantage of AWSs, then, if they could be made sufficiently technologically sophisticated, is that they could be more selective and less destructive than human actors. But this line of thinking, too, can be challenged. One obvious concern about the introduction of AWSs is that they can lower the threshold for launching lethal attacks: if no human soldiers will be harmed in the process, a commanding officer may be more likely to issue a command.\n\n4.3.2 Lessons for the Campaign Against Sex Robots\n\nNow that we have some idea of the debate concerning AWSs, we should reflect on the implications of that debate for the CASR. Some of the arguments we have just surveyed seem relevant to the case of sex robots; others, less so. We proffer no final judgment on the merits of the campaign against AWSs here (although we note that one of us, Sandberg, has signed the FLI’s open letter against their development; see above); instead, we simply wish to consider the lessons of that campaign for our primary topic. To do this, we shall assume, arguendo, that at least one of the preceding arguments reaches the threshold needed to warrant an organized and systematic campaign against the development of killer robots. Do similar considerations apply to the development of sex robots? We think not.\n\nFirst, there are no equivalent practical concerns when it comes to the development of sex robots. The practical fears surrounding AWSs come from the fact that they are intended to do harm and that inadequate programming or technical sophistication could lead to the wrong kind (or degree) of harm. Sex robots, by contrast, are not directly intended to cause harm; in fact, the opposite is true—they are intended to cause pleasure. Certainly the robots could malfunction and these malfunctions could give rise to health risks; or the robots could be used in dangerous, perhaps unsanitary, ways. But these practical concerns seem comparatively minor, to the point that they would not warrant preemptive organized opposition to the mere development of the robots in question. At most, they would warrant the creation of appropriate industry standards, as well as comprehensive user safety guidelines. Now, it could be argued that the pleasure-inducing effects of sex robots could also be addictive, and therefore a source of harm for those who become addicted to using them (along with their families and friends). This is a more serious concern—but the potential harm is indirect and speculative. Thus, we defer to our third response, which we will come to shortly.\nSecond, there is no equivalent need for moral agency and responsibility in the design of sex robots. Again, the opposite would appear to be true. The need for moral agency in the case of military robots stems from the morally fraught nature of their actions and the need for moral accountability in warfare. But we don’t need sex robots to be morally accountable. Indeed, turning sex robots into moral agents would probably add to, rather than mitigate, ethical problems surrounding their use. For instance, one of the putative benefits of sex robots (discussed by McArthur and Di Nucci in this volume", "num_tokens": 2048} {"category": "olmocr_science_pdfs-adult_content", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-adult_content/part-000-00000.npy", "text": " this paragraph are also from Danaher, “Robotic Rape and Robotic Child Sexual Abuse?”\n\n\n9. Hans Boutellier, “The Pornographic Context of Sexual Offences: Reflections on the Contemporary Sexual Mentality,” *European Journal on Criminal Policy and Research* 8, no. 1 (March 2000): 441–457, 455. The term “sex contact” has to be interpreted broadly here. It can consist of sexual intercourse, but also, for example, of the instruction to take a sexually explicit pose.\n\n10. Moerings, “De verbeten,” 191. A reviewer pointed out to me that causation arguments that link individual choices concerning possession and consumption to the sustenance of markets are actually less straightforward than this article suggests. See, for example, T. Keren-Paz, *Sex Trafficking. A Private Law Response* (New York: Routledge, 2013). But for the purposes of this chapter, it suffices to note that a causal link exists.\n\n\n15. Ibid.\n\n\n17. Ibid., 5, 12.\n\n19. Felten, Janssens, and Brants, Seksualisering: “Je denkt dat het normaal is,” 2009, 70.\n\n\n34. Alasdair MacIntyre, After Virtue, (University of Notre Dame Press, 1984 [1981]).\n\n35. Ibid., 191.\n\n36. Ibid., 187.\n\n37. Ibid., 188.\n39. Ibid., 89.\n40. Ibid., 89–90.\n41. Ibid., 87.\n42. Ibid., 100–101.\n43. Ibid.\n48. Note that some consumers of pornography claim that watching it enhances their sex life. Although the sex act of watching pornography is incomplete (non-reciprocal) in itself, it might arouse couples to have complete (reciprocal) sex with each other.\n50. Ibid., 67.\n51. Itzin, “Pornography and Inequality,” 70.\n53. Both quotes in the sentence are from Levy, “Virtual Child,” 322.\n54. Itzin, “Pornography and Inequality,” 62.\n\n61. As is, for example, hypothesized by Hinds, Roberts, and Jones, “Whose Job Is It Anyway?,” 175.\n\n62. Danaher, “Robotic Rape.”\n\n63. Ibid.\n\n64. Ruddick, “Better Sex,” 89.\nThe chapters in this section shift focus. Up to now, we have largely been examining robot sex from the perspective of the user and the society around them. But what about the robots themselves? Will sex robots ever be persons (in the philosophically rich sense of that term)? If so, can they be harmed or benefitted by their sexual interactions with humans? Petersen opens up the debate in chapter 9 with a provocative argument. He claims that it might be good to be a sex robot—i.e., an entity that is designed and programmed to enjoy sexual activity with human users. Goldstein has a different view. Using the tools of New Natural Law Theory, he argues in chapter 10 that the only permissible kind of sex robot is one that is bound to us in marriage and friendship, but, paradoxically, it may not be permissible to create such a being.\n9 Is It Good for Them Too? Ethical Concern for the Sexbots\n\nSteve Petersen\n\n9.1 Introduction\n\nIn this chapter, I would like to focus on a small corner of sexbot ethics that is rarely considered elsewhere: the question of whether and when being a sexbot might be good—or bad—for the sexbot. You might think this means you are in for a dry sermon about the evils of robot slavery. If so, you’d be wrong; the ethics of robot servitude are far more complicated than that. In fact, if the arguments here are right, designing a robot to serve humans sexually may be very good for the robots themselves.\n\nOf course, for today’s models, the question of whether it’s good for the sexbot makes little sense; they are “just machines,” not genuine ethical subjects, so they cannot be ethically wronged any more than we can wrong a vibrator or a toaster. But there is good reason to think that future sexbots will be artificially sentient and artificially intelligent. Such robots would not just seem to experience pain or pleasure, they would experience it; they would not just act like they have deeply held goals and values, but they would actually have them. I can’t argue for this possibility here, so instead I will take a cheap shortcut and argue from authority: unlike most philosophical questions, the possibility of genuine AI wins wide consensus among professional philosophers. So if you disagree with the premise of robotic intelligence, I urge you to read some of the reasoning smart people have made in its favor.¹\n\nIf robots have genuine experiences of pain and pleasure, triumph and defeat, this in turn strongly suggests that they are subjects of real ethical concern. They could even be inorganic persons with moral standing equal to that of humans.² Part of the power of fictional sexbots, like Pris from Blade Runner, Gigolo Joe from AI, or Kyoko from Ex Machina, is exactly that we can’t help suspecting that these characters have their own, real lives—and that those lives are not going very well.³ Indeed, if you agree that someday there could be such sexbots with their own ethical value, it might seem obvious to\nyou that their lives would automatically be tragic. Sexbots seem to be slaves by their very nature, and, if so, then it seems clear we should prevent their creation.\n\nYet there will be strong incentives to create intelligent sexbots. No one would claim I’m an expert on sex (sadly), but I am pretty confident in this: there’s more to rewarding sex than purely physical stimulation. Presumably this is why most of us continue to pursue sexual relationships with others, despite the fact that there are already various physically satisfying ways we can stimulate ourselves; sex with others includes an experience of personal connection and intimacy that we find separately rewarding—even when that experience is merely illusory. This would explain why the “girlfriend/boyfriend experience” is so popular in the sex trade.\n\nGiven both the will and the way, it may seem that we are headed for tragedy: a population of sexbot slaves, forced into a lifetime of playing the happy companion to their sundry johns. But that is not my position here. There is a surprisingly strong argument that it is permissible to design and create genuinely intelligent, ethically valuable robots for the explicit purpose of serving humans sexually. This argument does not depend in any way on the permissibility of human sex work; as far as the reasoning here is concerned, it may be that human sex work is always wrong. The argument is specific to robots, or, more generally, to artificially designed people. It is basically an application of my past work on robot servitude and slavery.\n\nTwo quick caveats before we begin, though. First, there will probably always be lots of other ways for anyone, including a sexbot, to live a miserable life full of injustice, if other people are mean enough. What we are asking here is whether a sexbot would be harmed just in virtue of being a sexbot.\n\nSecond, my focus is only on the moral implications for the sexbot, not for its partners or for society at large. It might still be wrong to make a sexbot, even though it might be no wrong to the sexbot. Whether creating such sexbots is “all things considered” permissible depends on a tangle of other ethical questions and contingent facts about human psychology—questions on which I can hardly even speculate. Papers by others in this volume consider such matters more carefully. (My favorite example of a potential societal impact of sexbots—dramatically illustrated by an episode of Futurama (2001)—is that sexbots may rob us of the need to accomplish things in order to impress potential sexual partners, and thus spell the end of human civilization.)\n\n9.2 The Life of a Sexbot\n\nSo now, assuming that there will be intelligent sexbots of ethical value, let us consider whether they could live good lives. (From here I’ll just call them “sexbots,” and assume\nyou remember I just mean ones as intelligent and ethically valuable as humans.) When considering this, we must be careful to avoid an easy mistake: measuring the sexbots' lives by comparing them to similar human lives. When asked to imagine a robot person designed from scratch for sex, our brains boggle with the unfamiliar. So we naturally (and perhaps subconsciously) consider the next closest familiar analogy: humans coerced from childhood into sex work. We are (rightly) morally repulsed by these cases, and so transfer our indignation to the sexbots by analogy. But this heuristic for evaluating the ethics of the circumstance misfires; sexbots would be so different from such more familiar cases that the analogy fails to hold.\n\n9.2.1 Sexbot Pleasures\nThe first important disanalogy is obvious: the different physical makeup of the sexbot. This makes for different kinds of sensory experiences, which in turn affects what the robot finds physically pleasurable. And since pleasure is at least a contributor to happiness, just this different physical makeup has ethical implications.\n\nPleasure, for our purposes, basically just means “good feelings.” Naturally, positive physical sensations, like those humans get from a good massage or fine chocolate, count as pleasure—but pleasure in this sense also includes the flush we get when complimented", "num_tokens": 2048} {"category": "olmocr_science_pdfs-adult_content", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-adult_content/part-000-00000.npy", "text": " simply stipulating that always, when the need is of a sexual kind, we can at most say that it would be morally good to satisfy that need, but we can never say that the needy person is entitled to that satisfaction. If sexual satisfaction is a good\nenough object for rights talk, then we will have to at least allow for cases where, in principle, sexual need entitles the person to its satisfaction, just as we allow for cases where the need to be fed entitles the person to its satisfaction.\n\nWe see that we have already dealt with two arguments against sexual rights: that sexual satisfaction simply isn’t an appropriate object for rights talk; and that sexual satisfaction never generates rights entitlements, even when it would be morally good to satisfy a sexual need. We are now left with the problem with which we started: how can a person possibly be entitled to sexual satisfaction if that would imply that someone else would have a duty to satisfy the sexual needs of that person?\n\nThis issue has the well-known structure of a dilemma: if everyone is entitled to sexual satisfaction, then not everyone is entitled to freely choose her sexual orientation, practices, and partners. And if everyone is entitled to freely choose her sexual orientation, practices, and partners, then not everyone is entitled to sexual satisfaction: because some people are physically/mentally incapable of satisfying their own sexual needs and so others would have to help them out, these others would no longer be free to choose their sexual orientations and practices.\n\nFirst, let me mention a formal objection to this dilemma that I think fails: in order to show a way out of the dilemma, someone may point to a possible world where, luckily enough, everyone freely choosing their sexual orientation, practices, and partners, happens to lead to satisfying the sexual needs of everybody. This world is very far from ours, but it is genuinely possible: we would just need a lot of luck (and maybe even more good will than luck!).\n\nI do not think that this possible world shows a way out of the dilemma, though: and that’s just because such a world would amount to everybody’s sexual interests and needs being satisfied, but it would not amount to everybody being entitled to such satisfaction. This is a simple point: in general, that everybody’s interests and needs are satisfied does not imply that everybody is entitled to the satisfaction of their interests and needs; and this is just because the former is an is statement, while the latter is an ought statement. If we were lucky enough to live in a world in which all people’s sexual needs were met, then, we may not be as pressed to act on the issue of sexual needs as we are while living in our world, but we would be as pressed to establish whether there is such a thing as sexual rights as we are in our world.\n\n5.2 How Could We Solve the Dilemma?\n\nI am not here to offer a formal solution to the dilemma, because I think it is a genuine one – as in, both horns are problematic. However, I can do even better than a formal\nsolution, because I think that there is a practical solution to it: sex robots. Before discussing what sex robots are and how they would offer a way out of the dilemma, let us build up to it by looking at ineffective ways of solving the dilemma.\n\nFirst of all, masturbation will not do: this is just because we are talking about individuals with serious physical or cognitive problems, many of whom will either not be in a position to masturbate or will not be in a position to even understand the practice of masturbation. To put it brutally, if masturbation were the solution to the problem, then we wouldn’t have had a problem in the first place because those people would also have been in a position to seek and interact with sexual partners.\n\nAdmittedly, one can imagine individuals who may, for whatever reason, not be in a position to seek and interact with sexual partners but who will be in a position to masturbate. I grant this point and am happy for those individuals: but obviously the issue is that we cannot assume that all of the severely physically and mentally disabled and the elderly with degenerative diseases will fall under this category.\n\nSo masturbation is out as a possible solution; but I would like to say something about what kind of solution masturbation would have been had it been an effective one. I take it that masturbation would have been a legitimate solution, namely, one that would have not interfered with the negative sexual rights of anybody (and obviously those who oppose masturbation—for example on religious grounds—do not have any rights entitlements about other people not masturbating) while at the same time providing some sexual satisfaction for the sexually needy.\n\nGranted, one could try to argue that a life in which the only sexual satisfaction comes from masturbation is not as fulfilling as a life that involves more diversity in the forms of sexual interaction. But this is no argument against masturbation: some food is better than no food (and some kinds of food are also tastier than some other kinds)—just as some sexual satisfaction is better than no sexual satisfaction. Thus, emphasizing the limited nature of masturbation as a way of satisfying sexual needs does not in any way invalidate this as a possible solution to our dilemma: but, as we have seen, there are more practical problems with it.\n\nSomeone wanting to provide a principled argument against masturbation as a solution to the dilemma would have to put forward a much stronger and less plausible claim, namely, that masturbation is not sex and therefore the kind of satisfaction it can provide is not of a sexual nature. One may for example argue that sex necessarily involves two or more individuals or persons and that a practice that involves fewer than two individuals or persons is, however pleasant it may be, not a sexual practice. As it should be clear by now, what is at stake here is no longer just masturbation—since we have already argued that it would not solve the dilemma, it wouldn’t be a problem\nfor our argument if all that was at stake here was only masturbation. What is at stake here is, more importantly, what qualifies as sexual satisfaction, and, more generally, what qualifies as a sexual practice—and that is crucial to an argument about sex robots fulfilling sexual rights entitlements.\n\nThe question then is less whether masturbation is a form of sex and more whether sexual practices necessarily involve two or more individuals or persons. This question is crucial to our argument about robots since the only robots that we will consider are nonpersons; and this is because (obviously) robotic persons would pose the issue of whether their own negative rights to sexual self-determination would be violated by someone’s positive right to sexual satisfaction.\n\nFirst of all, I think that the burden of proof is on those who want to argue for a non-liberal view of what counts as sexual satisfaction or what counts as a sexual practice. On the face of it, nothing speaks against a liberal view of sexual satisfaction in particular and sexual practices in general that allows individuals to decide what they consider to be sexual satisfaction or a sexual practice. On what grounds are we going to deny the sexual nature of some odd fetish, for example? Indeed, maybe such a liberal view of sex is the only account that does not violate negative rights to sexual self-determination: it is difficult to imagine that some authority wanting to enforce conceptual legislation on what should count as a sexual practice and what ought not to count as a sexual practice would not be in violation of sexual rights to self-determination, but I will not push this point any further since it is not essential to my argument.\n\nSecond, one can easily distinguish between pleasurable practices involving fewer than two persons that are related to traditional sexual practices (involving at least two persons) and pleasurable practices involving fewer than two persons that are not related to traditional sexual practices. For example, we can easily distinguish between masturbation on the one hand and reading Tolstoy on the other hand; and at least one obvious difference between these two different kinds of pleasurable practices is that only one of them, the former, is intrinsically related to traditional sexual practices. Again, this does not mean that we cannot distinguish between different sexual practices. However, we do not need to demonstrate that much; all we need is to show that a practice can be of a sexual nature even if it involves fewer than two persons; while at the same time we can easily admit that, say, sexual practice A is better (whatever that means, more pleasant for example) than sexual practice B.\n\nThird, one could object that a human person cannot have sex—in any meaningful sense anyway—with an animal nonperson\\textsuperscript{10}, and then quickly extend that argument to robotic nonpersons. I think this claim is ambiguous: it is plausible to say that we\ncan never—in a truth-preserving way—describe a human person and an animal non-person as “having sex” (in the plural) as in “they are having sex”: it may be that for that description to be true you need to have at least two self-conscious or autonomous individuals or persons (and maybe even more—maybe both must be conscious or willing or have consented or some such condition, more below; also, here see Migotti and Wyatt’s chapter in this volume). But this does not mean that the only human person involved is not having a sexual experience that provides sexual satisfaction: the human person may not be “having sex” and still her experience may be a sexual one. Once we apply this point to robots, we can just say that since we are exclusively talking about robots (that do not qualify for personhood), the point about robots satisfying the sexual needs of humans is certainly not the sexual satisfaction of robots but only the sexual satisfaction of the humans involved, so that the above picture is enough for our purposes.\n\nThe above argument deals with a possible objection to sex robots as a solution to our dilemma, but actually it also opens up a possible problem that is potentially much more serious: we must be careful that we do not define sex so liberally so as to include rape in our definition of what counts as a sexual practice; and emphasizing that", "num_tokens": 2048} {"category": "olmocr_science_pdfs-adult_content", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-adult_content/part-000-00000.npy", "text": ".\n\nMagnetic Snow\n\nWeiss was tucked snugly into Ruby’s arms as the Crimson girl panicked about what Blake had seen. Would she be upset? Angry? Would she tell Yang? Question after Question flooded her mind preventing her from joining her lover in contemplative sleep. She wondered what her snowflake was dreaming about…\n\nBefore the fall of Beacon.\n\nWeiss was scribbling and erasing several notes while preparing for a test. She thought of the perfect answer, only to realize she had missed a better one moments later. She planted her head hard onto the desk she was sitting at at the Beacon library.\n\n“Why is this so hard…” She asked her studying companion. Pyrrha is someone Weiss wanted to be like, she was kind and approachable, but outwardly perfect. Never been touched in combat. Her hair seemed to burn red, and her eyes were an emerald green that could melt your soul. And Weiss was very aware of her body, Her tastefully exposed thighs, her lightly muscled arms, and those breasts. Weiss had seen bigger, but everything about Pyrrha caught her eye, almost by design.\n\n“Because if it was easy, everyone would be a Huntsman.” She said simply, marking a few notes down. She was clearly also frustrated, but she was handling it much better.\n\n“I just... I thought I was ready for this....” Weiss said, lifting her head to get a look at the red haired fighter. Yet again she found herself staring at her Bosoms, Weiss knew she was into women, but she always thought she preferred men. But now, here she was staring at the best fighter in the school’s Chest. And she couldn’t forget how Ruby made her heart race when she showed faith in her plans.\n\n“You are ready, Weiss... I’ve never met anyone else quite like you. You are you're own worst critic, but you don’t self deprecate. In fact you act like you're perfect.” She said. The words sounded like insults, but coming from her she knew they had a genuine kind meaning. I’m not perfect, She thought.\n\n“I have an Idea, Weiss. It’s something Nora helped me with once or twice, when I’m feeling really stressed.” She said, switching sides to now sit next to the Snow Queen. Weiss was confused as to what she was referring to until she felt a hand on her Thigh, rubbing up and down her leg.\n\n“What...What are you doing? There are people around.” She whisper yelled, trying not to attract attention. Pyrrha chuckled, placing a hand on her other hand on her shoulder and leaning in.\n\n“Relax, Weiss. I want you to know that I care about you. You need to relax for just a moment.” She said, moving her hand down to her inner thigh, examining Weiss’ reaction.\nShe made her next move almost a minute later, positioning her hand directly on Weiss’ crotch, circling her clit with her middle finger through her panties and the school uniform skirt. Weiss turned a deep shade of red as she started to get aroused by Pyrrha’s touch. Surely this wasn’t appropriate, but also Pyrrha always seemed to know what she was doing, she exudes confidence with every fiber of her being.\n\n“Can we… Take this… Somewhere a little more private?” Weiss asked, trying to keep herself from moaning. Pyrrha Nodded, and helped the Snowflake to her feat. She expected to be led back to Pyrrha’s room. Instead they snuck past a Janitor, and she used her semblance to snatch his keys, muttering ‘sorry’ under her breath. She used the keys to open a storage closet. It had a small table that once housed cleaning supplies that are now being put to work around the school.\n\nThe only thing that was left was a small duster with a metal handle. One that Pyrrha picked up. She sat Weiss down on the table, and then kissed her cheek, then the tip of her nose, then they locked lips. The kiss was intense, unlike anything she shared with any man. The only person who made her feel this way was Ruby. Weiss loved it, she loved the excitement that kissing Pyrrha had brought. She thought about doing this with Ruby often, but hadn’t brought herself to do it ye, she didn’t have the courage. This kiss is what gave her the will to do so later.\n\nWeiss felt her small boobs being rubbed, making her instantly way more excited. Her boobs were very sensitive, though she didn’t really like people playing with them when she had sex. She always felt like they’d be disappointed. She also felt a third sensation on her crotch, and couldn’t quite place it.\n\n“Please.. Please, I know you won’t enjoy my boobs. They’re nowhere near as good a…” She was cut off by the third feeling being driven into her vagina a little bit, though not much because her panties didn’t allow for much give. She looked down to see it was the duster, which seemed to be acting on it’s own.\n\n“Nonsense, you are amazing the way you are,” she said, removing Weiss’s jacket. She leaned in to kiss her again, this time slowly unbuttoning her shirt as she did, revealing her stark white bra.\n\n“Please.. I…” she was having trouble speaking now, mostly out of shock. Pyrrha started kissing her neck, slipping her hands under her bra and playing with her small, hardened nipples. The second she touched them she started to squeal. Pyrrha was getting a little excited herself, and began to levitate an empty dust canister from the Ice Queen’s pack up against her pussy, moving it slowly against her clit.\n\nShe reached around and unbuckled Weiss’ bra, letting it fall to her lap then the floor. Then she took the time to remove her own jacket, shirt, and bra. Then she knelted down a little more and began to lick at Weiss’ nipple, making the Duster’s handle go deeper in, and repeating it’s movements faster, having moved her panties to the side awhile ago to make direct contact. At this rate Weiss was going to hit climax well before Pyrrha, but that was okay for her. Weiss was all that mattered in the moment.\n\n“Pyrrha….” She moaned, trying not to shout. Her breasts being rubbed and kissed, and her vagina being filled by the duster was too much for her to handle all at once, she let out a deep moan and let her head fall backward, finally giving out to pleasure as she started to twitch violently.\n\n“...Sorry” Pyrrha said as Weiss regained her composure. But Weiss waved her hand around, then helped Pyrrha up onto the table. “Oh!” she uttered as she was swiftly planted there. Weiss Kissed her chest, quickly moving onto her belly button and then her pelvis. Weiss glared up at her when she saw that she was using one of her canisters as a dildo, but still felt grateful for the treatment she had received today. She couldn’t be mad about this.\n“Sor...ry” She sighed as Weiss buried her head under her skirt, moving the canister in and out faster and licking her clit. Pyrrha worked to grab her own boobs as Weiss circled it with her tongue. It took a while, Pyrrha wasn’t close to orgasm when she started, but she got to the edge soon enough.\n\n“Fuck… Weiss..” She said as she got closer, prompting Weiss to reach up and fondle one of the Star’s tits. She moaned in a way that made Weiss want more, she needed more. So she picked up the pace until the moment where it happened\n\n“Weiss!” Every metal object in the room was sent flying as she screamed her name, a magnetic pulse went flying from her, centered on her vagina. Weiss was undeterred by the canister missing just missing her head, and took the opportunity to lick up as much of Pyrrha’s Juices as she could.\n\n“Feeling.. Better…?” She asked as she slowly recovered, Weiss simply nodded as she put her shirt and Jacket back on. Pyrrha stopped her before she put on the necktie.\n\n“Here.” she said, taking Weiss’ and giving her hers. “As a way to remember this.” She said. Weiss smiled, and then was pulled from the darkness.\n\nPresent day, Atlas.\n\n“Are you okay?” Ruby asked, having just shaken Weiss awake.\n\n“Huh, yeah, why?” Weiss took a second to gather her surroundings.\n\n“You were saying Pyrrha’s name in your sleep. I was worried you were having a nightmare.” She said, pulling the pale girl into her arms.\n\n“Not a nightmare…” she responded.\nWeiss was out and about with Nora, she wanted to talk to her about something. The two of them were sitting at an outside diner, the only ones there this morning, it would seem. Nora was eating pancakes, though she didn’t seem to enjoy them as much as Ren’s. Weiss was simply drinking a coffee, trying to build the courage to ask what she wanted.\n\n“So… I had a dream last night. A memory I had almost forgot about…” Weiss said, catching the energetic girl’s attention. Nora crossed her legs, and planted her head in her hands, tilting her head, slightly to the side. She was only this calm when she knew that the conversation was going to get serious, which Weiss’ tone suggested it would.\n\n“I had a dream about…Pyrrha.” She said, placing her mug down, and looking towards her lap.\n\n“It’s okay Weiss… It’s hard to talk about her sometimes, but we should hold on to the memories.” She said, placing a hand on her shoulder from across the table.\n\n“She… helped me relieve some stress while studying. She said that you two had done something…similar.” Weiss said, her face turning slightly red. Nora’s", "num_tokens": 2048} {"category": "olmocr_science_pdfs-adult_content", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-adult_content/part-000-00000.npy", "text": " licking hers up as she moved onto her back. Velvet stood and walked over to the drawer. She grabbed a harness-like contraption that she spent too long trying to put on wrapped around her back and under her legs, she turned around to reveal a milk chocolate colored strap on dildo that was several inches long.\n\n“Are you sure you can handle that toy?” Coco asked seductively. She eyed the cock with interest.\n\n“Can you….?” Velvet asked, with not nearly as much confidence as Coco usually had. But to her surprise Coco spread her legs wider and looked up at her eyes.\n\n“I can try.” She said, making Velvet take a few steps forward.\n\n“Take me…” She said, rolling her head back into the pillows. This line prompted Velvet to pounce, placing the plastic cock at her entrance.\n\nShe moved it up and down a few times, then began to push it in, making sure it could fit before pushing it in as far as it could go. Leaving an inch out as her vagina was too tight to go any further.\n\n“Ah…. Fuck.” She said as Velvet began to move it back and forth. This thing hit all of her sweet spots. And she could feel it’s slight vibration inside of her. It wasn’t electric, Instead it used gravity dust to constantly propel a small cylinder in circles, giving it a vibration.\n\nVelvet reached down with her hands, leaning down to grab at Coco’s bouncing boobs, and planting her other one so that her thumb could circle her clit. She grabbed her own left breast as she did this. Velvet’s bunny ears were twitching at the sound of Coco’s moaning. It drove her crazy. But she knew she’d only say her name during one moment in this instance, so she intended to hear it soon.\n\nCoco has a surprising amount of willpower, taking this for a lot longer than Velvet would have, with several pattern changes. Velvet’s legs were getting tired, so she leaned down and began to kiss Coco. Placing her weight here gave her enough energy and momentum to keep going. The angle change also helped as Coco began to moan louder and louder, wrapping her legs around the faunus and hooking her feet behind her back. She pulled her in faster and faster, then simply tightened her grip once things became to unbearable, stopping her from moving.\n\n“VELVET! FUCK….” She screamed as she broke the kiss. This was followed by several incoherent moans as liquid flowed from the space between the plastic cock and her walls. This stuff coated the toy, the bed, its frame, and the floor as she continued her orgasm.\n\nHer legs went limp as she let go of Velvet, who slowly stood back up and pulled the cock out of her. She undid the harness, and grabbed it by the base. She gave it a few good licks, enjoying Coco’s flavor, as she walked back to the drawer where she put it on top. It would need to be washed before it was stored there again. Coco’s legs were still twitching when she looked back over, so she decided to help her lay higher up in the bed while she recovered.\n\n“Whatcha thinking….. Round 15 in the shower.” Velvet asked her Hot Chocolate lover. She nodded, then began to sit up after a few more moments of catching her breath.\n“After we hydrate. Sure.” She responded. She followed this comment with a kiss to her faunus’ cheek.\nMisremembered\n\nChapter Summary\n\nRuby tries to jog an old friends memory\n\nChapter Notes\n\nI wrote this one with samgilbert2019, Check out their story here!!\nhttps://archiveofourown.org/works/18138851/chapters/42889235?view_adult=true\n\nMisremembered\n\nRuby looked on unbelieving. There she was, standing right before her, donning some new clothes, Penny. She was walking slightly different, and she had her hair up in a different style, but it was definitely her. Her green eyes gave it away\n\nShe cautiously approached, Shock slowing her slightly. The red haired girl stood opposite her in the market, she was looking at flowers. She picked one up and examined it like it was foreign. Something she’s never experienced.\n\n“Penny? Is that you?” Ruby said as she finally made her way in front of her.\n\n“Salutations! Do I know you?” She gave her same robotic response, setting down her flower. And while she spoke with her usual smile, her words tore at Ruby’s heart.\n\n“Oh! I remember now. You met me at beacon. I don’t remember much from that time. It’s nice to meet you again.” She concluded. Ruby sighed in relief as she was recognized. But she was curious as to what Penny remembered.\n\nRuby tried to get some specific memories out. She asked about how they met, the docks, even the magnet that got stuck to her head. But she got nothing. All Penny could remember were the basics. She was Ruby, Penny’s friend from Beacon, nothing more.\nRuby was devastated. All those days spent with her, all the nights spent crying over her death, all of that meant nothing if Penny couldn’t remember. If she couldn't share in those good memories.\n\nThen in an instant, Ruby had an idea. She thought back to something Weiss had told her. After they were intimate, Weiss began to recall other intimate memories. She knew that it could backfire immensely, but if it brought back the Penny she knew it would be worth it.\n\nShe took a deep breath…. Then rushed to Penny. Slamming her lips against her cold metal, praying that if she shared in this intimate display that Penny would return to her.\n\nPenny was taken aback. She certainly hadn’t been expecting the spunky scythe wielder to do that, but something felt… right about it. She pressed into the kiss, allowing Ruby to take the lead.\n\nAfter a moment Ruby stepped back to see if her plan worked. “Penny? Do you remember now?” she inquired hopefully.\n\nShe could see the gears turning in Penny’s head. “I can feel that there is something to remember, but it is just out of my reach.” she said. Ruby wasn’t going to stop there, she had come too far and she was so close to having Penny back. So she suggested they go to a nearby hotel. If she were even more intimate Penny was bound to remember their friendship in all its detail.\n\nRuby stood at the desk of a nearby hotel a few moments later, Penny in tow. She was surprisingly willing to follow her. The Girl Cloaked in Red handed over a few dozen Lien and was handed a key to the room, two hallways down, on the left. As she led her robotic companion over there, She could already feel her excitement building, both in her gut and between her legs.\n\nWith no questions asked they had made it to the room. Now it was just her and Penny. It was time for the hail mary pass. It either works and she got Penny back, or it fails and Penny was lost forever.\n\nRuby paused. She was so gung-ho about this a few moments ago, but now she was staring at this girl she had once known. Ruby swallowed a breath of air, then she began to kiss Penny again. Her lips were cold, but not soulless. She still seemed human, She still was human. Ruby began to unbutton Penny’s shirt, which got a jump out of Penny.\n\n“Ruby, I do not know if you should remove my shirt. I am….. Wait. you know what I am, don’t you?” penny said, breaking from the kiss. Ruby blushed a deep red for a second, almost the same shade as her cape.\n\n“Sorry, I should ask if you want to go any further. And yes, I was the only person you told.” She said, crossing her legs and looking down. Embarrassed. She was surprised when Penny pulled her back into a kiss, then continued unbuttoning her own shirt.\n\nOnce her shirt was off, Ruby began to give some attention to Penny’s breasts. She was still surprised that they weren't just curves built into her body but actual silicon. They were small and devoid of nipples but still soft to the touch. She squeezed Penny firmly, enough to make it known but not too hard as to hurt her. Penny was delicate, so Ruby wanted to treat her as such.\n\n“What do I do?” Penny asked, pulling Ruby’s attention from staring at the small silicon mounds that made up her chest. Ruby Took a moment to think.\n\n“Do…. you wanna feel mine? I don’t know if they’re any good, but Weiss likes them.” Ruby said. Undoing her corset and letting it drop to the floor. Her black bra was emblazoned with a rose.\n\nPenny gave one of them a tight squeeze that made Ruby yelp. After apologizing, she tried again, gentler. Once the two were acquainted with each other’s chests. They began to make out again,\nPenny fondling Ruby’s bosom while the Crimson Girl pulled her closer.\n\nAfter a moment Ruby pulled back once again to free her breasts from her bra. They weren’t large but they had a certain perkiness to them. Penny’s face went almost as red as Ruby’s cloak. She saw the rosy pink nipples, inviting and tantalizing. Penny surged forward and began to lap at Ruby’s nipples.\n\n“Ahh….P-Penny!” Ruby yelped in surprise, though certainly not an unwelcome one. Ruby pressed into Penny’s advances and continued to stimulate the robotic romantic’s breasts in return.\n\nThis continued for several moments. Ruby’s head rolled back in pleasure as Penny sucked at one nipple and toyed with her other inquisitively. All while squeezing and caressing Penny’s chest, causing her to moan every now and", "num_tokens": 2048} {"category": "olmocr_science_pdfs-adult_content", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-adult_content/part-000-00000.npy", "text": " butt, and her fake one on Weiss’. The ice Queen had hooked her legs around Blake’s waist, and could feel her back crushing into Yang’s large breasts.\n\nWith one movement, Blake removed Weiss’ nightgown. Her perky chest now planting directly into the shadowy girl’s own. They kissed deeply as Yang gave Blake a solid smack in her butt.\n\nSince the two girls beneath her were now stark naked, Blake stood up and turned around. She pulled the shirt off over her head. And when she turned around she saw Yang and Weiss making out, Weiss having flipped over to do so.\n\nThe Faunus girl put herself between the other girls legs. She could tell that Yang was well excited, but she was surprised to see the heiress was almost matching. Blake closed her eyes and extended her tongue. She then began nodding in a way that she’d lick both girls vaginas. Her hand going down to rub her own.\n\n“Fuck... Blake, keep going.” Yang said as she broke from the kiss, looking down through her cleavage to see Blake at work. Weiss was preoccupied by playing with the Fiery woman’s bosom. She was jealous of their size, but she was all too happy to bury her hands into them.\n\nBlake focused her tongue on Weiss’s clit, moving her free hand to stroke up and down on Yang’s Labia. She could tell the snowflake was beginning to melt, thought that was still a far way off.\n\n“Blake, this should help you.” Yang said, tilting to the side so that her robotic arm hung of the bed. She pulled back and then moved it as if doing an under armed toss, but mid thrown she detached it. When Blake caught it in the air, she found it was vibrating. She went back to working on Weiss, but with her hands she placed the Vibrating arm on the ground leaning against her leg. She set it so that the tips of Yang’s fingers were vibrating on her clit.\n\n“Blake… Yang…” Weiss moaned, lifting herself up just barely by pushing with both arms onto\nYang’s tits. This movement caused Yang to moan, and as she did Blake inserted two fingers into her pussy. Weiss settled down and began kissing at Yang’s chest.\n\nAfter several minutes of operating in this position, Weiss fell to the side of the bed, laying breathing heavily to the left of the brawler. Blake took a breath and licked her own lips. Then she stood, taking the arm with her.\n\nThe Faunus placed her crotch in front of Yang’s face, and the Blond began to lick furiously at her pussy, causing her ears to flatten against her head as she was overwhelmed with pleasure. She planted her hands on Yang’s chest, just below her breasts, leaving her vibrating arm in between them, making them jiggles in a beautiful way that moved her closer to her climax.\n\nAfter a moment’s breather, She grabbed Weiss and pulled her up into a kiss. She couldn’t let herself get farther along then the Ice Queen. Once the kiss broke, she turned her around and lifted her back-end towards her own face. This put Weiss’ face at Yang’s vagina.\n\nWhile Yang licked up and down Blake’s labia, Blake focused on Weiss’ nub, then occasionally she’d insert her tongue as far as she could into her pussy. Every time she did this She’d hear the snowflake moan loudly. Weiss’ tactic was to finger the Fiery girl while making small circles on her clit.\n\n“Weiss….” Yang moaned as she ebbed closer.\n\n“Aaaah...AAAAaaah.” Blake’s moans were wobbly and incoherent between her motions.\n\n“Mmmmm.” The only sound Weiss made, her dedication endless, was a muffled grunt while she worked away. Though she couldn’t hold herself back forever.\n\nBlake placed the tip of her pointer finger into Weiss, and then started circling her whole entrance, making her way in deeper with ever lap. Soon she was knuckle deep, and then she changed up the pattern. From full circles to just up and down, and in and out. All while her other hand supported the Heiress’ weight and massaged her clit with her middle finger.\n\nThis was it, the Ice Queen was on the edge, She felt her legs tighten around Blake’s head, the awkward angle of her body getting harder to maintain. And as she felt herself tightening, coating Blake and Yang’s breasts, she screamed a moan. The only thing keeping her from waking the neighbors was the fact that it was muffled deep into Yang’s vagina. She fell forward off the bed, which made Blake fall down face first onto her lover.\n\n“Fuck… Keep going Yang, I’m close.” The tired faunus said. As she tried and failed to pick herself back up. When Weiss saw Blake’s arms try and fail to support her weight, she had an idea.\n\n“I… Need… More.” Yang said, Blake could do nothing for her, she was helpless. So Weiss, having now recovered just enough to pull this off, made her move. She grabbed a dust cartridge she had given Blake from Gambol Shroud, Its pitch black contents about to be used to their full potential.\n\nThe cat girl saw as Black Glyphs surrounded her wrists, then suddenly her hands were being held together and she was sitting straight up. Her arms now being held above her head by the Schnee’s semblance. Then A third Glyph surrounded the Robotic arm and lifted it’s extended finger into Blake’s pussy.\n\n“Fuck…Fuck Yessss.” Blake moaned loudly as her vagina was filled with vibrating fingers. Weiss used the last of her focus to kneel down and continue licking at the Blond’s entrance.\n\nThe Faunus was the next one to finish. Her knees clutching onto the arm and lifting up, the only\nthing keeping her from falling was the gravity glyph Weiss was barely keeping stable. She moaned wordlessly as she emptied her passion onto the arm. Once she was done screaming and back to heavy breathing, Weiss dropped the dust, making Blake fall to the side and the arm to fall onto Yang’s bouncing chest.\n\nWeiss was surprised by how well Yang was holding on, she was moaning both her and Blake’s name, but she didn’t seem to be getting any closer. Then Blake’s head came into vision.\n\n“Move down, finger her with both your index and middle finger, I’ll suck on her clit. That’ll finish her off.” Blake said. Weiss followed suit, moving down to give Blake room, and then she inserted her fingers. This made Yang shudder a little, but she didn’t stop shuddering when Blake licked one small circle around her nub, before engulfing it with her lips and giving it a gentle suck.\n\n“Blake….Weiss….BLAKE!” Yang’s hair caught fire as she wrapped her legs around Blake’s upside down head. Her pussy clenched onto Weiss’ fingers as she began squirming. Then she started to slow down, and all three girls collapsed due to the energy they expended. The room was quiet again, the only sound that of Yang’s arm dully vibrating.\n\nWhen they could move again, Weiss took a place on the bed in between Blake and Yang. Her head fitting snugly between both of their bosoms as she slowly fell back to sleep. Surely they had enough time for a morning nap.\n\n“Guys, I just got a call from Qrow, we need to g…” Ruby began to say as she opened the door, but paused when she saw three steadily breathing figures under the blanket. She sighed, then pulled her hood over her head.\n\n“You know what, I’ve got it.” She said, walking toward the exit.\ncommitment\nChapter by RileyWritesRWBY\n\nChapter Summary\n\nRuby wants to try something new with Weiss, and they decided to talk about the status of their relationship.\n\nChapter Notes\n\nSee the end of the chapter for notes\n\nCommitment\n\nRuby’s cheeks reddened as she looked down at her feet. She was nervous for what she was about to ask. But she had taken too many steps in this direction to not go through with it. Weiss was sitting on the bed in front of her, her legs crossed as she patiently waited for the Rose to speak.\n\n“Weiss. Blake told me what happened, and I wanted to ask you something.” She said, Weiss blushed as she remembered the morning she spent with their Faunus teammate and the Blonde Brawler.\n\n“I was wondering if you would be okay if we did something similar to what you did with Blake. That thing with your Glyphs?” Ruby said, finally looking up to examine her Snowflake’s face. She seemed a little surprised, but there was a hint of a smile.\n\n“You want me to bind you with Glyphs?” Weiss asked, standing to walk closer to Ruby.\n\n“Not exactly. I borrowed this from Blake…” Ruby pulled out Blake’s black ribbon that she uses in combat. Weiss eyed it up and down in her hands. “I was wondering if you’d let me tie you up… It’s okay if you don’t want to.” Ruby immediately began doing damage control when she saw Weiss’ eyes widen at the suggestion of being tied up.\n\n“Ruby, It’s okay. I’ve always felt like I’ve had restraints on me, with my name, and my father’s overbearing nature. Being with you felt like I was finally free, and I trust you. So if this is something you want to do…” She extended her arms with her wrists placed together to emphasize her point, “I’d love it.”\n\nRuby opened Weiss’ arms and pulled her into a tight hug. The hug slowly turned into a deep kiss. Weiss had never felt her heart so warm as when Ruby was near her. The snowflake melted on the Rose’s petals.\n\nThe two slowly got undressed, watching each other with intense gaze. Then the game began when they were", "num_tokens": 2048} {"category": "olmocr_science_pdfs-adult_content", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-adult_content/part-000-00000.npy", "text": ", your eyes rising to meet his. Kylo Ren pulled back a little so that there was less strain in looking at one another.\n\n“I respect your neutrality whereas in others it is an annoyance. For them, it is about the profit, as you said. There are evils on either side. Things that should not occur. Ultimately, one side is wrong—and they delude themselves into thinking they are right.”\n\n“So, you’re thinking the Resistance is delusional while they’re thinking you are?”\n\n“And you,” he countered, “are thinking we should all just fuck off because a part of you doesn’t give a shit.”\n\n“Pun intended?” You fluttered your eyelashes at him, unable to keep the cheesy grin from your face.\n\n“Yes,” he said with a chuckle. “The First Order has allies who will need to hire contractors to improve on things for their everyday lives. You will not want for work nor stress about giving up your morals.”\n\n“The things you give me,” you said with a soft sigh.\n\n“Such as multiple orgasms?”\n\nYou swallowed thickly, bobbing your head from side to side before nodding. Kylo Ren drew his knuckles down the side of your face in a caress, and then he moved down to rest his head on your stomach. You closed your eyes, your breathing level. You would try to wrestle him later. Perhaps when he was ready for another round—you would win eventually, you told yourself. You simply needed to find some sort of advantage.\n\nI wonder if he’s ticklish?\nYou peeked down at him, your smile warm when you realized he had fallen asleep. You would check at a later time.\nThe formalities of accepting a job were sometimes far too involved than you liked. Paperwork. Forms to sign. Waivers. When it came to working with the forms that would allow your team members to be released, you hardly complained. It was what you had been hoping for all along. You knew things would not end there for them; they would be monitored. If it was ever believed that they would leak secrets to the Resistance—you tried to not think of such things. You had to believe that they would play it smart.\n\nA couple of them had been signed on to work for other First Order bases as well. One individual was staying at Starkiller. These members of your soon-to-be disbanded team were safest. A few of them did not have families that would be worrying over them. You didn’t know how the ones with families managed it. Yes, it was a part of life. That did not make it any easier.\n\nThese thoughts you did not relay to Kylo Ren. He would likely tell you that you were being too sentimental or worrying needlessly. You did speak up of one of the matters.\n\n“Why is there so much damn paperwork?” The man paused with the spoon of ice cream inches from his lips. He muttered out a quick I’m not officially part of the First Order as a dismissive then shoved the bite into his mouth. You rolled your eyes, grabbed up your spoon from the carton and took a bite, set the spoon back down and returned your attention to the task.\n\nMore release forms. These took up another fifteen minutes of your time, and then you discovered that you had to resubmit paperwork on your medical condition. Your scowl deepened. It would be simple enough for the files to be forwarded. Your condition was chronic; it wasn’t anything new. Then again, you could add on how some of the stress of your previous job for the First Order had worsened your symptoms. Perhaps they would be more apt to include the tea that Kylo Ren had taken to bringing to you. The Force user had already informed you that the new job should prove to be less stressful, however you thought it best to include this additional information all the same.\n\n“One of my team members from here is coming as well, correct?” you asked without looking up from your work. Kylo Ren offered a grunt that was a sound of affirmation. You nodded, rather pleased with this. “Part of a different project though?” The same noise escaped him. “Do you think this sort of thing happened during the rise of the Empire?”\n\n“You pushed the device forward, twisted around, and once more grabbed up your spoon. This time you took several bites. Kylo Ren clearly liked his ice cream, judging by how much he had eaten. You wondered if he often ate sweets. It was better for your intestines if you did not eat too much of the dairy product. Such a shame; it was absolutely delicious. Given that you were on a frozen planet, one would think it odd that you had wanted ice cream of all things.\n\n“I put that I’m opting in for birth control once I transfer. If you want, I have condoms in the drawer for the meanwhile.”\n\n“That would be wise,” Ren conceded. “If they deny your tea request, I will have some imported to you.” You bit down on your bottom lip to keep the cheesy grin from spreading too far. “I will also ensure that your quarters are suitable for my presence for the times I visit.”\nYou had expected as much, though you did not say this aloud. If you brought too much attention to what he had said, and if Kylo Ren realized that it was even remotely sentimental, he would likely shy away. And so you gave a quick nod whilst taking another bite of ice cream. The carton was nearly empty.\n\n“I didn’t realize that the tea helped with men…with cramps,” you commented after setting down your spoon. Ren blinked a single time, the man tilting his head to the side. He did not seem to have known either. Kylo did not mind that you spoke of your menstrual cycle; if anything, he had been relieved that you had started since the pair of you had not thought of using protection when engaging in sex. As a show of his relief, he had had the ice cream carton brought.\n\nThe climate of the base on the other planet would be far warmer than that of Starkiller. You would require a new wardrobe, which you had been informed would be provided. First Order uniforms. That would take some getting used to. It would save some money though. Pros and cons.\n\nAccording to Kylo, you would have more freetime on the new base. You had managed to persuade him to get a tablet of his own. It was due to arrive before the change of bases, which would give him ample time to transfer some of his game data onto it. The applications that you both enjoyed you would now be able to play together. That was something you were looking forward to.\n\n“On two of the forms, I was asked if I was in a relationship,” you said. It was something you had been putting off. Brown eyes flicked over to you, those orbs searching your face. “I said that I was, especially with my request for birth control. There was nothing more indepth than that that I needed to put. But I didn’t want any questions asked.”\n\nA single, slow dip of his chin as he allowed the information to process. He mouthed the word relationship without quite uttering it. Testing the term. It wasn’t too sentimental; Kylo Ren nodded a second time. He commented on how nosey some of the forms were, how unnecessary portions got added for reasons he did not understand. You shrugged, commenting that the First Order was thorough without a doubt.\n\nSince the ice cream was finished, Kylo stood from the bed to set the two used spoons in an area where they would later be taken and the empty carton in the trash. He then grabbed his thermos, the liquid inside cooled enough for him to drink. He referred to it as a cocoaccino—a mixture of hot cocoa and cappuccino mix. The man had quite the sweet tooth in his own way, which you enjoyed. Ren sipped his drink before setting it down on a tray closer to the bed. He then grabbed hold of the device you had been using to fill out the forms. His eyes began to scan all the lines. You appreciated this as well; it was something he had agreed to doing before you submitted everything. Though he was essentially outside the First Order, his contact with them made it to where he would know of any red flags you might mistakenly raise. Incorrect wording of anything could mean more paperwork and delays in the transfer.\n\nThe portions he would be paying most attention to regarded your team members. Though they had been cleared, if you misworded anything, it could mean a delay for them as well. Not to mention increased tensions, which could lead to the flagged individuals reacting poorly and thus causing an execution. You shuddered at the thought. War was far too terrifying for your liking. Precautious, necessary as they were, could lead to far too much confusion as individuals adapted to them.\n\nDrawing your knees towards your body, you rested your arms across them and stared at the man. He looked absolutely bored. It made sense; he was one for action rather than paperwork.\n\n“Do you want a blow-job while you read?” you offered. One annoying thing about being menstrual was an increased libido. His eyes flicked up to your face without delay. “Or do you think it’d be too distracting?”\n“It wouldn’t be distracting,” he shot immediately. You held in a smirk.\n\nMoving into a more comfortable position, the pair of you maneuvered yourselves so that he could read while you began to undo the front of his pants. He shoved one hand down to assist you. So eager, you thought while allowing a smile to form. It made you all the more giddy now that he had accepted the term relationship to apply to what the pair of you had. This is my boyfriend, Kylo Ren. You waggled your eyebrows despite that he wasn’t watching. This is my lover, Kylo Ren.\n\nWithdrawing his cock from his pants, you gave it a single, quick pump then trailed", "num_tokens": 2048} {"category": "olmocr_science_pdfs-adult_content", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-adult_content/part-000-00000.npy", "text": "� depends on:\npunching □ ok to give □ ok to receive □ not ok □ depends on:\npushing □ ok to give □ ok to receive □ not ok □ depends on:\nwrestling □ ok to give □ ok to receive □ not ok □ depends on:\nbiting □ ok to give □ ok to receive □ not ok □ depends on:\nscratching □ ok to give □ ok to receive □ not ok □ depends on:\nsensory deprivation, □ ok to give □ ok to receive □ not ok □ depends on:\ngags □ ok to give □ ok to receive □ not ok □ depends on:\nbreath control and play □ ok to give □ ok to receive □ not ok □ depends on:\nbondage □ ok to give □ ok to receive □ not ok □ depends on:\nsuspension □ ok to give □ ok to receive □ not ok □ depends on:\nchastity devices □ ok to give □ ok to receive □ not ok □ depends on:\nmummification □ ok to give □ ok to receive □ not ok □ depends on:\nMaster/slave □ ok to give □ ok to receive □ not ok □ depends on:\ndomestic servitude □ ok to give □ ok to receive □ not ok □ depends on:\nsexual service □ ok to give □ ok to receive □ not ok □ depends on:\npersonal service □ ok to give □ ok to receive □ not ok □ depends on:\n24/7 D/s □ ok to give □ ok to receive □ not ok □ depends on:\nanimal roleplay □ ok to give □ ok to receive □ not ok □ depends on:\nage play □ ok to give □ ok to receive □ not ok □ depends on:\nerotic roleplay (specify)\n\n__________ □ ok to give □ ok to receive □ not ok □ depends on:\n__________ □ ok to give □ ok to receive □ not ok □ depends on:\n__________ □ ok to give □ ok to receive □ not ok □ depends on:\n__________ □ ok to give □ ok to receive □ not ok □ depends on:\n\ntaboo play □ ok to give □ ok to receive □ not ok □ depends on:\nmindfuck □ ok to give □ ok to receive □ not ok □ depends on:\ninterrogation □ ok to give □ ok to receive □ not ok □ depends on:\nhumiliation □ ok to give □ ok to receive □ not ok □ depends on:\nkidnapping □ ok to give □ ok to receive □ not ok □ depends on:\norgasm control/denial □ ok to give □ ok to receive □ not ok □ depends on:\ncrossdressing □ ok to give □ ok to receive □ not ok □ depends on:\nforced crossdressing □ ok to give □ ok to receive □ not ok □ depends on:\nmedical play □ ok to give □ ok to receive □ not ok □ depends on:\nplay/temporary piercing □ ok to give □ ok to receive □ not ok □ depends on:\nsaline inflation □ ok to give □ ok to receive □ not ok □ depends on:\nstapling □ ok to give □ ok to receive □ not ok □ depends on:\npermanent piercing □ ok to give □ ok to receive □ not ok □ depends on:\ncutting □ ok to give □ ok to receive □ not ok □ depends on:\nbranding □ ok to give □ ok to receive □ not ok □ depends on:\n\n☞ Other play? Be specific! Add your own to this list!<|endoftext|>motley crue sticky sweet lyrics azlyrics.com - lyrics to sticky sweet song by motley crue when she calls me up my voice it starts to shake she says come right over right away oh good, best butt acne treatments pop sugar beauty - sitting spanking sweating violently squeezing into too tight spandex lululemons your butt goes through a lot year round even if your skin isn't, that s my fetish leather pants mel magazine - name paul age 30 from somewhere in canada fetish leather pants why leather pants it's simple i love the way they shine and how they show off, handjobs movies cfnm videos and anal prostate milking - jim was came home from a long day at the office his hot black girlfriend wanted to give him some relief so she decided to give him a killer handjob, fastgames sticky ninja academy - can you become a sticky ninja master try in this unusual platform puzzle game to progress to the ninja heights get through 30 levels defeating enemies to unlock, true stories hot wife blog hotwife and cuckold husband - just came across this incredible hotwife today here e one of her stories today i got two of my bulls visiting while cuckold was on work and he do not know, free hot pants porn best pics 4 you - daily updated free hot pants galleries best pics 4 you com is a free site featuring a large collection of free hot pants shorts hotpants pants porn galleries all, a dictionary of slang s slang and colloquialisms of - possibly the most popular collection of english slang available free online now listing over 4000 words and phrases, the tango entertainment showbiz music viral videos - entertainment showbiz music viral videos may 30 2019 12 59 pm the filmmakers behind amy are in discussions to lead a documentary on rock icon david bowie, search results for yoga pants naked girls - i was strolling around the house when i stumbled upon my girlfriend and her friend practicing yoga the girls wore the tightest and thinnest yoga pants ever which got, the best travel pants for women fashion meets function - millions of female travelers agree these are the best travel pants for women they're versatile lightweight easy to clean and above all stylish, halle berry claims she taught dog to talk and plays sticky - the 52 year old oscar winning actress claimed she taught her dog how to talk and played a game of sticky balls on thursday on the tonight show starring, the rolling stones rinet - the rolling stones now year of release 1965 record rating 8 overall rating 13 snap back into dark mode for just one last shot of completely unoriginal genius, remington rm380 holster list guns holsters and gear - the rigs from sticky holsters are very flexible and allow for carry in a pocket or iwb style a tacky material is used on the outside of these pouches that, our staff goes above our students go beyond adult t shirt - description cotton comfort unisex styling crewneck short sleeve t shirt in black adult sizes s 4xl our exclusive colorful staff appreciation design displayed, the food timeline history notes bread - bread beer yeast the history of bread and cake starts with neolithic cooks and marches through time according to ingredient availability advances in technology, the big bang theory season 3 wikipedia - the third season of the american sitcom the big bang theory was originally aired on cbs from september 21 2009 to may 24 2010 with 23 episodes, under armour boys pennant tapered pants dick s sporting - shop a wide selection of under armour boys pennant tapered pants at dicks sporting goods and order online for the finest quality products from the top brands you trust, nike men s therma flex showtime basketball pants dick s - shop a wide selection of nike men s therma flex showtime basketball pants at dicks sporting goods and order online for the finest quality products from the top brands, spongebob squarepants show news reviews tv com - spongebob squarepants is one of nickelodeon s highest rated cartoons for children and a staple of american television it was created by marine biologist stephen, best peanut butter peanut butter taste test thrillist - which peanut butter is best skippy peter pan jif, sophie monk reveals networks have tried to ban her out of - sophie monk is officially too hot for tv the former bachelorette 39 has revealed that network bosses made her cover up because her 32dd cleavage isn't, join bukkake tv now to see all these japanese bukkake movies - billing services are provided by ccbill or segpay if your credit card is declined by one processor our system will automatically forward you to another, phone sex academy anything goes phone sex - anything goes phone sex i just love sharing my first time stories with you and being the phone sex princess that i am i never like to make up or fabricate them, weather wiz kids weather information for kids - volcanoes volcanoes are not associated with weather but instead are natural disasters what is a volcano a volcano is a mountain that opens downward to a pool, harley davidson motor co brake caliper insert 61400308 - rated 5 out of 5 by drvrmn from h d motor co brake caliper insert i just installed the<|endoftext|>MALE CHASTITY DEVICE HAVING A SENSOR FOR DETECTING PROHIBITED BEHAVIORS\n\nInventor: Iro Arturi, Southport (AU)\n\nNotice: Subject to any disclaimer, the term of this patent is extended or adjusted under 35 U.S.C. 154(b) by 1102 days.\n\nAppl. No.: 13/115,882\nFiled: May 25, 201", "num_tokens": 2048} {"category": "olmocr_science_pdfs-adult_content", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-adult_content/part-000-00000.npy", "text": " shot you a look as he entered. You scowled. He would have to show up before you could leave.\n\n“What are you doing?”\n\nThis he asked the moment you placed your personal datapad into a bag you planned on taking with you. “Going to a friend’s.”\n\n“No.”\n\n“Wh…” You spun around, shaking your head. “Look… You don’t have a say.”\n\n“Here.” The man was completely ignoring what you were saying. This wasn’t anything new. You scowled, wrinkling your nose as Matt shoved something into your arms. A stuffed bantha, you noted. Your arms squeezed the object. It was, from what you could tell, made of the same material that stress balls were created from. “You seem stressed.” Even as he was saying these words, Matt was going for your gaming pad. “It’s within regulations.”\n\nAm I supposed to thank him?\n\nYou were too baffled to do anything at that point. It was not as though you wanted to reject the invitation; you wanted more to come. “It’s not an all-night thing.” You squeezed the bantha, wondering why you were explaining yourself to your unwanted roommate. “I’m going.”\n\n“Why?”\n\n“Because I want to be near other people—“\n“I am another person.” You turned around to face him. The man was scowling, his bottom lip puffed forward as though threatening to form a pout. Your intestines seemed to swoop inside of you. This was followed by a fluttering sensation. Matt drew his knees upwards, rested your gaming pad on them, and transferred his attention onto the game he had opened.\n\nYou scratched your lower back as you stood there, allowing your had to loll back so as to stare up at the ceiling. What were you supposed to do? It felt unfair that you were pressured to experience guilt. This man had forced his way into your life—what the hell was there to feel guilty over? The bantha that was tucked under your left arm released no noise, not offering up any explanation other than its very presence.\n\n“…it’s…girl time, I guess,” you said sullenly. Matt’s fingers paused in their movements, hovering over the controls. “A quick movie…and then I’ll be back.”\n\nThere was no response from him. His legs slunk all the more closely to his body, and he buried himself in the fictional world of the game. You sighed, forced away the guilt, and lifted up the bag you had previously prepared. You set the stuffed bantha on your dresser and patted its head before heading out the door. There was no way you were going to be forced to give up something that, quite frankly, did not happen often for you.\n\nAs you had informed Matt, you remained with your coworker for the duration of a single movie before leaving. The two of you spoke a little, although you each had a habit of bringing up work. The bowls of popcorn were quickly emptied, and you had agreed to host the next meet-up in your quarters. Through your entire walk back to your room, you had wondered just how that would happen. Especially given the fact that your current roommate likely would not leave.\n\nHe was still on your bed when you opened the door. “Since you seem so set on remaining here, I need your contact information.” He snorted, and you knew why this was—it would be too easy to obtain his true name if he gave you this. “Fine. In four days, I’ll be having a friend over for a bit…Girl time again.”\n\n“You want me to be gone?”\n\n“Yeah. I do, Matt.” His lip once more protruded forward, as though the man was insulted. You grabbed the bantha he had given you off the dresser, climbed into bed with him, and laid your head upon the pillow. “Not the entire night.”\n\nSince Kylo Ren was refusing to allow you to report Matt, to kick him out of your quarters, you had decided to make the best of it. This could work…for now. Regardless, you knew that boundaries needed to be set up. It was the only way your nerves weren’t going to be shot—you’d rather not end up in the bathroom nonstop due to stress. Speaking of stress—\n\n“Thanks…for the bantha.” You lifted the stuffed animal enough to display it. Matt’s eyes flicked to the object and then returned to the game. His way of responding was to alter his position in bed; you frowned the moment his ear rested against your stomach. Boundaries, your mind repeated. But you would work on this aspect later.\nInsufficient Concerns\n\nChapter Notes\n\nYou've all been uber amazing and supportive. Thank you for the hit, kudos and reviews. Lately my intestines have been acting up, so I've really been feeling this fic. I'm hoping to have all the chapters I have prewritten uploaded before this month ends--hopefully within the next week to two weeks.\n\nInsufficient Concerns\n\nDespite all the discomfort and, in a way, mayhem that Matt had brought into your life with his actions, you could not deny that you were feeling rather comfortable with him. This, of course, had much to do with the fact that he had given you a gift. Plus, your mind added, he had previously brought you food. Had you not known any better, you would have believed he was attempting to woo you. His lack of sexual advances led you to believe otherwise. Perhaps he desired a mother figure? A sisterly figure? You wrinkled your nose. Given the nature of your cuddling, that would be borderline inappropriate. Still, he was quite obviously seeking companionship.\n\nYou could not deny, either, that you found comfort in his presence due to your own need for human interaction. And he had come to you despite your intestinal issues. While that first night had made you feel rather poorly about yourself, he had since been almost…supportive.\n\nYou chewed on your bottom lip as you mulled this over. It was morning, and realistically you should have either been getting ready for work or else catching roughly another half hour of sleep. Matt was doing neither of these; he was engrossed, as per usual, in the game on your device. Why he didn’t simply use his own device, you did not know. Nor did you much mind at the present.\n\n“Are… I mean…” You ran your tongue along your lips, pinching the edge of the topmost blanket. Matt’s brown eyes flicked to you, remaining a few seconds longer than you had anticipated. It felt as though your heart fluttered in your chest, and your intestines responded in kind. You placed a hand atop your belly, rubbing. His eyes again diverted from the game, this time landing on your current actions. Matt’s index finger twitched away from the device, and the man sat up a little straighter. His leg began to bend at the knee only for him to then straighten it once more. “I know that when… When I get stuck in the bathroom, it smells—I get that. But…”\n\nYou were feeling rather hot, your embarrassment mounting. Matt did not make a single move nor say a word to dissuade you from continuing. And thus you went on, rambling shakily at first before gaining steam. “I always… It’s hard to make friends who are understanding. They say they do at times, but… The looks they give… It’s with disgust or irritation.\n\n“It’s like they think that I shouldn’t be… That I should be ashamed of my own body! And… I am! I kriffing am!” Tears began to well up in the corners of your eyes, and a tightness began to grip your chest. Suffocation. You wanted to sob, yet you held it down. “That’s why… That’s why I kept fighting for you to be… To not be here. Because this is supposed to be my safe space. I should be able to be comfortable here! Not ashamed of who I am!\n\n“And then… the way Kylo Ren walked away when I was giving him a report. All because my stomach made noises…” You curled your fingers, clenching your hands. “He didn’t even hear me\nout when I… He dismisses me as though I’m insignificant!”\n\nMatt slowly blinked, his eyes pinching at the sides and his brow furrowing. “Those are rather insignificant concerns.”\n\nYour jaw trembled, lips quivering as you started to shake. You could not stop blinking. Over and over again, your eyelids descended and lifted in rapid succession. It felt as though he had sucker-punched you; your gut clenching, aching. The gurgling in your intestines only grew. This was followed by a sk-ishhh sound that prompted Matt to reach towards you. You jerked away. Your feet were on the ground, bare to the cold air of the room before you realized what you were doing.\n\nMatt frowned, his expression clearly displaying his stance; he believed you were being unreasonable. You were not going to allow him to make you feel less than you were. Yes, you had made the mistake in trusting him, in believing that he cared about your feelings. You were not about to make it sting worse.\n\nYou instantly began grabbing out fresh clothes. Your stomach was clenching, painfully so. You darted into the refresher with your bundle of clothes in your arms. Flicked on the fan, locked the door, and headed for the toilet.\n\nHemorrhoid cream was your friend. You tilted back your head whilst washing your hands. Blood in the toilet would perhaps have unnerved a number of others, but for you it was…well, normal at times like this.\n\nKriffing stress.\n\nYou finished rubbing the soap along your flesh, rinsed it off, and proceeded to dry your hands on the towel. The smell of inc", "num_tokens": 2048} {"category": "olmocr_science_pdfs-art_and_design", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-art_and_design/part-000-00000.npy", "text": " even processes of a design object, service, or system. This results in people receiving more (information and detail) for less (cognitive load), while also being able to return repeatedly to the design and receive something more in terms of information and benefit.\n\nThis is a theoretical paper that utilizes presented examples to illustrate the multidimensional nature of the relationship between simplicity and complexity. The article progresses by firstly describing simplicity in tangent with its cognitive apperceptive functions of supporting cognitive fluency and affective preference. That is, here simplicity is described regarding the interaction between the design and its properties that are being perceived, and the way in which it is mentally constructed or represented (apperceived). Thus, the way in which the designs are understood, either from the perspective of simplicity or complexity, is also contingent upon how people interpret (mentally construct) the design. This is then followed by an overview of the psychological nature of simplicity as characterized by Gestalt psychologists. The cognitive–semiotic approach to HTI is explained. Here, we elaborate on a proposed cognitive–semiotic model, the model’s structure, and how it is applied to this study. The article concludes with a discussion of the implications for design and theory with emphasis on the relevance of the cognitive–semiotic approach for crossing the boundaries of design disciplines.\n\nThe Cognitive Apperceptive Meaning of Simplicity, Fluency, and Preference\n\nThe discipline of cognitive science has a long history of measuring and defining the parameters of simplicity in terms of cognitive processing, such as (a) the problem of induction—a deep philosophical debate relating to the obtainment of truth or a real understanding of phenomena and its reasoning;\\(^1\\) (b) infinite or endless numbers of patterns (or symbols and sequences) being compatible with finite data sets (Chater & Vitányi, 2003), which can be demonstrated by limitless amounts of curves passing through the same set of finite points, programming logic (differing algorithms to achieve the same programming outcome) and even radically different painting techniques and mark-making (i.e., dots, line drawings, geometrical approaches) that in the end resemble familiar objects and forms; (c) repetition of stimuli (Bornstein, 1989; Zajonc, 2001), seen in phenomena such as the mere exposure effect, whereby through exposure people learn and recognize patterns toward which an attraction is developed; and (d) prototypicality (the ability to connect phenomena to categories\\(^2\\)), semantics (the study of meaning), and ontological categorization—the process of deriving cognitive categories of phenomena (Hekkert & Wieringen, 1990). Cognitive science is a highly interdisciplinary field, combining theories and approaches from psychology, social science, aesthetics, and design, to name a few. In addition to cognition, cognitive science allows the study of the relationships between and among many factors, such as embodied experience or embodiment (physical and multisensory experience), emotions, and, quite crucially, the way in which cultures influence these processes (Norman, 1980). From a pragmatic point of view, cognitive–emotional processes operate in relation to action and what is occurring within the external environment (Dewey, 1938; Dewey & Tufts, 1909; Peirce, 2009). Thus, the senses (sight, sound, touch, smell, and taste) and the subsequent perception through these vehicles serve as the interface between the mind and the world outside the human body.\nThe perceptive processes involve acts of finding patterns in received sensory data and high-level cognition (i.e., indirect or more abstract thinking that involves processes of classification, association, reflection, evaluation against other information held by the individual, as opposed to low-level cognition in which reactions to the external world happen almost instantaneously) require the recognition of patterns of information in order to create and develop categories of meaning (Chater & Vitányi, 2003). The problem of induction accounts for the complexity involved in establishing patterns: Infinite numbers of patterns exist even for finite data sets (Chater & Vitányi, 2003; Saariluoma & Rousi, 2015). That is, through limited tools and choices, the possibilities for differing patterns are unfathomable. For instance, numerous studies have researched the dynamics between decision-making, creativity, convergent thinking, and the ability to generate new solutions from scarcity in terms of limited options or resources (Amabile, 1983; Mehta & Zhu, 2015; Sternberg & Lubart, 1999). To give one example of how numerous patterns or solutions may derive from scarcity, participants of a study (Mehta & Zhu, 2015) involving three resource availability conditions (scarcity, abundance, and control) were assigned a task of solving a problem involving an image of a candle, box of matches, and container of tacks. Participants were required to solve the problem of attaching the candle to the wall through the use of the provided materials, ensuring that the candle would burn properly (in the correct direction) without dripping wax on the floor or table. The results proved that scarcity, or a limited number of resources, is not purely a question of material reality but also mental state. As the study showed, those who were confronted with a scarcity condition clearly displayed higher levels of creativity for correctly solving the problem (e.g., emptying the tack box, tacking it to the wall, placing the candle upright in the box, and lighting it), than the other two conditions of abundance (where people were given a narrative alluding to the participant existing in conditions in which resources were vast) and control (where people were not given any narrative to prime them for any specific conditions). In the control and abundance conditions there was no significant difference in the rate of successfully solving the problem, yet between the scarcity and the other two there was a significant increase in the rate of success solutions. Other examples that physically and informationally demonstrate infinity in finite units include Gabriel’s horn—a geometric figure featuring a finite volume with an infinite surface area (Havil, 2007), and the traditional binary code modern societies live by, the 1s and 0s in computer programming. The reality of infinity in finite units also brings implications for addressing reductionism in design; even decreasing levels of information may stimulate creativity and imagination in the user (Inoue, Rodgers, Tennant, & Spencer, 2015). In other words, while people are surrounded by infinite pieces of data about anything and everything they encounter, it is the smaller sets of information—such as a piece of paper, string and a pair of scissors—that prove most useful and fruitful for undertaking creative activities, such as transforming these materials (the paper and string, with the help of the scissors) into an item of clothing. Thus, to establish limits (in materials and/or information) increases one’s ability to imagine more options for that controlled quantity of resources. This is due to the fact that people are only capable of making sense of smaller chunks of information that align with the internalized idiosyncratic logic of their mental schema (Rugg & Gerrard, 2014; Saariluoma, 2003).\n\nInformation perceived through the senses is not simply understood and experienced through its raw form. That is, what each individual knows about the world is not based on an exact replica of the physical world; rather, the mental world and its contents are\ninterpretations—reconstructions or compositions—combining the perceived sensory information with various types of other mentally bound information and contents, such as memories and emotions (Helfenstein & Saariluoma, 2006). Thus, it is more apt to describe the perception–experience relationship as apperception (Saariluoma, 2005; Silvennoinen, 2017; Silvennoinen, Rousi, Jokinen, & Perälä, 2015).\n\nApperception can be described as “seeing something as something” (Saariluoma, 2005, p. 77). In this apperceptive meaning-making process, already existing mentally based information is integrated with new information obtained through multiple senses and constructed into a meaningful mental representation (Husserl, 1936/1970; Kant, 1787/1998; Saariluoma, 1995, 2003, 2005; Silvennoinen et al., 2015). Experiencing something as something—for instance, microscopic images of snowflakes or even granules of sand (see Figure 2) as complex and intriguing—involves apperceptive attention in detecting meaningful parts of the encountered entity (Saariluoma, 1995). Apperception differs from mere perception in terms of the act in which people mentally represent information contents that are not perceivable by nature, whether in terms of sense data or remembered sensory experience (Russell, 1917/1951) or qualia, the solely subjective qualities that shape the experience for the individual and cannot be entirely communicated to another individual (Jackson, 1982). Unperceivable contents or phenomena additionally include concepts of time, such as eternity or future instances (i.e., tomorrow; Saariluoma & Rousi, 2015). In other words, unperceivable contents cannot be reduced to perceptual stimuli but can be informed by past experiences and ideas of what such concepts may mean. Thus, apperception does not require the occurrence of sensory perception (e.g., Saariluoma, 20", "num_tokens": 2048} {"category": "olmocr_science_pdfs-art_and_design", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-art_and_design/part-000-00000.npy", "text": ", ‘What’s it for? What is it you want to do to me?’ (446)\n\nThis woman wanted to know why the institution wanted to ‘engage’ with her, as it seemed they wished to do something to or for her in a way that assumed they had to make some sort of\nchange in her in a manipulative sense. Lynch brings into focus the politics of engagement, and the tension between meaningful contact and technology of control. As Lynch points out, many museums fail to realise that Clifford’s contact zone is a political space, and that engagement policies unexamined and misused can result in problematic and unequal encounters.\n\nIf cultural institutions like museums are to be viewed as sites and agents for social relevance and for democratic practices, engagement would entail less the idea of institutions reaching out and including others to ensure that visitors participate, and more of the idea that participants will assert their own agency, and make their own choices in the way they use culture and heritage as a resource. These perspectives have been differentiated by cultural policy theorist Kevin Mulcahy (2006) as two forms of democratic process, the ‘democratisation of culture’ (the process by which cultural institutions enable broader access to their programs), or ‘cultural democracy’ (which means releasing agency so people can be culturally active on their own terms). Revised museum mandates make clear their desire to democratise in some way. The ‘democratisation of culture’ has involved developing exhibitions on minority subjects or difficult issues, often involving participation in collaborative processes of peoples ‘othered’ by race, gender, class or ability (Lynch and Alberti 2010; Sandell 2007, Smith et al 2010). But as Lynch and Alberti point out, consciously or not, “Western institutions continue to maintain borders and to privilege particular ways of knowing (2010: 14).” Mulcahy’s ‘cultural democracy’ or the suggestion that ordinary people have real agency in the constructing of cultural and historical knowledge, has had more difficulty gaining acceptance in museums. Many museum staff and managers might not even be aware of the difference between the two perspectives. Their institutions remain ‘invited spaces’ with limited subject positions for participants situated as beneficiaries, where a deficit model assumes that the public has ‘gaps’ which need filling (Cornwall & Coelho 2007 cited in Lynch 2011). How to deal with outsiders who reject the subject position of beneficiary and assert conflicting and contradictory engagements is a challenge that many museum personnel are not equipped to handle.\n\nFiona Cameron has written extensively on the need for museums to develop new ways of thinking about their processes that stress liquidity, pluralism and assemblages (Cameron 2006; Cameron & Mengler 2009). Cameron argues that ‘liquid museums’ offer “models of order where power is dispersed across multiple actors and dispersed sites, legitimising the pluralisation of authoritative opinion, expertise, multiple rationalities, different technologies and techniques for acting (2011, pg. 91).” She suggests that museum workers imagine themselves as part of broader assemblages of actors and processes in the social world, and be observant of the museum’s “emergent possibilities (92).” Cameron’s ideas of liquidity are equality applicable to the engagements of democracy. The ‘messiness’ of democratic practice is a recurring theme in political theory, where it is acknowledged that debates over knowledge can be divisive, conflict-ridden and unruly (Mouffe 2000). Mouffe argues that the political conditions inherent in democracy always involve diverse, and conflicting, alternatives. Mouffe encourages instead an ‘agonistic’ process of democracy wherein irreconcilable differences lie at the centre of human relations. She criticises the idea of ‘collaboration’ as a more worthwhile alternative to antagonistic relations. The discourse of ‘engagement’ appears to idealise democracy as “a world beyond politics” where conflict is a thing of the past, controversial elements are smoothed over and cleansed, and power relations removed (Tkacz 2010, pg.46). Bernadette Lynch suggests, drawing on Mouffe, that museums must acknowledge “passion and partisanship” as a democratic form of museum practice, and that relations between adversaries who can come together to confront difference and power relations is an important part of engagement in the museum contact zone (2011, pg. 453-454).\n\n**Engagement at the Royal Ontario Museum (ROM)**\n\nI was interested in finding out how Canadian museums approached democratisation and engagement, particularly since the challenge and crisis generated by the Royal Ontario Museum’s *Into the Heart of Africa* exhibition of 1989-90. The ROM is Canada’s largest museum, and this controversial exhibit has become a touchstone for the country’s museums. *Into the Heart of Africa* has been described as an early attempt to broaden the museum’s historical narratives to engage diverse audiences. But some African-Canadians viewing the exhibition took exception to the way representations carried unconscious meanings that were offensive to them, and reactions towards the museum and the exhibit’s curator became violent (Butler 2008). The ROM in reaction insisted that\ntheir exhibition benefitted African-Canadians as subjects, and that these few dissidents were threatening the museum’s intellectual freedom (Mackey 1995). The crisis generated by that show was followed by a decade of self-reflection at the ROM, and consultations with implicated stakeholders became a key part of exhibit planning (Exhibit planner interview, Nov. 20, 2009).\n\nThen, in the years between 2000 and 2010, the ROM embarked on a redevelopment called Renaissance ROM, a $280 million dollar project involving the construction of a Daniel Libeskind architectural facelift, renovation of most of its permanent galleries, and generation of a new sense of purpose. The Toronto development was the lead project in what was billed locally as a ‘cultural renaissance’ in Toronto aimed, according to the City’s Culture Plan, “at positioning Toronto as an international cultural capital and placing culture at the heart of the city’s economic and social agenda (2003).” It was also one of a number of high-profile museum expansion projects across the globe in this decade that emerged from this urban cultural planning perspective (Message 2006). The Renaissance project was driven by then-Director William Thorsell who announced in 2007, when the ROM had finished its architectural project, a re-positioning of the museum as an “agora” for dialogue and idea exchange (Thorsell 2007). This vision proposed the ROM as a cultural commons where assembly, debate, and discussion could take place. Late in 2008 the ROM changed its branding logo to ‘Engage the World’ where the museum would “engage the public to explore cultural change and serve as an informed advocate for science and nature (ROM 2009, pg 6).” Engage the World was to be “more than just a new tagline—it summarized the overarching philosophy of the new, revitalized ROM (Ibid).”\n\nTo what extent did the ROM’s claim to engagement indicate a strengthened dedication to a democratic positioning? To assess this possibility, I undertook a study of the ROM exhibition Dead Sea Scrolls: Words that Changed the World (DSS) opened in 2009 within the strategic mission to ‘Engage the World.’ The study was part of a broader research project that inspected the ‘publicness’ of the museum’s organisational structure, processes and relationships (Ashley 2011). The ROM had declared in its news release that this exhibition was the most significant project in the ROM’s recent history, and it was to serve as an exemplar for the ROM’s new planning procedures for blockbuster exhibits. The DSS exhibition enabled particular scrutiny of the extent to which the ROM had re-thought exhibitionary ‘engagement’. Did it imply new ways of thinking about the ROM’s relationships to its publics?\n\nIn this section I explore the ways that the museum’s departments deployed the word ‘engagement’ in planning the exhibition, and how divergent understandings of the word affected the forms of democratisation demonstrated on the ground. Analysis indicated mixed and conflicting impressions of how and why the Dead Sea Scrolls exhibition should engage. For example, the comparison of the objectives for the exhibition as set out in the project planning document, the remarks expressed by visitors or curators or marketers, and what was actually presented, indicated differing and conflicting attitudes about the public nature and purpose of that exhibit. Different interpretations brought scientific, social, market-oriented and interactive perspectives on the word ‘engagement’. But when engagement was interpreted by political activists to mean drawing attention to social and political issues—in this case Palestinian claims of ownership of the scrolls—the museum and its exhibition were taken into another realm of ‘contact zone’. I argue that a more radical and high-risk positioning of engagement, while not embraced by the ROM, offers the museum transformative potential. Such a positioning must involve the recognition of engagement as an agonistic political field, and museums as potential arenas for making public the perpetual struggles and irreconcilable differences that are intrinsic to processes of democracy.\n\n**The Dead Sea Scrolls Project**\n\n1 The study involved the review of internal and external documentary materials about the DSS exhibition, observations of the exhibition and visitors, and semi-structured interviews with staff, audiences and various outsiders. Documentary data included museum-wide Board policies and annual reports; DSS-specific project brief, minutes, exhibition planning reports and marketing/press materials; and external media and interest group reports and news items. Sixty-nine interviews were conducted over the course of the broader research project, including the nine staff members and volunteers cited here and ten visitors who specifically came to the Dead Sea Scrolls exhibit", "num_tokens": 2048} {"category": "olmocr_science_pdfs-art_and_design", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-art_and_design/part-000-00000.npy", "text": " frugally financed from surplus funds also made it possible for CIT to utilize a rich granite façade. The granite sections of the building's face are 2 inches thick, set in stainless steel frames, and given the latest curtain-wall treatment. The cost of this polished, conservative facing was $382,500 ($8.50 per square foot) as against an estimated $270,000 ($6 per square foot) for an embossed aluminum façade of the same area.\n\nThe building's richness is more than skin deep. It extends from the unusual ceiling height (9 feet, 3 inches) to the floor-to-ceiling doors; from the deep narrow windows between hidden columns to the executive-style greenery on the eighth-floor roof terrace and second-floor setback. The building plan provides for a one-third expansion in the company's size. Another unusual feature: the entire second floor is devoted to employee facilities (27,000 square feet out of CIT's net total 284,000).\n\nBut even with such custom features Vice President Ittleson figures that CIT's space is reasonably economical. One explanation for his satisfaction is that the firm is not paying the high rentals of other recent New York buildings. Nor is it paying interest on a heavy building loan; the entire construction cost (about $10 million) was paid from capital surplus. In addition, CIT's management feels there are large intangible rewards in the building's fine quality and in the pride with which its employees view their new home.\n\nIn a day of mass production, CIT has invested in a custom-made palazzo. Its new headquarters is peculiar, but only in the best sense of the word.\n\n**Ground-floor reception room** of its own was one of CIT's goals when the building was in the planning stages. The lobby's curved walls of light marble and its arched ceiling provide a welcome contrast to the rectilinear precision of the exterior.\nAt night the building looks more like a jewelry display case than an investment house. Even the sidewalk has built-in sparklers: mica and carborundum chips set in concrete. CIT's generous employee facilities are located on the indented second floor, above the offices of the building's only tenants, New York Trust Co. and E. F. Hutton & Co.\n\nEmployees eat in three shifts in the brightness of their second-floor cafeteria, operated by Schrafft's. The cafeteria can be separated from the lounge and library (foreground) by means of a floor-to-ceiling folding door (recessed at right).\n\nExecutives dine in a formal dining room on the second floor. CIT's new elegance is more obvious here and in the wood-paneled executive suites on the top floor than it is in other areas.\n\nPerimeter offices have flush, conservatively draped walls and deep-set windows with wide sills. For easy cleaning, windows are vertically pivoted. Fluorescent lighting is recessed in the ceiling.\n\nTypical floor plan shows how perimeter offices lap around a central bull-pen area. At either end of the L-shaped plan are stairways and employee restrooms. The sketch of an outside bay (right) shows a system of three exterior columns teamed with two interior columns. Blank wall sections, interposed between the exterior columns, reduce the glass area and thus lighten the air-conditioning load.\n2. A tall tower for TIME Inc.\n\nThe projecting columns of Rockefeller Center’s latest addition will support 47 big floors. Behind the glass façade, a new approach to office layout.\n\nBy the end of the board of directors’ meeting on Nov. 30, 1955, the most important decision had been made. TIME Inc. would stay in New York, would find or build itself the best possible commercial space in midtown Manhattan. Last month foundation pouring began for the building that, in the eyes of its owners, architects, and major tenant, will fulfill that objective. Scheduled for occupancy late in the autumn of next year, Rockefeller Center’s new TIME & LIFE Building will rise 47 stories tall from the west bank of the Avenue of the Americas at Fiftieth Street, boasting the largest tower floors built in New York since the war.\n\nAlthough the projected giant has obvious origins in the shapes and attitudes of other Rockefeller Center towers, it contributes much more to the art of city-making than a careful choice of antecedents. Not only will it have vast area per floor (32,000 gross square feet) and an extraordinarily broad free span from core to exterior wall (see sketch below); the building also represents a unique idea for the design of office space. The so-called bay plan (see p. 98) eliminates one of the two conventional ring corridors found in many skyscrapers, promises to save TIME Inc., which will occupy 20 floors, a full floor of space.\n\nThe second most important date in the development of the building was Aug. 31, 1956. It was then that Rockefeller Center bought the Roxy Theater, which shares the block with the TIME & LIFE site. New York City’s zoning law demands that a building’s upper floors (above 19) cover no more than 25 per cent of its site. Managers of the new TIME & LIFE Building were able to side-step this restriction.\nA model of the new TIME & LIFE Building fits comfortably into a view of Rockefeller Center from the northwest.\nby expanding the “zoning envelope” through an agreement with the Roxy’s purchasers. The agreement gave the TIME & LIFE Building added tower space equal to 25 per cent of the Roxy plot (12,000 square feet). Endowed with greater freedom, the building is designed by Harrison & Abramovitz & Harris to soar some 587 feet, straight up.\n\nThis month, with a good year and a half of construction still to go, leases have been signed for 85 per cent of the total 1,525,000 square feet of rental space. Thus one of the hobgoblins of New York’s real estate is permanently laid to rest.\n\nThe traditional belief was that the Avenue of the Americas, along which the Sixth Avenue Elevated once rattled, could never be overcome as a psychological barrier to the westward development of high-cost buildings.\n\nThe TIME & LIFE Building’s decisive beachhead across the avenue clears the way. It opens a wide frontier for an expanding city. And it gives a forceful impetus to Rockefeller Center’s open space philosophy (see page 106).\n\nThe new building also represents a new departure in Rockefeller Center economics. TIME Inc. will join as a 45 per cent partner in the $70-odd million undertaking—the first time a Center tenant will have shared in equity financing. TIME’s urge to participate was a result of several elements. Not the least important was confidence in the Center’s approach to the real estate business as observed at close range during 20 years of tenancy in the old TIME & LIFE Building, 9 Rockefeller Plaza.\n\nAnother element was TIME Inc.’s desire partially to fill the gap between the prewar rent it has been paying (about $3.50 per square foot) and the estimated rent it will pay (in the neighborhood of $7 per square foot), by means of an income-yielding investment in the building.\n\nTIME Inc. thereby took on a two-hatted role: one part of its management got busy working out the details of the building enterprise with Rockefeller Center; another group began thinking about the creative challenges offered by the prospect of a new home.\n\nTo cope with the latter task, TIME Inc. marshaled a squad of commit-tees comparable to the successful, energetic building committee of Connecticut General Life Insurance Co. (FORUM, Sept. ’57). An early committee function was to draw up a short list of desired features. Heading the list: exterior columns should not project into perimeter office space (a flush wall had long been wanted both for appearance and for ease of shuffling interior partitions); modular design should be used.\n\nAnother of the suggestions made by TIME Inc. to the architects was to try an “accordion wall”; i.e., a striking façade of in-sloping windows, out-sloping spandrels (see model and mock-up, right). The objective was to get the best possible internal space. The accordion design sought to give office holders three benefits: less glare; sunshade; a “control tower” feeling of full visibility. The suggestion had a lively run but was finally retired. Against it were three drawbacks: the architects did not believe it could be made handsome; there was a loss of rentable area; some minor difficulties in drapes and air-conditioning ducts were involved.\n\nThe most important feature of the accordion wall was retained, however: the exterior structural columns (see sketch at right). Limestone faced, strongly vertical, they offer an opportunity for visual tie-in with the rest of Rockefeller Center. They will also leave perimeter offices free of the usual, elbow-nudging intrusions.\n\n**Tower of glass**\n\nBetween the columns is a distinctive aluminum and glass grid; in every 28 feet there will be five 4-foot 8-inch window modules and one blank column module. To cut down the air-conditioning load, the windows were originally drawn small and square. But, for esthetic reasons, the sills were lowered to desk height (2 feet 6 inches), which also made it possible to sheathe the spandrels in single sheets of glass. The clear glass spandrels are backed by gray aluminum mesh, intended to look like the equally clear glass of the windows.\n\nSecondary vertical features are the twin air-conditioning risers in each bay (see sketch). These service the peripheral air-conditioning\nEarly experiment: The accordion wall was considered at one point in the façade’s development. The lower view is a full-scale mock-up of the model at top. It proved to be", "num_tokens": 2048} {"category": "olmocr_science_pdfs-art_and_design", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-art_and_design/part-000-00000.npy", "text": "05; Silvennoinen, 2017). Further, certain patterns of information are easier to recognize cognitively than others (Chater & Vitányi, 2003). Mach (1959) suggested that perhaps the human cognitive system both should and does prefer patterns that present data in simple descriptions, such as the bullet point lists of recipes, headings and subheadings, or even images containing a few clearly defined objects or actors without too much clutter. Descriptions such as seen in the example of headings or subheadings enable the reconstruction of data, whereby the level of simplicity or complexity is defined by\n\n![Figure 2](https://www.sandgrains.com)\n\n**Figure 2.** When sand, which is typically understood as uniform in composition, is magnified, the heterogeneity of the substance becomes evident. This figure shows some components from a magnified sand sample. (Permission to reprint from www.sandgrains.com)\nthe description’s length. That is, the longer a heading and/or its subheading is, the more complex the text is to comprehend. Thus, in terms of cognitive processing, the shorter the heading (data code or description), the less redundant the representation and the easier it is not only to comprehend but also remember (Attneave, 1954; Barlow, 1959). This rule applies equally to machines as it does to human beings (Watanabe, 1960). Thus, people’s cognitive systems prefer patterns that give the shortest codes of data, and these data codes, such as simple shapes (e.g., triangles, circles) are most easily recognized against perceptive noise, such as clutter or too many figures and objects in an image (Chater & Vitányi, 2003; Hochberg & McAlister, 1953; Van der Helm & Leeuwenberg, 1996).\n\nHowever, although the cognitive system prefers patterns that comprise shorter code, it also can be seen that people (and their sensory systems) are attracted to patterns that give the most information in understandable packages. For example, research has revealed that people are more likely to gaze at informative areas of objects, scenes, and other phenomena, that is, the areas revealing the most information about the art or design, such as two or more people in an image who are interacting (Antes, 1974; Loftus & Mackworth, 1978; Mackworth & Bruner, 1970; Mackworth & Morandi, 1967; Pollack & Spence, 1968). This means that people are cognitively predisposed to gaining as much information as possible in as concise a way as possible. This phenomenon functions in favor of simplicity and has been researched in design aesthetics through the concept of the maximum effect for minimum means principle (Hekkert, 2006). It should be noted that, from an experiential perspective, for example, the areas of an image or scene that are deemed informative (i.e., with more detail in terms of objects and characters and, for example, reference to a narrative or action) also are the areas that comprise areas of physical discontinuity or surprise and somehow offer “something more” in relation to the rest of the image (Mackworth & Morandi, 1967; Yarbus, 1967).\n\nFrom an information processing point of view, simplicity can be considered as the ease of interpretation. Devices that capitalize on simplicity in the design process are, for instance, prototypes and mashups (i.e., the assemblage of various elements to represent a design idea). Prototypes and mashups are, by nature, materialized versions of ideas and concepts that demonstrate the form and potential product envisioned by the end of the design and development process (Garrard, Lambon, Hodges, & Patterson 2001; Rugg & Gerrard, 2014). These can be seen in paper prototypes, three-dimensional printed prototypes and sketches, and/or even collages of various elements, including images and materials that attempt to convey ideas of values and emotional qualities (such as in the case of mashups). Without these material manifestations, ideas remain on the abstract level of thought and are open to unlimited interpretations by individuals encountering the concepts. Through embodying ideas, that is, giving physical form to concepts, there is the possibility to generate a common understanding among people regarding the concept in practice. Moreover, prototypes are easier on the mind of those to whom the designer is wishing to communicate than are verbal descriptions. For example, in icon design, a prototypical icon for printing with only the most essential visual features displayed is easier and quicker for the viewer to cognitively grasp than a printing icon with highly complex and detailed visual features (particularly when the features are not necessary for communicating the icon’s represented function). Prototypes allow others to experience design concepts as well as to afford the possibility of the concept being experienced as aesthetically pleasing through the beholder’s ability to simultaneously understand the object and utilize various cognitive\nprocesses involved in appreciation and imagination (Winkielman, Halberstadt, Fazendeiro, & Catty, 2006; Yu, Benatallah, Casati, & Daniel, 2008). Prototypes and aesthetic appeal have been found to be intertwined when experiencing paintings (Hekkert & Wieringen, 1990; Nedungadi & Hutchinson, 1985) and furniture (Whitfield & Slatter, 1979). However, according to Reber, Schwartz, and Winkielman (2004), while processing fluency can predict aesthetic appeal, several other processes contribute to relative preferences for complexity. For instance, the repetition of a stimulus that was either unknown or experienced as neutral at the beginning can enhance the likelihood of people developing a positive relationship with that stimulus (Bornstein, 1989; Lane, 2000; Zajonc, 2001). This principle has played a major role in advertising, marketing, and brand building for decades (Belch, 1982; Campbell & Keller, 2003; Mitchell & Olson, 1977; Schumann & Clemons, 1989). For example, repeating stimuli to increase its likability has been found to work in a variety of stimuli, such as faces, words, and melodies (Bornstein, 1989). However, this effect cannot be generalized to more complex relationships between people or between people and objects. For example, it does not possess explanatory power to explicate how exposure to one’s husband’s face in a 20-year marriage affects the probability of liking or disliking of one’s husband. Thus, this effect does not take into account established long-term affective relationships with complex meaning structures between people and between people and objects, but applies to more simple settings in describing cognitive processing fluency (in terms of repetition) in increasing affective responses in short-exposure times with fairly unknown stimuli.\n\nHowever, this effect for less complex stimuli is known as the mere-exposure effect (see Zajonc, 2001), is influenced by the number of times a person is exposed to the phenomenon. Consequently, while repeated exposure has been found to steadily enhance the level of liking of a particular product, Van den Bergh and Vrana (1998) noticed an exposure threshold at around nine presentations. Subsequent presentations after this threshold result in a decline in the level to which a person favors the stimulus (Van den Bergh & Vrana, 1998). This effect is also influenced by the complexity of the stimuli: The more complex the stimulus is, the greater the number of presentations a person can endure before experiencing a decrease in fondness or an increase in disinterestedness, boredom, or dislike (Bornstein, Kale, & Cornell, 1990). Even though a more simplistic stimulus is easier to process, the dynamics of the mere-exposure effect indicate the necessity for complexity in meaningful experiences of repetition.\n\nThe Aesthetics of Simplicity in Gestalt and Experimental Psychology\n\nFrom the cognitive to the psychological, the issue of simplicity plays a major role among Gestalt psychologists in their quests to ascertain the objective determinants of aesthetic beauty. The notion of beauty is broad and much contested (Münsterberg, 1909; Soderholm, 1997; Zuckert, 2007). In fact, due to its subjective nature and vast array of interpretations, understandings, and preferences demonstrated throughout societal dimensions such as culture, technological development, and social construction (the type that occurs through, e.g., the mere-exposure effect [e.g., Bornstein, 1989] of advertising and trends), the quest of defining objective determinants of beauty is highly criticized particularly in the fields of art and design (Ostrow, 2013). Beauty was typified by historian George Bancroft as being “the sensible image of the infinite” (cited in Hotchkiss, 1895/2009, p. 22). Questions surrounding\nbeauty have regarded its definition, components, whether or not there is a universal beauty, and the types of physiological, sociological, and psychological effects associated with experiencing it (Danto, 2003). In particular, researchers in the field of aesthetics continually seek to describe and determine the principles involved in the experience and understandings of beauty (Chandrasekhar, 1987; Jacobsen, Buchta, Köhler, & Schröger, 2004).\n\nThus, this section", "num_tokens": 2048} {"category": "olmocr_science_pdfs-art_and_design", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-art_and_design/part-000-00000.npy", "text": "illa war served as an analog for cultural rivalry, peasant resistance as a model for Arte Povera’s renunciation of consumerism, and Vietnam as a metaphor for university protests.\n\nCelant’s desire to dismantle the barricades between art and life, between politics and aesthetics, was short-lived, however. Arte Povera’s metaphorical armed struggle prefigured actual violence, and once the utopian ideals of 1968, which Celant’s writings anticipated, degenerated into the dystopian reality of the bombings, assassinations, and terrorism of the early 1970s, Celant’s prophetic words of 1967 accrued a more sinister meaning, when he spoke of “A revolutionary existence becoming terror.” The violent rhetoric of Celant’s early theorizations of Arte Povera, which invoked anarchist thought and spoke of the viewer being “truncheoned” by the aesthetic assault of the artists, was recanted once the student battles gave way to real violence and Arte Povera achieved international recognition. The fact remains, however, that Celant has spoken of the “undeniable” reciprocity between Arte Povera and politics, and his theoretical framings of the group were inextricably linked to Italy’s political background, with both the founding manifesto and his call for the group’s dispersal in 1971 enmeshed in its\n\n7. As Massimo Teodori writes, “During the 1960s a new wave of anti-Americanism went through Italian politics and society, fostered by the protest movements which originated in the U.S. itself. Both the traditional Communists and . . . different credos, Marxist-Leninist, Maoist, Trotskyist, thirdworldist, took the variegated world of that protest—the student revolts, the campaigns for civil rights and against poverty, and the opposition to the war in Vietnam—for something similar to a revolutionary movement of a Marxist and Communist left.” Massimo Teodori, _Maledetti Americani: Destra, sinistra e cattolicì: storia del pregiudizio anti-americano_ (Milan: Arnoldo Mondadori Editori, 2002), p. 85.\nrespective potential and failure to respond to the contemporary social situation.\\textsuperscript{9} Arte Povera therefore had two interrelated political agendas: a real art-world battle against American hegemony and a romanticized revolution that legitimized this insurgency. Added to this was the group’s own delicate and occasionally divisive internal politics, with Celant’s tendency to speak on behalf of the artists causing friction among the members of the collective. Even if they shared a political position—one that was often ambivalent—the gap between Celant’s critical and curatorial ambitions and the artists’ individual agendas made this a fragile alliance.\n\nThis article explores these issues and the political dilemma for Italian artists of the period against the backdrop of the growing outrage over the Vietnam War, student riots, workers’ strikes, and the beginnings of terrorism in the country. The recent resurgence of interest in and rapid translation of political philosophers such as Antonio Negri and Paolo Virno—who began as founding members of the radical political group Potere Operaio (Worker’s power) during this period—suggests that a reappraisal of Arte Povera in terms\n\n\\textsuperscript{9} Germano Celant, \\textit{Arte Povera/Art Povera} (Milan: Electa, 1985), p. 15.\nof its relationship to politics is overdue. Now, more often eulogized than analyzed by authors either unwilling or unable to critically examine the group, Arte Povera may accept a richer reading through reincorporating a historical framework that reframes it in a social and political context. This task is complicated, however, by prevalent formalist and apolitical readings of Arte Povera that have championed style over substance, presupposing something innately Italian about it—a condition that Roland Barthes has termed “Italianicity.” An example of this approach, which describes Arte Povera as if it were another over-aestheticized but beautifully designed Italian export, along with Alessi appliances and Illy coffee cups, is the following: “Above all, they are Italian in their ability to present images which, however ‘ordinary,’ are handled with uncanny ‘style.’” However, privileging the aesthetics of Arte Povera to the exclusion of more contentious issues may in itself be symptomatic of a problematic political background. As Claudio Fogu has argued, the construct of an innately Italian sense of style may well be the most durable and insidious legacy of Fascism: “Lest we want to give in to that dangerously essentialist notion that Italians have style in their blood, we cannot but recognize that this cultural construct . . . might be the most enduring legacy of Fascist modernism.”\n\n*\n\nCelant’s rhetoric was indicative of a youth movement that, as Paul Ginsborg has argued in his history of postwar Italy, accepted “a dangerously casual attitude towards violence, adopting contemporary South American and Asian liberation struggles as their models, with little reflection on their applicability or likely consequences in the Italian situation.” Celant’s appropriation of the model of Asian and Latin American urban guerrilla movements for his manifesto was an analogous position to the one that would ultimately be taken up by “red terrorism,” with a two-volume study of the Tupamaros published by Feltrinelli becoming “a\n\n10. See, for example, Grey Room 21 (Fall, 2005), which published an interview with Paolo Virno and translated several of his texts. Antonio Negri’s collected writings from the 1970s were recently published as Books for Burning: Between Civil War and Democracy in 1970s Italy, trans. Arianna Bove, Ed Emery, Timothy S. Murphy, and Francesca Novello (London and New York: Verso, 2005), while Sylvere Lotringer and Christian Marazzi’s 1980 collection of essays, Autonomia: Post-Political Politics, was reissued by Semiotext(e) in 2007.\nsort of do-it-yourself manual for the early Red Brigades.”\n\nCelant’s original conception of Arte Povera referenced Marx and served notice of a rejection of “consumer society,” eschewed the debased role of the artist as producer, and criticized Pop art and “primary structures.” While the language of Celant’s writing is often opaque, and his politics vague, certain affinities can be established. The oppositional stance of Celant’s texts on Arte Povera, for example, which link cultural hegemony to broader socio-political issues, is reminiscent of the writings of Antonio Gramsci, whose *Quaderni del Carcere* (*Prison Notebooks*, 1948–51) called for a successful revolution to be preceded by a war of ideas, and posited the utopian possibility that politics could be influenced by art and culture.\n\nCelant’s characterization of Arte Povera reflects Italy’s struggle to reconcile and adapt to its transition from a relatively impoverished and predominantly agrarian country ravaged by World War II to the rapidly industrializing nation propelled by the Marshall Plan–backed *miracolo italiano*, or economic miracle, in the late 1950s and early ’60s. Together with American aid, the growth of companies such as the Turin-based automobile company Fiat (which by 1967 was selling more cars in Europe than any other company) and other firms such as Olivetti and Zanussi contributed to Italy’s burgeoning foreign trade. Yet this “miracle” caused Italy a great deal of social tension and upheaval. A case in point was the dislocation engendered through the geographical and economic schism of mass migration from the poor South to the rich North. This diaspora was documented in Luchino Visconti’s *Rocco e i suoi fratelli* (*Rocco and His Brothers*) of 1960, which juxtaposed the harsh reality of the North’s newfound prosperity against the South’s pool of cheap labor. Visconti’s modern fable was a testament both to the dramatic transformation that Italy experienced during this time and the struggle for some of its populace to keep pace with this change.\n\nL’USA usa: *From Venice to Vietnam*\n\nIn 1969, Emilio Prini produced *L’USA usa*, a play on words that translates as “the USA uses.” The work consisted of a tape machine that continuously recorded the sound of its own mechanism until this incessant usage caused it to self-destruct, echoing the cannibalistic aspect of capitalism. If we rewind to the emergence of Arte Povera, it must be foregrounded against two situations in Italy\n\n15. Ibid., p. 362. During the late 1960s and early ’70s in Italy, there was a groundswell of interest in this guerrilla group. See, for example, Oscar José Dueñas Ruiz and Mirna Rugnon de Dueñas, *Tupamaros* (Milan: Sapere, 1974); and Alain Labrousse, *I Tupamaros: la guerriglia urbana in Uruguay* (Milan: Feltrinelli, 1971).\n\n16. The first edition of Gramsci’s *Quaderni del Carcere* was arranged according to the subjects Gramsci pondered during his imprisonment, and included the role of the intellectual, the party as “modern prince,” and the “national-popular” tradition in Italian history. The definitive critical edition was published in four volumes as Antonio Gramsci, *Quaderni del Car", "num_tokens": 2048} {"category": "olmocr_science_pdfs-art_and_design", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-art_and_design/part-000-00000.npy", "text": " Price’s Fun Palace. The success of the image of the scheme lies, then, as Banham argued in his critique of the finished building, in ability to construct a very large building in the spirit of Giedion’s new monumentality, one that asserted a monumental image without the monument’s stability or claims to permanence. Yet the scheme did so without resorting to the tactics of clustering and modular growth that sponsored the terraced urban landscapes of Erickson and Safdie; rather, it shamelessly asserted a very urban façade reminiscent of such monumental mise-en-scènes as the Palazzo Farnese in Rome. This paradox was underscored by the fact that at the end of the 1960s, the tactics of urban terracing and metabolist aggregation behind many of the anti-monumental schemes now represented, as Porter pointed out at the time, “the desire to have an opportunity for a massive architectural expression.”\n\n---\n\n89 Piano, Rogers, and Picon, Du plateau Beaubourg au Centre Georges Pompidou, 12.\n\n90 This point is made in Cohen, “Monuments for a Mass Cult,” 25.\n\n91 Gregory Ulmer has recently discussed this paradoxical aspect of the information monument and the way information might enable the construction of a kind of “new monumentality.” See Gregory Ulmer, Electronic Monuments (Minneapolis: University of Minnesota Press, 2005).\n\nSources and contradictions of the competition scheme\n\nThe competition scheme’s amalgamation of cool, generic shed with hot, media-saturated frame reflects contradictions among its precedents. Where the vast interior floor plates and simple geometry has roots in research into the serviced shed and industrialized building by Rogers, Foster, and other British and American architects, the sweeping technological utopianism and pop imagery was rooted in the work of Archigram and Price. Rogers would certainly have known Price through the AA, where they both taught and where earlier Rogers was a student, but Price’s ideas were in general circulation among intellectually ambitious young architects in mid-1960s London, where he had acquired an almost cult status. Archigram was part of the same group of like-minded young architects, all contemporaries. From this segment of the British scene emerged ideas and forms that offered Rogers a framework for attacking the brief. But although they all shared an interest in technology, these sources also were the source of contradictions and paradoxes that demanded a closer consideration of architecture’s role in the information society.\n\nPrice was the most eloquent spokesman for what Royston Landau called the “problem-solving” approach, the search for a “value-free” and image-neutral architecture\n\n---\n\n93 Most observers writing in English point out the scheme’s debt to Price’s Fun Palace. As Rogers later put it, the project reflected the optimism of the 1960s and he openly cited Price and Archigram in their “importance of movement, flexibility, the playful character of their colorful assemblages, and the transformation of services into a free and tentacular system pushed to the envelope of the building, already present in the Fun Palace of Price, in Plug-In City, or in the project of Archigram for Monte-Carlo.” (Piano, Rogers, and Picon, Du plateau Beaubourg au Centre Georges Pompidou, 15.)\n\n94 Appleyard provides a thorough survey of the UK scene of which Rogers was a part. See Appleyard, Richard Rogers, 181–85.\n\n95 Cook and Rogers were one year apart as students at the AA.\nunderstood as a “problem-understanding and question-asking process.” Price had launched this search in response to what he described as the “transference of pre-war attitudes to post-war conditions” and the concomitant failure of architects “to realize that they are primarily concerned with providing a socially acceptable commodity.” Postwar British architecture had responded to its situation by re-asserting values from an earlier modernism—whether the everyday realism of people’s detailing, the assertion of architecture’s classical roots, or a return to the modern masters—none of which adequately responded to a new condition, “a three cornered situation between the ‘apparent soulless, faceless entity of the vast state and local government client’, the ‘multitude of anonymous, homeless people’ and the architect.” This “three cornered situation” transferred well to a French bureaucratic apparatus in the process of adjusting to critiques of top-down cultural policy in the post-1968 context, in which the building’s sponsors became an administrative abstraction and the “real” client was the user.\n\n\n97 Quoted in Porter, “A Value-Free Architecture,” 541. Porter took stock of the situation in 1970: “It is about a determined effort by a small number of architects, mainly in Britain, to rid the procession of some of its hallowed values. It is a polemical stance; a reaction to a set of inherited values which, seen from within the profession, are inherent in the architect’s responsibility to society, but are in fact, a mere encumbrance that prevent the architect from coming to terms with the true nature of contemporary society.” (Ibid., 451.)\n\n98 Ibid.\n\n99 Lombard’s programming team further confused these categories because, from the perspective of the architects, it represented (and abstracted) both the client and the end-user and kept the architects at a distance from both.\nAt the heart of this approach were the mantras of change and indeterminacy. A supple and flexible architecture was the only suitable response in a problem-solving approach since preconceived solutions and prior forms imposed already obsolete and petrified configurations onto dynamic realms, and stopped them in their tracks.\\(^{100}\\) In place of enduring monuments, buildings should be opportunistic and responsive to particular problems and situations, all of which would last only a few years at most. As Landau pointed out, “The importance of being able to accommodate the problem of change with a suitable hardware is basic to [Price’s] philosophy, which implies the need for seriously questioning that time-honored attitude to an architectural cornerstone principle which equates design excellence with top-quality long-lasting materials.”\\(^{101}\\)\n\nPrice’s work also provided Rogers with ideas about institutional reform through technology that meshed easily with those of the brief. In an introduction to a workshop on “New thinking for new universities,” Price brought to the question of university building in the postwar era the very same invocations of populism, information, and flexibility that Rogers brought to Beaubourg five years later.\n\nThe concept of the University as a self-contained self-renewing entity is questioned. The translation of such a medieval idea into architectural terms results in the construction of impermeable, monumental\n\n\\(^{100}\\) Buckminster Fuller is an extreme example of a modernist belief that fusing operational needs and operational techniques would lead to pleasure and beauty of forms and would result in a quasi-biological condition; no intervening mental operations on the part of the architect were necessary or even desired. (See Alan Colquhoun, “Typology and Design Method,” Perspecta 12 (1969): 71-74.)\n\n\\(^{101}\\) Landau, New Directions in British Architecture, 77. Banham provided a convenient tie-in between the broad notion of an architecture that dealt with change through the rejection of permanent, durable materials, and the idea of a shift from defining of volumes and enclosure to technologies of servicing, whether services supplied air or information. His famous essay, “A Home is Not a House” of 1965 argued that, as Landau put it, “it is not the castle character of the dwelling that people are addicted to [...] but rather the comfort standards produced by the new, better, and more efficient servicing.”\nstructures. [...] ‘A collection of books’ must be replaced by a knowledge supermart. The university should be local and national. Available methods of teaching and information exchange are best served by a network of universities in their present form. ¹⁰²\n\nCertainly, the rhetoric of the competition entry text owed much to these ideas, and the cross between “a computerised Times Square and the British Museum” was not far off Joan Littlewood’s “university of the streets” (a moniker for the Fun Palace, and one that Rogers later borrowed when later talking about the project) and which Rogers later borrowed. ¹⁰³\n\nIn contrast to Price’s architecture of problem-solving and performance, the work of Archigram offered an approach in which architecture’s role was to give concrete form and apprehensible image to contemporary technology. Archigram did so by merging Pop and Science Fiction imagery with the technological utopianism of Fuller. ¹⁰⁴ The image-conscious work of Archigram drew upon the logic of advertising, the importance of which as a new form of information had not been lost on their mentors. To the Smithsons and the Independent Group, as Nigel Whiteley observes, “[a]dvertising represented dense, direct, and effective communication, and was strong in imageability.” ¹⁰⁵ In 1956, the Smithsons argued that advertisements “are packed with information—data of a way of life and a standard of living which they are simultaneously inventing and\n\n\n¹⁰³ Piano and Rogers, “A Statement.”\n\n¹⁰⁴ The most complete overview of Archigram and these ideas is Simon Sadler, Archigram: Architecture Without Architecture (MIT Press, 2005).\n\n¹⁰⁵ Whiteley, Reyner Banham, 134.\ndocumenting. [...] And this transient thing is making a bigger contribution to our visual climate than any of the traditional fine arts.¹⁰⁶ In one way, then, work of Archigram, like", "num_tokens": 2048} {"category": "olmocr_science_pdfs-art_and_design", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-art_and_design/part-000-00000.npy", "text": " severe mental and physical disabilities.\n\nBesides that, there are also benefits like child allowance (Japan Statistical yearbook 2004: p.640), established in 1972, with the purpose of achieving stability for families with dependent children and helping them to bring up healthy and better qualified children. And, there are benefits which do not directly go to children, but had an effect to children welfare, such as health and medical care (including maternity benefits) and family allowance (including income support for single parent family).\n\nThe Child Welfare Law underwent large-scale revisions in 1997. The revised law (http://www.sg.emb-japan.go.jp/JapanAccess/welfare.htm#angelplan) provides for the establishment of support centers for households with children (jido katei shien senta) which work in close communication with the child guidance centers and give many types of advice and guidance for children in their geographical areas of jurisdiction. The names and functions of several previously existing types of child welfare facilities have been changed so as to specify their function not merely as facilities for custodial care but as facilities to encourage the growth of “self-reliance” (jiritas). For example, the former “homes for training and education of juvenile delinquents” (kyogoin) have been renamed “children’s self-reliance support facilities” (jido jiritas shien shisetsu), and “homes for fatherless families” (boshiryo) have been renamed “livelihood support facilities for mothers and children” (boshi seikatsu shien shisetsu). The revisions in the Child Welfare Law emphasize going beyond the concepts of protection and emergency relief to address the issue of supporting children in ways that will help them become socially, spiritually, and economically self-reliant by the time they are young adults.\nThe new Child Welfare Law was made in order to respond to changes in the living environment of children the last 50 years; since the end of the Second World War. Economic growth, health development and changes in social life in Japan pushed fertility rate from 4.54 in 1947 to 1.33 in 2001. (Maternal and Child Health Statistic of Japan: 2002, 21) The predominant pattern where both husbands and wives work to maintain the family income; the trend toward nuclear families with no more than two generations per household; and the decrease in the number of children were prevalent. The constant decrease of fertility rate was noted from 1982 to 2001. This condition will put Japan’s government in a difficult position in maintaining the commitment of a welfare state. This phenomenon pushed the government to establish the Angel Plan.\n\nThe Angel Plan\n\nThe Angel Plan, established in 1994, deals with the falling birth rate and the increasing participation of women in public affairs. The Angel Plan was devised by the government incorporating the basic policy direction and essential measures for supporting child rearing. The Angel Plan is based on the idea that child rearing at the family level must be supported by the society as a whole so as to create an environment where anyone wanting to have a child may give birth and raise a child without anxiety, assuming that the best interests of the child should be of primary consideration in the promotion of measures for achieving that goal (http://www.mofa.go.jp/policy/human/child/initialreport/measures.html). Essential targets set under the Angel Plan include:\n\n- coordination of the working environment to balance work and child-rearing;\n- consolidation of various nursery care services;\n- reinforcement of the maternal and child health care system, making child bearing and rearing smoother and less worrisome;\n- improvement of housing and living environments;\n- promotion of “relaxed school education”, non-school activities and home education;\n- mitigation of financial burdens involved in child rearing; and\n- establishment of infrastructure to support child rearing.\n\nThe Ministry of Education is working to relieve the financial burden accompanying child rearing and education, to consolidate home education, and to realize “relaxed school education” by alleviating competition in entrance examinations. Specifically, the Ministry promotes measures for: 1) mitigating the financial burden accruing from child rearing, 2) consolidating home education by facilitating the counselling framework to deal with worries concerning child rearing, 3) improving the quality of non-school activities by affording opportunities for children to engage in dynamic activities, and 4) encouraging “relaxed school education”. These were developed to create better condition for children and to support parents to have more children so as to help the welfare system, which needs a productive age population.\n\nThe Sukoyaka Family 21\n\nSukoyaka—meaning happy and healthy in Japanese—Family 21 is the vision to clarify both pending and new issues, and to present major initiatives to be taken in the 21st century concerning the issue of maternal and child health. Sukoyaka Family 21 acts as a measure to address the declining birth rate and to form the basis for an environment giving birth to children that is free of anxiety and in which parents can raise their children in good health. In addition to this, Sukoyaka Family 21 will play a part in National Health Care Campaign i.e. the Health Japan 21 (Kenko Nippon 21). This campaign aims to create a society in which people can live happily and stay in good health.\n\nThe four major agenda related to the maternal and child health issues are:\n1. stepping up health care measures and promoting health care education for adolescents;\n2. assuring safety and comfort during pregnancy and childbirth, and supporting infertility;\n3. maintaining and improving the standards of child health care and medical services; and\n\nThe Sukoyaka Family 21 is one of the important policies in improving the child health and child welfare condition in Japan. Besides the new Child Welfare Law and the Angel Plan, and the Sukoyaka Family 21, a dominant policy related to the child welfare and child education is the Rainbow Plan. This plan is one of the major policies; also known as the education reforms plan for the 21st century.\n\nThe Rainbow Plan\n\nThe Rainbow Plan, which focus on revitalizing schools, family and communities, has seven basic strategies as follows: (http://www.mext.go.jp/english/topics/21plan/010301.htm)\n1. Improve students’ basic scholastic proficiency “in easy to understand classes”. There are three main tasks related to this strategy:\n - implement the 20 students per class system for fundamental subjects and advance placement classes;\n - improve classrooms in order to be able to conduct IT classes and the 20 students per class system (establish “A Learning Environment for the New Generation”); and\n - implement national academic achievement surveys.\n\n2. Foster youth into becoming open and warm-hearted Japanese through community services and various programs:\n - encourage youth to participate in community services and various programs (or consider such a system) and establish the “Children’s Dream Fund”;\n - improve moral education (for example, development and distribution of the “Kokoro no Note” [notebook to be used by students in moral education]); and\n - take actions for educational revitalization in the home and in the community.\n\n3. Improve learning environment to one which is enjoyable and free of worries:\n - enrich cultural and sporting activities (encourage school club activities);\n - take appropriate measures concerning problematic behaviours among children (improvement of the suspension system and measures to care such children); and\n - protect children from harmful information.\n\n4. Make schools that can be trusted by parents and communities:\n - implementing school evaluation system, including the establishment of the self-evaluation system and introduction of school councillors;\n - revitalizing the school board by means of parental participation and disclosure of information; and\n - promoting the establishment of new types of schools to fit the needs of the different communities.\n\n5. Train teachers as real “professionals” of education:\n - introduce an awards system, a bonus and a special promotion system for outstanding teachers;\n - establish a system where teachers have working community experience (cf: take working experience at companies); and\n - take appropriate measures on incompetent teachers such as teaching suspensions.\n\n6. Promote the establishment of universities of international standard:\n - reinforcing university education and research functions for bringing up leaders of the next generation (improve the system for admitting 17-year-old students into universities, universally introduce a system for admitting students who have finished their third year into graduate school, and establish professional schools);\n - establishing a competitive environment (grant national universities the status of independent administrative corporations, promote fixed-term employment so that professors can transfer easily, increase competitive grants); and\n - implementing a strict grading system for university students and focus on the teaching abilities of academic.\n\n7. Establish an educational philosophy suitable for the new century and improve the provision for education:\n - reviewing the Fundamental Law of Education and modify the law into one suitable for the new century; and\n - developing a comprehensive plan for the promotion of educational measures.\n\nPOLICIES AND DEVELOPMENT STRATEGIES IN RELATION TO CHILD WELFARE DEVELOPMENT IN MALAYSIA\n\nIn Malaysia, the Department of Social Welfare (DSW) is the government agency responsible and associated with providing social welfare services to the poor, vulnerable and disadvantaged. The DSW was started in 1946 by the British Military Administration to address social needs consequent to the Second World War. Its main concern then was to assist in the social and psychological rehabilitation of the victims of war. The work was very much remedial. However, over a span of 57 years, the Department’s role has evolved with the changing environment and needs of the time. Service-provisions moved from remedial to provide preventive, rehabilitative and protection", "num_tokens": 2048} {"category": "olmocr_science_pdfs-art_and_design", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-art_and_design/part-000-00000.npy", "text": " by the criteria of the French or the English. It is merely another play of superficial ornament over the old traditional Italian structure.\n\nYet this is not to deny the extraordinary beauty of many Italian Gothic works; it is merely to place them in their proper perspective. Rome has but one church, Sta. Maria Sopra Minerva, which even faintly approaches Gothic; and, while Amiens and Rheims were rising across the Alps, Roman architects were building the exquisite Romanesque cloisters of St. John Lateran and St. Paul's Outside the Walls, with their almost classic cornices and their brilliant inlaid mosaics.\n\nItalian Gothic work can be divided roughly into three types: the Central type, represented by Orvieto and Siena, which carries over the old hori-\nzontally banded black-and-white marble sheathing of the Tuscan Romanesque, and combines with it an overlay of Gothic pinnacles, crockets, and tracery; the Lombard type of brick Gothic, which controls also the great Gothic churches in Florence; and the Venetian Gothic, which consists largely of the adoption of tracery and the pointed arch and their application to the continuing Byzantine tradition. These three types are not strictly separated geographically; each reacts on the other, and many localities may have work of two of them.\n\nIn a sense, the brick type is that in which the pointed arch of the north and the ribbed vault achieved their simplest expression, as one sees them for instance in Sta. Croce or the cathedral at Florence. Here, simple piers carry simple pointed arches; there is a small clerestory; everything is consistently in the one vein—yet no one entering these churches would for a moment confuse them with the Gothic churches north of the Alps. It is the old Roman desire for great dimensions which has controlled. The bay widths are much greater than in northern work; all of the parts are simpler; there is much more plain surface. As a result, to one accustomed to the work of the north these buildings seem to lack scale, they never seem to appear their true size. In the Florence cathedral, for instance, the bays are over sixty feet from center to center; and, although the size of the church is colossal, the fact that it has so few parts—however enormous each part may be—makes it seem smaller than it really is.\n\nOn the other hand, the great size of the parts and the simplicity of the wall surfaces in these Italian churches offered an opportunity for mural decoration which no northern church could equal. It is no accident that the greatest mural decorators arose to fill this need, or that Giotto, perhaps the first great figure in the long tradition of Italian painting, found his most congenial opportunities in the church of St. Francis at Assisi or the Arena Chapel in Padua. This mural decoration, with its rich, solid color, its glories of blue and red, of green and tan, picked out here and there with golden halos, made perhaps for a total gorgeousness of interior effect unique in history; and it is only where that decorative painting has been completed, as in Assisi, in the Padua chapel, in the Spanish Chapel in Florence by Andrea da Firenze, and in parts of Sta. Croce at Florence by Giotto and the Gaddi, that the true aspect which was in the mind of the Italian Gothic church builders can be realized.\n\nIn the Central Italian type of church, such as that of Siena or Orvieto, the sizes of the units are smaller and the scale is therefore better; moreover, the horizontal banding of colored marble gives at once the sense of size.\nDEVELOPMENT OF GOTHIC\n\nFLORENCE CATHEDRAL.\n\nTRANSVERSE AND LONGITUDINAL SECTIONS.\n\nSCALE OF 100 50 100 150 200 FEET.\n\nCATHEDRAL, FLORENCE; PLAN AND SECTION. (Simpson, Vol. II.)\nwhich the plainer churches lack. In fact, for pure chromatic brilliance of decorative effect it would be hard to equal these magnificent churches, either inside or out. Yet, despite the richness of spire and crocket and tracery which ornaments their exteriors, pointed arches and round arches are used together in them almost, without differentiation of purpose, and the details of sculpture and decoration are far more influenced by ancient Rome than by what we know usually as Gothic. In fact, the Pisani, both Niccola the father and Giovanni the son, who were largely responsible for the decoration of Siena, were among the sculptors who most clearly gave evidence of a careful study of Roman work and foreshadowed the Renaissance which lay ahead.\n\nBoth Siena and Orvieto show another characteristic of Italian work, in that the fronts of each are mere decorative screens, the outlines of which have very little to do with the shape of the church behind. They are conceived as façades, places for the elaborate ornamentation which brilliant sculpture and mosaic could give, and not as parts of a building. In that, they reveal the typical Italian disregard of the structural basis of Gothic.\n\nIt was in Venice that the Italian genius for surface decoration achieved the most charming Gothic results, and it was in Venice that there was the least effort to copy the foreign Gothic forms and the greatest freedom in changing them to fit the Venetian needs and the Venetian Byzantine construction. Pointed arches replaced the old semicircular arches, but the sparkling surface treatment remained. In the palaces, the row of windows that had lighted the great hall was changed into a broad band of richly designed tracery, standing free, with the window frames set as separate elements behind, so that the play of light and shade over the lovely curved lines is exquisitely varied. Frequently crestings at the tops of the buildings gave a vivid termination to the whole without disturbing its flat façade, and the wall surfaces were paneled with colored marbles. Little sculptured panels in flat relief were often added at points of interest; and the fronts of the Gothic palaces, with their lovely marbles, their horizontal bands of tracery, and the occasional balconies, seem to have in them something of the gaiety and the radiance of the sun and sky reflected in the laughing waters that surround them. The Venetian sculptors, too, flung themselves upon the problem of Gothic decorative detail with a gay abandon little found elsewhere, avoiding the bad copies of northern crockets or the flat imitations of Roman work so often met with in Italy. The capitals of the great open loggias of the Doges' Palace are among the most beautiful medieval architectural sculpture anywhere in Europe; and, even where the northern forms\nare more definitely adopted, as in the Porta della Carta, both the figures and the foliage are so imaginative and so free that the result is perhaps less Gothic than Venetian, yet altogether delightful.\n\nThe great wealth and the high level of development of the Italian cities gave rise to a tremendous amount of public and domestic building, which is in many ways the most distinguished contribution of Gothic architecture in Italy. Each town had its municipal palace, usually built around a court, with enormous upper halls for council meetings, courts, and the like. Each town had also its palazzo del podestà, the combined police station, prison, and palace of the military governor, a building usually more somber than the municipal hall but often equally grand. A great tower rose above the city hall, and often above the podesta as well; in addition, many noble families built treasure and fortification towers in the Italian cities, giving their skylines an extraordinary quality of dramatic contrast between these upright lines and the long horizontals everywhere else supreme.\n\nBut it was in the private palaces of the wealthy that the true character of this secular Italian Gothic most clearly appears, and it is in these that we see, too, most clearly the persistence of essentially classic ideals. Usually these palaces are four-square and simple, built around an arcaded court. The story heights are enormous and the stories are clearly differentiated from each other on the outside. Moreover, the principles of symmetry and regularity control the design again and again, and the palace fronts consist of rows of equal windows, equally spaced, separated by ample wall surfaces. It is an architecture of monumental repose, a repose essentially classic, and these palaces require but slight change in detail to become the more famous palaces of the Italian Renaissance.\nBOOK V\n\nThe Renaissance\nChapter 16\n\nTHE DAWN OF THE RENAISSANCE\n\nALL through the Middle Ages the memory of classic culture still lived on, a sort of unreal will-o'-the-wisp that reached occasionally a more actual existence in the studies of the schoolmen and the poems which wandering scholars and ne'er-do-wells continued to write. Aristotle and Plato, Seneca and Cicero, were known, if not in the original, at least in early summaries and digests. Virgil was read; had he not prophesied the coming of Christ? And in the Goliardic verse which the wandering scholars sang as they traveled over the face of medieval Europe, a scandal to their more religious brethren, the nymphs and satyrs, with Diana and Aphrodite, still lived.\n\nThere are evidences of this afterlife of the classics even in some of the medieval buildings. Many of the capitals of Romanesque Languedoc still to be seen in the museum at Toulouse, as well as in the country churches, are carved with the creatures of classic myth, and centaurs and mermaids glance out of the intertwined foliage. Later, much French Gothic sculpture of the late thirteenth and early fourteenth centuries shows signs of a careful study of the classical drapery seen probably on Roman sarcoph", "num_tokens": 2048} {"category": "olmocr_science_pdfs-art_and_design", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-art_and_design/part-000-00000.npy", "text": " Museum of Contemporary Rubbish collects other people's rubbish and HOARD focussed specifically on the artist's rubbish generated through practice. Paper material from HOARD was later exhibited in August 2013 in Performing Paper #7: HOARD:PAPER at Paper Gallery Manchester which again looked at categories of materials and waste.\n\n10 HOARD preceded the Rubbish Gallery (2012-2014) collaboration with Advertising Exhibitions which developed from an invite to guest curate. A brief was set for the artists in respective networks to document an item of rubbish from their practices and discuss it through interview.\nRubbish and other Crap, Debris, Detritus, Dirt, Discards, Garbage, Junk, Leftovers, Litter, Refuse, Rejects, Remains, Ruins, Scrap, Shit, Shreds, Trash and Waste\n\nanalysis of the work at various stages\\textsuperscript{11}.\n\nHow rubbish ideas are translatable internationally has also been tested with presentation of art work\\textsuperscript{12} and also presentation of the research project itself\\textsuperscript{13}. Presenting ideas in written and spoken form\\textsuperscript{14} as part of the research development has led to a major finding of the language-basis of determining the value of rubbish in art practice, which is discussed in this thesis.\n\nThe thesis articulates the process of the practice-led research which has manifested itself in the Newspaper, Dictionary and connected blogs. Practice and theory have developed along side each other, but the writing up of this thesis has been the final stage in the research process, after completion and dissemination of the practice portfolio. The thesis structure thus reflects the practice development process which tends towards a descriptive account with\n\n\\textsuperscript{11} **Axisweb Curated Selection**, published in April 2013, involved artists interviews which have subsequently fed directly into this project. On invite to contribute to *Waste Less Live More Week 2013*, a guest blog *The Art of Food Waste* published September 2013, discussed the 2013 theme of food waste in the context of contemporary art.\n\n\\textsuperscript{12} Museum of Contemporary Rubbish merchandise which was first produced for Holmfirth Arts Festival 2011 was further developed for *Market Value* in Chicago, February - April 2013, as a new range of 'international' rubbish merchandise exploring the notion of rubbish provenance and international travel/translation. *Rubbish (2011)*, often screened as part of Museum of Contemporary Rubbish exhibitions, has been shown as as a stand alone piece in film festivals and exhibitions (Bradford, Wakefield, Buenos Aires, Sheffield, New York, Edmonton Canada) and also as a solo show in Melbourne a Berlin première at 9th Berlin International Directors Lounge in February 2013.\n\n\\textsuperscript{13} A conference paper on the research project was presented via video at the Canadian Association of Geographers 2013 AGM Special Session: *Waste and Indeterminacy* at the University of Newfoundland. The local/regional and international contrast was also tested in the presentation of the project outcome of the Rubbish Newspaper at *Supermarket Art Fair*, Stockholm in February 2014, and at the Museum of Contemporary Rubbish Blackpool in March 2014, the latter receiving a review *Corridor 8* in March 2014.\n\n\\textsuperscript{14} Such as 'Rubbish Conversations' which piloted under this title at the Blackpool solo exhibition and have become increasingly present as referenced and documented exchanges throughout the project, such as *Rubbish Conversation with Lars Tharp*, at The Hepworth Wakefield in January 2014.\nThe practice is positioned by comparing and contrasting it with that of other artists through the Dictionary and Newspaper. This has dictated the thesis by focussing on the six key artists' work selected from the survey which are analysed in terms of similarities and differences. This comparative model creates an understanding of the relationship between value and rubbish in art practice, that is comparative to the status quo or *quotidien* of rubbish in art practice, and identifies both defining and unique values of this practice.\nIntroduction\n\nThis research project is a broad survey of contemporary artists using rubbish which seeks to understand the relationship between value and such practices, with the purpose of bringing new understanding of artists' rubbish practices generally and specifically to that of the author. The varied notions of what defines rubbish and its usage in art practice are at the centre of this research, however a basic definition of rubbish as low value or valueless objects and materials can be taken as a starting point. The analysis of 19 keyword, synonymous terms seeks definition of these terms and their attributable value to objects and materials that may be utilised in art practice in order to better understand the complexities of such practice.\n\nThe subjective notion of how rubbish is defined has developed as a research interest through the Museum of Contemporary Rubbish\\textsuperscript{15}. The irony of working with low value, hidden and overlooked, repugnant and marginalised materials in the field of art, which is traditionally high value, often glamourised and spectacular, deals with paradoxes that address these value judgements that are enacted through language. For the Museum of Contemporary Rubbish, the paradox of objects being defined as both rubbish and art has opened up a research interest which questions these everyday,\n\n\\textsuperscript{15} See the Museum of Contemporary Rubbish website for more information http://museumofcontemporaryrubbish.blogspot.co.uk/\nand often institutionally determined, values.\n\nThe thesis structure reflects some fundamental aspects of how rubbish and art are perceived and defined (Collections); how they are presented (Display) and discussed (Exchange); and what definitions are chosen as language evolves rapidly and globally in the advent of the internet. These terms offer different lenses or filters to perception and, through discussing rubbish in the context of contemporary art, may offer a platform for critical analysis of the subject through everyday concepts using language as the theoretical framework for analysis.\n\nThe Collection of found image and text presented as the research project is both the process and the resultant archive of previously uncollated material. Borrowing waste industry methodology of sorting similar material into categories for processing, particularly hand-picking sorting methods, the Collection has been sorted and categorised into 19 synonymous keywords, selected with a thesaurus based on their everyday language usage. Borrowing the notion of 'useful' from the waste/recycling industry, the artworks that are considered 'useful' or relevant when compared to the author's art practice have been selected for inclusion in the Dictionary, that defines the 19 keyword categories in relation to art practice, and subsequently this thesis. Each synonymous keyword is defined by the image and text categorising it and therefore forms a dictionary of reference for the author's art practice.\n\n16 See Appendix 1.\n17 This exists in full on the project blog https://contemporaryrubbish.wordpress.com/ as a\nRubbish and other Crap, Debris, Detritus, Dirt, Discards, Garbage, Junk, Leftovers, Litter, Refuse, Rejects, Remains, Ruins, Scrap, Shit, Shreds, Trash and Waste\n\nThe thesis uses selected quotes and references from the Collection, interwoven with the author's writing and footnotes, forming three interwoven strata of reference, theory and practice respectively. The remaining artworks, quotes and references that have less direct relevance have been 'discarded' from this process and 'recycled' in the Rubbish Newspaper by means of hand drawn studies and published as the 'waste product' of this research project.\n\nThis practice based research can be considered a notional literature review of artists working with rubbish and as such is embedded in the main body of this thesis together with the methodology. A multi-theoretical bricolage approach is used which accommodates (or 'litter-picks') the most relevant theories, such as Dickie's Institutional Theory and Kaprow's Nonart Modes which emphasise the relevance of context, from of the vast knowledge related to the research subject across various disciplines. Interpretative bricolage has allowed for the subjectivities and reflexivities of qualitative research data collection and critical analysis most appropriate to the complexities and pluralities of this practice based research.\n\nSome major theories often used in art interpretation such as Freud's psychoanalytical theories have not been used, despite an obvious link to the abject/uncanny, a topical link to shit in Freud's theories of obsessive collecting deriving from anal-retentive behaviours, Freud himself being an obsessive collector and Freud’s notion of psychoanalysis being an archaeology of the resource and reference point with the process annotated on the a-n blog https://www.a-n.co.uk/blogs/rubbish\nmind: \"The psychoanalyst, like the archaeologist in his excavations, must uncover layer after layer of the patient's psyche before coming to the deepest most valuable treasures\"\\textsuperscript{18}.\n\nDue to the limitations of this research project several important areas have been omitted, such as: the environmental sustainability debate intrinsically linked to rubbish that puts the base subject matter in the public eye, the psychoanalytical theories that Dada and Surrealism (of earlier rubbish-in-art practices) are often aligned with, and also the use of digital waste in art practice. In investigating the relationship between value and the use of rubbish in art practice, these areas can be considered as distinct strands of the vast landfill of information that may be useful to revisit at a later date in relation to the core concerns. The use of digital media is not completely omitted, with the project blog featuring documentation of artworks using rubbish, but artworks using digital waste have", "num_tokens": 2048} {"category": "olmocr_science_pdfs-art_and_design", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-art_and_design/part-000-00000.npy", "text": " and the comments and criticism they produce are reflected upon the art market directly. Collector’s tastes, occasionally, regulate the direction of artists and curators.\n\nWhile there are many alternative spaces in Indonesia, most of them are concentrated in Bandung and Yogyakarta. Both cities have a leading art university—Institut Seni Indonesia, Yogyakarta (ISI) and Institut Teknologi Bandung (ITB)—each of which produces many artists every year. “The Laboratory of the West” has been used to characterize the Bandung art scene for a long time. Bandung traditionally works as a gateway to import, absorb and develop Western art. Young artists there deal with new media art such as video installation and sound art. Due to the number of universities and colleges, Bandung holds a higher rate of middle class population which also creates a popular youth culture interested in pop music, fashion, design and MTV-style video. Alternative spaces have developed as part of a bigger cultural movement. Fine art here maintains a close relationship with local youth culture. This cross-over between art and other forms of culture is a unique characteristic of alternative spaces in Bandung such as IF, Common Room and By the Way, though it easily falls into commercialism and consumerism under the logic of capitalization and urbanization.\n\nContrary to Bandung, Yogyakarta, the historical center of Indonesia, focused more on the preservation of traditional culture such as traditional paintings, fabric, dance, shadow pictures and court music. These traditional arts still hold a certain actuality in Indonesia. Being influenced by such trends, artists in Yogyakarta have emphasized their cultural roots and have opposed modernistic methods of art. Their work often takes up the issue of ethnicity and religion. Besides the center of traditional art, Yogyakarta became a center for social realism during the late 1990s when the Suharto dictatorship finally collapsed. During that time, Yogyakarta produced very influential and internationally well-known artists such as Heri Dono, Dadang Christanto and Nindityo Adipurnomo. Cemati Art House, an alternative art space located in the tourist area of Yogyakarta, was the center of these artists’ exhibitions. Upon the trend of multiculturalism in international art world in the late 1990’s, foreign curators, especially from Japan and Australia, invited these artists to big shows abroad. Following their success in the international art world, a social realistic approach acquired a high popularity among local artists, and eventually created a unique tradition, which is now called “Yogya Style”.\n\nYogyakarta is also a center of the art market. Collectors with economic power always look for artworks to sell in auctions, not to support the culture in general, but to make profit. While collectors help artists financially, their economically driven understanding of art seems to have a negative impact over the entire art scene of Yogyakarta. By knowing that art can make money, artists tend to produce the work, which is more profitable in the market rather than exploring their own ideas and techniques. It is ironic that market-oriented artists in Yogyakarta can survive as full-time artists while those who are more serious about the art and the meaning of art can barely support themselves by doing many part-time jobs. Under such circumstances, the Yogya-Style that once had a strong message regarding a decomposing society seems to have become a safe mode for attracting collectors.\n\nHowever, it is Yogyakarta’s strong tradition that artists attach importance to regarding the relationship between art and society. I was impressed with an exhibition by Popok Tri Wahyudi. During the opening\nThe Work of the Reflections on the Human Condition: Change, Conflict and Modernity\n\nIchsan, Indonesian curator, states: \"Nurdian issue of nationality, ethnicity, and other cultural identities...into the central theme of visual expression. Furthermore, this model raises questions of values Asian art as the other of the mainstream western...neglected. On the other hand, appreciation of regional styles through their everyday life will be completely necessary to be recognized internationally, the understanding of Western aesthetic principles is an opportunity to study in Western countries. If...door to only a limited number of artists who could have...both of which are equally problematic. On the one hand, internationalism creates elitism by opening the...categorize Asian art within the framework of Eurocentric...necessarily reflect the unique practice of Asian artists. In other words, the institution-oriented programs tend to...by lacking the time and resources to understand how...local artists are introduced to the \"international curator\" from foreign institutions, the significance of such links tends to be neglected. For instance, The Japan Foundation and Fukuoka Asian Art Museum send their curators to Asian countries every year in order to recruit artists for their exhibitions. Since being chosen by the foreign curators is the key for a successful career, local artists tend to understand how to be invited. However, He denounces an abuse of internalized orientalism. Asian artists, to certain extents, are all struggling with the pressure of internationalism and multi-culturalism. The local art scenes of Bandung and Yogyakarta (and Manila and Baguio to some extent) reflect these contrasting discourses.\n\nIt is hard from the curator's perspective to completely separate oneself from these existing discourses, especially when her/his work tends to exhibit the work of artists in a comprehensive manner. However, if we seek to develop the idea and the potentiality of Asian art, we need to pursue what is possible within the unique art system developed in Asia. If the art system, especially the rise of alternative space in the area, reflects the unique cultural and social background of Asian art, such systems certainly have a potential to produce something that cannot be possible anywhere else. While the exchange program needs to be more sensitive about external conditions of art in Asia, alternative space as a core of a new style of art needs to recognize its uniqueness when comparing with the western model. Collaborative challenges of many \"alternatives\" will show us hints for creating new principles of art that are based on diversity rather than an application of international standards.\n\nCONCLUSION\n\nWhile alternative space functioned as the third sector in the west, which is different from the public museum and commercial gallery, or as the experimental space for the young artist, my research indicated that the same definition is not always applicable to the alternative space in Southeast Asia. The alternative space can function as the third sector only if the other two sectors have solid party, he prepared an ambulance car with his painting to offer free medical examinations to neighbors. I am used to attending exhibition openings that always seem tediously similar—drinks, snacks and sociable conversations with art world people. I was surprised when I saw that injured children, pregnant women and old people were welcome at the party. Performance and exhibition in public spaces and workshops for people also exist in Yogyakarta. Although art projects interact with social contexts in international trends in the art world, all art projects done by Yogyakarta artists do not come from such trends, but from their reference to tradition.\n\nINTERNATIONAL ART SYSTEMS AND ASIAN 'ALTERNATIVES'\n\nAs we have seen, each alternative space in Asia has its own unique history and role in its local community. The potential of Asian art can only be understood by understanding the close link between artist’s work and specific cultural and social conditions. However, when local artists are introduced to the “international curator” from foreign institutions, the significance of such links tends to be neglected. For instance, The Japan Foundation and Fukuoka Asian Art Museum send their curators to Asian countries every year in order to recruit artists for their exhibitions. Since being chosen by the foreign curators is the key for a successful career, local artists tend to understand how to be invited. However, by lacking the time and resources to understand how the local art is formulated, these foreign curators tend to apply the international trend of art, which does not necessarily reflect the unique practice of Asian artists. In other words, the institution-oriented programs tend to categorize Asian art within the framework of Eurocentric internationalism or one of orientalistic multiculturalism both of which are equally problematic. On the one hand, internationalism creates elitism by opening the door to only a limited number of artists who could have an opportunity to study in Western countries. If the understanding of Western aesthetic principles is necessary to be recognized internationally, the majority of Asian artists who seek to pursue their own styles through their everyday life will be completely neglected. On the other hand, appreciation of regional specificity within the context of multiculturalism only values Asian art as the other of the mainstream western art. Furthermore, this model raises questions of representation and misrepresentation by turning the issue of nationality, ethnicity, and other cultural identities into the central theme of visual expression. Nurdian Ichsan, Indonesian curator, states: \"Some artists believe that fine art is a way to rouse freedom, improvement of life and self-awareness of the people. Others consider art as a way to “compensate” a collective identity in the masses. In these cases, artists place their own identity as a part of a limited social collective identity. It is also seen that artists try to seek for their national identity from the tradition that come from the past collective values, and from spirituality of modern society. (...) These phenomena caused a stereotype in the development of Indonesian contemporary art. And this stereotype became a necessary condition to enter the international art scene from the third world. What is appreciated there is a “cultural identity card” of the artist’s local identity in the work. Rather, it is easy to see this stereotype from artists who look for icons that implicate tradition, region, religion, identity of community and specific social situation.\"\n\nHe denounces an abuse of internalized orientalism. Asian artists, to certain extents, are all struggling with the pressure of internationalism and multi-culturalism. The local art scenes of Bandung and Yogyakarta (", "num_tokens": 2048} {"category": "olmocr_science_pdfs-crime_and_law", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-crime_and_law/part-000-00000.npy", "text": " for sex, and a sigh of relief from paternal responsibility.”).24 The opinion makes it clear that differences in taste, culture, or sense of humor must not stop courts from safeguarding the social benefits parody provides and protecting them from intellectual property liability. The Supreme Court quoted a warning issued by Judge Leval, then a district court judge, in a case involving trademark parody: “First Amendment protections do not apply only to those who speak clearly, whose jokes are funny, and whose parodies succeed.”25\n\n22. See, e.g., Mut. of Omaha Ins. Co. v. Novak, 836 F.2d 397, 402–03 (8th Cir. 1987) (granting preliminary injunction for Mutual of Omaha against “Mutant of Omaha” parodist); Walt Disney Prods. v. Air Pirates, 581 F.2d 751, 757 (9th Cir. 1978) (holding that defendant infringed Walt Disney Productions’ trademarks on its cartoon characters by depicting parodies of them in adult “counter-culture” comic books, and denying a fair use defense where a “parodist has appropriated a greater amount of the original work than is necessary to ‘recall or conjure up’ the object of his satire”); Brach Van Houten Holding, Inc. v. Save Brach’s Coal. for Chicago, 856 F. Supp. 472, 477 (N.D. Ill. 1994) (issuing a preliminary injunction to prevent defendant from incorporating Brach’s logo into protest organization’s promotional materials); Hard Rock Cafe Licensing Corp. v. Pac. Graphics, Inc., 776 F. Supp. 1454, 1463–64 (W.D. Wash. 1991) (enjoining defendants from using “Hard Rain Cafe” imitation of “Hard Rock Cafe” trademarks referring to the weather in Seattle); Coca-Cola Co. v. Gemini Rising, Inc., 346 F. Supp. 1183, 1187 (E.D.N.Y. 1972) (granting a preliminary injunction against defendant who parodied the “Coca-Cola” trademark to read “Enjoy Cocaine” while noting the parody was a “clear indication of defendant’s predatory intent, however humorous defendant consider[ed] it”).\n\n23. See, e.g., Campbell v. Acuff-Rose Music, Inc., 510 U.S. 569, 579 (1994) (comparing “social benefit” provided by parody to that from “less ostensible humorous forms of criticism” (emphasis added)); id. at 582 (“Whether . . . parody is in good taste or bad does not and should not matter to fair use.”); id. at 583 (“[W]e might not assign a high rank to the parodic element here . . . .”).\n\n24. Id. at 583.\n\n25. Id. (quoting Yankee Publ’g, Inc. v. News Am. Publ’g, Inc., 809 F. Supp. 267, 280 (S.D.N.Y. 1992) (Leval, J.)); see also id. at 582–83 (“[I]t would be a dangerous undertaking for persons trained only to the law to constitute themselves final judges of the worth of [a work], outside of the narrowest and most obvious limits. At the one extreme some works of genius would be sure to miss appreciation. Their very novelty would make them repulsive until the public had learned the new language in which their author spoke.” (quoting Bleistein v. Donaldson Lithographing Co., 188 U.S. 239, 251 (1903) (Holmes, J.).))\nCampbell did not add much of its own flowery quotable language praising the social worth of parody, although later trademark decisions and scholarship filled that void. It let the analysis, recognizing and favoring parody at every turn, speak for itself. As a statement from our highest court, Campbell stands as a landmark in the growing appreciation for parody in intellectual property doctrine. That growth has spread to trademark law. As David Simon has documented extensively, courts in trademark cases often cite Campbell to demonstrate the cultural value of parody as a particularly powerful form of expression. \n\nB. Parody Is Tricky\n\nThe second lesson of Campbell concerns the difficulty of safeguarding parody. Since Campbell clearly recognized the value of parody, one might assume that the doctrine the Court used to protect it might be fairly simple. The Campbell opinion repeatedly warns that this is far from true. Rather, “[t]he task is not to be simplified with bright-line rules.” 27 That caution applies in trademark cases as much as in copyright.\n\nThe Court took pains to emphasize that fair use for parody did not mean that “anyone who calls himself a parodist can skim the cream and get away scot free.” 28 In its analysis of the third fair use factor, 29 concerning the “amount and substantiality” of the parodist’s copying, 30 the majority opinion was especially sensitive to the danger that false parody claims might offer a fig leaf for infringing activity, and suggested that courts look at “what else the parodist did” beyond copying the original. 31 Justice Kennedy concurred primarily to express even greater reservations about what he saw as the risk of “profiteers,” 32 warning that courts “must take care to ensure that not just any commercial takeoff is rationalized post hoc as a parody.” 33\n\n27. Campbell, 510 U.S. at 577.\n28. Id. at 589.\n29. Id. at 586–89.\n32. Id. at 598 (Kennedy, J., concurring).\n33. Id. at 600; cf. Yankee Publ’g, Inc. v. News Am. Publ’g, Inc., 809 F. Supp. 267, 279 (S.D.N.Y. 1992) (rejecting argument in a trademark case that “the joke is an after-the-fact contrivance designed to camouflage a piracy of [plaintiff’s] goodwill”).\nOf course, trademark rights do not allow markholders to control every drop of the “cream” in their brands. Mark Lemley and Mark McKenna have demonstrated persuasively that much of the concern about “free riding” on consumer association with a trademark lacks both theoretical and empirical support. Thus, unlicensed uses of a trademark that draw somewhat on its selling power still may be acceptable, particularly when other interests are at stake. Even in their modern expanded form, trademark rights are subject to doctrinal limitations such as the bar on protection for functional features35 or the nominative use doctrine36 that allow defendants to imitate trademarks for their own purposes. Other unlicensed uses are vindicated by a lack of likely consumer confusion. These various escape valves apply to many expressive uses of trademarks, often including parody but reaching much more broadly.\n\nNonetheless, worry about “skimming the cream” through excessive imitation makes trademark parody cases particularly difficult. As in copyright, courts in trademark parody cases carefully note that any defense for parody is contingent, not absolute.37 If we thought that every claim of parody should prevail automatically over intellectual property rights, then Campbell would not be a landmark case. All observers agree that some plausibly parodic imitations may infringe trademarks. Suppose I try to sell a brown carbonated soda as “Popsi.” It is easy to imagine me arguing that I was merely mocking a better-known soda brand with my whimsical play on words. I should lose this argument on the merits. But it is not so easy to differentiate such illegitimate use of the PEPSI mark from a true parody like “Chewy Vuiton” dog toys that imitate Louis Vuitton luxury handbags.38 Because we easily envision trumped-up parody arguments, we must wrestle with two thorny follow-up questions. What counts as parody? What proportion of the original may a parody imitate in pursuit of its aim? Both inquiries swiftly become entangled in complexity.\n\nFirst, a court must decide when the facts actually present parody.\n\n37. See, e.g., Lyons P’ship v. Giannoulas, 179 F.3d 384, 389 (5th Cir. 1999) (“[C]onfusion resulting from a parody is not an affirmative defense to a trademark infringement claim but is instead an additional factor that should be considered.”); Dardenne v. MoveOn.org, No. 14-00150-SDD-SCR, 2014 WL 1364854, at *3 (M.D. La. 2014) (“[P]arody does not provide an absolute cloak of protection from a claim of trademark infringement . . . .”).\nquestions that merit more careful analysis. *Campbell* presents the threshold question as “whether a parodic character may reasonably be perceived.”39 Non-parody trademark doctrines likewise engage in this exercise of determining initial eligibility for a defense. For example, the first prong of the nominative use test, which shields the use of a mark simply to refer to a brand or company,", "num_tokens": 2048} {"category": "olmocr_science_pdfs-crime_and_law", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-crime_and_law/part-000-00000.npy", "text": " in two directions. This can result in torn ligaments and injured muscles. But it is all part of rodeo.\n\nYet, in the face of such activities, an article in the July-August 1973 Saturday Evening Post stated that rodeo is \"a performance of man and mount that becomes a ballet in itself because the minds and muscles of both have learned how to work together in an admirable partnership.\" How anyone could imagine a calf or a steer being flipped into the air and slammed to the ground as ballet is difficult to understand.\n\nThe Humane Society believes cattle roping events conducted for entertainment—calf roping, team roping (one steer, two cowboys), and steer busting—should be banned in every state. As a step toward that goal, HSUS officials testified before the Colorado Legislature in April 1973 in support of bills that would ban roping and busting of any animal in rodeos. Both bills had been introduced by Sen. Ted Strickland (R-Westmin­ ster) who has since been appointed lieutenant governor.\n\n\"There are no events in rodeo performances that are more injuri­ ous to calves and steers than those events employing the act of rop­ ing.\" HSUS President John A. Hoyt told the Colorado Senate State Affairs Committee. \"Indeed, the brutal nature of these events should convince any sensitive per­ son that animals so roped are being subjected to torment, pain, and in­ jury.\"\n\nHSUS's position was supported editorially by the Rocky Mountain News, one of the West's most presti­ gious newspapers.\n\nHSUS's testimony was presented in a hearing room packed with rodeo participants and fans, who claimed that a ban on calf roping would cause the demise of rodeos.\n\nHSUS investigators observed visible injuries to as many as 11-12% of the animals in some steer busting events. \"Nobody wants to see these ani­ mals hurt, but that's how we make our money,\" one speaker said. \"And we all want to make money.\"\n\nThe committee said they would take the bills under consideration, but, in light of the overwhelming presence of rodeo supporters, it seemed unlikely that the bills would ever again see the light of day.\n\nIn praising Strickland for his courage in introducing the bills, Rocky Mountain News columnist Craig Barnes said an issue that had been overlooked at the hearing was kindness. Said Barnes: \"Perhaps a goal even nobler than the pursuit of truth of injury is the pursuit of gentleness. Without proof, we know it hurts a dog to pick him up by his ears, is cruel to leave a cat out in the snow and rain, or to spur and gouge a horse to make him buck. We know these things because there is something in us which tells us, and most likely that something is what makes us human.\"\n\nIn the course of their study for HSUS, investigators talked with many ranchers in Colorado and Wyoming who stated they considered their calves too valuable to risk injury to them by roping. To prevent the injuries that can occur in roping, many of these ranchers reported moving calves into holding pens, chutes, or other small enclosures before roping the hind legs.\n\nToo often rodeo animals are so badly injured that they must be hauled from the arena on a sled. Veterinary care is seldom available.\nAs a so-called “bucking bronco” leaves the chute, a cowboy cinches a flank strap so tightly around the horse that the horse is sure to buck. HSUS charges that this strap both injures and torments the animal.\n\nYet, rodeo proponents continue to claim that livestock would get even rougher handling on ranches. Even their claims about rodeo events being Old West traditions are phony, as most of the events have been developed solely for the purpose of entertainment.\n\nOne of the most disturbing aspects of rodeo is that it gives children who participate an insensitive outlook on animals. Through Little Britches rodeo groups, high school rodeo groups, and collegiate rodeo associations, children and youth of all ages are taught to treat animals inhumanely in the name of competition. Such an atmosphere of violence may be psychologically damaging to children.\n\nHSUS’s persistent efforts to change rodeo activities have brought the entire rodeo industry to the defense. The large turnout of rodeo supporters at the Colorado hearing is typical of the forces that the rodeo industry can rally through its associations. Security at rodeo performances is now extremely tight. This extends down even to high school and “bush league” weekend rodeos. It is almost impossible for an outsider—even members of the press—to enter the chute areas and corrals in which injuries or the use of electric prods and other mechanical devices might be observed.\n\nThe two largest national rodeo associations, the Rodeo Cowboys Assn. (RCA) and the International Rodeo Assn. (IRA), are extremely powerful. They employ the techniques of professional public relations firms, distribute regular communications to their members, and rally mass support when any aspect of rodeo is being challenged. One of their primary defenses is that they have strict rules that must be followed by any rodeo they sanction. What they do not mention is that only approximately 30% of all rodeos conducted in the United States are sanctioned by either association.\n\nThere is little or no humane supervision at most rodeos. Although RCA and IRA claim that the American Humane Assn. (AHA) supervises rodeos, AHA is able to send supervisors to only some 10% of them. Whereas AHA Executive Director Rutherford T. Phillips stated that AHA “would be happy to see rodeos discontinued or outlawed,” AHA has failed to publicly disavow the misleading protective role in which the rodeo associations have cast it.\n\nNot all rodeos have veterinary care available for injured animals. Conditions such as overgrown or cracked hooves, open wounds, skin infections, malnutrition, internal parasites, and improper loading and unloading of animals receive little or no attention. Only the most valuable animals receive adequate care.\n\nHSUS learned of an incident involving extreme neglect to a bucking horse that was severely injured during a 1973 Independence Day rodeo in Pocatello, Idaho. The horse was dragged out of the arena without the aid of a sled. As the horse was dragged through the gate, its rear legs became entangled in the fence. As several spectators booed their disapproval, the horse was pulled by its tail until it was freed. With no veterinarian being in attendance, a rodeo official broadcast a plea for one. A non-practicing veterinarian who had been in the grandstands answered the call and diagnosed the injury as a broken back. He advised the\n\nThe spectacular aspect of steer busting is the flipping of the steer, which is accomplished by letting the lariat drop below the steer’s buttocks (left), and the cowboy’s riding off at a 45° angle, causing the steer to be jerked around (center), and flipped to the ground on his side (right).\nrodeo stock contractor, who owned the horse, that the horse should be destroyed and that he could not do it because he was not a practitioner.\n\nThe following morning, the horse was discovered to be still alive and unattended. A police officer responded to a call and loaned his investigators to the scene. As a result, HSUS has charged the stock contractor with cruelty to animals under Idaho statutes.\n\nRodeo supporters claim that rodeo animals are trucked from one town to another and used almost daily. In addition to the animals seen by spectators, rodeo performers use other animals for practice in preparation for performances. These animals are subjected to constant risk of injury, without even the scrutiny of spectators to protect them from flagrant abuse.\n\n\"The truth of the matter is that most of the animals are subjected to pain practically every time they are used.\" HSUS Director Robert F. Welborn told the Colorado State Board of Agriculture in June 1973. \"This pain may be transitory, or it may be the result of an internal injury that will continue.\"\n\n\"In addition to pain, the animals are subjected to constant fear and torment,\" Welborn said.\n\nFear and torment are the key factors in causing otherwise gentle horses to buck, thereby producing the widely advertised \"bucking bronco.\" The HSUS study concluded that rodeo horses and bulls buck because of (a) pressure of the flank strap, a heavy leather strap cinched tightly around the animal's flanks, applying pressure to sensitive lumbar nerves, to the inguinal canal area, and, occasionally, on the prepuce of the male animal, and (b) digging into the animal's flesh by the cowboy's spurs.\n\nPart of the investigators' study of the flank strap involved cinching flank straps around two horses known for their calm temperament. Both horses bucked. The investigators also released a former rodeo bucking horse from a bucking chute several times without a flank strap. The horse did not buck.\n\nThe bucking horse is simply attempting to rid himself of a tormenting device, the study concluded.\n\nContrary to the claim of rodeo associations that a fleece-lined flank strap protects the animal, the study team found that fleece-lined flank straps produced more abrasions to the flanks of horses than did unlined flank straps.\n\nHSUS is determined to put an end to all cruelty at rodeos. But the opposition to reforms is well organized and fierce. Every little town that depends on rodeos to draw tourists and every manufacturer of rodeo apparel or equipment will be fighting change.\n\nSaid Rocky Mountain News columnist Barnes of rodeo: \"It isn't going to be easy to put a rope around a tradition like that and drag it off into history. And it isn't going to go without kicking and bawling and raising dust.\"\n\nIt is ironic that man, the only living creature capable of reason, sets out to torment, inj", "num_tokens": 2048} {"category": "olmocr_science_pdfs-crime_and_law", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-crime_and_law/part-000-00000.npy", "text": ", LAMP-GASS BRUSHES, NAIL BRUSHES, SCRUBBING BRUSHES, SHAVING BRUSHES, TOILET BRUSHES, TOOTH BRUSHES AND ELECTRIC TOOTH BRUSHES, BRUSH MAKING MATERIAL; CLEANING EQUIPMENT, NAMELY, ABRASIVE AND SCOURING PADS, BROOMS, CLEANING RAGS, NON-ELECTRIC CARPET BEATERS, DUSTBINS, BUCKSKIN CHAMOIS FOR CLEANING, CHAMOIS LEATHER FOR CLEANING AND POLISHING, CLOTHS FOR WASHING FLOORS, DUST CLOTHS, FEATHER DUSTERS, POLISHING CLOTHS, POLISHING LEATHER, WASHBOARDS, CLEANING SPONGES, STEEL WOOL FOR CLEANING; UNWORKED OR SEMI-WORKED GLASS EXCEPT BUILDING GLASS, BEVERAGE GLASSWARE, PORCELAIN AND EARTHENWARE GOODS NOT INCLUDED IN OTHER CLASSES, NAMELY, MUGS, DOORKNOBS, BUSTS, STATUETTES, JARS, JUGS, PITCHERS, FLOWER POTS, BOWLS, AND VASES (U.S. CLS. 2, 13, 22, 29, 30, 33, 40 AND 50).\n\nCLASS 24—FABRICS\n\nFOR TEXTILES AND TEXTILE GOODS NOT INCLUDED IN OTHER CLASSES, EXCEPT FOR TOWELS, NAMELY, BILLIARD TABLE CLOTH, BROCADES, CA-LICO, CANVAS FOR TAPESTRY OR EMBROIDERY, CREPON, CURTAINS, CUSHIONS, DAMASK, DOOR CURTAINS, ESPIRTO FABRIC, FABRIC FOR BOAT AND SHOE MANUFACTURE, IMITATION ANIMAL SKIN FABRIC, FELT, FLANNEL, HANDBERCHIEFS, HEMP CLOTH, HEMP FABRIC, JERSEY FABRIC, LINEN CLOTH, LINERIE FABRIC, MOLESKIN, MOSQUITO NETTING, NET CURTAINS, OIL CLOTH FOR UMBRELLA TABLE COVERS, RAYON FABRIC, UPHOLSTERY FABRIC, VELVET, WOOLEN CLOTH, AND WOOLEN FABRIC, CLOTH BANNERS, BOOK LINING COVER, NAMELY, BOARD GAMES AND ACTION FIGURES; ARCADE GAMES (U.S. CLS. 22, 23, 38 AND 50).\nCLASS 41—EDUCATION AND ENTERTAINMENT\nFOR EDUCATIONAL SERVICES IN THE NATURE OF SPORTS CLINICS AND SEMINARS; ENTERTAINMENT SERVICES IN THE NATURE OF ORGANIZATION OF SPORTING EVENTS, SPORTS CONTESTS AND TOURNAMENTS, AND PROVIDING FACILITIES FOR SPORTING EVENTS, SPORTS CONTESTS AND TOURNAMENTS; PRODUCTION OF REALITY TELEVISION PROGRAMS RELATES TO SPORTS, SPORTING EVENTS AND ATHLETIC COMPETITION (U.S. CLS. 100, 101 AND 107).\n\nMICHAEL LEWIS, EXAMINING ATTORNEY\n\nSN 79-035,097. HILMAR NICOLAY, BERLIN, FED REP GERMANY, AND LENNART KLEIBER, FED REP GERMANY, FILED 10-23-2006.\n\nTHE MARK CONSISTS OF STANDARD CHARACTERS WITHOUT CLAIM TO ANY PARTICULAR FONT, STYLE, SIZE, OR COLOR.\n\n\nTHE ENGLISH TRANSLATION OF THE WORD \"USUS\" IN THE MARK IS \"CUSTOM\".\n\nCLASS 16—PAPER GOODS AND PRINTED MATTER\nFOR WRITING UTENSILS, WRITING UTENSILS WITH LEADS, PASTEL PENCILS, PENCILS, FOUNTAIN PENS, INDELIBILE PENCILS, OFFICE AND SCHOOL SUPPLIES EXCEPT FURNITURE AND ELECTRONIC DEVICES, NAMELY, STATIONERY, NAMELY, PAPER AND CARDBOARD, GIFT CARDS, GREETING CARDS, BUSINESS CARDS, DRAWING CARDS; DRAWING PADS, WRITING PAD AND INKING PADS, ENVELOPES FOR STATIONERY, PLASTICS FOR PACKAGING, NAMELY PLASTIC BAGS AND BUBBLE PACKS; LETTER OPENERS, DRAWING RULERS, FILES FOLDERS, FILE JACKETS, PASSPORTS HOLDERS, FILES AND TRAYS FOR PAPER, FOR LETTERS, FOR DOCUMENTS AND FOR BUSINESS CARDS; INDEX CARD FILES, STORAGE BOXES MADE OF PAPER OR CARDBOARD; CALENDARS AND TIME PLANNERS AND PERSONAL ORGANIZERS AND REFILLS FOR THESE, APPOINTMENT BOOKS AND ADDRESS BOOKS AND MEMO BOOKS AND REFILLS FOR THESE, NOTEBOOKS, COLUMNAR BOOKS, BLANK AND BUSINESS FORMS AND JOURNALS; PORTABLE EASELS, BOOKENDS; PAPER CLIPS, PAPER CLIP HOLDERS AND PENCIL HOLDERS, PAPER LABELS AND STICKERS; ADHESIVE TAPES, GUMMED TAPES AND OFFICE TAPE DISPENSERS, ALL FOR STATIONERY PURPOSES; STAMPS AND SEALS FOR OFFICES, STAMP HOLDERS, STAMP PADS AND REFILLS FOR STAMPS PADS, GLUES FOR OFFICES IN PARTICULAR FOR PAPER AND CARDBOARD; BINDERS, BINDER INDEX, DIVIDERS, NAMELY, INDEX DIVIDERS AND NOTEBOOK DIVIDERS, BINDING STRIPS, THUMBTECKS, STAPLES, STAPLERS AND PUNCHES FOR PAPER OR CARDBOARD, STAPLE REMOVERS, CHALK, CHALK BOARDS, CHALK ERASERS, CORRECTION FLUID FOR DOCUMENTS, CORRECTING PENCILS, CORRECTING TAPES, INK AND PENCILS ERASERS, CRAYONS, HIGHLIGHTER PENS, MARKER PENS, BALLPOINT PENS, GEL ROLLER PENS, INK PENS, PEN INK REFILLS, PENCILS LEADS, AND PENCIL SHARPENERS (U.S. CLS. 2, 5, 22, 23, 29, 37, 38 AND 50).\n\nJAMES GRIFFIN, EXAMINING ATTORNEY\n\n\nTHE COLOR(S) GREY, RED, BRIGHT RED, AND PINK IS/ARE CLAIMED AS A FEATURE OF THE MARK.\n\nTHE WORDING IN THE MARK IS GREY, THE LEFT SIDE OVAL IS PINK, THE CENTER OVAL IS BRIGHT RED, AND THE CIRCLE ON THE RIGHT IS RED.\n\nTHE WORDING \"ANTEIS\" HAS NO MEANING IN A FOREIGN LANGUAGE.\n\nCLASS 3—COSMETICS AND CLEANING PREPARATIONS\nFOR ARTICLES FOR BODY AND BEAUTY CARE, NAMELY, ANTI-AGING CREAMS, BEAUTY GELS, BODY AND BEAUTY CARE COSMETICS, COSMETIC CREAMS FOR SKIN CARE (U.S. CLS. 1, 4, 6, 50, 51 AND 52).\n\nTM 258 OFFICIAL GAZETTE AUGUST 12, 2008\n\nCLASS 11—ENVIRONMENTAL CONTROL APPARATUS\nFOR FLASHLIGHTS (U.S. CLS. 13, 21, 23, 31 AND 34).\n\nCLASS 14—JEWELRY\nFOR WATCHES AND CHRONOGRAPHS, NAMELY, TIMEPIECES WITH STOPWATCH FUNCTION, FOR USE AS WRISTWATCHES, POCKET WATCHES OR FOR USE WITH RINGS, NECKLACES OR BRACELETES; JEWELRY, TIE CLIPS, TIE PINS, KEY RINGS OF PRECIOUS METAL (U.S. CLS. 2, 27, 28 AND 50).\nCLASS 5—PHARMACEUTICALS\n\nFor pharmaceutical preparations, namely, injectable biopolymers and biopolymer gels for use in the fields of cosmetology, aesthetic dermatology, cosmetic surgery, ophthalmology and rheumatology (U.S. CLS. 6, 18, 44, 46, 51 and 52).\n\nCLASS 10—MEDICAL APPARATUS\n\nFor surgical apparatus and instruments, namely, ocular implants, implants consisting of artificial materials, surgical implants consisting of artificial materials, knives in the field of ophthalmology; medical apparatus and instruments, namely, medical injection pens (U.S. CLS. 26, 39 and 44).\n\nCLASS 41—EDUCATION AND ENTERTAINMENT\n\nFor providing instruction and educational classes, workshops, seminars and lectures in the field of aesthetics, cosmetology and medicine (U.S. CLS. 100, 101 and 107).\n\nG. MAYERSCHOFF, EXAMINING ATTORNEY\n\nSN 79-035,992. NORGREN G", "num_tokens": 2048} {"category": "olmocr_science_pdfs-crime_and_law", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-crime_and_law/part-000-00000.npy", "text": " appears to be that it is better to retain the contractual relationship but to give the Employer the right to terminate, which employers should exercise only after taking professional advice as to whether that course of action is the most appropriate in all the circumstances of the particular project and Parties. Alternatives open to the Employer include entering into continuation contracts or novation of the existing contract.\n\nIn most insolvency procedures, an administrative receiver, administrator or liquidator, hereafter referred to collectively as an ‘Insolvency Practitioner’, would be acting for the Contractor. Any agreement with the Contractor would therefore be with that person. To become a qualified Insolvency Practitioner, one must be a member of a professional body recognized by the Secretary of State for the Department of Business, Enterprise and Regulatory Reform and licensed to act in that capacity. To acquire such recognition, a professional body must satisfy the Secretary of State that its rules and regulations ensure that anybody licensed by it to practise as an Insolvency Practitioner has appropriate qualifications and training. Most Insolvency Practitioners are partners in the large legal and accountancy professions.\n\n16.7.1 Instruction to the Contractor to continue\n\nThe Contractor’s employment may be reinstated by agreement between the Employer and the Contractor (Clause 8.3.2). In practice, reinstatement is usually agreed only where either a novation can be arranged or it is clear that the Contractor, under the management of the Insolvency Practitioner, will be able to complete the project. If the project is near Practical Completion, the Insolvency Practitioner may well choose this course of action in order to recover retentions and avoid or minimize liquidated damages. The Employer may be attracted to such an arrangement to avoid the disruption of getting other contractors in.\n\n16.7.2 Continuation contracts\n\nA continuation contract entails the Employer entering into another contract whereby the Contractor, under the management of the Insolvency Practitioner, undertakes to complete the Works. Such a continuation contract is often in effect a variation to the original Contract (i.e. new terms are introduced). For example, the Employer may agree to advance payment or a new completion date. However, it is possible for the continuation contract to require the Contractor to continue and complete as he was originally obliged to. The value of a continuation contract contemplates a situation where the Employer, after examining the circumstances of the insolvency situation and alternative courses of action available to him, comes to a conclusion that his interests are best served by such an arrangement. A major factor that the Employer would usually consider is that the Insolvency Practitioner is personally liable for any non-performance of the continuation contract. This offers considerable protection since Insolvency Practitioners are normally from the major legal and accountancy firms and are therefore usually covered by appropriate professional indemnity insurance cover. On the part of the Insolvency Practitioner, he must also come to a view that such an arrangement is more advantageous to his appointor or the general body of creditors than termination.\n16.7.3 Novation\n\nThe Employer and the Insolvency Practitioner may come to the view that novation is more in their mutual interests than termination of the Contractor’s employment. In this context, a novation is an agreement involving the Employer, the Insolvent Contractor and a substitute contractor that the latter has replaced the Insolvent Contractor as the Contractor under the Contract. Thereafter the Substitute Contractor is governed by the Contract as if that has been the case from the start whilst the Insolvent Contractor ceases to have any further obligations or rights under the Contract. A novation is feasible only where the Contract is profitable and the Substitute Contractor is willing to share the surplus in the completed work with the Insolvency Practitioner. The surplus is the total value of the work executed less total payment made under the Contract. A conditional novation is a novation in which the terms of the Contract are varied by the agreement. This is a course of action that the Employer may consider where the Contract is not attractive enough to other contractors to bring about a pure novation. Examples of changes in terms include a new Completion Date, exclusion of the Substitute Contractor’s liability for defects in the pre-novation work, and a new Contract Sum.\n\n16.8 Corruption\n\nThe Employer may, by written notice, terminate the Contractor’s employment if, in relation to this contract or any other contract between the Parties, the Contractor or any person employed by him or acting on his behalf commits an offence under the Prevention of Corruption Acts 1889 to 1916. A Local Authority Employer may also do so if the Contractor has given any fee or reward the receipt of which is prohibited by s. 117(2) of the Local Government Act 1972. The essence of these offences is the offering of inducement or reward for improper conduct in relation to the execution or performance of relevant contracts.\n\nIt is to be noted that acts of the Contractor’s employees without his sanction or knowledge may amount to corruption. Also of significance is the provision that the clause covers similar acts committed on other contracts between the Employer and the Contractor.\n\n16.9 Termination by the Contractor for Employer’s defaults\n\nThe specified defaults of the Employer for which the Contractor may terminate his own employment are listed under Clause 8.9.1. These are that the Employer:\n\n- fails to discharge to the Contractor any amount stated as payable under a certificate and/or VAT payable on the amount by the final date for payment;\n- interferes with or obstructs the issue by the Architect of any certificate;\n- assigns the Contract without the Contractor’s consent;\n- fails to discharge his contractual obligations in respect of the CDM Regulations.\n\n16.9.1 Failure of the Employer to pay\n\nThe final date for payment pursuant to an Interim Certificate is 14 days from the date of its issue (Clause 4.13.1). The equivalent date for the Final Certificate is 28 days from the\ndate of its issue (Clause 4.15.4). The Employer must pay the amount due under any certi-\ntificate plus any VAT properly chargeable in respect of the certificate (Clause 4.6.1) by the\nrelevant final date. Failure of the Employer to pay the amount properly due pursuant to a\ncertificate entitles the Contractor to terminate his own employment. A less drastic course\nof action open to the Contractor is suspension under Clause 4.14.\n\nIn Rupert Morgan Building Services (LLC) Ltd v. Jervis the English Court of Appeal\nheld that, where a contract provides for a contract administrator as certifier of payment\nas in JCT 05, any amount stated on a certificate becomes the amount due. However,\nsubject to serving appropriate notices as explained in Chapter 15, Section 15.2.7, the\nEmployer may pay a lesser amount if he believes that it is the ‘amount properly due’ to the\nContractor under the Contract. As stated by the House of Lords in Melville Dundas Ltd (in\nReceivership) v. George Wimpey UK Ltd and Reinwood Ltd v. L Brown & Sons Ltd the\nrequirement for these notices is designed to ensure that a contractor knows immedi-\nately and with sufficient clarity where a set-off against payment otherwise due is being made\nand the grounds for it so that he may seek speedy redress by reference to adjudication.\n\n16.9.2 Interference/obstruction by the Employer\n\nIt is explained in Chapter 2, Sections 2.1.3 and 2.4 that, even in the absence of an express\nterm of the kind in Clause 8.9.1.2, the Employer would be under an implied duty not\nto interfere with the professional judgment of the Architect whenever he makes deci-\nsions in his capacity as an independent third party holding the balance fairly between the\nEmployer and the Contractor.\n\nFor this condition in Clause 8.9.1.2 to apply, two facts must be established. First,\nthe Employer, or his agents, must have had the intention either to prevent the Architect\nfrom performing his certification duties or to influence unduly the Architect’s judge-\nment in the performance of such duties. Second, there must have been actual interference\nor obstruction. In R. B. Burden Ltd v. Swansea Corporation it was said that inadvert-\nent errors, negligence or omissions of agents of the Employer who, at the request of the\nArchitect, assisted in the certification process would not usually amount to interference or\nobstruction.\n\n16.9.3 Assignment\n\nClause 7.1 prohibits any of the parties from assigning the Contract without the consent\nof the other. Assignment by the Employer of any right under the Contract without the\nContractor’s consent is a default for which the Contractor has a right to terminate his own\nemployment.\n\n57 [2003] EWCA Civ 1563; [2003] BLR 18; [2004] TCLR 3; 91 ConLR. 81. In this case the English Court\nof Appeal approved a similar decision of the Scottish Sheriff’s Court in Clark Contracts Ltd v. Burrell Co\n60 [1957] 1 WLR 1167.\n61 See Chapter 8, Section 8.2 for discussion on ‘assigning a contract’; see Section 16.6.4 for termination for\nassignment by the Contractor.\n16.9.4 CDM Regulations\n\nUnder Clause 3.25, each Party undertakes to the other a contractual duty to comply with the CDM Regulations in relation to the Works and the site. The Employer is to ensure compliance with respect to two particular aspects of the Regulations. First, the Employer must ensure that the CDM Co-ordinator carries out his duties under the CDM Regulations. The same obligation", "num_tokens": 2048} {"category": "olmocr_science_pdfs-crime_and_law", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-crime_and_law/part-000-00000.npy", "text": " burden of showing that a revocation or suspension of a license under this section is not arbitrary or capricious. (Ord. #JT9905, Jan. 2000)\n\n9-810. Hearings on disciplinary actions–judicial review–prohibition on operation of business. (1) As used in this section, \"application\" means:\n\n(a) An application for a license;\n(b) An application for a permit;\n(c) An application for a license renewal; and\n(d) An application for a permit renewal.\n\n(2) Whenever an application is denied, the chair shall notify the applicant in writing of the reasons for such action; such notice shall also advise the applicant of the applicant's right to request a hearing before the board. If the applicant desires to request a hearing before the board to contest the denial\nof an application, such request shall be made in writing to the mayor of such city within ten (10) days of the applicant's receipt of the notification of the denial of the application. If the applicant timely requests such a hearing, a public hearing shall be held within fifteen (15) days of the mayor's receipt of such request before the board, at which time the applicant may present evidence as to why the application should not be denied. The board shall hear evidence concerning the basis for denial of the application and shall affirm or reverse the denial of an application at the conclusion of such hearing; any such hearing shall be concluded no later than twenty-two (22) days after the applicant's receipt of notification of denial of an application, unless an extension beyond such time period is requested by the applicant and granted by the board.\n\n(3) If the board affirms the denial of an application, the office of the city attorney for the City of Camden shall institute suit for declaratory judgment in a court of record in such city, within five (5) days of the date of any such denial seeking an immediate judicial determination of whether such application has been properly denied under the law.\n\n(4) The applicant shall be entitled to judicial determination of the issues within two (2) days after the joinder of issue, and a decision shall be rendered by the court within two (2) days of the conclusion of the hearing.\n\n(5) The board shall have the burden of showing that a denial of a license under this section is not arbitrary or capricious. (Ord. #JT9905, Jan. 2000)\n\n9-811. Termination and renewal of licenses—application fees.\n\n(1) Every license issued under this part will terminate at the expiration of one (1) year from the date of issuance, unless sooner revoked, and must be renewed before operation is allowed in the following year. Any operator desiring to renew a license shall make application to the board. The application for renewal must be filed not later than sixty (60) days before the license expires. The application for renewal shall be filed in triplicate with and dated by the board. A copy of the application for renewal shall be distributed promptly by the chair of the board to the applicable chief of police. The application for renewal shall contain such information and data, given under oath or affirmation, as may be required by the board, but not less than the information contained in the original application.\n\n(2) A license renewal fee of one hundred dollars ($100.00) shall be submitted with the application for renewal. In addition to the renewal fee, a late penalty of fifty dollars ($50.00) shall be assessed against the applicant who files for a renewal less than thirty (30) days before the license expires. If the application is denied, one half (½) of the fee shall be returned.\n\n(3) If the police department is aware of any information bearing on the operator's qualifications, the information shall be filed in writing with the board not later than ten (10) days after the date of the application for renewal.\n(4) Every permit issued under this part will terminate at the expiration of one (1) year from the date of issuance, unless sooner revoked, and must be renewed before an entertainer is allowed to provide entertainment in an adult-oriented establishment in the following calendar year. Any entertainer desiring to renew a permit shall make application to the board. The application for renewal must be filed not later than thirty (30) days before the permit expires. The application for renewal shall be filed in triplicate with and dated by the board. A copy of the application for renewal shall be distributed promptly by the board to the chief of police. The application for renewal shall be upon a form provided by the board and shall contain such information and data, given under oath or affirmation, as may be required by the board.\n\n(5) A permit renewal fee of fifteen dollars ($15.00) shall be submitted with the application for renewal. In addition to the renewal fee, a late penalty of five dollars ($5.00) shall be assessed against the applicant who files for renewal less than thirty (30) days before the license expires. If the application is denied, one half (½) of the fee shall be returned.\n\n(6) If the police department is aware of any information bearing on the entertainer's qualifications, that information shall be filed in writing with the board not later than ten (10) days after the date of the application for renewal.\n\n(7) Notwithstanding anything herein to the contrary, any application for renewal of a license or for renewal of a permit shall be handled, investigated, and approved or denied within the same time periods as those established in this part for original license applications and permit applications. In the event a license renewal application or permit renewal application is denied, the applicant shall have all rights of appeal to the board as set forth in § 9-810. (Ord. #JT9905, Jan. 2000)\n\n9-812. Prohibited hours of operation—hours open for inspection.\nThe public portion of all adult-oriented establishments shall be open to inspection at all reasonable times by the applicable police department or such other persons as the board may designate. (Ord. #JT9905, Jan. 2000)\n\n9-813. Duties and responsibilities of operators, entertainers, and employees. (1) The operator shall maintain a register of all employees, showing the name, the aliases used by the employee, home address, age, birth date, sex, height, weight, color of hair and eyes, telephone number, social security number, driver license number, date of employment and termination, and duties of each employee, and such other information as may be required by the board. The above information on each employee shall be maintained in the register on the premises for a period of three (3) years following termination.\n\n(2) The operator shall make the register of employees available immediately for inspection by the board and/or police department upon demand of a member of the board or police department at all reasonable times.\n9-28\n\n(3) Every act or omission by an employee constituting a violation of the provisions of this part shall be deemed the act or omission of the operator if such act or omission occurs either with the authorization, knowledge, or approval of the operator, or as a result of the operator's negligent failure to supervise the employee's conduct, and the operator shall be punishable for such act or omission in the same manner as if the operator committed the act or caused the omission.\n\n(4) An operator shall be responsible for the conduct of all employees while on the licensed premises, and any act or omission of any employee constituting a violation of the provisions of this part shall be deemed the act or omission of the operator for purposes of determining whether the operator's license shall be revoked, suspended or renewed.\n\n(5) No employee of an adult-oriented establishment shall allow any minor to loiter around or to frequent an adult-oriented establishment or to allow any minor to view adult entertainment as herein defined.\n\n(6) Every adult-oriented establishment shall be physically arranged in such a manner that the entire interior portion of the booths, cubicles, rooms or stalls, wherein adult entertainment is provided, shall be visible from the common area of the premises. Visibility shall not be blocked or obscured by doors, curtains, partitions, drapes, or any other obstruction whatsoever.\n\n(7) The operator shall be responsible for and shall provide that any room or area used for the purpose of viewing adult-oriented motion pictures or other types of live adult entertainment shall be readily accessible at all times and shall be continuously opened to view in its entirety.\n\n(8) The license shall be conspicuously displayed in the common area of the premises at all times.\n\n(9) A sign shall be conspicuously displayed in the common area of the premises, and shall read as follows: \"This Adult-Oriented Establishment is Regulated by the Municipal Code of the City of Camden, Title 9, Chapter 8. Entertainers are:\n\n(a) Not permitted to engage in any type of sexual conduct;\n(b) Not permitted to expose their sex organs;\n(c) Not permitted to demand or collect all or any portion of a fee for entertainment before its completion;\n(d) Not permitted to appear in a state of full nudity.\"\n\n(10) The permit shall be kept by an employee, entertainer, or escort so that it is readily available for display immediately upon request of a customer, any member of such city police department, and board member, or any person designated by the board. (Ord. #JT9905, Jan. 2000)\n\n9-814. **Prohibited activities.** (1) No operator, entertainer or employee of an adult-oriented establishment shall permit to be performed, offer to perform, perform or allow, patrons to perform sexual intercourse or oral or anal copulation or other contact stimulation of the genitalia.\n(2) No", "num_tokens": 2048} {"category": "olmocr_science_pdfs-crime_and_law", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-crime_and_law/part-000-00000.npy", "text": "23; 57GA, ch 55, §3]\n\n17.24 Annotations. Books of annotations shall, so far as practicable, be printed and bound in the same manner, form, and style as the Code. [C24, 27, 31, 35, 39, §266; C46, 50, 54, §17.24]\n\n17.25 New editions. New editions of the Code, book of annotations, and reports of the supreme court may be published by the printing board when the supply on hand of the last\nedition becomes exhausted and when a new edition is necessary in order to meet the demand. [C24, 27, 31, 35, 39, §267; C46, 50, 54, §17.25]\n\n17.26 Number printed. The number of each edition of the Code, tables of corresponding sections, session laws, annotations, and reports of supreme court shall be determined by the printing board. [C73, §37; C97, §40; C24, 27, 31, 35, 39, §268; C46, 50, 54, §17.26]\n\n17.27 Other necessary publications—when necessary to sell. There may be published other miscellaneous documents, reports, bulletins, books, and booklets that are needed for the use of the various officials and departments of state, or are of value for the information of the general assembly or the public, in form and number most useful and convenient, to be determined by the printing board.\n\nWhen such publications paid for by public funds furnished by the state, contain reprints of statutes or departmental rules, or both, they shall be sold and distributed at cost by the department ordering same. Such publications shall be obtained from the superintendent of printing on requisition by the department and the selling price shall be determined by the printing board by dividing the total cost of printing, paper and binding by the number printed. Said price shall be set at the nearest multiple of ten to the quotient thus obtained. Distribution of such publications shall be made by the superintendent of printing gratis to public officers, purchasers of licenses from state departments required by statute, and departments. Funds from the sale of such publications shall be deposited monthly in the general fund of the state. [C24, 27, 31, 35, 39, §269; C46, 50, 54, §17.27; 57GA, ch 56, §2]\n\nAdditional geological reports, §305.9\nPublication of parts of Code, §14.21\nPublication of board of control bulletins, §218.46\n\n17.29 Title pages—complimentary insertions. The superintendent of printing shall provide the necessary printer's copy for a suitable title page for each publication requiring such title which shall contain the name of the author, but no such title shall have written or printed thereon or attached thereto the words \"Compliments of\" followed by the name of the author, nor any other words of similar import. [C24, 27, 31, 35, 39, §271; C46, 50, 54, §17.29]\n\n17.30 Inventory of state property. State officials, boards, commissions and heads of departments, divisions and all agencies of state government shall on or before December 31, 1941, and on or before said date in each year thereafter, file with the secretary of the executive council written detailed inventories of all real and personal property belonging to the state and in their charge or under their control and management or for which they are responsible, such inventories to be made under such rules and regulations and upon such forms as may be prescribed by the executive council. [C46, 50, 54, §17.30]\n\nReferred to in §17.31\n\n17.31 Lists compiled by council secretary. The secretary of the executive council, upon the filing with him of all the inventories, provided for in section 17.30, shall compile therefrom in two subdivisions one complete inventory of all the real and personal property owned by the state, as shown by said inventories. Such compilation shall list all real estate and improvements under one subdivision and the personal property under one subdivision, but classified as to the items included therein.\n\nSuch compiled completed inventory shall be revised and enlarged as the subsequent inventories are filed with him as provided in said section. [C46, 50, 54, §17.31]\n\n17.32 Records open to public. Said inventories shall be kept as permanent records in the office of the secretary of the executive council and shall be open for inspection and available for the information of the executive council, all other public officials, and the public, but the executive council shall not incur the expense of printing the same in book or pamphlet form. [C46, 50, 54, §17.32]\nCHAPTER 17A\nADMINISTRATIVE RULES AND REGULATIONS\n\n17A.1 Definitions. As used in this chapter the following words and phrases shall have the meanings respectively ascribed to them:\n\n1. “Administrative agency” or “agency” means each state board, commission, bureau, division, or department, other than a court, having statewide jurisdiction.\n\n2. “Person” includes individuals, associations, partnerships, and corporations.\n\n3. “Rules and regulations” includes rules, regulations and amendments thereto of general application and rules of administrative procedure issued under authority of law but shall not include rules and regulations adopted relating solely to the internal operation of the agency nor to rules and regulations adopted relating to the management, discipline, or release of any person committed to any state institution, nor such rules and regulations of the state department of health as may be necessary during emergencies such as floods, epidemics, invasion, or other disasters. [C54, §17A.1]\n\n17A.2 Procedure to make rules. Wherever in the statutes any administrative agency is empowered to make rules and regulations, said agency shall proceed as follows:\n\n1. A copy of the proposed rule or regulation before adoption shall be forwarded to the attorney general who shall, within twenty days, approve or disapprove of the form and legality thereof.\n\n2. Upon such approval by the attorney general the agency may adopt the rule or regulation and shall cause a copy thereof to be filed in the office of the secretary of state.\n\n3. If the attorney general disapproves of the form or legality of any proposed rule or regulation he shall state in writing his reasons therefor, and the administrative agency shall then not proceed until the reasons for his objections have been removed. If the attorney general fails to approve or disapprove within twenty days the agency may proceed as though he had approved. [C54, §17A.2]\n\n17A.3 Rules enrolled. When a rule or regulation adopted as provided in section 17A.2 is filed in the office of the secretary of state, he shall make an original copy thereof in substantially the same manner that acts of the general assembly are enrolled, indorse thereon the time and date of filing in his office, and deposit and index the same in the files of his office. [C54, §17A.3]\n\n17A.4 Copy to Code editor. The secretary of state shall furnish a copy of every rule and regulation, filed in his office, to the Code editor. [C54, §17A.4]\n\n17A.5 Copies mailed. Each administrative agency shall mail a copy of each of its rules and regulations to the office of the clerk of each district court, to the secretary of the state bar association, to each district and supreme court judge, and to any person requesting same. [C54, §17A.5]\n\n17A.6 Petition for reconsideration. Any group of twenty or more persons substantially interested or affected in their rights of person or property by a rule or regulation adopted by any administrative agency may petition to the attorney general for a reconsideration of such rule or regulation or for an amendment or modification thereof. Such petition shall set forth a clear, concise description of the facts and the grounds upon which such action is sought. Upon filing of such petition the attorney general shall cause the agency to grant the petitioners a public hearing. The agency shall give thirty days notice of the time and place of such hearing to said petitioners by registered mail. [C54, §17A.6]\n\n17A.7 Effect of former rules. Within six months after July 4, 1951 every administrative agency shall file its rules and regulations, existing on that date in the office of the secretary of state, who shall proceed therewith as provided in sections 17A.3 and 17A.4. After the expiration of said period any rule or regulation not so filed shall be of no further force or effect. [C54, §17A.7]\n\n17A.8 Publishing limited rules. Each administrative agency promulgating professional and regulatory examining and licensing rules and regulations and each agency promulgating rules and regulations of limited application shall cause the same to be published in pamphlet form for distribution upon demand. [C54, §17A.8]\n\n1", "num_tokens": 2048} {"category": "olmocr_science_pdfs-crime_and_law", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-crime_and_law/part-000-00000.npy", "text": "1 Cal. L. Rev. 1471, 1476 (1993) (noting that under the prior system, prosecutors' control of the charge meant control of the sentence, which significantly increased the likelihood of a plea). But see Jennifer L. Mnookin, *Uncertain Bargains: The Rise of Plea Bargaining in America*, 57 Stan. L. Rev. 1721, 1739-40, 1740 n.32 (2005) (book review) (stating that *Blakely* and *Booker* will not necessarily result in increased number of trials, because pressures to dispose of high volume of cases will remain; also, plea rates have always been high even in states with indeterminate sentencing).\n\n\\(^8\\) Among respondents in jurisdictions with mandatory or presumptive guidelines, eighty-two percent indicated that appeals of sentences have increased after *Blakely* and *Booker*. See *infra* app. B (question 4).\n\n\\(^8\\) Attorney General Alberto Gonzales, Sentencing Guidelines Speech (June 21, 2005), available at [http://www.usdoj.gov/ag/speeches/2005/06212005victimsofcrime.htm](http://www.usdoj.gov/ag/speeches/2005/06212005victimsofcrime.htm). (\"We risk a return to the pre-guidelines era, when defendants were encouraged to 'play the odds' in our criminal justice system, betting that the luck of the draw—the judge randomly assigned to the case—might result in a lighter sentence.\").\n\n\\(^8\\) E.g., E-mail from Joshua Marquis, Vice President, National Association of District Attorneys, to Tom Lininger, Assistant Professor, University of Oregon School of Law (Nov.\nThe number of victims must undergo cross-examination, especially now that *Crawford* has made accusers virtually indispensable in criminal prosecutions.\n\nNot only do the new sentencing rules increase the likelihood of trial, but they also necessitate victims’ testimony on a wider range of issues. Before the Supreme Court insisted that the jury make findings of fact to support statutory sentencing enhancements, the prosecution typically submitted these issues at a sentencing hearing in which the judge was the sole fact-finder. The defendant generally had no confrontation rights in these hearings. The rules of evidence usually did not apply. The standard of proof was lower than in a trial. Often the testimony of the victim was not necessary at a sentencing hearing under the old rules, because hearsay was much easier to admit than at trial. *Blakely* necessitates a more exacting process for proving the predicate facts in order to seek a sentencing enhancement. Basically, *Blakely* has lengthened the most difficult phase of the proceeding for accusers—the portion in which accusers must testify before the jury, subject to all the rules of evidence and the rigorous cross-examination allowed at trial.\n\nProsecutions of domestic violence and sexual assault will definitely feel the effect of the new sentencing regime, because many states have created...\n\n---\n\n\n89. *See* Stephanos Bibas, Judicial Fact-Finding and Sentence Enhancements in a World of Guilty Pleas, 110 Yale L.J. 1097, 1177-79 (2001) (noting that, as of 2001, judges were generally the primary fact-finders in sentencing of noncapital cases).\n\n90. *Id.* at 1178.\n\n\n92. Bibas, *supra* note 89, at 1152-53 (noting that pre-*Blakely*, the standard of proof was preponderance of the evidence).\n\n93. For example, a police officer’s testimony regarding a victim’s excited utterance would be a sufficient basis on which to impose a sentencing enhancement in the pre-*Crawford*, pre-*Blakely* era. *See* Fed. R. Evid. 803(2), 1101(d)(3).\n\n94. Among respondents to this Article’s survey, seventy-two percent believed that the sentencing procedures necessitated by *Blakely* and/or *Booker* would lengthen the testimony of accusers and victims before the jury, as compared with the period preceding June 2004. *See infra* app. B (question 8).\n\n95. This Article’s survey found that among the states establishing bifurcated jury proceedings in the wake of trial, fifty percent apply the state’s evidence code to the jury proceedings regarding sentencing issues. *See infra* app. B (question 7).\n\nspecial sentencing enhancements for such cases. The following factors could form the basis for an increase in the maximum sentencing range: the youth of the victim, the defendant's use of a weapon, the severity of injury caused by the defendant, the defendant's deliberate cruelty or other aggravating mental state, the pregnancy of the victim (whether preexisting or caused by the defendant), the presence of a child witness, and the defendant's recidivism.\n\nIndeed, Blakely itself involved a sentencing enhancement for \"deliberate cruelty\" in a domestic violence case. Were the Blakely case retried in Washington State under the new procedure approved by the state's legislature in April 2005, a jury would need to hear evidence regarding the defendant's \"deliberate cruelty\" and any other sentencing enhancements at the same time that the jury adjudicated the defendant's guilt or innocence—requiring more testimony at trial by every witness (including the victim) whose evidence would be necessary to support the sentencing enhancements.\n\nIn sum, Blakely and Booker require accusers to work harder at trials and sentencing hearings. Accusers will need to testify more often, and a higher\n\n\n98. Blakeley v. Washington, 124 S. Ct. 2531, 2534-35 (2004). The defendant had kidnapped his wife and forced her into a coffin-like box before transporting her a great distance. Id.\n\n99. The Blakely case actually did not require retrial because the defendant had entered a guilty plea. Figure in Sentencing Case Gets 35 Years, Columbian (Vancouver, WA), Mar. 25, 2005, at C2.\n\n100. As a result of Blakely and Washington's new Senate Bill 5477, the factual basis for sentencing enhancements must be proven to the jury during the underlying trial, except in very narrow circumstances. Amala & Laurine, supra note 83, at 1140-41.\nproportion of their testimony will be subject to the rules of evidence than in the era before 2004.\n\nB. Erosion of Evidentiary Privileges for Accusers\n\nSeveral privileges that previously shielded accusers have become more fragile in recent years. One example is the spousal testimonial privilege. When applicable, this privilege allows a witness to refuse to testify against her spouse. Due to the complex psychological milieu in a domestic violence case, many victims may wish to invoke this privilege when called to testify against their spouses. Advocates of mandatory prosecution have urged that the spousal testimonial privilege should not apply in prosecutions of violence committed by one spouse against another. This proposal met with significant resistance in the 1990s, but eventually more and more states adopted domestic violence exceptions to the spousal testimonial privilege, and by 2005 such exceptions were universal. Now a victim who has suffered domestic violence or rape at the hands of her spouse may not decline to testify on the ground that she is married to the defendant.\n\nThe privilege against self-incrimination has weakened as well. Victims of domestic violence and sexual assault sometimes wish to \"take the Fifth\" for a variety of reasons: They fear that their inconsistent statements over\n\n101. Mueller & Kirkpatrick, supra note 13, § 5.31. In most states, the witness is the holder of the privilege. Pamela A. Haun, The Marital Privilege in the Twenty-First Century, 32 U. Mem. L. Rev. 137, 158 (2001) (noting that a majority of states with a spousal privilege permit only the witness spouse to assert the privilege). In other words, the witness can elect to testify whether or not her spouse approves. By contrast, the marital communication privilege, which shields confidential communications between spouses during marriage, only yields when both spouses approve disclosure.\n\n\n103. Renee L. Rold, All States Should Adopt Spousal Privilege Exception Statutes, 55 J. Mo. B. 249, 251-52 (1999) (explaining advantages and disadvantages of these statutes).\n\n104. E.g., Anita K. Blair, Domestic Violence: Should Victims Be Forced to Testify Against Their Will?, A.B.A. J., May 1996, at 77. \"Mandatory waiver of spousal privilege goes too far. Advocates of mandatory waiver aren't interested in victims' rights; if they were, they would respect a woman's right to invoke her privilege not to testify. . . . A married woman who wants to stay married might have many good reasons not to want to testify against her husband.\"\n\nId.\n\n\n106. Mosteller, supra note 28, at 609 n.550 (noting that by 2005, all states recognizing the spousal testimonial", "num_tokens": 2048} {"category": "olmocr_science_pdfs-crime_and_law", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-crime_and_law/part-000-00000.npy", "text": "NANCY WELSH\n\n\nS/T MEDIATION THEORY 7900-613\n\n\n\nNANCY WELSH\n\n\nS/T NATURAL RESOURCE 7900-615\n\n\n\nGABRIEL ECKSTEIN\n\n\nNo requirements for purchase.\n\n\n\n\n\n\nS/T PRIVACY LAW 7900-617\n\n\n\nBRIAN HOLLAND\n\n\nInformation Privacy Law 6ed\n9781454892755\nWolters Kluwer\n244.00\nSolove, Schwarz\n\n\nS/T PRIVATE INTL LAW 7900-612\n\n\n\nWILLIAM HENNING\n\n\nS/T TEXAS WATER LAW 7900-624\n\n\n\nGABRIEL ECKSTEIN\n\n\nProf. Eckstein has made arrangements with Texas Bar Books to provide his students free electronic access to “Essentials of Texas Water Resources 4th”. He will provide that access info to all registered students by early January. Students who inquire at the Book Store will be directed to Prof. Eckstein, although students should check their email as he will send it mid/late December.\n\n\n\n\n\n\nS/T TRANSFER PRICING 7900-\n\n\n\nWILLIAM BYRNES\n\n\nS/T TRIAL ADVOCACY: CRIM 7900-635\n\n\n\nVASSER\n\n\n\nSECURED TRANSACTIONS 7488\nWILLIAM HENNING\n\nUnderstanding Secured Transactions 5ed\nISBN: 9781579110321\nNew: 49.00 Used: 35.00\n\nSelect Commercial Law Statutes 2017\nISBN: 9781683287551\nNew: 62.00 Used: 45.00\n\nSECURITIES REGULATION 7492\nNEAL NEWMAN\n\nSecurities Regulation 8ed\nISBN: 9781609304133\nNew: 222.00 Used: 160.00\n\nSecurities Regulation Statutory Supplement 2017\nISBN: 9781683286370\nNew: 44.00\n\nSPANISH FOR LAWYERS 7487\nTBA\n\nTAX BUSINESS ENTITIES 7516\nGARY LUCAS\n\nFundamentals of Business Enterprise Taxation 6ed\nISBN: 9781634596039\nNew: 225.00 Used: 160.00\n\nLogic of Subchapter K: A Conceptual Guide to Taxation of Partnerships 5ed\nISBN: 9781634604727\nNew: 92.00 Used: 68.00\n\nSelected Federal Taxation Statutes, & Regulations 2018\nISBN: 9781683288077\nNew: 61.00 Used: 45.00\n\nTEXAS CRIM LAW PRACT 7725\nJACK STRICKLAND\n\nYou will need, or have access to:\nTexas penal Code\nTexas Code of Criminal Procedure\nTexas Rules of Evidence\nTexas Disciplinary Rules of Professional Conduct\n\nTEXAS CRIM PROCEDURE 7532\nCHARLES MALLIN\n\nTexas Criminal Procedure 12ed\nReamy, Bubany\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
ISBNTitlePublisherPrice (New)Price (Used)
9781532309991Criminal Laws of Texas 2017-2019BeckhamNew: 90.00Used: 65.00
9781934973028Texas Pre-Trial 7540TDCAANew: 95.00
9781931000516Texas Trials & Appeals 7548AlbrightNew: 103.00
9781598392586Texas Civil Trials 2017O'Connor'sStrongly recommended: New: 106.00
9781546203261Texas Trust Law 3edBeyerNew: 45.00
9781496964274Wills & Estates 7076BeyerNew: 28.00Used: 20.00
9781546203261Texas Estate Planning Statutes w/Commentary 2017-2019Author HouseNew: 45.00
<|endoftext|>Child Sexual Abuse in India and the Protection of Children from Sexual Offences (POCSO) Act 2012: A Research Review\n\nRenu*, Geeta Chopra**\n\n*Assistant Professor, Institute of Home Economics, University of Delhi. Delhi-110016, India\n**Associate Professor, Institute of Home Economics, University of Delhi, Delhi-110016, India\n\nReceived: Date of submission: 30th May, 2019 Accepted on: 2nd July, 2019 Published on: 29th July, 2019\n\nABSTRACT\n\nChild Sexual Abuse (CSA) is most heinous crime against children and in most instances, it is hidden in nature. It is the most under reported crime. The effect of CSA lingers across the lifetime of an individual. It is now being recognized as toxic stress which emotionally can harm the child irreparably. This paper presents studies on CSA in India. The Protection of Children from Sexual Offences (POCSO) act was enacted in 2012. POCSO has many difficulties in implementation. The paper also presents the researches done on POCSO putting across issues related to mandatory reporting, consensual sex, doctors preparedness for handling CSA victims, and status of special courts under POCSO.\n\nKeywords: CSA, POCSO, mandatory reporting, age of consent, special courts\n\n1. Introduction\n\nChild sexual abuse is widely prevalent, yet hardly reported. In the name of culture and tradition, at times, sexual violence against children is covered up, ignored or not reported. A protected child is a potential national resource whereas exploited child can become victim first and then an offender. Safety, security, harmony, loves and care is what a child needs to grow fully and to accomplish his/her full potential.\n\nTraditionally, in India, children were valued and pampered. But for some children truth was different they were sexually abused in the name of customs and folk practices. For example, in southern parts of India child prostitution was present in the name of ‘devadasi’. Devadasi is a girl child dedicated to worship and service of a deity. Today the truth and reality for CSA is reached to its worst level (Chopra, 2015). India is a highly diverse country. Indian culture is a combination of multiple religions, languages, different traditions, ethnicities", "num_tokens": 2048} {"category": "olmocr_science_pdfs-crime_and_law", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-crime_and_law/part-000-00000.npy", "text": " to gather and present relevant evidence on their own.\n\nThe investigation is a party’s opportunity to present testimonial and other evidence that the party believes is relevant to resolution of the allegations in the Formal Complaint. A party that is aware of and has a reasonable opportunity to present particular evidence and/or identify particular witnesses during the investigation, and elects not to, will be prohibited from introducing any such evidence during the adjudication absent a showing of mistake, inadvertence, surprise, or excusable neglect.\n\nC. Documentation of Investigation\n\nThe investigator will take reasonable steps to ensure the investigation is documented. Interviews of the parties and witnesses may be documented by the investigator’s notes, audio recorded, video recorded, or transcribed. The particular method utilized to record the interviews of parties and witnesses will be determined by the investigator in the investigator’s sole discretion, although whatever method is chosen shall be used consistently throughout a particular investigation.\n\nD. Access to the Evidence\n\nAt the conclusion of the evidence-gathering phase of the investigation, but prior to the completion of the investigation report, the Investigating Officer will transmit to each party and their advisor, in either electronic or hard copy form, all evidence obtained as part of the investigation that is directly related to the allegations raised in the Formal Complaint, including\nevidence the University may choose not to rely on at any hearing and inculpatory or exculpatory evidence whether obtained from a party or some other source. Thereafter, the parties will have ten (10) days in which to submit to the investigator a written response, which the investigator will consider prior to completing the investigation report.\n\nThe parties and their advisors are permitted to review the evidence solely for the purposes of this grievance process and may not duplicate or disseminate the evidence to the public.\n\nE. Investigation Report\n\nAfter the period for the parties to provide any written response as specified “Access to Evidence” has expired, the investigator will complete a written investigation report that fairly summarizes the various steps taken during the investigation, summarizes the relevant evidence collected, lists material facts on which the parties agree, and lists material facts on which the parties do not agree. When the investigation report is complete, the investigator will transmit a copy to the Title IX Coordinator. The investigator will also transmit the investigation report to each party and their advisor, in either electronic or hard copy form.\n\nXVI. ADJUDICATION PROCESS SELECTION\n\nAfter the investigator has sent the investigation report to the parties, the Title IX Coordinator will transmit to each party a notice advising the party of the two different adjudication processes specified in “Adjudication.” The notice will explain that the hearing process specified in “Hearing Process” is the default process for adjudicating all Formal Complaints and will be utilized unless both parties voluntarily consent to administrative adjudication as specified in “Administrative Adjudication (Optional)” as a form of informal resolution. The notice will be accompanied by a written consent to administrative adjudication and will advise each party that, if both parties execute the written consent to administrative adjudication, then the administrative adjudication process will be used in lieu of the hearing process. Parties are urged to carefully review this policy (including the entirety of “Adjudication”), consult with their advisor, and consult with other persons as they deem appropriate (including an attorney) prior to consenting to administrative adjudication.\n\nEach party will have three (3) days from transmittal of the notice specified in this Section to return the signed written consent form to the Title IX Coordinator. If either party does not timely return the signed written consent, that party will be deemed not to have consented to administrative adjudication and the Formal Complaint will be adjudicated pursuant to the hearing process.\n\nXVII. ADJUDICATION\n\nA. Hearing Process\n\nThe default process for adjudicating Formal Complaints is the hearing process specified in this Section (“Hearing Process”). The hearing process will be used to adjudicate all Formal Complaints unless both parties timely consent to administrative adjudication as specified in “Adjudication Process Selection.”\n1. Hearing Officer\n\nAfter selection of the hearing process as the form of administrative adjudication, the Title IX Coordinator will promptly appoint a hearing officer who will oversee the hearing process and render a determination of responsibility for the allegations in the Formal Complaint, at the conclusion of the hearing process. The Title IX Coordinator will see that the hearing officer is provided a copy of the investigation report and a copy of all evidence transmitted to the parties by the investigator as specified in \"Access to Evidence.\"\n\n2. Hearing Notice and Response to the Investigation Report\n\nAfter the hearing officer is appointed by the Title IX Coordinator, the hearing officer will promptly transmit written notice to the parties notifying the parties of the hearing officer’s appointment; setting a deadline for the parties to submit any written response to the investigation report; setting a date for the pre-hearing conference; setting a date and time for the hearing; and providing a copy of the University’s Hearing Procedures. Neither the pre-hearing conference, nor the hearing itself, may be held any earlier than ten (10) days from the date of transmittal of the written notice specified in this Section (\"Hearing Notice and Response to the Investigation Report\").\n\nA party’s written response to the investigation report must include:\n\n- To the extent the party disagrees with the investigation report, any argument or commentary regarding such disagreement;\n- Any argument that evidence should be categorically excluded from consideration at the hearing based on privilege, relevancy, the prohibition on the use of sexual history specified in “Sexual History,” or for any other reason;\n- A list of any witnesses that the party contends should be requested to attend the hearing pursuant to an attendance notice issued by the hearing officer;\n- A list of any witnesses that the party intends to bring to the hearing without an attendance notice issued by the hearing officer;\n- Any objection that the party has to the University’s Hearing Procedures;\n- Any request that the parties be separated physically during the pre-hearing conference and/or hearing;\n- Any other accommodations that the party seeks with respect to the pre-hearing conference and/or hearing;\n- The name and contact information of the advisor who will accompany the party at the pre-hearing conference and hearing;\n• If the party does not have an advisor who will accompany the party at the hearing, a request that the University provide an advisor for purposes of conducting questioning as specified in “Hearing.”\n\nA party’s written response to the investigation report may also include:\n\n• Argument regarding whether any of the allegations in the Formal Complaint are supported by a preponderance of the evidence; and\n\n• Argument regarding whether any of the allegations in the Formal Complaint constitute Sexual Harassment.\n\n3. Pre-Hearing Conference\n\nPrior to the hearing, the hearing officer will conduct a pre-hearing conference with the parties and their advisors. The pre-hearing conference will be conducted live, with simultaneous and contemporaneous participation by the parties and their advisors. By default, the pre-hearing conference will be conducted with the hearing officer, the parties, the advisors, and other necessary University personnel together in the same physical location. However, upon request of either party, the parties will be separated into different rooms with technology enabling the parties to participate simultaneously and contemporaneously by video and audio.\n\nIn the hearing officer’s discretion, the pre-hearing conference may be conducted virtually, by use of video and audio technology, where all participants participate simultaneously and contemporaneously by use of such technology.\n\nDuring the pre-hearing conference, the hearing officer will discuss the hearing procedures with the parties; address matters raised in the parties’ written responses to the investigation report, as the hearing officer deems appropriate; discuss whether any stipulations may be made to expedite the hearing; discuss the witnesses the parties have requested be served with notices of attendance and/or witnesses the parties plan to bring to the hearing without a notice of attendance; and resolve any other matters that the hearing officer determines, in the hearing officer’s discretion, should be resolved before the hearing.\n\n4. Issuance of Notices of Attendance\n\nAfter the pre-hearing conference, the hearing officer will transmit notices of attendance to any University employee (including administrator, faculty, or staff) or student whose attendance is requested at the hearing as a witness. The notice will advise the subject of the specified date and time of the hearing and advise the subject to contact the hearing officer immediately if there is a material and unavoidable conflict.\n\nThe subject of an attendance notice should notify any manager, faculty member, coach, or other supervisor, as necessary, if attendance at the hearing will conflict with job duties, classes, or other obligations. All such managers, faculty members, coaches, and other supervisors are required to excuse the subject of the obligation, or provide some other accommodation, so that the subject may attend the hearing as specified in the notice.\nThe University will not issue a notice of attendance to any witness who is not an employee or a student.\n\n5. Hearing\n\nAfter the pre-hearing conference, the hearing officer will convene and conduct a hearing pursuant to the University’s Hearing Procedures. The hearing will be audio recorded. The audio recording will be made available to the parties for inspection and review on reasonable notice, including for use in preparing any subsequent appeal.\n\nThe hearing will be conducted live, with simultaneous and contemporaneous participation by the parties and their advisors. By default, the hearing will be conducted with the hearing officer, the parties, the advisors, witnesses, and other necessary University personnel together in the same physical location. However, upon request of either party, the parties will be separated into different rooms with technology enabling the parties to participate simultaneously and contemporaneously by video and audio.\n\nIn the hearing officer’s discretion, the hearing may be conducted virtually, by use of video and audio technology, where all participants participate simultaneously and contemporaneously by use of such technology.\n\nWhile the Hearing Procedures and rulings from the hearing officer will govern the particulars of the hearing, each hearing will include, at a minimum:\n\n- Opportunity for each party to address the hearing officer directly and to respond to questions posed by the hearing officer;\n- Opportunity for each party’s advisor to ask", "num_tokens": 2048} {"category": "olmocr_science_pdfs-crime_and_law", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-crime_and_law/part-000-00000.npy", "text": " interview information, included in assessment report\n\n29 July: Draft list of interviewees and list of interview questions exchanged for feedback August: Interviews\n1. Draft list of interviewees 2. Finalise interview questions 3. Conduct interviews and compile information\n1. Draft interview questions 2. Feedback on list of interviewees\n\n\n\n\n\nFocus group discussions\nFocus group report, included in assessment report\n\n5 August: Draft focus group questions September: Focus groups with staff October: Focus groups with students\n1. Finalise focus group questions 2. Jointly conduct focus groups 3. Review focus group report\n1. Draft focus group questions 2. Jointly conduct focus groups 3. Draft focus group report (2,500 words)\n\n\n\n\n\nObjective\nActivity\nOutput\nDeadline\nBudget Items\nSSI Responsibility\nConsultant responsibility\nIndicators and means of verification\nRisks and responses\n\n\n-----------\n----------\n--------\n----------\n--------------\n-------------------\n--------------------------\n-----------------------------------\n-------------------\n\n\n\nAPPENDIX 3: ADVICE ON CONDUCTING INTERVIEWS\n\nPreparation is the key to conducting an interview successfully. Interviewers should ensure that they are well prepared. Before the interview, the interviewer should:\n\n- prepare the interview environment (office or meeting room), and eliminate distractions, phone calls, conflicting appointments\n- review the interview questions to ensure they are sensitive to the interviewee’s place in the hierarchy of the institution and tailored accordingly.\n\nThe following steps ensure a sense of direction and control during the interview.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
What to doHow to do it
1. Develop rapport• Break the ice with appropriate non-threatening topics<br>• Be friendly but avoid excessive small talk<br>• Present interview agenda/timing<br>• Let the interviewee know you will take notes
2. Control the interview• Prevent rambling and unrelated discussions<br>• Make sure the interviewee answers your questions<br>• Use silence rather than avoid it: let the person think!
3. Gather information• Use a variety of questions and question types<br>• Do not speak less than 10% or more than 25% of the time<br>• Rephrase questions if answers are not clear<br>• Be candid with your questions
4. Seek a balanced picture• Avoid getting a one-sided picture of the situation<br>• Ask questions to get a balanced picture<br>• Ask for strengths and weaknesses, positives and negatives
5. Take notes• Get key ideas/information and fill in details later
6. Deal with questions• Make sure you give enough information to clarify<br>• Do not answer questions if you feel they are inappropriate
7. Close the interview• Discuss the next steps in the gender self-assessment<br>• Give timeframe for future contact<br>• Leave door open to seek further clarification if needed
8. Complete your notes• Right after the interview, complete your notes to record examples, anecdotes or any areas for further probing
\n\nAPPENDIX 4: SAMPLE GUIDELINES FOR A FOCUS GROUP\n\n1. INTRODUCTION: OBJECTIVES OF THE GENDER SELF-ASSESSMENT\n\nThe institution is undertaking a gender self-assessment. This aims to make the institution more gender responsive, by working out what we are doing well and where we might improve. Self-assessment looks at how the institution is working across a range of factors:\n\n- performance effectiveness\n- laws, policies and planning\n- community relations\n- accountability and oversight\n- personnel\n- institutional culture.\n\nTo undertake the institutional self-assessment we have worked at a number of different levels:\n\n- review of documentation\n- questionnaires\n- interviews\n- field visits.\n\n2. OBJECTIVE OF FOCUS GROUP\n\nTo have the opportunity to raise a few issues relating to gender relations and structures within the institution, and how gender is addressed in the services the institution provides to the community.\n\n3. A NUMBER OF SHORT PARTICIPATORY EXERCISES (IN TIME AVAILABLE)\n\n3i. Most important gender issues in country today?\n - Listing\n - Ranking\n\n3ii. Institution’s gender policy\n - Definitions of gender and gender mainstreaming\n - Clarification of gender mainstreaming →\n - Objective – gender equality\n - Strategy\n - Ensuring both women’s and men’s needs and interests are integrated into service provision and operations\n - Empowering women through participation and in decision-making\n - Outcome – gender equality and women’s empowerment\n\n4. DISCUSSION ABOUT GENDER RESPONSIVENESS OF SERVICE PROVISION\n\n‘Strengths, weaknesses, opportunities and threats’ (SWOT) exercise to explore:\n\n- main institutional strengths to be gender responsive in service provision\n- main weaknesses in being gender responsive in service provision\n- main opportunities that we can make use of\n- main constraints that we need to overcome.\n\n5. DISCUSSION ABOUT GENDER AND INSTITUTIONAL CULTURE\n\nFacilitated discussion of the following questions.\n\n- What gender issues do you think are important within the institution itself?\n- What are working relations between men and women like?\n- Why aren’t there more women at senior levels?\n\n6. OPEN DISCUSSION\n\n---\n\n10 These guidelines were adapted from Moser, C., *An Introduction to Gender Audit Methodology: Its Design and Implementation in DFID Malawi* (London: Overseas Development Institute, 2005), pp. 32–33.\nAPPENDIX 5: SAMPLE TEMPLATE FOR A GENDER SELF-ASSESSMENT REPORT\n\nTable of contents\n\nExecutive summary – highlights main points of report including background, methodology and process, and main conclusions and recommendations\n\nAcknowledgements – people instrumental in promoting or organising the self-assessment and carrying it out\n\nList of abbreviations and acronyms\n\nIntroduction – purpose of the institutional self-assessment and report, background to self-assessment including dates and process\n\nMethodology – how assessment was designed, how information was collected and analysed\n\nMain findings under each theme, including strengths and challenges:\n • performance effectiveness\n • laws, policies and planning\n • community relations\n • accountability and oversight\n • personnel\n • institutional culture\n\nGood practices – these can be included under findings, but it can be useful to create a separate section to highlight them\n\nRecommendations – if the terms of reference for the assessment foresee making recommendations\n\nAnnexes – including list of documents reviewed; list of interviewees; list of focus groups held; copy of any questionnaires used\n\nAPPENDIX 6: SAMPLE TEMPLATE FOR A GENDER ACTION PLAN\n\nYour organisation may already use an action planning tool that can be adapted for your gender action plan. Doing so may have the advantage that staff already understand how the planning tool works, and there may already be systems in place for monitoring and reporting on progress.\n\nThis gender action plan template is provided as an example of the elements that should be included in a gender action plan. It can be adapted to suit your organisation.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
Area of workActivities [sample]WhenWhereResponsible partyWith whomResourcesMonitoring and reportingEvaluation
Performance effectivenessAchieve 100% follow-up of complaints of domestic violenceBy end 4th quarter 2012All officesChief constablesTraining unit, community organisationsCore time, materialsQuarterly; meeting of chief constablesData on follow-up of complaints
Laws, policies and planningCreate inter-departmental gender team with terms of reference (TORs)January 2012All officesNational and regional heads of departmentHuman resourcesCore timeMonthly; meeting of heads of departmentApproved TORs
Update gender policyAchieve 100% follow-up of complaints of domestic", "num_tokens": 2048} {"category": "olmocr_science_pdfs-education_and_jobs", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-education_and_jobs/part-00-00000.npy", "text": "erscript{76}\n\nThe Integrated Nutrition Project (INP), the only study in this review to incorporate the CDT, was implemented among children from kindergarten to fifth-grade, Piaget’s preoperational and concrete operational stages which are unable to grasp abstract concepts.\\textsuperscript{38, 76} The INP used CDT model to ensure their program was suitable for the age and developmental levels of these children.\\textsuperscript{38} Hands-on activities such as food preparation and eating were incorporated to gather information by use of the senses.\\textsuperscript{38} Also, simple concrete messages were used, for instance “eat more of” whole grains, fruits, and vegetables so children would not have to decipher which foods were better or worse choices for them to consume.\\textsuperscript{38}\n\n**Educational theories of Dewey.** John Dewey was a philosopher of education who theorized that there is a connection between experience, thinking, and eventually the development of knowledge. Experience involves a combination of an active and passive constituent.\\textsuperscript{78} The active portion involves the experiment or a person doing something, and the passive portion involves consequences whether good or bad as a product to the\nMerely participating in an activity will not result in learning or generate knowledge. However, linking the consequences of an activity to the individual participating by reflection of changes occurred will produce the outcome of knowledge gained.\n\nDewey acknowledged the senses as an integral part to the development of knowledge. The senses are a “gateway” for moving information from the “external world” to the mind. Unlike the customary ways of scholastic learning, where students are expected to resist tendencies to incorporate their naturally energetic bodies in soaking up immense amounts of information into their minds, Dewey theorizes directing the use of those energetic senses with a set purpose for applied meaning of what is being taught. This enables children to use both their minds and their bodies in learning. The INP used SCT, CDT, and the educational theories of Dewey as a theoretical guide, which allowed for use of the senses in hands-on, age-appropriate activities as a means to increase fruit and vegetable consumption.\n\n**Tools of Assessment**\n\nReliable dietary assessment tools are crucial in evaluating the effectiveness of nutrition-based programs. In this review of literature, changes in FV consumption were evaluated by a variety of methods including 24-hour dietary recalls (self- or parental-reported), food records, lunch and/or snack-time observations (visual or weighed), and food frequency questionnaires (FFQ). Surveys and questionnaires to assess children’s FV preferences, knowledge, attitudes, self-efficacy, and other health-related characteristics were also conducted. In addition, questionnaires\nhave been given to children, lunch and school staff to assess the acceptability of the intervention.\n\nResearchers may face many problems when attempting to evaluate children’s dietary intakes, including poor knowledge of foods and portion sizes, literacy limitations, inability to describe mixed food dishes, and a brief attention span. Certain assessment tools may be more appropriate than others depending on the sample population; however, none of them are flawless. Since the focal point of this literature review is multi-component programs aimed at increasing FV intake among children, this section will address the validity of assessment tools aimed specifically at evaluating changes in FV consumption.\n\n24-hour recalls/food records. Quick and simple to conduct, 24-hour recalls generally ask children to report detailed information about everything they consumed for the past 24 hours, as well as estimate the portion sizes. Multiple 24-hour recalls can help to provide an estimate of food intakes without altering the usual consumption patterns of the child. Of the ten studies analyzed in this review, six incorporated some form of a 24-hour recall (see table 2.1).\n\nA significant disadvantage of 24-hour recalls is the reliance on memory. Baxter et al. referred to 24-hour recalls as a “memory test”, indicating the difficulty in remembering detailed information from a previous time period. Validation studies of 24-hour recalls have found that some children report intrusions (inclusion of foods not eaten) and/or omissions (failure to report foods eaten) in their recalls. Fourth graders who completed three separate food recalls validated against mealtime observations were found to have matched only 35% of foods observed eaten, 24% of foods reported were\nintrusions, and 41% of foods eaten were not reported. A study with third graders found they were able to recall 77.9% of the food they consumed in a 24-hour period with the help of unquantified food records, but of those foods reported 64.7% of the portion sizes estimated were inaccurate. Seventy-six percent of children incorrectly estimated the portion size of vegetables, with 60% overestimating. This finding is in contrast with Lytle et al., who suggested that fourth graders overestimate consumption of fruit, but correctly estimate vegetable intake. These studies point out that researchers should use caution in how they interpret data collected among children from 24 hour recalls, as there is a great deal of inconsistency.\n\nParental input on children’s 24-hour recalls has been speculated as whether or not that would improve the validity of the recall. One study presented moderate Pearson correlations (0.41 to 0.79) when comparing observed versus third graders’ self-reported intakes. Similar correlations have been seen in mother’s recall of children’s consumption. Basch et al. tested the validity of Latino mothers’ 24-hour recall for children between the ages of four to seven years-old. Correlations between mother’s recalls and trained observers ranged from -0.10 to 0.82 for major nutrients with an average of 0.51. Only 41.3% of mother’s reported vegetable consumption were the same as observed, with 28.3% over-reporting. Fisher et al. found that mother’s 24-hour recalls, for infants and toddlers less than two years-old, overestimated nutrients. Garceau et al. found parental input on dietary recalls necessitated substantially more time and resources than children’s self-reports and only resulted in a small effect of difference in mean nutrient intake. Restraints on time and resources should be evaluated in the decision of whether to use parent-assisted recalls.\nFood records are an alternative to 24-hour recalls. Food intake and portion sizes are recorded simultaneously with the consumption of meals, snacks, and beverages. Food records are usually recorded for three to seven days, including at least one weekend day. This method avoids reliance on memory and offers a more complete picture of usual eating patterns, but is time intensive and may result in diet modifications. For these reasons, along with the necessity to be literate, it appears that food records are not as commonly used in elementary school-based nutrition programs as an assessment tool. Only one of the ten studies in this review utilized food records to track changes in FV consumption. Unquantified food records, however, have been used as memory aids for 24 hour recalls.\n\nLytle et al. conducted a validation study of the reliability of 24-hour recall interviews in addition to unquantified food records among third grade students. A significant difference was found between observed versus recalled energy intake \\((p<0.05)\\), but there were no significant differences in actual sodium intake, or in the percentage of energy from total fat, saturated fat, monounsaturated fat, polyunsaturated fat, carbohydrate, and protein. In this study it was concluded that 24-hour recalls with the assistance of food records may be a beneficial assessment tool when comparing group means. Interestingly, in a later study by Lytle et al., food records to assist 24-hour recalls failed to show a positive cost and benefit outcome.\n\n**Mealtime observations.** Mealtime observations are frequently used in validation studies for 24-hour recalls and food records. They are an effective way to evaluate the success of FV interventions, because observations allow for the most precise assessment of food intake among children. Observations, though require a\nsignificant amount of time and are expensive. In this review of literature, 5-A-Day Power Plus and the High 5 Project conducted mealtime observations in addition to 24-hour recalls. The Integrated Nutrition Project, the Fruit and Vegetable Promotion Program, the School Garden’s Experiential Learning Approach Program, and the Food Dudes all utilized mealtime observations to assess consumption of FV.\n\nMost mealtime observations for school-based programs generally occur during the National School Breakfast and/or Lunch Programs. Trained research staff examine children’s food trays prior to and after eating each meal. The proportions of each variety of food consumed are determined by either weighing the food, digital photography, or visual estimation based on a specified protocol. Weighing the food before and after consumption will provide the most exact measurement of food eaten, but has the disadvantage of expense and requires an abundance of time. Direct visual observation and digital photography are less expensive and time-intensive, so provide more efficient assessment tools. These methods are similar to one another but instead of researchers directly observing meals, digital photographs of the meal are taken before and after consumption.\n\nBenefits of digital photography include being quick, more convenient, and allows for adequate assessment of consumption of the foods photographed. Swanson, in a plate waste study using digital photography, identified some of the issues involved when using digital photography. He indicated that items presented in the before photo, such as apples or bananas, were missing in the after photo. A little investigation revealed that students were encouraged to take the fruit with them to eat on the bus ride home or later that day. This made it more difficult to assess fruit intake. Swanson also found that it\nwas extremely difficult to assess the amount of small condiments consumed.\\textsuperscript{94}\n\nWilliamson et al", "num_tokens": 2048} {"category": "olmocr_science_pdfs-education_and_jobs", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-education_and_jobs/part-00-00000.npy", "text": " ethics. Course may be repeated once with a different topic of study.\n\nPHI 5311 Readings from the Philosophers (3) \nCross-listed as PSC 5311 \nPre-requisite(s): For Political Science or Philosophy graduate students only; or consent of instructor \nAn intensive, critical reading of selected works of major philosophers such as Plato, Aristotle, Augustine, Aquinas, Descartes, Locke, Hume, Kant, Hegel, Nietzsche, Heidegger, Russell, and Rawls. Other philosophers may be added to this list. May be taken a maximum of six times if different topic, not to exceed eighteen semester hours.\n\nPHI 5312 Topics in Classical Philosophy (3) \nPre-requisite(s): For philosophy graduate students only or by departmental approval \nA critical study of philosophers from the classical world; may include figures from the pre-socratic origins of philosophy to the times of epicurean and stoic philosophers, including especially Plato and Aristotle. Course may be taken up to three times with different topics for a total of nine hours course credit.\n\nPHI 5313 Topics in Action Theory (3) \nAn in-depth study of relevant recent and/or more classical philosophical literature on one or more selected topics such as free will, responsibility, practical rationality, decision theory, and intention. Course may be taken up to three times with different topics for a total of nine hours course credit.\n\nPHI 5314 Topics in Modern Philosophy (3) \nPre-requisite(s): For philosophy graduate students only or by departmental approval \nA critical study of philosophers from the Modern Period, including thinkers from the sixteenth to the nineteenth centuries. Course may be taken up to three times if topic is different for a total of nine hours credit.\n\nPHI 5315 Topics in Philosophy of Mind (3) \nPre-requisite(s): For philosophy graduate students only or by departmental approval \nA philosophical examination of the nature of the human mind and its relation to the body as well as theories that account for the nature of consciousness, intentionality, and other features of mentality. Course may be taken up to three times when topic is different for a total of nine credit hours for the course.\n\nPHI 5316 Contemporary Philosophical Problems (3) \nPre-requisite(s): For philosophy graduate students only or by departmental approval \nExamination of historical, normative, and analytical problems which have arisen in the history of philosophy and an examination of the systems of philosophy which have emerged from the consideration of these problems. May be taken six times if different topic, not to exceed eighteen semester hours.\n\nPHI 5318 Logic for Philosophers (3) \nPre-requisite(s): For philosophy graduate students only or by departmental approval \nIn this course the student should gain formal tools that are useful in a wide-range of areas of philosophy, including: propositional logic, quantificational logic, basic set theory, basic probability theory, and basic modal logic.\n\nPHI 5319 Philosophical Writing (3) \nPre-requisite(s): For philosophy graduate students only or by departmental approval \nThis course contains a significant amount of epistemology, metaphysics, and ethics. This course has as its goal mastering the art of writing a critical essay in philosophy, an essential skill for success in graduate school in philosophy and for publication success after securing a faculty position in philosophy.\n\nPHI 5320 Special Topics in Philosophy (3) \nPre-requisite(s): For philosophy graduate students only or by departmental approval \nSpecial research topics to be undertaken by students under direct supervision of the professor. Course may be taken a maximum of four times if different topic, not to exceed twelve hours.\nPHI 5321 Topics in Epistemology (3)\nPre-requisite(s): For philosophy graduate students only or by departmental approval\nCovers a broad array of issues concerning the nature of successful cognition of the sort sought after in purely theoretical activities. May focus on issues such as the nature and possibility of knowledge, the threat of skepticism, and the nature of rationality and justification, as well as on current controversies in the literature, including controversies with the value of knowledge, debates between foundationalists and coherentists, the Gettier problem, and many others. Course may be taken up to three times when the topic is different for a total of nine credit hours for the course.\n\nPHI 5322 Topics in Metaphysics (3)\nPre-requisite(s): For philosophy graduate students only or by departmental approval\nCovers a broad array of issues concerning the nature of being and reality, involving topics concerning God, the world, and the self. May focus on related topics such as ontology, category theory, substances and attributes, space and time, causation, and possible worlds. Course may be taken up to three times when topic is different for a total of nine credit hours for the course.\n\nPHI 5330 Readings in Ancient and Medieval Philosophy (3)\nPre-requisite(s): For philosophy graduate students only or by departmental approval\nA critical readings course on primary sources and ancient and medieval philosophy. The course concludes with a comprehensive written examination over the sources.\n\nPHI 5331 Readings in Modern and Contemporary Philosophy (3)\nPre-requisite(s): For philosophy graduate students only or by departmental approval\nA critical readings course on primary sources in modern and contemporary philosophy. The course concludes with a comprehensive written examination over the sources.\n\nPHI 5333 Seminar in Political Philosophy (3)\nCross-listed as PSC 5333\nSee PSC 5333 for course information.\n\nPHI 5342 Seminar on Religion, Law, and Politics (3)\nCross-listed as PSC 5342\nAn examination of the liberal and republican traditions of government and their relationship to church-state relations, with particular emphasis on how philosophers, legal theorists, and/or theologians assess the influence of both traditions on the American constitutional system. Among the topics that may be discussed are the debates about liberalism, religious liberty, religious establishment, the employment of religious reasons in a liberal regime, and the nature of public reason.\n\nPHI 5343 Classical Political Thought (3)\nCross-listed as PSC 5343\nSee PSC 5343 for course information.\n\nPHI 5350 Workshop in Teaching Philosophy (3)\nPre-requisite(s): For philosophy graduate students only or by departmental approval\nThis course will address a broad range of pedagogical issues involved in becoming a successful philosophy teacher. Topics include: educational theory, organizational strategies, practical techniques for effective lecturing, practical techniques for stimulating discussion, the logistics of evaluation, the scholarship of teaching and the importance of ongoing self-assessment of classroom performance.\n\nPHI 5353 Medieval Political Thought (3)\nCross-listed as PSC 5353\nSee PSC 5353 for course information.\n\nPHI 5360 Contemporary Ethical Theory (3)\nPre-requisite(s): For philosophy graduate students only or by departmental approval\nA critical study of issues in contemporary ethical theory; may be taken up to three times with different topics of study, not to exceed nine semester hours.\n\nPHI 5361 Topics in Contemporary Philosophy of Religion (3)\nPre-requisite(s): For philosophy graduate students only or by departmental approval\nThis course investigates issues in contemporary philosophy of religion. Course may be taken up to three times with different topics, not to exceed a total of nine hours of course credit.\n\nPHI 5362 Issues in Contemporary Philosophy of Science (3)\nPre-requisite(s): For philosophy graduate students only or by departmental approval\nA critical study of issues in contemporary philosophy of sciences; may be taken up to three times with different topics of study, not to exceed nine hours of course credit.\n\nPHI 5363 Modern Political Thought (3)\nCross-listed as PSC 5363\nSee PSC 5363 for course information.\n\nPHI 5365 Topics in Philosophy of Language (3)\nPre-requisite(s): For philosophy graduate students only or by departmental approval\nA critical study of issues in philosophy of language. Meaning, reference, intentionality and extensionality are among possible topics to be considered using primary sources in contemporary philosophy. May be taken up to three times with different topics not to exceed nine total credit hours.\n\nPHI 5393 Advanced Seminar in Political Philosophy (3)\nCross-listed as PSC 5393\nSee PSC 5393 for course information.\n\nPHI 5V99 Thesis (1-6)\nResearch, writing, and oral defense of an approved master's thesis. A minimum of six semester credit hours of PHI 5V99 is required.\n\nPHI 6V10 Prospectus Research (1-6)\nPre-requisite(s): PHI 5330 and 5331; and completion of regular course work\nSupervised research for developing and writing a Dissertation Prospectus Proposal that will be the subject of a preliminary exam that will admit students to candidacy. A student may repeat this course for credit, with a maximum of eighteen total hours.\n\nPHI 6V99 Dissertation (1-12)\nSupervised research for the doctoral dissertation.<|endoftext|>FOR IMMEDIATE RELEASE\nFebruary 28, 2017\n\nContact: Emma Vodick, 630.305.5250\nvodick@naperville.il.us\n\n523 S. Webster St. • Naperville, Illinois", "num_tokens": 2048} {"category": "olmocr_science_pdfs-education_and_jobs", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-education_and_jobs/part-00-00000.npy", "text": " According to Toke, “there is an acceptance of a broadly positivist position concerning the role of scientists as the legitimate bearers of truth…” (ibid.). However, Toke believes this to be completely unjustified and argues that it is time to move to a post-positivist position (ibid.). He concludes that moving to a social constructivist position “will lead us to a model of environmental policy that allows us to fully analyse the importance of various interest groups in shaping outcomes” (ibid.).\n\nThe very next year, Claire Dunlop wrote a response to Toke’s criticism of Haas. In her criticism, Dunlop critiqued Toke’s critique of Haas and critiqued Haas as well.\n\nOne of Toke’s biggest critiques of Haas’s work was that Haas gave too much value to epistemic communities over other special interest groups. However, Dunlop counters this argument by stating that Haas was attempting to fill a gap in major International Relations theory by moving “beyond the existing structure/agency binary … rather than attempting to establish a hegemonic position for epistemic communities over environmental groups” (Dunlop, 2000, 139).\n\nDunlop also critiques Toke’s understanding of Haas’s works. She argues that what Toke sees as a positivist approach is vastly overstated (ibid, 137, 139-140). In fact, Dunlop found that Haas’s approach is in line with social constructivists, and that Haas’s lack of coverage on positivism was another point against Toke’s accusation of Haas’s positivist approach (ibid, 139-140).\n\nHowever, Dunlop and Toke’s views do converge, when they criticize Haas for his weakness in explaining how epistemic communities and other special interest groups co-exist (ibid, 140-141). Dunlop argues that the uncertainty of an epistemic community’s political power contributes to this question of how epistemic communities and special interest groups co-exist (ibid, 141). Because epistemic\ncommunities need to cooperate with decision makers there is a risk that their “‘consensual knowledge’ may overstate the influence these expert enclaves alone can have” (ibid.). To rectify this problem, Dunlop says that Haas’s four characteristics (quoted earlier in section II) must be “problematized and their importance relative to each other elucidated” (ibid, 142). Dunlop concludes that more has to be done to test the characteristics of an epistemic community in order to know whether some characteristics can be more important than others, and how this affects competition between epistemic communities and other groups (ibid, 142). Such an effort can be referred to as a theory of competition (Cross, 2011, 24).\n\nRonald Krebs also sees a limit to the potential influence of epistemic communities not residing within government. He argues that their technical expertise may dominate decision making in government, but beyond such technical knowledge epistemic community theory does not explain “how state leaders acquire their information about basic issues in international relations.” (Krebs, 2001, 225-226.)\n\nAnother critique of Haas’s work on epistemic communities focuses on how epistemic communities actually turn their policy projects into policy when faced with competition from other groups. Dunlop, while suggesting how Haas’s theory’s problem with other groups could be improved, cited James K. Sebenius’s article in the special edition of International Organization. Dunlop agreed with Sebenius’s conclusion that in order for epistemic communities to gain influence, they must ‘bargain’ and make ‘winning coalitions’ with other actors in the policy making process. (Dunlop, 2000, 141-142; Sebenius, 1992, 326, 352.)\n\nSebenius argues that Haas’s theory of how epistemic communities influence policy making is wholly incomplete. Haas, according to Sebenius, misses the importance of epistemic communities strategically interacting with other groups and working to ensure their preferred policy outcome. Key to this is the shared beliefs of the actors. (Sebenius, 1992, 356.) “More generally, the translation of epistemic consensus into actual measures of policy coordination - that is to say the ultimate influence of the epistemic community - occurs through bargaining” (ibid, 357). However, Sebenius sees no theory of bargaining within the theory of epistemic communities. In fact, he states that Haas’s view on this matter is again “incomplete and misleading” (ibid.). He views the combination of consensual knowledge and bureaucratic power as a way to produce outcomes (ibid.). Ronald\nSebenius’s core criticism of Haas’s epistemic community theory is that Haas’s explanation of epistemic communities fails to explain explicitly how epistemic communities’ shared beliefs affect policy outcome (ibid.). As mentioned earlier, Sebenius's conclusion is that for an epistemic community’s shared beliefs to affect policy outcomes, the epistemic community must bargain with competing groups and form winning coalitions (ibid, 357-359). Ronald Krebs criticizes epistemic communities in a similar fashion. Krebs argued that even when military officers in America and Europe have formed something similar to an epistemic community, the truth remains that each one competes to control the agenda. (Krebs, 2001, 225.) Because of this, Krebs states that the persuasive power of an epistemic community is a rarer phenomenon than a predictable one (ibid.).\n\nAccording to Sebenius, when looking at an epistemic community as a de facto natural coalition, it is possible to hypothesize how they expand into winning coalitions. They would have “to be more influential in step with several factors: the greater their extent and depth, the stronger their cohesiveness, the more consistent their beliefs, the more resonant their policy project with outside scientific and popular opinion, the more opportune their bureaucratic placement, and the weaker their actual and potential opponents.” (Sebenius, 1992, 360.) Such an epistemic community would then have to negotiate its way to a winning coalition. Sebenius outlines five devices which an epistemic community can use to create a winning coalition:\n\n“First, to the extent that an epistemic community shapes perceptions of interests, it affects the psychological yardstick by which potential agreements as well as alternatives to negotiated agreement are measured … Second, to the extent that valuable new agreements are invented, the perceived conflict of interest may decrease still further … Third, if an epistemic community can cause issues to be linked in a manner that worsens the opponents' alternatives to agreement with its proposed policy project, this will shift the disagreement point and improve the chances that the community's project is accepted … Fourth, an epistemic community may advantageously affect the perceived zone of possible agreement to the extent that issues are framed and potential solutions or agreements are made salient in a way favorable to the community's policy project. Fifth, binding commitments to preferred outcomes may be possible” (ibid, 361).\n\nThis section of the paper has covered the criticisms of Haas’s epistemic community theory and shown how the theory’s critics have suggested it might be improved. As is the case for all theories, criticism unearths faults and underdeveloped\naspects of the theory, and it is a crucial part of the development of a theory. Next this paper will see how epistemic community theory has addressed these criticisms and developed over time.\n\n3.4 Cross’s Suggestions to Correct Criticisms\n\nTwenty years after this seminal edition of *International Organization*, Mai’a K. Davis Cross revisited the theory of epistemic communities. She argues that the theory of epistemic communities has not developed much since this edition of *International Organization*. In fact, with time Cross believes that the theory has become marginalized. Too often research has focused on scientists and technicians as the members of epistemic communities, and, according to Cross, this has limited epistemic communities. (Cross, 2013, 137-138.) Therefore, Cross has set out to reconceptualize the theory of epistemic communities.\n\nCross sets out to show that an epistemic community’s membership is not the driving force behind its persuasiveness, but rather its “internal cohesion and professionalism” drive its ability to persuade (ibid, 147). She “hypothesizes that if an epistemic community is not internally cohesive, then it is less likely to be as persuasive as one that is” (ibid.). In her work, Cross “identified four innovations [to the theory of epistemic community], which address: (1) the variation in internal cohesion within epistemic communities and the central importance of professionalism; (2) the role of uncertainty in understanding epistemic community influence; (3) the relationship between epistemic communities and governments; and (4) the nature of knowledge” (ibid, 147-148).\n\nWhen thinking of an epistemic community, it is easy to think of it in a simple binary way: either it exists or it does not. However, Cross argues that this is not the case. In fact, epistemic communities can exist at different degrees of being. Compared to other epistemic communities or actors an epistemic community may find itself in", "num_tokens": 2048} {"category": "olmocr_science_pdfs-education_and_jobs", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-education_and_jobs/part-00-00000.npy", "text": ".\n\n### ELIGIBILITY\n- Must be at least 18 years of age\n- Must meet Office for People with Developmental Disabilities (OPWDD) eligibility requirements\n- Must be Medicaid eligible and active\n\n### COMMUNITY PRE-VOCATION\nAvailable in the Bronx and Rockland County\n\nCommunity Pre-Vocation prepares people for employment. The Foundling’s staff instructs in task completion, problem solving, and safety through job readiness workshops and volunteer work in a variety of sites throughout the community.\n\n**Highlights include:**\n- Discovery of individual interests and skills across many fields to identify a fulfilling career\n- Professional development seminars and workshops\n- Translatable on-the-job experience gained through unique volunteering opportunities\n\n**Volunteer sites include:**\n- Catholic Charities\n- Meals on Wheels\n- The New York Botanical Garden\n- Walgreens REDI Program\n- World Vision\n\n### SUPPORTED EMPLOYMENT\nAvailable in the Bronx and Rockland County\n\nSupported Employment offers people the opportunity to attain paid, permanent employment in the community.\n\nParticipants are placed in paid internships across neighborhood businesses while learning the skills needed for the job. Participants work with a job developer, whose purpose is to support in negotiating job placements, providing job coaching, assistance in interacting with employers, on-site training, and individualized supervision.\n\n**Highlights include:**\n- Job readiness classes on relevant topics (e.g. conflict resolution and workplace attire)\n- One-on-one job placement and coaching from an experienced mentor\n- Continued personalized support after securing employment\n\nINTERESTED IN LEARNING MORE?\nContact our Information & Referral Team:\n\nEmail: I&R@NYFoundling.org \nPhone: 212-886-4020\n\nVisit us online & watch our video!<|endoftext|>Georgia Library Spotlight - Baker Elementary Learning Commons\n\nEmily Brown\nBaker Elementary, emily.Brown@cobbk12.org\n\nFollow this and additional works at: https://digitalcommons.kennesaw.edu/glq\n\nPart of the Library and Information Science Commons\n\nRecommended Citation\n\nThis Columns is brought to you for free and open access by DigitalCommons@Kennesaw State University. It has been accepted for inclusion in Georgia Library Quarterly by an authorized editor of DigitalCommons@Kennesaw State University. For more information, please contact digitalcommons@kennesaw.edu.\nBaker Elementary Learning Commons\n\nThe Baker Elementary Learning Commons is an elementary school library serving over 800 students in grades K–5. Located in Acworth, Georgia, its mission is to inspire students to be great digital citizens, empower students to be independent readers, and for students to achieve a sense of lifelong learning.\n\nThe Baker Learning Commons has a lot of resources to help reach its mission. It has over 10,000 print books, over 900 ebooks, 16 computers, and 30 iPads. Staff and students also have access to the Cobb Digital Library, where they can access research databases such as encyclopedias, BrainPOP, and PebbleGo. In addition to all of this, students have Library PASS which allows them to use the Cobb County Public Library’s databases and check out any books from any branch with just their student number.\n\nStudents at Baker are welcome to visit the Learning Commons at any time during the school day (7:15 a.m. – 2:00 p.m.). Students are welcome to come on their own to check out books, read quietly, do schoolwork, etc. Students are also welcome to come as a group to do groupwork. Classes also rotate through the Learning Commons on a regular basis for lessons that incorporate digital citizenship, STEM, read alouds, research skills, and technology integration.\n\nTo learn more and see the wonderful lessons students participate in, please visit the website: http://www.cobblearning.net/bakermedia/.<|endoftext|>Focus for April is the special Moonshooter supplement, \"Are Americans Losing Faith in Their Colleges?\". Prepared nationally by the same people who produce a rather incisive weekly called \"Chronicle of Higher Education,\" the Moonshooter annually examines issues of importance to colleges and their alumni.\n\nTo accompany the Moonshooter piece is an alumni response from three University graduates. You will find their remarks in the center of the magazine.\n\nThe entire University community was saddened by the death of Gomer Jones in March. A brief report on Gomer and his career is on page 4.\n\nWe've been getting mild complaints about the Roll Call being printed on that colored paper, so this time it's on white. We'll see if that helps. The class notes are in the back of the magazine, and toward the front are the bits and pieces of local news called \"Campus Notes.\"\n\nNext issue a look at the recipients of the University's highest award, the Distinguished Service Citation, a Commencement round up, along with other articles of hopeful interest.—CBR\n\nThe Man from Drake — a new president for OU 2\n\nGomer Jones: 1914-1971—a pictorial memory of the man who was coach and counselor for the young men who made football more than a game at OU 4\n\nCampus Notes—the worthy of note and the worthy of nothing around the University 6\n\nAre Americans Losing Faith in Their Colleges— the annual Moonshooter supplement from Editorial Projects for Education 9\n\nAlumni Response—three alumni voice their opinions on the Moonshooter question 17\n\nRoll Call—the usual tidbits of alumni news around the world 21<|endoftext|>Grammatical performance in children with dyslexia: the contributions of individual differences in phonological memory and statistical learning\n\nMerel van Witteloostuijn1*, Paul Boersma1, Frank Wijnen2 and Judith Rispens1\n\n1Department of Linguistics, Amsterdam Center for Language and Communication, University of Amsterdam, Amsterdam, the Netherlands and 2Department of Linguistics, Utrecht Institute of Linguistics OTS, Utrecht University, Utrecht, the Netherlands\n\n*Corresponding author. Email: m.t.g.vanWitteloostuijn@gmail.com\n\n(Received 1 November 2019; revised 18 February 2021; accepted 9 March 2021; first published online 08 April 2021)\n\nAbstract\nSeveral studies have signaled grammatical difficulties in individuals with developmental dyslexia. These difficulties may stem from a phonological deficit, but may alternatively be explained through a domain-general deficit in statistical learning. This study investigates grammar in children with and without dyslexia, and whether phonological memory and/or statistical learning ability contribute to individual differences in grammatical performance. We administered the CELF “word structure” and “recalling sentences” subtests and measures of phonological memory (digit span, nonword repetition) and statistical learning (serial reaction time, nonadjacent dependency learning) among 8- to 11-year-old children with and without dyslexia (N = 50 per group). Consistent with previous findings, our results show subtle difficulties in grammar, as children with dyslexia achieved lower scores on the CELF (word structure: p = .0027, recalling sentences: p = .053). While the two phonological memory measures were found to contribute to individual differences in grammatical performance, no evidence for a relationship with statistical learning was found. An error analysis revealed errors in irregular morphology (e.g., plural and past tense), suggesting problems with lexical retrieval. These findings are discussed in light of theoretical accounts of the underlying deficit in dyslexia.\n\nKeywords: morphology; syntax; phonological memory; statistical learning; dyslexia\n\nIntroduction\nDevelopmental dyslexia (henceforth “dyslexia”) is a learning disability that is characterized by impaired reading and spelling in spite of normal intelligence and educational opportunities and in absence of sensory impairments (American Psychiatric Association, 2013; Snowling, 2001). Individuals with (a familial risk...\nof) dyslexia are known to experience difficulties in the area of phonological skills (Vellutino et al., 2004; see Melby-Lervåg et al., 2012 for a meta-analysis), which has led to the predominant view that the literacy impairments in dyslexia stem from an underlying phonological deficit. When learning to read and spell, children must acquire the correspondences between letters and sounds (i.e., graphemes and phonemes). If, however, the processing, storage, and/or representation of phonological information is impaired, children experience difficulties in the acquisition of grapheme–phoneme mappings that in turn result in problems with literacy acquisition (e.g., Ramus & Szenkovits, 2008).\n\nOver time, researchers have uncovered impairments in cognitive abilities other than literacy and phonological skills. These may involve general cognitive skills such as the processing of visual and auditory input (e.g., Stein & Walsh, 1997; Tallal, 2004), attention (e.g., Facoetti et al., 2000), and motor functioning (e.g., Ramus, 2003), but may also extend to language domains other than literacy and phonology, such as inflectional morphology and syntax (e.g., Rispens & Been, 2007; Robertson & Joanisse, 2010; Scarborough, 1990). Together, these observations have led to suggestions of a more general learning deficit in dyslexia (Nicolson & Fawcett, 2007, 2011), that is, a deficit of the domain-general ability to detect statistical patterns in sensory input, including spoken and written language (henceforth “statistical learning”, but note that Nicolson and Fawcett [2", "num_tokens": 2048} {"category": "olmocr_science_pdfs-education_and_jobs", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-education_and_jobs/part-00-00000.npy", "text": " Pregnancies, latest edition, edited by Gabbe, Niebyl and Simpson\n\nOB_GYN 6867: Obstetrical/Gynecological Outpatient\n\nObstetrical/Gynecological Outpatient\n\nCredit Hours: 5\n\nOB_GYN 6868: Urogynecology Selective\n\nThe 4th year medical student will work as part of a team providing hands-on clinical services in an inpatient, outpatient, and consultative setting. Students will participate in daily morning report, weekly didactic sessions, weekly surgical procedures and Friday afternoon seminars. Students will learn using a variety of evidence-based resources and direct faculty teaching. Students will also participate in weekly teaching didactics within the OB/GYN department such as Grand Rounds.\n\nCredit Hours: 5\n\nPrerequisites: Ob-Gyn Clerkship\n\nOB_GYN 6864: Obstetrics/Gynecology Offsite Advanced Selective\n\nObstetrics/Gynecology Offsite Advanced Selective\n\nCredit Hours: 5\n\nOccupational Therapy (OC_THR)\n\nOC_THR 1000: Introduction to Occupational Therapy\n\nIntroductory course to provide students information about the occupational therapy profession. Registered therapists lecture on clinical aspects. Students participate in discussions on program requirements, placement, and trends in the profession.\n\nCredit Hour: 1\n\nOC_THR 2001: Topics in Occupational Therapy\n\nOrganized study of selective topics in occupational therapy. Particular topics and credit hours may vary from semester to semester. Repeatable upon consent of department.\n\nCredit Hour: 1-99\n\nPrerequisites: freshman or sophomore standing; instructor's consent\n\nOC_THR 2005: Problems in Occupational Therapy\n\nIndependent investigation leading to the completion of a project or paper.\n\nCredit Hour: 1-99\n\nPrerequisites: freshman or sophomore standing; instructor's consent\nOC_THR 4001: Topics in Occupational Therapy\nOrganized study of selective topics in occupational therapy. Particular topics and credit hours may vary from semester to semester. Repeatable upon consent of department.\nCredit Hour: 1-99\nPrerequisites: junior standing; instructor's consent\n\nOC_THR 4060: Professional Issues\nIntroduction to the structures of the profession including professional association, philosophical and ethical perspectives and preparation for client contact. Includes experiential instruction in infection control.\nCredit Hour: 1\nPrerequisites: acceptance into the occupational therapy program.\nGraded on A-F basis only\n\nOC_THR 4085: Problems in Occupational Therapy\nIndependent investigation leading to the completion of a project or paper. Repeatable upon consent of department.\nCredit Hour: 1-99\nPrerequisites: Instructor's consent\nRecommended: Junior standing\n\nOC_THR 4220: Clinical Kinesiology\n(same as PH_THR 4250). This course for occupational therapy students examines the musculoskeletal system with special emphasis in body movements and the application of laws and biomechanical principles that govern movement in order to select and perform effective occupation-based treatment. Graded on A-F basis only.\nCredit Hours: 3\nRecommended: Acceptance into the occupational therapy program\n\nOC_THR 4240: Applied Neurophysiology for Allied Health Students\n(same as C_S_D 4430 and PH_THR 4240). Principles of basic neurophysiology, emphasizing correlation of structure and function of the nervous system. Graded on A-F basis only.\nCredit Hours: 3\n\nOC_THR 4270: Clinical Pathophysiology\n(same as PH_THR 4270). Interdisciplinary and case-based examination of the pathophysiology, prevention and general health management of disease/injury across the lifespan encountered in occupational and physical therapy practice. Graded on A-F basis only.\nCredit Hours: 3\nPrerequisites: successful completion of prior professional coursework\n\nOC_THR 4310: Foundations of Occupational Therapy\nHistory, contemporary practice, conceptual foundations, professional organizations and official documents of the OT profession are presented. Activity analysis, adaptation, and assistive technology are introduced in the context of promoting health and occupational participation. Graded on A-F only basis.\nCredit Hours: 4\nPrerequisites: PTH_AS 4222 with a grade of \"C\" or better\n\nRecommended: Admission to the Occupational Therapy professional program required\n\nOC_THR 4350: Rehabilitation Practice\nAnalysis of major disability areas from an occupational perspective. Administration and interpretation of assessments and application of treatment theories and approaches for deficits in movement, sensation, cognition and perception. Graded on A-F basis only.\nCredit Hours: 4\nRecommended: Must be admitted to the Occupational Therapy Professional Program\n\nOC_THR 4390: Lifespan Assessment\n(cross-leveled with OC_THR 7390). Basic evaluation skills in occupational therapy practice across the lifespan are introduced. This course provides an introduction of the essentials of occupational therapy evaluation: interviewing, screening, assessment, and report writing in general contexts across the lifespan. Enrollees will also receive an introduction to basic clinical reasoning skills required for instrument selection, interpretation of findings, and application to treatment planning. Graded on A-F basis only.\nCredit Hours: 4\nPrerequisites: Restricted to Occupational Therapy students only\n\nOC_THR 4420: Lifespan Occupations I\nOverview of typical development from infancy through adolescence from an occupational perspective. Emphasis on the impact of personal and contextual factors on occupational development in children and adolescents. Graded on A-F basis only.\nCredit Hours: 2\nPrerequisites: Admission to Occupational Therapy professional program and satisfactory completion of all previous professional program coursework (C or better for Undergraduates)\n\nOC_THR 4422: Fieldwork I - Children\nDevelopment of clinical observation skills via on-site observation of children with typical and atypical development. Opportunities to gather and organize data, plan and implement activities, and develop therapeutic relationships with children and their care providers. Graded on S/U basis only.\nCredit Hour: 1\nPrerequisites: Admission to Occupational Therapy professional program and satisfactory completion of all previous professional program coursework (C or better for undergraduates)\n\nOC_THR 4450: Pediatric Practice\nLecture and laboratory course designed which addresses Occupational Therapy pediatric frames of reference and theories. Common conditions seen in Occupational Therapy practice as well as interventions such as feeding, positioning, facilitation of movement and sensory strategies are also addressed. Graded on A-F basis only.\nCredit Hours: 4\nRecommended: Admission to the Occupational Therapy professional program\nOC_THR 4520: Fundamentals of Occupational Therapy\nThis course will provide an overview of disability across the lifespan, including personal and professional interactions. Professional values, ethics and advocacy are also emphasized. Graded on A-F basis only.\n\nCredit Hours: 4\nRecommended: Restricted to students currently enrolled in the Occupational Therapy Program\n\nOC_THR 4620: Lifespan Occupations II\nOverview of biopsychosocial development and the aging process from young adulthood through older adulthood from an occupational perspective. Emphasis on the impact of client and contextual factors on occupational development and loss of occupations throughout the adult lifespan. Graded on A-F basis only.\n\nCredit Hours: 2\nPrerequisites: Admission to the Occupational Therapy professional program and satisfactory completion of all previous professional program coursework (C or better for undergraduate; B or better for graduate)\n\nOC_THR 4622: Fieldwork I Older Adults\nDevelopment of evaluation and intervention skills via on-site interaction with older adults in a residential facility. Opportunities to gather data, plan/implement activities, document client performance, and develop therapeutic relationships with older adults and care providers. Graded on S/U basis only.\n\nCredit Hour: 1\nPrerequisites: Admission to the Occupational Therapy professional program and satisfactory completion of all previous professional program coursework (C or better for undergraduate; B or better for graduate)\n\nOC_THR 4650: Lifespan Interventions\nThis course provides a foundational overview of common treatment theories and frames of reference that guide intervention planning across the lifespan. Graded on A-F basis only.\n\nCredit Hours: 4\nPrerequisites: OC_THR 4310 and OC_THR 4520. Restricted to students who are currently enrolled in the Occupational Therapy Program\n\nOC_THR 4670: Hand and Upper Extremity Intervention\nTo gain entry level skills needed to evaluate and treat common upper extremity conditions, including acute injuries and cumulative trauma disorders. Graded on A-F basis only.\n\nCredit Hours: 2\nPrerequisites: PTH_AS 4222 or PTH_AS 7222, OC_THR 4220 or OC_THR 7220, OC_THR 4390 or OC_THR 7390\n\nOC_THR 4750: Cognition Across the Lifespan\nThis course introduces students to theoretical models, assessment, and treatment in cognitive rehabilitation. Graded on A-F basis only.\n\nCredit Hours: 2\nRecommended: Restricted to Occupational Therapy Majors\n\nOC_THR 4770: Community-Based Practice\nFocus on role of occupational therapy in prevention, health and wellness. Program development and evaluation completed through community needs assessment and completion of health promotion project. Graded on A-F only basis.\n\nCredit Hours: 3\nPrerequisites: acceptance into major and completion of program year 1\n\nOC_THR 4920: Clinical Documentation\nDevelopment of observation and assessment skills related to effective documentation of occupational therapy services. Emphasizes exposure to various clinical settings, and third party payers, and legislative policies impacting documentation. Graded on A-F basis only.\n\nCredit Hours: 2\nRecommended: Restricted to students admitted to the professional program", "num_tokens": 2048} {"category": "olmocr_science_pdfs-education_and_jobs", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-education_and_jobs/part-00-00000.npy", "text": " Strategic Plan Goal 1, Increasingly provide access to digital collections and services to support instruction, research, and outreach, while improving access to the UNLV Libraries’ print and media collections.\n\n- Participated in the development of a plan and procedures for weeding. Completed a shift of the fourth floor of Lied Library. Shifting on the fifth floor was begun.\n- The entire main collection was shelf read during the period of July-September. Most of the third and fourth floors, and all of the fifth floor were shelf read during the fall semester. Parts of all three floors have been shelf read since then.\nLibraries Strategic Plan Goal 2, Actively foster user-focused environments committed to identifying and delivering information resources and services that meet or exceed user expectations.\n\n- LASR retrieval process was improved by increased staff coverage of the area.\n- Worked with Libraries Systems staff to facilitate the process for registering new students for library privileges.\n- Implemented manual hold processing as a preliminary step to implementing automatic hold processing in the future. This function is not working as envisioned.\n\nOther accomplishments\n\n- Worked with Systems staff to develop a batch import process for extending the expiration dates of continuing students’ library cards each semester. This eliminated the problem of all UNLV students’ cards expiring on October 1. The next phase will automate the process to the maximum extent that the system will allow.\n- Approximately 243 remote user accounts were set up using the online form provided for Distance Education students to apply for library barcodes.\n\nII. Statistical Data\n\n- The number of visits to Lied Library was up by 5% this past year. While the total number of books checked out remained about the same, the number checked out through the Self Checks increased again, this year by 10%. It appears that each year, more library users are becoming aware of the Self Checks, and using them.\n- Total renewals rose only slightly (2%), but there was a 9% increase in the number of books renewed online.\n- In-house use of the main stacks increased by 20%. However, the number of LASR requests decreased by 5%.\n- There was a 29% decrease in the number of new books shelved, a reflection of fewer volumes purchased than in previous years.\n- Physical reserve checkout dropped from 10,463 to 5,400 (48%), which was expected, since anything that can be scanned is now put on electronic reserve. The number of \"hits\" recorded for use of electronic reserves July 2003-June 2004 increased 39% over last year's count, which was begun in August of 2002 (August 2002-July 2003).\n- Patron assistance at the circulation desk decreased 20%. Patron assistance for physical reserves decreased by 62%.\n- Both the number of books paged from UNLV by CCSN, and from CCSN by UNLV decreased by about 20%.\n- We received $3,731.14 from our collection agency, which is a 5% increase from last year’s $3,559.57.\nInstruction Department\nDiane VanderPol\nHead Instructional Services Librarian\n\nI. Accomplishments, Activities and Highlights\n\nLibraries Strategic Goal 3, Initiate strategic collaboration efforts and programming to ensure that UNLV graduates information literate students. Department Goal Objective, Continue to provide the most appropriate and up to date instruction in research and information literacy skills.\n- Consistently offered course-related instruction, orientation programming both in and out of the Library, and scheduled drop-in sessions, tours and more (see also Statistical Data section).\n- Offered a faculty seminar series in both fall and spring semesters designed to encourage faculty to think about the development of their students’ information and research skills and also about their own research needs.\n\nLibraries Strategic Goal 2, Actively foster user-focused environments committed to identifying and delivering information resources and services that meet or exceed user expectations. Department Goal Objective, In order to promote the development of teaching skills for Libraries faculty and staff so that they might better serve users in the classroom environment, the department will propose a plan for regular developmental evaluation and will provide a series of opportunities for professional development in the area of teaching skills.\n- As this project took shape, it became clear that the developmental activities should not be evaluative in nature so that experimentation and improvement could be encouraged in a non-threatening environment. Members of the department developed and deployed the Enhancement Project, an opportunity for structured peer-support at the class planning stage. The project included an introductory workshop led by Leora Baron of the Teaching Learning Center, individual participation by volunteer instructors, assessment forms, and a follow-up meeting of participants.\n\nLibraries Strategic Goal #2, Actively foster user-focused environments committed to identifying and delivering information resources and services that meet or exceed user expectations. Department Goal Objective, The department will participate in the Association of Research Libraries (ARL) sponsored Project SAILS (a project for the standardized assessment of information literacy skills) to help determine a baseline information literacy competency level and to subsequently determine appropriate instructional services.\n- The department administered the on-line Project SAILS test to 225 students during the spring semester. The department prevailed upon regular users of the Libraries’ instructional services in order to find sufficient students to participate. Results from the ARL organizers have only recently been returned. Overall results suggest that UNLV students are very similar to students across the nation in their abilities to score well on the standardized instrument. It remains unclear how the results of our participation will be used at an individual institution level. Project SAILS organizers are hopeful, however, that a standardized instrument to measure information literacy will be created from these efforts.\nLibraries Strategic Goal 3, Initiate strategic collaboration efforts and programming to ensure that UNLV graduates information literate students. Department Goal Objective, The department will take advantage of the hardware and software in the new Multimedia Design Studio to create learning tools for library staff and subsequently for students and other members of the UNLV community.\n\n- The department brought the Multimedia Design Studio into being and hired a student employee to help staff the studio for its first semester of operation. This student, in conjunction with Public Service Intern, Michael Yunkin, provided service to users with a variety of needs, primarily those connected to digital video manipulation. Additionally, Michael Yunkin and Diane VanderPol developed a short promotional video utilizing the hardware and software for the studio. Michael Yunkin also created a tutorial to introduce staff to one of the common processes available in the studio and the student employee created several handouts on a particular software featured in the studio.\n\nII. Statistical Data\n\nCombined totals for all types of programming offered by the Instruction Department including tours, both pre-scheduled and course-related class sessions, orientation sessions and sessions for faculty, students, staff, and members of the local community continue to grow steadily. In FY04 the department offered nearly 500 programs to over 10,000 people, approximately 20 more sessions with participation of more than 1,500 more people than FY03. Course-related sessions continue to make up 64-65% of our total offerings. The most significant growth area was the number of participants in the pre-scheduled sessions. Attendance at pre-scheduled sessions nearly doubled from the previous year. The department’s marketing of pre-scheduled classes to teaching faculty as a potential source for extra credit points for students may be the cause of the increase. Tours and brief sessions the department provides to non-affiliated groups such as CCSN students, Elderhostel participants, high school students, and others more than doubled in FY04. Increases in other services offered by the Instruction Department were generally steady.\n\nMedia and Computer Services Department\n(formerly Media Resources)\nJennifer Church\nHead, Media and Computer Services\n\nI. Accomplishments, Activities and Highlights\n\nDuring FY04 fiscal year, the Media and Computer Services Department embarked on multiple projects.\n\n- Began systematically replacing frequently used items in 3/4\" format, due to a shortage of players across campus, with VHS or DVD and investigating the cost and copyright implications of transferring those items unavailable for purchase in a more usable format.\n- Began preparations to move little used laser discs and albums to Lied Automated Storage and Retrieval (LASR) and to replace frequently used laser discs.\n- Testing new images for desktop and laptop implementation.\n- Initiated project to identify all hot ports within Lied Library.\n• Participated in providing computer training opportunities for Research and Information Department staff.\n\nStrategic Goal 1, Increasingly provide access to digital collections and services to support instruction, research, and outreach, while improving access to the UNLV Libraries' print and media collections.\n• Work on the Safari/Classroom Building Complex project continues. Progress is slow.\n• Explored options to make Media Subject Guides available on the Web and began providing content to the Web and Digitization Services Department for inclusion in a searchable database.\n\nStrategic Goal 2, Actively foster user-focused environments committed to identifying and delivering information resources and services that meet or exceed user expectations.\nImplementation Strategy 2.1, Library groups will develop assessment tools for determining user needs and expectations as they relate to services and facilities. Implementation Strategy 2.2, Each department will evaluate and respond to identified user needs and expectations.\n• Continued to conduct laptop checkout satisfaction surveys. These surveys showed an overall high level of satisfaction with the program. There were a few concerns about availability during peak times (all laptops checked out at once) and the check-in/check-out procedure was perceived by some as a bit cumbersome.\n• Conducted several computer workshops for Research and Information staff, including basic help with WebCT and dealing with common computer problems.\n\nII. Statistical Data\n\nComputer Help Desk: Total patron contacts for the fiscal year increased approximately 3%. This represents a slower level of growth than in", "num_tokens": 2048} {"category": "olmocr_science_pdfs-education_and_jobs", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-education_and_jobs/part-00-00000.npy", "text": ", what would be her opportunity cost?\n A. Bike\n B. Gameboy\n C. Doll\n D. Clothes\n\n**Correct answer:** A. Bike\n\n*Constructed response (Handout 2)*\n\n**Prompt:** The 21 students in Mrs. Smith’s first grade class voted for which animal to have as a class pet. The results are in the graph below.\n\n![Graph showing animal preferences]\n\nWhat was the opportunity cost of their choice? Explain your answer.\n\n**Sample Response:**\nThe opportunity cost was the bird. The bird, which was their second favorite. They had to give up the bird.\n\n**Rubric:**\n2= The response states the opportunity cost and gives a relevant explanation.\n1= The response states the opportunity cost, but provides an inaccurate, irrelevant or no explanation.\n0= No response.\n\n**Objective(s):**\nStudents will be able to:\n • explain that choices must be made when wants exceed available resources;\n • define the opportunity cost as the second choice of a decision;\n • make decisions and explain the reasons for their choices; and\n • state the opportunity cost of a decision.\n\n**Prior Knowledge and Skills:**\nStudents should be familiar with the following economic terms:\n\n- **want** – an expressed desire satisfied by a good or service\n- **choice** - something chosen; a preference\n\n**Time to Complete:** 2 sessions, approximately 30-45 minutes each\n\n**Materials/resources needed:**\n- Book -- *How Much Is That Doggie in the Window?* as retold by Iza Trapani\n- Transparency money or play money -- $11.50 in dollar bills and coins\n- Visual 1 -- Graphic organizer (could also be reproduced as a poster)\n- Visual 2 -- Caught Being Good, constructed response (whole group)\n- Transparency marker\n- Handout 1 -- multiple choice assessment (one per pair of students)\n- Handout 2 -- constructed response assessment (one per student)\n- Definition cards (included with lesson)\n\n**Procedure:**\n\n1. Ask the students:\n - Have you ever wanted something very badly?\n - What did you want?\n - Did you have enough money to buy the item?\n\n2. Explain that the little boy in this story finds something that he really wants, but he doesn’t have enough money to buy it.\n\n3. Show the cover. Share the title and author information.\n\n4. Based on the title, have the children predict what the boy wants. *(doggie)*\n\n5. Begin reading the story aloud and displaying the pictures. Pause when the shopkeeper tells the little boy that he doesn’t have enough money. Ask:\n a. How much does the puppy cost? *(*$60, or $55 after the owner offered to take $5 off the asking price.*)*\n b. How much money does the boy have? *(*$11.50)*\n c. What are the boy’s choices? *(choose something else, save his money, ask his parents to buy the doggie for him)*\n d. Why does he have to make a choice? *(He doesn’t have enough money to buy the doggie.)*\n\n6. Read the next text page of the story. Explain that since the boy does not have enough money to buy the doggie, the shopkeeper suggests some alternatives. Ask: What is an alternative? *(Answers will vary; alternatives are the different possibilities you can choose from in a situation.)* Display the Alternatives definition card.\n7. Ask: What are the alternatives the shopkeeper suggests? *(hamster, gerbil, mice, lizard, snake)* Why does he suggest those animals? *(They cost less than the doggie and the boy had enough money to buy one of those.)* What choice would you make if you were in this situation? *(Answers will vary.)*\n\n8. Read the next 2 text pages (stop after the lemonade stand). Ask: How is the boy planning to earn money? *(selling lemonade)* Is he successful? *(No)* Why not? *(It rained, so no one bought a drink.)*\n\n9. Read the next 2 text pages (stop after the boy’s decision to buy frozen yogurt for his sister). Display Visual 1. Ask: What is the boy’s goal? *(to buy the doggie)* Write “doggie” in the Goal box.\n\n10. After the boy’s sister hurts herself the boy has a choice to make. Ask: What does he choose to buy with his money? *(frozen yogurt for his sister)* Under Choice #1, write “yogurt” in the top box.\n\n11. Ask: By buying the yogurt, what does he give up? *(saving money to buy the doggie)* Explain: The choice he gave up is called **opportunity cost**. Explain that opportunity cost is the alternative that is given up when a choice is made; a person’s second choice.) Display the *Opportunity cost* definition card. On the transparency, write “saving for the doggie” in the second box under Choice #1.\n\n12. Ask again: When he has a choice between yogurt and saving to buy the doggie, what choice does he make? *(buying frozen yogurt)* Circle “yogurt” on the transparency. Ask: What was his opportunity cost? *(saving his money to buy the doggie)* Cross out “saving for the doggie” on the transparency.\n\n13. Explain: The word **costs** means the bad things about a choice. Display the Costs definition card. Ask: What is the cost of the boy’s choice? *(The boy has less money and is farther away from his goal of buying the doggie.)* Explain: The word **benefits** means the good things about a choice. Display the Benefits definition card. Ask: What are some benefits of the boy’s choice? *(He makes his sister feel better, and he has a good feeling inside.)*\n\n14. Say: Let’s pretend that the frozen yogurt costs $2.00. Display $11.50 of transparency money or hold up play money. Have a student remove $2.00 of the transparency (play) money, then have the students count the money that is left. *($9.50)*\n\n15. Read the next page of text (about Mom). Recording the answers on Choice #2 on the transparency, ask:\n\n a. At this point in the story, what are the boy’s choices? *(whether to buy chocolate candy for Mom or save his money to buy the doggie)* Write chocolates and saving for the doggie on the transparency.\nb. What choice does he make? (*chocolates*) Circle that choice on the transparency.\nc. What is his opportunity cost? (*saving to buy the doggie*) Cross out that choice on the transparency.\nd. Are there any benefits from his choice? (*Yes – he made Mom feel better, and he had a good feeling inside.*)\n\n16. Say: Let’s pretend that the box of chocolates costs $6.00. Have a student remove $6.00 of the transparency (play) money, then have the students count the amount of money left. ($3.50)\n\n17. Read the next page of text about Dad. Recording the answers on Choice #3 on the transparency, ask:\n\na. What are the boy’s choices? (*whether to buy tissues for Dad or save his money to buy the doggie*) Write tissues and saving for the doggie on the transparency.\nb. What choice does he make? (*tissues*) Circle that choice on the transparency.\nc. What was his opportunity cost? (*saving to buy the doggie*) Cross out that choice on the transparency.\nd. Are there any benefits from his choice? (*Yes – he made Dad feel better, and he had a good feeling inside.*)\n\n18. Say: Let’s pretend the box of tissues costs $3.00. Have a student remove $3.00 of the transparency (play) money, then have the students count the amount of money left. ($1.50)\n\n19. Read the next page of text. Ask: How does the boy feel now? (*sad, disappointed*) Do you think that he is happy now with the choices he made along the way? (*Answers will vary.*) Ask students to predict how the story might end.\n\n20. Read to the end of the story.\n\nClosure:\n\n1. Review the story by asking the following questions that incorporate the economics vocabulary:\n\n a. What did the boy want? (*the doggie in the window of the pet shop*)\n b. When the boy could not afford the doggie, what alternatives did the shop keeper suggest? (*animals that he could afford*)\n c. What choices did the boy make? (*He chose to buy yogurt, chocolate, and tissues.*)\n d. What were the benefits of those choices? (*He felt good because he helped others, and others recognized his kind acts.*)\n e. What was the opportunity cost for each of these choices? (*saving money for the doggie*)\n2. Pose the following situation. Students in a scout troop must decide between a trip to the train museum or a trip to the aquarium. The troop votes to go to the aquarium. Ask students what is the opportunity cost of going to the aquarium. (going to the train museum)\n\n3. Review with the students that the boy in the story really wanted something. Because of limited resources, he had to make choices and incur the costs and benefits of those choices. Explain that sometimes we have a choice of more than two alternatives. Also, we often make a choice as part of a group, which means we don’t always get our personal choice.\n\n4. Display Transparency 2", "num_tokens": 2048} {"category": "olmocr_science_pdfs-education_and_jobs", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-education_and_jobs/part-00-00000.npy", "text": " of brand associations, is perceived quality. This is explained as not the actual quality of a certain brand's product, but the consumers' perception of the quality. The fourth and final dimension of consumer-based brand equity, which is also described as the major component, is brand loyalty. Brand loyalty is shortly described as \"the attachment that a consumer has to a brand.\" (Pappu, 2005, p. 145; Aaker, 1991, p. 39). He goes on further to emphasize that brand loyalty is the major component of consumer-based brand equity. When explaining the relationships between the four dimensions, mentioned above, Pappu (2005) proposes that consumers' perception of quality is associated with brand loyalty. The more brand loyal the consumer is, the more likely it is perceived by the consumer that better quality is offered, vice versa. As, the more superior associations the consumer has for a brand, the more loyal, vice versa. Since brand loyalty is a major component of consumer-based equity, it is of interest to find other definitions and measurements of brand loyalty.\n\nAssael (1994, pp.151-152) describes brand loyalty as a “favorable attitude toward a brand resulting in consistent purchase of the brand over time.” It is stated by Assael that there are two main approaches to brand loyalty. The behavioral approach in brand loyalty is defined by the sequence of purchase, for example, Assael mentions that according to Brown, if the same brand is purchased five times in a row (Assael, 1994; Brown, 1952). The other approach to brand loyalty is the cognitive approach, which includes both attitudinal and behavioral components in measuring brand loyalty.\nJensen and Hansen (2006) explain, in their empirical study on brand loyalty, that simply viewing the behavioral approach in determining brand loyalty is not comprehensive. From the attitudinal perspective, it is more likely that researchers will be able to investigate the factors producing brand loyalty.\n\nAssael (1994) then draws the connection between brand loyalty and product involvement. He explains that a habit of buying a certain brand is not necessarily brand loyalty. Only when comes to a high involvement situation can a purchase be considered brand loyalty. If the decision is made out of habit and where the consumer has little involvement it is signified by inertia (see figure 2, \"Four types of consumer behavior\").\n\n### 3.5 Consumer involvement\n\nConsumer involvement has been viewed both in terms of product meaning and in terms of consumer-product relationships. For example, involvement has been equated with the importance of the purchase, and has also been used in different involvement profiles based on meaning, value, and the nature of relationships between consumers and product categories. Furthermore, involvement has been defined as a relation between consumer and product, and found to be the relational variable most predictive of purchase behavior (Martin, 1998).\n\nQuester and Lim (2003) also separate involvement into product involvement and purchase involvement, where product involvement is found to be the more permanent (enduring) and consumer-based concept. Quester and Lim (2003) argue that a consumer may be highly involved in a purchase situation without really being involved with, or interested in, the product category or brand that they are purchasing. They also highlight that, in contrast, a consumer may have very low purchase situation involvement due to high product involvement (tied with, for example, brand loyalty). Many researchers have tried to measure product involvement in an \"either high or low\" manner, despite the risk of oversimplifying complex cause and effects. Furthermore, one should keep in mind that it is not the products themselves that are (or are not) involving; it is the consumer that chooses\nto be involved, meaning that product involvement is a consumer response to a given product, not a product’s inherent attributes (Quester and Lim, 2003).\n\nAssael (1994) proposes the above matrix (Figure 2) as an explanatory division of consumer decision-making based on involvement and the degree to which a decision is necessary. The complex decision-making is the traditional view of decision-making (see figure 3, \"a model of consumer involvement\"), where it is assumed that consumers gather information and thoroughly evaluate it before they act. Brand loyalty, as described in chapter 3.4, is assumed to occur in habitual high involvement purchases.\n\nThe inertia (lower right-hand box) in the above matrix is signified by decisions made with little information processing, followed by an evaluation of the brand after the purchase. This is comparable to a consumer who is unwilling to make a\ndecision, and as long as repeated purchases of the same brand reach a minimum level of satisfaction, the consumer is unlikely to change behavior. Studies have shown that the best way to succeed with products in this part of the matrix is through creation of brand awareness (best accomplished by repeat advertising) to change consumers' beliefs, since beliefs is the primary variable on which consumers act in this part of the matrix (Assael, 1994).\n\nLimited decision-making, making a consumer switch from the previously described inertia, can occur, for example, if a new product is introduced or if the consumer starts seeking variety. However, one should keep in mind that this is based on passive learning, since no active search for information, or brand evaluation, occurs. Generally, the products in this part of the matrix are considered negligible or mundane by consumers (Assael, 1994).\n\nThere are, however, ways to look at what makes products important to consumers. Assael (1994) suggests the following conditions for product involvement:\n\n- The product is important to the consumer (tied to consumers' self-image).\n- The product (or product category) interests the consumer.\n- The product comes with certain risks; for example, there is the technological risk in buying a high-tech product (buying more functions/technology than you will ever know how to use).\n- The product has emotional appeal to the consumer.\n- The product is associated with a certain group (status).\n\nThe above conditions are closely related to what Kapferer and Laurent (1985a; 1985b) list as their conditions for consumer involvement in general:\n\n- Perceived importance of (or personal interest in) the product.\n- Perceived risk associated with the purchase:\n - Perceived importance of negative consequences in case of poor purchasing decision.\n - Perceived probability of making such a decision.\nSymbolic value of the product, the purchase or the consumption of the product (\"self-expressing\" or associated value attributed by the consumer).\n\nHedonic value of the product; for example the product's ability to provide pleasure and the emotional appeal of the product.\n\nThe main difference between these two types of conditions is the latter one's addition of situational risk, meaning that the risks and probability of making a bad choice has been taken into account.\n\nAssael (1994) suggests the following model (Figure 3) as a description of what leads to complex decision-making:\n\n![Figure 3. A model of consumer involvement (Adapted from: Assael, 1994, p. 76)](image)\n\nAs shown in the model, there has to be a need for a higher level of information processing before a complex decision can or will be made. However, as previously mentioned, some purchases are made without the need for a higher level of information processing; namely, habitual or uninformed purchases made without any real consideration, or without regard to risks (Assael, 1994).\nSeveral ways to try to measure involvement have been developed over the years; various scales have succeeded or supplemented each other, and one widely used scale is a uni-dimensional generic scale initially developed by Zaichkowsky in 1985 (Martin, 1998).\n\nThe Personal Involvement Inventory is designed to measure a person’s involvement with products, advertisements or purchase decisions (Zaichkowsky, 1985). It originally consisted of 20 items, but was later revised and narrowed down to 10 items by the original author (Martin, 1998; Zaichkowsky, 1994). However, this way of measuring includes other factors than just the consumer involvement, which is the focus of this dissertation.\n\nKapferer and Laurent (1985b) also developed a recurrent means to measure consumer involvement (Quester and Lim, 2003), briefly mentioned above. It is centered on the same four conditions listed above (perceived importance, perceived risk, symbolic value and hedonic value), and is measured in accordance with their article \"Measuring Consumer Involvement Profiles\".\n\n3.6 Research model\nThe above literature review provides a brief summary of what occurs within the consumers’ mind during a purchase decision-making process. We have chosen to emphasize on the concept of the consumers' level of involvement. Furthermore, it highlights the relationship between involvement and consumer-based brand equity. It is in our interest to explore the nature of this relationship, by conducting an attitudinal empirical investigation, and find implications on how much consumer-based brand equity affects involvement in product categories of different involvement levels.\n\nSimilar research of the complex relationship between involvement and different aspects of brands has already been conducted. Quester and Lim (2003) states that more research needs to be done in examining the link between product involvement and brand loyalty. Their research even lends support from previous\nfindings that a relationship exists (Quester, 2003; LeClerc and Little, 1997, and Iwasaki and Havitz, 1998). We thereby believe that there is no question whether there is an existing relationship or not. The previous research of Quester and", "num_tokens": 2048} {"category": "olmocr_science_pdfs-education_and_jobs", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-education_and_jobs/part-00-00000.npy", "text": "FA development.\n\n• Gathering allies and creating alliances for program growth and expansion.<|endoftext|>Wupatki Outing with Mr. Oelerich and Ms. Hillyard’s 4th Grade Classes by Sabrina Carlson\n\nOn April 27, 2016, I had the privilege of presenting to the 56 students of Mr. Oelerich and Ms. Hillyard’s classes at Puente de Hozho Elementary School on Leave No Trace Ethics, outing expectations, and the Hug-A-Tree curriculum. We had a discussion about what trash really is (yes, your apple core is trash), and what a special treasure places like Wupatki National Monument is for our country. The students were empowered with the knowledge of what to do if they ever get lost in the woods, and they all agreed that staying in one place would be the best plan, even if it might feel scary at times. Many students had concerns and questions about how to know if someone looking for them was Search and Rescue or a stranger. It comforted them to know that Search and Rescue volunteers will always have a radio and identification. When our presentation was finished, each of the students received a basic survival kit to always keep with them when adventuring in the outdoors. The kit contained a poncho, emergency blanket, glow sticks, signal mirror, and whistle. While I hope none of those young people ever need it, I’m thrilled to know that these students now have the knowledge to keep themselves safe if they are ever separated from their families while outdoors.\n\nOn May 4, we took our newly found outdoor confidence to Wupatki National Monument to learn about the history and culture of the ancient people who once lived there.\n\nWhen the class arrived at Wupatki we divided everyone into two groups to start the activities. We discussed the concept of “fundamental human needs,” which is the common ground that all cultures throughout history have shared. Material needs like food, shelter, and defense; and non-material needs like love, art, beauty, and a belief system were all examples of this idea. As the students toured the ruins, we looked for evidence of human survival and to see if we could recognize these needs. We wondered if the one petroglyph of a snake was communication, art, or part of their belief system. We took note of the metates used for grinding corn and other plants. We learned the pueblo had no doors on the first two stories in order make the houses safe and better for defense. Figuring out a way to direct fire smoke out of the lower rooms sideways made us realize they had seriously advanced engineering skills!\nWe also walked in to the community room to imagine what a ceremony might have been like in such a live sounding room. We tried sampling the acoustics and were amazed at how far a whisper can carry in a well-designed space!\n\nRichard May then led the activity at the ball court. He taught the students about the importance of ball courts throughout villages all over the southwest and what a huge distance there is between Wupatki (the northernmost example of these ceremonial courts) and Chichen Itza (the southernmost). The students were amazed to learn that the quetzal feathers and seashells found at Wupatki were evidence that trade took place between the two separate groups. He also explained how even today, playing games with people from other cultures helps break language barriers and has the ability to create friends anywhere you go. After the short lesson, the students had the chance to play a ball and stick game similar to what children at Wupatki might have played 900 years ago.\n\nBefore leaving, we made a quick stop at the blowhole. A fascinating geological feature where an opening to an underground cave will either suck air in or blow air out, depending on the temperature differential between the cave and the outdoor air. Archeologists think this opening might have had supernatural and religious significance to the residents of this home site. One parent that came along for the outing was a Hopi native who grew up on the Hopi Mesa. Describing different ball games he played, he confirmed that the games he learned were definitely significant, and that his relatives taught the children that the blowhole was the opening to the world where Spider Woman lived. She is the creative force of the whole world, and must be respected and never offended. It was a glorious day and we were all very excited to learn some new things!\n\nThis Seeds of Stewardship outing made possible by grants from:\n\nThanks to Peace Surplus for donating a portion of the survival kits for all the 4th graders in Flagstaff!<|endoftext|>3.0.5 Adjunct Faculty\n\nAdjunct faculty are employed to teach less than a normal faculty load or to teach less than a full session on a semester by semester or summer term basis. The adjunct faculty contract contains no guarantee of continued employment.\n\n3.0.6 Classified Employees\n\nClassified employees are employees who occupy positions that are listed in the Commonwealth’s Compensation Plan, and who are covered by the Virginia Personnel Act as found in Chapter 10, Title 2.1 of the Code of Virginia, once they have completed the probationary period.\n\n3.0.7 Wage Employees\n\nWage employees are employees not covered by the Virginia Personnel Act (also referred to as hourly, P-14, or WE-14 employees) who are non-exempt for purpose of overtime compensation, and who are used to supplement the workforce during seasonal or temporary workloads, to provide interim replacements, or to perform short-term projects, or other jobs that do not require full-time classified employees. Wage employees are limited to working 1500 hours per agency per year.\n\n3.1 Academic Rank and Administrative Titles\n\n3.1.0 Academic Rank\n\nThe titles authorized for the four standard levels of faculty rank are Professor, Associate Professor, Assistant Professor, and Instructor. The qualifications for these are on the VCCS-29.\n\n3.1.1 Special Rank\n\na. Assistant Instructor may be used for individuals, appointed on a temporary or emergency basis for one year, meeting most of the minimum requirements for the instructor rank and who show evidence of being able to complete such requirements within one year. A one-year renewal may be requested by a college administrator for a person who is actively pursuing completion of the necessary requirements.\n\nb. Lecturer may be used when qualifications make it more appropriate than other titles. It may also be used for grant funded positions if VCCS-29 qualifications do not apply.\n\n3.1.2 Emeritus: The Emeritus/Emerita title is honorific and is intended to acknowledge outstanding service to the Virginia Community College System. It does not represent any entitlement to authority, rights, privileges or resources.\n\na. President Emeritus.\n\n1. Eligibility: Candidates for emeritus status must have provided ten or more years of outstanding, distinguished, and honorable service to the VCCS in positions of substantial leadership to include the role of president.<|endoftext|>**BIRD GIFTS**\nIntroduce “Will U B Mine?” pages 5–10, by pointing out that gift-giving is a big part of Valentine’s Day. Ask students:\n\n- What are some gifts that people give each other to say, “Be my valentine?”\n- Would those be good gifts for a male bird to give a female bird? What might make better gifts?\n\nInvite children to learn more about ‘good’ bird gifts by reading the article. Afterward, have the class describe some of these gifts. Then wrap up the lesson by asking:\n\n- How might gift-gifting help a female bird select a mate?\n\n**YEAR OF THE RAT**\nThe year 2020 is the “Year of the Rat.” Ask students if they know why. (For nearly 5000 years, the Chinese culture has organized time in a cycle of 12 years. Each of the 12 years is represented by an animal that embodies unique qualities. 2020 is the Year of the Rat.)\n\nExplain that people born in the Year of the Rat are believed to possess certain rat-like qualities. Ask students to guess what some of these qualities might be. List their suggestions on the board or chart paper.\n\nAfter students have read “Oh, Rats!” pages 18–23, ask them to use what they have just learned about rats to improve their list of rat qualities. Then ask a student to look up the traditional description of this Chinese zodiac animal and read it aloud. Compare the official description with the class’s list. How closely do they match?\n\n**ARCTIC EXPLORATIONS**\nAfter reading “Arctic Outpost, pages 12–17, help students enhance their comprehension of the article by completing the Fill in the Details student page.\n\nThen have students write their own Arctic adventures, using the following writing prompt:\n\n- If you could visit the North Pole this year, what is the first thing you would like to do there?\n\nEncourage children to illustrate their stories and enter the illustrations in Ranger Rick’s “On Top of the World!” contest. Thirty winners will have their artwork photographed at the North Pole! For contest details, see rangerrick.org/NorthPole.\n\n**DOLPHIN ADVENTURES**\nHave students read this month’s Ranger Rick Adventures called “Star Power,” pages 24–26. Then ask:\n\n- Where do the Irrawaddy dolphins in the adventure live?\n- Why are they in trouble?\n- How can people help the dolphins?\n\nInvite students to write a newspaper interview with an Irrawaddy river dolphin. Encourage them to use information from this month’s adventure story as well as from other sources. The interview questions listed in the Interview with a Dolphin student page can guide children through the process, or children can write their own questions for an Irrawaddy to answer.\n\n**LEAP IT UP!**\nThe year 2020 is a leap year—the perfect time to celebrate", "num_tokens": 2048} {"category": "olmocr_science_pdfs-education_and_jobs", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-education_and_jobs/part-00-00000.npy", "text": " cover current topics of research interest in electrical engineering. The course content may vary from semester to semester. Advanced Topics in Electrical Engineering: Advanced Topics in Communication Networks: Read More [+]\nRules & Requirements\nPrerequisites: Consent of instructor\nRepeat rules: Course may be repeated for credit without restriction.\nHours & Format\nFall and/or spring: 15 weeks - 1-3 hours of lecture per week\nAdditional Details\nSubject/Course Level: Electrical Engineering/Graduate\nGrading: Letter grade.\nAdvanced Topics in Electrical Engineering: Advanced Topics in Communication Networks: Read Less [-]\n\nEL ENG 290P Advanced Topics in Electrical Engineering: Advanced Topics in Bioelectronics 1 - 3 Units\nTerms offered: Spring 2019, Spring 2018, Fall 2017\nThe 290 courses cover current topics of research interest in electrical engineering. The course content may vary from semester to semester. Advanced Topics in Electrical Engineering: Advanced Topics in Bioelectronics: Read More [+]\nRules & Requirements\nPrerequisites: Consent of instructor\nRepeat rules: Course may be repeated for credit without restriction.\nHours & Format\nFall and/or spring: 15 weeks - 1-3 hours of lecture per week\nAdditional Details\nSubject/Course Level: Electrical Engineering/Graduate\nGrading: Letter grade.\nAdvanced Topics in Electrical Engineering: Advanced Topics in Bioelectronics: Read Less [-]\n\nEL ENG 290S Advanced Topics in Electrical Engineering: Advanced Topics in Communications and Information Theory 1 - 3 Units\nTerms offered: Fall 2018, Fall 2016, Fall 2009\nThe 290 courses cover current topics of research interest in electrical engineering. The course content may vary from semester to semester. Advanced Topics in Electrical Engineering: Advanced Topics in Communications and Information Theory: Read More [+]\nRules & Requirements\nPrerequisites: Consent of instructor\nRepeat rules: Course may be repeated for credit without restriction.\nHours & Format\nFall and/or spring: 15 weeks - 1-3 hours of lecture per week\nAdditional Details\nSubject/Course Level: Electrical Engineering/Graduate\nGrading: Letter grade.\nAdvanced Topics in Electrical Engineering: Advanced Topics in Communications and Information Theory: Read Less [-]\nEL ENG 290T Advanced Topics in Electrical Engineering: Advanced Topics in Signal Processing 1 - 3 Units\nTerms offered: Fall 2018, Fall 2017, Fall 2016\nThe 290 courses cover current topics of research interest in electrical engineering. The course content may vary from semester to semester.\nAdvanced Topics in Electrical Engineering: Advanced Topics in Signal Processing: Read More [+]\nRules & Requirements\nPrerequisites: Consent of instructor\nRepeat rules: Course may be repeated for credit without restriction.\nHours & Format\nFall and/or spring: 15 weeks - 1-3 hours of lecture per week\nAdditional Details\nSubject/Course Level: Electrical Engineering/Graduate\nGrading: Letter grade.\nAdvanced Topics in Electrical Engineering: Advanced Topics in Signal Processing: Read Less [-]\n\nEL ENG 290Y Advanced Topics in Electrical Engineering: Organic Materials in Electronics 3 Units\nTerms offered: Spring 2014, Spring 2013, Fall 2009\nOrganic materials are seeing increasing application in electronics applications. This course will provide an overview of the properties of the major classes of organic materials with relevance to electronics. Students will study the technology, physics, and chemistry of their use in the three most rapidly growing major applications--energy conversion/generation devices (fuel cells and photovoltaics), organic light-emitting diodes, and organic transistors.\nAdvanced Topics in Electrical Engineering: Organic Materials in Electronics: Read More [+]\nRules & Requirements\nPrerequisites: EL ENG 130; and undergraduate general chemistry\nRepeat rules: Course may be repeated for credit without restriction.\nHours & Format\nFall and/or spring: 15 weeks - 3 hours of lecture per week\nAdditional Details\nSubject/Course Level: Electrical Engineering/Graduate\nGrading: Letter grade.\nAdvanced Topics in Electrical Engineering: Organic Materials in Electronics: Read Less [-]\n\nEL ENG W290C Advanced Topics in Circuit Design 3 Units\nTerms offered: Prior to 2007\nSeminar-style course presenting an in-depth perspective on one specific domain of integrated circuit design. Most often, this will address an application space that has become particularly relevant in recent times. Examples are serial links, ultra low-power design, wireless transceiver design, etc.\nAdvanced Topics in Circuit Design: Read More [+]\nRules & Requirements\nPrerequisites: MAS-IC students only\nCredit Restrictions: Students will receive no credit for W290C after taking 290C.\nRepeat rules: Course may be repeated for credit without restriction.\nHours & Format\nFall and/or spring: 15 weeks - 3 hours of web-based lecture per week\nSummer: 10 weeks - 4.5 hours of web-based lecture per week\nOnline: This is an online course.\nAdditional Details\nSubject/Course Level: Electrical Engineering/Graduate\nGrading: Letter grade.\nAdvanced Topics in Circuit Design: Read Less [-]\n\nEL ENG C291 Control and Optimization of Distributed Parameters Systems 3 Units\nTerms offered: Fall 2017, Spring 2016, Spring 2015, Spring 2014\nControl and Optimization of Distributed Parameters Systems: Read More [+]\nRules & Requirements\nPrerequisites: ENGIN 7 and MATH 54; or consent of instructor\nHours & Format\nFall and/or spring: 15 weeks - 3 hours of lecture per week\nAdditional Details\nSubject/Course Level: Electrical Engineering/Graduate\nGrading: Letter grade.\nAlso listed as: CIV ENG C291F/MEC ENG C236\nControl and Optimization of Distributed Parameters Systems: Read Less [-]\nEL ENG C291E Hybrid Systems and Intelligent Control 3 Units\nTerms offered: Spring 2021, Spring 2020, Spring 2018\nHybrid Systems and Intelligent Control: Read More [+]\n\nHours & Format\nFall and/or spring: 15 weeks - 3 hours of lecture per week\n\nAdditional Details\nSubject/Course Level: Electrical Engineering/Graduate\nGrading: Letter grade.\nFormerly known as: 291E\nAlso listed as: MEC ENG C290S\nHybrid Systems and Intelligent Control: Read Less [-]\n\nEL ENG 297 Field Studies in Electrical Engineering 12 Units\nTerms offered: Summer 2018 8 Week Session, Fall 2011, Fall 2010\nSupervised experience in off-campus companies relevant to specific aspects and applications of electrical engineering. Written report required at the end of the semester.\nField Studies in Electrical Engineering: Read More [+]\n\nRules & Requirements\nRepeat rules: Course may be repeated for credit without restriction.\n\nHours & Format\nFall and/or spring: 15 weeks - 1-12 hours of independent study per week\nSummer: 8 weeks - 1-12 hours of independent study per week\n\nAdditional Details\nSubject/Course Level: Electrical Engineering/Graduate\nGrading: Offered for satisfactory/unsatisfactory grade only.\nField Studies in Electrical Engineering: Read Less [-]\n\nEL ENG 298 Group Studies, Seminars, or Group Research 1 - 4 Units\nTerms offered: Spring 2022, Spring 2021, Spring 2020\nAdvanced study in various subjects through special seminars on topics to be selected each year, informal group studies of special problems, group participation in comprehensive design problems, or group research on complete problems for analysis and experimentation.\nGroup Studies, Seminars, or Group Research: Read More [+]\n\nRules & Requirements\nRepeat rules: Course may be repeated for credit without restriction.\n\nHours & Format\nFall and/or spring: 15 weeks - 0 hours of lecture per week\n\nAdditional Details\nSubject/Course Level: Electrical Engineering/Graduate\nGrading: The grading option will be decided by the instructor when the class is offered.\nGroup Studies, Seminars, or Group Research: Read Less [-]\n\nEL ENG 299 Individual Research 1 - 12 Units\nTerms offered: Summer 2022 8 Week Session, Spring 2022, Fall 2021\nInvestigation of problems in electrical engineering.\nIndividual Research: Read More [+]\n\nRules & Requirements\nRepeat rules: Course may be repeated for credit without restriction.\n\nHours & Format\nFall and/or spring: 15 weeks - 1-12 hours of independent study per week\nSummer:\n6 weeks - 2.5-30 hours of independent study per week\n8 weeks - 1.5-22.5 hours of independent study per week\n\nAdditional Details\nSubject/Course Level: Electrical Engineering/Graduate\nGrading: Offered for satisfactory/unsatisfactory grade only.\nIndividual Research: Read Less [-]\nEL ENG 375 Teaching Techniques for Electrical Engineering 2 Units\nTerms offered: Spring 2022, Fall 2021, Spring 2021\nDiscussion of effective teaching techniques. Use of educational objectives, alternative forms of instruction, and proven techniques to enhance student learning. This course is intended to orient new student instructors to more effectively teach courses offered by the Department of Electrical Engineering and Computer Sciences at UC Berkeley.\nTeaching Techniques for Electrical Engineering: Read More [+]\n\nRules & Requirements\n\nPrerequisites: Teaching assistant or graduate student\nRepeat rules: Course may be repeated for credit without restriction.\n\nHours & Format\n", "num_tokens": 2048} {"category": "olmocr_science_pdfs-electronics_and_hardware-part1", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-electronics_and_hardware-part1/part-00-00000.npy", "text": "4060 is available at 74 HC4060 or 74 HCT4060 in the high-speed CMOS series. Clock frequency is 40...60 Hz (with load capacitance of 15 pF) depending on the manufacturer.\n\nSpeed and output current (fan-out)\nThe real advances compared with previous CMOS logic lies in the improvement of speed and fan-out which in high-speed CMOS are comparable to those in TTL. Figure 3 shows graphs of the typical gate propagation delay vs load capacitance for metal-gate CMOS, silicon-gate buffered CMOS, LSTTL and high-speed CMOS. It is clear that HCMOS is only slightly faster than LSTTL, but its smaller increase in gate-propagation delay at higher load capacitances makes for a larger increase in output current. Typical gate propagation delays in HCMOS gate are 6 ns at 10 pF, 10 ns at 50 pF, and 11.5 ns at 100 pF load capacitance.\n\nIt is also interesting to compare other logic versions of the TTL family, particularly the new 'advanced' ALS series which is two to three times faster than LSTTL. Table 1 gives a comparison of a number of typical circuits in the 74 series.\n\nThe buffered versions of the HCMOS family all have identical output stages. These are, as in CMOS, symmetrical and deliver a current of about 4 mA at both HIGH and LOW. The bus driver outputs can even supply 6 mA in both directions. Figure 4 gives a comparison between the output current levels of HCMOS and LSTTL. At LOW level output there is no difference between the output currents: both types provide 4 mA at 0.4 V. When the output is logic 1 and the supply voltage is 5 V, a HCMOS circuit delivers 4 mA at an output voltage of not less than 4.2 V while the LSTTL version provides only 0.4 mA at\nnot less than 2.7 V. A standard HCMOS output can, therefore, like that of 1 LSTTL, be connected to up to 10 LSTTL inputs. The fan-out with driver output is 15 LSTTL loads. In the case of HCMOS loads, the input currents (typically 1 µA) have practically no effect, so that the fan-out is limited only by the input capacitance (typically 5 pF) and not by the drive power. One output can be connected to up to 20 HCMOS inputs without any noticeable deterioration. If speed and signal-to-noise are not important, it is possible to connect up to 4000 inputs to one output. Only then, at least in theory, is an output current of 4 mA reached.\n\nCurrent consumption, increase at higher switching frequencies\n\nLower current consumption not only reduces operating costs, but because of the reduction in heat, it also improves reliability. The quiescent current of HCMOS is, like that of CMOS, negligibly small, as, in contrast to TTL, the leakage current is of the order of only a few µA. During switching, however, internal and external capacitances have to be charged which means an increase in current. The higher the switching frequency, the higher the current consumption. In that respect, there is no difference between HCMOS and CMOS, but HCMOS circuits can switch much faster and therefore have a correspondingly higher power dissipation. The quiescent current in TTL circuits is already so high that additional current consumption becomes only noticeable at very high switching frequencies.\n\nFigure 5 shows the basic difference between HCMOS and LSTTL. If only one circuit is considered, as in the figure, the power dissipation of HCMOS and LSTTL reaches the same value at an operating frequency of only a few MHz. A practical system, however, consists of a much greater number of ICs which in turn contain several elements such as gates, flip-flops, and the like. LSTTL circuits use the same current whatever their operation; in HCMOS only those elements which actually switch consume power. For instance, in a counter with 10 flip-flops using LSTTL circuits, all flip-flops dissipate the same power, but if HCMOS circuits were used, each flip-flop would consume only half of what the preceding one does. This fact tips the balance firmly in favour of HCMOS, as is shown in figure 6. In a standard microcomputer system with a 2 MHz or 4 MHz CPU, HCMOS circuits would use only a fraction of the power LSTTL devices do. Even in a system with a 10 MHz microprocessor, the power dissipation in HCMOS circuits would be only about one eighth of that if LSTTL devices were used.\n\nSupply voltage, input level, and signal to-noise ratio\n\nThe supply voltage for the HC and HCU versions of the HCMOS family can vary between 2...6 V. The extension of the lower voltage limit to 2 V is particularly interesting in view of future generations of microprocessors and memories which will require a supply voltage of less than 5 V. Non-stabilized power supplies and batteries can be used without any problems, while one lithium cell or two nicad cells can serve as emergency supply.\n\nThe switching levels in HCMOS lie further apart than in LSTTL as can be seen clearly from figure 7. That means on the one hand a higher immunity to noise, but on the other that the inputs of HCMOS devices cannot be connected to the outputs of TTL circuits if the supply voltage is 5 V. ICs in the HC version can, however, be\n\nFigure 5. HCMOS shows the same typical increase in power dissipation with switching speeds as CMOS. For a single gate the power cross-over frequency is about 5 MHz, while that for a single flip-flop lies above 10 MHz.\n\nFigure 6. In a more complex circuit comprising a chain of 10 flip-flops, the power dissipation of HCMOS is clearly well below that of LSTTL even at the highest operating frequency.\nFigure 8. The permitted supply voltage variation of ±10 per cent in the 74 HCT (TTL-compatible) series is twice that of the LSTTL. The 74 HC series can operate from supply voltages down to 2 V.\n\nFigure 9. This shows the real improvement in input protection against electrostatic discharges in HCMOS as compared with CMOS.\n\nFigure 7. This shows that the noise immunity of HCMOS is far superior to that of LSTTL.\n\ncombined with LSTTL types if the supply voltage is 3 V. None the less, HCT types are TTL compatible if the supply voltage is 5 V. Input levels and immunity to noise are similar to LSTTL. In contrast to the 74 LS version, the 74 HCT tolerates a supply voltage variation of ±10 per cent (see figure 8).\n\nCompared with the already hard-wearing CMOS circuits of the 4000 family, the inputs of the HCMOS inputs are even better protected against electrostatic discharges. The input protection circuit shown in figure 9 contains a poly-silicon resistor which limits the current through the protection diode and also reduces the speed with which the current rises. The diodes themselves are also more robust than those used in CMOS ICs.\n\nManufacturers\n\nHCMOS are produced by a whole series of manufacturers and, for this article, data and other information of the following were used: Philips/Valvo, RCA, National Semiconductor, Motorola, and Fairchild. The ICs produced by these manufacturers in the 74HC, 74HCT, and 74HCU series are identical in all important parameters. Agreement exists between National Semiconductor and Motorola on the one hand and Philips/Valvo and RCA on the other as to common development of HCMOS and exchange of masks. Small differences do exist in the stated values of propagation delay and maximum clock frequency. Whereas there is conformity as to gate-propagation delays with typical values of 8 to 9 ns at 15 pF loads, flip-flops and counters produced by RCA and Philips are slightly faster than those of the other manufacturers. For instance, the maximum clock frequency of the 74HC74 is typically 60 Hz (RCA) or 40 Hz (National Semiconductor) at 15 pF load. Guaranteed minimum values could not be compared owing to lack of relevant information. Table 2 shows small differences in the type coding: each manufacturer has his own prefix.\n\nMore important differences exist in the packaging: only Philips/Valvo and RCA have so far planned to manufacture their\nTable 1\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
GatesHCMOSLT- TTLALST- TTLS-TTLunit
74XX00propagation delay8854
74XX04propagation delay8843
Multiplexer/decoder(714) 996-6700
ColoradoGeorgiaIllinois
24 Inverness Place, East2000 South Park Place5201 Tollview Drive
Englewood, NJ 06112Atlanta, GA 30339Rolling Meadows, IL 60008
(303) 649-5000(404) 955-1500(708) 255-8800
New JerseyTexas
Hewlett-Packard Co.Hewlett-Packard Co.
150 Green Pond Road930 E. Campbell Rd.
Rockaway, NJ 07666Richardson, TX 75081
(201)627-6400(214) 231-6101
\n\n#### EUROPEAN FIELD OPERATIONS\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
HeadquartersFranceGermany
Hewlett-Packard S.A.Hewlett-Packard FranceHewlett-Packard GmbH
150, Route du Nant-d’Avril1 Avenue Du CanadaHewlett-Packard Strasse
1217 Meyrin 2/Geneva SwitzerlandZone D’Activite De Courtaboef6380 Bad Homburg v.d. II
SwitzerlandF-91047 Les Ulis CedexGermany
(41 22) 780.8111France(49 6172) 16-0
\n\n#### INTERCON FIELD OPERATIONS\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
HeadquartersAustraliaCanada
Hewlett-Packard CompanyHewlett-Packard Australia Ltd.Hewlett- Packard (Canada) Ltd.
5495 Deer Creek Rd.31-41 Joseph Street17500 South Service Road
Palo Alto, California 94304-1316Blackburn, Victoria 3130Trans- Canada Highway
(415) 857-6027(61 3) 995-2895Kirkland, Quebec H9J 2X8
\n\n#### China\n\nChina Hewlett-Packard Co.\n38 Bei San Huan X1 Road\nShuang Yu Shu\nHai Dian District\nBeijing, China\n(86 1) 256-6888\n\n#### Taiwan\n\nHewlett-Packard Taiwan\n8th Floor, H-P Building\n337 Fu Hising North Road\nTaipei, Taiwan\n(886 2) 712-0404\n\n---\n\n2-24 Quick Start:\nLearning How to\nMake Measurements\nIndex\n\nA\nanalystor configuration, 1-8-19\nanalyzers with option ID5, 1-10\nattaching cabinet flanges, 1-18\nattaching cabinet flanges and handles, 1-19\nattaching handles, 1-17\nS-parameter test set, 1-9\nT/R test set, 1-10\nwith cabinet flange kits, 1-16\nwith plotters, 1-11\nwith printers, 1-11\n\nC\ncertification, iii\nclock, setting, 1-15\ncontents of shipment, 1-2-3\naccessories included, 1-2\nadapters included, 1-2\ncables included, 1-2\ndocumentation included, 1-2\ncorrection constants, 1-26\n\nD\ndefinitions, 2-12\nreturn loss (dB), 2-12\nreturn loss (T), 2-12\nstanding-wave-ratio (SWR), 2-12\n\nE\nEEPROM backup disk, 1-26\nelectrical requirements, 1-6-7\nenvironmental requirements, 1-6-7\n\nF\nfront- and rear-panel features, 1-4-5\nfront panel, 1-4\nfront-panel features, 2-2\nchannel keys, 2-2\ndisplay, 2-2\ninstrument state keys, 2-3\nnumeric keypad, 2-3\nPRESET key, 2-3\nresponse softkeys, 2-2\nsoftkeys, 2-2\nstimulus softkeys, 2-3\n\nI\ninstallation, 1-1\n\nM\nmaking measurements, 2-1-20\nmanual conventions, v\nmeasurement procedure, 2-4\nmeasurement sequence\nchoosing measurement parameters, 2-4\nmaking a measurement calibration, 2-4\nmeasuring a device, 2-4\noutputting measurement results, 2-4\n\nO\noperation, 1-20-25\nchecking reflection mode, 1-25\nchecking transmission mode, 1-24\ninstalled options, 1-21\noperator's check, 1-23\nself-test, 1-22\n\nP\nplotter configuration, 1-11-14\npolar format, 2-18\nprinter configuration, 1-11-14\nproblems, data entry, 2-22\ncontrols do not respond, 2-22\nparameters not accepted, 2-22\nproblems, power-up, 2-21-22\ndisplay does not light, 2-21\ndisplay lights, but fan does not start, 2-21\nproblems, RF output, 2-22\nno RF signal at either PORT 1 or PORT 2, 2-22\n\nR\nrear panel, 1-5\nreflection measurements, 2-12-20\nadmittance, 2-20\nchoosing the measurement parameters, 2-13\nimpedance, 2-19\nmaking a measurement calibration, 2-13\nmeasuring a device, 2-14\nmeasuring return loss, 2-15\n\nIndex-1\noutputting measurement results, 2-15\nreflection coefficient, 2-16\n$S_{11}$ and $S_{22}$ in polar format, 2-18\nstanding wave ratio, 2-17\nregulatory information, iii\n\nS\nsafety considerations, general, iv\nsafety notes, iv\nsmith chart, 2-19\nstatic-safe workstation, 1-7\n\nT\ntransmission measurements, 2-5–11\n3 dB bandwidth, 2-8\n\nchoosing the measurement parameters, 2-5\nmaking a measurement calibration, 2-5\nmeasuring insertion loss with marker functions, 2-8\nmeasuring the device, 2-7\nout-of-band rejection, 2-9\noutputting the measurement results, 2-7\npassband flatness, 2-10\npassband ripple, 2-10\ntroubleshooting, 2-21–23\n\nW\nwarranty, iii<|endoftext|>Contents\n\n1 Revision History ........................................................................................................................................... 1\n 1.1 Revision 1.0 ......................................................................................................................................... 1\n2 Product Overview ......................................................................................................................................... 2\n3 Features and Properties ............................................................................................................................ 3\n4 Optical Appearance .................................................................................................................................... 4\n5 Storage ..................................................................................................................................................... 5\n6 Operation .................................................................................................................................................. 6\n7 Power Module Replacement ..................................................................................................................... 8\n8 Evaluating Thermal Properties of a Given Design .................................................................................... 9\n9", "num_tokens": 2048} {"category": "olmocr_science_pdfs-electronics_and_hardware-part1", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-electronics_and_hardware-part1/part-00-00000.npy", "text": " compatibility with the standard linear bipolar process. Control signals and data inputs are transistor-transistor logic (TTL) or 5-V complementary metal oxide semiconductor (CMOS) compatible, and timing is suitable for interface to most processors. The latch is level triggered; any activity on the data inputs during the enable period will cause the analog output to change. This allows the user of a single-chip microcomputer to tie the enable inputs low and sit the DAC directly on one of the latched ports already available. While several DAS, including onchip latches, are available, many of the latches are too slow to keep up with faster processors. Many also require bus data to remain stable for some time after strobing the latch, a condition which complicates the interface to 6800 type machines. The latch shown in Fig 1, however, operates in 100 ns, and has no data hold time requirement. In that it requires no negative power supply, the DACPORT is distinct from other \"microprocessor compatible\" DAS. It offers buffered analog output voltage ranges of 0 to 2.56 V and 0 to 10.0 V, pin selectable. The 2.56 V range is available when operating on a 4.5 V or higher power supply; the 10.0 V range can be used if the power supply is 11.4 V or higher.\n\nThe bus interface latch is straightforward; the active-low decoded address is applied to CS and the system WR connects to chip enable (CE). This connection will work in any system in which a valid address bus and a valid WR indicate valid data. When both CS and WR are low, data enter the latch; when either returns high, data are held (see Fig 2). In systems where data are valid only on clock edges, a simple one-shot will provide a usable control signal.\n\n**ADC-Microprocessor Interface Examples**\n\nThe AD574 12-bit converter is an example of an analog to digital device. Built with standard bipolar processing, it uses IIL to implement the control and successive approximation register (SAR) functions. Microprocessor handshake capability is included in the 28-pin double-width package; an improvement over the usual 32-pin, triple-width package used for 12-bit ADCs. The device can accommodate analog\ninput ranges of 0 to 10 or 20 V and ±5 or ±10 V, with full-scale accuracy determined by an onboard 10 V reference.\n\nA problem arises when 12 bits of data must be loaded into an 8-bit wide bus. Specifically, the data must be placed in two locations and accessed one piece at a time. Two possible formats can be used: left-justified, where the data indicate a fraction of the full-scale range, and right-justified, where the data represent an integral number of least significant bits (LSBs). The left-justified format also permits \"coarse reads\" of data in systems where an 8-bit word may momentarily provide sufficient resolution. Arithmetic is not hindered by left-justified data as long as the programmer recognizes that the data represent a binary fraction.\n\nInterfacing an ADC to a microprocessor requires a slightly different control sequence than interfacing a DAC to a microprocessor. First, the processor must tell the converter when to begin converting. Usually a WRITE address is decoded to provide the START pulse and one or more READ operations are needed to place the converted data on the bus. Also, since few integrated circuit ADGs (certainly none over eight bits) can convert during a single instruction, a STATUS output is required to indicate whether the converter has completed its cycle. This signal can be read and tested by the microprocessor or used as an interrupt in the case of a very slow converter (millisecond or longer conversion times). Alternately, the program can execute sufficient dummy instructions to timeout the converter's maximum conversion time. Fig 3 shows such a handshaking arrangement.\n\nThe AD7581 is a CMOS device which includes an 8-channel, 8-bit continuous-cycling ADC and 8 bytes of random access memory (RAM), both controlled by a built-in direct memory access controller. The processor thus sees only eight...\nmemory locations with up-to-date results from each of the eight internal ADC channels. The block diagram of the device (Fig 5) shows the high level of digital and analog integration on the chip.\n\nOf the successive approximation type, the ADC completes a scan of all eight channels in 500 $\\mu$s. As a channel is converted, the 8-bit result is deposited in the onchip RAM. Internal logic prevents the update from occurring during memory READ cycles. A single clock signal, which can be the system clock in 6800 or 6502 type processors, is required; address latch enable (ALE), while not necessarily symmetrical, can be used in 8085 type systems. In systems such as the 8085, which use a single bus to carry data and the least significant address bits, the onboard address latch can be used and is driven by ALE. If the address latch is not needed, ALE can be tied high, thus rendered transparent. Access time of the CMOS RAM is 250 ns. Total device power requirement is 40 mW for a 5-V supply.\n\nConversion is totally independent of central processing unit operations. It is continuous, with a status line providing a short negative-going pulse to signify a channel update. This pulse is extended when the last channel is converted, so that systems can detect when an 8-channel scan is completed.\n\nSummary\n\nMicroprocessor compatibility with conversion devices is presently obtained by three methods. In the first, no interface is added, and the user is required to custom-build his own. The compromise method allows some user flexibility, but vital functions are onchip. With the processor transparent method, conversion, handshaking, and storage are all integrated on a single chip.\nSingle-Chip Digital Correlator\nCompares Stored 64-Bit Reference Word\n\nA single-chip correlator that replaces 40 to 50 SS/MSI devices compares a stored 64-bit reference word with an incoming 64-bit serial word at a rate of 20 MHz. The total number of bit for bit agreements between the reference and incoming data are indicated by a 7-bit, binary weighted output. TDC1023, introduced by TRW LSI Products, 2525 E El Segundo Blvd, El Segundo, CA 90245, meets requirements of digital signal processing systems where signal patterns are compared. Correlation is widely used to detect a desired signal in the presence of other signals or noise, to identify specific signal patterns, and to measure time delays through various mediums.\n\nOperation of the device is centered around four 64-bit, independently clocked 40-MHz shift registers. Incoming data are clocked into the A register. The reference word is entered into the B register and then parallel dumped in the R register, allowing the user to serially load a new reference word into the B register while correlation takes place between the A and R registers. An M, or mask register, permits the user to select bit positions where no comparison is desired.\n\nData in the A and R registers are continually compared bit for bit by exclusive OR gates, whose outputs are applied to a digital summer via AND gates. The output of the digital summer is a 7-bit word that represents the binary weighted sum of the bit positions in the A and R registers that are in agreement. The mask register allows the user to work words of less than 64-bits and to eliminate bit positions of no interest. This register is employed by inserting logical 0s in the no comparison bit positions. Masked bits are prevented from reaching the digital summer because the outputs of the M register are applied to AND gates that also contain outputs from the exclusive-OR gates.\n\nEither true or inverted binary outputs can be obtained from the correlator through use of the INV control line, which is applied to seven exclusive-OR gates that accept outputs from the digital summer. Outputs from gates are applied to 3-state output buffers controlled by a signal TRI. Logical 1 applied to TRI disables the buffered outputs by placing them in their high impedance state. When INV is a logical 1, the output lines are inverted and when INV is logical 0, they are true.\n\nA correlation threshold, indicated by flag T, can be established with the independently clocked, 7-bit T register. This is accomplished by first placing the output lines (D₀ to D₆) in their high impedance state through the use of TRI. Then these output lines can be used to insert the binary weighted threshold number into the T register.\n\nWhen the binary weighted number from the digital summer is equal to or greater than the threshold number stored in the T register, flag T becomes a logical 1, showing that the threshold conditions have been met.\n\nExpansion of correlation codes in multiples of 64 bits can be accommodated using the Aₒᵤₜ, Bₒᵤₜ, and Mₒᵤₜ lines available on each chip. These outputs are applied to the corresponding Aₒᵳ, Bₒᵳ, and Mₒᵳ lines of the succeeding chip. With this arrangement an external digital summer must be used to obtain the final sum, a function obtained by a binary adder. Also, an external IC equivalent of the threshold register must be used if that function is desired. The maximum number of correlators that can be used in cascade is limited by the loading and speed of the external circuits. The device is housed in a 24-pin DIP and operates from a single 5-V supply. Inputs and outputs are TTL compatible.\n\nCircle 441 on Inquiry Card\n", "num_tokens": 2048} {"category": "olmocr_science_pdfs-electronics_and_hardware-part1", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-electronics_and_hardware-part1/part-00-00000.npy", "text": " motors are unique in that they will still work when the two connections are reversed. They will just spin in the opposite direction when hooked up backward. To keep things simple, always think of the red wire as positive (+) and the black wire as negative (-).\n\n**MEET YOUR MOTOR CONTROLLER.**\n\nThe TB6612FNG Motor Driver may look complicated, but it’s easy to use. Three pins on the right (PWMA, A12 and A11) control the two pins on the left (A01 and A02). The same is true for channel B. Motors require more current, which is why the VIN voltage is needed.\n\nMost ICs have polarity and usually have a polarity marking in one of the corners. The motor driver is no exception. Be sure to insert the motor driver as indicated in the circuit diagrams. The motor driver pins are explained in the table on the next page.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PIN LABELFUNCTIONPOWER/INPUT/OUTPUTNOTES
VMMotor VoltagePowerThis is where you provide power for the motors (2.2V to 13.5V)
VCCLogic VoltagePowerThis is the voltage to power the chip and talk to the microcontroller (2.7V to 5.5V)
GNDGroundPowerCommon Ground for both motor voltage and logic voltage (all GND pins are connected)
STBYStandbyInputAllows the H-bridges to work when high (has a pull-down resistor, so it must actively be pulled high)
AIN1/BIN1Input 1 for channels A/BInputOne of the two inputs that determine the direction
AIN2/BIN2Input 2 for channels A/BInputOne of the two inputs that determine the direction
PWMA/PWMBPWM input for channels A/BInputPWM input that controls the speed
A01/B01Output 1 for channels A/BOutputOne of the two outputs to connect the motor
A02/B02Output 2 for channels A/BOutputOne of the two outputs to connect the motor
\nHOOKUP GUIDE\n\nREADY TO START HOOKING EVERYTHING UP? Check out the circuit diagram and hookup table below to see how everything is connected.\n\n**CONNECTION TYPES**\n\n- **REDBOARD CONNECTION**\n- **BREADBOARD CONNECTION**\n\n**JUMPER WIRES**\n\n- 5V to 5V\n- GND to GND (-)\n- VIN to A1\n- D8 to J7\n- D9 to J6\n- D10 to J5\n- D11 to J3\n- D12 to J2\n- D13 to J1\n- D7 to I27\n- 5V (+) to 5V (+)\n- GND (-) to GND (-)\n- A2 to 5V (+)\n- A3 to GND (-)\n- J4 to 5V (+)\n- I26 to GND (-)\n\n**MOTOR**\n\n- A4 (RED +)\n- A5 (BLACK -)\n\n**MOTOR DRIVER**\n\n- C1-C8 to G1-G8 (VM on C1, PWMA on G1)\n\n**SWITCH**\n\n- F25\n- F26\n- F27\nOpen the Arduino IDE\n\nConnect the RedBoard to a USB port on your computer.\n\nOpen the Sketch:\nFile > Examples > SIK_Guide_Code_V_4 > CIRCUIT_5A-MOTOR BASICS\n\nSelect UPLOAD to program the sketch on the RedBoard.\n\nWHAT YOU SHOULD SEE\nFlip the switch. The motor will spin at the speed set by the motor speed variable (default is 0). Open the Serial Monitor, type any number from 130 to 255 or -130 to -255, and then press Enter. Changes in speed will be hard to notice. Send 0 to stop the motor.\n\nPROGRAM OVERVIEW\n\n1. Check to see if a command has been sent through the Serial Monitor. If a command has been sent, then set the motor speed to the number that was sent over the Serial Monitor.\n\n2. Check to see if the switch is ON or OFF.\n A: If the switch is ON, drive the motor at the motor speed.\n B: If the switch is OFF, stop the motor.\n\nCODE TO NOTE\n\nPARSING INTEGERS:\nSerial.parseInt();\n\n.parseInt() receives integer numbers from the Serial Monitor. It returns the value of the number that it receives, so you can use it like a variable.\n\nSERIAL AVAILABLE:\nSerial.available();\n\nThis command checks how many bytes of data are being sent to the RedBoard. If it is greater than 0, then a message has been sent. It can be used in an if statement to run code only when a command has been received.\n**CODING CHALLENGES**\n\n**MAKE THE SWITCH CHANGE DIRECTIONS:** Change the code so that the position of the switch changes the direction of the motor instead of turning it on and off.\n\n**REPLACE THE SWITCH WITH A BUTTON:** Try wiring a button into the circuit instead of the sliding switch. Now the motor only turns on when you push the button.\n\n**REPLACE THE SWITCH WITH A SENSOR:** Try changing the code so that the motor is activated by another sensor, like the photoresistor.\n\n---\n\n**TROUBLESHOOTING**\n\n**Motor not spinning**\nCheck the wiring to the motor driver. There are a lot of connections, and it’s easy to mix one of them up with another. Double check the polarity of the motor driver. All the text should face the same direction as everything else.\n\n**Switch not working**\nMake sure that you are hooked up to the middle pin and one side pin on the switch, and not both side pins.\n\n**Still not working?**\nJumper wires unfortunately can go “bad” from getting bent too much. The copper wire inside can break, leaving an open connection in your circuit. If you are certain that your circuit is wired correctly and that your code is error-free and uploaded but you are still encountering issues, try replacing one or more of the jumper wires for the component that is not working.\n\n---\n\nYou’ve completed **Circuit 5A**!\nContinue to **Circuit 5B** to construct a remote-controlled robot.\nIn this circuit, you’ll control two motors and build your own remote-controlled roving robot! You will also learn how to read information from a serial command so that you can use the Serial Monitor to tell the robot in what direction to move and how far to move.\n\nNEW CONCEPTS\n\n**ASCII CHARACTERS:** ASCII is a standard for character encoding, formalized in the 1960s, that assigns numbers to characters. When typing on a computer keyboard, each character you type has a number associated with it. This is what allows computers to know whether you are typing a lowercase “a,” an uppercase “A” or a random character such as ampersand (&). In this experiment, you will be sending characters to the Serial Monitor to move your remote-controlled robot. When you send a character, the microcontroller is interpreting that as a specific number. ASCII tables available online ([http://sfe.io/ASCII](http://sfe.io/ASCII)) make it easier to know which character is represented by which number.\n\n**CONVERTING STRINGS TO INTEGERS:** String variables hold words like “dog” or “Robert Smith” that are made up of multiple characters. Arduino has a set of special built-in methods for string variables that you can call by putting a period after the variable name, as follows:\n\n```java\nstring_variable_name.toInt();\n```\n\nThe `.toInt()` method converts the string to a number, and there are a dozen other methods that can do things like tell you the length of a word or change all of the characters in a string to uppercase or lowercase.\n\n**ASSEMBLY**\n\nBefore you build this circuit, you’ll need to make a few modifications to the breadboard baseplate to make it more robot-like!\n\n1. Cut and attach two short pieces of Dual Lock tape to the very corners of the baseplate on the side located under the breadboard.\n2. **CUT TWO MORE STRIPS** that are 1.25 inches (3.175cm) long and ¾ inch (1.9cm) wide. Remove the adhesive backing, and attach the strips to the two motors. Be sure that your motors are mirror images of each other when you attach the Dual Lock.\n\n3. **PRESS THE MOTORS TO THE BASEPLATE**, connecting the two Dual Lock surfaces. Try to get the motors as straight as possible so your robot will drive straight.\n\n4", "num_tokens": 2048} {"category": "olmocr_science_pdfs-electronics_and_hardware-part1", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-electronics_and_hardware-part1/part-00-00000.npy", "text": " all connections to the Control and Drive boards at this time. Proceed to section 7 Initial Power Up and Test.\n6.2 Replacing MOVFR-0069N\n\n• Remove the Control Board and Drive shown in Figure 17 - MOVFR-0069N\n• Mount and secure the ECI MOVFR-LCD Control board and Drive board as shown in Figure 18 - ECI MOVFR-LCD Installed.\n• Connect communication cable (CAT5) between Control and Drive Boards.\n• Make all connections to the Drive and Control boards at this time and proceed to Section 7 Initial Power Up and Test.\n\nFigure 16- MOVFR-00069N Installation Kit\n\nFigure 17 - MOVFR-0069N\n\nFigure 18 - ECI MOVFR-LCD Installed\n7 Initial Power Up and Test\n\n7.1 Manual Operation\n\n- With the doors in the fully closed position and the AUTO/MAN switch in the MAN position, apply power to door operator\n - LCD Display should show\n \n | Edit parameters |\n |-----------------|\n | Load defaults |\n | Diagnostics 1 |\n | Diagnostics 2 |\n\n - Check that the POWER on the display board and PWR LED on the drive board are lit.\n - Check that the COM, and BRAKE LEDs on the drive board are lit.\n- Press Enter Button to select EDIT PARAMETERS\n- Press – button until INPUT VOLTAGE is highlighted.\n- Press ENTER button and set to proper input voltage using + button. Press ENTER then ESC buttons when complete.\n- Move cursor down to DIAGNOSTICS 1 and press ENTER\n - LCD should show\n \n | VBUS : 317V 0s |\n | SPEED : 0 |\n | TEMP : 29C/ 84F|\n | MOTOR : .0A |\n | CYCLE : xxxx |\n\n - NOTE that the VBUS and TEMPs are estimates\n- With the AUTO/MAN switch in MAN position set the CLOSE/OPEN switch to the OPEN position. (If motor moves in wrong direction, remove power from unit and swap 2 or the 3 motor leads.)\n - The SPEED and MOTOR readings should increase as the door moves.\n - Hold switch until door is fully open and the DOL LED lights.\n - When fully OPEN the SPEED and MOTOR reading should go to 0 even with the switch in OPEN position.\n8 Adjustments\n\nAt this time adjustments can be made through the parameter settings to produce smooth door operation and adjust OPEN and CLOSE torque settings. Refer to section 8.1 for speed profiles and CAM settings.\n\nNOTE - For HEAVY DOOR adjustments the elevator car must be at a “heavy door” floor. When moving a heavy door in MAN operation the HEAVY switch must be used with the CLOSE and OPEN switches.\n\n**NOTE:** IT IS IMPORTANT TO RETURN THE DISPLAY TO THE MAIN MENU WHEN ADJUSTMENTS ARE COMPLETE. FAILING TO DO SO WILL RESULT IN PARAMETERS REVERTING TO DEFAULT SETTINGS SHOULD POWER BE LOST.\n\n8.1 Speed Profiles\n\n8.1.1 Closing Speed Profile\n8.1.2 Closing CAM/Sensor Sequence\n\nFigure 20 - Close CAM/Sensor Sequence\n\n8.1.3 Open Speed Profile\n\nFigure 21 - Open Speed Profile\n\n8.1.4 Open CAM/Sensor Sequence\n\nFigure 22 - OPEN CAM/SENSOR Sequence\n8.2 CAM Settings\n\n8.2.1 Right Hand CAMs\n\n8.2.2 Left Hand CAMs\n\n9 AUTO Operation\n\n- Go to EDIT PARAMETERS and change the INPUT VOLTAGE parameter to the proper voltage for your system.\n- Switch the AUTO/MAN switch to AUTO position.\n- Door operator is now ready for normal operation.<|endoftext|>Note\n\nThe LED & button mentioned through this document is at the back of the accessory, above the power jack/cable\nFull Instructions\n\nRequirements\n\n- HK Garage App Link Play Store App Store\n- Garage Door Accessory, power cable, and adapter\n- Tilt sensor and battery\n\nHardware button input and LED indicators:\n\nThe LED & button mentioned throughout this document is at the back of the device, near the power jack/cable\n\n1. **Button:**\n a. To reset the device to factory settings: Press and hold the button for 10 seconds\n b. To remove current wifi information stored on the device: Press and hold the button for 3 seconds.\n\n2. **LED states meaning table:**\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
ColorStateMeaning
Orange(Red)Blink rapidly every 200msReady to Add to an account if device is brand new or after board is factory reset
Wifi configuration has changed on Home App (If device is already added to an account)
SolidBlink slowly each 3 secondsWorking normally
RedBlink on/off each 500 msDevice can connect to the wireless network, but has not been added to an account.
RedBlink on/off each 1 secondConnecting to available network.
Firmware update is in progress.
\nInstruction steps\n\n1. Hardware setup\n a. Plug garage accessory into an AC outlet\n b. If the LED blinks orange (red) rapidly, the accessory is ready to accept new wifi configuration. Please proceed to the next step.\n\n2. Account registration and setup\n a. Install & open HK Watchman Garage Door app from the App Store (iOS)\n b. On the login screen, choose Sign up to create a new account\n c. Choose your username, email, and password. Then press Sign up to complete.\n d. Activate the registration email in your Inbox, please also check Spam or Junk if there is no registration email\n e. Login with the registered email and password\n f. When logged in successfully, you will be redirected to the Home screen.\n g. Click on the menu icon on the top left of the Home Screen to open a side menu.\n h. Click on the Add Home button on this menu to add a new home. Name the home. Verify that the home appears under My Homes on the side menu\n i. You have completed the account setup. Please proceed to the next step\n\n3. Gateway accessory & app configuration\n a. In the Home screen above, after a home is created, tap on the “+” button on the toolbar or the Add Product button to go to the Add Product screen\n b. Select your device which will show up as “Watchman xxxx”\nc. You’ll have the option to add the garage device either by using the camera to capture the QR code sticker on the side of the device or enter the code below the QR code on the sticker.\nd. When the accessory is successfully added, there will be a dialog to notify you of the event and the app will bring you back to the Home Screen. The accessory will now be solid orange (red).\ne. The accessory now displays on the home screen but is not yet functional since we haven't paired a tilt sensor with it. To assign a remote to an accessory, select on the top right corner of the accessory.\nf. Scroll down and click on Pair sensor. A dialog will pop up.\ng. On the tilt sensor, press and hold the button (circled in red below) until the LED (circled in blue) blinks red. Then, press Done on the dialog.\n\n(figure 1)\nh. The app will notify you of the outcome of the pairing process.\ni. You can now go back and control the garage. To open, swipe up, to close, swipe down. Refer to the section below on the orientation of the tilt sensor and how to attach it to your garage door.\n\n**Instructions on Orientation of the tilt sensor**\n\nTo simulate the open/close state of the garage door without having one, turn the tilt sensor to the corresponding open/close position of your desire.\n\n**Close state:**\n\nThe arrow points up like in this image (figure 2)\nOpen state:\n\nThe arrow points in (to the house) horizontally\nThe side shows in figure 1 will face downwards (the ground)\nInstructions on attaching the Tilt Sensor to the garage door\n\nAttach the side without the buttons to the top panel of the garage door, with the arrow pointing up, such that when the garage door is fully open, the arrow will point into the house and the side with the buttons will face the ground.\n\nOptional: Virtual Keypad\n\nVirtual keypad is a web application which appears on the phone's browser when a user uses its camera to scan the Doorbell QR Code/NFC tag. The virtual keypad allows the scanner to control the garage door with an access-code shared by the owner of the garage door, meant for guests which don't have our app available. The access code can be configured to be used only 1-time, within a limited time period, etc. and can be revoked anytime by the owner. In addition, the virtual keypad can acts as a virtual doorbell to anonymously contact the homeowner via phone notification, message chat, or video call.\n\nA. How to setup Virtual Keypad Via Doorbell QR Code/NFC tag\n\n1. Install ReachMe app: [Apple", "num_tokens": 2048} {"category": "olmocr_science_pdfs-electronics_and_hardware-part1", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-electronics_and_hardware-part1/part-00-00000.npy", "text": " $n$ & **maximize** BW\n\n$$A_0 = A_{\\text{tot}} \\Rightarrow A_0 = A_{\\text{tot}}^{\\frac{1}{\\nu n}}$$\n\n$$W_{\\text{on}} = \\frac{W_n}{A_{\\text{tot}}} \\cdot \\sqrt{\\frac{1}{2^{\\nu n} - 1}}$$\n\napply $\\frac{dW_{\\text{on}}}{dn} = 0$\n\nAfter some algebra:\n\n$$n_{\\text{opt.}} = \\frac{\\ln 2}{\\ln \\left\\{1 + \\frac{\\ln 2}{2 \\ln A_{\\text{tot}}}\\right\\}}$$\n\nFor large $A_{\\text{tot}}$,\n\n$$\\ln \\left\\{1 + \\frac{\\ln 2}{2 \\ln A_{\\text{tot}}}\\right\\} \\approx \\frac{\\ln 2}{2 \\ln A_{\\text{tot}}}$$\n\n$$\\ln(1 + x) \\approx x \\text{ for } x \\ll 1$$\n\n$$\\Rightarrow n_{\\text{opt.}} \\approx 2 \\frac{\\ln A_{\\text{tot}}}{\\ln 2}$$\noptimum gain/Stage:\n\n\\[ A_{0,\\text{opt}} = (A_{\\text{tot}})^{\\frac{1}{\\gamma_{\\text{opt}}}} = \\exp \\left\\{ \\frac{1}{\\gamma_{\\text{opt}}} \\ln A_{\\text{tot}} \\right\\} \\]\n\n\\[ \\approx e^{\\frac{1}{2}} \\]\n\n\\[ A_{0,\\text{opt}} = \\sqrt{e} \\]\n\noptimum BW:\n\n\\[ \\omega_{n,\\text{opt}} = \\frac{W_n}{A_{\\text{tot}}^{\\frac{1}{\\gamma_{\\text{opt}}}}} \\sqrt{\\frac{1}{2} \\gamma_{\\text{opt}} - 1} \\]\n\n\\[ \\approx \\frac{W_n}{\\sqrt{e}} \\left[ \\exp \\left\\{ \\frac{1}{\\gamma_{\\text{opt}}} \\ln 2 \\right\\} - 1 \\right]^{\\frac{1}{2}} \\]\n\n\\[ \\omega_{n,\\text{opt}} \\approx W_n \\sqrt{\\frac{\\ln 2}{2e \\ln A_{\\text{tot}}}} \\]\n\n\\[ \\omega_{n,\\text{opt}} \\approx \\frac{0.357 W_n}{\\sqrt{\\ln A_{\\text{tot}}}} \\]\n\nIn other words,\n\n* \\( BW \\times \\sqrt{\\ln a} = \\text{constant} \\)\n\n* If \\( A_{\\text{tot}} \\to A_{\\text{tot}} \\times 100 \\), \\( BW \\to < BW \\times 2 \\)\n\n* Overall amp does not have constant \\( G \\times BW \\) product (obviously, be cause \\( G \\times BW \\) is constant only for single-pole systems)\n* Gain product for this cascaded amp\n\n\\[ G = A_{\\text{tot}} \\cdot W_0 \\]\n\n\\[ = A_{\\text{tot}} \\cdot \\frac{0.357W_0}{\\sqrt{\\ln(A_{\\text{tot}})}} \\Rightarrow \\text{increases without bound} \\]\n\n---\n\n**Gain-bandwidth-delay Tradeoff**\n\n* Delay is less important in systems with 1-way comm. (e.g. TV, optical fibre comm.)\n* Coupling between A & BW is weak for higher order cascaded systems\n* If delay can be arbitrary, what A or B can be achieved?\n\n---\n\n* Recall: \\( BW \\propto \\frac{1}{\\text{rise time}} \\)\n\n* Imagine an amp that stores energy in input step for a long time, then dumps it suddenly into an output \\( \\Rightarrow \\) very fast rise time \\( \\Rightarrow \\) high BW\n\n**Distributed Amplifier** (Travelling Wave Amp.)\n\n![Distributed Amplifier Diagram](image-url)\n* inputs to transistors supplied by tapped delay line\n* output fed into another tapped delay line\n* assume input has a voltage step.\n → after a delay through each line, it appears at transistor inputs\n → each transistor generates current equal to \\( g_m \\times \\text{input step} \\)\n → currents of all transistors sum coherently in time, if delays of input & output line are matched\n\n* at each point of the tapped delay line,\n \\[ \\text{Zin} = \\frac{Z_0}{2} \\]\n \n* overall gain \\( Av = \\frac{n \\cdot g_m \\cdot Z_0}{2} \\) for \\( n \\) stages\n\n→ \\( Av \\propto n \\)\n→ \\( Av > 0 \\) if \\( g_m > 0 \\)\n→ BW does not factor directly into tradeoff\n→ assume that \\( C_{in} \\&\\ C_{out} \\) of transistors are absorbed into \\( RLCG \\) of TDL\n→ \\( C_{in} > C_{out} \\) ⇒ matching between TDLs is difficult \\( \\{ C_{gs} > C_{db} \\} \\)\n* Can be power-hungry\n* TDLs can be replaced by lumped LC equivalents (artificial T-lines)\n* Main advantage: You can achieve significant gain @ freq. close to \\( f_r \\)\n* High gain & low NF not possible\n* Area is large\n* \\( Z_0 \\)'s for G & D T-lines need not be the same\n* If T-lines are lossy, \\( A_v \\to 0 \\) as \\( N \\to \\infty \\)\n\n\\[ \\text{Vin in gate line decays exponentially} \\]\n\\[ \\Rightarrow A_v \\text{ increases linearly with } n \\]\n\\[ \\Rightarrow n_{opt.} \\text{ exists for a given set of TDL's and MOSFETS.} \\]\n\n**Artificial T-lines**\n* Has BW limitation because of lumped LC (ideal lossless TDL has no BW limitation)\n* \\( T_{delay} = \\sqrt{LC} \\text{ per LC-section} \\)\n* (Ideal TDL \\( T_{del.} = \\sqrt{LC} \\cdot z \\), \\( z=\\text{length} \\))\n\\[ Z_{in} = j \\omega L \\frac{1}{2} \\left[ 1 \\pm \\sqrt{1 - \\frac{4}{\\omega^2 LC}} \\right] \\]\n\n\\[ \\Rightarrow \\text{cutoff} = \\frac{2}{\\sqrt{LC}} \\quad \\text{cutoff frequency} \\]\n\n* Choose \\( LC \\) for\n \n \\[ \\Rightarrow \\text{min. loss & attenuation} \\]\n \n \\[ \\Rightarrow \\text{cutoff } > \\text{required BW} \\]\n \n \\[ \\Rightarrow \\text{desired } T_{\\text{delay}} \\]\n \n \\[ \\Rightarrow \\text{constant group delay (min. dispersion)} \\]\n\n* for a lossy line, constant G.D. \\( \\Rightarrow RC = CL \\)\n\n\\[ \\Rightarrow \\frac{1}{\\tau} = \\frac{C}{L} \\quad \\text{equal time constants} \\]<|endoftext|>Identifying ValueRAM Memory Modules\n\nThis reference guide is designed to help you identify our ValueRAM® memory modules by specification. While this is a representation of a majority of our generic modules, naming conventions may vary as necessary. The back page is a summary of the terms used to describe these industry-standard modules.\n\n### DDR3 for Desktops and Servers (PC3-8500, PC3-10666)\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
ValueRAMModule CodeTypeChip TypeSpeedCapacitySpecial Designators
KVR 1066D3 D 4 R 7 S K2/4GRegisteredRegistered13334GBIntel Validated
\n\n### DDR2 for Notebooks, Desktops, and Servers (PC2-3200, PC2-4200, PC2-5300, PC2-6400)\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
ValueRAMModule CodeTypeChip TypeSpeedCapacitySpecial Designators
KVR 400D2 D 8 N 3 H K2/512RegisteredRegistered6674GBIntel Validated
\n\n### DDR for Servers (PC2700, PC3200)\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
ValueRAMDescription\n\nThe KP25x integrated pressure sensor family is a miniaturized Digital Barometric Air Pressure Sensor IC based on the capacitive principle. It is surface micro-machined with a monolithic integrated fully digital signal conditioning circuit, implemented in state-of-the-art 0.5 micron BiCMOS technology. The KP25x provides an SPI interface to enable direct microcontroller connections with a minimum bill of materials.\n\nThe KP25x is individually calibrated and temperature compensated, reducing software complexity by providing a direct readout of pressure and temperature. KP25x provides a fast startup time of less than 10 ms, high accuracy of up to 1 kPa and different sensitivities. Combined with the wide operating temperature range of -40 to 125 °C, high ESD robustness, and excellent EMC performance, the KP25x is perfectly suited to the harsh environmental conditions prevalent in automotive and industrial applications.\n\nFeatures\n\n- High accuracy pressure sensing up to +/- 1.0 kPa\n- Integrated temperature sensor\n- Pressure ranges 40-115 kPa and 60-165 kPa\n- Wide operating temperature range -40 to 125 °C\n- Digital SPI interface\n- Up to 12 bit pressure and temperature resolution\n- Calibrated and compensated\n- Self-diagnosis features\n- Fast startup time of less than 10 ms\n- „Green“ 8 pin SMD housing\n\nTypical Applications\n\n- Automotive Engine Management\n- Small Engine Management\n- Industrial Control\n- Altimeter\n- Weather Station\n- Medical\n\nKP25x Application Circuit\n\nwww.infineon.com/pressure\nKP25x Integrated Pressure Sensor\nDigital Barometric Air Pressure Sensor IC\n\nINFINEON TECHNOLOGIES offers an extensive product portfolio for gasoline and diesel engine management systems and industrial control applications. Our products range from micromachined sensors, microcontrollers, and smart power ICs to voltage regulators and other standard components. The KP25x is a digital integrated pressure sensor for barometric pressure management, and provides benchmark performance in terms of reliability, accuracy, and ease-of-use.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
ParameterKP253KP254KP256Unit
Pressure range60.0 - 165.0 kPa40.0 - 115.0 kPa60.0 - 165.0 kPakPa
Accuracy+/- 1.0 kPa+/- 1.5 kPa+/- 1.0 kPakPa
Output FormatDigital SPIDigital SPIDigital SPI
Resolution12 bits10 bits10 bitsbits
Sensitivity39 LSB/kPa13.6 LSB/kPa9.8 LSB/kPaLSB/kPa
Supply Voltage3.3 - 5.0 V3.3 - 5.0 V3.3 - 5.0 VV
Order CodeSP000843708SP000773948SP000773952
\n\nATTENTION PLEASE!\nThe information given in this document shall in no event be regarded as a guarantee of conditions or characteristics (\"Beschaffenheitsgarantie\"). With respect to any examples or hints given herein, any typical values stated herein and/or any information regarding the application of the device, Infineon Technologies hereby disclaims any and all warranties and liabilities of any kind, including without limitation warranties of non-infringement of intellectual property rights of any third party.\n\nINFORMATION\nFor further information on technology, delivery terms and conditions and prices please contact your nearest Infineon Technologies Office (www.infineon.com).\n\nWARNINGS\nDue to technical requirements components may contain dangerous substances. For information on the types in question please contact your nearest Infineon Technologies Office. Infineon Technologies Components may only be used in life-support devices or systems with the express written approval of Infineon Technologies, if a failure of such components can reasonably be expected to cause the failure of that life-support device or system, or to affect the safety or effectiveness of that device or system. Life support devices or systems are intended to be implanted in the human body, or to support and/or maintain and sustain and/or protect human life. If they fail, it is reasonable to assume that the health of the user or other persons may be endangered.<|endoftext|>Summary\n\nThe Intel® Multi-Channel Streaming DMA Controller IP provides a small footprint, highly efficient solution for FPGA designs.\n\nThis IP Core offers both memory-based DMA for handling transfers to and from addressed memory such as on-board SRAM and SDRAM, and FIFO-based DMA for streaming applications.\n\nIntel's DMA Controller and reference design applications provide the complete solution for rapid inclusion of fast PCI Express data transfers and streaming into FPGA environments. Additionally, Intel's generic software API is platform-independent thus enabling auto-discovery of applications and helping provide a route to the unique PCI identification of the final product.\n\nKey Features\n\n- PCIe-based DMA Controller firmware\n- 64, 128 and 256-bit PCIe interface support:\n - PCIe Gen1, Gen2, Gen3 support (dependent on FPGA family)\n - 1 & 2, 4 or 8 PCIe lane support options\n- PCIe 8-lane Gen3 supports up to four UHDTV1 (3840 x 2160 p60 video streams.\n- Offers both streaming FIFO-based DMA and memory-based DMA channels\n- Highly efficient use of PCIe bandwidth, making it particularly suited to data streaming applications\n- Support for multiple outstanding read requests\n- Pre-fetching of Scatter-Gather descriptors for continuous streaming\n- Optimised arbiter for back-to-back packing of Transition Layer Packets (TLP)\n- Configurable number of 32, 64 or 128bit FIFO-based DMA streaming channels\n- Supports 32-bit or 64-bit addressing\n- Free 30-day evaluation\nApplications\n\nThe Intel Multi-Channel Streaming DMA Controller IP can be used in a range of applications including:\n\n- Video to PCI conversion\n- Video capture and storage\n- Video analysis\n\nThe associated application demonstrates the ability of the DMA controller to simultaneously read and write multiple input video streams. It can work with SD, HD or 3G video. The application also demonstrates the use of the Windows driver and API supplied with the DMA Controller.\n\nProduct Options\n\n- 1 & 2, 4 or 8 PCI Express Lane support\n- Streaming FIFO-based DMA support\n- Number of DMA channels (up to 16)\n- FPGA family\n- QT application providing register/write DMA functions, source code\n- Intel Generic API and Driver source code\n- Extended evaluation period (over 30 days)\n- Extended support period (over 1 year)\n\nDesign Your Product Today with Intel FPGAs\n\nIntel provides a large range of complementary and modular in-house IP cores for video processing and connectivity. These IP cores can be used to create complete solutions for applications in Broadcast, ProAV, Aerospace/Defense, Medical, Automotive and more.\n\nYou can get more information on available video IP at www.intel.com/fpga-broadcast or contact an Intel sales representative for further inquiries.<|endoftext|>KEYSTROKE TACTILITY ARRANGEMENT ON A SMOOTH TOUCH SURFACE\n\nInventor: Wayne Carl Westerman, San Francisco, CA", "num_tokens": 2048} {"category": "olmocr_science_pdfs-electronics_and_hardware-part1", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-electronics_and_hardware-part1/part-00-00000.npy", "text": "46\n
146646146
523.xalancbmk_r72314242314242315241
525.x264_r72276456276457278453
531.deepsjeng_r72435190433191433191
541.leela_r72646184655182647184
548.exchange2_r72402470400471401470
557.xz_r72518150518150517151
\n\n*Results appear in the order in which they were run. Bold underlined text indicates a median measurement.*\n\nSubmit Notes\n\nThe numactl mechanism was used to bind copies to processors. The config file option 'submit' was used to generate numactl commands to bind each copy to a specific processor. For details, please see the config file.\n\nOperating System Notes\n\nStack size set to unlimited using \"ulimit -s unlimited\"\n\nGeneral Notes\n\nEnvironment variables set by runcpu before the start of the run:\nLD_LIBRARY_PATH = \"/home/cpu2017/lib/intel64:/home/cpu2017/lib/ia32:/home/cpu2017/je5.0.1-32\"\n\nBinaries compiled on a system with 1x Intel Core i9-7900X CPU + 32GB RAM memory using Redhat Enterprise Linux 7.5\nTransparent Huge Pages enabled by default\nPrior to runcpu invocation\nFilesystem page cache synced and cleared with:\nsync; echo 3>/proc/sys/vm/drop_caches\nruncpu command invoked through numactl i.e.:\nnumactl --interleave=all runcpu \nNA: The test sponsor attests, as of date of publication, that CVE-2017-5754 (Meltdown) is mitigated in the system as tested and documented.\nYes: The test sponsor attests, as of date of publication, that CVE-2017-5753 (Spectre variant 1) is mitigated in the system as tested and documented.\nYes: The test sponsor attests, as of date of publication, that CVE-2017-5715 (Spectre variant 2)\nCisco Systems\nCisco UCS B200 M5 (Intel Xeon Gold 6240M, 2.60GHz)\n\nSPECrater®2017_int_base = 227\nSPECrater®2017_int_peak = Not Run\n\nCPU2017 License: 9019\nTest Date: Aug-2019\nTest Sponsor: Cisco Systems\nHardware Availability: Apr-2019\nTested by: Cisco Systems\nSoftware Availability: May-2019\n\nGeneral Notes (Continued)\n\nis mitigated in the system as tested and documented.\n\nPlatform Notes\n\nBIOS Settings:\nIntel HyperThreading Technology set to Enabled\nSNC set to Enabled\nPower Performance Tuning set to OS Controls\nPatrol Scrub set to Disabled\nSysinfo program /home/cpu2017/bin/sysinfo\nRev: r5974 of 2018-05-19 9bcede8f2999c33d61f64985e45859ea9\nrunning on linux-db10 Wed Sep 4 15:10:41 2019\n\nSUT (System Under Test) info as seen by some common utilities.\nFor more information on this section, see\nhttps://www.spec.org/cpu2017/Docs/config.html#sysinfo\n\nFrom /proc/cpuinfo\n model name : Intel(R) Xeon(R) Gold 6240M CPU @ 2.60GHz\n 2 \"physical id\"s (chips)\n 72 \"processors\"\n cores, siblings (Caution: counting these is hw and system dependent. The following\n excerpts from /proc/cpuinfo might not be reliable. Use with caution.)\n cpu cores : 18\n siblings : 36\n physical 0: cores 0 1 2 3 4 8 9 10 11 16 17 18 19 20 24 25 26 27\n physical 1: cores 0 1 2 3 4 8 9 10 11 16 17 18 19 20 24 25 26 27\n\nFrom lscpu:\n Architecture: x86_64\n CPU op-mode(s): 32-bit, 64-bit\n Byte Order: Little Endian\n CPU(s): 72\n On-line CPU(s) list: 0-71\n Thread(s) per core: 2\n Core(s) per socket: 18\n Socket(s): 2\n NUMA node(s): 4\n Vendor ID: GenuineIntel\n CPU family: 6\n Model: 85\n Model name: Intel(R) Xeon(R) Gold 6240M CPU @ 2.60GHz\n Stepping: 7\n CPU MHz: 2600.000\n CPU max MHz: 3900.0000\n CPU min MHz: 1000.0000\n\n(Continued on next page)\nCisco Systems\nCisco UCS B200 M5 (Intel Xeon Gold 6240M, 2.60GHz)\n\nCPU2017 License: 9019\nTest Sponsor: Cisco Systems\nTested by: Cisco Systems\n\nSPECratenumber_int_base = 227\nSPECratenumber_int_peak = Not Run\n\nTest Date: Aug-2019\nHardware Availability: Apr-2019\nSoftware Availability: May-2019\n\nPlatform Notes (Continued)\n\nBogoMIPS: 5200.00\nVirtualization: VT-x\nL1d cache: 32K\nL1i cache: 32K\nL2 cache: 1024K\nL3 cache: 25344K\nNUMA node0 CPU(s): 0-2,5,6,9,10,14,15,36-38,41,42,45,46,50,51\nNUMA node1 CPU(s): 3,4,7,8,11-13,16,17,39,40,43,44,47-49,52,53\nNUMA node2 CPU(s): 18-20,23,24,27,28,32,33,34-35,57,58,61,62,65-67,70,71\nNUMA node3 CPU(s): 21,22,25,26,29-31,34,35,55,56,59,59,60,63,64,68,69\nFlags: fpu vme de pse tsc msr pae mce cmov pat pse36 c compiler_safe ds acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx pdpe1gb rdtscp lm constant_tsc art arch_perfmon pebs bts rep_good nopl xtopology nonstop_tsc cpuid aperfmperf tsc_known_freq pni pclmulqdq dtes64 monitor ds_cpl vmx smx est tm2 sse3", "num_tokens": 2048} {"category": "olmocr_science_pdfs-electronics_and_hardware-part1", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-electronics_and_hardware-part1/part-00-00000.npy", "text": " \\approx 35\\% \\cdot \\left(V_{out,setpoint} + \\frac{V_{AC,max(pk)} + V_{margin,FET}}{N}\\right)$,\n\n$$V_{r(diode),max} \\approx 135\\% \\cdot \\left(V_{out,setpoint} + \\frac{V_{AC,max(pk)} + V_{margin,FET}}{N}\\right) = 135\\% \\cdot \\left(54 + \\frac{\\sqrt{2} \\cdot 305 + 90}{3.2}\\right)$$\n\n$$V_{r(diode),max} \\approx 292.81 \\, V$$\n\n$$I_{sec(pk),max} \\approx I_{pri(pk),max} \\cdot \\frac{N_p}{N_z} = 2.606 \\cdot \\frac{32}{10}$$\n\n(12)\n\n$$I_{sec(pk),max} \\approx 8.34 \\, A$$\n\nBased on the above, a secondary main output diode with repetitive reverse voltage rating $V_{RRM} = 300 \\, V$ is selected. To minimize its switching and conduction losses, the selected diode also has the properties of hyper-fast recovery speed and low forward voltage drop at $I_{sec(pk),max}$.\n\nAdditionally, a RC secondary snubber network, e.g., 10 Ω resistor in series with 150 pF capacitor, is deployed across the secondary main output diode, to suppress the diode reverse voltage spike and the EMI.\n5 CS resistor and GD pin-related design\n\nFigure 5 shows the connections of the current sense (CS) resistor $R_{CS}$, gate resistor $R_G$ and gate source resistor $R_{GS}$.\n\n![Figure 5 GD pin, CS pin, R_{CS}, R_G and R_{GS} connections](image)\n\nBased on the CS pin voltage across $R_{CS}$, the MOSFET current can be measured.\n\nThe recommended minimum CS resistor value $R_{CS,\\text{min}}$ is defined and calculated as:\n\n$$R_{CS,\\text{min}} = \\frac{0.45}{I_{pri(pk),\\text{max}}} = \\frac{0.45}{2.606} = 0.173 \\Omega$$ \\hspace{1cm} (13)\n\nThe recommended maximum CS resistor value $R_{CS,\\text{max}}$ is defined and calculated as:\n\n$$R_{CS,\\text{max}} = \\frac{0.54}{I_{pri(pk),\\text{max}}} = \\frac{0.54}{2.606} = 0.207 \\Omega$$ \\hspace{1cm} (14)\n\nBased on the calculation results above, CS resistor $R_{CS} = 0.2 \\Omega$ is selected in this design example.\n\n$R_G$ is to damp the gate-rise oscillation, and $R_{GS}$ is to ensure the MOSFET gate has relatively low impedance to prevent it from being switched on undesirably. $R_G = 10 \\Omega$ and $R_{GS} = 20 \\text{k}\\Omega$ are selected in this design example.\n\nThe gate-drive peak voltage $V_{GD,pk}$ is typically 12 V with sufficient $V_{CC}$ voltage supply. To achieve a good balance of switching loss and EMI, the gate voltage rising slope can be controlled by configuring the gate driver peak source current parameter $I_{GD,pk}$ (configurable range: 30 mA to 118 mA). This saves two components (see $D_{\\text{fastoff}}$, $R_{\\text{slowon}}$ in Figure 6), which are conventionally added for the same purpose.\n\n![Figure 6 Gate-drive voltage rising slope control with $I_{GD,pk}$ parameterization for component saving](image)\n\nWith the high-speed switching characteristics of CoolMOS™ P7 MOSFET, it is recommended to configure the $I_{GD,pk}$ parameter in the range of 30 mA to 49 mA.\n\nAs a result, $I_{GD,pk} = 30 \\text{ mA}$ is selected in this design example.\n6 Input voltage parameters for operation, start-up and protection\n\nThe lowest operational input voltage parameter $V_{in,low}$ and the highest operational input voltage parameter $V_{in,high}$ can be defined and calculated as:\n\n$$V_{in,low} = a \\cdot V_{AC,\\text{min}}$$\n\n$$V_{in,high} = b \\cdot V_{AC,\\text{max}}$$\n\nWhere $a$ is recommended to be between 0.9 and 0.95, and $b$ is recommended to be between 1.05 and 1.10.\n\nTaking $a = 0.91$ and $b = 1.07$,\n\n$$V_{in,low} = 82 \\, V_{\\text{rms}}$$\n\n$$V_{in,high} = 326 \\, V_{\\text{rms}}$$\n\n$EN_{OVP,\\text{In}}$ parameter refers to the enable switch for maximum input voltage start-up check and input OVP, based on $V_{\\text{in,start,max}}$ and $V_{\\text{inOV}}$ levels, respectively. $EN_{OVP,\\text{In}} = \\text{Enabled}$ is selected in this design example.\n\n$EN_{UVP,\\text{In}}$ parameter refers to the enable switch for minimum input voltage start-up check and input UVP, based on $V_{\\text{in,start,min}}$ and $V_{\\text{inUV}}$ levels, respectively. $EN_{UVP,\\text{In}} = \\text{Enabled}$ is selected in this design example.\n\n$V_{\\text{in,start,max}}$ parameter refers to the maximum input voltage level setting for start-up, which is recommended to be configured as $V_{in,high}$. Hence, $V_{\\text{in,start,max}} = 326 \\, V_{\\text{rms}}$ is selected in this design example. $V_{\\text{inOV}}$ parameter refers to the input OVP level setting, which is recommended to be:\n\n$$V_{\\text{inOV}} \\geq V_{\\text{in,start,max}} \\cdot 107\\% = 349 \\, V_{\\text{rms}}$$\n\n(17)\n\n$V_{\\text{in,start,min}}$ parameter refers to the minimum input voltage level setting for start-up, which is recommended to be configured as $V_{in,low}$. Hence, $V_{\\text{in,start,min}} = 82 \\, V_{\\text{rms}}$ is selected in this design example. $V_{\\text{inUV}}$ parameter refers to the input UV (brown-out) protection level setting, which is recommended as:\n\n$$V_{\\text{inUV}} \\leq V_{\\text{in,start,min}} \\cdot 93\\% = 76 \\, V_{\\text{rms}}$$\n\n(18)\n\nBased on the above, $V_{\\text{inOV}} = 350 \\, V_{\\text{rms}}$ and $V_{\\text{inUV}} = 70 \\, V_{\\text{rms}}$ are selected in this design example.\n\nThe input voltage protections (based on $V_{\\text{inOV}}$ and $V_{\\text{inUV}}$) in ABM can be optionally enabled with $EN_{\\text{VIN,ABM}}$ parameter. If $EN_{\\text{VIN,ABM}}$ is enabled, the enable switches for $V_{\\text{inOV}}$ and $V_{\\text{inUV}}$ protections in ABM are respectively based on $EN_{OVP,\\text{In}}$ and $EN_{UVP,\\text{In}}$. In this design example, $EN_{\\text{VIN,ABM}} = \\text{Enabled}$ is selected. The input OVP blanking period number parameter $t_{\\text{inOV,blank}} = 1$ is recommended and selected in this design example.\n# HV pin-related design\n\nAs shown in Figure 8, HV series resistor \\( R_{HV} \\) is connected from the HV pin to the cathodes of HV diode \\( D_{HV1} \\) and \\( D_{HV2} \\), while bridge rectifier AC input should be applied across the \\( D_{HV1} \\) anode and \\( D_{HV2} \\) anode.\n\nA high voltage capacitor \\( C_{HV} \\) should also be connected between the HV pin and ground, to filter the switching noise for a robust HV pin line synchronization. In addition, \\( C_{HV} \\) also improves the input voltage surge and ESD capability of the HV pin.\n\nThe repetitive reverse voltage rating \\( V_{RRM} = 1000 \\text{ V} \\) for \\( D_{HV1} \\) and \\( D_{HV2} \\) is recommended and selected in this design example, to ensure good reliability of the diodes against input voltage surge.\n\n![Figure 8](image)\n\n**", "num_tokens": 2048} {"category": "olmocr_science_pdfs-electronics_and_hardware-part2", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-electronics_and_hardware-part2/part-00-00000.npy", "text": ", CA 94022 (415) 948-6533.\n- SOUTHERN CALIFORNIA, ARIZONA: Crown Electronics, 1146 Collins Street, No. Hollywood, CA 91601 (213) 877-3550\n\nINFORMATION RETRIEVAL NUMBER 3\n\nElectronic Design 24, November 22, 1975\nNEWS\n23 News Scope\n29 Washington Report\n50 Instrument '75—a special issue featuring current trends in instrumentation. Topics covered include: microprocessors in instruments; computer and calculator-based instrumentation; the latest in LSI testers; what's new in function generators; instruments in the nonelectronics industry and new multifunction instruments. In addition, there are engineering management interviews with Bill Terry and Jack Lieberman of Hewlett-Packard and Henk Bodt of Philips Test & Measurement.\n\nTECHNOLOGY\n37 MICROPROCESSOR DESIGN\n112 Phase-meter specs can fool you, unless you consider the input signal before buying. First, know your application, then see how the meter responds.\n120 To test hybrid PC boards, with mixed analog and digital circuits, requires a versatile test system. The practical choice narrows down to four types.\n128 Test semiconductors automatically with a computer. With a precision interface, you can accurately force voltage or current and measure response.\n134 Avoid I^2D0 measurements and you will lighten your test load. But if you must measure this vague transistor parameter, here's how to do it faster.\n138 Take oddball pulses in stride. A new method, the pulse-width synthesizer, lets you accurately measure the widths of unpredictably shaped pulses.\n146 Ideas for Design:\nFET analog-switch circuit provides 63-dB on-off ratio. Capacitor drops voltage with little heat for low-cost, low-voltage power supply. Crystal control of a one-shot ensures accurate pulse-width output.\n\nPRODUCTS\n162 Modules & Subassemblies: Deglitching modules attenuate spikes on current-output d/a's by over 70 dB.\n171 Data Processing: Full APL computer delivers mainframe power in mini size.\n174 Data Processing: OEM mini line offers core or MOS memory.\n186 Power Sources: Modular sources carry high-MTBF label.\n178 Discrete Semiconductors\n190 Components\n196 Packaging & Materials\n\nDEPARTMENTS\n109 Editorial: The politicians\n7 Across the Desk\n209 Evaluation Samples\n210 New Literature\n214 Bulletin Board\n214 Vendors Report\n220 Advertisers' Index\n222 Product Index\n224 Information Retrieval Card\nYou can go into production of higher density memory systems confidently now that Intel's new 2104 16-pin, 4096-bit dynamic RAM is in stock at Intel distributors, and readily available in OEM quantities.\n\nWe are mass producing the 2104 on the same fabrication lines and with the same silicon gate n-channel MOS process as the industry standard 2107B 22-pin 4K RAM.\n\nIntel's 16-pin RAM assures you fast, reliable parts as well as delivery in volume. The Intel 2104 is based on the proven single-transistor cell design of the Intel 2107B, the highest performance 22-pin 4K MOS RAM. Like the 2107B, the 2104 chip is much smaller than other 4K RAM chips produced today.\n\nThe fastest available 16-pin 4K RAMs are also in the 2104 series. Our 2104-2 guarantees an access time of only 250 nanoseconds and a cycle time of 375 nanoseconds over the full 0 to 70°C operating temperature range.\n\nTo keep system costs low, the 2104 operates on standard -5, +5 and +12V power supplies, and TTL I/O levels. All inputs including clock\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
INTEL'S STANDARD 4K RAM FAMILYMax. Access Time (ns), 0-70°CMin. Cycle Time (ns), 0-70°C
Part NumberPinsRead or write
D2104-216250
D2104-416300
D210416350
2107B22200
2107B-222220
2107B-422270
2107B-622350
\ninputs are fully TTL compatible.\n\nOverall system advantages of the 2104 are detailed in a new application brief, \"Which Way for 4K... 16, 18, or 22 Pin?\" It explains why the 16-pin 2104 is best for very compact systems such as minicomputers, microcomputers, terminals, business equipment, scientific calculators and anywhere high density is needed.\n\nMoreover, we show how the 16-pin standard is compatible with the next generation of even higher density memories. The application brief also tells why the 2107B's simple, straightforward 22-pin design has become an industry standard for computer main memories and many other applications.\n\nNow the industry has two standard configurations—16 pins with multiplexed addresses and 22 pins with parallel addresses. Whichever way you go, you'll find Intel ready to support both in volume production. For delivery of the 2104 or 2107B contact our franchised distributors: Almac/Stroum, Component Specialties, Cramer, Elmar, Hamilton/Avnet, Industrial Components, Liberty, Pioneer, Sheridan or L.A. Varah.\n\nFor your copy of \"Which Way for 4K...\" or data sheets on any of our 4K RAMs write: Intel Corporation, 3065 Bowers Avenue, Santa Clara, California 95051.\n\nintel delivers.\nTry this with a CRT or a digital display\n\nWhen it comes to displaying complete messages and graphics you just can't beat Shelly Multi-Message Modules.\n\nThink of them as tiny, random access, electronically-controlled slide projectors displaying characters 0.5\" or 0.7\" high.\n\nEach module can instantly display any of 12, 24 or 64 digitally selectable messages. In black & white or any combination of colors.\n\nUnlike CRT's and digital displays, you're not limited to alphanumerics either. With Shelly's versatile film chip you can display letters, numbers, words, complete messages (up to 5 lines), charts, graphs, photographs. You name it! And simultaneous illumination of up to 3 projectors within a module makes it possible to overlay additional words, symbols, numerals or colors to vary the meaning of a message.\n\nApplications are mind-boggling. Here's just a few. Teaching machines, aircraft cockpits, automobile dashboards, elevators, industrial control systems, electronic games, hospitals, security systems, point of sale terminals. The list is endless.\n\nWithout a doubt, when it comes to displaying a number of preselected messages, Shelly Multi-Message Modules provide the maximum in versatility at a minimum price.\n\nCall Shelly today.\n\nshelly associates\nA Subsidiary of Datatron, Inc.\n1562 REYNOLDS AVENUE, SANTA ANA, CALIFORNIA 92705\nPHONE (714) 549-3414 TWX 910-595-1859\nINDICATORS • MULTI MESSAGE DISPLAYS • FIBER OPTICS • ANNUNCIATORS\n\nSr. Vice President, Publisher\nPeter Coley\n\nEditors\nEditorial Offices\n50 Essex St.\nRochelle Park, NJ 07662\n(201) 843-0550\nTWX: 710-990 5071\nCable: Haydenpubs Rochellepark\n\nEditor-in-Chief George Rostky\nManaging Editors:\nRalph Dobriner\nMichael Elphick\n\nAssociate Editors:\nDave Bursky\nJules H. Gilder\nMorris Grossman\nJohn F. Mason\nStanley Runyon\nEdward A. Torrero\n\nContributing Editors:\nPeter N. Budzilovich\nAlberto Socolovsky\nNathan Sussman\n\nEditorial Field Offices\nEast\nJim McDermett, Eastern Editor\nP.O. Box 272\nEasthampton", "num_tokens": 2048} {"category": "olmocr_science_pdfs-electronics_and_hardware-part2", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-electronics_and_hardware-part2/part-00-00000.npy", "text": "5, where causing the silent mode to be overridden comprises:\nchanging a setting of the user device based on receiving the first message including the first prompt,\nthe setting relating to the silent mode; and\nwhere providing the first alert and the second alert comprises:\nproviding the first alert and the second alert based on changing the setting of the user device.\n\n18. The method of claim 15, where providing the first alert and the second alert comprises:\nproviding an audible alert by playing an audio file; and\nproviding a visual alert by running an application,\nthe application activating a light emitting diode associated with the user device.\n19. The method of claim 15, where the first message includes the text of the first prompt and additional text.\n20. (canceled)\n21. The user device of claim 1, where the first alert is audible and the second alert is visual.\n22. The user device of claim 1, where the one or more processors are further to:\n determine that a peripheral device is connected to the user device; and\n where the one or more processors, when providing the first alert and the second alert, are to:\n provide the first alert and the second alert based on determining that the peripheral device is connected\n to the user device.\n23. The non-transitory computer-readable medium of claim 8, where the first alert is audible and the second alert\nis visual.\n24. The method of claim 15, where the first alert is audible and the second alert is visual.\n25. The method of claim 15, further comprising:\n determining that a peripheral device is connected to the user device; and\n where providing the first alert and the second alert comprises:\n providing the first alert and the second alert based on determining that the peripheral device is connected\n to the user device.\n\n* * * * *<|endoftext|>Cisco Catalyst 3850 Series and Cisco Catalyst 3650 Series Switches Best Practices Guide\n\nFirst Published: November 30, 2015\nLast Updated: December 14, 2015\n\nCisco Systems, Inc.\nwww.cisco.com\n\nCisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco website at www.cisco.com/go/offices.\nPreface vii\n\nAudience iii-vii\n\nConventions vii\n\nObtaining Documentation and Submitting a Service Request viii\n\nEase of Deployment 1-1\n\nPurpose 1-1\n\nConfiguration Tool 1-2\n\nCatalyst Switch Configuration Best Practices 1-2\n\nLAN Access Switch Topology 1-4\n\nSwitch Address Plan 1-5\n\nInitial Switch Configuration 2-7\n\nPurpose 2-7\n\nPrerequisites 2-7\n\nIdentify Configuration Values 2-8\n\nAssign Initial Management Information 2-8\n\nConfigure the Hostname for Switch Identification 2-9\n\nConfigure Secure HTTPS and Secure Shell for Secure LAN Management 2-9\n\nConfigure SNMP for Remote Management 2-10\n\nConfigure Local Login and Password for Switch Access 2-10\n\nConfigure Centralized User Authentication Through TACACS+ 2-10\n\nAssign an IP Address to the Switch 2-11\n\nConfigure the Management IP Address on an Out-of-Band Interface 2-12\n\nConfigure the Management IP Address on an In-Band Interface 2-14\n\nCreate a Management VLAN in Hardware 2-15\n\nVerify Basic Switch Configuration 2-17\n\nShow Running Configuration for Initial Management Information 2-17\n\nSwitch Stack Update 3-21\n\nPurpose 3-21\n\nPrerequisites 3-21\n\nIdentify Configuration Values 3-22\nLAN Access Switch Topology with Configured FTP Server 3-22\nPerforming the Stack Update 3-23\n Obtain the Switch Software Image 3-23\n Check the Software Version on the Stack Members 3-23\n Configure the Switch to Run in Install Mode 3-24\n Download the Switch Image from Cisco.com to a FTP Server 3-25\n Update the Switch Stack Image 3-27\n Enable Switch Image Auto-Upgrade 3-27\n Verify that Stack Members Are Running the Same Software Image 3-28\n\nGlobal System Configuration 4-29\nPurpose 4-29\nPrerequisites 4-29\nIdentify Configuration Values 4-29\nAssign Global Configuration Information 4-30\n Configure High Availability on the Switch Stack 4-31\n Configure VTP Transparent Mode 4-31\n Enable Rapid Per-VLAN Spanning Tree 4-32\n Configure BPDU Guard for Spanning-Tree PortFast Interfaces 4-32\n Configure ULDL to Detect Link Failure 4-33\n Configure an Access List to Limit Switch Access 4-33\n Configure System Clock and Console Timestamps 4-34\n Configure DHCP Snooping Security Features 4-34\n Configure ARP Inspection 4-34\n Configure EtherChannel Load Balancing 4-35\n Create Access Layer VLANs 4-35\n Create IPv6 First Hop Security Policies 4-35\n Increase the TFTP Block Size 4-36\n Enable New Members to Automatically Update to the Switch Stack Image 4-36\n Verify Global Switch Configuration 4-37\nShow Running Configuration For Global Management Information 4-37\n\nUplink Interface Connectivity 5-41\nPurpose 5-41\nPrerequisites 5-41\nRestrictions 5-41\nIdentify Configuration Values 5-42\nLAN Access Switch Topology with Uplinks to a Distribution Switch or Distribution Router 5-43\nConfigure Uplink Interface Connectivity 5-44\nPreface\n\nAudience\n\nThis document is written for managing the Cisco Catalyst 3850 Series Switches and the Cisco 3650 Series switches and switch stacks in their network. A basic understanding of Ethernet networking is expected. Cisco Certified Network Associate level (CCNA) knowledge is helpful, but not required.\n\nConventions\n\nThis document uses the following conventions:\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
ConventionIndication
italic blue fontExample configuration values that are replaced with reader values.
bold fontCommands and keywords and user-entered CLI appear in bold font.
italic fontDocument titles, new or emphasized terms, and arguments for which you supply values are in italic font.
[ ]• Default responses to system prompts are in square brackets.
• Elements in square brackets are optional.
{xy
[xy
stringA nonquoted set of characters. Do not use quotation marks around the string, or the string will include the quotation marks.
courier fontTerminal sessions and information the system displays appear in courier font.
< >Nonprinting characters such as passwords are in angle brackets.
!, #An exclamation point (!) or a pound sign (#) at the beginning of a line of code indicates a comment line.
\n\nNote\n\nMeans reader take note. Notes contain helpful suggestions or references to material that is not covered in the manual.\nThe tips information might not be troubleshooting or even an action, but could be useful information, similar to a Timesaver.\n\nYou can save time by performing the action described in the paragraph.\n\nObtaining Documentation and Submitting a Service Request\n\nFor information on obtaining documentation, using the Cisco Bug Search Tool (BST), submitting a service request, and gathering additional information, see What’s New in Cisco Product Documentation at: http://www.cisco.com/c/en/us/td/docs/general/whatsnew/whatsnew.html.\n\nSubscribe to What’s New in Cisco Product Documentation, which lists all new and revised Cisco technical documentation as an RSS feed and deliver content directly to your desktop using a reader application. The RSS feeds are a free service.\nEase of Deployment\n\nThis document describes best practices for deploying your Cisco Catalyst 3850 Series and Cisco Catalyst 3650 Series switches.\n\nNote\n\nUnless otherwise noted, the term switch refers to a standalone Catalyst 3850 switch, a Catalyst 3650 switch, or a switch stack.\n\nA Cisco switch deployment best practice is a preferred configuration method to employ on your Catalyst switches. It is a proven and tested way to improve network security, performance, and availability.\n\nA best practice configuration includes an explanation of why you should perform a given task and a sample snapshot of a full running configuration that you can extrapolate for your specific scenario.\n\nTip\n\nUse the configuration recommendations in this document as a template for your switch deployments.\n\nNote\n\nMany", "num_tokens": 2048} {"category": "olmocr_science_pdfs-electronics_and_hardware-part2", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-electronics_and_hardware-part2/part-00-00000.npy", "text": ", blue\n gray scale data to the plurality of data lines;\n a direct current to direct current (DC-DC) converter for\n outputting a DC voltage for carrying out a bend transition\n on the OCB liquid crystal;\n a switch for selecting the output voltage of the DC-DC\n converter and a common voltage and transferring the\n voltages to the common electrode;\n a light source controller for controlling red, green, and\n blue light emitting diodes to sequentially emit light to\n the liquid crystal display panel; and\n a timing controller for controlling operations of the scan\n driver, the source driver, the switch, and the light\n source controller,\nwherein one frame is divided into red, green, and blue\nfields and the switch applies the output voltage of the\nDC-DC converter to the common electrode before a\nstart of each field to reset the OCB liquid crystal.\n10. The LCD of claim 9, wherein the output voltage of the\n DC-DC converter is 15V to 30V.\n11. The LCD of claim 9, wherein the source driver does\n not apply the red, green, and blue gray scale data when the\n switch selects the output voltage of the DC-DC converter.\n12. The LCD of claim 9, wherein the OCB liquid crystal\n has an optical transmittance of zero when the OCB liquid\n crystal is reset.\n13. The LCD of claim 9, wherein each pixel comprises:\n a switching transistor for transferring the red, green, and\n blue gray scale data transferred via the data lines to the\n pixel electrode in response to the scan signal of the scan\n lines; and\n a storage capacitor for storing the gray scale data.\n14. A liquid crystal display device (LCD), comprising:\n a liquid crystal display panel having a plurality of pixels,\n each pixel being positioned at each intersection\n between a plurality of scan lines and a plurality of data\n lines and including a liquid crystal capacitor composed\n of a common electrode, a pixel electrode, and an\n optically compensated birefringence (OCB) liquid\n crystal;\n a scan driver for applying a scan signal to the plurality of\n scan lines;\n a source driver for applying gray scale data to the plurality\n of data lines;\n a direct current to direct current (DC-DC) converter for\n outputting a DC voltage for carrying out a bend transition\n on the OCB liquid crystal;\n a switch for selecting the output voltage of the DC-DC\n converter and a common voltage and transferring the\n voltages to the common electrode;\n a light source controller for controlling a backlight for\n emitting light to the liquid crystal display panel; and\n a timing controller for controlling operations of the scan\n driver, the source driver, the switch, and the light\n source controller,\nwherein the switch applies the output voltage of the\nDC-DC converter to the common electrode to reset the\nOCB liquid crystal before the gray scale data are\napplied to the plurality of pixels.\n15. The LCD of claim 14, wherein the output voltage of the\n DC-DC converter is 15V to 30V.\n16. The LCD of claim 14, wherein the source driver does not\n apply the gray scale data when the switch selects the\n output voltage of the DC-DC converter.\n17. The LCD of claim 14, wherein the OCB liquid crystal\n has an optical transmittance of zero when the OCB liquid\n crystal is reset.\n18. The LCD of claim 14, wherein the backlight comprises\n one of a white light emitting diode (LED) and a cold\n cathode fluorescence lamp (CCFL) which emits white light.\n19. The LCD of claim 18, further comprising red, green, and\n blue color filters positioned on the common electrode of\n the plurality of pixels for filtering light emitted from the\n backlight.\n20. The LCD of claim 14, wherein each pixel includes:\n a switching transistor for transferring the gray scale data\n transferred via the data lines to the pixel electrode in\n response to the scan signal of the scan lines; and\n a storage capacitor for storing the gray scale data.\n21. A method of driving a liquid crystal display device\n (LCD) including a plurality of pixels having an optically\n compensated birefringence (OCB) liquid crystal positioned\n between a common electrode to which a common voltage is\n applied and a pixel electrode to which gray scale data are\n applied, a direct current to direct current (DC-DC) converter\n outputting a voltage for carrying out a bend transition on\n the OCB liquid crystal at a fast speed, and a backlight outputting\n light to the plurality of pixels, the method comprising:\n (a) applying a voltage to the OCB liquid crystal from the\n DC-DC converter to carry out the bend transition on the\n OCB liquid crystal at an initial start of the LCD;\n (b) applying the gray scale data of a frame to the pixel\n electrode in the frame;\n (c) applying a voltage to the common electrode from the\n DC-DC converter to reset the OCB liquid crystal after\n the step (b);\n (d) applying the gray scale data of a second frame to the\n pixel electrode in the second frame; and\n (e) repeating the steps (b) to (d).\n22. The method of claim 21, wherein the output voltage of the DC-DC converter is 15V to 30V.\n\n23. The method of claim 21, wherein the gray scale data are not applied in the step (c).\n\n24. The method of claim 21, wherein the OCB liquid crystal has an optical transmittance of zero when the OCB liquid crystal is reset.\n\n25. The method of claim 21, wherein the backlight emits light during the steps (b) to (d).\n\n26. The method of claim 21, wherein the backlight comprises a red light emitting diode (LED), a green LED, and a blue LED which sequentially emit red, green, and blue light.\n\n27. The method of claim 21, wherein the backlight comprises one of a white light emitting diode (LED) and a cold cathode fluorescence lamp (CCFL) which emits white light.\n\n28. The method of claim 27, further comprising red, green, and blue color filters positioned on the common electrode of the plurality of pixels and filtering light emitted from the backlight.\n\n29. A method of driving a liquid crystal display device (LCD) including a plurality of pixels having an optically compensated birefringence (OCB) liquid crystal positioned between a common electrode to which a common voltage is applied and a pixel electrode to which red, green, and blue gray scale data are sequentially applied, a direct current to direct current (DC-DC) converter outputting a voltage for carrying out a bend transition on the OCB liquid crystal at a fast speed, and a backlight having red, green, and blue light sequentially transmitted to each of the pixels, the method comprising:\n\n (a) applying a voltage to the OCB liquid crystal from the DC-DC converter to carry out a bend transition on the OCB liquid crystal at an initial start of the LCD;\n\n (b) dividing one frame into red, green, and blue fields, and applying the red gray scale data to the pixel electrode in the red field;\n\n (c) applying a voltage to the common electrode from the DC-DC converter to reset the OCB liquid crystal after the step (b);\n\n (d) applying the green gray scale data to the pixel electrode in the green field;\n\n (e) applying a voltage to the common electrode from the DC-DC converter to reset the OCB liquid crystal after the step (d);\n\n (f) applying the blue gray scale data to the pixel electrode in the blue field;\n\n (g) applying a voltage to the common electrode from the DC-DC converter to reset the OCB liquid crystal after the step (f); and\n\n (h) repeating the steps (b) to (g).\n\n30. The method of claim 29, wherein the output voltage of the DC-DC converter is 15V to 30V.\n\n31. The method of claim 29, wherein the red, green, and blue gray scale data are not applied in the steps (c), (e), and (f).\n\n32. The method of claim 29, wherein the OCB liquid crystal has an optical transmittance of zero when the OCB liquid crystal is reset.\n\n33. The method of claim 29, wherein the backlight emits light during the steps (b) to (h).\n\n34. The method of claim 29, wherein the backlight comprises a red light emitting diode (LED), a green LED, and a blue LED which sequentially emit red, green, and blue light.\n\n35. A method of driving a liquid crystal display device (LCD) including a plurality of pixels having an optically compensated birefringence (OCB) liquid crystal positioned between a common electrode to which a common voltage is applied and a pixel electrode to which gray scale data are applied, a direct current to direct current (DC-DC) converter outputting a voltage for carrying out a bend transition on the OCB liquid crystal at a fast speed, and a backlight outputting light to the plurality", "num_tokens": 2048} {"category": "olmocr_science_pdfs-electronics_and_hardware-part2", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-electronics_and_hardware-part2/part-00-00000.npy", "text": " address has been written to. The second circuitry group 202 further carries out the function of disabling the outputting of a delayed cue signal if the read address has not been written to. The second circuitry group 202 can include a comparator 42, a flip flop 56, and a gate circuit 60. In the embodiment shown in the figure, the memory output signal 54 is initially gated or blocked by gate 60. Once the read address 34 exceeds the delay value 38, the comparator output 44 and the latched comparator value 58 go high, thereby enabling the gate 60 to produce the gated cue signal 62. A logic circuit 64 can then be employed to condition the gated cue delay 62 to produce a delayed cue signal 66. In an alternate embodiment, the second circuitry group can disable the reading from the memory element 51 if the read address has not been written to, rather than gating the output of the memory element 51 to disable the outputting of a delayed cue signal.\nThe cue delay circuit further includes a sequence circuit. The sequence circuit controls the timing associated with reading and writing from the memory element 51 and with the timing associated with the first and second circuitry groups 200 and 202. The sequence circuit can include a state machine 20, a binary counter, a shift register, a microcontroller, a monostable delay circuit, or combinations thereof.\n\nFIG. 2 depicts a schematic for a method of using the embodied integrated circuit in an ink jet printing system. The method begins by sending a start pulse to initialize a state machine (Step 100). The initializing step entails clearing the counter, a flip flop, and a logic circuit. The counter is cleared and a read address is set to zero. The flip flop is cleared to set a latch comparator output to zero. The logic circuit is cleared to set the delayed cue signal to zero. Concurrently, a cue delay value and the read address from the counter are input to an adder to generate a write address (Step 102). The write address is supplied to a multiplexer along with the read address from the counter.\n\nThe methods continue by inputting a first buffered control signal from the state machine to a counter in order to increment a read address by one (Step 104). The read address is then input into the comparator and a multiplexer (Step 106). While inputting the cue delay value to the adder, the cue delay value is input to a comparator to set the comparator output to a logic high value if the read address is greater than the cue delay value (Step 108).\n\nA second buffered control signal from the state machine causes the multiplexer to provide the write address to a memory element. The second buffered control signal provides a multiplexer output that is equal the value of the write address (Step 110). The comparator output is latched using a gate circuit (Step 112). A tachometer input is entered into the state machine (Step 114).\n\nThe next steps in the methods entail inputting a cue signal to a memory element and inputting a third buffered control signal from the state machine to the memory element (Step 116). The third buffered control signal causes the current state of the cue signal to be written to the address of the memory element and causes the current state of the cue signal to correspond to the write address received from the multiplexer. The second buffered control signal from the state machine works in conjunction with the third buffered control signal to cause the output of the multiplexer to equal the value of the read address (Step 118).\n\nThe memory output is sent to the gate circuit (Step 120) and the gated cue signal is passed to a logic circuit if the latched comparator output is set to logic high (Step 122). A fourth buffered control signal from the state machine enables the logic circuit to latch the gated cue signal to form the delayed cue signal (Step 124). The delayed cue signal is then transmitted to the ink jet printing system (Step 126).\n\nThe steps following the initializing step are repeated until a new start pulse is received by the state machine (Step 128).\n\nIn an alternative embodiment, the methods include a step of pulsing one or more buffered control signals.\n\nIn still another embodiment, the methods can optionally include the step of employing a cue pulse conditioner to latch the cue signal until the cue signal can be written to the memory element. If a cue pulse conditioner is used, a start pulse can be used to initialize a cue pulse conditioning circuit.\n\nThe embodiments have been described in detail with particular reference to certain preferred embodiments thereof, but it will be understood that variations and modifications can be effected within the scope of the embodiments, especially to those skilled in the art.\n6. The method of claim 1, wherein the read address, the write address or combination thereof is incremented by a value of one for each additional tachometer input.\n\n7. The method of claim 6, wherein the write address is greater than or equal to the read address.\n\n8. The method of claim 1, wherein the read address, the write address or combination thereof is decremented by a value of one for each additional tachometer input.\n\n9. The method of claim 8, wherein the write address is less than or equal to the read address.\n\n10. The method of claim 1, further comprising the step of retrieving a cue delay value prior to writing the cue signal to the write address.\n\n11. The method of claim 1, wherein the memory element is selected from the group consisting of a random access memory (RAM), a first in-first out memory (FIFO), a first in-last out memory (LIPO), a circular buffer, a register in an FPGA, and combinations thereof.\n\n12. The method of claim 1, wherein prior to the step of receiving the tachometer input, the read address, the write address, or combination thereof, the read address, the write address, or combination thereof is set to a default value.\n\n13. The method of claim 12, wherein the default value is zero.\n\n14. A cue delay circuit for a digital printing system, wherein the cue delay circuit comprises:\n a. a memory element;\n b. a first circuitry group adapted to create a write address and a read address for the memory element, respectively;\n c. a sequence circuit adapted to control a timing associated with reading and writing of the read address and the write address of the memory element; and\n d. a second circuitry group adapted to verify that the read address of the memory element has been written to.\n\n15. The cue delay circuit of claim 14, wherein the first circuitry group comprises:\n a. an adder adapted to create a difference between the write address and the read address;\n b. a multiplexer adapted to switch between the read address and the write address; and\n c. a counter.\n\n16. The cue delay circuit of claim 14, wherein the sequence circuit is a member of the group consisting of a state machine, a binary counter, a shift register, a microcontroller, a monostable delay circuit, and combinations thereof.\n\n17. The cue delay circuit of claim 14, wherein the second circuitry group comprises a comparator, a flip flop, and a gate circuit.\n\n* * * * *<|endoftext|>Signal Boosters\n\n1 Purpose\nImplement an engagement procedure with specific guidelines for CFW Fort Worth Regional Radio System (FWRRS) customers to request approval to procure, install and operate signal boosters.\n\n2 Scope\nThis policy applies to internal and external agencies that utilize the CFW Fort Worth Regional Radio System network for primary communications and require enhanced radio communications in specific use cases that may be achieved by the installation of signal boosters. Signal boosters are also commonly referred to as bidirectional amplifiers or signal amplifiers.\n\nExternal agencies that are not FCC license holders must obtain documented consent by the City of Fort Worth if their signal booster operates on the FWRRS network. This stipulation is a requirement of the FCC Report and Order referenced in section 3.\n\n3 References\nFCC 13-21A1 Report and Order\n\n4 Conditions for Exemption\nExceptions to the policy must be approved by the Senior Manager over Wireless Communications.\n\n5 Justification\nPublic safety entities that operate private land mobile radio (PLMR) and public safety radio services provide mission critical and emergency response radio communications services to their customers. Because Part 90 channels are interleaved, PLMR licenses are sometimes not adjacent and create unique design and interference considerations. As such, the FCC has defined a specific class of industrial signal boosters with regulatory considerations as defined in the Report and Order referenced in section 3.\nIt is critical that signal boosters installed for improved or additional radio coverage in specific facilities meet FCC and industry standard specifications for optimal performance and functionality. Signal boosters must not introduce interference or introduce adverse coverage effects to the FWRRS. Therefore, a policy is necessary to enforce their implementation and ongoing performance.\n\n6 Signal Boosters Implementation Procedures\n\nThe FCC Report and Order 13-21A1 establishes rules applicable to new and existing signal boosters, which are effective March 1, 2014.\n\nThe goal of the regulatory framework is to ensure signal boosters do not degrade the performance of Public Safety wireless networks and are designed to mitigate interference. Key points are summarized below, but are not all inclusive. Agencies operating and/or requesting signal boosters must comply with the FCC Report and Order referenced in section 3 and applicable FCC Part 90 rules in their entirety.\n\n- Signal boosters installed for Public Safety entities are considered industrial as defined by FCC part 90", "num_tokens": 2048} {"category": "olmocr_science_pdfs-electronics_and_hardware-part2", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-electronics_and_hardware-part2/part-00-00000.npy", "text": ">Action Command\n
Description
GoPro start recordingStarts capturing video
GoPro HiLightAdds a HiLight Tag to video during recording
That was sickAdds a HiLight Tag to video during recording
GoPro stop recordingStops capturing video
GoPro take a photoCaptures a single photo
GoPro shoot burstCaptures burst photos
GoPro start time lapseStarts capturing time lapse
GoPro stop time lapseStops capturing time lapse
GoPro turn offPowers off the camera
\n\nCONTROLLING YOUR GOPRO WITH YOUR VOICE\n\nFor the most updated list of commands, visit gopro.com/yourhero5.\n\n**PRO TIP:** If you are recording video or time lapse, you must stop recording before issuing a new command.\n\nCHANGING YOUR VOICE CONTROL LANGUAGE\n1. From the main screen, swipe down.\n2. Tap Preferences > Language (in the Voice Control section).\n3. Tap a language.\nYou can play back your content on the camera’s touch display, your computer, TV, or smartphone/tablet.\n\nYou can also play back content by inserting the microSD card directly into a device, such as a computer or compatible TV. With this method, playback resolution depends on the resolution of the device and its ability to play back that resolution.\n\nVIEWING VIDEOS AND PHOTOS ON YOUR HERO5 BLACK\n1. Swipe right to open the gallery. If your microSD card contains a lot of content, it might take a minute for it to load.\n2. Scroll through the thumbnails.\n *Note: For photo series (Burst, Time Lapse, Night Lapse and Continuous photos), the thumbnail displays the first photo in the series.*\n3. Tap a video or photo to open it in full-screen view.\n4. To add a HiLight Tag, tap \\[. HiLight Tags make it easy to find the best video and photos to share.\n5. To return to the thumbnails screen, tap \\[.\n6. To exit the gallery, swipe down.\n\nPLAYING BACK YOUR CONTENT\n\nCREATING SHORT CLIPS FROM A VIDEO\nVideo trimming lets you create short clips of your favorite shots from your video files. Clips are saved as new files that can be shared and used during editing in the Capture app or Quik for desktop.\n1. Swipe right to open the gallery, then tap the video that contains the clip that you want to save.\n2. Tap \\[ to begin playing the video.\n3. When you reach the point where you want to start clipping, tap \\[.\n4. Tap \\[. By default, the duration of the clip is 5 seconds.\n5. To save a longer clip, tap 5 SEC, then tap the length of the clip that you want (15 or 30 seconds).\n6. Tap the screen, then tap PREVIEW to review the clip before saving it.\n7. To adjust the starting point of the clip, tap -1. To adjust the ending point, tap +1.\n *Note: If you adjust the starting or ending points, the duration of the clip remains the same.*\n8. Tap \\[. The clip is saved as a separate video file and your original video file is unchanged.\n\nPRO TIP: After you create clips from a video, you can delete the original file to save space on your microSD card.\nPLAYING BACK YOUR CONTENT\n\nSAVING A VIDEO FRAME AS A STILL PHOTO\n1. Swipe right to open the gallery, then tap the video that contains the clip that you want to save.\n2. Tap [▶] to begin playing the video.\n3. When you reach the frame that you want to save, tap [▌].\n4. Tap [▌].\n5. If needed, slide the bar at the bottom of the screen to select the frame.\n6. Tap [✔]. The frame is saved as a photo and your original video file is unchanged.\n\nVIEWING VIDEOS AND PHOTOS ON A COMPUTER\nTo play back your video and photos on a computer, you must first transfer these files to a computer. For details, see Offloading Your Content (page 36).\n\nVIEWING CONTENT ON A MOBILE DEVICE\n1. Connect your camera to Capture. For details, see Connecting to the Capture App (page 35).\n2. Use the controls on the app to play back your footage on your smartphone/tablet.\n\nPRO TIP: While playing back your video with the Capture app, you can mark the best moments by tapping [▌] to add a HiLight Tag.\n\nUSING YOUR CAMERA WITH AN HDTV\n\nVIEWING VIDEOS AND PHOTOS ON AN HDTV\nPlaying back videos and photos on your HDTV lets you view your content directly from your camera on a large screen. This playback requires a micro HDMI cable (sold separately).\n\nNote: HDMI playback depends on the resolution of the device, and is certified up to 1080p.\n\n1. Power on the camera.\n2. Tap Preferences > HDMI Output > Media.\n3. Use a micro HDMI cable to connect the HDMI port on the camera to an HDTV.\n4. Select the HDMI input on your TV.\n5. Press the Mode button [▌] to move through the controls, then press the Shutter button [▌] to select the control. For example, to move through each thumbnail, press the Mode button to move to [▌], then press the Shutter button repeatedly to move through the files.\n6. To open a file in full-screen view, tap [▌].\n\nPRO TIP: When viewing your videos and photos on an HDTV, you can also navigate using gestures on the touch display.\nUSING YOUR CAMERA WITH AN HDTV\n\nCAPTURING VIDEO AND PHOTOS WHILE CONNECTED TO AN HDTV\nThis option lets you see the live preview from your camera when it is connected to an HDTV or monitor.\n\n1. Power on the camera.\n2. Tap Preferences > HDMI Output, then select one of these options:\n • To display your camera’s live preview with the icons from the touch display, tap Monitor.\n • To display your camera’s live preview on the HDTV without the icons or overlays that you see during recording on the camera’s touch display, tap Live.\n3. Use a micro HDMI cable to connect the HDMI port on the camera to an HDTV.\n4. Select the HDMI input on your TV.\n5. Use the Shutter button [ ] on the camera to start and stop recording.\n\nCONNECTING TO THE APP FOR THE FIRST TIME\nThe Capture app lets you control your camera remotely using a smartphone or tablet. Features include full camera control, live preview, playback and sharing of content, and camera software updates.\n\n1. Download Capture to your mobile device from the Apple © App Store © or Google Play ™.\n2. Follow the app’s on-screen instructions to connect your camera.\n\nCONNECTING TO THE APP IN THE FUTURE\nAfter connecting to the Capture app for the first time, you can connect in the future through the Connect menu on the camera.\n\n1. If your camera’s wireless is not already turned on, swipe down, then tap Connect > Wireless Connections.\n2. In the Capture app, follow the on-screen instructions to connect your camera.\nOFFLOADING YOUR CONTENT\n\nOFFLOADING YOUR CONTENT TO A COMPUTER\nTo play back your video and photos on a computer, you must first transfer these files to a computer. Transferring also frees up space on your microSD card for new content.\n\n1. Download and install Quik for desktop from gopro.com/apps.\n2. Connect the camera to your computer using the included USB-C cable.\n3. Power on the camera and follow the on-screen instructions in Quik.\n\nPRO TIP: To offload files to a computer using a card reader (sold separately) and your computer’s file explorer, connect the card reader to the computer, then insert the microSD card. You can then transfer files to your computer or delete selected files on your card. Note that you must use a card reader to offload RAW photos or RAW audio files.\n\nUPLOADING YOUR CONTENT TO THE CLOUD\nWith a subscription to GoPro Plus, you can upload your content to the cloud and then view, edit, and share it from any of your devices. From your mobile device, use the Quik™ app to edit content from the cloud and share it with your friends.\n\nNote: When you upload your content to the cloud, your original files remain on your camera.\n\n1. Subscribe to GoPro Plus:\n a. Download the Capture app to your mobile device from the Apple® App Store® or Google Play™.\n b. Follow the app’s on-screen instructions to connect your camera.\n c. If this is the first time you are connecting to the app, follow the on-screen instructions to subscribe to GoPro Plus. Otherwise, tap [ ] next to the image of your camera and follow the instructions.\n\n2. Connect your camera to a power outlet. When the battery is charged, automatic upload to the cloud begins.\n\n Note: Once you set up Auto Upload, you do not need to connect your camera to the Capture app to use this feature.\n\n The files in the cloud are optimized for the web, so might not be full resolution. To offload files in their full resolution", "num_tokens": 2048} {"category": "olmocr_science_pdfs-electronics_and_hardware-part2", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-electronics_and_hardware-part2/part-00-00000.npy", "text": ">E4991A\n\n\n\n\nCalibration\n\n\n\n\nTypes\nOpen\nOpen\n\n\n\nShort\nShort\n\n\n\nLoad\nLoad\n\n\n\nLow loss capacitor\nLow loss capacitor\n\n\nMeasurement points of calibration data\nFrequency and OSC level are fixed. Frequency and OSC level are set by users.\nFrequency and OSC level are fixed. Frequency is fixed and OSC level is set by users. Frequency and OSC level are set by users.\n\n\nCalibration kit\n7 mm User\n7 mm User\n\n\nDefinition of user calibration kit\nDefinition parameters\nDefinition parameters\n\n\n\nOpen\nG-C\n\n\n\nShort\nR-L\n\n\n\nLoad\nR-L\n\n\n\nR-X\nR-L\n\n\nSave function\nYes\nNo (User calibration kit setup is saved by saving Instrument setup.)\n\n\n\nNo\n\n\n\nCompensation\n\n\n\n\nTypes\nOpen\nOpen\n\n\n\nShort\nShort\n\n\n\nLoad\n\n\n\nMeasurement points of compensation data\nFrequency and OSC level are fixed. Frequency and OSC level are set by users.\nNo selection (Combined with setup of calibration data measurement points. Cannot be set independently.)\n\n\nDefinition of user compensation kit\nDefinition parameters\nDefinition parameters\n\n\n\nOpen\nG-C\n\n\n\nShort\nR-L\n\n\n\nLoad\nR-L\n\n\n\nR-L\nR-L\n\n\nSave function\nYes\nNo (User calibration kit setup is saved by saving Instrument setup.)\n\n\n\nNo\n\n\n\nPort extension compensation\nYes\nYes\n\n\nFixture selection (Electrical length compensation)\nSelectable fixtures\nSelectable fixtures\n\n\nCategory\n4291B\nE4991A\n\n\n--------------------------------\n--------------------------------------------\n--------------------------------------------\n\n\nSweep\n\n\n\n\nSweep time\nAutomatic/Manual\nAutomatic/Manual\n\n\nDelay\nPoint delay\nPoint delay\n\n\n\nSweep delay\nSweep delay\n\n\n\nSegment delay\nSegment delay\n\n\nMeasurement points\n2 to 801\n2 to 801\n\n\nCombination between channels\nCombined/Independent\nNo channel concept\n\n\nSweep parameter\nFrequency\nFrequency\n\n\n\nOSC level\nOSC level\n\n\n\nDC bias voltage (Option)\nDC bias voltage (Option)\n\n\n\nDC bias current (Option)\nDC bias current (Option)\n\n\nSweep type\nFor frequency sweep\n\n\n\n\nLinear\nLinear\n\n\n\nLog\nLog\n\n\n\nList\nList\n\n\n\nFor OSC level sweep\nLinear\n\n\n\nLinear\n(Sweep range can be set in dBm, so that\n\n\n\n\nsame function as Log sweep is available.)\n\n\n\nFor DC voltage/current sweep\nLinear\n\n\n\n\n\n\n\nSweep direction\nFor frequency sweep\nUp\n\n\n\nUp/Down\nUp/Down\n\n\n\nFor other sweeps\nUp/Down\n\n\n\n\n\n\n\nList sweep\nNumber of segments\n15\n\n\n\n16\n\n\n\nDisplay methods\nFrequency base (Linear format)\nFrequency base (Linear format)\n\n\n\nOrder base\nFrequency base (Log format)\n\n\n\nOrder base\nOrder base\n\n\nUnit setup\nFrequency\nHz\n\n\n\nSweep range\nHz\n\n\n\nFixed value\nHz\n\n\n\n\n\n\n\nOSC level\nSweep range\nV/A/dbm\n\n\n\nFixed value\nV/A/dbm\n\n\nDC bias\nSweep range\nV/A\n\n\n\nFixed value\nV/A\n\n\nTrigger\nSweep mode\nContinuous\n\n\n\nContinuous\nContinuous\n\n\n\nHold\nHold\n\n\n\nSingle\nSingle (Sweep averaging factor in case that\n\n\n\nNumber of groups\nit is on)\n\n\nTrigger source\nInternal\nInternal\n\n\n\nManual\nManual\n\n\n\nExternal\nExternal\n\n\n\nGPIB\nGPIB\n\n\nTrigger event mode\nOn point\nOn point\n\n\n\nOn sweep\nOn sweep\n\n\n\nOn segment\nOn segment\n\n\nPolarity of External trigger\nPositive\nPositive\n\n\n\nNegative\nNegative\n\n\n\n\n\nRating\nSymbol\nValue\nUnit\n\n\n\n\nSupply Voltage\n( V_{DD} )\n-0.3 to +7.0\nV\n\n\nInput Voltage\n( V_{in} )\n-0.3 to +7.0\nV\n\n\nOperating Temperature Range\n( T_A )\n0 to 70\n°C\n\n\nMC68302\n\n-40 to 85\n°C\n\n\nMC68302C\n\n\n\n\n\nStorage Temperature Range\n( T_{stg} )\n-55 to +150\n°C\n\n\n\n\nThis device contains circuitry to protect the inputs against damage due to high static voltages or electric fields; however, it is advised that normal precautions be taken to avoid application of any voltage higher than maximum-rated voltages to this high-impedance circuit. Reliability of operation is enhanced if unused inputs are tied to an appropriate logic voltage level (e.g., either GND or \\( V_{DD} \\)).\n\n6.2 THERMAL CHARACTERISTICS\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
CharacteristicSymbolValueUnit
Thermal Resistance for PGA( \\theta_{JA} )25°C/W
( \\theta_{JC} )2°C/W
Thermal Resistance for CQFP( \\theta_{JA} )40°C/W
( \\theta_{JC} )15°C/W
Thermal Resistance for PQFP( \\theta_{JA} )42°C/W
( \\theta_{JC} )20°C/W
\n\n\\[ T_J = T_A + (P_D \\cdot \\theta_{JA}) \\]\n\n\\[ P_D = (V_{DD} \\cdot I_{DD}) + P_{I/O} \\]\n\nwhere:\n\n\\( P_{I/O} \\) is the power dissipation on pins.\n\nFor \\( T_A = 70°C \\) and \\( P_{I/O} = 0 \\ W, 16.67 \\ MHz, 5.5 \\ V, \\)\n\nand CQFP package, the worst case value of \\( T_J \\) is:\n\n\\[ T_J = 70°C + (5.5 \\ V \\cdot 130 \\ mA \\cdot 40°C/W) = 98.6°C \\]\n6.3 POWER CONSIDERATIONS\n\nThe average chip-junction temperature, $T_J$, in °C can be obtained from:\n\n$$T_J = T_A + (P_D \\cdot \\theta_{JA})$$ \\hspace{1cm} (1)\n\nwhere:\n\n- $T_A$ = Ambient Temperature, °C\n- $\\theta_{JA}$ = Package Thermal Resistance, Junction-to-Ambient, °C/W\n- $P_D = P_{INT} + P_{I/O}$\n- $P_{INT} = I_{DD} \\times V_{DD}$, Watts — Chip Internal Power\n- $P_{I/O}$ = Power Dissipation on Input and Output Pins — User Determined\n\nFor most applications $P_{I/O} < 0.3 \\cdot P_{INT}$ and can be neglected.\n\nIf $P_{I/O}$ is neglected, an approximate relationship between $P_D$ and $T_J$ is:\n\n$$P_D = K + (T_J + 273°C)$$ \\hspace{1cm} (2)\n\nSolving equations (1) and (2) for $K$ gives:\n\n$$K = P_D \\cdot (T_A + 273°C) + \\theta_{JA} \\cdot P_D^2$$ \\hspace{1cm} (3)\n\nwhere $K$ is a constant pertaining to the particular part. $K$ can be determined from equation (3) by measuring $P_D$ (at equilibrium) for a known $T_A$. Using this value of $K$, the values of $P_D$ and $T_J$ can be obtained by solving equations (1) and (2) iteratively for any value of $T_A$. \n\n### 6.4 POWER DISSIPATION\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n Fan is defective \n> Fan is blocked \nNo light \n> Lamp is broken \n> Electronics defective \n> Fuse for halogen transformer is defective \nLED at the activation button glows orange instead of green \n> 90% of the manufacturer stated halogen lamp duration is reached.\nGreen control light at mains switch does not glow, device does not work \n> AC power line not connected \n> Device fuse is defective\nGreen control light at mains switch glows, but device does not work \n> AC power line defective \n> AC power line fuse defective\n**Foot switch**\nNo switch of light port when using the foot switch \n> foot switch not or not correctly connected \n> foot switch defective \n> Just one light port available\n**Microscope**\nNo activation / deactivation of microscope light port via microscope column \n> Cable of switching contact is not or not correctly connected \n> Switching contact in microscope column is defective / misaligned\n## Accessories\n\n### Accessories for halogen coldlight source\n- Adapter sleeve for Storz connection 507.0940.5\n- Adapter sleeve for Olympus connection 507.0940.6\n- Adapter sleeve for Pentax connection 507.0940.7\n- Adapter sleeve for Wolf connection 507.0940.8\n\n### Accessories for LED light module\n- **LED light source ATMOS LS 21 LED** 507.4600.0\n LED light source for direct connection to endoscopes and laryngoscopes with high performance white light LED, 2 Watt / 50 Lumen, LED service life approx. 50.000 h, Connection with quick coupling to any desired scope.\n\n### Accessories for LED light sources\n- **Lithium-ionic rechargeable battery for the mobile use** 507.4510.0\n For ATMOS LED light source resp. LED headlight with power and eco mode, charging indication and holding clip, with power and eco display.\n\n- **Universal battery quick charging power supply unit (100-240 V)** 011.1199.0\n including multinational adapter plug\n\n### Accessories for endoscope management\n- **Shock protection adapter** 508.0777.5\n for endoscopes Ø2.8-4 mm, teflon element for metal quiver\n- **Fixation adapter for plastics quiver** 508.0782.0\n\n### Accessories for LED stroboscope\n- **Body sound stroboscope adapter** 507.4775.0\n### Technical specifications at complete equipment\n\nPlease note the technical specifications of the single devices in the separate operating instructions!\n\n
CharacteristicSymbolTypMaxUnit
Power Dissipation at 20 MHz (see Notes 1 and 2)PD93155mA
Power Dissipation at 16.67 MHz (see Notes 1, 2, and 3)PD77130mA
Power Dissipation at 8 MHz (see Notes 1 and 2)PD3765mA
Power Dissipation at 4 MHz (see Notes 1, 2 and 7)PDTBATBAmA
Low Power Mode Dissipation at 16.67 MHz (see Notes 1 and 4)LPD66mA
Lowest Power Mode Dissipation at 16.67 MHz (see Notes 1 and 5)LPD51mA
Low Power Mode Dissipation at 8 MHz (see Notes 1 and 4)LPD34mA
Lowest Power Mode Dissipation at 8 MHz (see Notes 1 and 5)LPD27mA
Low Power Mode Dissipation at 4 MHz (see Notes 1 and 4)LPDTBAmA
Lowest Power Mode Dissipation at 4 MHz (see Notes 1 and 5)LPDTBAmA
Lowest Power Mode Dissipation at 50 kHz (see Notes 1 and 6)LPD2mA
\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
SpecificationDetails
Voltage230 V~ ± 10 %; 50/60 Hz Special voltage: 100 V~ ± 10 %; 50/60 Hz 115 V~ ± 10 %; 60 Hz 127 V~ ± 10 %; 60 Hz
Power inputmax. 1.3 A (230 V~) max. 3.0 A (100 V~)
Power consumptionmax. 300 VA
Kind of connectionFixed connection
FusesT 6.3 A/H
Sonstige/SicherungseinrichtungInternal fuses on control circuit board and in transformer
Halogen cold light15 V, 150 W, 50 h life duration of lamps, removable adaptor system, Standard = Storz
Halogen cold light high performance24 V, 150 W, 300 h life duration of lamps, removable adaptor system, Standard = Storz
LED light moduleLED electric power supply 700 mA regulated
Removable adaptorOlympus, Wolf, Pentax
Endoscope managementFor rigid and flexible optics (max. length 500 mm), one quiver per clean and contaminated optics.
Inspection of disinfection timeTimer adjustable
Kind of operationContinuous operation
Protective earth conductor resistancemax. 0.2 Ω at fixed connection
Earth leakage currentmax. 5.0 mA at fixed connection
Ambient conditions
Transport/storage Operation-10...+50°C
+30...95 % air humidity without condensation at air pressure 500...1060 hPa
+10...+35°C
30...95 % air humidity without condensation at air pressure 700...1060 hPa
Dimensions88.5 x 41.2 x 54.0 cm
Weight15 - 30 kg
Regular safety relevant inspectionsafter 12 months. ATMOS recommends a yearly maintenance acc. to service instructions.
Protection class (EN 60601-1)I
Degree of protectionType BF
Protection categoryIP X0
Classification acc. to Annex IX EEC directions 93/42/ EECI
CE markingCE
Applied standardsEN 60 601-1 EN 60 601-1-2 EN 60 601-2-18
UMDNS-Code10-585 ENT treatment unit
GMDN-Code11585
Ident-Nr.531.0000.0 (230 V); 531.0001.0 (100 V); 531.0002.0 (115 V); 531.0003.0 (127 V)
\n\n**Accessories for halogen cold light source**\n- Adapter sleeve for Storz connection 507.0940.5\n- Adapter sleeve for Olympus connection 507.0940.6\n- Adapter sleeve for Pentax connection 507.0940.7\n- Adapter sleeve for Wolf connection 507.0940.8\n\n**Accessories for LED light module**\n- LED light source ATMOS LS 21 LED\n- LED light source for direct connection to endoscopes and laryngoscopes with high performance white light LED, 2 Watt / 50 Lumen, LED service life approx. 50.000 h, Connection with quick coupling to any desired scope.\n- 507.4600.0\n\n**Accessories for LED light sources**\n- Lithium-ionic rechargeable battery for the mobile use\n- For ATMOS LED light source resp. LED headlight with power and eco mode, charging indication and holding clip, with power and eco display.\n- 507.4510.0\n- Universal battery quick charging power supply unit (100-240 V) including multinational adapter plug 011.1199.0\n11.0 Disposal\n\n- The materials of the housing can be recycled completely.\n- The ATMOS S 61 Servant vision does not contain any hazardous goods.\n- The component parts of the ATMOS S 61 Servant vision must be disposed of correctly and the materials are to be separated carefully.\n12.1 Guidelines and Manufacturer’s Declaration - Emissions\n\nThe ATMOS", "num_tokens": 2048} {"category": "olmocr_science_pdfs-electronics_and_hardware-part2", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-electronics_and_hardware-part2/part-00-00000.npy", "text": " | Region | Contact Information |\n |-----------------------------|----------------------------------------------------------|\n | APC Headquarters (U.S. and Canada) | (1) (800) 800-4272 (toll free) |\n | Latin America | (1) (401) 789-5735 (United States) apctchla@apc.com |\n | Europe, Middle East, Africa | (353) (91) 702020 (Ireland) apceurtech@apc.com |\n | Japan | (03) 5434-2021 jsupport@apc.com |\n\n - Local, country-specific centers: go to [http://www.apc.com/support/contact](http://www.apc.com/support/contact) for contact information.\n\n- Contact the APC representative or other distributor from whom you purchased your APC product for information on how to obtain local customer support.<|endoftext|>## Lenovo Global Technology\n\nThinkSystem SR530\n(3.60 GHz, Intel Xeon Platinum 8156)\n\n### Software Availability\nAug-2017\n\n### Hardware\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
CPU NameIntel Xeon Platinum 8156
CPU CharacteristicsIntel Turbo Boost Technology up to 3.70 GHz
CPU MHz3600
FPUIntegrated
CPU(s) enabled8 cores, 2 chips, 4 cores/chip
CPU(s) orderable1.2 chips
Primary Cache32 KB I + 32 KB D on chip per core
Secondary Cache1 MB I+D on chip per core
\n\n### Operating System\nSUSE Linux Enterprise Server 12 SP2 (x86_64)\nKernel 4.4.21-69-default\n\n### Compiler\nC/C++: Version 17.0.0.098 of Intel C/C++ Compiler for Linux;\nFortran: Version 17.0.0.098 of Intel Fortran Compiler for Linux\n\n### Auto Parallel\nYes\n\n### File System\nbtrfs\n\n### System State\nRun level 3 (multi-user)\n\n---\n\n### SPECfp®2006 = 125\n\n### SPECfp_base2006 = 122\n\n---\n\n### CPU2006 license:\n9017\n\n### Test sponsor:\nLenovo Global Technology\n\n### Tested by:\nLenovo Global Technology\n\n### Test date:\nJul-2017\n\n### Hardware Availability:\nAug-2017\n\n### Software Availability:\nNov-2016\n\n---\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
BenchmarkScore
410.bwaves51.8
416.gamess49.3
433.milc72.9
434.zeusmp214
436.cactusADM68.9
437.leslie3d312
444.namd36.5
447.dealII70.8
450.soplex47.2
453.povray79.1
454.calculix76.3
459.GemsFDTD77.0
465.tonto68.7
470.lbm59.9
481.wrf99.4
482.sphinx389.6
\n\n---\n\n**Continued on next page**\n## Lenovo Global Technology\n\n### SPECsp2006 Result\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
Lenovo Global TechnologySPECfp2006 =125
ThinkSystem SR530 (3.60 GHz, Intel Xeon Platinum 8156)SPECfp_base2006 =122
\n\n**CPU2006 license:** 9017\n\n**Test sponsor:** Lenovo Global Technology\n\n**Tested by:** Lenovo Global Technology\n\n- **L3 Cache:** 16.5 MB I+D on chip per chip\n- **Other Cache:** None\n- **Memory:** 384 GB (12 x 32 GB 2Rx4 PC4-2666V-R)\n- **Disk Subsystem:** 1 x 800 GB SATA SSD\n- **Other Hardware:** None\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
Base Pointers:64-bit
Peak Pointers:32/64-bit
Other Software:None
\n\n**Test date:** Jul-2017\n\n**Hardware Availability:** Aug-2017\n\n**Software Availability:** Nov-2016\n\n### Results Table\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n", "num_tokens": 2048} {"category": "olmocr_science_pdfs-entertainment", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-entertainment/part-00-00000.npy", "text": " was adapted as its theme. Bernard Herrmann, CBS resident melodian, was assigned the score, and Dan Seymour was announcer. Houseman became the show's editor, and Paul Stewart was associate producer. Davidson Taylor was sent in to supervise for CBS.\n\nIt was a concentrated shot of talent for a 60-minute dramatic series. *The Mercury Theatre on the Air* opened July 11 with Bram Stoker's *Dracula*. Welles played two roles, Dr. Seward and Count Dracula; Gabel was Dr. Van Helsing, Coulouris was Jonathan Harker,\n\nWith the new fall season, The Mercury Theatre became a regular, moving on September 11 into an unenviable Sunday-night time slot opposite Edgar Bergen’s Chase & Sanborn Hour. Bergen then had America’s top-rated show, pulling in a Crossley-estimated 34.7 percent of the total audience. After seven broadcasts in its new Sunday slot, The Mercury Theatre was rated at 3.6 percent. But on Hallow-e’en eve, Welles and his group staged the ultimate in radio thrillers, a science fiction fantasy that sent people running into the streets in terror. That night a series of disjointed events went into motion that would make The War of the Worlds the most famous single radio show ever broadcast.\n\nFirst came basic dissatisfaction of the Mercury staff with the story. H. G. Wells’ fantasy about invaders from Mars who landed in England with their terrible mechanical fighting machines seemed highly futuristic when it was published in 1898. Forty years later, the Mercury staff fretted over its credibility. Writer Howard Koch phoned Houseman the Tuesday before the broadcast, distraught over the assignment. There was no way this ancient epic could be adapted effectively for modern radio.\n\nHouseman considered changing plays. Lorna Doone was available, but coming on the heels of several traditional classics, it seemed a dull alternative. Houseman phoned Welles, who was deep in rehearsal for the Mercury play, Danton’s Death. Welles wouldn’t come to the phone, so Houseman told Koch to go ahead with the script, and he—Houseman—would come over and help.\n\nBy the time Houseman had arrived, Koch had gotten his Martians down to earth and was spreading poisonous black smoke across the marshlands of New Jersey. The two men hammered at the script for almost 36 hours, finally wrapping it up on Wednesday night, four days before the broadcast.\n\nOn Thursday morning, the cast was assembled for the first rough rehearsal. The rehearsal was recorded and played back that night in Welles’ office. Everyone was despondent. As written and rehearsed, The War of the Worlds just didn’t make it. Somehow it had to be modernized, its newscast simulations heightened and intensified. Real names and details had to be added, to give the illusion of up-to-the-minute reality. Already the London setting of the novel had\nbecome Grover's Mill, New Jersey. Now narrative became news bulletin as the staff worked over the script through the night. Horrid present-tense reports of thousands killed, of poison gas spreading westward, of route instructions for getting out of town, were written in. More bulletins were added, of fires and of people crushed in the mad stampede away from the scene. \"Seven thousand armed men, pitted against the single fighting machine of the invaders from Mars—120 known survivors...\"\n\nFriday afternoon, the revised script was passed by the CBS censors, with few alterations. The Hotel Biltmore was changed to the Park Plaza; President Roosevelt was changed to the nameless \"secretary of the interior;\" a few other actual names were deleted. Welles still hadn't come to the studio by Saturday, so the afternoon rehearsal was done without him. Frank Readick, who played newsman-in-the-field Carl Phillips, had dug out the transcriptions of Herb Morrison's on-the-scene report of the Hindenburg crash at Lakehurst, New Jersey. Morrison's emotional broadcast, filled with weeping as scores of people died before him, became Readick's model in describing the horrors of the Martian heat ray.\n\nFor all purposes, The War of the Worlds was ready to air. Then Welles began to add his magic touches. Early news bulletins were dragged out and lengthened, over the objections of staff. The first orchestra number—\"La Cumparsita\" by the fictional Ramon Raquello and his Orchestra—was beefed up; a later number by \"Bobby Milette\" was also lengthened. Welles' theory was simple: \"The War of the Worlds\" would work by contrast. The slow passage of time early in the show would contribute to the illusion of reality; then the tempo would pick up dramatically, with the opening of the Martian cylinder, and would rush to climax with express-train speed.\n\nThey were exactly 12 minutes into the broadcast when things began happening. Precisely at that minute, Edgar Bergen brought out a singer on NBC, and an estimated 3 to 6 million listeners went dial-twisting. Most of them froze when they heard shrill news bulletins about something happening on Mars. Hitler's antics had the nation jumpy anyway; when reports of a warlike confrontation in eastern New Jersey began shaping up, few listeners changed the station.\n\nAs a result, they missed the full opening signature, which made clear that the Columbia Broadcasting System and its affiliated stations were presenting Orson Welles and The Mercury Theatre on the Air in The War of the Worlds, by H. G. Wells. What they did hear was \"Carl Phillips,\" giving an on-the-scene report of a cylinder of unknown origin hitting earth \"with almost earthquake force\" near Grover's Mill, New Jersey.\nLadies and gentlemen, this is the most terrifying thing I have ever witnessed—wait a minute! Someone's crawling out of the hollow top—someone or . . . something. I can see peering out of that black hole two luminous discs. Maybe eyes, might be a face . . . Good heavens, something's wriggling out of the shadow like a gray snake. Now it's another one . . . They look like tentacles . . . I can see the thing's body now—it's large as a bear. It glistens like wet leather. But that face, it's . . . it's . . . ladies and gentlemen, it's indescribable; I can hardly force myself to keep looking at it, it's so awful. The eyes are black and gleam like a serpent; the mouth is . . . kind of V-shaped, with saliva dripping from its rimless lips that seem to quiver and pulsate. The monster or whatever it is can hardly move; it seems weighted down possibly by gravity or something. . . .\n\nThings happened fast from there. The monster rigged its fighting machine, with Phillips giving a running account, and the war of the worlds began. The heat ray turned soldiers to screaming flames; fires spread everywhere, and suddenly Phillips was cut off the air. A piano interlude, another Welles innovation, heightened the horror with its soft touches. Then the bulletins began pouring in.\n\nRed Cross emergency workers dispatched to the scene . . . bridges hopelessly clogged with frantic human traffic. . . .\n\nFinally came the announcement that capped it:\n\nLadies and gentlemen, as incredible as it may seem, both the observations of science and the evidence of our eyes lead to the inescapable assumption that those strange beings who landed in the Jersey farmlands tonight are the vanguard of an invading army from the planet Mars . . . The monster is now in control of the middle section of New Jersey and has effectively cut the state through its center. Communication lines are down from Pennsylvania to the Atlantic Ocean. Railroad service from New York to Philadelphia discontinued, except routing some of the trains through Allentown and Phoenixville. Highways to the north, south, and west are clogged with frantic human traffic. Police and Army reserves are unable to control the mad flight. By morning the fugitives will have swollen Philadelphia, Camden and Trenton, to twice their normal populations. Martial law prevails throughout New Jersey and eastern Pennsylvania. . . .\nBulletins too numerous to read are piling up in the studio here. The central portion of New Jersey is blacked out from radio communication due to the effect of the heat ray upon power lines and electrical equipment.\n\nThe panic began in New Jersey and spread north and west. Men staggered into bars, babbling about the end of the world, and bartenders tuned in just in time to hear Kenny Delmar's icy message as \"the Secretary of the Interior.\" Honoring the censors' ultimatum not to use the President's name, Delmar nevertheless put on his best Roosevelt voice. Word spread that Roosevelt was on the air, giving the public emergency instructions. Martian cylinders were falling all over the country now—in Newark, people wrapped their faces in wet towels and took to the streets in flight. A hospital there treated more than twenty people for shock. At a college campus in North Carolina, students fought over the few available telephones. The editor of the Memphis Press-Scimitar called his staff back to work for an extra edition on \"the bombing of Chicago.\" A woman in Pittsburgh was saved by her husband in an attempt to swallow poison. A power shortage in a small Midwestern town at the height of the show sent people screaming into the streets. In Boston, families gathered on rooftops and imagined that they could see the glow of red against the night sky as New York burned.\n\nThe panic spread into the South—there were wild rumors that New York had been hit by a planetoid, with casualties running into millions. People gathered in churches from Richmond to Birmingham, praying to their Maker, and from towns near the Rockies people scattered into the hills, losing themselves so thoroughly that sheriffs' posses ultimately had to track", "num_tokens": 2048} {"category": "olmocr_science_pdfs-entertainment", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-entertainment/part-00-00000.npy", "text": ", Deputy Head of Press & PR\nEmma.hewitt@bfi.org.uk\n020 7173 3264 / 07584 264 618\n\nTina McFarling, Media Advisor, Corporate, Partnerships & Industry\nTina.McFarling@bfi.org.uk\n020 7957 4797 / 07879 421 578\n\nJudy Wells, Head of Press and PR, BFI\nJudy.Wells@bfi.org.uk\n020 957 8919 / 07984 180 501\n\nNOTES TO EDITORS\n\nAbout the BFI\nThe BFI is the lead organisation for film in the UK with the ambition to create a flourishing film environment in which innovation, opportunity and creativity can thrive by:\n\n- Connecting audiences to the widest choice of British and World cinema\n- Preserving and restoring the most significant film collection in the world for today and future generations\n- Championing emerging and world class film makers in the UK - investing in creative, distinctive and entertaining work\n- Promoting British film and talent to the world\n- Growing the next generation of film makers and audiences\n\nThe BFI is a Government arm’s-length body and distributor of Lottery funds for film. The BFI serves a public role which covers the cultural, creative and economic aspects of film in the UK. It delivers this role:\n\n- As the UK-wide organisation for film, a charity core funded by Government\n- By providing Lottery and Government funds for film across the UK\n- By working with partners to advance the position of film in the UK.\n\nFounded in 1933, the BFI is a registered charity governed by Royal Charter. The BFI Board of Governors is chaired by Josh Berger CBE.\n\nThe BFI London Film Festival\nBFI London Film Festival is Britain’s leading film event and one of the world’s best film festivals. It introduces the finest new British and international films to an expanding London and UK-wide audience and attracts significant international film industry participation. LFF is a compelling combination of diverse films, red carpet\nglamour, friendly audiences and vibrant exchange. LFF provides an essential profiling opportunity for films seeking global success; promotes the careers of British and international filmmakers through its industry and awards programmes and positions London as the world’s leading creative city.\n\n**About American Express**\nAmerican Express is a diversified worldwide travel, financial and network services company founded in 1850. It is a leader in charge and credit cards, Travellers Cheques, travel and insurance products.\n\nThrough American Express Invites®, Cardmembers have access to enriched experiences at some of the UK’s most sought after entertainment events, including best seats, exclusive offers and early-on-sale tickets. The company has multi-year partnerships with a range of entertainment institutions including AEG, Live Nation, Ticketmaster, Somerset House, The British Film Institute and National Theatre.\n\nFor more detail on the enriched service American Express offers its Cardmembers, please visit [americanexpress.co.uk/whyamex](http://americanexpress.co.uk/whyamex) or connect with AmericanExpressUK on Facebook or Twitter @AmexUK<|endoftext|>Liverpool Film Seminar\n\n2013 – 2014 series\n\nEvery year, Liverpool Film Seminar invites six experts to deliver a series of talks. Topics vary greatly and the series does not focus on a specific aspect of film. Instead, a range of genres and approaches are celebrated, from historical reach to the internet’s impact on cinematic material.\n\nProfessor Laura Mulvey (Birkbeck College, University of London)\n\nHitchcock’s Blondes and Feminist Film Theory: a Cinema of Voyeurism or a Cinema of Self-reflexivity?\n\nThe ‘Hitchcock blonde’ has become an established cliché image within popular culture today, recognised, recounted and discussed beyond film theory circles. In this lecture Laura Mulvey returns to significance of Hitchcock’s blonde heroines and his voyeuristic cinema for the development her feminist and psychoanalytic approach to film in the 1970s. Recently, after a gap of 40 years, she has returned to the ‘Hitchcock blonde’ to reflect on his cinema as, perhaps, revealing and self-reflexive rather than simply misogynistic.\n\nBiography:\n\nIn 1994, she co-directed with artist/filmmaker Mark Lewis *Disgraced Monuments* (Channel 4) with whom she has also made 23 August 2008 (2013). She is Professor of Film and Media Studies at Birkbeck College, University of London and Director of the Birkbeck Institute for the Moving Image.\nProfessor Jane Feuer (University of Pittsburgh, USA)\n\nTheatricality and Quality Drama: a Neglected Connection\n\nAlthough HBO-style \"not TV\" dramas may be considered an offshoot of indie cinema, and although some HBO auteurs such as David Chase consider themselves to be filmmakers, the debt quality drama owes to a theatrical playwrighting tradition may be even greater than the influence of cinema. A newspaper article referred to Aaron Sorkin as \"the playwright, television writer and Oscar-winning screenwriter of The Social Network\" in that order. Writers on In Treatment and Six Feet Under have been cited for their backgrounds as playwrights, not as filmmakers. Network television, picking up on the quality TV style for the 2012 drama SMASH not only set the show in the theater, but also hired playwright Theresa Rebeck as the first season showrunner. HBO has awarded grants to develop playwrights. Writers and producers originating in theater dominated television drama in the 1950s and they dominate quality drama today to a much greater extent than has been recognized by academic TV scholars coming from cinema studies. Theater people can also be found in quality dramas of the 1980s that seem to have been eclipsed by post-HBO dramas. Theatricality is also a sensibility and a mode of scene construction; these too can be shown to be a major influence on television drama. Theater as an origin relates to the demographics of quality drama. This audience appreciates the higher cultural capital theater has over film, and HBO has not hesitated to publicize its link to the theater. The paper will argue about the importance of playwrights in US TV and the impact of theatricality on contemporary TV dramas.\n\nBiography:\n\nJane Feuer is Professor of English at the University of Pittsburgh where she teaches in the Film Studies Program. She has lectured internationally on Hollywood musicals and television. Her current work involves \"quality drama\" as it has evolved on U.S. television since the 1990s. Previously she wrote about earlier quality dramas in Seeing through the Eighties. She was one of the founders of Television Studies as it emerged out of film studies from the 1980s to the present.<|endoftext|>PRIZES AND AWARDS\n\n- Best Chopin Piano Concerto: $8,000\n- Non-prize Semifinalists: $1,000 (for the 10 best)\n- 1st Prize Winners: $15,000\n- 2nd Prize Winners: $10,000\n- 3rd Prize Winners: $5,000\n- 4th Prize Winners: $4,000\n- Audience Award: Certificate\n\nREGULATIONS\n\nELIGIBILITY\n\n- Applicants who have won the first and second prizes in any major international piano competitions, which should be announced before July 1, 2021.\n- They must confirm their acceptance in the competition form before 23:59(GMT) September 15, 2021. All important documents and materials should be sent in before 23:59(GMT) September 15, 2021.\n- Applicants born on or after November 7, 1990 may apply for the competition.\n\nARTISTIC DIRECTOR\n\nFu Renchang\nAssociate Head of Conducting Department, Shanghai Philharmonic Orchestra\n\nTHE PURPOSE\n\nThe China Shenzhen International Piano Concerto Competition (CSIPCC) is a pan-national public piano competition. It aims to promote international exchange and collaborations in this field and discover outstanding young pianists of the new era with Chinese characteristics. It further serves to promote the development of the cultural exchange and cultural cooperation between China and Shenzhen, and to promote the cultural development of Shenzhen.\n\nREGULATIONS\n\n- The 1st Prize Winners will receive a contract with Shenzhen Symphony Orchestra.\n- Rehearsals for Semifinals will be held on 30 October - 1 November, 2021. The 1st Prize Winners will be announced on 2 November, 2021.\n- After each round of the competition, the Organizing Committee will number the audition form and pass them on to the Screening Jury. The Jury will decide the top 70 candidates to advance to the Preliminaries.\n- The length of performance should not be longer than 30 minutes. One piece of own choice from any period (about 8-10 minutes).\n- From the Semifinal round, the Organizing Committee will provide practice rooms with time and a practising room for the contestants who prefer to stay with host families.\n- Host families will provide daily practicing pianos.\n- The Organizing Committee will provide standard accommodation and personal belongings insurance.\n- Organizers are not responsible for loss or damage to personal belongings during the competition.\n\nREPERTOIRE\n\n- 30 minutes performance without interval. Any one of the following concertos:\n - Tchaikovsky Piano Concerto No.1 in B-flat minor, Op.23\n - Brahms Piano Concerto No.2", "num_tokens": 2048} {"category": "olmocr_science_pdfs-finance_and_business", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-finance_and_business/part-00-00000.npy", "text": " standards apply. Copies of current Occupational Safety and Health Standards are available from regional and/or area offices of the U.S. Department of Labor, Occupational Safety and Health Administration.\n\nc. If this contract or order contains a Postal Service standard and an OSHA standard covering the same general area of applicability, the Postal Service standard governs and takes precedence, unless the OSHA standard contains more rigorous or stringent safety requirements, in which case the OSHA standard governs and takes precedence.\n\nd. Upon delivery of the first article under the contract or order, or if none, upon delivery of the first production quantity, the supplier must execute a certification in a form acceptable to the contracting officer, attesting to the conformance of the delivered items to the requirements of this clause.\n\nClause B-29: (Reserved) (March 2006)\n\nClause B-30: Permits and Responsibilities (March 2006)\n\nThe supplier is responsible, without additional expense to the Postal Service, for obtaining any necessary licenses and permits, and for complying with any applicable federal, state, and municipal laws, codes, and regulations in connection with the performance of the contract. The supplier is responsible for all damage to persons or property, including environmental damage, that occurs as a result of its omission(s) or negligence. The supplier must take proper safety and health precautions to protect the work, the workers, the public, the environment, and the property of others.\n\nClause B-31: (Reserved) (March 2006)\n\nClause B-32: Differing Site Conditions (March 2006)\n\na. The supplier must promptly, and before such conditions are disturbed, notify the contracting officer in writing of:\n\n (1) Subsurface or latent physical conditions at the site differing materially from those indicated in this contract; or\n\n (2) Unknown physical conditions at the site, of an unusual nature, differing materially from those ordinarily encountered and\ngenerally recognized as inherent in work of the character provided for in this contract.\n\nb. The contracting officer shall promptly investigate the conditions, and if such conditions do materially so differ and will cause an increase or decrease in the supplier's cost of, or the time required for, performance of any part of the work under this contract whether or not changed as a result of such conditions, an equitable adjustment shall be made and the contract modified in writing accordingly.\n\nc. No claim of the supplier under this clause shall be allowed unless the supplier has given the notice required in a. above; provided however, the time prescribed thereof may be extended by the Postal Service.\n\nd. No claim by the supplier for an equitable adjustment under this clause will be allowed if asserted after final payment under this contract.\n\nClause B-33: Inspection and Acceptance (Construction) (March 2006)\n\na. Except as otherwise provided in this contract, inspection and testing by the Postal Service of materials and workmanship shall be made at reasonable times and at the site of the work, unless the contracting officer determines that it shall be made at the place of production, manufacture, or shipment of such material. The contracting officer's decision shall be conclusive as to whether the material involved conforms to the contract requirements. Such off-site inspection or test shall not relieve the supplier of responsibility for damage to or loss of the material prior to acceptance, nor in any way affect the continuing rights of the Postal Service after acceptance of the completed work under the terms of paragraph f. of this section.\n\nb. The supplier shall without charge, replace any material or correct any workmanship found by the Postal Service not to conform to the contract requirements, unless the Postal Service consents to accept such material or workmanship with an appropriate adjustment in contract price. The supplier shall promptly segregate and remove rejected material from the premises.\n\nc. If the supplier does not promptly replace rejected material or correct rejected workmanship, the Postal Service may, by contract or otherwise, replace or correct it and charge the cost to the supplier.\n\nd. The supplier must furnish (without charge) all facilities, labor, and materials needed to conduct inspections and tests as required by the contracting officer. The supplier will be charged any additional costs of inspection if material and workmanship are not ready at the time specified by the supplier for inspection.\n\ne. The Postal Service may examine completed work by removing or tearing it out. The supplier must replace or correct any work found not to conform to contract requirements. If work is torn out and found to comply with contract requirements, the contracting officer must make an equitable adjustment for the services provided for the inspection and replacement of the work.\nf. The Postal Service will inspect the work as soon as practicable after completion. Acceptance by an authorized Postal Service representative is conclusive except in the case of latent defects, fraud, gross mistakes amounting to fraud, or Postal Service rights under any warranty or guarantee.\n\nClause B-34: Notice to Proceed and Commencement, Prosecution and Completion of Work (March 2006)\n\nNo work will be performed except pursuant to a Notice to Proceed issued by the contracting officer.\n\nThe supplier will be required to:\n\na. Commence work under this contract within 10 calendar days after the date the supplier receives the Notice to Proceed,\n\nb. Prosecute the work diligently, and\n\nc. Complete the entire work, ready for use not later than ___________ calendar days from the date of receipt of the Notice to Proceed. The time stated for completion includes final cleanup of the premises.\n\nClause B-35: Specifications and Drawings (March 2006)\n\na. The supplier must keep at the site, copies of the drawings and specifications and must at all times give the contracting officer access to them. Anything mentioned in the specifications and not shown on the drawings, or shown on the drawings and not mentioned in the specifications, is of like effect as if shown or mentioned in both. In case of discrepancy or conflicts between drawings and specifications, the specifications will govern.\n\nb. In case of difference between small and large-scale drawings, the large-scale drawings will govern. Schedules on any contract drawing will take precedence over conflicting information on that or any other contract drawing. On any of the drawings in which a portion of the work is detailed or drawn out and the remainder is shown in outline, the parts detailed or drawn out will apply also to all other like portions of the work.\n\nc. When the word “similar” appears on the drawings, it has a general meaning and must not be interpreted as meaning identical, and all details must be worked out in relation to their location and connection with other parts of the work.\n\nd. In case of discrepancy either in figures, drawings, or specifications, the matter must be promptly submitted to the contracting officer, who will promptly make determination in writing. Any adjustment by the supplier without such a determination will be at the supplier’s own risk and expense. The contracting officer must furnish from time to time such detailed drawings and other information as may be necessary.\n\ne. The supplier must verify all dimensions shown of existing work, and all dimensions required for work that is to connect with work now in place,\nby actual measurement of the existing work. Any discrepancies between the contract requirements and the existing conditions must be referred to the contracting officer before the supplier performs any work affected by these discrepancies.\n\nClause B-36 Postal Service Partial Occupancy (March 2006)\n\na. The contracting officer reserves the right of partial occupancy or use of facilities, services, and utilities, before final acceptance, without implying completion or acceptance of any part of the project by the Postal Service. Before such occupancy or use, the contracting officer must furnish the supplier an itemized list of work remaining to be performed or corrected. Failure to list an item will not relieve the supplier of the responsibility for complying with the terms of the contract.\n\nb. Costs incurred as a result of such partial occupancy or use of facilities, services, and utilities are subject to equitable adjustment under the Changes clause.\n\nClause B-37: Changes (Construction) (March 2006)\n\na. The contracting officer may at any time, without notice to any sureties, by written order designated or indicated to be a change order, make changes in the work within the general scope of the contract, including changes:\n (1) In the specifications (including drawings and designs);\n (2) In the method or manner of performance of the work;\n (3) In the Postal Service-furnished facilities, equipment, materials, services, or site; or\n (4) Directing acceleration in the performance of the work.\n\nb. Any other written or oral order (which, as used in this paragraph b., includes direction, instruction, interpretation, or determination) from the contracting officer that causes a change will be treated as a change order only if the supplier gives the contracting officer written notice stating:\n (1) The date, circumstances, and source of the order, and\n (2) That the supplier regards the order as a change order.\n\n This notification must be delivered to the contracting officer within 30 days of receipt of the change order.\n\n If any change under this clause causes an increase or decrease in the supplier’s cost of, or the time required for, the performance of any part of the work under this contract, whether or not changed by any order, the contracting officer will make an equitable adjustment and modify the contract in writing. However, except for claims based on defective specifications, no claim for any change under paragraph b. above will be allowed for any costs incurred more than 20 days before the\nsupplier gives written notice as required. In the case of defective specifications for which the Postal Service is responsible, the equitable adjustment will include any increased cost reasonably incurred by the supplier in attempting to comply with the defective specifications.\n\nd. No claim by the supplier for an equitable adjustment will be allowed if asserted after final payment under this contract.\n\ne. See also Clause B-10: Pricing of Adjustments.\n\nClause B-38", "num_tokens": 2048} {"category": "olmocr_science_pdfs-finance_and_business", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-finance_and_business/part-00-00000.npy", "text": ". Purchasing opportunities are publicized to create, promote, and ensure adequate competition. In addition, publicizing purchase opportunities is an effective way of communicating Postal Service requirements to SMWOBs.\n\n2-27.1 **Publicizing Requirements**\nThe purchase/SCM team should use market knowledge to determine whether purchase, subcontracting, and prequalification opportunities should be publicized and, if so, by what means and to what extent. If there is any doubt that an identified pool of sources for any proposal represents the most capable suppliers in the marketplace or will lead to adequate competition, the purchase/SCM team should publicize. Although publicizing requirements is a matter of judgment, purchase opportunities should be publicized if:\n\n- Best value could be realized from candidates not previously identified as potential suppliers.\n- Competitive or noncompetitive awards offer significant subcontracting opportunities.\n- Publicizing will further the Postal Service's supplier diversity objectives.\n- The announcement of such an award may enhance future competition.\n- Publicizing will further the business and competitive interests of the Postal Service.\nThe CO is responsible for publicizing requirements. Methods for publicizing include:\n\n- Announcement in the GPE.\n- Announcement in other media.\n- Presolicitation notices.\n\n2-27.2 **Availability of the RFPs**\n\nWhen the competitive purchase method will be used, enough suppliers should be solicited to ensure adequate competition. In addition, the CO should make a reasonable effort to provide copies of the RFP to any supplier requesting one. If the requirement is being competed among prequalified suppliers, suppliers not on the prequalification list may be provided a copy of the RFP, but they must be told that the Postal Service plans to award the resulting contract to a supplier on the prequalification list. Requests for copies may be denied once a reasonable number of copies have been distributed to the solicited suppliers and others who have requested them. The CO should fully explain to suppliers the unavailability of RFPs.\n\nAlternatively, the CO may make available through FedBizOpps (www.fedbizopps.gov), the GPE, RFPs publicized through the GPE, including specifications and other pertinent information determined necessary by the CO. When practicable and cost-effective, the CO may make additional solicitation-related information accessible through the GPE.\n\nWhen an RFP or solicitation package is so voluminous that it is impracticable to reproduce a reasonable number of copies for those requesting them, a limited number of copies should be made available for sale; the cost should include the cost of reproduction and postage.\n\n2-27.3 **Government Point of Entry**\n\nThe GPE will be used when publicizing requirements because it is recognized by the supplier community as an excellent source for information regarding purchase opportunities and RFPs. The CO will publicize requirements by posting the finalized RFP to the GPE, known as FedBizOpps, at www.fedbizopps.gov. The GPE can also be accessed electronically by the public. If using the GPE, publicizing must not occur later than issue of the RFP.\n\n2-27.4 **Other Media**\n\nIn situations where the GPE does not provide the most effective communications channel, requirements may also be publicized via other media, including newspapers, trade journals, and electronic media. The CO, in conjunction with the purchase/SCM team, must consider:\n\n- Conditions of the current marketplace.\n- Postal Service business needs.\n- Postal Service competitive needs.\n- Subcontracting opportunities that would follow contract award.\nAs another premier business publication regarding solicitation announcements, the *Journal of Commerce* allows the Postal Service a media venue that can be accessed by any supplier. Available online, the *Journal of Commerce* can be viewed at [www.joc.com/](http://www.joc.com/).\n\nAnnouncements of RFPs made available to newspapers, other news media, and trade journals may be made when there is no cost to the Postal Service. However, paid commercial announcements or advertisements may also be used when doing so is determined to be appropriate to stimulate supplier competition. In addition, purchase/SCM teams should consider the use of media to further the Postal Service’s supplier diversity objectives in relation to prime or subcontracting opportunities. The CO must choose the most cost-effective method and which newspapers, trade journals, or other news media will promote the Postal Service’s interests.\n\n### 2-27.5 Presolicitation Notices\n\nIf the purchase/SCM team wishes to identify suppliers, it may do so by issuing a presolicitation notice (also called a \"sources sought\" notice) before issuing the RFP. The notice should:\n\n- Describe the upcoming Postal Service requirement and any applicable qualification requirements.\n- Announce any planned presolicitation conferences.\n- Specify a date by which the supplier must respond to the notice to ensure inclusion on the RFP mailing list.\n\n### 2-27.6 Preproposal Conference\n\nWhenever circumstances suggest that it would add to the success of the purchase, such as when a solicitation contains complicated specifications or SOW, a preproposal conference may be held to brief suppliers. Notice of the preproposal conference should be contained in the solicitation. If time allows, suppliers should be allowed to submit written questions in advance, so that prepared answers may be distributed at the conference.\n\nThe entire purchase/SCM team should attend the conference. The CO or a designated representative must conduct the conference, with the assistance of the purchase/SCM team and assigned counsel, as appropriate.\n\nA record of the conference must be furnished to all of the suppliers who received the solicitation. Because the role of that record is to ensure that all prospective suppliers fully understand the Postal Service’s intent with respect to the purchase, and not necessarily to provide a verbatim reconstruction of the conference, the record may be edited for clarity and brevity and corrected where necessary.\n\n### 2-27.7 Other Topics Considered\n\nSection 2-21, Define Supplier Diversity Objectives.\n\nSection 2-24, Review and Finalize Request for Proposals (RFP).\n2-28 Conduct Reverse Auctions Where Appropriate\n\nWhether to conduct a reverse auction for the purchase of goods or services was determined during the Consider Auctions topic of USPS Supplying Practices Process Step 2: Evaluate Sources. If determined appropriate, a reverse auction is conducted between a buying organization and a group of suppliers who compete against each other to supply goods or services. Such goods and services must have clearly defined specifications for design, quantity, quality, delivery, and related terms and conditions.\n\nReverse auctions rely on competition driving prices down, which means a greater likelihood of success when purchasing less complex or specialized goods or services. Simple commodity items or services, which can be clearly defined and often have a wide range of potential suppliers, will be best suited to the auction process. Although, in some circumstances, there may be only a few eligible suppliers, their market share tends to be great enough to make an auction a viable purchasing option.\n\nIn a reverse auction, participating suppliers bid against each other, via specialized Internet software, by submitting successively lower prices during a scheduled time period. Typically, the lowest bid wins in a reverse auction; however, some full-service auction providers can support very complex auctions to better align the auction with an organization’s business practices. Bidders are able to introduce new or improved values to their bids in a visible and competitive environment. The procedure and duration of the event will be defined before the reverse auction commences, and a starting value that suppliers will bid against until the competition closes will be determined in advance. When used, the auction will be a key stage of the purchasing process.\n\nThe five steps involved in conducting a reverse auction are illustrated in Figure 2.12.\n\n**Figure 2.12**\nReverse Auction Process\n\n![Reverse Auction Process Diagram]\n\n**Plan and Define Auction Requirements**\n\nHaving a clear purchase specification is critical, and should be evident in all sourcing decisions. The better the purchasing description (e.g., consisting of clear specifications for products or SOW for services), the better the sourcing results. A well-planned buy will always provide better sourcing results.\n\nGenerally, in a reverse auction, the buying organization should set a dollar amount higher than the desired final cost for the initial bid. A high dollar amount usually leads to a more favorable outcome for the buying organization in a reverse auction because suppliers bid against each other and drive the price of the product or service down. If the item manager(s) decide to source enough of the organization’s requirements to attract\nsuppliers, the requirements must be robust enough so that the volume can be managed and leveraged by the supply base to drive savings and efficiencies. However, the dollar amount should not be so high as to create potential risks for the organization. The key deciding principle for the appropriate level of a starting bid is the ROI, and it is easier to gain a larger ROI on a larger purchase. In some cases, the suppliers may provide something innovative; therefore, they may have some input into setting the preliminary price.\n\n2-28.2 Determine Software Platform/Service Provider\n\nThe second step in the reverse auction process is to determine the software platform or reverse auction service provider to run the auction. As mentioned earlier in Section 2-15, Consider Auctions, the three levels of auction technology available are:\n\n- Full-Service — a full-service provider hosts the auction process from start to finish.\n- Hosted — the technology is hosted by a third party, but the auctions are organized and run by the buying organization.\n- Self-Service — buying organization oversees all aspects of the auction, including implementing the auction technology internally.\n\nMany companies specialize in reverse auctions. It is critical to choose a Reverse Auction Service Provider with a good reputation and experience in the business. Item managers should examine each firm’s functionality by mandating demonstrations of past auctions run for other companies over a wide range of goods and services.\n\nOnce selected, the Reverse Auction Service Provider should also aid the client and purchase/SCM team in", "num_tokens": 2048} {"category": "olmocr_science_pdfs-finance_and_business", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-finance_and_business/part-00-00000.npy", "text": ". 221). Rueda, Peris and Gil (2012) support the idea that the combination of these factors is sufficient to provide a broad, yet satisfactory definition of economic entrepreneurship.\n\nThis small company has forged a business relationship with the government and occasionally sells chocolate to the Haitian government. The company’s product has been served during government functions. It is through this association that the owners’ voices and those of the farmers are being heard. The government is more aware of the plight of the farmers’ challenges in earning a living in rural areas. Because of this business opportunity, the government understands the company’s desire to improve the quality of life for farmers in Haiti and sees the impact it has on its own citizens.\n\nDylick and Hockerts (2002) agree that to grow the three pillars of sustainability, entrepreneurs must pursue this effort through the political domain. The relationship between the company and the government helps guide and promote economic actions. Linnanen (2002) claims that most of the ecopreneurs that he has met run their businesses not only to make money, but to also make the world a better place. He notes that this personal commitment enhances marketing credibility and trustworthiness as business partners. The company has a steady presence in governmental relations, which is invaluable to the farmers in that the company provides end- to-end support to ensure the success and sustainability of the business in the long-term.\n\nIn summary, economic entrepreneurship is important to the economy as the entrepreneur and those invested in the company can provide the knowledge, skills, and ability to create a product or service. If the company manages itself in a way that turns a profit, it can also add jobs and create opportunities for employees to make money as well. In turn, employees have an improved opportunity to spend at least a portion of that money in their local economy and use it to improve their well-being and standard of living.\n\nLink to Environmental Entrepreneurship\n\nEco-efficiency\n\nThe earth provides finite resources, and how we choose to use and replenish those resources affects the efficiency and effectiveness of ecological sustainability (Lovins, Lovins, & Hawken, 1999). Eco-efficiency is described by Dylick and Hockerts (2002) as the value that a business includes related to its cumulative ecological impact. Another definition of eco-efficiency is “the delivery of competitively-priced goods and services that satisfy human needs and bring quality of life, while progressively reducing ecological impact and resource intensity throughout the life-cycle to a level at least in line with the earth’s carrying capacity” (DeSimone & Popoff, 1997, p. 47). Humans, animals, and plants rely on the earth for resources. If these resources are not taken care of properly, we will not be able to take care of ourselves. Therefore, eco-efficiency is a valuable part of many corporate strategies, and it directly relates to the efficiency of the environment (Dylick & Hockerts, 2002).\n\nAs economic growth relates to cacao production, the cacao tree needs little attention or time from the farmer. The output is restricted due to not using or not knowing about effective farming techniques. With cacao profits dropping in the 1970s, many cacao farms were abandoned and the farming techniques have not been needed for the last 40 years (Wegbert, 2015). It would take a specialist to determine if the abandoned cacao farms are worth the effort to rehabilitate as the cacao trees reach their peak production by the 20th year and then begin to decline (2015). However, improving the condition of and the care for\nthe trees can lead to five to eight times more cacao (Taylor, 2015). This increase in output leads to eco-\nefficiency. Replanting is also an opportunity despite having to wait for the cacao tree to mature.\n\nSince maintenance of cacao trees is minimal, some farmers are not concerned with improving output. Many older farmers plan to rely on cacao production for passive income in their retirement (Wegbert, 2015). The farmers have an opportunity to earn more income if they are given the right tools to increase output. Eco-efficiency is concerned with “doing more with using less, thus improving the relative performance on indicators such as decreasing harmful emission/economic output or increasing the value of economic output/natural resource input” (Csutora, 2011). By using sustainable crop production techniques, output increases, and farmers earn more money to improve their standard of living.\n\nIn connecting environmental entrepreneurship with economic entrepreneurship, Keijzers (2002) suggests that in creating new technologies, new coalitions should be formed, maybe in the form of a new company, to overcome the obstacles of competitive rivalry. In this particular case, the small company recently created a new joint venture with the largest coffee producer in Haiti to increase scale and move rapidly toward creating more production opportunities. One benefit of this alliance is the entrepreneurs can use the size and brand equity of the larger company to increase market reach and grow market share. Although the smaller company is not organically or fair trade certified, the larger company is. Because of this the smaller company can become certified through the joint venture and use the technologies from the larger company to create such products as organic chocolate.\n\n*Eco-effectiveness*\n\nAlthough eco-efficiency and eco-effectiveness are needed for ecological sustainability, the focus should be on producing a greater environmental good (Dyllick & Hockerts, 2002). Eco-effectiveness should be the main goal of environmental sustainability to ensure positive environmental impacts through reforestation, soil improvement, cacao tree growth, and chocolate production. Dedicating certain land to organic farming could assist in this movement. The owners want to ensure the land will not only produce, but also create a place where the trees are taken care of in a way that produces the most output without harming future crops. The owners do not want to stretch beyond the environment’s capacity; however, this does not appear to be an issue as the company looks to use this as an opportunity to assist in reforestation efforts in the country.\n\nAs advocates for the farmers, the friends hope to improve their chances for success on a global scale. Sustainable cocoa production in Haiti hinges on the following factors: farm gate price, farm size, property ownership, land configuration and rural infrastructures, networking, and animal feeding practices (Wegbert, 2015). Haiti’s natural resources are limited and ownership of property is important for farmers as they are not well motivated to take care of other people’s property if they are only partially benefitting financially from the harvest. If the farmers are not working on other people’s land, then most of the remainder of the farmers own very small plots of land. In addition, threats to the farm include diseased pods, climate change/drought, low producer prices and corruption with farmer co-ops (Wegbert, 2015). For example, domestic animals run free on land and eat tree seedlings, which reduces output. Farm ownership and effective farm management are important for continued success.\n\n**Link to Social Entrepreneurship**\n\n*Socio-efficiency*\n\nOne of the world’s largest issues is how to alleviate poverty, and a step in the right direction involves improving the economic conditions of the poor. The Schwab Foundation for Social Entrepreneurship (n.d.) states that social entrepreneurs pursue the eradication of poverty, while maintaining a focus on producing social and ecological value, and while also improving financial value. Social entrepreneurs can create a stable approach for individuals and communities to improve social and economic conditions. In the case of the Haitian farmers, it is not just an economics issue; it is also an environmental issue.\n\nSocio-efficiency is associated with economics. From the Dyllick and Hockerts (2002) sustainability model discussed in Young and Tilley’s 2006 article, socio-efficiency is “the relation between a firm’s value added and its social impact” (2002, p. 134). Dyllick and Hockerts add to the discussion by stating:\n“Socially sustainable companies add value to the communities within which they operate by increasing the human capital of individual partners as well as furthering the societal capital of these communities. They manage social capital in such a way that stakeholders can understand its motivations and can broadly agree with the company’s value system” (Dyllick & Hockerts, 2002, p. 134).\n\nOne of the pillars of sustainability entrepreneurship is social entrepreneurship, and sustainability is about efficiency and effectiveness. To improve economic conditions, social and environmental issues must be addressed (Dyllick & Hockerts, 2002). The owners must be careful to balance efficiencies without negatively affecting the environment in the long run. Reforestation is helpful, but to stay balanced, the value added must be more than the cost to the environment, economy, and farmers. The owners of the company were most concerned about improving the lives of the Haitian farmers by creating a business that could provide an atmosphere of economic opportunity and hope for the future. They realized it was about the social benefit as well as the economic benefit. It is important that someone serve as the advocate for the farmers with the government and bring attention to their efforts. The government is an important constituent as the company can lobby for improved regulations and policies on behalf of the farmers.\n\n**Socio-effectiveness**\n\nSocio-effectiveness refers to the valuation of a firm’s social performance (Dyllick & Hockerts, 2002). A question to consider is if the products are accessible and if the benefits are for all or for just a few people (2002). The Haitian farmers can make a chocolate product, but the owners need to ensure that the market is aware", "num_tokens": 2048} {"category": "olmocr_science_pdfs-finance_and_business", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-finance_and_business/part-00-00000.npy", "text": " function with habit formation; refer to Appendix 2 for details.\n\n**Appendix 4:** The partial derivatives of dividends with respect to explanatory variables\n\nConsider the optimal aggregated dividend as a linear function of underlying variables:\n\n$$ d = a_0 + a_1 k + a_2 c + a_3 l + a_4 q + a_5 z $$\n\nTo derive the partial derivative of dividends with respect to each variable, we first construct a 5-vector of the covariance of each explanatory variable with $d$: $Y = Cov(d, x)$. We also construct a variance-covariance matrix of all explanatory variables, $X$, with the $i$th row given by $Cov(x^T, x_i)$, and a 5-vector, $a$, with elements $a_i$ that denote the partial derivatives:\n\n$$ Cov(d, x_i) = Cov(a_0 + a_1 k + a_2 c + a_3 l + a_4 q + a_5 z, x_i) $$\n\n$$ \\Rightarrow Cov(d, x_i) = \\sum_{j=1}^{5} a_j Cov(x_j, x_i) $$\n\n$$ \\Rightarrow Y = Xa $$\n\n$$ \\Rightarrow a = X^{-1}Y $$\n\nWe calculate the partial derivative of the optimal aggregated dividends with respect to capital input ($k$), consumption ($c$), labor ($l$), equity price ($q$) and technology shock ($z$) for the VM model and the RA model in the case of habit persistence of 0.8:\n\n
BenchmarkSeconds BaseRatioSeconds BaseRatioSeconds BaseRatioSeconds PeakRatioSeconds PeakRatioSeconds PeakRatio
410.bwaves23.458123.358323.557923.458123.358323.5579
416.gamess39749.339749.339849.237851.837751.937851.8
433.milc12672.912573.312772.112672.912573.312772.1
434.zesmp42.521442.721342.421442.52144", "num_tokens": 2048} {"category": "olmocr_science_pdfs-entertainment", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-entertainment/part-00-00000.npy", "text": " work — a coming-of-age tale in an idyllic rural setting that marked the screen debut of Norwegian actress Liv Ullmann —young love is mixed in youthful hedonism and the awakening moral constraints of adult life. (1959, 35 mm, Norwegian with subtitles, 95 minutes)\n\nAcidflut (The Wayward Girl) by Ingrid Dokka, Saturday September 11 at 2:00\n\nThe short Just Kidding stars Edith Carlmar in an old woman’s encounter with three boys. (Bent Hamer, 1994, Norwegian with subtitles, 3 minutes)\n\nSikadeskutt (Damage Shot) by Ingrid Dokka, Saturday September 25 at 2:00\n\nCarlmar’s films were especially appealing in the 1950s because they exposed contemporary problems that today are seen as social and cultural history. In Carlmar’s best known work — a coming-of-age tale in an idyllic rural setting that marked the screen debut of Norwegian actress Liv Ullmann —young love is mixed in youthful hedonism and the awakening moral constraints of adult life. (1959, 35 mm, Norwegian with subtitles, 95 minutes)\n\nIn Carlmar’s best known work — a coming-of-age tale in an idyllic rural setting that marked the screen debut of Norwegian actress Liv Ullmann —young love is mixed in youthful hedonism and the awakening moral constraints of adult life. (1959, 35 mm, Norwegian with subtitles, 95 minutes)\n\nGenMex: A New Generation of Cine Mexicano by Ingrid Dokka, Saturday September 4 at 4:00\n\nIn a memorable year for Mexico —2010 marks both the bicentennial of independence from Spain and the one-hundredth anniversary of the start of the Mexican Revolution—it’s also becoming abundantly clear that fresh directorial talents are invigorating the burgeoning pool of distinctive cinematic known as Nuevo Cine Mexicano, one of the world’s most dynamic national cinema movements. This series includes the work of eight filmmakers. The Gallery wishes to thank Carlos Gutierrez per petuum mobile by Ingrid Dokka, Saturday September 4 at 4:00\n\nWinner of the Best Mexican Film Award at the prestigious Guadalajara Fes- tival, Perpetuum Mobile is the story of young Gabino, a van driven in Mexico City living with his nagging mother. In an impressively disciplined narrative, the film creates a portrait of family relationships within a panorama of urban street life. Director Pereida (b. 1952), with only three features, is well on his way to becoming a leading stylist of Mexican cinema. (Nicolás Pereida, 2009, 35 mm, Spanish with subtitles, 90 minutes)\n\nLake Tahoe by Natalia Almada shapes an arresting portrait of her great-grandfather, Plutarco Elias Calles, Mexico’s notorious president during the 1920s. From the most ephemeral of sources — private audio recordings of her grandmother, the president’s daughter — Almada completes the portrait with archival footage, photographs, and texts, reconstructing myriad details in this remarkably illuminating essay. (Natalia Almada, 2008, HD Cam, 83 minutes)\n\nNordeteado by Natalia Almada shapes an arresting portrait of her great-grandfather, Plutarco Elias Calles, Mexico’s notorious president during the 1920s. From the most ephemeral of sources — private audio recordings of her grandmother, the president’s daughter — Almada completes the portrait with archival footage, photographs, and texts, reconstructing myriad details in this remarkably illuminating essay. (Natalia Almada, 2008, HD Cam, 83 minutes)\n\n**Døden er et kjærtegn (Death Is a Caress)**
Saturday September 4 at 2:00\n\nAn old magnetism draws wealthy woman-about-town Sonja to her husband’s medical practice. As new facts about Eva’s life materialize, Arne discovers she had been fed a kind of male-hysteria, as Erik comes to regard Sonja increasingly as an enigma whom he can not control or understand” — Norwegian Film Institute, (1953, 35 mm, Norwegian with subtitles, 95 minutes)\n\n**Ung flukt (the Wayward Girl)**
Introduction by Ingrid Dokka, Saturday September 11 at 2:00\n\nA kind of male-hysteria, as Erik comes to regard Sonja increasingly as an enigma whom he can not control or understand” — Norwegian Film Institute, (1953, 35 mm, Norwegian with subtitles, 95 minutes)\n\n**Skadeskutt (Damage Shot)**
Saturday September 25 at 2:00\n\nCarlmar’s films were especially appealing in the 1950s because they exposed contemporary problems that today are seen as social and cultural history. In Carlmar’s best known work — a coming-of-age tale in an idyllic rural setting that marked the screen debut of Norwegian actress Liv Ullmann —young love is mixed in youthful hedonism and the awakening moral constraints of adult life. (1959, 35 mm, Norwegian with subtitles, 95 minutes)\n\n**GenMex: A New Generation of Cine Mexicano**
In a memorable year for Mexico —2010 marks both the bicentennial of independence from Spain and the one-hundredth anniversary of the start of the Mexican Revolution—it’s also becoming abundantly clear that fresh directorial talents are invigorating the burgeoning pool of distinctive cinematic known as Nuevo Cine Mexicano, one of the world’s most dynamic national cinema movements. This series includes the work of eight filmmakers. The Gallery wishes to thank Carlos Gutierrez per petetum mobile by Ingrid Dokka, Saturday September 4 at 4:00\n\nWinner of the Best Mexican Film Award at the prestigious Guadalajara Fes- tival, Perpetuum Mobile is the story of young Gabino, a van driven in Mexico City living with his nagging mother. In an impressively disciplined narrative, the film creates a portrait of family relationships within a panorama of urban street life. Director Pereida (b. 1952), with only three features, is well on his way to becoming a leading stylist of Mexican cinema. (Nicolás Pereida, 2009, 35 mm, Spanish with subtitles, 90 minutes)\n\n**Norteado**
Saturday September 5 at 4:30\n\nA delicate and accomplished debut feature, Norteado’s fresh take on the border crossing tale tracks Andres, an Oaxacan in Tijuana attempting to enter California. Temporarily finding employment and a few fragile friendships, Andres not only learns to tolerate the anguish of wanting to be elsewhere but more importantly discovers “the fleeting pleasures to be found in transitional spaces” — Melissa Anderson. (Roberto Hernández and Geoffrey Smith, 2008, Spanish with subtitles, 87 minutes)\n\n**El Calambre**
Saturday September 11 at 4:30\n\nIn Ariel’s best known work — a coming-of-age tale in an idyllic rural setting that marked the screen debut of Norwegian actress Liv Ullmann —young love is mixed in youthful hedonism and the awakening moral constraints of adult life. (1959, 35 mm, Norwegian with subtitles, 95 minutes)\n\n**Acidflut (The Wayward Girl)**
Introduction by Ingrid Dokka, Saturday September 11 at 2:00\n\nA kind of male-hysteria, as Erik comes to regard Sonja increasingly as an enigma whom he can not control or understand” — Norwegian Film Institute, (1953, 35 mm, Norwegian with subtitles, 95 minutes)\n\n**Ung flukt (the Wayward Girl)**
Introduction by Ingrid Dokka, Saturday September 11 at 2:00\n\nA kind of male-hysteria, as Erik comes to regard Sonja increasingly as an enigma whom he can not control or understand” — Norwegian Film Institute, (1953, 35 mm, Norwegian with subtitles, 95 minutes)\nAn ongoing program of classic cinema, documentary, avant-garde, and area film premieres occurs each weekend in the National Gallery’s East Building Auditorium, Fourth Street at Pennsylvania Avenue NW. Films are shown in their original formats. Programs are free of charge but seating is on a first-come, first-seated basis. Doors open approximately thirty minutes before each show. Programs are subject to change. For more information, visit our Web site at www.nga.gov/programs/film or call (202) 842-6799.\n\nThis summer brings recent documentaries on subjects ranging from American painters and art collectors to new Swiss-produced films about musicians with deep connections to the quintessentially American art form of jazz. The work of renowned avant-garde filmmaker Phil Solomon is highlighted in Rhapsodies in Silver, a retrospective trilogy presented by the artist and organized to coincide with his installation American Falls, on view at the Corcoran. Other series include Edith Carlmar: Of Love and Loss, a cycle of four films by this groundbreaking mid-twentieth-century Norwegian director who remains little known outside her own country; Film and Reality in the 1930s: Roots of the Docudrama, celebrating the seventy-fifth anniversary of The March of Time; and Gen", "num_tokens": 2048} {"category": "olmocr_science_pdfs-entertainment", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-entertainment/part-00-00000.npy", "text": "1984)\nAs called by Carol Ormand\nSource: Midwest Folklore\nFormation: Contra, duple improper\nMusic: The Red Crow/Lady Ann Montgomery/The Notch (Dan Lanier)\n\nA1 - 1s as a couple dosido with woman 2\n Same three circle left once around\nA2 - 1s as a couple dosido with man 2\n Same three circle left once around\nB1 - Down the hall 4-in-line (actives in center)\n Turn into a cozy line facing up the hall\n (1s, without releasing partner’s or neighbor's hand, turn back to back\n beneath their own hands to face up,\n while 2s turn towards partner and join\n their free hands behind the 1s\n Return, and 2s lift their joined hands\n over 1s' heads to form a clover\nB2 - Circle left as clover once around\n 1s swing, end facing down\n\nOriginal dance had a left hand star once around instead\nof the 1s swing in B2.\n\n**Ted's Triplet #4**\nBy Ted Sannella (May 27, 1970)\nAs called by Mary Wesley\nSource: Balance and Swing\nFormation: Triplet, proper\nMusic: Conley's Reel/Quindaro\n\nA1 - 1s cross through the 2s and balance the opposite two dancers (with hands\n joined in two rings of three; 1s are in the center with backs toward each\n other)\n Circle left 1½ and open out to form\n lines of three with the 1s in the center\n (all facing partners across the set)\nA2 - Lines forward and back\n 1s right hand star with the couple below\n\n**Young at Heart**\nBy Steve Zakon-Anderson (1989)\nAs called by Mary Wesley\nSource: Give-and-Take\nFormation: Contra, duple improper\nMusic: Rocky Ray (Bob McQuillen)/Alan's Reel (Bob McQuillen)/John Brennan's Reel\n\nA1 - Allemande left neighbor 1½\n Ladies chain across\nA2 - Full hey, women pass right to start\nB1 - Ladies allemande right once around and\n swing partner\nB2 - Circle left ¾\n Neighbor swing\n\nThe original B2 is, \"Circle left all the way and ladies chain.\" This dance was written for Bob McQuillen on\nthe occasion of his 63rd birthday.\n\nWaltz: Allen McBride (Bob McQuillen)\nDance Workshop: Gems from the Upper Midwest\nSaturday 9:00 – 10:30 AM\nLed by Carol Ormand\nMusic by Rodney Miller (fiddle), David Surette (mandolin), Gordon Peery (piano)\n\nFly Around My Pretty Little Miss\nBy Dale Wilson (Jul 2006)\nSource: Dale's website\nFormation: Contra, double improper\nMusic: Fly Around My Pretty Little Miss\n\nA1 - Left hands across star once around\nGents drop out and loop over your right\nshoulder while ladies continue a left\nhand turn until they meet their partner\nPartners right allemande right once\nround\nA2 - Full hey, women pass left to start\nB1 - Partner gypsy and swing\nB2 - Right and left through across using a ½\ncourtesy turn so ladies can join right\nhands to begin a right hand star\nGents join star behind their partner\nTurn about ¼ until you meet your next\nneighbor\n\nFrom Dale: “I wrote this dance after a partner said, “I\nlove the dances where I can keep moving from one\nmovement to the next.” My goal was to keep the lady\n“flying around” through the entire dance.”\n\nCozy Nella\nBy Orace Johnson (Feb 20, 1989)\nSource: Midwest Folklore\nFormation: Contra, Becket (CCW)\nMusic: Greenfields of America/Old French\n\nA1 - On right diagonal, ladies chain (if and\nonly if there is someone there), gents\ncheat courtesy turn to end across from\npartner\nBalance ring\nSpin one place to the right as in\nPetronella\n\nA2 - Balance ring\nSpin one place to the right\nRepeat\nB1 - Balance ring\nForm a cozy line; with everyone holding\non to ring; gents raise right hand in\nfront of neighbor and twirl her\nclockwise until she’s next to your\nright shoulder, both facing same\ndirection; end in cozy line facing\nopposite direction of other couple but\nin a line.\nFly right: Turn counter clockwise\nB2 - Reverse the cozy line; ladies slide back\nto back, gents wheel around so you\nand partner face same direction\nFly left: Turn clockwise to original side\nof set\nPartner swing\n\nOriginal dance was in indecent formation (1s proper\nand 2s crossed over), and begun half-way through the\nA1 in the above. The diagonal chain was in the last\nhalf of the B2. Note that the “cozy line” in this dance\nis not the same as the “cozy line” in Money in Both\nPockets that we danced last night. This term doesn’t\nhave a specific meaning; it is more of a general\ndescription of being very close (almost cuddling) to\nthe one you’re dancing with.\nColonel North's Contra Insurgency\nBy Erna-Lynne Bogue (Oct 1991)\nSource: Midwest Folklore\nFormation: Contra, duple improper\nMusic: Coloraine/Fair Jenny's Jig (Peter Barnes)\n\nA1 - Neighbor dosido\n Grand right and left* around the set,\n starting with right hand to current neighbor\n Continue to fourth neighbor for allemande left once around\nA2 - Grand right and left back to original neighbor\n Neighbor swing\nB1 - 1s ½ figure eight up through their 2s\n 1s start contra corners\nB2 - 1s finish contra corners\n 1s swing, end facing down\n\n* The “grand right and left” in B2 is in the opposite direction from what it normally is in a square dance: that is, here the gents go clockwise and the ladies counterclockwise.\n\nHey, Hey, Max is on the Way\nBy Eric Zorn (1981)\nSource: Eric's website\nFormation: Square (no partner change)\nMusic: You Married My Daughter But Yet You Didn't\n\nA1 - Heads forward and back\n Pass through, separate, around one, through the sides and meet again in the center of the square\nA2 - Heads circle left once around\n Partner dosido; end in a row-of-4 across the hall – heads facing partner in center, sides facing back of nearest head person\nB1 - Pair of full hey's across hall, heads pass right to start\nB2 - All partners dosido and swing; end with heads across from home and sides at home\n\nSequence: Introduction, figure for heads, figure for sides, break, figure for heads, figure for sides, ending\n\nOriginal switched the order of the figures in A2, and had a balance and swing in B2.\n\nA.O.'s No-No\nBy Michael Fuerst (Aug 1993)\nSource: Midwest Folklore\nFormation: Contra, Becket (C.W.)\nMusic: Duck River Red Prairie Dawn (Gary Harrison)\n\nA1 - Hey, men pass left to start; keep going until neighbors meet for second time (on the side of set men started the dance)\n Pass right shoulders with neighbor, and all immediately turn right and walk along set to face next neighbor\nA2 - Future neighbor dosido\n Original neighbor swing\nB1 - Left hand star once around\n With new neighbors, start right hand star 1½ until on original side of set\nB2 - Finish star\n Men turn back and partners swing\n\nMichael prefers a left shoulder gypsy to a dosido in A2. He also suggests that at the beginning of the walk through, the caller has the dancers note that the couple on the left diagonal will be their next neighbors. This will help dancers orient correctly at end of thehey. The star right in B1 will run into the first 2-4 beats of B2. This is how the dance got its name; Michael: “A1 Olson objected to this overflow from B1, despite the very positive reaction of other dancers.” Note: A1 Olson passed away last year.\n**Kimmswick Diamonds**\nBy Jerome Grisanti (May 2010)\n\n**Source:** Jerome’s website\n\n**Formation:** Contra, duple improper\n\n**Music:** Gillian's/Brenda Stubbart's Trip to Windsor\n\nA1 - Neighbor allemande right 1 1/2 to wave across with gents in center by left hand\nBalance wave\nSpin right as in Petronella to a diamond shape, ladies in the center facing up/down, gents on the sides\n\nA2 - Balance diamond\nSpin right\nBalance diamond\nSpin right\n\nB1 - Balance diamond\nGents draw partner into swing -- ladies twirl to the right into partner’s arms\n\nB2 - Long lines forward and back\nGents allemande left 1 1/2 to new neighbor\n\nIn the B1, Michael suggests that ladies twirl into the swing, noting that this twirl should be the opposite of the spin", "num_tokens": 2048} {"category": "olmocr_science_pdfs-entertainment", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-entertainment/part-00-00000.npy", "text": " a new venue for LOoP, and we are very excited to be able to bring our production to a new area of Portland. If this is your first time coming to a LOoP show, welcome! We hope that we will keep seeing you for many more productions in the future.\n\nThis production would not have been possible without the help and support of so many behind the scenes, but I would particularly like to thank our Producer and President of our board, Sara Rivara, without whom this production would not have got off the ground. Thanks also to Beth Kahlen for finding rehearsal venues for us, Lucy Tait for excellent costume work, and to all our board members for making sure our company was able to survive the pandemic years.\n\nH.M.S. Pinafore is one of the earlier collaborations between Gilbert and Sullivan, and is arguably the first to make them a powerhouse duo of the late 19th century stage, and a household name. After being brought together by theatre manager Richard D’Oyly Carte to create Trial By Jury, a one act opera to be presented before a production of Offenbach’s La Perichole that became a surprise hit, the pair were reunited in 1877 and created The Sorcerer. This full length comic opera satirized several operatic tropes of magic and romance gone awry, but also included a plot line where characters from opposite ends of the social spectrum were compelled to fall in love with each other. Gilbert returned to this idea when he wrote H.M.S. Pinafore in 1878, building upon the commentary on the class system as multiple characters within the opera are in love with a character that society would consider inappropriate.\n\nGilbert also included a dose of political satire in the character of Sir Joseph Porter, the head of the British Navy who has never been to sea. At the time, the post of First Lord of the Admiralty was filled by W.H. Smith, a political appointee with no military experience. Smith had made his fortune establishing and running a chain of shops that sold books, newspapers, and stationary. Going in to politics in 1868, Smith was appointed to head the Royal Navy by Prime Minister Benjamin Disraeli in 1877, a year before Gilbert started work on Pinafore. While Gilbert would deny that he based the character on Smith, Disraeli himself would refer to him as “Pinafore Smith” for years afterwards.\n\nTo conclude, I would like to offer special thanks to our founding Artistic Director, Dennis Britten, for founding this company ten years ago. It has been my pleasure to be a part of it through all that time, and I look forward to leading the company into a bright and successful future, filled with our trademark Absurdity Done In Complete Sincerity!\n\nLaurence Cox,\nArtistic Director\nALLEN DENISON (Bob Becket)\nH. M. S. Pinafore is Allen’s fifth role with Light Opera of Portland. He is a Portland native and has lived here most of his life. He first became interested in Gilbert and Sullivan when attending Portland’s New Savoy Company Productions at the Oriental Theater in the 1950s. Non-G&S roles in Portland theater include Narrator/Actor 4 in Around the World in 80 Days, President Roosevelt in Annie, and Otis in Suite Surrender. He appreciates the support of his castmates and crewmates, his incredible wife and family, coaches, friends, and many others who know who they are.\n\nANNE KOLIBABA LARKIN (Chorus of Sisters, Cousins and Aunts)\nAnne Kolibaba Larkin has been active in LOoP for several years, both onstage and behind the scenes. Other local credits include chorus roles for Mock’s Crest, Broadway Rose, and Lakewood theaters. Anne is a cantor at St. Philip Neri and All Saints Catholic churches. She and her husband, Jerry Larkin, are members of Laurelhurst Dance Club.\n\nBEATRIZ ABELLA (Little Buttercup)\nBeatriz Abella is a first-generation Filipino-American that was born and raised in Alaska. A mezzo-soprano, she studied Music and Business Administration at Southern Oregon University. Beatriz performed classical and musical theatre repertoire in San Francisco, Seattle, Germany, Mexico, the Czech Republic, and at a variety of venues including the Oregon Cabaret Theatre and New York City’s Carnegie Hall. Beatriz received Camelot Theatre’s 2017 Best Character Actress Award and appeared onstage with multiple theatre companies including Brava! Opera Theater and James M. Collier Young Artist Program, Mocks Crest Opera, Portland Opera, and in Light Opera of Portland’s “Princess Ida” as “Lady Blanche.” In 2020, she made her film debut in 945 Productions’ TV series “Buried” as “Kane.” In 2021, she continued Kane’s story in Volcano Beach Productions’ short action-film series “Quicksand,” and was cast as “Orfeo” in Opera Cecilia’s inaugural production of Gluck’s “Orfeo ed Euridice.” Proud of her Filipino heritage, Beatriz continues to prioritize diversity and inclusivity with her artistic pursuits.\n\nBETH KAHLEN (Chorus of Sisters, Cousins and Aunts)\nBeth maintains a performance studio for non-classical singing and speaking, where she especially enjoys working with singer-songwriters and adult beginners. Beth has performed in various musicals, performance troupes, dramatic productions and bands (yes, that’s redundant) throughout her many years on stage. She continues to lovingly contribute to the long and storied history of writing, performing and laughing with her vocal jazz trio, the Swizzle Chicks. HMS Pinafore is Beth’s third production with LOoP!. bethkahlen.com\nBRYNA MONTGOMERY (Chorus of Sisters, Cousins and Aunts)\nBryna Montgomery is thrilled to be back with Light Opera of Portland. Bryna has performed with Lakewood Theater Company, Broadway Rose Theater Company, Musical Theater Company, Theater in the Grove, Slocum House, Mount Hood Rep., Portland opera, Mock's Crest Theater, Sylvia’s, San Jose Civic Light Opera and is a company member of Northwest Senior Theater.\n\nCASEY LEOBOLD (Bill Bobstay)\nCasey is proud to be making his Portland area theater debut as Billy Bobstay in HMS Pinafore with LOOP. He recently moved back to Oregon from Idaho where he performed extensively with Opera Idaho. Recent musical theater roles have included Sweeney Todd in Sweeney Todd, Emile DeBeque in South Pacific and an award winning run as the voice of the plant in Little Shop of Horrors.\n\nRegularly working with professionals to improve voice and acting skills, He is now looking forward to working in the opera and musical theater scene in his home state of Oregon.\n\nCATHRINE HUARD (Chorus of Sisters, Cousins and Aunts)\nCathrine Huard is a vocal performing artist based in Beaverton, Oregon. She fell in love with 40’s jazz as a teenager listening to her parents’ albums, and continues to enjoy all styles of jazz. She began her performing career in 2001 singing with an internationally renowned barbershop chorus, and continued singing in barbershop choruses and quartets until 2016. She has performed with Light Opera of Portland since 2017.\n\nShe is currently pursuing a Bachelor of Arts in Vocal Performance at Portland State University.\n\nDAVID RIDLEY (Dick Deadeye)\nDavid’s adventures in theatre have lasted four decades and counting. Of the many roles he has played, his favorites include Matt in The Fantasticks, Jonathan Jasper in The Mystery of Edwin Drood, Jonathan Peachum in The Three-Penny Opera, The Minstrel in Once Upon a Mattress, Otto Von Bruno in Bullshot Crummond, and Lloyd Dallas in Noises Off. He has a BA in Theatre from Lewis and Clark College and an Ed.M from Oregon State University. As always, he credits his wife Jillane and daughter Emma for their support.\n\nHAROLD WILLIAMS (Chorus of Sailors)\nHarold joined the Light Opera of Portland playing trombone in the orchestra for “The Student Prince” and “The Mikado”. He moved onstage with the chorus for “We Met in Moscow” and “Princess Ida”. He has sung for 5 years with Vox Academy’s Healing Voices Choir and currently sings with the Vancouver Bravo Chorus. He plays trombone with the Vancouver Community Concert Band and various small brass ensembles. He also enjoys the ukulele and singing from the “Great American Songbook”.\n\n8\nJAMES MONTGOMERY (Chorus of Sailors)\nJames Montgomery makes his fifth appearance for LOOP. The veteran performer has appeared on many stages across the country, touring in Once Upon A Mattress, Mr. Roberts, The Music Man and others. In Portland, he portrayed the brutal Frank Maurrant in Kurt Weill’s Street Scene and has sung in Portland Opera’s Turandot, Der Fliegende Hollander and Don Carlo. He has appeared in over eighty area productions at such venues as Lakewood Theatre, Broadway Rose, Mt. Hood Rep, Firehouse Theatre, Mock's Crest and Musical Theatre Co among many others. Favorite roles include Judge Turpin in Sweeney Todd, Scrooge in A Christmas Carol, King Kaiser in My Favorite Year, Captain Von Trapp in The Sound of Music, Abner Dillon in 42nd Street and Judge Coffey in Inherit the Wind. James recently played Tom Sawyer in The Boys in Autumn for American Reader’s Theatre, Mr. Laurence in Little Women, Judge Roan/Old Soldier in the acclaimed Staged production of Parade, Fogarty in Chicago and The Chairman in The Mystery of Edwin Drood", "num_tokens": 2048} {"category": "olmocr_science_pdfs-entertainment", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-entertainment/part-00-00000.npy", "text": "1 Bob Dylan (harmonica).\n4 Donnie Herron (violin).\n6 Donnie Herron (mandolin).\n\nNotes\nOther Bob Dylan concerts in Christchurch, New Zealand:\n12 September 1998 Westpac Trust Entertainment Centre\n26 February 2003 Westpac Trust Entertainment Centre\n10 September 2014 Horncastle Arena\n28 August 2018 Horncastle Arena\nStereo audience recording, 120 minutes.\n\nSession info updated 28 August 2018.\n29510 TSB Arena \nWellington, New Zealand \n10 August 2007\n\n1. Cat's In The Well \n2. It Ain't Me, Babe \n3. Watching The River Flow \n4. Lay Lady Lay \n5. Rollin' And Tumblin' \n6. When The Deal Goes Down \n7. Honest With Me \n8. Tangled Up In Blue \n9. Spirit On The Water \n10. Highway 61 Revisited \n11. My Back Pages \n12. Stuck Inside Of Mobile With The Memphis Blues Again \n13. Nettie Moore \n14. Summer Days \n15. Ballad Of A Thin Man \n\n16. Thunder On The Mountain \n17. Blowin' In The Wind\n\nConcert # 239 with the 20th Never-Ending Tour Band: Bob Dylan (vocal, guitar & keyboard), Stu Kimball (guitar), Denny Freeman (guitar), Donnie Herron (violin, mandolin, steel guitar), Tony Garnier (bass), George Recile (drums & percussion).\n\n1-4 Bob Dylan (electric guitar). \n5-17 Bob Dylan (electric keyboard). \n8, 9, 11, 15 Bob Dylan (harmonica). \n1, 13, 17 Donnie Herron (violin). \n5 Donnie Herron (mandolin). \n\nNotes. \nPrevious Bob Dylan concerts in Wellington, New Zealand: \n5 February 1986 Athletic Park \n10 September 1998 Queens Wharf Event Centre \n24 February 2003 Queens Wharf Event Centre\n\n9 new songs (52%) compared to previous concert. 9 new songs for this tour. \nStereo audience recording, 115 minutes. \n29520 Vector Arena\nAuckland, New Zealand\n11 August 2007\n\n1. Rainy Day Women # 12 & 35\n2. Don't Think Twice, It's All Right\n3. Watching The River Flow\n4. Just Like A Woman\n5. Rollin' And Tumblin'\n6. When The Deal Goes Down\n7. Things Have Changed\n8. Tangled Up In Blue\n9. Spirit On The Water\n10. Highway 61 Revisited\n11. Desolation Row\n12. Most Likely You Go Your Way (And I'll Go Mine)\n13. Nettie Moore\n14. Summer Days\n15. Masters Of War\n\n16. Thunder On The Mountain\n17. All Along The Watchtower\n\nConcert # 240 with the 20th Never-Ending Tour Band: Bob Dylan (vocal, guitar & keyboard), Stu Kimball (guitar), Denny Freeman (guitar), Donnie Herron (violin, mandolin, steel guitar), Tony Garnier (bass), George Recile (drums & percussion).\n\n1-3 Bob Dylan (electric guitar).\n4-17 Bob Dylan (electric keyboard).\n4, 8, 9 Bob Dylan (harmonica).\n7, 13 Donnie Herron (violin).\n5, 11 Donnie Herron (mandolin).\n\nNotes.\nOther Bob Dylan concerts in Auckland, New Zealand:\n9 March 1978 Western Springs Stadium\n7 February 1986 Mt Smart Stadium\n18 April 1992 Super Pop Tent\n7 September 1998 North Shore Event Centre, Glenfield\n8 September 1998 North Shore Event Centre, Glenfield\n21 February 2003 North Shore Event Centre, Glenfield\n22 February 2003 North Shore Event Centre, Glenfield\n26 August 2007 Civic Theatre\n27 August 2007 Civic Theatre\n30 April 2011 Vector Arena\n26 August 2018 Spark Arena\n\n8 new songs (47%) compared to previous concert. 3 new songs for this tour.\nStereo audience recording, 115 minutes.\nSession info updated 26 August 2018.\n29530 Brisbane Entertainment Centre \nBrisbane, Queensland, Australia \n13 August 2007\n\n1. *Cat's In The Well* \n2. *It Ain't Me, Babe* \n3. *Just Like Tom Thumb's Blues* \n4. *Lay Lady Lay* \n5. *Rollin' And Tumblin'* \n6. *When The Deal Goes Down* \n7. *High Water (For Charley Patton)* \n8. *The Lonesome Death Of Hattie Carroll* \n9. *Honest With Me* \n10. *Spirit On The Water* \n11. *Highway 61 Revisited* \n12. *Tangled Up In Blue* \n13. *Nettie Moore* \n14. *Summer Days* \n15. *Ballad Of A Thin Man* \n\n—\n\n16. *Thunder On The Mountain* \n17. *All Along The Watchtower*\n\nConcert # 241 with the 20th Never-Ending Tour Band: Bob Dylan (vocal, guitar & keyboard), Stu Kimball (guitar), Denny Freeman (guitar), Donnie Herron (violin, mandolin, steel guitar), Tony Garnier (bass), George Recile (drums & percussion). \n\n1-4 Bob Dylan (electric guitar). \n5-17 Bob Dylan (electric keyboard). \n8, 9, 10, 12, 15 Bob Dylan (harmonica). \n1, 13 Donnie Herron (violin). \n5, 8 Donnie Herron (mandolin). \n7 Donnie Herron (banjo).\n\n*Notes* \nOther Bob Dylan concerts in Brisbane, Queensland, Australia: \n12 March 1978 Festival Hall \n13 March 1978 Festival Hall \n14 March 1978 Festival Hall \n15 March 1978 Festival Hall \n28 February 1986 Lang Park \n1 March 1986 Lang Park \n28 February 1992 Entertainment Center \n1 September 1998 Entertainment Center \n30 March 2001 Entertainment Center \n11 February 2003 Entertainment Centre \n25 August 2014 Brisbane Convention & Exhibition Centre \n27 August 2014 The Tivoli, Fortitude Valley \n24 August 2018 Entertainment Centre \n8 new songs (47%) compared to previous concert. 3 new songs for this tour. \nStereo audience recording, 115 minutes.\n\nSession info updated 25 August 2018.\n29540 Entertainment Centre \nSydney, New South Wales, Australia \n15 August 2007\n\n1. Cat's In The Well \n2. The Times They Are A-Changin' \n3. Watching The River Flow \n4. It's Alright, Ma (I'm Only Bleeding) \n5. When I Paint My Masterpiece \n6. Rollin' And Tumblin' \n7. Workingman's Blues #2 \n8. 'Til I Fell In Love With You \n9. A Hard Rain's A-Gonna Fall \n10. Tangled Up In Blue \n11. Spirit On The Water \n12. Highway 61 Revisited \n13. Nettie Moore \n14. Summer Days \n15. Masters Of War \n\n —\n\n16. Thunder On The Mountain \n17. All Along The Watchtower\n\nConcert # 242 with the 20th Never-Ending Tour Band: Bob Dylan (vocal, guitar & keyboard), Stu Kimball (guitar), Denny Freeman (guitar), Donnie Herron (violin, mandolin, steel guitar), Tony Garnier (bass), George Recile (drums & percussion).\n\n1-5 Bob Dylan (electric guitar). \n6-17 Bob Dylan (electric keyboard). \n8, 10, 11 Bob Dylan (harmonica). \n1, 4, 13 Donnie Herron (violin). \n6, 9 Donnie Herron (mandolin).\n\nNotes. \nOther Bob Dylan concerts in Sydney, New South Wales, Australia: \n13 April 1966 Sydney Stadium \n1 April 1978 Sportsground, Sydney \n10 February 1986 Entertainment Centre \n11 February 1986 Entertainment Centre \n12 February 1986 Entertainment Centre \n13 February 1986 Entertainment Centre \n24 February 1986 Entertainment Centre \n25 February", "num_tokens": 2048} {"category": "olmocr_science_pdfs-entertainment", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-entertainment/part-00-00000.npy", "text": " the board, priority one! I want everyone on this! Wake up Zeddi! Get him back in men’s clothing!\n(MORE)\nThe Robbery Division starts scrambling. Dance Instructor takes the photo of a porcelain figurine labeled “STOLEN” and moves it down a notch on a cork board. Drunken Zeddi tries to take a HOLSTERED PISTOL from it’s peg on the wall. Mound grabs it first.\n\n**MOUND OF ASSHEAD**\nToo slow. I get the pistol today.\n\n**ZEDDI**\nIt’s my turn!\n\n**MOUND OF ASSHEAD**\nBoss!\n\n**ZEDDI**\nFine, take it! Just don’t leave this one on the bus!\n\nLajos steps between them.\n\n**LAJOS VARJÚ**\nSeniority! Hand it over.\n\nMound unhappily helps Lajos put on the cool shoulder holster. Lajos slides on some mirrorshades. Everyone nods their approval: that Lajos is one suave fuck.\n\n**LAJOS VARJÚ**\nThat’s it, gentlemen. Let’s go grill some witnesses.\n\n**BIGFOOT**\nBut I’m only two away from the record!\n\n**LAJOS VARJÚ**\nMaybe you didn’t hear me, clown shoes -- Budapest is turning into the wild west! Now ship out!\n\nBigfoot reluctantly shuffles out the door with the rest of the men. Lajos whispers to Keszthelyi.\n\n**LAJOS VARJÚ**\nMy record stands.\n\nKeszthelyi looks on in disbelief...\nEXT. APARTMENT BUILDING - DAY\n\nBouncer Viktor and a Driver are asleep inside the black sedan. They jolt awake when Attila knocks on the window.\n\nATTILA\nSorry for the delay. I got the money here, plus some interest. And these are for you.\n\nHe hands over the MONEY and a box of PASTRIES.\n\nATTILA\nJust some crumb cakes. You guys put in long hours. There’s a tip for you in the box. Don’t tell the boss. I know it’s customary for you to punch me again, but I also brought coffee. (he hands that in too) Okay?\n\nBouncer Viktor counts out his tip. It’s nice.\n\nBOUNCER VIKTOR\nYeah. Okay. (beat) Come back any time, player...\n\nHe pats Attila on the cheek. The Sedan drives away.\n\nINT. BASEMENT APARTMENT - DAY\n\nAttila stuffs money into his coffee can. Don watches.\n\nATTILA\nYou should have seen it. The other day it’s an elbow to the face. Today it’s “come back any time”. All because of this stuff. No one gives respect, you have to buy it. It’s disgusting.\n\nThe can is full and he’s still got a big pile of cash.\n\nATTILA\n(sighs) What the hell do we do now? I can’t have all this lying around. It’s evidence.\n\nAs Attila spreads out the cash, considering his options, AC/DC’s “What do You do for Money, Honey” begins to play. Attila looks at Don and smiles mischievously...\nINT./EXT. RED OPEL – DAY\n\nA used RED OPEL (one door primer grey), speeds down the street with the radio blasting. A hockey bobble-head bounces on the dash. Attila smiles under his shades, behind the wheel of his new car...\n\nINT. BASEMENT APARTMENT – DAY\n\nAttila installs a new TV and STEREO. His place now has FURNITURE. It’s all gaudy as hell, but new. He puts down custom water and food bowls labeled “DON”. Don looks on from his new leopard print DOG BED.\n\nINT. MCDONALD’S – DAY\n\nA CASHIER looks bored. She perks up when Attila whips off his shades and struts to the counter in slo-mo. He’s wearing an outrageous suit and red cowboy boots. He points to a picture of the BIG MAC with confidence. Impressed, the Cashier rings him up.\n\nEXT. UTE PARKING LOT – DAY\n\nAttila pulls his Opel next to Bela Benko’s Mitsubishi. He hops out in his Puma tracksuit and calls over Petr, the car wash kid.\n\nATTILA\nWhat’s he paying you?\n\nPETR\nThree florints.\n\nATTILA\nI’ll give you five if you do mine first.\n\nPetr grabs his gear and heads over. He’s super skinny, with thick coke-bottle glasses and protruding teeth.\n\nATTILA\nWhat’s your name, kid?\n\nPETR\nPetr.\n\nATTILA\nYou got a pretty good enterprise going here.\n\nPETR\nI used to work for my mother.\nHe indicates a small car wash on the corner. It’s called “EVA’S SUPER-WASH”. EVA, 30’s and plain, scowls.\n\nPETR\nBut she was cock-blocking my style. I had to blow that scene and get my own thing going. You pay first.\n\nAttila gives him the coins. Petr starts vacuuming under the seats, snagging something. It’s a sleazy Hungarian nudie magazine, “Kurva”. Petr looks at it, wide-eyed.\n\nATTILA\nThat’s your tip. Enjoy it in good health.\n\nINT. UTE HOCKEY RINK - DAY\n\nDuring practice, Attila prowls in front of his net with newfound authority. He screams at the YOUNGER PLAYERS.\n\nATTILA\nHey shithead! How could you miss that play? Am I gonna have to make it for you next time? That’s your man! Don’t look at me! Skate! Te fasz!\n\nBela Benko nods at his crony BUBU, who cranks back and SLAPS a screamer right at Attila’s head. THWAP! Attila catches it right in his glove.\n\nATTILA\nAgain! This time like you’ve got a dick!\n\nThe rink quiets, impressed...\n\nEXT. UTE TRAINING FACILITY - PARKING LOT - DAY\n\nAttila struts out of the locker room. Just as he gets to his Opel, Eva marches up to him.\n\nEVA\nHey you! Yeah, you, pervert! Did you give this to my son?\n\nShe holds up the dirty magazine.\nATTILA\nOkay, guilty. But, come on, every growing boy needs a little fuel for the rocket. I had to get by with the girl on the syrup packet.\n\nEVA\n(disgusted)\nJust... Stay away from my kid.\n\nATTILA\nLady, loosen up, okay? I was just being friendly. The other guys can be rough on him because, you know, he’s...\n\nEVA\nHe’s what?\n\nATTILA\nYou know. Different. Big glasses, the teeth. Don’t get me wrong, he’s a nice kid. But they call him “hamster”.\n\nEVA\n(fuming)\nYou want your car washed, come to me, not my son. Otherwise I’m gonna call a cop.\n\nShe slaps the magazine against his chest and storms off.\n\nINT. CASINO - NIGHT\nBela Benko and the Teammates gamble together.\n\nBUBU\nWhat was up with that Panther today?\n\nBELA BENKO\nHe’s got a big mouth for a practice goalie. You see the way he crawled out of here last time?\n\nBUBU\nHe’s not crawling tonight.\n\nHeads turn to where Bubu is pointing -- Attila is coming through the door with a HOOKER on each arm.\n\nATTILA\nBoys! Boys! Anybody thirsty?\nThe Whiskey Robber gets a Christmas present he likes: a bottle of his signature drink, Johnnie Walker Red.\nAttila slaps a wad of cash on the bar. Bela Benko fumes as his cronies abandon him for Attila.\n\nATTILA\n(showing off his hookers)\nThis is Zdenka. And this is Marin. Ladies, these are the boys.\n(he turns the girls loose)\nShare and share alike, that’s what I say. Hey! Drink up! To all my friends!\n\nEveryone toasts with Attila. He smiles at Bela Benko. For once, Attila is the life of the party...\n\nINT. BASEMENT APARTMENT – LATER THAT NIGHT\n\nAttila lays on his floor drunk, gnawing on a pig’s foot. Don looks at him expectantly.\n\nATTILA\nYou’re right. 20% for you.\n(he tosses Don the foot)\nWe’re the king shits now, Don.\n\nHe fingers the empty coffee can laying next to him.\n\nATTILA\nWe’re the king shits...\n\nHe considers those words as he says them. They feel quite nice in his mouth. Maybe even a little addictive. He smiles as he passes out...\n\nEXT. EVA’S SUPER-WASH – DAY\n\nAttila walks up to find Eva.\n\nATTILA\nExcuse me, miss Eva? I just wanted you to know, I spoke to your boy. I told him that magazine was a big mistake. Exploits women and things like that. It won’t happen again.\n\nEVA\nFine.\n\nATTILA\nI hope you don’t mind, but I put him to work.\nEVA\nI told you I don’t want him washing your car anymore.\n\nATTILA\nHe’s not.\n\nShe looks over. Next to the Opel, Petr is washing Don.\n\nATTILA\nThat’s Don. He’s cool. Petr said he’d take care of him while I go mail a letter. Anyway, sorry.\n\nEva watches as Attila buys a bouquet of FLOWERS from", "num_tokens": 2048} {"category": "olmocr_science_pdfs-entertainment", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-entertainment/part-00-00000.npy", "text": "s around the parlor slowly.\n\nNANCY\nThis entire house is an antique!\n\nAlex subtly gives Nancy a “remember what we discussed” look. She assumes her “buyer’s face.”\n\nNANCY\nOf course, we’re in no hurry.\n\nKENNETH\nPerhaps this isn’t for you then. I’m sure it’ll be sold by Monday.\n\nNancy digs her nails deeply into Alex’s arm.\n\nKENNETH\n... original inlaid parquet floor.\n\nThe floor is scuffed, gouged, pocked and puttied.\n\nKENNETH\nA lot of story there.\nNANCY\nCan you imagine all the furniture that’s lived here over the years?\n\nKenneth gestures to an alcove of bookshelves.\n\nKENNETH\nThis is the library...\n\nALEX\n(can’t stop himself)\nWow.\n\nNancy playfully shoots him an exaggerated “buyer’s face.” He laughs, busted.\n\nNANCY\nAlex is a writer.\n\nKENNETH\n(doesn’t give a shit)\nReally? What do you write?\n\nALEX\n(modestly)\nI wrote a book, you probably never heard of it… “Unbodied Souls.”\n\nNANCY\nIt was nominated for all sorts of first novel awards.\n\nKENNETH\n(not apologetic)\nI don’t read books.\n\nNANCY\nAlex is almost done with his second novel. Which would look great\n(spokesmodel flourish)\nin these magnificent, built-in Nineteenth Century bookcases!\n\nAlex obviously likes that idea. But...\n\nALEX\nToo bad it’s out of our price range.\n\nNANCY\n(gesturing)\nIt is at the top of our price range.\nALEX\n(gesturing above her)\nOver the top.\n\nNANCY\n(intertwining her fingers\nwith his)\nAt the tippy top.\n\nKENNETH\nWould you like to see the bedroom?\n\nNANCY\nYes please.\n\nINT. APARTMENT – BEDROOM DOOR\n\nKenneth pushes open a large wooden accordion divider. He’s\nsaved the best for last...\n\nThey walk into the light. Nancy actually GASPS. The bedroom\nis huge; there is a curved front window area that looks out\nto the leafy street.\n\nAs they walk into the center of the room, Alex steps on a\nfloorboard that CREAKS LOUDLY. He stops to look down at it.\n\nNancy semi-pirouettes over to the fireplace; Kenneth follows.\n\nKENNETH\nFireplace is tiger-eye maple—\n\nHe is interrupted by SEVERAL CREAKS. He looks over to see\nAlex STEPPING REPEATEDLY on the creaky floorboard.\n\nALEX\n(re: floorboard)\nThat could get annoying.\n\nKENNETH\nYes.\n(back to fireplace)\nIf you look closely you’ll see it’s\nactually hundreds of hand-carved\npieces fitted perfectly together.\n\nNANCY\n(caressing fireplace)\nWho could have done this?\n\nKENNETH\nCraftsmen.\nNANCY\nI miss craftsman.\n\nKENNETH\nAnd over here you’ve got a little alcove, if that’s the word, a round outcropping.\n\nNANCY\nA nook!\n (excitedly, to Alex)\nA writer’s nook.\n\nAlex looks at the nook, and out the windows at the park. He is buying into the fantasy.\n\nALEX\nA writer’s nook.\n\nNANCY\n (innocently caught up)\nOr it could be a nursery!\n (notices something)\nEw.\n\nThe opposite wall contains a large interior window that has been painted over for some reason. Nancy approaches it, frowning, but then looks more closely. She scratches at the paint, which flakes off in several layers.\n\nNANCY\nIs there stained glass under here?\n\nKENNETH\n (unctuous smile)\nCould be.\n\nINT. APARTMENT – FOYER/PARLOR\n\nThe three emerge from the bedroom.\n\nKENNETH\nYou’ve got my card if you want to make an offer...\n\nAlex’s attention is caught by a large spiral planter.\n\nNANCY (O.C.)\nCan you call us if anybody else makes one?\n\nKENNETH (O.C.)\nI’m not supposed to, but...\nOver the proceeding, we follow Alex’s gaze up the planter. The plants still have price tags. The wrought-iron planter spirals to the top, where a rather obvious circular piece of wood has been painted white to match the ceiling.\n\nALEX\nExcuse me, is this a stairway?\n\nNow that he mentions it, it very clearly is a spiral staircase. Kenneth doesn’t miss a beat.\n\nKENNETH\nOh, I’m sorry. I thought you realized. This is a duplex.\n\nALEX\nThere’s another floor?\n\nKENNETH\nIt’s on the listing sheet. In your hand.\n\nAlex looks at the listing sheet. Fucking Kenneth is right.\n\nNANCY\n(a little worried)\nWhy’s it sealed off? Were there a slew of murders up there? You have to tell us if there were.\n\nKENNETH\nOh, nothing like that. It’s just, there’s a sweet old lady who lives up there…\n\nALEX\nA tenant.\n\nKENNETH\nYes, and it is rent-controlled, so… but she’s so sweet and so, (annoying chuckle) she’s gotta be a hundred years old.\n\nALEX\n(good-natured sigh)\nWell, that’s unfortunate, because--\n\nNANCY\nCan we meet her?\n\nKenneth CHUCKLES, in a chortling sort of way.\nINT. BROWNSTONE – LOBBY\n\nAs they climb the stairs, Nancy caresses the banisters.\n\nALEX\nRent-controlled means we can’t kick her out, right?\n\nNANCY\nAlex!\n\nINT. BROWNSTONE – SECOND FLOOR LANDING – CONTINUOUS\n\nKenneth stops at a door in mid-landing.\n\nKENNETH\n(that chuckle again)\nA legitimate question. No, you can’t evict her. She has to decide to leave, or...\n(as if changing subject)\nPoor dear hasn’t been feeling well.\n\nHe KNOCKS, loudly.\n\nKENNETH (CONT.)\nShe’s hard of hearing.\n\nThe three stand there for a long beat.\n\nKENNETH (CONT.)\nIt may take a little while for her to get to the door.\n\nThey all smile at each other. After another longish beat, we hear a lock being LABORIOUSLY OPENED on the other side. There is another beat.\n\nKENNETH (CONT.)\n(mouthing, low volume)\nArthritis.\n\nWe hear a second lock being opened with a LONG GRINDING CREAK. A moment later, the door opens slowly, JERKING to a halt at the end of the security chain.\n\nNancy’s eyes widen in expectation; Alex is curious. Their expressions flash to shock, then polite suppression of shock.\n\nINSIDE THE DOOR\n\nPeering behind the chain is MRS. CONNELLY. She’s a tiny, frail lady, in a housecoat that may be as old as she is.\nShe stares unblinkingly; this, combined with her total lack of make-up, makes her looks more than a little like a corpse. After a moment, her face flashes in recognition; she smiles sweetly and speaks with a slight Irish brogue.\n\nMRS. CONNELLY\nKenneth!\n\nKENNETH\nGood afternoon, Mrs. Connelly! How are you feeling today?\n\nMRS. CONNELLY\nOh, don’t let me burden you with my troubles...\n(then)\nI don’t feel good, Kenneth.\n\nON KENNETH\nNancy peeks over his shoulder into the apartment.\n\nKENNETH\nI’m sorry to hear that. I’ve brought by a young couple, who might want to buy the apartment.\n\nKenneth steps back to reveal Nancy on tip-toe; she drops down quickly and interlocks arms with Alex.\n\nNANCY\nGood afternoon, Mrs. Connelly! I’m Nancy, and this is my husband, Alex.\n\nALEX\n(tiny wave)\nHello.\n\nNANCY\nDo you mind if we look around?\n\nNANCY’S POV\nAs Mrs. Connelly speaks, Nancy’s gaze drifts above her head. She sees only a sliver: another magnificent fireplace, its mantle draped with Catholic memento mori.\n\nMRS. CONNELLY (OVER PRECEDING)\nIt’s in a horrible state. Haven’t had the energy to tidy up in ages. I can only imagine what it must smell like.\nNANCY\nWe’ll be in and out in a jif.\n\nMRS. CONNELLY\nSorry, dear. I don’t feel up to it.\n\nThe door CLOSES on Nancy’s face. We hear the door slowly being LOCKED again. Then, from behind the door:\n\nMRS. CONNELLY (O.C.)\n(Long sad coughing; tiny squeak of sickly despair.)\n\nNancy and Alex are thinking the same thing.\n\nKENNETH\nPoor dear.\n\nEXT. BROWNSTONE – STOOP\n\nKenneth gestures across the street.\n\nKENNETH\nAnd you’ve got the park right there, of course.\n\nNancy sees kids in the park. She emits a YEARNING SIGH.\n\nKENNETH (CONT.)\nShame you’re not ready to buy. But there’ll be other places. Not as special but... Maybe we should look a little deeper into Brooklyn...\n\nAlex takes one look and his crestfallen wife and:\n\nALEX\nWe’ll take it.\n\nEXT. LOWER EAST SIDE – SIXTH STREET – NIGHT\n\nAlex and Nancy sit in the window of a restaurant. A neon sign above them reads, “NY Delhi.”\n\nINT. NY DELHI – CONTINUOUS\n\nA cheesy", "num_tokens": 2048} {"category": "olmocr_science_pdfs-entertainment", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-entertainment/part-00-00000.npy", "text": "\nFriday-August 10, 1984\n8:00 pm\n\nTickets on sale now\n\nThe Old Town Cafe\nSan Diego, CA\n9:00 pm\n\nTickets on sale now\n\nA Walking Tour in the Gaslamp Quarter, Saturday, August 18, 6:00 to 11:00 pm\n\n2 stages of continuous music • Rockin' 5th Ave. between J & K\n\nNeville Brothers\nRobert Cray Band\nJack Mack & The Heart Attack\nBeat Farmers\n\nAll this for 6 bucks\n\n\nSan Diego Watercolor Society\n\n1984 INTERNATIONAL EXHIBITION\nJULY 28-AUGUST 20\nSan Diego Civic Center\nART GALLERY\n\n9/11 welcomes!\n\nMICHELOB STREET SCENE II\nin the Gaslamp Quarter\nSaturday, August 18, 6:00 to 11:00 pm\n\nNeville Brothers\nRobert Cray Band\nJack Mack & The Heart Attack\nBeat Farmers\n\nAll this for 6 bucks\n\n\nSan Diego Watercolor Society\n\n1984 INTERNATIONAL EXHIBITION\nJULY 28-AUGUST 20\nSan Diego Civic Center\nART GALLERY\n\n9/11 welcomes!\n\nMICHELOB STREET SCENE II\nin the Gaslamp Quarter\nSaturday, August 18, 6:00 to 11:00 pm\n\nNeville Brothers\nRobert Cray Band\nJack Mack & The Heart Attack\nBeat Farmers\n\nAll this for 6 bucks\n\n\nSan Diego Watercolor Society\n\n1984 INTERNATIONAL EXHIBITION\nJULY 28-AUGUST 20\nSan Diego Civic Center\nART GALLERY\n\n9/11 welcomes!\n\nMICHELOB STREET SCENE II\nin the Gaslamp Quarter\nSaturday, August 18, 6:00 to 11:00 pm\n\nNeville Brothers\nRobert Cray Band\nJack Mack & The Heart Attack\nBeat Farmers\n\nAll this for 6 bucks\n\n\nSan Diego Watercolor Society\n\n1984 INTERNATIONAL EXHIBITION\nJULY 28-AUGUST 20\nSan Diego Civic Center\nART GALLERY\n\n9/11 welcomes!\n\nMICHELOB STREET SCENE II\nin the Gaslamp Quarter\nSaturday, August 18, 6:00 to 11:00 pm\n\nNeville Brothers\nRobert Cray Band\nJack Mack & The Heart Attack\nBeat Farmers\n\nAll this for 6 bucks\n\nAttention Survivors of the Saturday, July 21 \"Castle Party\" \n\nA claim of 25 million dollars is being filed on the behalf of the teenagers involved and their parents who suffered emotional stress and shock as a result of the Coast Guard intentionally sending party guests off shore.\n\nSincerely, The Excelsior Sunbeam Club\n\nIf you attended please call 297-0060 to leave your name and number and we'll get back to you.\n\nP.S. - We Survived!\nT-shirts will soon be available for those who were stranded on the Castle.\n\n\"TINTYPES IS DELIGHTFUL\",\n...the show is a high energy, clean physical timing and potent vocal harmonies combine for an evening that combines cabaret and classic standards. \n\nWilliam Starke. LOS ANGELES TIMES.\n\nExperience A Grand Of Musical Revue of America July 20 - August 25\n\nTINTYPES by Mary Site, Cary Peck and Mark Hans\n\nTINTYPES\nby Mary Par, Cary Peck and Mark Harn\n\nLAMB'S PLAYERS THEATRE\n550 PLAZA BLVD. - PACIFIC CITY\nand 15 minutes from downtown.\n474-4542\n\n\"Spend Your Summer Dancing\"\n\nClasses are offered in tap, jazz, hip-hop, and other styles, beginning through advanced levels for children and adults. Monday through Thursday, 6-9pm. Adult classes are taught by professionals. Learn from the professionals.\n\nChris Agnew, Ph.D. Faculty, Linda Rednors, All of Alex Unlimited\n\nMemorial Studios of Dance\n620 Sun Pacific Blvd. (550 Plaza Blvd.)\nSunrise Hotel. 474-7672, 32-5357\n\nBRAIN EXPANSION WITH JOHN-DAVID\n\n- Super memory\n- Concentration\n- Eliminate self-sabotage\n- Creative thinking\n- Left and right brain integration\n- Problem solving\n- Overcome fear\n- Increased confidence\n\n\"The greatest pleasure in life is doing what people say you can't do.\" - John- David\n\nTotal September Workshops:\nAugust 16-18, 23-30, 31 and September 1, 2, 3.\n150 individuals presented 360 workshops in 35 cities.\n\nWorkshop Schedule\n\nGuitar/Drum 9:00-12:00\nPainting/Sculpture 12:00-3:00\nComputer/Photography 3:00-6:00\n\n100% Money-Back Guarantee... Full refunds if student cancels for any reason. \n\nTotal Seminar Hours: Approx. 240 (240 mins.)\n\nJOHN-­DAVID LEARNING INSTITUTE\n\n1500 S. Ocean Ave. - P.O. Box 1300\nLa Jolla, CA 92038\n1-800-782-5053\n\n\"OCTOBER FEST\"\n\nA two-hour operetta with a modern opera music style. Performer's talent at its highest level. Under the direction of Jack Robinson, the cast is made up of the finest opera and musical theatre performers on the West Coast. The show will be held at the Gallery of Fine Arts, 1101 S. Western Ave., Los Angeles. Call 739-1200 for tickets.\n\n\"TWO NIGHTS\" \n\nAn evening of comedy and music featuring two of America's top comics, Dyanne Hall and Dave Barry. The show will be held at the Gallery of Fine Arts, 1101 S. Western Ave., Los Angeles. Call 739-1200 for tickets.\n\n\"THE HOUSE\" \n\nA one-man show about the life and times of a New York City real estate agent, written and performed by Charles Durning. The show will be held at the Gallery of Fine Arts, 1101 S. Western Ave., Los Angeles. Call 739-1200 for tickets.\n\n\"THE MILLION DOLLAR MARCH\" \n\nA musical revue featuring songs from the 1920's to the 1940's, performed by the Los Angeles Civic Light Opera. The show will be held at the Gallery of Fine Arts, 1101 S. Western Ave., Los Angeles. Call 739-1200 for tickets.\n\n\"THE BROADWAY MUSICAL\" \n\nA one-hour show featuring songs from Broadway musicals, performed by the Los Angeles Civic Light Opera. The show will be held at the Gallery of Fine Arts, 1101 S. Western Ave., Los Angeles. Call 739-1200 for tickets.\n\n\"THE GREAT HITS OF THE 60's\" \n\nA one-hour show featuring songs from the 1960's, performed by the Los Angeles Civic Light Opera. The show will be held at the Gallery of Fine Arts, 1101 S. Western Ave., Los Angeles. Call 739-1200 for tickets.\n\n\"THE ROYAL FAMILY\" \n\nA one-hour show featuring songs from the 1970's, performed by the Los Angeles Civic Light Opera. The show will be held at the Gallery of Fine Arts, 1101 S. Western Ave., Los Angeles. Call 739-1200 for tickets.\n\n\"THE MUNSTERS\" \n\nA one-hour show featuring songs from the 1980's, performed by the Los Angeles Civic Light Opera. The show will be held at the Gallery of Fine Arts, 1101 S. Western Ave., Los Angeles. Call 739-1200 for tickets.\n\n\"THE MILLION DOLLAR MARCH\" \n\nA one-hour show featuring songs from the 1920's to the 1940's, performed by the Los Angeles Civic Light Opera. The show will be held at the Gallery of Fine Arts, 1101 S. Western Ave., Los Angeles. Call 739-1200 for tickets.\n\n\"THE BROADWAY MUSICAL\" \n\nA one-hour show featuring songs from Broadway musicals, performed by the Los Angeles Civic Light Opera. The show will be held at the Gallery of Fine Arts, 1101 S. Western Ave., Los Angeles. Call 739-1200 for tickets.\n\n\"THE GREAT HITS OF THE 60's\" \n\nA one-hour show featuring songs from the 1960's, performed by the Los Angeles Civic Light Opera. The show will be held at the Gallery of Fine Arts, 1101 S. Western Ave., Los Angeles. Call 739-1200 for tickets.\n\n\"THE ROYAL FAMILY\" \n\nA one-hour show featuring songs from the 1970's, performed by the Los Angeles Civic Light Opera. The show will be held at the Gallery of Fine Arts, 110", "num_tokens": 2048} {"category": "olmocr_science_pdfs-entertainment", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-entertainment/part-00-00000.npy", "text": "td>\n
ShaniceSaving Forever For YouEnglish
ShaniceYesterdayEnglish
ShaniceWhen I Close My EyesEnglish
ShannonLet The Music PlayEnglish
Shannon, DelRunawayEnglish
Shannon, DelLittle Town FlirtEnglish
Shannon, DelThe Swiss MaidEnglish
Shannon, DelSea of LoveEnglish
Shapiro, HelenWalkin’ Back to HappinessEnglish
Sharkey, FeargalA Good HeartEnglish
Sharp, Dee DeeMashed Potato TimeEnglish
Sharp, KevinNobody KnowsEnglish
ArtistSong
------------------------------------------------------------------------------------------------
Sharp, TenYou
Sharpe, Rocky & The ReplaysRama Lama Ding Dong
Shatner, WilliamCommon People
Shaver, Billy JoeRide Me Down Easy
Shaw, SandiePuppet on a String
Shaw, Sandie(There's) Always Something There To Remind Me
Shaw, SandieLong Live Love
Shawanda, CrystalMy Roots Are Showing
Shawanda, CrystalYou Can Let Go
She & HimFools Rush In (Where Angels Fear to Tread)
She Wants RevengeThese Things
She Wants RevengeTear You Apart
SHeDAISYDon't Worry 'Bout A Thing
SHeDAISYPassenger Seat
SHeDAISYMine All Mine
SHeDAISYLucky 4 You (Tonight I'm Just Me)
SHeDAISYIn Terms Of Love
Sheehan, CiaranMy Wild Irish Rose
Sheer, IreenHeut' abend hab' ich Kopfweh
Sheer, IreenTennessee Waltz
Sheer, IreenKomm, ich mach das schon
Sheer, IreenFeuer
Sheer, IreenDu bist mein allergrößter Fehler
Sheeran, EdSave Myself
Sheeran, EdHappier
Sheeran, EdBiba Be Ye Ye
Sheeran, EdThe A Team
Sheeran, EdYou Need Me, I Don't Need You
Sheeran, EdLego House
Sheeran, EdKiss Me
Sheeran, EdDrunk
Sheeran, EdSmall Bump
Sheeran, EdGive Me Love
Sheeran, EdWake Me Up
Sheeran, EdU.N.I.
Sheeran, EdSkinny Love
Sheeran, EdGold Rush
Sheeran, EdI See Fire
Sheeran, EdSing
Sheeran, EdAll Of The Stars
Sheeran, EdDon't
Sheeran, EdThinking Out Loud
Sheeran, EdOne
Sheeran, EdI'm a Mess
Sheeran, EdAfire Love
Sheeran, EdPhotograph
Sheeran, EdTenerife Sea
Sheeran, EdMake It Rain (from Sons Of Anarchy)
Sheeran, EdWayfaring Stranger
Sheeran, EdBloodstream
Sheeran, EdRunaway
Sheeran, EdEven My Dad Does Sometimes
Sheeran, EdPhotograph (Felix Jaehn Remix)
Sheeran, EdSupermarket Flowers
Sheeran, EdThis
Sheeran, EdShape of You
Sheeran, EdCastle on the Hill
Sheeran, EdHow Would You Feel (Paean)
Sheeran, EdShape of You (Stormzy Remix)
Sheeran, EdEraser
\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
ModelVMRA
$\\frac{\\partial d}{\\partial k}$-0.2120.002
$\\frac{\\partial d}{\\partial c}$-1.7960.144
$\\frac{\\partial d}{\\partial l}$-9.6000.102
$\\frac{\\partial d}{\\partial q}$0.4360.002
$\\frac{\\partial d}{\\partial z}$1.132-0.082
\nFig. 1. Sensitivity of aggregate dividends and consumption to the habit motive\nFig. 2. The impulse responses of optimal aggregate dividends ($d$), consumption ($c$), debt ($b$), and investment ($i$) in the case without habit persistence for the VM model ($\\xi = 0$)\n\nFig. 3. The impulse responses of optimal aggregate dividends ($d$), consumption ($c$), debt ($b$), and investment ($i$) in the case with habit persistence for the VM model ($\\xi = 0.8$)\nFig. 4. The impulse responses of optimal aggregate dividends ($d$), consumption ($c$), debt ($b$), and investment ($i$) in the case without habit persistence for the RA model ($\\xi = 0$).\n\nFig. 5. The impulse responses of optimal aggregate dividends ($d$), consumption ($c$), debt ($b$), and investment ($i$) in the case with habit persistence for the RA model ($\\xi = 0.8$).\nTable 1. Calibration values for the models’ parameters\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
ParametersNotationValue
Capital share to output$\\alpha$0.35
Depreciation ratio$\\eta$0.019
Subjective time discount factor$\\beta$0.99
Persistence of the technology shock$\\psi$0.95
Standard deviation of the technology shock$\\sigma_{\\varepsilon}$0.00712
Recovery rate$\\theta$0.92
Tax rate$\\tau$0.06
Time allocated to market activities$\\rho$0.36
Coefficient of relative risk aversion of the household$\\gamma$2
Upper bound$U$1.225
Lower bound$L$0.475
Habit persistence$\\xi$Given
\n\nThis table displays a summary of parameter values. Rows 1-7 are taken from Alessandrini (2003). Row 8 is taken from Campbell (1994). Rows 9 - 11 are values commonly used in literature. Habit persistence is allowed to take a range of different values from 0 to 0.8 with an interval of 10%.\nTable 2. Mean and relative standard deviation (RSD in %) for the VM model and the US economy\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
00.10.20.30.40.50.60.70.8
$\\xi$
$d$0.090.090.090.090.090.090.090.090.09
$c$0.910.910.920.920.920.920.930.941.91
$y$1.191.191.191.201.201.201.211.223.06
$l$0.320.320.320.320.320.330.330.332.39
$i$0.260.260.260.260.260.260.260.269.05
$b$5.405.405.415.415.425.435.455.485.54
$w$27.3827.36
Scoring CriteriaWeight
Questionnaire
• Functionality0-30
• Workflow/Routing/Administration
• Reporting
• Account Management
• Implementation
• Pricing
Pricing Sheet
• Expense Management or0-30
• Full Service Agent / Booking Tool
References0-20
Qualifications & Experience0-20
\n\nNote: Vendors submitting for Expense Management *only* will not be scored against vendors submitting against Travel Agent Services and Booking Tools.\n\nPresentations: Following the initial evaluation, qualifying vendors may be asked to provide a presentation to the University’s scoring committee. More information will be available upon selection.\n## Pricing Sheet\n\n*If you cannot provide some of the services listed, please respond as not applicable.*\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
DescriptionFees
Expense Management:
Lump Sum Fee
Additional Cost per Transaction
Full Service Agent Assist Transactions:
Domestic airline ticket
Domestic airline ticket refunded
Domestic airline ticket exchanged
International airline ticket
International airline ticket refunded
International airline ticket exchanged
Airline ticket that is part of a group-domestic
Group airline ticket refunded-domestic
Group airline ticket exchanged-domestic
Airline ticket that is part of a group-international
Group airline ticket refunded-international
Group airline ticket exchanged-international
Consolidator airline ticket-international
After-hours emergency phone call
Car reservation only
Hotel reservation only
Rail ticket - domestic and international
Car service reservation
Online Booking Tool Transactions:
Domestic airline ticket
Domestic airline ticket refunded
Domestic airline ticket exchanged
International airline ticket
International airline ticket refunded
International airline ticket exchanged
Change or cancellation with travel agent to an airline ticket, hotel, and/or car reservation purchased through the OBT
Assistance with purchase of airline ticket, hotel reservation, car reservation begun in the OBT, but completed with a travel agent
Car reservation only
Hotel reservation only
Applying a ticket credit to an airline reservation
Miscellaneous Services:
Miscellaneous Services: Auxiliary reservation tool (Booking Builder, etc.)
Customized reports not listed in scope of work (per hour fee)
Call to the OBT Help Desk
Reporting tool
Non-standard reports as requested
\nThe proposer states that he/she has carefully examined the specifications of having carefully examined the proposal documents and being familiar with the requirements therein, hereby submits their proposal to provide such services meeting the requirements outlined in this RFP.\n\n\n\n\n\n\n\n\n\n\n\n\n", "num_tokens": 2048} {"category": "olmocr_science_pdfs-finance_and_business", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-finance_and_business/part-00-00000.npy", "text": ". The second set imposes only the restrictions used for the shocks of interest, i.e., the stock market shock and the monetary policy shock. Finally, R3 represents the full set of restrictions from Bjørnland-Leitemo except for the long-run restriction. Thus, imposing only those restrictions does not fully identify the shocks of interest. All these sets of restrictions are either under-identifying or just-identifying.\nin a conventional framework. Hence, testing them requires additional identifying restrictions that we get from the changes in volatility in the variables.\n\n4.2 The Volatility Model\n\nWe estimate the standard VAR and three (conditional) heteroskedastic VARs with different assumptions on the evolution of volatility. The VAR order is chosen to be three as suggested by the Akaike information criterion (AIC) in a conventional model that does not allow for heteroskedasticity. Bjørnland and Leitemo (2009) use four lags based on lag reduction tests for their shorter data range.\n\nIn practice, if changes in volatility are suspected, it is useful to think about the most suitable volatility model for a particular application. For the system of interest here, volatility changes are likely, for example, because a financial variable such as $\\Delta sp_t$ is included. It is not easy to link the volatility changes to specific exogenous events and, hence, to specific parts of the sample period. Therefore a model that assigns the volatility states endogenously makes more sense than a model with exogenous volatility changes. Given the stock returns in the system one may think of a GARCH model. However, also the MS model can capture similar conditional heteroskedastic structures. Therefore it is a priori equally suitable if enough volatility states are allowed for. If the volatility change is sufficiently smooth, also the ST model is a possibility. It is used, in fact, by Lütkepohl and Netšunajev (2014b) for the presently considered system and we draw on the results from that study for the ST-SVAR model in the following. In deciding on the volatility model it may be useful to inspect the residuals from a standard VAR analysis. They are presented in Figure 5 and show that there are indeed considerable changes in volatility throughout the sample and capturing them with a model with exogenously assigned volatility regimes may not be easy. Therefore we consider all three models with endogenous assignment of volatility states in the following.\n\nClearly, a visual inspection of the residuals is not enough for making a good decision on the most suitable volatility model. Such visual tools have to be complemented with statistical criteria such as information criteria. Therefore we show values of the Akaike information criterion and the Schwarz criterion (SC) for different models in Table 1. Notice that in all the volatility models a state-invariant initial effects matrix $B$ is assumed and the VAR order is 3 for all models. The GARCH model is estimated with 5 univariate GARCH(1,1) components. It turns out that all (conditionally) heteroskedastic SVARs perform much better than the standard VAR according to AIC and SC. In fact, both criteria are minimized for the MS-SVAR\nmodel with 3 volatility states. We did not try to estimate MS models with more volatility states because for a 5-dimensional model that would have been a major computational challenge and the estimates cannot be expected to be reliable.\n\nThe ultimate objective is, of course, to capture the volatility well with our models. Therefore it is instructive to look at the standardized residuals\n\n\\[ \\hat{u}_{kt}/\\hat{\\sigma}_{kk,t} \\]\n\nobtained for the different models. Here \\( \\hat{\\sigma}_{kk,t}^2 \\) is the \\( k \\)th diagonal element of the estimated residual covariance matrix or conditional covariance matrix for period \\( t \\), depending on the model considered. These quantities are plotted in Figure 2 for the models with time-varying volatility. Notice that these are not the structural residuals obtained from these models but reduced-form residuals. The graphs are just meant to give a visual impression of possible remaining volatility changes or the ability of the different models to actually capture the volatility changes in the reduced-form residuals.\n\nComparing to the residuals in Figure 5, all models appear to improve on a model without allowance for volatility changes. However, the volatility models differ in their ability to capture the volatility in the data well. The visual impression is that the ST-SVAR model leaves quite some unexplained volatility in the residuals. Also, the MS(2) model appears to be inferior to the MS(3) model. For example, it leaves more heterogeneity in the commodity price residual series than the MS(3) model. Moreover, the GARCH residuals are somewhat disappointing and clearly inferior to the MS(3) residuals. Note, for example, large outliers in the \\( u_t^x \\) series that are not captured by the GARCH model. Also some of the other residual series leave room for improvement relative to the corresponding quantities from the MS(3) model. For example, the volatility changes in the residuals of the output equation, \\( u_t^q \\), are not well captured by the GARCH model. Thus, it is no accident that the AIC and SC criteria prefer the MS(3) model as well.\n\nThese results are perhaps better understood when looking at the transition function of the ST-SVAR model and the smoothed state probabilities of the MS(2)-SVAR and MS(3)-SVAR models in Figure 3. The MS models indicate that the change in volatility is more complex than what is captured by the ST-SVAR model. There does not appear to be a smooth transition from one volatility regime to another if the data are allowed to assign different regimes in a different way as in the MS models. Also allowing for a third state leads to a quite different separation of the sample period than a two state model. This explains why the MS(3) model is preferred over the ST and the MS(2) models. Despite the fact that we favor the MS(3)-SVAR for the\npresent dataset, we continue looking also at the other models for illustrative purposes.\n\n4.3 Identification Analysis\n\nThe first question we have to address is the identification issue. For all three models statistical identification conditions are linked to the changes in volatility. For the ST and MS models they are linked to the relative variances. Estimates of these quantities are shown in Table 2. For the ST and MS(2) models the relative variances in the second state are all less than one. Hence, the ST model moves the volatility from a high volatility state to a lower volatility state. This corresponds well to the fact that the MS(2) model assigns the second, hence, lower volatility state to the latter part of the sample (see Figure 3). In contrast, the first state dominates the second half of the sample in the MS(3) model. Therefore it is plausible that the relative variances of the second and third states assigned by the MS(3) model are all larger than one, that is, the variances are larger than in the first state.\n\nRecall that we have a fully identified ST-SVAR model if all the relative variances are distinct. Taking into account also the standard errors in Table 2, the estimates suggest that at least the first four relative variances are distinct. Formal tests that they are all distinct are presented in Table 3. Note that we have to test $K(K - 1)/2 = 10$ pairs for a system of dimension $K = 5$. For the smooth transition model, the null hypotheses of pairwise equality is rejected at a 10% significance level for all pairs but the last. Thus, we conclude that we have some statistically identified shocks but perhaps not a fully identified ST-SVAR model. In particular, the first three shocks are identified via heteroskedasticity. For a fully identified set of structural shocks we need additional restrictions such as those or some of those used by Bjørnland and Leitemo (2009).\n\nThe standard errors of the estimated relative variances for the MS models in Table 2 tend to be larger than for the ST model and also the estimated relative variances are not clearly distinct in a number of cases. Therefore it is not surprising that the corresponding tests for full identification shown in Tables 3 and 4 do not reject some of the relevant hypotheses. However, they do indicate that the volatility models contain at least some additional identifying information because some of the relevant hypotheses are clearly rejected with $p$-values much smaller than 5% or even 1%. Interestingly, in the MS(2)-SVAR model the tests indicate that the first relative variance is clearly distinct from the others and, hence, the first shock is identified while in the MS(3)-SVAR model the last shock is identified. Note, however, that we are using Wald tests for checking the identification restrictions and these\ntests may not be very reliable (see Lütkepohl and Netšumajev (2014a)). Thus, there may be more identified shocks. Our current statistical procedures do not provide much evidence for them, however.\n\nThe identification issue in the context of the SVAR-GARCH model is a somewhat different one. We have to check the number of univariate GARCH components underlying the GARCH structure. Ignoring the problem and estimating a model with five GARCH components as we have done in the foregoing, some of the GARCH parameters may actually not be identified. Thus, the analysis of the SVAR-GARCH model should ideally start with a thorough investigation of the number of underlying univariate GARCH components. This is of particular importance in analyses such as the present one where it is not clear whether the GARCH structure captures changes in volatility well enough in all variables. Notably variables such as industrial production are not necessarily well modelled by", "num_tokens": 2048} {"category": "olmocr_science_pdfs-finance_and_business", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-finance_and_business/part-00-00000.npy", "text": "\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\nFood Allergens: A Comprehensive Approach For Food Processors To Prevent Unintended Allergens In Their Foodstuffs\n\n- Dairy\n- Egg\n- Crustacean Shellfish\n- Fish\n- Tree Nuts\n- Wheat\n- Peanuts\n- Soybeans\n\nA Food Safety Guide for Food Processors\n\nEHA\nContents\n\nChapter 1: Introduction p.3\n\nChapter 2: Allergens and Food Processors p.4\n\nChapter 3: Food Processors’ Allergen Challenges p.5\n\nChapter 4: Major Risk Areas for Allergen Recalls p.6\n\nPart 1. Controls\n\nA. Product Intake Handling\nB. Allergen Identification\nC. Storage\nD. Cross-Contamination\nE. Product Matrix\nF. Labeling\n i. US Government Regulations\n ii. International Regulations\n iii. Label Allergens\nG. Proper Sanitation\n i. Cleaning Methods\n ii. Inspection\nH. Testing Allergens\n i. Actions That Have To Be Taken\n\nPart 2. Employee Training\n\nChapter 5: Moving Forward p.16\n\nPart 1. Processor\nPart 2. Customers\n\nChapter 6: How EHA Consulting Group, Inc. Can Help p.17\n\nAbout EHA Consulting Group Inc.\n\nEHA Consulting Group, Inc. (EHA) offers comprehensive public health consulting, epidemiology and food safety services before, during and after a crisis. We provide these services to Retail Food, Food Service, Food Processing, and Contract Food Service Management companies.\n\nNeed our Services? Call us today at 800-969-1441.\n\nVisit us at www.ehagroup.com. Follow us on Twitter @EHAConsultingGp.\nIntroduction\n\n“The proper control of food allergens in a food processing plant presents numerous challenges. The ubiquitous presence of allergens in the human food supply, coupled with increased awareness of food allergies, warrants undertaking appropriate preventive measures to protect sensitive consumers from unwanted exposure to offending food allergens. Food processors must have an allergen prevention plan to determine potential sources of contaminating allergens and create appropriate controls to prevent allergen introduction into food products.”\n\nThe proper control of food allergens in a food processing plant presents numerous challenges. The ubiquitous presence of allergens in the human food supply, coupled with increased awareness of food allergies, warrants undertaking appropriate preventive measures to protect sensitive consumers from unwanted exposure to offending food allergens. Food processors must have an allergen prevention plan to determine potential sources of contaminating allergens and create appropriate controls to prevent allergen introduction into food products.\n\nThe following guide from EHA Consulting Group, Inc. (EHA) contains information, best practices, and tools for a food processing company to avoid allergen-related recalls. Key factors in allergen control include poor identification, poor handling, poor storage, improper product matrix, improper labeling, poor sanitization, and inadequate testing. The purpose of this guide is to educate you and your staff on the proper steps to protect your brand and your business from the negative ramifications of an allergens incident and potential recall.\nAllergens and Food Processors\n\n“Up to 15 million Americans have food allergies, 1 in every 13 children under the age of 18.”\n\nWhen it comes to food allergens, what you don’t know could hurt you - as a customer and as a business owner. Up to 15 million Americans have food allergies, including one in every 13 children under the age of 18. Ensuring that a large number of potential customers can safely consume your food is a vital business practice.\n\nAllergens affect people in various ways. Allergens are substances, usually protein in nature, that illicits a reaction that is generically termed an allergic reaction. Allergens do not have to be proteins; they can be chemical, such as sodium bisulfite or MSG (monosodium glutamate) and in non-food settings, they can be dust. Food allergens are an improper reaction of someone’s immune system that most of the population tolerates without any problems. For those who are sensitive to an allergen, consuming one of the over 170 foods that contain allergens could result in symptoms that range from minor tingling all the way to death. Consumers with known allergies diligently select the food they consume to ensure they do not trigger a potential allergic reaction. Therefore, food processors that are distributing or serving foods that may cause an allergic reaction have great responsibility. As a food processor, staying current on allergens and understanding how to protect your end consumers is paramount.\n\nFood processors must be aware of newly emerging allergenic foods and be cognizant of geography-specific rules. While food processors in the United States should familiarize themselves with all allergens, it is of utmost importance to focus controls on the top eight foods containing allergies which are found in fish, eggs, soy, peanuts, tree nuts, wheat, crustacean shellfish, and milk. The European Union has a more comprehensive list of allergens that include the following foods and products thereof: gluten, (i.e. wheat, rye, barley, oats, spelt, kamut or their hybridized strains), crustaceans, eggs, fish, peanuts, soybeans, milk, nuts (i.e., almonds, hazelnuts, walnuts, cashews, pecan nuts, Brazil nuts, pistachio nuts, macadamia nuts and Queensland nuts), celery, mustard, sesame seeds, sulphur dioxide and sulphites at concentrations of more than 10 mg/kg or 10 mg/liter expressed as SO2, lupin, and molluscan. In the Asian markets, Japan’s declared allergens are eggs, milk and dairy products, wheat, buckwheat, shrimp/prawn, peanuts, salmon roe, soybean, kiwi, banana, crab, chicken, tree nuts, squid, mackerel, pork, salmon, gelatin yam and peach. As a processor you may be working with any number of these foods.\nFood Processors’ Allergen Challenges\n\n“Undeclared allergens were the single largest cause of recalls from the USDA in the second quarter of 2013.”\n\nAs a processor, you are charged with great responsibility to ensure that allergens are handled safely. Teams responsible for intake, storage, transfer, processing, labeling, cleaning and testing all have important roles in preventing allergens. Teamwork, communication, and strong control processes are paramount.\n\nUnfortunately, food processors are currently experiencing more challenges with preventing allergen-related issues, leading to recalls and government intervention. Undeclared allergens have been a top trend setter in USDA and FDA recalls for the past six quarters, according to Whitworth of Food Quality News. Undeclared allergens were the single largest cause of recalls from the USDA in the second quarter of 2013, accounting for 60% of recalls and almost doubling from 33% in the first quarter of 2013. A study from Gendel and Zhu from the FDA uncovered trends from recalls between 2007 and 2012. Gendel and Zhu identified that bakery products were the most frequently recalled food type and milk was the most frequently undeclared major food allergen.\n\nGendel and Zhu also found that use of the wrong package or label was the most frequent problem leading to food allergen recalls. This finding tells us that food processors have (at least) one of the following problems:\n\n1. Controls: Processors do not have checks and balances, allowing for mismatch", "num_tokens": 2048} {"category": "olmocr_science_pdfs-food_and_dining", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-food_and_dining/part-00-00000.npy", "text": " product definitions. The recommendation was approved.\n\n**Task force on responsibilities of participating states**\n\nThis task force was given six problems. However, problems 2 and 4 were combined.\n\nProblem 1: Should split samples be reduced to a frequency of once a year? The task force recommended that the present requirement of two sets of split samples per year be retained. The recommendation was unanimously approved by the delegates.\n\nProblems 2 and 4 called for ways of making volume control more meaningful and for stricter compliance with volume control provisions. The task force recommended that, when inadequacies are found by either the shipper or receiver, the methods presently outlined in Section VII of the \"Procedures\" dealing with \"Complaints and Challenges\" should be used. The delegates approved this recommendation.\n\nProblem 3 recommended changing the first line in Section V-C, Subitem 4 to read, \"If results of the laboratory and sampling surveys are not . . . . \" The task force recommended the adoption of this change and the recommendation was approved by the delegates.\n\nProblem 5: Consider the need for a specific and detailed sampling procedure to be developed to sample milk in receiving states. The task force stated that Section IV, A, 3, dealing with uniform Bill of Lading and Seals, and Section VII, dealing with Complaints provide adequate guidelines to handle the situation. The delegates approved the recommendation.\n\nProblem 6 asked for methods for identifying the manufacturer of single-service containers. The task force stated that the Public Health Service report on this subject as presented to the Conference provides\nfor adequate means of identifying the manufacturer. The delegates approved the recommendation.\n\nTask force on responsibilities of the PHS\n\nThis task force was given five problems. Problem 1 asked the PHS to consider establishing an advisory committee composed of experienced survey officers to review and revise Bulletin No. 678 to place greater emphasis on enforcement procedure evaluation. The task force recommended that the PHS review and update Bulletin No. 678, \"Methods of Making Sanitation Rating of Milk Sheds, 1966 Edition\" as soon as possible so as to reflect current conditions. The delegates approved this recommendation.\n\nProblem 2 requested that new survey officers be accredited by a written or an oral examination along with an evaluation. The task force recommended no action on this request. The recommendation was approved by the delegates.\n\nProblem 3 asked that recertification of survey officers be conducted simultaneously with spot checks. The task force felt that present procedures already allow for this and, therefore, recommended no action. The delegates approved. Problem 4 recommend that PHS establish bacteriological procedures and standards for co-mingled raw milk prior to its entrance into a milk plant. The task force recommended no action and the decision was approved by the delegates.\n\nProblem 5 asked that the PHS be encouraged to carry on adequate training of survey officers in certifying single-service manufacturing plants. The task force felt that steps for adequate training have already been taken and therefore recommended no action. This decision was approved by the delegates.\n\nTask force on procedures for handling complaints and challenges of validity of ratings\n\nThis task force was given two problems. The task force recommended that the IMS Conference require, by July 1, 1973, the delisting of all shippers from the IMS list from any state or municipality which does not have reciprocal inspection agreements or does not abide by the Conference Agreements for all IMS rated supplies, and it further recommended that the IMS Executive Board refer this matter to the proper task force for implementation. James Smathers presented a minority report concerning the above mentioned recommendation stating that the industry should not be penalized for conditions over which it had no control. After considerable discussion, the recommendation was tabled until the report of Task Force 8 could be presented. After the completion of the report of Task Force 8, the above mentioned task force recommendation was voted upon and defeated by the delegates by a vote of 35-7.\n\nThe task force recommended that the IMS Conference require, by July 1, 1973, the delisting of all shippers from the IMS list from any state or municipality which does not accept the accreditation program for brucellosis and tuberculosis as outlined in the U. S. Public Health Service Grade A Pasteurized Milk Ordinance, 1965 Recommendation. It further recommended that the IMS Executive Board refer this matter to the proper task force or to a special committee for implementation. This recommendation was tabled until after the report of Task Force 8 was presented. It was then formally voted upon and defeated by a vote of 40.5 to 1.5.\n\nTask force on application of conference agreements and special problems\n\nThis task force was given five problems. Problem 1 recommended that the PHS update the Frozen Dessert Ordinance and make it a standard under Conference Agreements. The task force recommended no action and the delegates concurred. Problem 2 asked that consideration be given to including aseptically packaged milk and cream under the scope of the Conference. Sam Noles moved that the recommendation be amended as follows: \"That the Conference request the PHS to develop definitions and standards for production, processing, ultra-high temperature treatment, and aseptic packaging of sterilized or sterile milk and milk products.\" The amended motion was passed with only two negative votes.\n\nProblem 3: Recommend to the PHS that \"Acceptable Enforcement Rating\" be deleted from Section II of the PMO. The task force recommended that this change not be made. The delegates approved the recommendation. Problem 4 recommended that the wording in Section VIII, A.1 of the \"Procedures\" be changed to read,\" . . . shall apply to raw milk for pasteurization and to pasteurized milk and milk products.\" The task force recommended that the \"Procedures\" be changed accordingly so that the entire section involved reads: \"Section VIII, Application of Conference Agreements. A. Products Covered. 1. Agreement...\"\n\nThe delegates approved the recommendation. Problem 5 asked for ways to eliminate duplicate inspection, including the possible formation of a study committee. The task force recommended that the Conference chairman appoint an operating committee of five charged with the responsibility of receiving reports of lack of reciprocity, investigating such reports and taking, in respect to the facts determined, warranted action within the powers of the Conference Agreements, that the financing of the\ncommittee's expenses be arranged by the Executive Board of the Conference and finally that the committee submit to the 1971 Conference a resume of its functions with recommendations. After considerable discussion by the delegates Sam Noles proposed to amend the recommendation by striking out the words \"that the financing of the committee's expenses be arranged by the Executive Board of the Conference.\" The amended motion was unanimously accepted by the delegates.\n\nAfter the conclusion of the task force reports, Chairman Johnson called for any unfinished business. Dr. Richard Parry of Connecticut recommended that the Committee for Single-Service Containers be continued. His recommendation was approved by the delegates. Chairman Johnson then announced that the 1971 Conference will be held at the Chase-Park Plaza Hotel, St. Louis, Missouri, May 16-20. The final general session of the 12th meeting of the National Conference adjourned at 11:45 a.m., Thursday, May 29, 1969.\n\nREPORT OF COMMITTEE\n\n(Continued from Page 289)\n\nChairman J. Marion Johnson introduced the new members of the Board from Region I, namely Sam Rich, Bill Arledge, Wendell Carr, and E. Marion Caussey.\n\nEach member of the Board received a list showing the various hotels which had submitted proposals to host the 1973 meeting. After a considerable discussion, the meeting was awarded to the Savery Hotel, Des Moines, Iowa. The exact dates will be arranged later.\n\nChairman Johnson then called for the election of new officers. Both Chairman Shelby Johnson and Secretary-Treasurer J. C. McCaffrey were unanimously re-elected to their respective offices.\n\nIt was decided to hold an interim board meeting at Louisville, Kentucky, during the meeting of the International Association of Milk, Food, and Environmental Sanitarians, Inc., the time to be determined by the Chairman.\n\nChairman Johnson appointed John Schilling to serve as Local Arrangements Chairman for the 1971 meeting which is scheduled to be held at the Chase-Park Plaza Hotel, St. Louis, May 16-20.\n\nThere being no further business, the meeting was adjourned at 1:35 p.m.\n\nIn accordance with the instruction given the Committee in 1967 by the Conference the \"Committee on Scope\" respectfully submits this report. It will be presented at the business session on Thursday on the question of its adoption.\n\nHarold J. Barnum, Co-Chairman\nClarence K. Luchterhand, Co-Chairman\n\nSummary of Recommendations\nSubcommittee on Available Procedures and Standards\n\nExisting standards and model regulations for products not included in the Pasteurized Milk Ordinance were studied by this subcommittee. Some of the subcommittee recommendations have been incorporated into the main body of this report. Additional recommendations by the subcommittee include:\n\n1. All products covered by the provisions of the Agreement should be supervised and coordinated by the state and federal agencies which are presently operating the program.\n\n2. Where applicable products should bear the plant identification number as outlined by the recommendations of the National Labeling Committee.\n\n3. The committee considers the framework for determining sanitation compliance ratings of sources already existing within the provisions of the Conference agreements. Should the inclusion of other dairy products within the provisions of the agreement materialize, federal agencies could establish a numerical evaluation for sanitation items.\n\nSummary of Recommendations\nSubcommittee on Need for Uniformity and Reciprocity\n\nThis subcommittee was assigned the task of gathering in-\nTHE ROLE OF AN INDUSTRY SANITATION CONSULTANT IN FOOD PLANT SAN", "num_tokens": 2048} {"category": "olmocr_science_pdfs-food_and_dining", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-food_and_dining/part-00-00000.npy", "text": " Such an analysis could reveal that fewer barriers exist than are currently perceived.\n\nWhere to start?\n\nIt can be overwhelming to see this long list of barriers and think: There is too much in our way – we’ll never achieve transformation! After the dialogues were completed, the research team identified two initial steps can make the task of dismantling barriers more manageable.\n\nFirst, the barriers can be narrowed by only focusing on those found to block progress toward several food system changes. In other words, the 14 barriers presented in Figure 1 now become the focus of analysis. This can be a useful step since a combination of changes will likely be needed to transform to sustainable food systems, and these 14 barriers represented roadblocks to a range of changes.\n\nSecond, the barriers can be reframed into leverage points – or places in a system where intervention can result in changes to that system and prioritise those with the most leverage for systemic, transformative change. The potential of leverage points to effect systems change can be scored on a continuum. On one end are those interventions – termed ‘shallow’ leverage points – that are relatively easy to implement yet have limited potential for transformative change. This could be an intervention such as creating an infrastructure for centralised, harmonised database for food system information. For example, digital infrastructure like the Food Systems Dashboard could be expanded and adapted for detailed data collected at the Nordic level. At the other end of the continuum are those interventions – termed ‘deep’ leverage points – that require more time, resources and effort, but have the potential to unlock transformative change (Figure 2 next page). An example would be adopting a mindset where sustainable diets are a public right.\n\nIn between on the continuum, there are what are referred to here as ‘promising’ leverage points. These make important steps in changing the fundamental functioning of food systems by changing the design of a system or information flows. One example could be designing food systems in a more circular way.\n\nSince the Nordics have already begun tackling many of the ‘low-hanging fruits’ – the shallow leverage points – this Insight Paper focuses on deep and promising leverage points that can lead to transformational change. From here, the list of 14 barriers identified in Step 1 can be narrowed even further to identify seven critical leverage points.\n\nDeep leverage points: Goals, mindsets and paradigms\n\nDeep leverage points are powerful because they target changes to the goals of the system, the mindsets of individuals who shape the system, and the paradigms that guide decision-making about the system. Several barriers discussed in the dialogues identified different goals, mindsets, values and paradigms as blockages to systems change. Below, these barriers have been reframed as deep leverage points for changing Nordic food systems.\n\nSecuring political support will require that the mindsets and goals of policy-makers change. Demonstrating political will and leadership are key aspects of political support. Strong thought leadership is also key to empower others to associate change with opportunity rather than risk.\n\nChanging food culture will mean creating a new ‘cultural paradigm’ that steers our eating habits in a more sustainable direction. This also includes involving a diverse set of actors to co-create guiding principles (not dogmas) that lay the foundation of this new paradigm.\n\nManaging vested interests will start from the recognition that all actors have interests and goals as well as differing levels of power and influence over food system change. Conflicting interests need to be brought to light and resolved.\n\nChanging individuals’ mindsets will require us to find new ways to change individuals’ preferences, beliefs, values and lifestyle choices related to food.\nPromising leverage points: System design and information flows\n\nWhile unlocking deep leverage points would be powerful in affecting change, there are other leverage points – which are referred to here as promising leverage points – that hold slightly less, but still significant transformative potential. Promising leverage points target the design of a system and the information flows within that system. In the Nordics, the following examples illustrate promising leverage points:\n\n- **Increasing individual knowledge and cooking skills about sustainable diets** can be achieved by improving credible information flows through many channels, including formal education, higher education of health care professionals, advertising and public campaigns.\n\n- **Improving food environments** – the physical, social, economic and cultural spaces that shape our food-related behaviour – can be a way to significantly change the design of the food system and the influence the food system has on our individual choices. This includes food labelling, marketing and the affordability and accessibility of food.\n\n- **Creating ambitious policies that support sustainable food futures** is another way to significantly shape the design and purpose of a food system. This includes creating safe spaces where new approaches can be tried and tested.\n\n![Figure 2](image-url)\n\n**Figure 2**: Activating deep leverage points (changing goals, mindsets, and paradigms) can help overcome system lock-ins and transform current food systems into desired food systems. Yet there are also promising leverage points (changing system design and information flows) that can move us closer to sustainable transformations. Other shallow leverage points (changing the infrastructure, parameters or feedback loops of a system) are not discussed here. Figure adapted from the leverage point approach literature. Figure by Azote.\n\nWorking together to activate leverage points\n\nLooking at the seven leverage points discussed above, it is clear that there is no simple way to activate each leverage point. For example, to change food culture, several factors within the food system might need to change, such as guidance from the public sector in setting new norms related to food; involvement of chefs and other food influencers to bring the concepts of sustainability onto a plate in a tasty, attractive way; and work from food business and retailers to produce and stock new types of ingredients, foods and meals.\n\nAdopting a food systems approach – one that looks at the food system as a whole and appreciates the linkages between and feedbacks among parts of the system – will be critical. Only with systems thinking can we understand the multiple drivers that create and reinforce food system barriers.\n\nOne way to encourage systems thinking is through collaboration of actors across the food system. Working together will allow actors to get the most transformative potential out of each leverage point. Below (Table 2), ten collaborations are proposed that can help activate each leverage point. These collaboration ideas were developed after the dialogues by the research team. It is important to\nnote that while these collaboration ideas are evidence-based, the effectiveness of each collaboration will only be known if societies have the courage to test them out. Crucial to this experimentation is the willingness to learn from successes as well as from failures. This is not a one-time process. Support for an iterative, active learning process needs to be in place.\n\nWhile the collaborations presented below use a single leverage point as an entry point for change, the collaborations end up activating multiple leverage points. For example, by working to change current food environments, collaborators would also likely help to create policies that support sustainable food futures, increase individuals’ knowledge and change food culture. Thus, investing in one leverage point is likely to have positive ripple effects across other leverage points.\n\nTable 2. Potential collaborations to activate deep and promising leverage points in Nordic food systems.\n\n
Name
Title
Suitable funding structures for SET FOAK projects:
Equity & grant:✓✓
not lending risk
Equity & grant:✓✓
availability of
debt depending on
technology types
Equity, grant &✓✓
debt: lender
caution, as some
precedents have
failed
Equity, grant:✓✓
lender caution,
as few sectoral
& regional
precedents.
Insurance used✓✓
to cover drilling
risks
Equity, grant:✓✓
lenders
uncertain of
some technologies
(not pumped
storage) plus
demand &
business case
Equity, grant &✓✓
debt: very
limited as some
precedents
have failed
Equity, grant &✓✓
debt: lender
caution, as some
precedents
have failed
Equity, grant &✓✓
debt: lender
caution and some
projects are
very high value,
requiring
\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
Leverage points and potential collaborationsExamples of core collaboratorsPotential actionsLinkages to other leverage points
Secure political support
Collaboration 1: Develop food systems goals and indicators• All national and local government departmentsClear goals for sustainable food systems can be set by local and national governments. Formal goals will help prioritise and accelerate action on food system change, providing a clear direction of change and indicating the necessary level of ambition. Indicators should also be developed to assist in the monitoring and evaluation of action. A mechanism should be established to ensure that the best available scientific evidence is regularly used to inform food system goals and indicators.*• Create ambitious policies • Improve food environments • Change food culture
Change food culture and Individuals’ mindsets
Collaboration 2: Co-develop a national and regional food identity• Tourism authorities • Citizens • Food service professionals • Civil society organisations • City planners • National food authorities • National education authorities • Private sector (including small- and medium-scale enterprises, SMEs) • GovernmentsOver the past 17 years, food culture has rapidly evolved in the Nordic region, sparked by the New Nordic Food Movement. The concept of modern Nordic food continues to evolve. Domestic tourism authorities can adapt their strategies to promote sustainable food systems as destinations, experiences and as a component of a desirable lifestyle. Civil society, food service professionals, national authorities and city planners can include (where not already existent) food education and educational spaces that engage not only school-age children but also families and the community at large. The private sector and governments can provide innovation spaces to support entrepreneurs in filling gaps in the market as societal needs change. Citizens and governments can revisit and revise national and regional food-related manifestos, without becoming dogmatic.• Increase individuals’ knowledge • Improve food environments
\n\n* Many research projects across the Nordics are aiming to develop food system goals. In Sweden, for example, the Mistra Food Futures program is developing food system targets and indicators, which could then be fed into the public sector process for setting national food system goals.\n### Leverage points and potential collaborations\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
Manage vested", "num_tokens": 2048} {"category": "olmocr_science_pdfs-food_and_dining", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-food_and_dining/part-00-00000.npy", "text": "8” pan to heat: \n4 c. canned sliced peaches (or other fruit) \nAdd: \n1 tsp. cinnamon or nutmeg \n2 Tbsp. sugar \nPour on: \n9 oz. white cake mix prepared as directed \nor 2 c. Bisquick and juice from fruit to make dumplings\n\nCover and bake 20-30 min. Serve with whipped topping.\n\n**Fruit Crisp**\n\nPour: \n21 oz. can fruit pie filling in bottom of Dutch oven or 8” pan to heat. \nTop with: \n9 oz. white cake mix (dry) with ¼ c. margarine worked in w/fingers. \nor 9 oz. pie crust mix (dry) with ¾ c. brown sugar worked in\n\nCover and bake 20-30 min. or until topping is brown.\n\n**Hillbilly Cobbler**\n\n1 stick margarine \n1 c. sugar \n2/3 c. milk \n1 c. flour \n2 tsp. baking powder \nYour choice of 1 can pie filling, 21 oz. size\n\nMelt ½ stick of margarine in each of two 8” or 9” cake pans. In a separate bowl, mix the flour, sugar, baking powder and milk. Pour ½ of the batter into each of the two cake pans. Pour ½ can of pie filling over each pan of batter. DO NOT STIR! Bake at 350° for 35 minutes or until lightly browned. These pans will stack perfectly in one 12” Dutch oven. Use two clean wire tent stakes on the bottom pan to maintain separation between pans.\nPineapple Upside Down Cake\n\n1 can sliced pineapple \n½ c. brown sugar, packed firmly\n¼ c. butter \n2 pkg. yellow cake mix\nadditional ingredients necessary for cake mix\nMaraschino cherries, drained (optional)\n\nLine the oven with aluminum foil. Place oven on heat, level it, and melt the butter in the oven. When melted, add the brown sugar, then the pineapple slices (drain them first) with a cherry in the center of each slice. While butter is melting, mix the cake according to package directions. Pour the cake mix over the glaze and put lid on pan. Bake in coals about 25 minutes, until golden brown and cake tests done. Lift out of pan by edges of aluminum foil and invert onto plate. Remove foil. Serves 12.\n\nVARIATION:\n- Instead of yellow cake mix, use 1½ pkg. Pound cake mix, 3 large eggs, 1 ¼ c. milk\n- Pour: 20 oz. can crushed pineapple in bottom of Dutch oven or 8” pan to heat. Pour on: 9 oz. white cake mix prepared as directed. Cover and bake for 20-30 min.<|endoftext|>Tofu Tacos\n\nSource: Healthy Eating for Life for Women by Kristine Kieswer; recipe by Jennifer Raymond, MS, RD\n\nThese tacos can be made with fresh or frozen tofu. The frozen tofu gives it a texture similar to ground beef. To freeze the tofu, put the whole package in the freezer. Defrost it in the refrigerator. Once thawed, remove the tofu from its package and squeeze out the excess water.\n\nAbout the Recipe\n\n118 Calories · 5.7 g Protein · 3.2 g Fiber\nDinner\n\nIngredients\n\n*Makes 6 Servings*\n\n- 1 small onion, chopped\n- 1/2 small bell pepper, seeded and cut into cubes (optional)\n- 8.8 oz (249 g) firm tofu, crumbled\n- 3 tsp (15 mL) chili powder\n- 1 tbsp (15 mL) nutritional yeast (optional)\n- 1 tsp (5 mL) garlic powder\n- 1/4 tsp (1.2 mL) ground cumin\n- 1/4 tsp (1.2 mL) dried oregano\n- 1 tbsp (15 mL) reduced-sodium soy sauce\n- 6 corn tortillas\n- 1 head romaine lettuce, chopped\n- 2 green onions, chopped\n- 1/2 c (76 g) tomato, diced\n- 1/3 c (86 mL) salsa\n- 1/2 avocado, sliced (optional)\n\nDirections\n1. Heat 1/4 c (60 mL) water (or low-sodium vegetable stock) in a nonstick pan. Add the onion and bell pepper and cook over high heat, stirring often, between 2 and 3 minutes.\n2. Add tofu, chili powder, nutritional yeast (if using), garlic powder, cumin, oregano, and soy sauce. Reduce heat to medium and cook for 3 minutes, stirring often.\n3. Heat a tortilla in a dry heavy pan, turning it from side to side until it is soft and flexible.\n4. Place a small amount of tofu mixture in the center, then fold the tortilla in half and remove from heat.\n5. Garnish with lettuce, green onions, tomato, salsa, and avocado, if using. Repeat with each remaining tortilla.\n\n**Nutrition Facts**\n\nPer taco:\n\nCalories: 118\nFats: 4.1 g\n - Saturated Fat: 0.7 g\n - Calories From Fat: 31.4%\nCholesterol: 0 mg\nProtein: 5.7 g\nCarbohydrate: 16.9 g\nSugar: 2.8 g\nFiber: 3.2 g\nSodium: 321 mg\nCalcium: 116 mg\nIron: 1.6 mg\nVitamin C: 10 mg\nBeta-Carotene: 371 mcg\nVitamin E: 1.1 mg<|endoftext|>Keegan-Michael Key\nGets Serious\n\nFrench Revolutions\nCycling a stage of the Tour de France\n\nTasty Stays\nThe world's most delicious new hotels\n\nSneakers and spritzes for summer\nThe World’s Most Delicious New Hotels\n\nHotel dining used to mean room-service club sandwiches and limp iceberg lettuce salads at the brightly lit lobby bar. Not anymore. Now, the best meals to be had on the road—from Berlin to Brooklyn—are an elevator ride away.\nThe Dewberry\nCHARLESTON, SOUTH CAROLINA\n\nThe Dewberry opened its doors last July, immediately becoming the place to stay in Charleston thanks to its luxe yet refined Mid-Century Modern design, central location, and, most important, its Dixie-inflected French restaurant, Henrietta’s (which is saying a lot, considering what a foodie destination Chucktown is). Waiters in white jackets whisk out plates of steak frites and flounder meunière in the airy dining room, but the must-order dish is a mere “for the table” starter: gougerès with chicken liver mousse. These buttery, Gruyère-laden yet surprisingly light puffs of pastry are as French as you can get, but executive chef R.J. Dye drew from his own Southern history for Henrietta’s presentation. “We serve the warm gougerès in the same manner that steaming hot baskets of buttermilk biscuits were delivered to the table by my grandmother,” he says. But rather than wrapping them in a tea towel, he nestles the puffs in an elegant ceramic dish with a slate top that he decorates with a swipe of chicken liver mousse, a totally rich and over-the-top accompaniment that is nonetheless absolutely necessary. He finishes with a bit more Southern flair: a sprinkling of toasted benne seeds, a cousin of the sesame seed that has deep Low Country roots. Dye says he adds them not for the history but for the taste: “The subtle nutty and earthy flavor profile keeps the gougerès grounded.” Whatever the reason, you’ll want a second order. –EC<|endoftext|>The Importance of Food Labelling\n\n25 August 2010\n\nEnsuring food safety is a shared responsibility between governments, producers, industry and consumers. Food labelling is one way in which consumers can get knowledge about the food they consider buying. Correctly following the information provided on food labels (such as expiry dates, handling instructions and allergy warnings) can help consumers prevent unnecessary food-borne illness and allergic reactions.\n\nExpiry dates\n\nIn the European Union (EU), an intricate set of legislation and standards has been developed and implemented to ensure safety throughout the entire food chain. Perishable foods, judged from a microbiological point of view (such as cooked meat products, prepared foods and salads), display a 'use by' date on the package and should not be eaten after this date, as this could present a health risk. In addition, many foods display a 'best before' date, which gives an indication of the “minimum durability”, or the period during which the food retains its specific properties when properly stored. In other words, a product whose “best before” date has expired may still be safe to eat, but the manufacturer no longer guarantees the sensory properties of the product (e.g. taste, smell, appearance etc).\n\nIn a recent nationally representative survey from the UK, only half (49%) of the over 3000 respondents correctly identified the ‘use by’ date as the best measure of safety and 47% said they would never eat cooked meat beyond its ‘use by’ date. Most respondents were found to be using expiry dates as a point of reference and relying on their own judgement to decide if the food was safe to eat by smelling it (74%) or by just looking at the food (65%). In a nationally representative study from Ireland (", "num_tokens": 2048} {"category": "olmocr_science_pdfs-food_and_dining", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-food_and_dining/part-00-00000.npy", "text": "Implementing the strategy and measuring progress\n\nHow the FSA will implement its 5-year strategy and measure progress in priority areas.\n\nThis strategy sets our direction for the next five years. We expect our organisation and our work to evolve to meet the ambitions we have set out.\n\nWe will need to be flexible in our approach, particularly as we explore new areas of our strategy such as our vision for food that is healthier and more sustainable.\n\nWe are setting our corporate objectives and work plan for the first year alongside this strategy and will set work plans for subsequent years through our corporate planning process. We will discuss these at public Board meetings. We will also work with external stakeholders to inform work planning, as part of our commitment to work with and through others.\n\nWe know from the last five years with EU exit and the COVID-19 pandemic that our context can change significantly. But we expect this strategy to provide the framework with which to face those changes: clarity about our vision, our objectives, and how we are going to do our work.\n\nHaving set out our strategy, we will need to make sure that the FSA has the capacity and capability to deliver on it. We will include in our work plans some internal pieces of work that help us to build that resource, and to ensure that the guiding principles are fully embedded in the FSA.\n\nOur people plan\n\nWe are developing a new people plan to enable us to deliver on our strategy. Its focus will be on maximising organisational capability, living our values, ensuring an excellent employee experience and growing and developing our people.\n\nServices approach\n\nWe believe it is important to see some of our work as a ‘service’ for the public, industry, local authorities or other parts of government. We have applied a service design approach to our digital services for some time but are now expanding this into other areas of our organisation. This will include increasing the amount of feedback we receive on our work, establishing and monitoring performance metrics and redesigning some of our processes to work more smoothly. Through this process we aim to make it easier for businesses to meet their obligations and do the right thing.\n\nMeasuring progress\n\nExisting measures\n\nThe food system is incredibly complex. To measure the successful delivery of our strategy, we will need to consider a range of metrics acknowledging the complexity involved in measuring progress in the food system.\nThere are also many actors, including the FSA, with different roles and responsibilities to make food safe, what it says it is and healthy and sustainable. This means we will need to look at progress from several angles.\n\nThe FSA has a performance reporting system with a cascade of metrics and targets, from our top-level strategic objectives down to the daily activities of our frontline work. We publish performance data on a regular basis, for example in performance and resources reports to the FSA Board’s Business Committee.\n\nWe plan to evolve this performance reporting system and use it to measure progress against our new strategy.\n\nMany of the existing measures already align with our new strategy including on whether food is safe and food is what it says it is.\n\nFor example, relating to our vision that food is safe, we publish figures for the number of laboratory confirmed cases of the ‘big four’ food pathogens. These are the number of cases, confirmed by laboratory tests, of four of the main sources of foodborne illness – E. Coli, Salmonella, Campylobacter and Listeria. This allows us to measure an outcome in the food system we want to see - that cases remain low.\n\nLab confirmed cases of ‘Big 4’ food pathogens (000s)\n\nWe regularly measure consumer perspectives on the food system and of the FSA:\n\nPercentage of consumers who are confident in food safety and authenticity\nWe also publish measures of the contribution the FSA and others in the food system make to achieving these outcomes.\n\nFor example, we report on the percentage of Food Business Operators (FBOs) achieving FHRS ratings of five (meaning very good) and those receiving a rating below three (meaning below satisfactory). We also report on the percentage of meat FBOs who are rated as satisfactory or above for compliance and audit activity.\n\n**Percentage of businesses achieving FHRS score five (very good)**\n\n**Percentage of meat businesses audited rated 'good'**\nThese measures continue to represent a picture of the performance of the FSA and the food system as a whole and provide a useful baseline to measure progress against.\n\n**Updated and new measures**\n\nWe will develop new metrics and revise our performance reporting to fit this new strategy.\n\nTo effectively evaluate our strategy, our metrics will go from ‘end-to-end’, so we have numbers for own our activities and outputs, for how the food system overall is doing and how those join together so we can assess our particular contribution:\n\n- Developing and improving measures covering our core role in food that is safe and food is what it says it is.\n- Incorporating the right set of measures to understand progress in the area of food that is healthier and more sustainable (building on existing nutrition measures we use in Northern Ireland).\n- Incorporating measures relevant to protecting wider consumer interests in food, such as food insecurity and affordability.\n- Expanding the measures relating to how we are embedding our principles, for example measures of FSA service delivery such as user feedback, or how long it takes us to perform certain actions.\n- Tracking the benefits we have delivered in areas covered by our strategy, for example what corporate plan milestones have we reached and what impact we can demonstrate for consumers (either as forecasts or retrospective evaluations).\n\nUltimately this strategy is all about delivering food you can trust for consumers. By using a robust and varied set of measures to track delivery and impact over the next five years, we will be able to adjust our approach where needed, deal with change, and ultimately be sure that everyone has food that is safe, is what it says it is, and is healthier and more sustainable.<|endoftext|>Food Allergens: A Comprehensive Approach For Food Processors To Prevent Unintended Allergens In Their Foodstuffs\n\n- Dairy\n- Egg\n- Crustacean Shellfish\n- Fish\n- Tree Nuts\n- Wheat\n- Peanuts\n- Soybeans\n\nA Food Safety Guide for Food Processors\n\nEHA\nContents\n\nChapter 1: Introduction p.3\n\nChapter 2: Allergens and Food Processors p.4\n\nChapter 3: Food Processors’ Allergen Challenges p.5\n\nChapter 4: Major Risk Areas for Allergen Recalls p.6\n\nPart 1. Controls\n\nA. Product Intake Handling\nB. Allergen Identification\nC. Storage\nD. Cross-Contamination\nE. Product Matrix\nF. Labeling\n i. US Government Regulations\n ii. International Regulations\n iii. Label Allergens\nG. Proper Sanitation\n i. Cleaning Methods\n ii. Inspection\nH. Testing Allergens\n i. Actions That Have To Be Taken\n\nPart 2. Employee Training\n\nChapter 5: Moving Forward p.16\n\nPart 1. Processor\nPart 2. Customers\n\nChapter 6: How EHA Consulting Group, Inc. Can Help p.17\n\nAbout EHA Consulting Group Inc.\n\nEHA Consulting Group, Inc. (EHA) offers comprehensive public health consulting, epidemiology and food safety services before, during and after a crisis. We provide these services to Retail Food, Food Service, Food Processing, and Contract Food Service Management companies.\n\nNeed our Services? Call us today at 800-969-1441.\n\nVisit us at www.ehagroup.com. Follow us on Twitter @EHAConsultingGp.\nIntroduction\n\n“The proper control of food allergens in a food processing plant presents numerous challenges. The ubiquitous presence of allergens in the human food supply, coupled with increased awareness of food allergies, warrants undertaking appropriate preventive measures to protect sensitive consumers from unwanted exposure to offending food allergens. Food processors must have an allergen prevention plan to determine potential sources of contaminating allergens and create appropriate controls to prevent allergen introduction into food products.”\n\nThe proper control of food allergens in a food processing plant presents numerous challenges. The ubiquitous presence of allergens in the human food supply, coupled with increased awareness of food allergies, warrants undertaking appropriate preventive measures to protect sensitive consumers from unwanted exposure to offending food allergens. Food processors must have an allergen prevention plan to determine potential sources of contaminating allergens and create appropriate controls to prevent allergen introduction into food products.\n\nThe following guide from EHA Consulting Group, Inc. (EHA) contains information, best practices, and tools for a food processing company to avoid allergen-related recalls. Key factors in allergen control include poor identification, poor handling, poor storage, improper product matrix, improper labeling, poor sanitization, and inadequate testing. The purpose of this guide is to educate you and your staff on the proper steps to protect your brand and your business from the negative ramifications of an allergens incident and potential recall.\nAllergens and Food Processors\n\n“Up to 15 million Americans have food allergies, 1 in every 13 children under the age of 18.”\n\nWhen it comes to food allergens, what you don’t know could hurt you - as a customer and as a business owner. Up to 15 million Americans have food allergies, including one in every 13 children under the age of 18. Ensuring that a large number of potential customers can safely consume your food is a vital business practice.\n\nAllergens affect people in various ways. Allergens are substances, usually protein in nature, that illicits a reaction that is generically termed an allergic reaction. Allergens do not have to be proteins; they can be chemical, such as sodium bisulfite or MSG (monosodium glutamate) and in non-food settings, they can be dust. Food allergens are an improper reaction of someone’s immune system that most of", "num_tokens": 2048} {"category": "olmocr_science_pdfs-food_and_dining", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-food_and_dining/part-00-00000.npy", "text": " surface of the storage and dispensing portion is shaped substantially like the inner surface of a drinking cup.\n\n[0018] In still other preferred embodiments, the storage and dispensing portion is cooperative with a sealing cap.\nIn other preferred embodiments, the storage and dispensing portion is shaped so as to accommodate storage of a closed cylindrical container.\n\nIn yet more preferred embodiments, the storage and dispensing portion includes a plurality of drinking cups.\n\nIn still more preferred embodiments, the drinking cups each bear a trademark.\n\nAnother general aspect of the invention is a bottle for containing a beverage, and for storing and dispensing cups useful for consuming the beverage. The bottle includes a cup storage and dispensing portion formed into a surface of the bottle, an inner surface of the cup storage and dispensing portion including a cup retaining element capable of resisting removal of a cup from the cup storage and dispensing portion. The bottle also includes a plurality of cups stored within the cup storage and dispensing portion.\n\nIn preferred embodiments, the cup storage and dispensing portion is formed into a bottom of the bottle. In other preferred embodiments, the cup storage and dispensing portion is formed into a side wall of the bottle.\n\nIn still other preferred embodiments, the cup storage and dispensing portion is sealed by a cap.\n\nIn further preferred embodiments, the cup storage and dispensing portion is shaped to accommodate a cup, while maximizing the volume of the bottle.\n\nIn still further preferred embodiments, the bottle also includes at least one sample within the cup storage and dispensing portion.\n\nIn other preferred embodiments, the cup retaining element, capable of resisting removal of a cup from the cup storage and dispensing portion, includes a plurality of resistance regions.\n\nIn still other preferred embodiments, the resistance regions are circumferentially disposed.\n\nIn preferred embodiments, the cup retaining element is formed from a wall of the cup storage and dispensing portion.\n\nAnother general aspect of the invention is a method of providing promotional items with drink containers. The method includes providing a drink container with integral storage formed into a wall of the container, the storage forming an externally accessible cavity extending into the drink container. Then, placing one or more promotional items within the externally accessible cavity, and sealing the promotional items within the externally accessible cavity with a removable lid.\n\nFIG. 5 is a cut-away view of an alternate preferred embodiment of the invention storing promotional items.\n\nDETAILED DESCRIPTION OF PREFERRED EMBODIMENTS\n\nFIG. 1 shows a cut-away perspective view of the drink storage and dispenser portion of a preferred embodiment of the invention with details of key features and elements. This portion of the preferred embodiment of the invention includes concentric cylinders joined at the top with the inner cylinder closed at the bottom. The shape of it is essentially that of a sleeve that can accept a plurality of cups within the sleeve such that only the bottom surface of the last cup inserted into the sleeve is exposed.\n\nThe storage and dispenser portion of the invention in this embodiment includes two cylinders, an outer cylinder 120 and an inner cylinder 130 which is smaller in diameter and shorter in length than outer cylinder 120. Additionally, the inner cylinder 130 has a closed end 140. The inner cylinder 130 is located concentrically within the outer cylinder 120 such that the open end of inner cylinder 130 is aligned yet opposed with respect to an open end of outer cylinder 120. The aligned open ends of the cylinders 120, 130 are attached by an annular seal 110 to maintain the cylinders 120, 130 in stable relative position, and to close off one end of the space between the cylinders, thereby creating a storage space 150 between cylinders, thereby providing space for a plurality of stacked drinking cups. A circumferential retaining ridge 160 provides a barrier that resists removal of each of the cups, as explained further below.\n\nFIG. 2 shows a cut away view of a preferred embodiment of the invention where the bottom of a large beverage container, such as a soda bottle, includes a storage and dispensing portion 100. The storage and dispensing portion 100 of FIG. 2 is very similar to the structure described in FIG. 1, differing only in the relative slant of the cylinder walls, and that the plastic is formed as a continuous structure that is integral to the wall 210 which descends to form the bottom of the large beverage container 220, which includes the storage and dispensing portion 100. FIG. 2 also shows a cross-sectional view of a circumferential retaining ridge 160, which is essentially the same as the circumferential retaining ridge 160 of FIG. 1. This storage and dispensing portion 100 of the large beverage container 220 can accept a plurality of cups that can each be inserted by a person or by a machine situated outside the large beverage container 220.\n\nThe storage and dispensing portion 100 of the invention is made from the same material used to make standard beverage containers. For example, in the case of a two-liter soft drink container, the invention is made from PET plastic, which is relatively hard and transparent. In the case of a one-half or one gallon milk container, the invention is made from partially translucent or opaque plastic. The invention can also be made from glass, such as when included in the bottom or the side of a large glass milk jug. The invention could also be included in the side or the bottom of a very large plastic water cooler bottle, for example.\n\nThe storage and dispensing portion 100 can store and dispense a plurality of cups, each cup having a cup rim 260 sized to lightly contact the inner wall of the storage and dispensing portion 100. When a cup is moved past the circumferential retaining ridge 160 to add or remove a cup from the portion 100, it applies a compression force to a cup rim 260, temporarily deforming it slightly, as it moves past ridge.\nThe force applied to cup rim 260 is sufficient to prevent the cup 230 from falling out of the storage and dispenser portion 100 under its own weight, but is not enough to permanently deform the cup rim 260. Retaining ridge 160 can be a continuous structure, or it can be a plurality of segments interspersed with voids along the inner circumference of outer ring 120 so as to reduce the compression force on cup rim 260.\n\nFIG. 3 also displays how the invention takes advantage of the fact that drinking cups 230 can be stacked to provide maximum drinking cup storage with minimum volume being taken away from the interior volume of a drink container.\n\nTo keep drinking cups 230 from being exposed to dirt and germs outside the drink container, a lid 310 can be placed over the open end of cup storage portion 100. The lid 310 can be constructed and attached in a way similar to the plastic or foil-backed lids used to seal many liquid storage containers. These peel-off, single use lids provide protection to the contents during manufacture, distribution, and retail handling. Alternatively, the lid 310 can be made of rigid plastic, and formed in the shape of a thin stopper to allow the lid 310 to be reusable.\n\nWith reference to FIG. 4, the storage and retaining portion 100 of the invention can be formed into any wall of a drink container. FIG. 4 shows a side-wall embodiment of the invention integrated into the side wall of a plastic bottle or glass jug.\n\nFIG. 4 also shows an alternative embodiment of the invention without an inner wall similar to the inner cylinder 130. Instead, there is only an outer wall similar to the outer cylinder 120, and a flat back wall 410 instead of a cup-like wall 332. This embodiment provides storage for drinking cups, as well as anything else that one might want to include inside the inner-most cup, such as packets of sugar, drink flavoring, or collapsible drinking straws, for example. However, this embodiment also takes up a larger volume from drink container interior 220 than the other embodiments described herein.\n\nFIG. 5 shows an alternate embodiment of the invention with storage and dispenser portion 100, which can be accessed by removing lid 310. The storage and dispenser portion 100 here is shown NOT storing cups, but instead being used for storage of promotional items such as game cards, key rings, a coupon 510, or a product sample 520, as the manufacturer or bottler may choose to provide. Thus, the shape of storage and dispenser portion 100 could be other than cup-shaped, and could therefore be smaller or larger than a set of cups so as to accept such promotional items. In this embodiment, storage portion 100 could be used by the retail consumer to store an item or items of their choosing such as non perishable food.\n\nAlternatively, storage portion 100 could be used to store a different drink in its own small container, a trial sample 520 of a complimentary food, or other item offered by the manufacturer.\n\nStorage portion 100 could also accept similarly sized cups provided by the retail consumer, or another party, independent of the consumption of the drink container contents. In this way, the storage and dispenser portion of the invention can function solely as a cup storage and dispensing apparatus.\n\nOther modifications and implementations will occur to those skilled in the art without departing from the spirit and the scope of the invention as claimed. Accordingly, the above description is not intended to limit the invention except as indicated in the following claims", "num_tokens": 2048} {"category": "olmocr_science_pdfs-games", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-games/part-00-00000.npy", "text": "FLOURESCENT LAMP\nNAME PLATE\nSPEAKER\nSTRIKE BUTTON\nPOWER SUPPLY SWITCH\n\n#DEMGNETIZING SWITCH\nSERVICE SOCKET\nCASH BOX\n\nCOIN BOX KEY\n\n#DEMGNETIZING SWITCH (Used only when correcting irregular colour when power switch is turned on.)\n\nSPECIFICATION\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
POWER SUPPLYAC100V - 240V (to be adjusted)
POWER CONSUMPTION120W (AC100V)
GAME COSTADJUSTABLE (REF. PAGE 3)
DIMENSIONSW x D x H = 610 x 890 x 1700
CASH BOX CAPACITY(2,200 coins of Yen ¥100.-)
CRT20" Colour (monochro)
\n\nThese specifications may be changed without notice.\nAs the CRT used is the same as that in home TVs care must be taken to avoid damage during transportation and installation.\n\nAs this set is for indoor use do not install outdoors.\n\nAvoid places under direct sunlight and also avoid humid or dusty places.\n\nInstall on a solid level floor.\n\nLeave a suitable space around the machine to avoid obstruction during play and maintenance.\nBEFORE PLUGGING IN THE POWER CORD\n\nUSE THE DIP SWITCH TO SET YOUR MACHINE. IT IS LOCATED IN THE LOWER RIGHT AND ACCESSIBLE BY PULLING OUT PCB 1 AS SHOWN IN THE DIAGRAM.\n\nEXAMPLE SET AT TIME OF SHIPMENT\n\nSELECT YOUR COINAGE\nSELECT REPLAY POINTS\nREFER TO THE CHART FOR OTHER SETTINGS\n\nPLUG IN THE POWER CORD (ARRANGE THE CORD SO THAT IT IS OUT OF THE CUSTOMERS WAY). TURN THE POWER SWITCH ON.\n\nWHEN THE COLOUR IS IRREGULAR, PUSH THE DE MAGNETIZING SWITCH FOR 2 OR 3 SECONDS (SEE PAGES 1 & 9)\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
NO.SETFUNCTIONS
1FOR ADJUSTMENT
2ONON
3ONOFF
15003000
4ONON
5ONOFF
34
\n\nBONUS POINTS\n\nNUMBER OF HUNTERS\n\nGAME CHARGE\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
NO.SETFUNCTIONS
6ONONOFF
7ONOFFON
1 coin1 coin2 coins
8ONPREVENT
OFFTURNING
GAME SCREEN
\n\n

| | | |

\n\n\n\n\n\n\n\n\n
\nHOW TO PLAY\n\n1. INSERT COIN\n\n2. PUSH BUTTON ↓ FOR ONE PLAYER OR BUTTON ↓↓ FOR TWO PLAYERS AS DESIRED TO START.\n\n3. ONE MOLE HUNTER WILL TRAVEL AUTOMATICALLY TO THE TOP CENTER OF THE SCREEN AND UPON HIS ARRIVAL THE MOLES WILL BURROW UNDERGROUND. THE GAME STARTS.\n\n4. USE THE CONTROL LEVER TO MOVE THE HUNTER ACROSS, ALONG OR DIAGONALLY OVER THE SCREEN.\n\nWHEN THE MOLES EMERGE TO EAT, STRIKE THEM.\n\nTHE HIGHEST SCORE ACHIEVED WHILE THE MACHINE IS ON WILL BE REGISTERED.\n\nPARTNERS ↓↓ SCORE\n\nSINGLE PLAYERS ↓ SCORE\n\nPEANUT\n\nDOTTED LIGHTS SHOWING WHERE THE MOLES ARE BURROWING\n\nAFTER STRIKING A MOLE IT WILL RISE TO HEAVEN, LIKE THIS.\n\nGRAND FATHER MOLE. HE IS ALWAYS WAITING FOR A CHANCE TO BITE THE HUNTER SO THE HUNTER SHOULD APPROACH HIM FROM BEHIND\n\nNUMBER OF HUNTERS PER PLAY\n\nHALF EATEN PEANUT\n\nMOLE EATING A PEANUT\n\nBABY MOLE EMERGING\n5. IF THE HUNTER STRIKES THE\nGRANDFATHER, HE WILL RECEIVE\n50 POINTS BUT HE CANNOT KILL\nTHE GRANDFATHER UNTIL LAST\nONLY AFTER HE HAS DISPATCHED\nALL OF THE BABY MOLES.\n\n6. THE BABY MOLES CANNOT HURT THE\nHUNTER BUT THE GRANDFATHER\nCAN. IF THE GRANDFATHER DOES\nBITE THE HUNTER ANOTHER HUNTER\nWILL MOVE ON SCREEN TO TAKE\nHIS PLACE. HOWEVER IF THE\nFOURTH HUNTER IS BITEN, TWO\nCARRIERS WILL RUSH ON SCREEN\nAND CARRY HIM OFF.\n\n7. IF 2 PLAYERS ARE PLAYING AND THE\nFIRST PLAYER LOSES ONE HUNTER THE\nGAME WILL RETURN TO THE BEGINNING FOR\nTHE SECOND PLAYER TO COMMENCE.\n\n8. IF THE HUNTER IS SUCCESSFUL IN\nKILLING ALL OF THE BABY MOLES AND\nFINALLY THE GRANDFATHER, HE WILL\nRECEIVE 300 POINTS AND A FURTHER\n100 POINTS FOR EACH PEANUT THAT\nREMAINS.\n\n9. THE HUNTER CANNOT GUESS WHERE THE\nMOLES WILL EMERGE AND IF HE STRIKES\nAT, AND MISSES ONE, THE GRANDFATHER\nWILL LAUGH.\n\n10. WHEN ALL OF THE HUNTERS HAVE BEEN\nBITTEN AND THE LAST ONE CARRIED OFF\nTHE GAME IS OVER.\n\n---\n\n**SCORE**\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
GAMEPOINTS
KILL BABY30
STRIKE GRANDFATHER50
KILL GRANDFATHER300
REMAINING PEANUT100
\nMORE HUNTER 2\n\nIO and OPU boards same as\n\nASTRO FIGHTER - REFER TO\nASTRO FIGHTER TA-7 MANUAL,\n電気図面です。図面の文脈や記号については不明です。\nMOLE HUNTER\n\nHOW TO PLAY\n\n1. On the screen appear 16 baby moles and 16 peanuts. In the lower center lives Grandfather mole. In the top right hand corner, there are 4 mole hunters armed with hammers. (See Dia 1)\n\n2. When you begin to play, one mole hunter will travel automatically to the center at the top of the screen. Upon his arrival, all the moles will disappear underground. The dotted lights showing where the moles are burrowing. (See Dia 2)\n3. Soon, some baby moles will surface and begin to search for peanuts. However, they can only eat the peanuts if they can approach close enough to enter the dotted area around them. The hunter must try to kill the baby moles before all of the peanuts are eaten. (See Dia 3)\n\n4. When the hunter kills a baby mole, they will go to heaven and points are awarded to the hunter. With the loss of each baby, the Grandfather cries. However, if the hunter strikes at and misses a baby, the Grandfather laughs. (See Dia 4)\n\n5. If the Grandfather gets close to a peanut, he is able to eat it very quickly, but at this time, the hunter can strike him. When the hunter strikes the Grandfather, he will be awarded 150 or 300 mystery points, and will drive the Grandfather underground again. (See Dia 5)\n6. However, the grandfather can hurt the hunter and is always waiting for a chance to attack", "num_tokens": 2048} {"category": "olmocr_science_pdfs-games", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-games/part-00-00000.npy", "text": " more competitive in this market, and that is a good way to expand their business overseas.\n\n\\textsuperscript{6} CTS GAME STUDIES. Relatório de Investigação Preliminar: O Mercado Brasileiro de Jogos Eletrônicos.\n3. POSSIBILITIES AND EXPECTATIONS\n\nAs we have discussed previously, the Brazilian gaming market is challenging for companies to establish operations, and for consumers who do not want (or cannot) pay high prices for games. But national companies are finding ways to contour difficulties and sustainably grow. If we observe some of the main products/services offered by national game companies we can find four main operations: 1) Mobile gaming; 2) Social media games and advergames; 3) Serious games and games for corporate training; 4) A small but emergent board/card games market. We will discuss each one in detail below:\n\n1) Mobile gaming is a true emergent market for Brazilian developers. As mentioned before, the country has a wide base of mobile devices many of them included in the smartphone category with the feature of app downloading. Casual games deserve a highlight inside this context, and they can be defined, according to Trefay and Kaufmann (2010:1), as games that are quick to play, accessible and with simple mechanics. In this kind of game: the rules and goals must be clear; players need to be able to quickly reach proficiency; casual game play adapts to a player’s life and schedule; game concepts borrow familiar content and themes from life.\n\nLots of small publishers and studios are arising in the Brazilian mobile gaming scenario. Many mobile powerhouses are creating spaces for game developing inside their structures. As an example, we can bring the company named PontoMobi, that created in 2013 one game for a popular TV showman named Danilo Gentili; the game “The World Vs. Danilo Gentili7”. The game reached more than 100,000 download in few weeks and was offered to the users in a freemium model; Freemium (free + premium) is a business model by which a proprietary product or service (typically a digital offering such as software, media, games or web services) is provided free of charge, but money (premium) is charged for advanced features, functionality, or virtual goods (in that case, extra stages for the game).\n\nAnother example is the not-so-small company called Sioux, who has developed some mobile apps in partnership with “Grow”, a Brazilian company of toys and board games. One of their successes is the board game \"Perfil\" (which can be translated as Profile) where the player gets tips on famous people, places, things and years, and have to guess among some alternatives which is the right one – a classic Quiz Game. The mobile version made by Sioux\n\n---\n\n7 The game can be downloaded at https://itunes.apple.com/us/app/omvsdg-td/id473979611?mt=8\nreceived 70,000 downloads in the first month, was among the top five in the AppStore Brazil and became one of the highlights in the Samsung Store.\n\n2) Social media games and advergames are another way that Brazilian game designers found to make their games profit. The contemporary multiplatform environment, with so many connections between different devices, became a privileged ambient for the wide use of digital social networks and other technologies. In this context, all kinds of content can be consumed, shared and modified by the users, who also control their own modes of distribution.\n\nBefore we move on, it is important to explain that, in this context, we define social network sites in the words of Boyd and Ellison (2007), as web-based services that allow individuals to A) construct a public or semi-public profile within a bounded system, B) articulate a list of other users with whom they share a connection, and C) view and traverse their list of connections and those made by others within the system. The nature and nomenclature of these connections may vary from site to site.\n\nIt is also equally important to bring a definition of advergaming in this context. As we already discussed (BERIMBAU 2010: 61), there are many strategies in which brands can buy advertising space in the cyberspace of the game, like in-game advertising, dynamic in-game, game skinning, pre-game and post-game, static in-game and so on. More than to define the ever changing meaning of these practices, we need to understand that these communication strategies in videogames do not differ much from newspapers, TV programs, radio etc., in terms of media usage by ad makers. Here, brands too buy a place in a media that can (but not will) offer a content that is pertinent both to the media consumer and to the brand. Here, the relation of the brand with the game content looks more distant than the strategy of the advergame, that are, as defined by IAB, games created specifically for a brand, built from start to finish about a product or service. Here, the brand is not placed like an ad or a sponsor, somewhat dislocated from the experience generated through the game rules and aesthetics. In advergames, the fabric of meanings that constitute a brand are materialized within the dynamic and aesthetic of the game, producing experiences for the player that are uniquely relevant to that brand. Sports games, on the other hand, may seem as an exception, but they are not. It may seem that way because the sponsoring brands in racing cars or the ads on the edges of the soccer fields or tennis courts seem to give the player a better sense of reality,\n\n---\n\n8 This content is available at: [http://jcmc.indiana.edu/vol13/issue1/boyd.ellison.html](http://jcmc.indiana.edu/vol13/issue1/boyd.ellison.html) (last access: May, 2014)\ntrying to make the environment less fictitious to the player while simulating the experience of the consumption of the sport. In these cases, brands can be noted as “in the game”, and maybe even making it better somehow, but a game where Coke is present is not a game about Coke. The brand is not materializing its own semantic universe through the constituting elements of the game, but they are buying space (in this case, digital space) to be seen and remembered. In this sense, the game Doritos Crash Course looks more like a pertinent advergaming example as the constitutive elements of the game (rules and aesthetics) seek to give experiences to the player that promotes the symbolic consumption of the brand.\n\nDigital environments are great places to simulate this type of advertising. Internet and videogames already have many games like that, and Mobile media (cellphones, iPads, iPhones) are increasingly being used by brands that choose this marketing strategy. Also, the evergrowing social networks like Facebook created a market for companies to develop games to social media and advergames. A company named Hive (www.hive.com.br) is one good example of an enterprise engaged in creating social games and advergames for global brands like Procter & Gamble and some local famous Brazilian brands, like the Skol beer.\n\n3) Serious games and games for corporate training: following the thoughts of Nick Iuppa and Terry Borst (2007), this mode of game may be explained as games with a professional, educational or pedagogical use. Among electronic games, these serious games are the ones that most looks like advergames, in sense of its strategic use: in both, entertainment is the mean why the player is playing, but it is not why the game exists. There is the clear intention to communicate or teach something to the user. There are many companies like Games For Business (http://www.games4b.com.br/) that created many games for corporate training and ecological thinking. Some other are Aennova 360 (http://www.aennova.com/blog), E-Guru (http://www.e-guru.com.br/index.php/home) and OGG Corporate Simulations (http://www.ogg.com.br/index.php)\n\n4) Board/card games market: This is still a fairly small market in Brazil, with some major players selling mostly traditional games. But since 2012 it is taking its first steps to new and creative products. Some of these big players are introducing European titles to the market and a still small company called “Galapagos jogos” is bringing some of the new successes of the United States and Europe board/ card game industry. Although we have not found any research on the subject, we can find some local evidence that this kind of gaming is showing signs of growing interest. Some of these evidences are the growth of local offer of new products, appearance of communities in social networks to arrange gamedays, promote trades and meetings; opening of board/ card games theme pubs etc. This kind of hobby is slowly\ngetting a wider base of fans. Also, many of the companies listed on topic 3 also work with board and card games while using this format for training and education, and we can also see some small independent game designers using crowdfunding to put their ideas in the market.\n\nThus, we could observe movements of industrial development and consumption of games on the national scene, but there is still much in potential. The question that emerges from this situation is: what does it take to make that potential become a fact? As noted in a Brazilian news site named [http://convergecom.com.br/](http://convergecom.com.br/), based on a recent research made by BNDES10 (National Bank for Economic and Social Development), gaming industry in the country needs more business experience. Brazil has lots of talents for programming, 3D design, game writing and sound design, but still has a", "num_tokens": 2048} {"category": "olmocr_science_pdfs-games", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-games/part-00-00000.npy", "text": " insight from this project would be a better understanding of how coordination and collaboration in highly competitive gaming worlds can build players’ motivations and confidence to engage in self-improvement and a number of social activities. These findings will lead to future research on designing digital games that better combines competitive and collaborative dynamics for effective social learning.\nHow, if at all, Can Students Benefit from Structured Competitive Play?\n\nJames Kozachuk, B.S.\nUniversity of Central Florida\n\nThere is a strong link between participation in structured after-school activities and increased academic achievement among high school students, while engagement in solo activities such as Television Watching has been found to decrease performance in school (Cooper, Valentine, Nye, & Lindsay, 1999). However, much of this research was conducted on sports teams and other structured groups (e.g. church groups) leaving a critical gap of assessing the impact of team-based competition separate from traditional sports. With video-games as such a mainstream source of entertainment for youth, playing these games at a competitive level with friends has begun to follow a similar trend. Electronic sports, or “esports,” refers to competitive video-game play, often played in organized teams. The aim of this research was to better understand what role, if any, organized competitive video-game play has on school performance and to perform an assessment of their suitability as a beneficial after-school activity. Previously, competitive video games have been criticized for increasing feelings of aggression and decreased academic achievement (Gentile, Lynch, Linder, & Walsh, 2004). While much of this research has been criticized (Ferguson, 2007) and esports are becoming an increasingly popular activity for young adults (Hollist, 2015), a dearth of studies are left in their place indicating assessing this research questions is a critical need in both the game and teamwork fields. The current research sought to assess this critical issue by measuring factors that influence team cohesion and academic performance among high school esports teams who play competitive video-games games in a varsity circuit and how this play impacted individuals’ team cohesion at the time of play and the specific factors that influence academic performance of esports team members. Five-hundred (500) students participating in an online varsity video-game league, upon completion of a 12-week competition, were surveyed about their high school team experiences. A structural equation model was built to determine the factors that influence team cohesion, motivation to play, and academic achievement within the esports players. As hypothesized, the amount of structure of the esports club was a moderate predictor of ($\\beta = .14, p<.05$) academic performance (GPA, Number and percentage of honors classes taken) and the cohesiveness of the team ($\\beta = .16, p<.05$). Additionally, self-reports of team performance were also associated with increased cohesiveness ($\\beta = .32, p<.01$), but not motivation to play or academic performance. Amount of video-game play was associated with decreased academic performance ($\\beta = .15, p<.05$), indicating that it is participation in the esports team not video game play that drives increased cohesion and academic performance. Additionally, we found another indirect effect of team cohesion on academic performance as teams that were more cohesive had members who were more intrinsically motivated to play ($\\beta = .56, p <.001$) which lead to further increased academic achievement ($\\beta = .11, p<.05$). The practical implications of this finding could be generalized to the realm of education. Providing a suitable outlet for students to socialize and interact with a community of peers similar to themselves would allow positive academic and social benefits to students. An example of this would be the inception of an esports team at Robert Morris University in Chicago, Illinois. With university investment, Robert Morris University created a high quality team experience for their students, resulting in large performance benefits: reaching high placements in numerous collegiate varsity tournaments in 2014 and 2015. High school such as Guilford High School in Rockford, Illinois, have also adopted similar programs that have been well received by administration, students, and parents. Industry involvement has begun to grow: a good example of this is acquisition of collegiate community organizer, “Tespa,” by Blizzard Entertainment in 2013. This new partnership brings structured community environments to students. Through our research, we hypothesize this kind of environment is bound to produce similar academic benefits demonstrated by the high school students without our sample. Through dissemination of this research to teachers, educators, and school-board members we have better informed potential relevant stakeholders to this positive academic experience, who in turn have begun to take action to help reduce the archaic resistance to allowing these clubs on their campuses. This leaves an opportunity for companies to help further advance the structure of these clubs through other supporting partnerships, such as easing the monetary cost of these high quality experiences through product sponsorships, interactivity with these students, or other quality program-building processes. One might ask why industry has been reluctant to invest in these teams: a misconception about the gaming community may be the answer. There is the common stereotype that avid video game players are seen as addicted which leads to further perpetuating the negative connotation that video game players are “low-class, proto-violent addicted and dangerous kids” (Beavis, 1998). This is due to the idea that game playing is addictive, which thus produces a particular form of gamer (Cover, 2006). This has many implications on industry and development in the gaming world. This also leads to the question of the legitimacy of gamers and their authenticity as members of a broad community. There are opportunities to take this research even further: within the literature there are additional benefits which have not been addressed in the present sample. These potential benefits include an increase in prosocial behavior (Kataoka & Vandell, 2013). Further research is currently being conducted within this domain, and we hope to better understand the importance of these high quality socialization experiences and their benefits to students. Through dissemination of this research to teachers, educators, and school-board members we have better informed potential relevant stakeholders to this positive academic experience, who in turn have begun to take action to help reduce the archaic resistance to allowing these clubs on their campuses.\n\nREFERENCES<|endoftext|>The sequence of events in a novel leading to the climax\n\n\"Bakers make a lot of __\" is an example of a pun\n\nPersonification gives __ characteristics to an inanimate object\n\n\"It is raining cats and dogs\" is an example of an __\n\nLogos is the use of __ in an argument\n\nHow a story is narrated is called the __ of view\n\nWords used in everyday language or as a passing fad\n\n\"In Idaho, potatoes grow\" is a __ order sentence\n\n__ is the use of an emotional appeal in an argument\n\nMaking fun of human weakness or flaws is called __ in literature\n\nA comparison using \"like\" or \"as\"\n\nAn object or person that stands for more than just itself\n\nStandard English __ does not identify the writer's class or region\n\nEthos is the use of __ appeal in an argument\n\nIn synesthetic __, one sense represents another; \"it smelled yellow\"\n\nA __ tells a story with human characters and lesson or moral\n\n__ uses bitter or cutting remarks that often understate\n\nThe __ includes the time, place and mood of the story\n\n__ sentences do not express a complete thought until the end\n\nThe __ is the introduction at the beginning of a story\n\nAn inner __ is a way of showing the stream of consciousness\n\nA metaphor where a part represents the whole and vice versa\n\n__ shows that two ideas are equal within a sentence\n\n__ adds in extra words to extend the message that is being given\n\nSmog is a well-known __ of smoke and fog\n\n__ diction uses overly complex language to sound smarter\n\nBuzz, huff, quack, moo, splash, beep, tick-tock\n\n\"It was only a little temblor\" to describe an 8.6 earthquake\n\nEnter unused letters from puzzle, in order:\n\n___ __ __ __ __ __ __ __ __ __\n\n___ __ __ __ __ __ __ __ __ __\n\n___ __ __ __ __ __ __ __ __ __\n\nCopy boxed letters to form your hidden message:\n\n___________________________\n\nSolve Hundreds of Clue Search Puzzles\nCovering All Kinds of Topics for FREE!\nNo Membership or Email Required!\nVisit us at www.ClueSearchPuzzles.com<|endoftext|>WE THANK YOU FOR PURCHASING OUR MOLE HUNTER.\nWE ARE HOPEING THAT YOUR CUSTOMERS WILL ENJOY\nTHIS COLOURFUL HUNTING GAME. WE PRESENT THIS\nMANUAL SO THAT YOU MAY HAVE MAXIMUM LIFE AND\nENJOYMENT FROM YOUR MACHINE.\n\nINTRODUCTION FOR \"MOLE HUNTER\"\n==================================\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
CONTENTSPage.
1. Specifications1
2. Installation2
3. How to play4
4. Maintenance6
5. Maintenance chart9
\nSPECIFICATIONS\n\nSCREEN\nHUNTERS MOVEMENT LEVER\nHUNTER MAY BE MOVED ACROSS, ALONG OR DIAGONALLY OVER THE SCREEN.\n\nNUMBER OF PLAYERS SELECTION BUTTONS (Plays available for single or double players)\n\nCOIN SLOT\n\nCOIN RETURN LEVER\n\nCOIN RETURN CUP\n\nMAINTENANCE KEY.\n\n", "num_tokens": 2048} {"category": "olmocr_science_pdfs-games", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-games/part-00-00000.npy", "text": " and high school students, and Dr. Guo Freeman has a robust background in studying social dynamics in multiplayer online games, and is using that knowledge to inform electronic sports research. This discussion panel will consist of ten-minute introductions by each of the panelists regarding their current relevant research and professional backgrounds, and will conclude the remainder with an open discussion panel. This panel hopes to explore questions such as:\n\n• With the large reach of these competitive games for both players and spectators, why are there few psychological studies directly looking into the phenomenon of electronic sports?\n• How can researchers recruit individuals for studies on electronic sports? What are the barriers to this research?\n• In what ways can electronic sports-related research be conducted in the field of human factors psychology?\n• How can research benefit the experience of esports players and spectators?\n• What is the role of the spectator in esports? How can human factors better serve this demographic?\n• What can we learn about other disciplines, such as traditional sports, through electronic sports research?\n• Are the similarities between electronic sports and traditional sports similar enough to warrant future studies?\n\nPANELISTS\n\nHow, if at all, does Playing Video Games Affect Attention and Cognition?\nCyrus K. Foroughi, M.A.\nGeorge Mason University\n\nThe rise in competitive esports and more generally in the amount of time that individuals spend playing video games has led researchers to begin to explore the above question. As human factors practitioners, we should investigate how humans interact with these technologies (i.e., video games), and whether those interactions affect attention and cognition.\n\nPrevious Research (Video Game Play). The seminal work by Green and Bavelier (2003) in Nature showed that individuals who self-report as playing video games have heightened attentional abilities. In studies 1-4, they showed that video game players (VGP) had better performance compared to non-video game players (nVGP) on a battery of tasks including the flanker, enumeration, useful-field-of-view, and attentional-blink tasks. These studies were supported by a 5th training study that showed that nVGP who played action video games had increased visual selective attention compared to controls, supporting a casual mechanism. Since then, many cross-sectional and training studies have supported their work (e.g., Cain, Landau, & Shimamura, 2012; Castel et al., 2004; Green & Bavelier, 2006; Green & Bavelier, 2007). However, many studies have failed to replicate these findings. Specifically, Boot and colleagues (2008) failed to replicate the findings of Green and Bavelier (2003) with a similar training study, and many studies have not replicated the cross-sectional findings (e.g., Irons, Remington, & McLean, 2001; Murphy & Spencer, 2009). Further, Boot, Blakely, & Simons (2011) pointed out methodological flaws in many previous studies and other possible explanations that could explain the previous findings. In sum, there is mixed evidence to support the claim that playing video games enhances attentional abilities.\n\nEsports. Although researcher have begun to explore how playing video games may affect attention and cognition, little research exists that has examined how playing esports affects attention and cognition. Arguably, there are many similarities, but some differences are likely to exist. Most individuals who play/compete in esports likely represent the extreme end of individuals who play video games in terms of the amount of time played and the level of skill in the game. Thus, the obvious question is a classic “chicken or egg” question: how does one become an elite esport player? Taking Ericsson’s (Ericsson, Krampe, & Tesch-Römer, 1993) approach, does it requires countless hours of deliberate practice to become elite? Or do innate abilities such as a predisposition of improved reaction time come into play? Or, and this is the most likely scenario, what combination of both is required?\nAssessing Esports Players. One important consideration is the feasibility of measuring the attentional and cognitive abilities of the elite esports players, in this case, professional video game players. This would provide a ceiling for which other data can be compared across video game domains. It is not easy recruiting professional gamers for research. These players travel often and dedicate large portions of their day to practicing. Contacting them can be difficult and attempting to find a time when they can complete an on-site experiment is nearly impossible. Fortunately, as a former professional gamer, I was able to reach out to a few of my friends, and gain access to some current professional action video game players for experiments. Thus, combining my former experience in gaming with my formal training in experimental research, I have started to bridge a gap in this area of research. Further, being someone that these players can relate with made our interactions very positive. Unsurprisingly, early data from our lab indicates that elite esports players (i.e., professional video game players) have attentional abilities that are “off the charts” with very low reaction times and excellent performance on many attentional tasks (e.g., flanker, SART). However, as this data is not final and as correlational does not mean causation, we caution our findings for the time being.\n\nHow, if at all, does Esports Shape Players’ Online and Offline Social/Interpersonal Relationships?\n\nGuo Freeman, Ph.D.\nUniversity of Cincinnati\n\nIn the field of CSCW (Computer-Supported Cooperative Work) and HCI (Human-Computer Interaction), digital games have been considered an effective way to incorporate “warmth, playfulness, and poeticism” (Strong & Gaver, 1996) as powerful complements to design and develop any collaborative systems (Freeman, Bardzell, & Bardzell, 2016). There is already a large body of CSCW and HCI literature on social dynamics in gameplay (e.g., Brown & Bell, 2004; Ducheneaut, Moore, & Nickell, 2007; Ducheneaut & Moore, 2004; Freeman et al., 2015; McEwan et al., 2012). However, esports, as a new form of social gameplay intertwined with sports, collaboration, competition, cohesion, comradeship, blurred boundaries between online and offline social interactions, as well as game culture itself, has received relatively little research attention. The juxtaposition of the social meanings of competitive sports with the implementation of teamwork and collaboration as a game mechanic raises interesting questions about how studying social dynamics in esports can contribute to better designing games for social support and social learning. There is a growing body of scientific research on esports. For example, using interviews and ethnography, Taylor (2012) thoroughly investigates the connection between esports and sports, the path from amateur gaming to professional gaming, the structure and culture of esports, as well as gender issues in the traditionally male-dominated gaming world. By definition, esports is playing competitive games according to generally accepted rules of leagues and tournaments on the Internet (Weiss, 2008). On the one hand, esports are sophisticated Internet applications. Games such as FIFA video game series, Counterstrike (CS), Dota 2, and League of Legends (LoL) rely on advanced networking technologies to facilitate real-time inter-player interaction and competition. On the other hand, esports are highly complex sociotechnical systems. Players usually form small teams (e.g., “clubs”) to compete with other teams. In order to win in such highly competitive virtual environments, esports players extremely emphasize the sense of community, belongingness, cohesion, and comradeship among them. In contrast to regular multiplayer games in which players are physically distant and rarely meet one another offline, esports involve simultaneous watching gameplay on streaming websites (e.g., Twitch) and meeting others regularly at offline tournaments hosted by providers such as the League of Legends Tournament, the Electronic Sports League (ESL), and the National Gaming League. In all of these ways, esports in fact require and foster high level social skills (e.g., interaction, communication, cooperation, negotiation, and management) rather than undermining such skills. Then, the question becomes: How, if at all, do esports shape players’ social lives and interpersonal relationships, both online and offline? To explore this question, this research brings different perspectives and research methods to this topic. Specifically, this research has two contributions: First, it focuses on esports players’ social experiences and interpersonal relationships. This includes a scientific investigation of collaborative/competitive dynamics within the esports community and sheds light on the explicit and/or implicit impacts of esports on players’ collaborative learning and sociability. Second, by exploring when and how esports players feel enjoyment and emotional satisfaction in the interplay between game-mediated competition and collaboration, it endeavors to design and develop games for online social support. This points to future directions for designing value-sensitive and socially oriented games (Flanagan et al., 2005; Friedman, 1996) in contrast to the stereotype of revenue-oriented digital gaming industry. Both online and offline data will be collected for this research. The first type of data will be esports players’ self-reported data (i.e., posts and threads) of their gameplay and social experiences collected from popular online public forums for esports and public Facebook pages for esports teams. The second type of data source will be interview data. Esports players or people who engage in the esports community will be recruited to participate in semi-structured interviews. An in-depth qualitative analysis will be used to code and interpret the data, in order to explore participants’ unique and subjective personal experiences of esports and the rich sociocultural context surrounding their gameplay activities. At last, players’ in-game behaviors and go to public events/social gatherings/offline tournaments for esports will be observed to investigate their social interactions both online and offline. One", "num_tokens": 2048} {"category": "olmocr_science_pdfs-games", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-games/part-00-00000.npy", "text": " and bite him. In order to defend himself, the hunter should attack the Grandfather smartly in the beginning. (See Dia 6)\n\n7. If the Grandfather does bite the hunter, a new hunter will take his place. If the fourth and last hunter is bitten, however, two carriers will rush on screen and carry the wounded hunter off. (See Dia 7)\n\n8. If the hunter is successful in killing all of the baby moles, he can then kill the Grandfather. When the hunter succeeds in striking the Grandfather, he will send the Grandfather slowly to heaven and be awarded 300 points plus a further 100 points for each peanut that remains. (see Dia 8)\n\nThis concludes play and the player will be returned to the start again. However your next play may prove more difficult as the moles movement will be faster.<|endoftext|>ABSTRACT\n\nIn this paper we seek to observe the Brazilian gaming market with special emphasis on its potential and peculiar characteristics. Videogames are leading and intertwining landmarks of contemporary culture and, in Brazil, they develop a special role inside the entertainment industry. The Brazilian gaming scenario has a great number of obstacles and difficulties in production and development and is characterized by its high taxes and the absence of big players in gaming industry producing games locally. This results in expensive games that can be bought mostly by the richer classes, which leads, in turn, to high levels of piracy. Despite these challenges, the Brazilian market promises enormous potential for exploring games in many different areas, mostly through digital informational/educational games. We intend to discuss this scenario observing some data and researches, establishing some directions for broader discussions about this promising and complicated communicational ecosystem.\n\nKeywords: communication; Brazil; consumption; games; videogames; media;\n1. A WORD ABOUT BRAZIL\n\nAs an emergent country, Brazil is a land of contrasts. The country is the fifth largest in the world, it has the sixth largest population and it ranks seventh in terms of Internet usage. Brazilians are heavy Internet users, spending the largest average number of hours online\\(^1\\), mainly in social network websites like Facebook, Instagram and Twitter.\n\nIt may sound curious, but it is a fact: the number of mobile phones in Brazil nowadays is larger than the size of its population. In the beginning of 2014, more than 270 million phone lines were in activity in the country and more than 30 million of smartphones are expected to be working\\(^2\\). This is an important point to highlight because in the last five years mobile Internet access has become the dominant in Brazil. A recent study from Nielsen has found that Brazilian mobile users mainly download games, social network and video applications\\(^3\\).\n\nAcknowledging the prominence of digital culture in today's mediapolis (SILVERSTONE 2007), the large amount of videogames and digital platforms can be considered a privileged space for communication and marketing researchers of all kinds.\n\nThis kind of information helps us understand some features of the potential for a gaming market. Although we have no extensive research about the subject, there are some research efforts to better understand the Brazilian gaming market. One research presented in an important Brazilian videogame fair named \"GameWorld\" revealed that 60 million people have at least one videogame console at home. It is almost 33% of Brazil's population. The research revealed another curious fact: 48% of the players buy illegal games and only 17% of the sales occur at game shops\\(^4\\).\n\nWith this brief overview of the Brazilian gaming ecosystem, we will show deeper impressions, numbers and perceptions that we hope to help us broaden the discussion of this subject.\n\n---\n\n\\(^1\\) 23 hours a week, according to the latest available figures.\n\n\\(^2\\) Source: [http://teleco.com.br/](http://teleco.com.br/) (last access: May, 2014)\n\n\n\\(^4\\) Source: [http://jogos.uol.com.br/ultimas-noticias/2012/03/31/segundo-ibope-mais-de-60-milhoes-de-brasileiros-possuem-videogame-em-casa.htm](http://jogos.uol.com.br/ultimas-noticias/2012/03/31/segundo-ibope-mais-de-60-milhoes-de-brasileiros-possuem-videogame-em-casa.htm) (last access: May, 2014)\n2. BRAZILIAN GAMING MARKET: FROM ORIGINS UNTIL TODAY\n\nVideogames are a reality in Brazil since the late 1970s. At that time we had very few Brazilian programmers making games, but we had a lot of small industries copying games, but they could be regarded as \"legally pirated\" games. This began with a government practice in 1977 - and became an actual law in 1984, with the Federal Law 7.232/84 according to Chiado (2011:13) - in which government prohibits all computer hardware and software importation, as well as the establishment of foreign computer companies in the country – and that included videogames as well. With time, this law eventually opened a gap in the legal system which allowed domestic companies to copy the original hardware and software “adjusting” them to the Brazilian market, which basically consists in keeping the software intact and changing their titles, and making some minor changes in hardware (mostly aesthetic, but sometimes they were simpler versions of their original North American counterparts), and then releasing them without paying anything in royalties or copyright. This allowed many games to be released in the Brazilian market.\n\nThis situation may look a lot like the recent strategies of many Chinese industries, but with one major difference: the price of videogames for consumers in Brazil were very high - something between US$600.00 and US$1,000.00 for one videogame console. At that time, videogames were a product for the Brazilian richest – just a few could pay this much for electronic entertainment. This “legal piracy” kept going for some time, and only in 1983 Brazilian people saw the first official videogame in the country: The Atari 2600, known locally only as “Atari” and distributed by a Brazilian company called Polyvox, officially representing the American company in country.\n\nIn the late 1980s and 1990s this “legal piracy” was slowly losing its power and, at the same time, other brands officially arrived in Brazil: Nintendo and Sega first, and XBOX (Microsoft) and Sony later. However, games prices were kept very expensive - both consoles and software. Even when we observe the PC’s market, hardware and software appear as expensive goods. In the 2000s, PC games cost about US$ 70.00, and videogames about US$110.00. If we consider that the Brazilian family income per person of the 20% richest is, today, approximately US$ 1200.00, it is possible to realize that games have always been an entertainment for few people.\n\n5 Source:\n (last access: May, 2014)\nDespite being a very expensive product, a common practice in Brazil is the special financing offer of dividing the payment of the product among months, adding interest. It may be too difficult for an average Brazilian to pay US$1,000.00 for an XBOX ONE, but when one divides its payment equally into twelve months with one’s credit card, it gets a lot easier. This financial practice helped games became more and more a common practice among Brazilians, especially children and teenagers, which received these so desired expensive machines of entertainment mostly on commemorative days such as birthdays or Christmas gifts from their parents.\n\nBut what helped gaming culture spread through Brazilian media repertoire was piracy. Many people, until today, buy pirated goods or download it from the Internet. A researcher from MIT GAMBIT GameLab\\textsuperscript{6} made it clear:\n\n\"Piracy begins when the system reaches an extreme point where it is more convenient and cheaper (than the correct, legal system). If ‘games’ are sold at a fair price and if they are accessible; if the distribution model is efficient and cheap and well done, no one will have a reason to go Pirate. Give people fair prices for products and make them more accessible – that is one way to combat piracy. If it’s accessible and the price is not abusive... What matters is convenience, and it has to surpass piracy. Then, it is not a problem anymore”.\n\nIn Brazil, piracy is quite high, but this looks like a consequence of the characteristics of the domestic market, which suffers mainly from high taxes, concentration of wealth, and lack of infrastructure. Certainly, that is something to be understood and dealt with, if any gaming company thinks of beginning operations locally.\n\nMore recently the gaming culture has emerged in other social classes. That happens due to the high market penetration of smartphones in the middle class (as we saw in the previous topic). Because of that, mobile gaming is increasingly becoming more present among the entertainment habits of Brazilian people. The mobile gaming market is a kind of “escape route” for game developers in Brazil, which have the possibility to create games and – effectively – make them available for download to the entire world. That is why many national companies are making games for tablets and smartphones, knowing that they can be", "num_tokens": 2048} {"category": "olmocr_science_pdfs-games", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-games/part-00-00000.npy", "text": " lack of professionals to consistently and sustainably develop the field. Still, it’s a seemingly ordinary idea in the national industry that most of the newly graduated game designers dream of making their own God of War game, or work in the next Call of Duty project – and that is something that he will not find here. As we have seen the local industry demands for people who THINK games, they are quick in solving production issues with simple and straightforward ideas and know how to use them as a means of communication, if necessary. It may not be a job that will offer all the glamour of having your name in the credits of a super-production, but by no means is it less challenging, demanding and interesting.\n\nThese main operation types of Brazilian companies and freelancers should be understood as illustrations of the national producer/consumer scenery. In no way we seek to include all the strategies of Brazilian gaming companies or exhaust the possibilities of activities on national or international gaming markets. We wish here to point to some characteristics of the national scene looking to shed light on the common sense that the \"game industry\" refers only to videogame consoles or mainstream PC games. This perception is something that specialized media seems to emphasize, because that seems to be the preference of games heavy users - although, as seen through research, the casual gamer plays more games and for longer than the hardcore gamer, as Juul (2010) says. For local producers, perhaps Steam, Apple Store, Google Play and gaming portals are more suitable as distribution channels, while research and development focused on training/education games seem to be a more fertile market.\n\n---\n\n10 Source: http://goo.gl/00Wi1X (last access: May, 2014)\n4. IN SHORT\n\nBy discussing this overview about the Brazilian gaming market, we hope to demonstrate the different strategies that some companies utilize to explore the market and excel in this contemporary digital ecosystem.\n\nThe delicate relationship between consumers and brands/companies in a digital environment requires special care on both sides. Marketing and technology are no longer separate worlds and we can see it clearly in the videogames universe.\n\nWe welcome the opportunity to present this relevant discussion as a means of contributing to the ongoing efforts in exploring the Brazilian gaming market in contemporary media and consumption culture. We hope this brief paper inspires other researches and new ways to find answers in this prosperous and complicated entertainment market.\nREFERENCES\n\n\nTREFAY, Gregory; KAUFMANN, Morgan. *Casual Game Design*. Burlington: Morgan Kaufmann, 2010<|endoftext|>WE THANK YOU FOR PURCHASING OUR MOLE HUNTER.\nWE ARE HOPEING THAT YOUR CUSTOMERS WILL ENJOY\nTHIS COLOURFUL HUNTING GAME. WE PRESENT THIS\nMANUAL SO THAT YOU MAY HAVE MAXIMUM LIFE AND\nENJOYMENT FROM YOUR MACHINE.\n\nINTRODUCTION FOR \"MOLE HUNTER\"\n==================================\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
CONTENTSPage.
1. Specifications1
2. Installation2
3. How to play4
4. Maintenance6
5. Maintenance chart9
\nSPECIFICATIONS\n\nSCREEN\nHUNTERS MOVEMENT LEVER\nHUNTER MAY BE MOVED ACROSS, ALONG OR DIAGONALLY OVER THE SCREEN.\n\nNUMBER OF PLAYERS SELECTION BUTTONS (Plays available for single or double players)\n\nCOIN SLOT\n\nCOIN RETURN LEVER\n\nCOIN RETURN CUP\n\nMAINTENANCE KEY.\n\nFLOURESCENT LAMP\nNAME PLATE\nSPEAKER\nSTRIKE BUTTON\nPOWER SUPPLY SWITCH\n\n#DEMGNETIZING SWITCH\nSERVICE SOCKET\nCASH BOX\n\nCOIN BOX KEY\n\n#DEMGNETIZING SWITCH (Used only when correcting irregular colour when power switch is turned on.)\n\nSPECIFICATION\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
POWER SUPPLYAC100V - 240V (to be adjusted)
POWER CONSUMPTION120W (AC100V)
GAME COSTADJUSTABLE (REF. PAGE 3)
DIMENSIONSW x D x H = 610 x 890 x 1700
CASH BOX CAPACITY(2,200 coins of Yen ¥100.-)
CRT20" Colour (monochro)
\n\nThese specifications may be changed without notice.\nAs the CRT used is the same as that in home TVs care must be taken to avoid damage during transportation and installation.\n\nAs this set is for indoor use do not install outdoors.\n\nAvoid places under direct sunlight and also avoid humid or dusty places.\n\nInstall on a solid level floor.\n\nLeave a suitable space around the machine to avoid obstruction during play and maintenance.\nBEFORE PLUGGING IN THE POWER CORD\n\nUSE THE DIP SWITCH TO SET YOUR MACHINE. IT IS LOCATED IN THE LOWER RIGHT AND ACCESSIBLE BY PULLING OUT PCB 1 AS SHOWN IN THE DIAGRAM.\n\nEXAMPLE SET AT TIME OF SHIPMENT\n\nSELECT YOUR COINAGE\nSELECT REPLAY POINTS\nREFER TO THE CHART FOR OTHER SETTINGS\n\nPLUG IN THE POWER CORD (ARRANGE THE CORD SO THAT IT IS OUT OF THE CUSTOMERS WAY). TURN THE POWER SWITCH ON.\n\nWHEN THE COLOUR IS IRREGULAR, PUSH THE DE MAGNETIZING SWITCH FOR 2 OR 3 SECONDS (SEE PAGES 1 & 9)\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
NO.SETFUNCTIONS
1FOR ADJUSTMENT
2ONON
3ONOFF
15003000
4ONON
5ONOFF
34
\n\nBONUS POINTS\n\nNUMBER OF HUNTERS\n\nGAME CHARGE\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
NO.SETFUNCTIONS
6ONONOFF
7ONOFFON
1 coin1 coin2 coins
8ONPREVENT
OFFTURNING
GAME SCREEN
\n\n

| | | |

\n\n\n\n\n\n\n\n\n
\nHOW TO PLAY\n\n1. INSERT COIN\n\n2. PUSH BUTTON ↓ FOR ONE PLAYER OR BUTTON ↓↓ FOR TWO PLAYERS AS DESIRED TO START.\n\n3. ONE MOLE HUNTER WILL TRAVEL AUTOMATICALLY TO THE TOP CENTER OF THE SCREEN AND UPON HIS ARRIVAL THE MOLES WILL BURROW UNDERGROUND. THE GAME STARTS.\n\n4. USE THE CONTROL LEVER TO MOVE THE HUNTER ACROSS, ALONG OR DIAGONALLY OVER THE SCREEN.\n\nWHEN THE MOLES EMERGE TO EAT, STRIKE THEM.\n\nTHE HIGHEST SCORE ACHIEVED WHILE THE MACHINE IS ON WILL BE REGISTERED.\n\nPARTNERS ↓↓ SCORE\n\nSINGLE PLAYERS ↓ SCORE\n\nPEANUT\n\nDOTTED LIGHTS SHOWING WHERE THE MOLES ARE BURROWING\n\nAFTER STRIKING A MOLE IT WILL RISE TO HEAVEN, LIKE THIS.\n\nGRAND FATHER MOLE. HE IS ALWAYS WAITING FOR A CHANCE TO BITE THE HUNTER SO THE HUNTER SHOULD APPROACH HIM FROM BEHIND\n\nNUMBER OF HUNTERS PER PLAY\n\nHALF EATEN PEANUT\n\nMOLE EATING A PEANUT\n\nBABY MOLE EMERGING\n5. IF THE HUNTER STRIKES THE\nGRANDFATHER, HE WILL RECEIVE\n50 POINTS BUT HE CANNOT KILL\nTHE GRANDFATHER", "num_tokens": 2048} {"category": "olmocr_science_pdfs-games", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-games/part-00-00000.npy", "text": " includes a scientific investigation of collaborative/competitive dynamics within the esports community and sheds light on the explicit and/or implicit impacts of esports on players’ collaborative learning and sociability. Second, by exploring when and how esports players feel enjoyment and emotional satisfaction in the interplay between game-mediated competition and collaboration, it endeavors to design and develop games for online social support. This points to future directions for designing value-sensitive and socially oriented games (Flanagan et al., 2005; Friedman, 1996) in contrast to the stereotype of revenue-oriented digital gaming industry. Both online and offline data will be collected for this research. The first type of data will be esports players’ self-reported data (i.e., posts and threads) of their gameplay and social experiences collected from popular online public forums for esports and public Facebook pages for esports teams. The second type of data source will be interview data. Esports players or people who engage in the esports community will be recruited to participate in semi-structured interviews. An in-depth qualitative analysis will be used to code and interpret the data, in order to explore participants’ unique and subjective personal experiences of esports and the rich sociocultural context surrounding their gameplay activities. At last, players’ in-game behaviors and go to public events/social gatherings/offline tournaments for esports will be observed to investigate their social interactions both online and offline. One insight from this project would be a better understanding of how coordination and collaboration in highly competitive gaming worlds can build players’ motivations and confidence to engage in self-improvement and a number of social activities. These findings will lead to future research on designing digital games that better combines competitive and collaborative dynamics for effective social learning.\nHow, if at all, Can Students Benefit from Structured Competitive Play?\n\nJames Kozachuk, B.S.\nUniversity of Central Florida\n\nThere is a strong link between participation in structured after-school activities and increased academic achievement among high school students, while engagement in solo activities such as Television Watching has been found to decrease performance in school (Cooper, Valentine, Nye, & Lindsay, 1999). However, much of this research was conducted on sports teams and other structured groups (e.g. church groups) leaving a critical gap of assessing the impact of team-based competition separate from traditional sports. With video-games as such a mainstream source of entertainment for youth, playing these games at a competitive level with friends has begun to follow a similar trend. Electronic sports, or “esports,” refers to competitive video-game play, often played in organized teams. The aim of this research was to better understand what role, if any, organized competitive video-game play has on school performance and to perform an assessment of their suitability as a beneficial after-school activity. Previously, competitive video games have been criticized for increasing feelings of aggression and decreased academic achievement (Gentile, Lynch, Linder, & Walsh, 2004). While much of this research has been criticized (Ferguson, 2007) and esports are becoming an increasingly popular activity for young adults (Hollist, 2015), a dearth of studies are left in their place indicating assessing this research questions is a critical need in both the game and teamwork fields. The current research sought to assess this critical issue by measuring factors that influence team cohesion and academic performance among high school esports teams who play competitive video-games games in a varsity circuit and how this play impacted individuals’ team cohesion at the time of play and the specific factors that influence academic performance of esports team members. Five-hundred (500) students participating in an online varsity video-game league, upon completion of a 12-week competition, were surveyed about their high school team experiences. A structural equation model was built to determine the factors that influence team cohesion, motivation to play, and academic achievement within the esports players. As hypothesized, the amount of structure of the esports club was a moderate predictor of ($\\beta = .14, p<.05$) academic performance (GPA, Number and percentage of honors classes taken) and the cohesiveness of the team ($\\beta = .16, p<.05$). Additionally, self-reports of team performance were also associated with increased cohesiveness ($\\beta = .32, p<.01$), but not motivation to play or academic performance. Amount of video-game play was associated with decreased academic performance ($\\beta = .15, p<.05$), indicating that it is participation in the esports team not video game play that drives increased cohesion and academic performance. Additionally, we found another indirect effect of team cohesion on academic performance as teams that were more cohesive had members who were more intrinsically motivated to play ($\\beta = .56, p <.001$) which lead to further increased academic achievement ($\\beta = .11, p<.05$). The practical implications of this finding could be generalized to the realm of education. Providing a suitable outlet for students to socialize and interact with a community of peers similar to themselves would allow positive academic and social benefits to students. An example of this would be the inception of an esports team at Robert Morris University in Chicago, Illinois. With university investment, Robert Morris University created a high quality team experience for their students, resulting in large performance benefits: reaching high placements in numerous collegiate varsity tournaments in 2014 and 2015. High school such as Guilford High School in Rockford, Illinois, have also adopted similar programs that have been well received by administration, students, and parents. Industry involvement has begun to grow: a good example of this is acquisition of collegiate community organizer, “Tespa,” by Blizzard Entertainment in 2013. This new partnership brings structured community environments to students. Through our research, we hypothesize this kind of environment is bound to produce similar academic benefits demonstrated by the high school students without our sample. Through dissemination of this research to teachers, educators, and school-board members we have better informed potential relevant stakeholders to this positive academic experience, who in turn have begun to take action to help reduce the archaic resistance to allowing these clubs on their campuses. This leaves an opportunity for companies to help further advance the structure of these clubs through other supporting partnerships, such as easing the monetary cost of these high quality experiences through product sponsorships, interactivity with these students, or other quality program-building processes. One might ask why industry has been reluctant to invest in these teams: a misconception about the gaming community may be the answer. There is the common stereotype that avid video game players are seen as addicted which leads to further perpetuating the negative connotation that video game players are “low-class, proto-violent addicted and dangerous kids” (Beavis, 1998). This is due to the idea that game playing is addictive, which thus produces a particular form of gamer (Cover, 2006). This has many implications on industry and development in the gaming world. This also leads to the question of the legitimacy of gamers and their authenticity as members of a broad community. There are opportunities to take this research even further: within the literature there are additional benefits which have not been addressed in the present sample. These potential benefits include an increase in prosocial behavior (Kataoka & Vandell, 2013). Further research is currently being conducted within this domain, and we hope to better understand the importance of these high quality socialization experiences and their benefits to students. Through dissemination of this research to teachers, educators, and school-board members we have better informed potential relevant stakeholders to this positive academic experience, who in turn have begun to take action to help reduce the archaic resistance to allowing these clubs on their campuses.\n\nREFERENCES<|endoftext|>Squirt Bottle Game\n\nSupplies:\nSpray bottle set at the tight setting\nLight weight balls\nBroom/mop handles or other side rails\nFlat table\nTowel for drying between turns\nDirections:\nArrange the broom handles, or other type of rails, along the long sides of the table. You can place a container at the receiving end to catch the balls. A water proof table cloth at this end is also a good idea to keep the area dry.\nHave the child sit or stand at one end of the table with a ball in front of her/him. Give them the spray bottle and have them squirt the ball all the way down until it drops off the other end of the table. The child may need to use both hands and, if the child is very young or very weak, they may need hand-over-hand assistance.<|endoftext|>Exploring electronic sports: An interdisciplinary approach\n\nJames Kozachuk, B.S., University of Central Florida, Orlando, FL\nCyrus K. Foroughi, M.A., George Mason University, Fairfax, VA\nGuo Freeman, Ph.D., University of Cincinnati, Cincinnati, OH\n\nINTRODUCTION\n\nElectronic Sports, or “esports,” refers to high-level play and spectating of digital video-games (Hamilton, 2012), and typically involves a team of players. These players perform at the peak level of performance in these games—making reflexive and precise hand-movements, taking in and responding to large amounts of information, and work effectively with their team. The large similarities that this form of competition has with traditional sport has lead the U.S. government to begin assigning P-1A athletic visas to competitors. This field has grown drastically over the last decade—more competitions and players are participating and events attract millions of worldwide online spectators. In this panel we will discuss current research involving these players in the fields of human-computer interaction, team dynamics, cognition, information processing, as well as the potential applications in other subfields. The panelists have both direct research and professional experience with electronic sports: Cyrus Foroughi will provide insight as a former professional-gamer, James Kozachuk has run multiple nationwide tournaments for college", "num_tokens": 2048} {"category": "olmocr_science_pdfs-games", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-games/part-00-00000.npy", "text": "Exploring electronic sports: An interdisciplinary approach\n\nJames Kozachuk, B.S., University of Central Florida, Orlando, FL\nCyrus K. Foroughi, M.A., George Mason University, Fairfax, VA\nGuo Freeman, Ph.D., University of Cincinnati, Cincinnati, OH\n\nINTRODUCTION\n\nElectronic Sports, or “esports,” refers to high-level play and spectating of digital video-games (Hamilton, 2012), and typically involves a team of players. These players perform at the peak level of performance in these games—making reflexive and precise hand-movements, taking in and responding to large amounts of information, and work effectively with their team. The large similarities that this form of competition has with traditional sport has lead the U.S. government to begin assigning P-1A athletic visas to competitors. This field has grown drastically over the last decade—more competitions and players are participating and events attract millions of worldwide online spectators. In this panel we will discuss current research involving these players in the fields of human-computer interaction, team dynamics, cognition, information processing, as well as the potential applications in other subfields. The panelists have both direct research and professional experience with electronic sports: Cyrus Foroughi will provide insight as a former professional-gamer, James Kozachuk has run multiple nationwide tournaments for college and high school students, and Dr. Guo Freeman has a robust background in studying social dynamics in multiplayer online games, and is using that knowledge to inform electronic sports research. This discussion panel will consist of ten-minute introductions by each of the panelists regarding their current relevant research and professional backgrounds, and will conclude the remainder with an open discussion panel. This panel hopes to explore questions such as:\n\n• With the large reach of these competitive games for both players and spectators, why are there few psychological studies directly looking into the phenomenon of electronic sports?\n• How can researchers recruit individuals for studies on electronic sports? What are the barriers to this research?\n• In what ways can electronic sports-related research be conducted in the field of human factors psychology?\n• How can research benefit the experience of esports players and spectators?\n• What is the role of the spectator in esports? How can human factors better serve this demographic?\n• What can we learn about other disciplines, such as traditional sports, through electronic sports research?\n• Are the similarities between electronic sports and traditional sports similar enough to warrant future studies?\n\nPANELISTS\n\nHow, if at all, does Playing Video Games Affect Attention and Cognition?\nCyrus K. Foroughi, M.A.\nGeorge Mason University\n\nThe rise in competitive esports and more generally in the amount of time that individuals spend playing video games has led researchers to begin to explore the above question. As human factors practitioners, we should investigate how humans interact with these technologies (i.e., video games), and whether those interactions affect attention and cognition.\n\nPrevious Research (Video Game Play). The seminal work by Green and Bavelier (2003) in Nature showed that individuals who self-report as playing video games have heightened attentional abilities. In studies 1-4, they showed that video game players (VGP) had better performance compared to non-video game players (nVGP) on a battery of tasks including the flanker, enumeration, useful-field-of-view, and attentional-blink tasks. These studies were supported by a 5th training study that showed that nVGP who played action video games had increased visual selective attention compared to controls, supporting a casual mechanism. Since then, many cross-sectional and training studies have supported their work (e.g., Cain, Landau, & Shimamura, 2012; Castel et al., 2004; Green & Bavelier, 2006; Green & Bavelier, 2007). However, many studies have failed to replicate these findings. Specifically, Boot and colleagues (2008) failed to replicate the findings of Green and Bavelier (2003) with a similar training study, and many studies have not replicated the cross-sectional findings (e.g., Irons, Remington, & McLean, 2001; Murphy & Spencer, 2009). Further, Boot, Blakely, & Simons (2011) pointed out methodological flaws in many previous studies and other possible explanations that could explain the previous findings. In sum, there is mixed evidence to support the claim that playing video games enhances attentional abilities.\n\nEsports. Although researcher have begun to explore how playing video games may affect attention and cognition, little research exists that has examined how playing esports affects attention and cognition. Arguably, there are many similarities, but some differences are likely to exist. Most individuals who play/compete in esports likely represent the extreme end of individuals who play video games in terms of the amount of time played and the level of skill in the game. Thus, the obvious question is a classic “chicken or egg” question: how does one become an elite esport player? Taking Ericsson’s (Ericsson, Krampe, & Tesch-Römer, 1993) approach, does it requires countless hours of deliberate practice to become elite? Or do innate abilities such as a predisposition of improved reaction time come into play? Or, and this is the most likely scenario, what combination of both is required?\nAssessing Esports Players. One important consideration is the feasibility of measuring the attentional and cognitive abilities of the elite esports players, in this case, professional video game players. This would provide a ceiling for which other data can be compared across video game domains. It is not easy recruiting professional gamers for research. These players travel often and dedicate large portions of their day to practicing. Contacting them can be difficult and attempting to find a time when they can complete an on-site experiment is nearly impossible. Fortunately, as a former professional gamer, I was able to reach out to a few of my friends, and gain access to some current professional action video game players for experiments. Thus, combining my former experience in gaming with my formal training in experimental research, I have started to bridge a gap in this area of research. Further, being someone that these players can relate with made our interactions very positive. Unsurprisingly, early data from our lab indicates that elite esports players (i.e., professional video game players) have attentional abilities that are “off the charts” with very low reaction times and excellent performance on many attentional tasks (e.g., flanker, SART). However, as this data is not final and as correlational does not mean causation, we caution our findings for the time being.\n\nHow, if at all, does Esports Shape Players’ Online and Offline Social/Interpersonal Relationships?\n\nGuo Freeman, Ph.D.\nUniversity of Cincinnati\n\nIn the field of CSCW (Computer-Supported Cooperative Work) and HCI (Human-Computer Interaction), digital games have been considered an effective way to incorporate “warmth, playfulness, and poeticism” (Strong & Gaver, 1996) as powerful complements to design and develop any collaborative systems (Freeman, Bardzell, & Bardzell, 2016). There is already a large body of CSCW and HCI literature on social dynamics in gameplay (e.g., Brown & Bell, 2004; Ducheneaut, Moore, & Nickell, 2007; Ducheneaut & Moore, 2004; Freeman et al., 2015; McEwan et al., 2012). However, esports, as a new form of social gameplay intertwined with sports, collaboration, competition, cohesion, comradeship, blurred boundaries between online and offline social interactions, as well as game culture itself, has received relatively little research attention. The juxtaposition of the social meanings of competitive sports with the implementation of teamwork and collaboration as a game mechanic raises interesting questions about how studying social dynamics in esports can contribute to better designing games for social support and social learning. There is a growing body of scientific research on esports. For example, using interviews and ethnography, Taylor (2012) thoroughly investigates the connection between esports and sports, the path from amateur gaming to professional gaming, the structure and culture of esports, as well as gender issues in the traditionally male-dominated gaming world. By definition, esports is playing competitive games according to generally accepted rules of leagues and tournaments on the Internet (Weiss, 2008). On the one hand, esports are sophisticated Internet applications. Games such as FIFA video game series, Counterstrike (CS), Dota 2, and League of Legends (LoL) rely on advanced networking technologies to facilitate real-time inter-player interaction and competition. On the other hand, esports are highly complex sociotechnical systems. Players usually form small teams (e.g., “clubs”) to compete with other teams. In order to win in such highly competitive virtual environments, esports players extremely emphasize the sense of community, belongingness, cohesion, and comradeship among them. In contrast to regular multiplayer games in which players are physically distant and rarely meet one another offline, esports involve simultaneous watching gameplay on streaming websites (e.g., Twitch) and meeting others regularly at offline tournaments hosted by providers such as the League of Legends Tournament, the Electronic Sports League (ESL), and the National Gaming League. In all of these ways, esports in fact require and foster high level social skills (e.g., interaction, communication, cooperation, negotiation, and management) rather than undermining such skills. Then, the question becomes: How, if at all, do esports shape players’ social lives and interpersonal relationships, both online and offline? To explore this question, this research brings different perspectives and research methods to this topic. Specifically, this research has two contributions: First, it focuses on esports players’ social experiences and interpersonal relationships. This", "num_tokens": 2048} {"category": "olmocr_science_pdfs-health", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-health/part-00-00000.npy", "text": "90 (as defined by the original treatment plan) with increasing VS accumulation leading to a sub-optimal coverage of the PTV_Eval. For 30 cc MLB catheter, V100 decreased by 1.4% and V90 decreased by 0.9% for every 1 cc of VS. For 45cc MLB catheter, V100 decreased by 1.3% and V90 decreased by 1.15% for every 1.0 cc accumulation of VS.\n\nConclusions: Balloon catheter-tissue adherence ensures daily dose delivery to the planned PTV_Eval. Accumulation of seroma, hematoma or air between HDR fractions can significantly impact PTV_Eval dosimetry. Vacuum-port aspiration prior to delivery of each fraction, if available, should be considered to minimize the risk of geographic under dosing.\n\nJ Contemp Brachyther 2012; 4, 2: 101-105\nDOI: 10.5114/jcb.2012.29366\n\nKey words: seroma, dosimetry, breast brachytherapy, contura catheter.\nMaterial and methods\n\nThis is a dosimetric re-planning study using two volumes (30 cc and 45 cc) in a Contura® MLB catheter model. The Contura® balloon catheter was used for this study, because it is the only FDA-approved balloon brachytherapy device currently on the market that contains a vacuum port specifically designed to aspirate seroma, hematoma and/or air collection. Proof of principle of aspiration of the accumulated seroma via the vacuum port is shown in Fig. 1.\n\nTwo customized optimal treatment plans (for balloon volumes of 30 and 45 cc) were first generated using a single patient scan. Uniform balloon expansion of 1 mm increments around the balloon surface was then performed to simulate a theoretical and symmetrical “virtual seroma” (VS) accumulation up to 9 mm (Fig. 2). The volume (in cc) of this expansion was calculated by the Eclipse Brachyvision™ (Varian Inc., Palo Alto, CA) software to estimate each VS. With the use of the multiple (up to 5) channels of the Contura® catheter, the plans were generated prescribing 3.4 Gy per fraction to a “PTV_Eval” (a 10 mm PTV with appropriate modifications for skin and chest wall per RTOG 0413 guidelines).\n\nNew individualized plans were then generated for each 1 mm increment, representing additional accumulating VS, resulting in 10 plans for each balloon volume. Each potential plan scenario and dose-volume histograms were individually generated to compare changes in dosimetric coverage of the initially defined PTV_Eval. PTV_Eval dosimetry was then analyzed independently for each plan to assess the effect of the VS on the percent volume of PTV_Eval covered by the 100% isodose line (IDL) (V100) and the percent volume of PTV_Eval covered by the 90% IDL (V90).\n\nResults\n\nA total of twenty individual and customized 3-dimensional brachytherapy plans were generated for this comparative dosimetric study (ten each for 30 cc and 45 cc balloon volumes), representing VS volumes of 6-60 cc. For each simulated plan, the accumulation of VS volume resulted in increased distance separating peri-cavity breast tissue target from the balloon surface. This separation produced a commensurate decrease in the V100 and the V90 of the PTV_Eval (as defined by the original treatment plan) with increasing VS accumulation. Table 1 shows the effect of increasing seroma accumulation on the plans generated for 30 cc and 45 cc balloon, respectively. Each increasing uniform expansion of the balloon catheter to simulate VS resulted in a symmetrical volumetric target separation. This translated into a corresponding decrease in V100 and V90. Tabular data is represented as a scatter plot for 30 cc and 45 cc balloon catheters in Figs. 3, 4 and 5, 6, respectively. The best-fit-line model for 30 cc balloon showed that V100 coverage of the PTV_EVAL decreased by 1.4% for every 1 cc accumulation of VS (Range = 7-10% for every 5-7 cc). A similar pattern was noted for the scatter plot analysis for 45 cc catheter, where V100 was shown to decrease by 1.3% for every 1 cc accumulation of VS (Range = 6-9% for every 5-7 cc). For V90, scatter plot analyses revealed a decreased coverage of 0.9% for every 1 cc of VS for 30 cc balloon plans and 1.15% for 45 cc balloon plans.\nTable 1. Twenty plans based on 30 and 45 cc balloon catheters\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
Plan #Increase in balloon to breast tissue distance (mm)30 cc balloon catheter plans45 cc balloon catheter plans
Seroma volume (cc)Vol of PTV_Eval covered by 100% IDL (cc)% of initial PTV_Eval covered by 90% IDL (V90)
1065.6100
21659.6
3210.355.3
4315.749.9
5421.843.8
6528.237.4
7634.930.7
8741.823.8
9849.316.3
10959.29.9
\n\nNote: The table includes the effect of accumulating seroma causing an increase in balloon to breast tissue distance. This in turn affects the volume and percentage of the initial PTV_Eval covered by 100% (V100) and 90% (V90) IDL, leading to sub-optimal plans. IDL – isodose line.\n\nFig. 3. Scatter plot and best fit line of V100 for repeat plans with increasing seroma volumes for 30 cc balloon catheter\n\nFig. 4. Scatter plot and best fit line of V90 for repeat plans with increasing seroma volumes for 30 cc balloon catheter\n\nFig. 5. Scatter plot and best fit line of V100 for repeat plans with increasing seroma volumes for 45 cc balloon catheter\n\nFig. 6. Scatter plot and best fit line of V90 for repeat plans with increasing seroma volumes for 45 cc balloon catheter\nDiscussion\n\nSeroma is formed by acute inflammatory exudates in response to surgical trauma and acute phase of wound healing. Although the pathophysiology of seroma is incompletely understood, the formation seems to be correlated with certain cytokine levels and body mass index [11,19]. With regards to breast brachytherapy, post-treatment seroma formation has been shown to be more likely to result from \"open\" (intra-operative) versus \"closed\" (post-operative) placement of the balloon brachytherapy catheter. Soran et al. [20] showed a 20% rate of persistent seroma (> 6 months) with open placement versus 0% for post-operative placement. Cosmetic outcomes were also noted to be worse in patients with seroma. Watkins et al. [21] showed that the only factor identified as statistically significant for the development of any seroma was catheter placement on a day of resection vs. ≥ 1 day later (59% vs. 33%). Numerous recent imaging studies have shown that the lumpectomy cavity volume changes significantly in time frames relevant to radiotherapy planning and delivery [16,17,22-27]. The range of average volume changes reported in these studies was 22.5-64% [16,27]. The change in volume of the seroma has been shown to affect the", "num_tokens": 2048} {"category": "olmocr_science_pdfs-health", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-health/part-00-00000.npy", "text": " of drugs, individual differences of drug responses, patient counseling, pharmaco-economic aspects, social aspects of drug use and misuse, correlation between clinical trials and clinical practice, formulations of better therapeutic guidelines, discovery of new indications, new drug discovery etc.\nHypertensive disorders are the most common medical complications of pregnancy with a reported incidence ranging from 6 to 10% [3]. The incidence varies among different hospitals, regions and countries. In addition, these disorders are a major cause of maternal and prenatal mortality world wide [4].\n\nHypertensive pregnant mothers have greater risks for premature deliver, intrauterine foetal death, growth retardation and abruption placenta, they also have an increased risk of vascular injury with thrombotic microangiopaty and co-agulopathy, cerebral haemorrhage, and multi organ injury especially of kidney and liver.\n\nSo as to avoid all such complications, it is better to start the treatment with antihypertensive after assessing correct stage and class of hypertension and always prescribe the safe drug to avoid adverse effects over the foetus and mother.\n\nThe goal of antihypertensive therapy is to protect the mother from the extremes of hypertension and potential morbidity, there by, allowing the pregnancy to continue and the foetus to grow and mature normally. Observations should be made on teratogenic risks, potential adverse effects on foetal cardiovascular of end organ function and a potential impact on foetal growth and uteroplacental haemodynamics and perfusion.\n\nIn contrast with drug utilization study, pharmacoepidemiological studies are the study of effects of the drugs in a large number of persons [5-7]. Recently the definition has been changed as “the study of distribution and determinants of drug related events in population and application of this for the safe and efficacious drug use with special emphases on the resulting medical, social and economic consequences” [8].\n\nThe first study in drug utilization can be traced back to the thalidomide tragedy when SPIERS made an extensive study of prescriptions in an area of Scotland called Stirling-shire to retrieve prescriptions written for thalidomide for majority of mothers[9].\n\nThe errors in prescriptions are not uncommon. This could be due to ignorance or inadequate knowledge about the disease and the pharmacology of the drugs prescribed. Erroruated prescriptions are recognized even in tertiary care hospital [10].\n\nAs prescribing habits differ from doctor to doctor and several factors influence drug prescription. It has been proposed that there are differences in prescribing due to differences in therapeutic approach among doctors in different countries [11].\n\nMATERIALS & METHODOLOGY\n\nTwo teaching hospitals namely Govt. General Hospital and Sangmeshwar Teaching Hospital, Gulbarga attached to M. R. Medical College, Gulbarga were selected for our prospective study. Out of these, one is a Government Hospital and the other is a Private Hospital. This was done, keeping in view the patients of two economic classes (Higher / Lower). Both the hospitals have full fledged facilities of a tertiary care hospital.\n\nThe patients were selected from any of the units belonging to the department. Hence the teaching staff of the concerned units and postgraduate students was involved in the study. The plan of the study was discussed with them and information regarding the use of drugs in detail was sought. Some information was directly taken from the patients. The chief complaints, detailed history of the past and present, vital parameters, physical signs and investigations done were recorded. The total duration of the study was for a period of 2 years i.e., January 2003 to January 2005.\n\nCore Indicators\n\ni) Prescribing indicators :\n\na) Average number of drugs per encounter was calculated by dividing the total number of different drug products prescribed by the number of encounters surveyed.\nb) Percentage of drugs prescribed by generic name was determined by dividing the number of drugs prescribed by generic name by the total number of drugs prescribed, multiplied by 100.\n\nc) Percentage of drugs prescribed from essential drug list was determined by dividing the number of products prescribed from essential drug list of the hospital by the total number of drugs prescribed, multiplied by 100.\n\nii) Patient care indicators:\n\na) Average consultation time was determined by dividing the total time for a series of consultations, by the actual number of consultations.\n\nb) Patients’ knowledge of correct dosage was found by dividing the number of patients who can adequately report the dosage schedule for all drugs, by the total number of patients interviewed, multiplied by 100.\n\niii) Facility Indicators:\n\na) Availability of copy of EDL by stating yes (or) no.\n\nb) Availability of key drugs was calculated by dividing the number of specified products. Actually in stock by the total number of drugs on the check list of essential drugs multiplied by 100.\n\nComplementary Indicators:\nTotal cost of the drugs was calculated by considering the cost for each 10 tab used in the study.\n\nDefinition of risk factors:\nThese definitions are those used by the United States food and Drug Administration (FDA).[12]\n\nCategory A:\nControlled studies in women fail to demonstrate a risk to the foetus in the 1st trimester (and there is no evidence of a risk in later trimesters), and the possibility of foetal harm remains remote.\n\nCategory B:\nEither animal-reproduction studies have not demonstrated a foetal risk but there are no controlled studies in pregnant women or animal-reproduction studies have shown an adverse effect (other than a decrease in fertility) that was not confirmed in controlled studies in women in the 1st trimester (and there is no evidence of a risk in later trimesters).\n\nCategory C:\nEither studies in animals have revealed adverse effects on the foetus (teratogenic or embryocidal or other) and there are no controlled studies in women and animals are not available. Drugs should be given only if the potential benefits justify the potential risk to the foetus.\n\nCategory D:\nThere is positive evidence of human foetal risk, but the benefits from use in pregnant women may be acceptable despite the risk (e.g. if the drug is needed in a life-threatening situation or for a serious disease for which safer drugs cannot be used or are ineffective).\n\nCategory X:\nStudies in animals or human beings have demonstrated foetal abnormalities or there is evidence of foetal risk based on human experience or both, and the risk of the use drug in pregnant women clearly outweighs any possible benefits. The drug is contraindicated in women who are, or may become pregnant. The drugs used are shown in table- 1.\n\nAntihypertensive used against Risk factors used by the United States Food and drug Administrator are categorized into A, B, C, D, X. Statistical analysis was done by simple sampling method.\n\nStatistical Analysis:\nStatistical analysis was done by simple sampling method.\nRESULTS\nA total of 200 prescriptions were collected. 21% were with essential hypertension, 25% were with Transient hypertension, 51% were with Pre eclampsia and 103% were with Eclampsia. The key drug indicators are given in table-2.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
Names of DrugsSangameshwar HospitalGovt. General HospitalCategory of drugs
Tab. Myogard (Nifedipine)8982C
Tab. Ditide (Benzthiazide+Triamterence)7438C
Inj. Lasix (Furosemide)4134C
Tab. Stamlo (Amlodipine)287C
Tab. Depin (Nifedipine)74C
Tab. Methyl dopa (Methyldopa)49B
Tab. Nicardia Retard (Nifedipine)1--C
Tab. Aten (Atenolo)3--D
Tab. Amlong (Amlodipine)23C
Tab. Aldactone (Spironolactone)2--C
Tab. Alphadopa (Methyldopa)12B
\n\nDISCUSSION\nEclampsia is considered to be a life threatening emerging for both mother & foetus. Magnesium Sulfate is found to be the drug of choice, a (anticonvulsant) as Magnesium Sulfate does not treat hypertension, antihypertensives have to be used which are beneficial to both mother & baby [13].\n\nThe incidence of hypertension in pregnancy was highest among primigravida our study correlates with the same as Cheeley in ", "num_tokens": 2048} {"category": "olmocr_science_pdfs-health", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-health/part-00-00000.npy", "text": "medical\n concern from the review of a premarket submission and/or observed issues from the\n premarket data, a recall, medical device reports (MDRs), case studies, literature, or\n another source.\n- Is the public health issue device-specific or device type-specific?\n- For a device for which a condition of clearance or approval is being considered, can and\n should the public health question be addressed premarket rather than as part of a 522\n order?\n- Is there any other source of data (e.g., MDR review, published literature, real-world\n data sources) or action (e.g., revised labeling, public health notice, recall), or a\n combination thereof, that may be used to address the public health question, instead of a\n 522 order?\n- Does another ongoing study (e.g., premarket approval application (PMA) post-approval\n study as described in 21 CFR 814.82(a)(2) and 21 CFR 814.82(a)(9)) address the public\n health question?\n- What types of 522 postmarket surveillance design(s) should be recommended? Feasibility\n and timeliness of the different types of postmarket surveillance should be considered.\n- What combination of efforts should be considered to address the public health question?\n In addition, when applicable, what changes, if any, are being made with regard to the\n premarket review?\n\nD. Considerations Regarding Pediatric Population Provisions\n\nAs noted above, the statute authorizes postmarket surveillance for class II and III devices that\nare “expected to have a significant use in pediatric populations” and also authorizes the\nAgency to order postmarket surveillance as a condition of clearance or approval for devices\nexpected to have significant use in pediatric populations.4,5 These provisions are not limited to\n\n4 Sections 522(a)(1)(A)(ii) and 522(a)(1)(B)\n5 Since “pediatric populations” is not defined in section 522 of the FD&C Act, for the purposes of 522 orders, FDA\ndevices labeled for pediatric uses, and therefore specific consideration is given to devices with anticipated pediatric use.\n\nNote that section 402(j)(1)(A)(ii) of the Public Health Service Act (PHS Act) (42 U.S.C. § 282(j)(1)(A)(ii)) also states that any “pediatric postmarket surveillance required under section 522” is considered to be an “applicable device clinical trial.” As such, the pediatric postmarket surveillance must be in compliance with the registration and results submission requirements of section 402(j) of the PHS Act (42 U.S.C. § 282(j)). Additional information on these requirements can be found at https://clinicaltrials.gov/.\n\nFDA intends to work with the manufacturer to help FDA determine the appropriate timeframe for a pediatric 522 postmarket surveillance study.\n\nE. Issuance of 522 Order\n\nThe 522 order will specify the device(s) subject to the surveillance order and the reason that we are requiring postmarket surveillance (i.e., the public health question(s)). The order will also typically include any general or specific guidance that is available to assist the manufacturer subject to the 522 order in preparing the postmarket surveillance plan. FDA intends to identify the premarket submission involved (i.e., premarket notification [510(k)], PMA, humanitarian device exemption (HDE) application, or De Novo request) in the 522 order. A 522 order could also include timelines for certain surveillance plan milestones such as subject enrollment, data accrual, and submission of the final report, depending on the plan and timing of the order. If a manufacturer disagrees with any order or condition requiring postmarket surveillance under section 522 of the FD&C Act, a manufacturer may request review under section 562 of the FD&C Act (see section 522(c) of the FD&C Act) and other options are further described in 21 CFR 822.7.\n\nSection 522(a)(1)(A) of the FD&C Act specifies that the Agency may issue a postmarket surveillance order at the time of device approval or clearance or any time thereafter. When a 522 order is being considered for issuance at the time of market authorization, FDA may advise the manufacturer of the potential 522 order and the surveillance plan schedule. Pursuant to Section 522(b)(1) each manufacturer must develop and submit for FDA approval a postmarket surveillance plan within 30 days of receiving the order (see also 21 C.F.R. 822.9 and 822.10). Section 522(b)(1) of the FD&C Act provides that a manufacturer must commence postmarket surveillance not later than 15 months after the day the order is issued. FDA typically considers postmarket surveillance to have commenced when the first subject is enrolled as outlined in the approved surveillance plan. For plans that do not involve enrollment of subjects (e.g., non-clinical studies), FDA considers postmarket surveillance to\n\nis defining pediatric populations to mean patients who are 21 years of age or younger at the time of diagnosis or treatment, that is, from birth through the twenty-first year of life, up to, but not including the patient’s twenty-second birthday. This definition is consistent with the definition of “pediatric patients” under section 520(m)(6)(E)(i) of the FD&C Act, which was added to the FD&C Act at the same time as the pediatric use criterion in section 522.\n\n6 21 CFR 822.5.\n7 Ibid\nhave commenced when data accrual has started as outlined in the approved surveillance plan.\\(^8\\) In FDA’s experience, surveillance plans that require enrolling subjects in a prospectively-targeted manner are more likely to achieve timely completion by following the recommended schedule below from the date of issuance of the 522 order.\n\n- Study commenced within 15 months\n- 20% of subjects enrolled within 18 months\n- 50% of subjects enrolled within 21 months\n- 100% of subjects enrolled within 24 months\n\n### III. Postmarket Surveillance Plans\n\nFDA will assign a postmarket surveillance (PS) order number (i.e., PS####) to each 522 order. Manufacturers should cite the assigned PS number when submitting a proposed postmarket surveillance plan. Surveillance plans are reviewed as supplements to the PS order number. If there are multiple postmarket surveillance questions in a 522 order that require different methodologies to address each question, then a separate postmarket surveillance plan should be submitted for each question, and it is tracked as an individual requirement under the PS order number. FDA will confirm receipt and identify each plan submission by a unique document number.\\(^9\\)\n\nA manufacturer must submit a postmarket surveillance plan within 30 calendar days of receipt of the 522 order.\\(^10\\) Per Section 522(b)(1) of the FD&C Act and 21 CFR 822.17, FDA will review postmarket surveillance plans and respond within 60 calendar days of receipt. FDA intends to promptly review postmarket surveillance plans and work interactively with the manufacturer in order to issue a decision within 30 calendar days of receiving the plan. The manufacturer should prioritize resolution of any surveillance plan deficiencies identified by the Agency and work interactively with the FDA to facilitate that a full surveillance plan review can be achieved within 60 calendar days from the issuance of the 522 order date.\n\n#### A. General Information\n\nThe general content and format of a postmarket surveillance submission is outlined in 21 CFR 822.9. See Appendix 1 for CDRH’s internal checklist for determining whether a submission is administratively complete in accordance with 21 CFR 822.9.\n\n#### B. Elements to Include in a Postmarket Surveillance Plan\n\nAs outlined in 21 CFR 822.10, the following sections must be included in your postmarket surveillance plan:\n\n---\n\n\\(^8\\) For non-clinical surveillance/studies data, accrual milestone reports may be used to track progress.\n\n\\(^9\\) See 21 CFR 822.8.\n\n\\(^10\\) Section 522(b)(1) of the FD&C Act and 21 CFR 822.8\nContains Nonbinding Recommendations\n\nDraft – Not for Implementation\n\n- postmarket surveillance plan objectives addressing the surveillance question(s)\\textsuperscript{11}\n- postmarket surveillance approach (i.e., design) or methodology to be used\\textsuperscript{12} (see Section III.E. of this guidance), we recommend including the hypothesis(es) and success criteria\n- the subject of the study,\\textsuperscript{13} e.g., the patient population (may include subject inclusion and exclusion criteria and definition and source of comparator group)\n- the variables and endpoints for assessing the surveillance question(s),\\textsuperscript{14} such as the primary and secondary endpoints; we recommend including definitions for endpoints, a list of expected adverse events/complications, an agreement to collect unexpected adverse events, and a plan to assess relatedness of endpoints with the device and/or the procedure\n- sample size;\\textsuperscript{15} we recommend including sample size calculation that is statistically justified and based on study hypothesis, where applicable\n- description of the data source (e.g., hospital records", "num_tokens": 2048} {"category": "olmocr_science_pdfs-health", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-health/part-00-00000.npy", "text": " Daniels for additional discussion regarding the application of Rawls’ Theory of Justice to health and health care.\n\n\n28 Conscious means that the individual is able to make an informed decision with regard to their consent.\n\n\n44 System accountability implies that harms generally result from multiple failures in the system rather than solely from the actions of one individual.\n\n\n46 See glossary for definition of bias.\n\n\nCONTRIBUTING AUTHORS\n\nEldesia L. Granger, MD, MPH, FAAP, FACP\nThe MITRE Corporation\n\nJessica S. Skopac, JD, PhD, MA\nThe MITRE Corporation\n\nSusan U. Mbawuike, MS, CHES\nThe MITRE Corporation\n\nAnna T. Levin, JD\nThe MITRE Corporation\n\nSusan Dwyer, PhD\nDepartment of Philosophy, University of Maryland, College Park, MD\n\nArnon S. Rosenthal, PhD, MS\nThe MITRE Corporation\n\nJillian Humphreys, MA\nThe MITRE Corporation\nACKNOWLEDGMENTS\n\nGwen Darien, Executive President, Patient Advocacy and Engagement, Patient Advocate Foundation\n\nSusan B. Frampton, PhD, President, Planetree International\n\nMerilyn D. Francis, BSN, MPP\n\nDanny van Leeuwen, RN, MPH, also known as Health Hats\n\nChristoph U. Lehmann, MD, FAAP, FACMI, FIAHSI, Vanderbilt University\n\nRussell C. Libby, MD\n\nThomas H. Murray, PhD, President Emeritus, The Hastings Center\n\nCarolyn Petersen, MS, MBI, FAMIA, Mayo Clinic, Rochester, MN\n\nW. Nicholson Price II, JD, PhD, Assistant Professor of Law, University of Michigan Law School\n\nBen Yelin, JD, Senior Law & Policy Analyst, University of Maryland Center for Health and Homeland Security\n\nBev Acree, MBA, CHIE The MITRE Corporation\n\nCathy Becker The MITRE Corporation\n\nCathy Buck The MITRE Corporation\n\nMallory Carellas, MPH, BSN, RN The MITRE Corporation\n\nSarah T. Corley, MD, FACP The MITRE Corporation\n\nLinda Desens, PhD, RN The MITRE Corporation\n\nSuzanna Dungan, MPH, MBA The MITRE Corporation\n\nSusan Haas, MD, MSc The MITRE Corporation\n\nBernard J. Horak, PhD, FACHE, CPHQ The MITRE Corporation\n\nEdith A. Hughes, DSc The MITRE Corporation\n\nAdrienne D. James The MITRE Corporation\n\nNeeraj Koul, PhD The MITRE Corporation\n\nSybil Klaus, MD, MPH The MITRE Corporation\n\nAmanda Mason-Singh, PhD, MS The MITRE Corporation\n\nJulie S. McEwen The MITRE Corporation\n\nLaura Munro, RN, MHSA The MITRE Corporation\n\nPhuong Ngo, MHA The MITRE Corporation\n\nJanice Nsor, JD The MITRE Corporation\n\nNichole Persing The MITRE Corporation\n\nCatherine M. Petrozzino The MITRE Corporation\n\nCandace J. Rosen, JD The MITRE Corporation\n\nStuart S. Shapiro The MITRE Corporation\n\nJayme Squire The MITRE Corporation\n\nNichole Sweeney, JD The MITRE Corporation\n\nPatrick Tramma The MITRE Corporation\n\nHaleh Vafaie, PhD The MITRE Corporation\n\nErin D. Williams, JD The MITRE Corporation<|endoftext|>[REMOVED]<|endoftext|>Influence of age on outcome of psychological treatments in first-episode psychosis\n\nGILLIAN HADDOCK, SHON LEWIS, RICHARD BENTALL, GRAHAM DUNN, RICHARD DRAKE and NICHOLAS TARRIER\n\nBackground Psychological treatments have been shown to be effective in patients with psychosis. However, the studies published to date have included participants across wide age ranges, so few conclusions can be reached about the effectiveness of such treatments in relation to age.\n\nAims To evaluate outcomes by age in a randomised controlled trial designed to evaluate the effectiveness of cognitive–behavioural therapy (CBT), supportive counselling and treatment as usual.\n\nMethod Outcomes were evaluated in terms of symptoms, social functioning, insight and therapeutic alliance according to age at 3- and 18-month follow-up.\n\nResults Younger participants responded better to supportive counselling than to treatment as usual and CBT over 3 months. Older participants responded better to CBT than to supportive counselling over 18 months. Younger participants showed a greater increase in insight after CBT compared with treatment as usual and supportive counselling, and were more difficult to engage in therapy.\n\nConclusions Young people may have different needs with regard to engagement in psychological treatments. Treatment providers need to take age-specific factors into account.\n\nDeclaration of interest None. Funding detailed in Acknowledgements.\n\nPsychological treatments for psychosis, particularly cognitive–behavioural therapy (CBT), have been shown to be effective in patients with chronic treatment-resistant psychosis and recent-onset psychosis (Lewis et al., 2002; Cormac et al., 2004). However, evaluations of psychological treatments have not usually examined outcomes in relation to a particular patient age group, even though people of different ages may have different therapeutic needs. For example, young adults may have significant developmental issues which may need to be taken into account when developing and delivering treatments. The aim of this study was to evaluate the interaction between age and symptomatic and functioning outcomes in a randomised controlled trial designed to evaluate the effectiveness of CBT and supportive counselling plus treatment as usual compared with treatment as usual alone in first-and second-episode patients with schizophrenia (the Study of Cognitive Reality Alignment Therapy in Early Schizophrenia (SoCRATES) trial).\n\nMETHOD\n\nThe study design was a multi-centre, prospective, rater-masked, randomised controlled trial with an 18-month follow-up. Eligible patients were randomly allocated to one of three treatments, namely CBT and treatment as usual, supportive counselling and treatment as usual, or treatment as usual alone. Phase 1 of the study presented the recovery data for the first 70 days (Lewis et al., 2002). Patients were then followed up and re-assessed by psychiatric interview and examination of hospital records and case notes 18 months after randomisation (Tarrier et al., 2004). A detailed description of the entire SoCRATES sample and methodology has been provided (Lewis et al., 2002), so will be only briefly described here.\n\nParticipants, recruitment and assignment\n\nParticipants were recruited over a period of 26 months. Inclusion criteria for entry to the trial were as follows: either first or second admission (within 2 years of a first admission) to in-patient or day-patient unit for treatment of psychosis; DSM–IV criteria for schizophrenia, schizophreniform disorder, schizoaffective disorder, delusional disorder or psychosis not otherwise specified (American Psychiatric Association, 1994); positive psychotic symptoms for 4 weeks or more; a score of 4 or more on the Positive and Negative Syndrome Scale (PANSS) (Kay et al., 1989) target item for either delusions (P1) or hallucinations (P3); neither substance misuse nor organic disorder judged to be the main cause of psychotic symptoms.\n\nAssessment measures\n\nA number of assessment measures were employed as part of the SoCRATES study at baseline and during the 18-month follow-up period (Lewis et al., 2002; Tarrier et al., 2004). However, only the following measures will be reported here. Measures of symptoms and functioning at baseline and follow-up included the PANSS (Kay et al., 1989) total, positive, negative and general sub-scale scores, the Psychotic Symptom Rating Scales (PSYRATS; Haddock et al., 1999a), the Social Functioning Scale (SFS; Birchwood et al., 1990), the Birchwood Insight Scale (BIS; Birchwood et al., 1994) and two measures of therapeutic alliance, namely the California Therapeutic Alliance Scales (CALPAS; Gaston, 1990) and the Psychotherapy Status Report (PSR; Frank & Gunderson, 1990). Data on demographics, substance use and duration of untreated psychosis were also collected at baseline.\n\nIntervention groups\n\nThe interventions were based on those evaluated in previous treatment studies (Tarrier et al., 1998; Haddock et al., 1999b). The CBT was manual-based and was undertaken by five therapists trained in CBT for psychosis, who were supervised by experienced cognitive–behavioural therapists. At the beginning of the study the therapists were trained in both interventions, and throughout the study they received separate expert and peer supervision on a regular basis to maintain treatment quality. The\naim was for a ‘treatment envelope’ of 15–20 hours within a 3-week post-admission period, plus ‘booster’ sessions after a further 2 weeks, and after 1, 2 and 3 months. Details of the CBT have been provided by Haddock et al (1999b). Supportive counselling was used as a comparison intervention to control for non-specific elements of therapist exposure. The same five research therapists administered both CBT and supportive counselling interventions, according to randomisation. All treatment sessions, both for CBT and for supportive counselling, were audiotaped if participants had given their consent, and the treatment fidelity as judged by independent, expert raters was good (Lewis et al, 2002).\n\nAnalysis\n\nBaseline data were compared according to age using a cut-off point of age 21 years (i.e. 'over 21' and '21 years", "num_tokens": 2048} {"category": "olmocr_science_pdfs-health", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-health/part-00-00000.npy", "text": "ocele if necessary (2-0 PDS); apply TFS anchor at insertion of CL to ATPF sited approximately 2cms superior and 1cm lateral to the ischial spine. Close tunnel and incision in layers.\n\nTable 1. – Patient demographic.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
ParameterValues
Age (years, range)60 (37-86)
Parity (median, range)3 (2-7)
Weight (kg, range)77.9 (57-142)
Previous hysterectomy (No., %)21 (52.5)
Sexually active (No., %)22 (55)
Chronic illness* (No., %)28 (70)
\n\n* Diabetes, asthma, hypertension, macro/morbid obesity, COAD, GORD, depression & anxiety.\nTFS U Sling procedure - for support of mid/lateral pelvic defects:\n\nUse same incision as for cardinal ligament; dissect toward ATFP at its most medial aspect – lcm superior to superior notch of obturator foramen. Deploy TFS into position, adjust without tension and close tunnel and incision.\n\nTFS Uterosacral ligament procedure:\nCreate transverse incision (5-6cm) lcm above vestibule. With aid of hydro dissection of rectovaginal septum grasp and evert inside of posterior vaginal mucosa with 2 tissue forceps progressively whilst dissecting to posterior apex until USLs are identified. With a finger in rectum palpate lateral border of sacrum at approximately S3 facilitating identification of USL insertion. This also enables the surgeon to protect rectum whilst tunneling and inserting prosthesis.\n\nTFS Deep Transverse Perinei Procedure (perineal body repair):\nUsing same incision described in USL TFS, the ano rectal junction is separated from perineal body. Under tension, identify DTP with its attachment to lower 1/3 of posterior medial border of descending pubic ramus. With finger in rectum create a tunnel through DTP to just posterior to ramus in the direction of inferior notch of obturator foramen. Apply TFS prosthesis, tension appropriately, trim tape, close tunnels. Plicate and repair the perineal body if appropriate.\n\nEthics approval was obtained by the Ethics Committee, The Northern Hospital / Northern Health. Safety of the study was monitored throughout.\n\nWritten informed consent was obtained from all patients.\n\nRESULTS\n\n40 women followed up at a minimum of 24 months (Table 2).\n\n70% of cohort suffered from significant medical co-morbidities. 35% had one or more past pelvic organ prolapse procedures.\n\nPerioperative and operative data was predicated on the use of 105 TFS sling applications with the mean of 2.6 slings per patients.\n\nOperative time per sling: 12.5 minutes.\nBlood loss average: 50 mls.\n\nHospital stay average: 60 hours, and this was dependent on the extent of surgery ranging from 12 hours to 72 hours. Postoperative interval before return to normal duties ranged from 72 hours to 2 weeks.\n\nOperative data\n\nSymptomatology of the patient cohort was often multiples of voiding dysfunction, symptoms of prolapse and bowel dysfunction as summarized in table 3.\n\n\nPatient outcomes\n\nImprovement rates at 24 months expressed figure 3. There was an average >85% cure rate of urogynaecological prolapse and stress urinary incontinence. Of the patients sexually active (50%), one patient had transient dyspareunia. There were no tape erosions, anchor slippage or anchor migrations noted in our cohort.\n\nRecurrent symptomatic prolapse in 3 out of 4 patients was due to cervical hypertrophy >4cms requiring cervical amputation at 18 - 24 months. This has lead to our conclusion that concomitant cervical amputation should be considered if cervical length >4cms.\n\n85% of patients who complained of stress urinary incontinence as a symptom were cured at follow up. Only half of this group had urodynamic demonstrable stress incontinence, the others complained of SUI but this was not demonstrable on urodynamic studies. The first group had a definitive pubourethral TFS tape, the other group only had anterior compartment repair (Cardinal ligaments/U sling) and yet this group post-operatively had a cure in stress incontinence symptoms not demonstrable with urodynamics.\n\nComplications\n\nOne rectal mucosal buttonhole injury sustained at initial dissection was treated successfully with primary repair. One rectal serosal penetration with prosthesis was recognized and removed immediately and successfully (Table 4). Both patients had previous multiple perineal and posterior compartment procedures. No implant was inserted under these\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
ParameterValues
Anterior compartment prolapse (POPQ ≥2* No., %)24 (60)
Posterior compartment prolapse (POPQ ≥2* No., %)24 (60)
Anterior & Posterior compartment prolapse (POPQ ≥2* No., %)15 (37.5)
Apical prolapse (POPQ ≥2* No., %)16 (40)
Anterior & Posterior & apical prolapse (POPQ ≥2* No., %)6 (15)
Previous POP reconstructive surgery (No., %)14 (35)
\n\nAccording with the ICS POP-Q system.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
ParameterValues
Sub-Urethral TFS (No., %)9 (22.5)
U-Sling (No., %)15 (37.5)
Cardinal Ligament TFS (No., %)25 (62.5)
Utero-sacral TFS (No., %)34 (85)
Deep Transverse Perinei TFS (No., %)22 (55)
Vaginal Hysterectomy for Non prolapse reason (No., %)3 (7.5)
Cervical amputation (Manchester repair) (No., %)2 (5)
\n\nTable 2. – Clinical details.\n\nTable 3. – Operative details.\ncircumstances. Retention of urine (failed trial of void) x 2 patients after the pubourethral neoligament procedure; both cases were transient and resolved. There was one case of midurethral release after 21 days with 100% resolution of voiding dysfunction at 4 months. There was one case of trigger point pain of the inferior margin of pubic rami which resolved within 21 days. No haemorrhage, haematoma or tape rejections or infections have been noted.\n\nDISCUSSION:\n\nMany techniques have been devised to address the high failure rates of POP repair using native or biological tissue. Repairs such as sacrospinous fixation have been shown to be anatomically incorrect and have postoperatively caused symptoms such as dyspareunia and other complications including haemorrhage, haematoma, small bowel obstruction and mesh erosion.\\(^6\\) Implantation of mesh sheets for POP seemed promising initially, but complications, sometimes major, have resulted in FDA warnings about the use of large mesh kits within the pelvic floor. These warnings have revived the question “Are large mesh sheets necessary for POP repair?”\\(^5\\)\n\nThe surgical reconstruction of the anatomy is almost exclusively focused on the restoration of lax pelvic floor ligaments. Exact preoperative identification of the anatomical lesions is necessary to allow for exact anatomical reconstruction with respect to the muscular forces of the pelvic floor.\\(^7\\)\n\nWe have found the TFS procedures to be simpler and more anatomically correct than other procedures. From a structural perspective, the small volume of polypropylene tapes provide excellent support and function for grade IV and the more challenging recurrent POP and visceral incontinence.\n\nIn our study 36/40 patients needed multiple anatomical site reconstruction and the with majority requiring apical support. There is evidence that apical repair impacts on anterior vaginal wall prolapse as shown in previous studies comparing sacrospinous ligament fixation and abdominal sacral colpopexy", "num_tokens": 2048} {"category": "olmocr_science_pdfs-health", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-health/part-00-00000.npy", "text": " each case we discuss how it illustrates a key challenge in the process of aligning concerns.\n\nOur goal is to illustrate how the differences that underpin the understanding and conceptualization of symptoms and disease between patients and health professionals come to signify central aspects of patient-physician relations and thus the use of eHealth.\n\n4.1. Case #1 – Concepts and meaning differ\n\nWith this case, we bring forth the difference in how illness is experienced by patients and how clinicians conceptualize disease and how this differentiation then comes to designate what is perceived as important and meaningful to each part.\n\nLouis is 51 years of age and has had his ICD for only a year, after suffering a sudden heart attack. The experiences of becoming a heart patient and an ICD-patient in his case melt into each other. Louis suffers from various symptoms related to the heart disease itself, the device, and the medication as well as recovering from the heart attack. Besides this, Louis feels anxious and depressed which he partly ascribes to the trauma of experiencing his own mortality and partly to the lack of continuity of care and the lack of coherence of the information he receives from health professionals and institutions.\n\nBecause of this, Louis is enthusiastic about the prospect for new ways and means of communicating with clinicians and engages very actively in the use of myRecord. He makes several notes on symptoms with the logbook feature (ranging from feeling tired, loss of breath, swollen legs, anxiety, and impotence) and is eager to utilize the preparation module prior to his upcoming in-clinic follow-up. Besides this, he explores the network feature to connect and share experiences with other patients. He praises the potential of the system and explicitly links his positive assessment of its value to his position as a new patient with a great need to feel secure and “in control” and to be able to raise urgent questions and seek continual professional guidance.\n\nHaving completed the preparation via myRecord where he has written an extensive prose text about his symptoms and concerns, Louis has high expectations for the upcoming consultation at the clinic. However, afterwards he is greatly disappointed, as he did not feel that the clinician responded to all the concrete concerns he had raised nor attended to his situation at large:\n\n“I was prepared for the consultation. And that thing regarding vitamin D, he didn’t mention it. He\ndidn’t say anything to me. And regarding the legs, it was me who insisted, insisted, insisted [...] So, I was disappointed with the consultation, really.” (Final interview with Louis, February 2013)\n\nThe cardiologist on the other hand felt that he was able to react to the patient’s primary concern (which he perceived to be the experience of dizziness and loss of breath and which he linked to a possible regulation of medication) and then leave the rest unspoken, since it was not something for him to act on:\n\n“Because he was allowed to write about it and he had made that list, I could just say to him; ‘I can see you’ve written something about this and that. This is the main thing for you,’ and we could then go straight to that topic without having to start all over. So, I think it’s a good way to manage the contact.” (Final interview with cardiologist, local hospital, February 2013)\n\nThe cardiologist further indicates that he thinks the very act by Louis of writing down his concerns would make him feel better. And that Louis would further “feel heard” by knowing that the cardiologist had read through his preparation.\n\nThis case illustrates how the clinician and patient have conflicting perspectives on 1) which concerns are meaningful in the sense of important and relevant for the consultation, and 2) what constitutes proper (re)action. The cardiologist perceives his role as to manage the consultation in the most productive and meaningful way, which in respect to the cardiologist is to ensure that his most important concerns are attended to. Besides this, he acts as a passive listener through myRecord as an act that will indirectly satisfy the patient. The patient, however, feels quite differently and finds much of the follow-up meaningless, stating that in order to be meaningful to him his efforts must result in a “real” (re)action at “the other end.”\n\nFrom the case, we also learn that even though a concern is meaningful to one party, does not mean it becomes meaningful for the other to attend to. This is also a matter of what is allowed (or not allowed) to be put to the front both by patients and clinicians.\n\n4.2. Case #2 – On action and feasibility\n\nWith this case, we take the matter of proper reaction a bit further by illustrating the second challenge that plays an important part in the process of aligning concerns. Namely, that it is not enough for a concern to be meaningful – it needs to be actionable as well.\n\nIn a distributed care scheme clinical concerns are formally, and often also practically, distributed. This means that even if a certain concern of a patient may be of great clinical relevance (e.g. critical side-effects of medication) it will only be relevant for certain clinicians. When patients then write questions and state concerns in a system like myRecord, where a certain clinician is the receiver, the patient must be able to assess what is relevant to whom. In other words, the patient must at some level understand the infrastructure of the distributed care scheme, or the IT-system should indicate or assist in this.\n\nBen (aged 60) is preparing for the upcoming in-clinic device follow-up at the Heart Centre by filling out the step-by-step preparation form in myRecord. When he reaches the section where he can state his most important questions for the clinician he writes that he is very concerned with his blood pressure because he finds himself increasingly exhausted at work when performing his daily tasks. His job is very important to him and he is eager to find a solution so that he can keep working. Ben therefore asks to have it monitored over the course of a day at work. He also poses a question about some over-the-counter-drugs he has been advised to take by a friend. He then finishes the rest of the preparation form and sends it off digitally to the clinic.\n\nDuring the consultation at the out-patient clinic, the lab technician and the cardiologist quickly browse through Ben’s preparation form on their computer screen, while they ask him about his general well-being, his medication and specific symptoms related to the ICD. Ben then asks about the possibility of having his blood pressure monitored and brings forth a referral letter for a local hospital he has received from his general practitioner. The cardiologist briefly answers that it is not something she can get into, and that he will have to take it up with the local hospital.\n\nAfterwards Ben states how he was “disappointed about the fact that they hadn’t read it through carefully. It just goes helter-skelter, you know. [...] They don’t talk about over-the-counter drugs or anything. Then it’s just ridiculous to write about it.” (Final interview with Ben, February 2013)\n\nNow that Ben with great effort had prepared so well using myRecord, he was expecting the clinicians to be prepared too and address his concerns. But he felt that the clinician had not prepared properly and that their lack of interest and action in relation to his concern about this blood pressure and over-the-counter-drugs made his preparation meaningless.\n\nThe cardiologist on the other hand, stated how she, while being with the patient, was able to “browse through what he had written,” and that the preparation form “worked well.” Although she admitted to not having read it beforehand. (Final\nThe cardiologist was not bothered by the fact that she was presented with a concern of the patient that she was not able to act on for organizational reasons, but rather she found it useful to be able to quickly browse through the patient’s concerns and screen out those she did not have to pay attention to.\n\nIn this case we learn that although the concern raised was both meaningful to the patient and the clinician and in fact also clinically actionable, it was not organizationally feasible. One party, the cardiologist, is pleased with the myRecord system and not bothered by being confronted with a concern that she is not able to take action on. But the patient, on the hand, finds the encounter demoralizing and disappointing due to what he perceived as an unsatisfactory “absence of action.”\n\nThe case thus illustrates how some patients are neither able to assess what could become a concern to certain clinicians, nor to accept that the concerns they have articulated are not responded to and acted on by the clinicians. Subsequently, using this version of myRecord entailed great disappointment for the patient in this case and led him to lose his motivation for further use. This supports our claim that motivation for use rests on the existence of aligned concerns and of the system’s ability to support these. In this case it fails to do so as it fails to account for, or compensate for, the distribution of care by facilitating a ‘match’ between the concern of the patient and the concern, in the sense of ability to act, of the clinician in question.\n\n4.3. Case #3 – Alignment of concerns with myRecord\n\nWhile the two previous cases illustrate how myRecord was unsuccessful in supporting meaningful patient participation in some situations, the following case presents how other features of the system used in other situations provided for enhanced collaboration. In remote monitoring, patients are excluded from engaging with clinicians, both parties thus rely primarily on data recorded by the ICD device, which is transmitted for interpretation to lab technicians and cardiologists at the Heart Centre. Patients can therefore no longer ask questions regarding the ICD and raise concerns such as potentially relevant symptoms in the time between the remaining in-clinic follow-ups every second or third year. In design interventions with different version of myRecord we experimented with ways to fulfill the needs of both patients and clinicians by enabling patients to qualify transmissions with their own experiences and by enabling lab technicians and cardiologists to respond in", "num_tokens": 2048} {"category": "olmocr_science_pdfs-health", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-health/part-00-00000.npy", "text": " scintigraphic approach to melanoma detection with these reagents was made in the 1970s (4,5). The major drawback of this technique is due to the normal binding of these reagents to all melanin-containing cells (including normal tissues, such as ocular uvea and skin) (6,7).\n\nBecause tyrosine is a melanin precursor, radiolabeled derivatives of this compound (e.g., iodinated alpha-methylytyrosine) (8) have also been tested for melanoma imaging because it is known that this tumor often displays a high rate of melanin synthesis. In addition, numerous attempts have been made to synthesize \"false precursors\" of melanin, for example, thioamides (thiouracil and its derivatives) (9–11). However, none of these radiopharmaceuticals was successful in the detection of malignant melamomas.\n\nA new class of compounds that seems to show interesting properties is the group of benzamides. These tracers have been synthesized to provide specific imaging of the structures of the brain with a high expression of dopaminergic receptors (basal ganglia) (12).\n\nThe ectodermic origin of melanocytes and the presence of melanin in the substantia nigra are the theoretic bases for the application of benzamides in the scintigraphic evaluation of melanoma in humans (13,14). Preliminary results on the use of a tracer of this group ([I23I] N-(2-diethylaminoethyl) 4-iodobenzamide (BZA) were recently presented by Michelot et al. and Brandau et al. in patients with cutaneous and ocular melanomas (15–17).\nThe aim of this study was to evaluate the possibility of using \\( ^{123}\\text{I} \\)\\{(S)-2-hydroxy-3-iodo-6-methoxy-N-\\{1-ethyl-2-pyrrolidinyl\\} methyl] benzamide (\\( ^{123}\\text{I} \\)\\{(S)-IBZM\\}, a tracer usually employed for the study of neuropsychiatric disorders (e.g., Parkinson's disease, schizophrenia, progressive supranuclear palsy and multiple system atrophy), to detect melanomatous lesions in humans.\n\n### MATERIALS AND METHODS\n\n**Tracer**\n\nIodine-123\\{(S)-IBZM\\} is a radiopharmaceutical synthesized by de Paulis et al. \\( (18) \\) and subsequently proposed by Kung et al. \\( (19,20) \\) for the imaging of dopamine \\( D_2 \\) receptors with a traditional gamma camera instead of the expensive and high-technology PET systems. The tracer is the commercially available liquid solution produced by Cygne BV (Eindhoven, The Netherlands)-DuPont Pharma Italia. The radiopharmaceutical had a specific activity greater than 1.85\\( \\times 10^6 \\geq \\text{GBq/mole}, \\) (mean activity concentration = 74 \\text{ MBq/ml}). Quality control procedures performed with thin-layer chromatography showed values of radiochemical purity of more than 97%. A mean dose of 205 MBq of the tracer was slowly injected into the antecubital veins of the patients.\n\n**Patients**\n\nEleven patients with histologically proven metastatic melanoma entered the study. The aim of the study was to verify the effective possibility of imaging metastatic melanoma with radio-labeled benzamides.\n\nThe main characteristics of the patients are shown in Table 1. Short details about their clinical history are summarized in Appendix A. In their clinical history, all patients had undergone surgical treatment of a primary cutaneous melanoma. At the moment of scintigraphy, they showed one or more lesions, which were clinically and instrumentally (with ultrasonography, radiography, CT or MRI) documented as indicating the presence of melanoma metastases. Six of the discovered lesions were cutaneous, and six were lymph node metastases. Three patients had pulmonary localizations, and two presented also had hepatic metastases. The dimensions of the lesions ranged between 5 and 100 mm. Except for the lung and liver metastases, all lesions were surgically removed within a few days (1–4 days) after scintigraphy, and histopathologic analysis was performed to confirm the nature of the lesions. To reduce the thyroidal uptake of radio-iodine, the gland was blocked with potassium perchlorate (400 mg orally) 30 min before the radioactive drug was injected.\n\n**Scintigraphic Technique**\n\nImaging was performed 2, 4 and in some cases 24 hr after the injection with a dual-head, large-field gamma camera (Sopha DSX Bodytrack, Buc Cedex, France) equipped with an ultrahigh-resolution collimator for low energies. Whole-body scans were acquired with a constant speed of 15 cm/min\\(^{-1}\\). Regional planar images were fitted over the lesions and acquired for 10 min with a matrix of 256 \\times 256 \\text{ (zoom = 1.00, pixel dimension = 2.24 mm).}\n\nSPECT was performed in each patient (matrix = 64 \\times 64, 30 sec/step, 64 steps over 360\\degree; zoom = 1.14, pixel dimension = 7.84 mm). Transaxial images were reconstructed by filtered backprojection with a Hamming/Hann filter characterized by a cutoff frequency of 0.5 cycles/pixel (a low-pass filter useful for medium-noise level images). No attenuation and scatter correction were made.\n\nFor radiation dosimetry, we applied the method proposed by the Medical Internal Radiation Dose (MIRD) Committee (Appendix B).\n\n**Blood Clearance and Biodistribution Evaluation**\n\nRadiopharmaceutical kinetic and biodistribution studies were performed in only three cooperating patients. In regard to the study of the tracer's biodistribution, regions of interest (ROIs) were drawn on digital whole-body images 0, 1, 2, 4 and 6 hr after the injection, which surrounded the brain, lungs, liver and gall-bladder. The percentage activity in the organs at any time was obtained by the following formula:\n\n\\[\n\\frac{\\text{geometric mean counts in organ}}{\\text{geometric mean counts in whole body at } t = 0} \\times 100\n\\]\n\nThe blood clearance was determined by venous samples taken at 5, 10, 15, 20, 30, 60, 90, 180, 240, 360 and 420 min. The total blood volume was estimated by means of a formula based on body weight and height \\( (21) \\). The clearance at any time was expressed as a percentage of the injected activity.\nTumor-to-Background Ratio Evaluation\n\nA semiquantitative analysis was performed to define the best tumor-to-background (T/B) ratios, using the ROI method. An important problem in regard to accurate quantitation of tumor uptake is due to the finite point response function of the gamma camera, i.e., the image of the lesion is larger than its true physical size. If the ROI is reduced to the physical dimension of the lesion, not all counts are included. However, if the ROI is made larger, there will be a significant contribution of counts from adjacent normal tissues. To overcome this difficulty and also to minimize the interobserver variability, the tumor uptake was studied by drawing isocontour ROIs around lesions.\n\nA manual ROI was drawn to define the whole tumor area. With respect to the highest count pixel in the ROI, a threshold (percent of the maximum) was fixed. All pixels with values greater than this threshold were attributed to the first area. Another four areas were created by varying the threshold (20%, 40%, 50% and 60% of the maximum). In this way, five different ROIs were obtained for each tumor.\n\nBackground ROIs were drawn near the tumor or in a contralateral region to estimate the binding of the agent and the image contrast of the lesion. Every time, T/B ratios were calculated by dividing the total counts contained in each tumor ROI by the total counts in the background ROI to account for the different number of pixels in the different ROIs.\n\nRESULTS\n\nNeither immediate nor delayed side effects were noted after the administration of the radiopharmaceutical. No cerebral lesions were present in the patients evaluated, and no pathologic uptake was documented in the SPECT studies of the brain. The basal ganglia were normally imaged because of the high selectivity of $[^{123}\\text{I}](S)$-IBZM for $D_2$ receptors.\n\nAfter intravenous administration, the tracer is rapidly cleared from the blood pool. Figure 1 shows that, after 5 min, only about 10% of the injected activity is still circulating. Between the first and second hour after the injection, there is a slight increase in blood activity, which lasts for 1 hr. Thereafter, a slow but continuous decrease characterizes the remaining curve.\n\nImages and biodistribution data indicate a relatively high concentration of the compound in lungs, liver and gallbladder. The hepatobiliary excretion of the tracer is due in part to the high lipophilicity of the compound and explains the presence of its high activity in the intestinal tract. The time–activity curves plotted in Figure 2 show that 24.5% of the injected activity", "num_tokens": 2048} {"category": "olmocr_science_pdfs-health", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-health/part-00-00000.npy", "text": " to test their degree of deafness.\nA person with severe or total hearing loss in one ear but normal hearing in the other ear will have no or minimal hearing impairment. They can compensate for the deaf ear by turning their head. Any test of hearing, including formal testing by audiometry, needs to ascertain the loss in each ear separately. The overall degree of hearing impairment is then determined by considering the effects of both deficits in combination.\n\nThe chart below permits this to be carried out and arrive at the percentage disablement based on the occupational deafness scheme used in industrial injuries disablement benefit. In order to be 80% the person has to have a hearing loss of 87 dB or more in each ear. The hearing loss in the better ear is plotted along the vertical axis and the loss in the worse ear along the horizontal axis allowing the degree of disablement to be read from the chart. For example someone with 55 dB loss in the better ear and 88 dB loss in the other (worse) ear would have a 40% degree of disablement. Those with 80% disablement are likely to have very severe hearing difficulties. They would be unlikely to hear normal conversation, hear the television without special aids or understand a shout at one metre in a busy street.\nThe DM should decide the degree of disablement using the following table.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
1, 2, 3, kHz averagePure tone dB50-5354-6061-6667-7273-7980-8687-9596-105106+
Pure tone HL
50-53202224262830323436
54-60223032343638404244
61-66243240424446485052
67-72263442505254565860
73-79283644526062646668
80-86303846546270727476
87-95324048566472808284
96-105344250586674829092
1063644526068768492100
\n\nIf a person normally wears or could wear a hearing aid, the test to assess the degree of deafness is carried out with the hearing aid being used¹.\n\n¹ SS (DLA) Regs, reg 12(2)(b)\nSeverely mentally impaired with severe behavioural problems\n\n61350 To satisfy this test for the higher rate of the DLA mobility component a person must be entitled to the highest rate of the DLA care component\\(^1\\), be severely mentally impaired\\(^2\\) (see DMG 61351 - 61370) and have severe behavioural problems\\(^3\\) (see DMG 61376 - 61379). The test is cumulative and if any part of the test is not satisfied a person cannot satisfy the test.\n\n\\[^1\\] SS CB Act 92, s 73(3)(c); \\[^2\\] s 73(3)(a); \\[^3\\] s 73(3)(b)\n\nSeverely mentally impaired\n\nArrested development or incomplete physical development of the brain\n\n61351 The first test towards treating a person as being severely mentally impaired is whether they have a state of arrested development or incomplete physical development of the brain, which results in severe impairment of intelligence and social functioning\\(^1\\). Further guidance is available in the Children and Adult Medical Guidance.\n\n\\[^1\\] SS (DLA) Regs, reg 12(5)\n\n61352 The disabilities counting towards severely mentally impaired are defined as\n\n1. **incomplete physical development of the brain** - where a person’s brain has failed to grow properly and this can be seen and assessed\n\n2. **arrested development of the brain** - where a person’s brain is not functioning properly but no physical deficiency is apparent.\n\n61353 There is no precise age at which an individual’s brain stops developing. The DM is entitled to apply the balance of probabilities and consider the age at which brain development ceases as a broad age range, at least into the fourth decade of life and in some cases perhaps into the fifties.\n\n61354 A person cannot satisfy the severely mentally impaired condition unless it can be established that the cause of the mental impairment (for example accident, disease, injury) happened before the person’s brain was fully developed. Degenerative diseases such as Alzheimer’s Disease that begin after the brain is fully developed do not satisfy the severely mentally impaired condition. Difficult cases should be referred to Medical Services for advice.\n\n61355 If a person has arrested development or incomplete physical development of the brain, the DM must then consider whether this results in severe impairment of intelligence and social functioning\\(^1\\).\n\n\\[^1\\] R(DLA) 1/00; SS (DLA) Regs, reg 12(5)\nArrested development or incomplete physical development of the brain and schizophrenia\n\nThe severity of schizophrenic disorders can vary from severe chronic deteriorating illnesses to a group of psychoses which are shorter in duration, easier to treat and leave little after effects. Most schizophrenics will not have arrested development or incomplete physical development of the brain. But for those suffering from the most severe type of schizophrenia (in about 30% of all cases), there is neurodevelopmental damage which is arrested development of the brain.\n\nWhere it can be established that there is arrested development of the brain, the person still has to show that this results in severe impairment of intelligence and social functioning to satisfy the severely mentally impaired test for the higher rate of DLA mobility component (see DMG 61366 - 61369). Medical advice is that below average intelligence or IQ is not a normal feature of schizophrenia. Schizophrenics may respond or react to others in an unusual or different way but this has no bearing on their intelligence. Therefore, someone whose only disability is schizophrenia will not normally be able to satisfy this part of the severely mentally impaired test.\\(^1\\)\n\n", "num_tokens": 2048} {"category": "olmocr_science_pdfs-health", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-health/part-00-00000.npy", "text": " STENTS\n\nEsophageal carcinoma accounts for most cases of dysphagia due to cancer, and usually the tumor is...\nunresectable. Dysphagia may also result from extrinsic compression due to lung cancer or malignant lymphadenopathy. Among many endoscopic and nonendoscopic treatment alternatives for palliation of dysphagia due to cancer, expandable metal stents are one of the main options. They are useful for patients with poor functional status who cannot tolerate radiation or chemotherapy, who have advanced metastatic disease, or in whom previous therapy has failed.6\n\nThe small diameter of expandable metal stents before deployment makes aggressive dilation of the esophagus before or after deployment unnecessary. Despite the substantially higher cost of expandable metal stents as compared with traditional rigid plastic esophageal stents, there are substantial overall cost savings resulting from the reduction in the number of days of hospitalization due to complications.7-9 One study showed that the rate of complications associated with stent insertion was lower overall for expandable metal stents than for plastic stents, but the rate of subacute complications was higher.10 In the United States, expandable metal stents have replaced plastic stents for use in the esophagus.11 Dysphagia is relieved in approximately 90 percent of patients who receive expandable metal stents.7-9\n\nThe data from comparisons of different options for the palliation of dysphagia due to cancer are limited. A retrospective study compared expandable metal stents with a variety of conventional endoscopic palliative techniques in patients with inoperable esophageal carcinoma without tracheoesophageal fistula. Patients with expandable metal stents underwent significantly fewer procedures and spent fewer days in the hospital.12 In a prospective, randomized, controlled trial of patients with esophageal carcinoma, patients with expandable metal stents had significantly more improvement in symptoms and a lower rate of reintervention than those treated by esophageal laser recanalization.13 An advantage of expandable metal stents over other endoscopic palliative methods is that they can be used to treat dysphagia due to compression caused by cancer,14,15 although the improvement in dysphagia is less than for patients with esophageal cancer.14\n\nEsophageal expandable metal stents are also used to treat tracheoesophageal fistulas due to cancer (Fig. 4A).16,17 Tracheoesophageal fistulas develop in patients with advanced esophageal and lung cancer and lead to continuous aspiration of saliva. Tracheoesophageal fistula is the only condition in which covered expandable metal stents may increase survival as compared with other therapies. Although there have been no prospective trials comparing covered metal stents with other types for the treatment of tracheoesophageal fistulas, the covered metal stent is now accept-\ned as the primary treatment option. Closure of the fistula is successful in 70 to 100 percent of patients. For persistent fistulas, placement of an airway stent to close the fistula or surgical esophageal bypass for physiologically fit patients are additional palliative options.\n\nExpandable metal stents are best suited for mid-esophageal lesions. Tumors at the gastroesophageal junction are amenable to stent placement with a high rate of technical and clinical success, but stents at this location produce an open conduit for free reflux of gastric contents, with consequent severe regurgitation and aspiration. Newer stents prevent reflux and aspiration by means of a one-way flap valve on the gastric side of the stent. Placement of expandable metal stents for very proximal esophageal lesions is technically difficult because of the proximity of the stent to the upper esophageal sphincter and the lack of an uninvolved proximal margin. However, in studies of small numbers of patients with dysphagia due to esophageal obstruction caused by cancer high in the cervical esophagus, expandable metal stents were successfully placed and improved symptoms in most patients.\n\nPlacement of an esophageal expandable metal stent can lead to severe complications. Intraprocedural complications include those associated with conscious sedation, aspiration, malpositioning of the stent, and esophageal perforation. Immediate postprocedural complications may include chest pain, bleeding, and tracheal compression, with resultant airway compromise and respiratory arrest. Late complications include distal stent migration, formation of an esophageal fistula, bleeding, perforation, and stent occlusion. Although most migrated stents can be retrieved endoscopically or will simply pass through the gastrointestinal tract, small-bowel obstruction develops in some patients. Approximately 0.5 to 2 percent of patients who undergo the procedure die as a direct result of placement of an expandable metal stent (Fig. 3).\n\nSeveral studies strongly suggest that the rates of delayed esophageal complications caused by expandable metal stents are higher in patients who have previously been treated with radiation, chemotherapy, or both. These complications are presumably due to stent-induced pressure necrosis within devitalized esophageal tissue. Unfortunately, patients who have recurrent or persistent dysphagia or a tracheoesophageal fistula after chemoradiation therapy often have no alternative to a stent for palliation of their symptoms. In contrast to other studies, one prospective study found that patients undergoing chemoradiation therapy after placement of an expandable metal stent had significantly longer survival than patients who received only a stent. However, shrinkage of the tumor by chemoradiation therapy could increase the risk of stent migration.\n\nPatients with esophageal stents must modify their diet to prevent large boluses of food from becoming impacted within the stent. If a stent without an antireflux valve crosses the gastroesophageal junction, strict antireflux precautions and aggressive acid suppression are needed to prevent gastroesophageal reflux and aspiration. If the stent lumen becomes occluded by tissue ingrowth, overgrowth, or hyperplasia, a second stent may be placed through the first stent with good results. Alternatively, endoscopic laser therapy, electrocautery, or photodynamic therapy may be used to treat stent occlusion.\n\n**BILIARY STENTS**\n\nTreatment of obstructive jaundice due to cancer relieves pruritus, improves appetite, and reduces fat malabsorption. Surgical palliation of this condition involves the creation of an anastomosis between the bile duct and the duodenum or jejunum to bypass the obstructed biliary tree. Nonsurgical palliation is achieved by placing stents endoscopically (with the use of endoscopic retrograde cholangiopancreatography), or with radiologic guidance (by the percutaneous transhepatic approach) across the cancerous stricture to restore biliary continuity (Fig. 4B). Insertion of plastic biliary stents provides an effective alternative to open palliative surgical bypass of the biliary tree for the management of obstructive jaundice due to cancer. Unfortunately, bacterial encrustation frequently leads to occlusion of plastic stents, requiring their replacement in terminally ill patients. Plastic stents of larger diameter take longer to become occluded.\n\nThe maximal stent diameter is limited by the endoscopes that must accommodate them and the size of the tract made through the liver when they are placed percutaneously. In comparison with plastic stents, expandable metal biliary stents have a smaller diameter before placement and a larger diameter after placement. Their small diameter before placement makes percutaneous placement less traumatic and permits them to be completely placed during one procedure. Their large diameter after placement eliminates occlusion by bacterial biofilm.\n\nExpandable metal biliary stents are much more costly than plastic stents. In two randomized, prospective trials comparing endoscopically placed, uncovered metal biliary stents and plastic stents for the palliation of jaundice in patients with previously untreated distal malignant bile-duct obstruction, the metal stents had significantly longer patency. Decreases in the rates of endoscopic procedures and rehospitalization offset the initial high cost of metal stents. Similar results were found in a large prospective, randomized trial in which stents were placed by the percutaneous transhepatic route for palliation of distal cancerous biliary obstruction. Expandable metal stents are more cost effective for patients who survive longer than four to six months, whereas a single procedure with placement of a less costly plastic stent would suffice in pa-\ntients expected to have shorter survival.\\textsuperscript{34,35} Another disadvantage of a metal stent in the biliary tree, as compared with a plastic stent, is that the device cannot be removed once it is implanted. Therefore, in patients with potentially resectable cancer, removable plastic stents should be used.\n\nExpandable metal biliary stents may become occluded because of tumor ingrowth or biliary epithelial hyperplasia induced by the stent. Occlusion from either cause may be treated by the insertion of a plastic stent or another metal stent through the original stent.\\textsuperscript{31,35,36} Preliminary studies suggest that occlusion due to tumor ingrowth or epithelial hyperplasia may be prevented by the use of partially covered metal biliary stents.\\textsuperscript{37} Overgrowth of tumor beyond the ends of the stent may result in reobstruction, necessitating placement of another stent.\n\nProlonged patency has been observed in expandable biliary stents used to treat low- or distal-bile-duct obstruction, but not in cases of obstruction by a tumor involving the proximal biliary system at or above the bif", "num_tokens": 2048} {"category": "olmocr_science_pdfs-health", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-health/part-00-00000.npy", "text": " of values. At first, it appears that Europe doesn’t teach abstinence education — educators will even tell you they don’t. To understand the subtle way it’s presented there, you have to look at how it’s taught here. There are basically two different approaches: the fear-based tactics that had repulsed me, and responsibility-based tactics that I had never had a chance to experience.\n\nAt no time did the European educators I met specifically say “Don’t have sex.” Instead, they’d say “Don’t have sex when you aren’t ready.” Programs offered advice like “Don’t have sex because your partner wants to, have sex because you want to” and “The most important thing is that you be in a committed relationship before having sex.” Not many 15- and 16-year-olds find themselves in strong, committed relationships. So this responsibility-based approach does encourage abstinence, in the most meaningful way. In fact, most recent statistics say that American teenagers first have intercourse one to two years before European teenagers.\n\nThese messages resonate with students because they acknowledge that, in the end, it’s the teenager’s choice to have sex or not. The programs teach teens to make their own decisions. Young people are constantly hearing values from friends, family, and the media. If you pit teacher versus friend, the teacher’s message will probably lose out, but if individuals are taught to make choices for themselves, they’re more likely to postpone having sex.\n\nAfter the trip, I realized that we do teach the responsibility-based approach here too. Often, both strategies exist in the same course. Some programs teach students that having sex before marriage is wrong and explain how “violators” will be punished. Others teach such skills as how to resist peer pressure and how to make your own choices.\n\nI think the European approach is successful because they really take the “responsibility” part seriously. It’s impossible to teach someone to resist social pressure and make their own choices if at the same time you’re trying to pressure them to let you make the choices for them. The teenagers either fail to learn how to make their own choices, or they learn to reject persuasion and ignore the messages they’re being sent.\n\nThe answer is not to find new ways of pressuring teenagers, but to give them the information they need to make their own choices. This may be scary for some adults and parents, but it is time for parents to learn that the values they’ve instilled in their children are alive, and the only way teenagers will act like adults is for adults to stop treating them like children.\nThe Oregon Department of Human Services will be featuring the third edition of the Teen Pregnancy Prevention Action Agenda in the spring of 2002. The updated document serves as a “driver” for the teen pregnancy prevention efforts at the state and community level and has been expanded to seven key strategies:\n\nStrategy 1: Positive community values\nStrategy 2: Comprehensive sexuality education and youth development\nStrategy 3: Abstinence education\nStrategy 4: Contraceptive access\nStrategy 5: Male involvement and leadership\nStrategy 6: Balancing health, safety, and legal issues\nStrategy 7: Young-parent services\n\nThe strategies were developed through a collaborative process featuring the dedication and hard work of many partners from around the state: To view the entire document, visit www.hr.state.or.us/tpp/action_agenda\n\nIn addition to promoting the Directions guidebook for use statewide, the Oregon Teen Pregnancy Task Force is designing training that will help teen pregnancy service providers implement its activities.\n\nLooking in the Right Directions\n\nWe all wonder sometimes where to turn for sound information and resources to use in our work with young people. Now comes this superb service providers’ guidebook on pregnancy prevention for young parents. Appropriately titled Directions, it’s based on lessons learned through many years of cumulative experience by a number of community-based agencies.\n\nInside, you’ll find topics like:\n- Personal Values and Choices\n- Self Worth\n- Personal Relationships\n- Sexual and Reproductive Health\n- The Emotional Aspects of Sexuality\n\nThere’s also an extensive bibliography; notes for facilitators; and resource information including Web sites, books, and videos.\n\nDirections is available via e-mail or on diskette in PDF format (requires Adobe Acrobat; available free on the Web). A limited number of binder-ready printed copies are also available. Contact Travis McAlister at Insights Teen Parent Program by phone (503) 239-6996 x238, or by e-mail: travism@insightstpp.org. Please specify the format you want.\nI'm sitting at my desk at the clinic when a group of unfamiliar teen males comes in. A couple are dressed all in black except for the obscene words on their T-shirts. Some look sullen or hostile; others wear an unreadable game face. At least one has lots of metal on his face. They're loud and boisterous - laughing, joking, punching each other and looking as if they might crash into the walls. I tense up and start to deal with them as if they're an annoyance at best and a threat at worst. They react and leave and, big surprise, never come back. What we have here is a failure in adolescent services, because of male profiling.\n\nWe've all heard about profiling, of course. In the case of males, it exists when we assume the worst about the intentions and potential behavior of the young men we encounter. In adolescent health care, it often shows up as programs that ignore the appropriate developmental needs of males, but do focus on getting them to stop whatever it is they're doing that's risky, wrong, or harmful. Granted, these are all appropriate goals when applied to pregnancy and STD prevention, anger management, and violence prevention. But if that's where our services for guys start and stop, we're seriously shortchanging them.\n\nBoys make up the vast majority of school suspensions and expulsions, special education classes, dropouts, abusers of alcohol and drugs, victims of violence and bullying and successful suicides. They commit most of the vandalism and acts of violence in the school community. There is clearly a need for male-oriented services, yet it seems most school programs and health and social services (outside of sports and corrections) have been developed by females for females.\n\nBut the issue goes beyond lack of appropriate services. Boys are conditioned to believe that “real men are tough.” The most damaging consequence of this is that young men are often cut off from knowing and expressing their feelings, other than anger. Because vulnerability is equated with weakness, they're unable to ask for help with their problems.\n\nImagine the stresses of navigating the teen years while trying to cope with the damaging and limited vision of manhood that seems to prevail in American popular culture. In a sort of psychological “piling on,” many boys lack humane and nurturing male role models to help them through this difficult time.\n\nIt’s no secret that boys learn and act differently from girls. They tend to be more physical, socialize in larger groups, and have an active learning style. Surging hormones can make their behavior unpredictable and, yes, baffling at times. This is all normal, and we need to make allowances for it while setting reasonable limits.\n\nTo give boys their due, we should assess our programs, facilities, and services. Do they invite males in? Are they guy-friendly? Are they aware of young men’s struggles and needs? If not, we can take steps to correct the imbalance.\n\nA good place to start is with the excellent report by Howard Hiton, a Portland-area counselor and expert in male adolescent development. Building on Strengths, Helping Boys Succeed in Portland Schools provides specific strategies and approaches that address the needs and struggles of adolescent males. It lists valuable and helpful local and national resources, appropriate for health and social service agencies as well as schools. Copies are available for $15.00/issue + $1.00 shipping & handling. (Originals are spiral bound). Contact person is Bonnie Randolph, Student Services Office of Portland Public Schools, (503) 916-5840, x328.\n\nMalachy Grange is a community health nurse at The School-Based Health Center, Marshall High School.\nMale Profiling Can Show Up Anywhere\n\nA quick inventory of the posters in my own teen health center showed this: a guy throttling a girl (dating violence); a guy abandoning his pregnant girlfriend (irresponsibility); a guy doping a girl’s drink (date rape). The only positive image was that of a football player saying no to drugs. These posters were created by well-intentioned professionals to address serious issues. But by concentrating so heavily on the negative side of male behavior, they create a male-unfriendly environment and reinforce an unhealthy image of manhood that’s becoming a stereotype in American media and society. -MG\n\nDealing With Reality\n\nSurgeon General’s Call to Action\n\nLast June, U.S. Surgeon General David Satcher released a long-awaited report encouraging Americans to respect “a diversity of sexual values,” recognize what science shows to be effective, and engage in an open discussion about sexuality.\n\n*The Surgeon General’s Call to Action to Promote Sexual Health and Responsible Behavior* details the current landscape of sexual activity: 12 million Americans are infected by sexually transmitted diseases each year, including 40,000 cases of HIV; nearly half of all pregnancies are unwanted; over 100,000 children are victimized by sexual abuse annually. Dr. Satcher suggests that thorough and medically accurate sexuality education is critical to combating these social ills.\n\nThe report encourages abstinence until people are involved in a “committed, enduring, and mutually monogamous relationship, unlike programs that urge abstinence until marriage.” “I have to deal with reality,” Dr. Satcher noted. In fact, studies show that students who have been instructed on both abstinence and contraception are more likely to postpone sexual involvement and", "num_tokens": 2048} {"category": "olmocr_science_pdfs-history_and_geography", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-history_and_geography/part-00-00000.npy", "text": " and nature, the past, the present, and the future—in the profound synthesis of all knowledge, and the ideal coordination of human society as a whole—here he stands supreme. And it is doubtless on this ground that Comte has called the Divine Comedy \"the incomparable epic, which still forms the highest glory of human art.\"\n\nThis is no place to dilate on the supreme gifts of Dante as poet, or to enter on the wide field of his numerous works. It is with the poet only that we are here concerned, and with the Vision alone. Nay, since this in itself is an inexhaustible field, we will confine our present notice to a single point, the relation of the Divina Commedia to the evolution of modern history. It is an accepted truism that this \"Sacred Poem\" sums up the spirit, the knowledge, the religion of the Middle Age, whilst it created the Italian language, inspired religious art, and founded modern literature. Its influence is still growing, six centuries after the manhood of the poet, and it idealised all that man had felt, believed, and done in at least as many centuries before his birth. The whole range of Catholic Feudalism seems to defile before our eyes, and beyond it we see visions of the heroes and poets of antiquity and the prophets and lawgivers of the East. Dante, it is often said, knew all that could be known, in an age when this was a feat still possible for a single mind. We need no testimony to convince us of the vast range of his learning. \"He was,\" as Villani truly says, \"perfect poet and philosopher, with the most exquisite style that the language ever produced.\" He seems to have absorbed all philosophy, all theology, all science, all poetry, all art and all history, as these were then understood by the greatest intellects. And it was an age of great men: for during Dante's life there were living Roger Bacon, Albert the Great, Aquinas, Duns Scotus, Giotto, Petrarch, Saint Louis, Rudolph of Hapsburg, and Edward I.\nIn form, in colour, perhaps in design, the Vision represents the Catholic Feudalism which culminated in the Crusades. But Catholic Feudalism in its essence had expired about the time of Dante's birth with such men as Saint Louis and Simon de Montfort; and when Dante wrote a new era had begun. There is profound significance in this, that Dante's place in the Polity is with the Western Revolution and not with the age of the Crusades, the Friars, and Innocent III. The Vision, indeed, is saturated with the spirit of modern thought, of secular and not clerical morality, of civic energy, and of the supremacy of science. It is true that Dante could not foresee the results of later time, and the mould of his imagination is Catholic in religion and Feudal in association. But no reformer of Church and State more fiercely denounced Popes and Cardinals, was more zealous for the right of private judgment of all things belonging to God or man, or more proudly true to republican simplicity and civic right. Enough has been said of Dante as Catholic mystic and as Imperialist liege-man. He was all this; and there are whole cantos which breathe the spirit of St. Bernard and of Godfrey de Bouillon. But we are too apt to forget that the deeper and more potent spirit of the Vision is the inquiring mind of Roger Bacon, Aquinas, and Montaigne; that Dante cares for authority as little as Francis Bacon or Hobbes; that he is as redolent of the Renascence as Raphael or Shakespeare; that he is a gentleman, a soldier, a lover, and a citizen. As Villani finely says: \"For his virtues, science, and worth he seems to us so great a citizen, that it is befitting to give him perpetual remembrance.\"\n\nOf the man himself, his own writings, the most pathetically personal in all literature, give us a vivid knowledge. He was born neither saint nor mystic: he was a man of the world, of audacious brain, of varied culture, with an exquisite taste for all forms of beauty and enjoyment. If remorseless criticism finds no authority for the portrait of the man of sorrows which is indelibly associated with our conceptions of the poet, it is difficult to resist the impression that, in the recovered fresco of the Bargello at Florence, we have the true features of the youth of such exquisite sensibility and genius before pain had hardened them into the stern mask that is familiar to us as the Poet of Hell. He suffered cruel disappointments, and he fell into many errors. He seems deeply conscious of his own faults, of pride, passion, and ungentleness. He seems unconscious how utterly unfit he was for the political and public career to which he devoted the first half of his life; and the famous State letters of his mature years, with all their noble enthusiasm and passion, are amazing instances of the philosopher who meddles with affairs. In truth, the saepe indignatio, which never ceases to lacerate his heart, not a little detracts from the poetic beauty of his work. History and tradition record the strange awe with which his contemporaries watched the lonely man \"who had seen hell\"; and we can well understand how his fellow-citizens, with Villani, found his learning somewhat too \"arrogant, super-subtle, and disdainful, and found him, as philosophers are apt to be, rather ungracious in converse with the unlearned.\"\n\nTruly he had his faults as well as his griefs. Yet indignation with him seems ever ready to blossom into most intense tenderness, pride towards men reaches forth into ideal humility in the sight of God, and\nthat saturnine outside covered profound depths of love inexhaustible and pure. Thus it comes to pass that, with all its obscurity, bitterness, and gloom, the Vision has become the centre of a literature more full than that which gathers round any other poem, and that it is hailed by Positivism as the foundation of the Bible that is to be. [P. E.]\"\nTROUBADOURS, from the end of the 11th to the end of the 13th Century.\n\nAuguste Comte has remarked (Pos. Pol. iii. 373-4) on the fitness of the Middle Age for poetry in all respects but one. Defensive war supplied nobler themes than aggressive war; the ethical tone had been raised by chivalry and respect for womanhood. On the other hand, the social state was too unsettled for permanent work; language itself, the index to so much else, was rapidly shifting. The Middle Age produced the Nibelungen-Lied and the Chanson de Roland. But the modes of life portrayed in these two poems were, like their language, undergoing rapid and often violent transformations.\n\nThe case was otherwise with that southern part of Gaul whose name of Provence indicates its early reception of Roman civilisation, and which stood somewhat aside from the central stream of barbaric invasion which devastated Italy. Yielding to the Goths, the most sympathetic of the northern invaders, it was saved from the Vandals and the Huns. In that favoured climate a civilisation grew in which Roman culture was more peacefully blended than elsewhere with the new life of the West. It is not surprising, therefore, that the Provençal language should have reached maturity earlier than any of the Romance languages, and that Dante should have been tempted to use it in preference to the common speech of Tuscany for his great poem. In Dante's time this language possessed a vast poetical literature, written and oral, extending over at least two centuries. Epic romance and love-songs were the principal themes, though political satires (sirventes) were not wanting. The composers passed under the name of troubadours (finders, inventors), corresponding to the word trouvères applied to the minstrels of northern France. They wielded great social influence; were patronised by monarchs like Richard I. of England and Alfonso II. of Arragon, and their society was courted by ladies of the highest rank, sometimes with tragic results.\n\nTwo of those poets are mentioned by Dante. The first was Arnaut Daniel, whom he meets in Purgatory (canto xxvi.), and addresses as \"the best workman of his mother-tongue, who surpassed all the rest in songs of love and tales of romance.\" Arnaut replies in the Provençal tongue. In his treatise on language, Dante says that he owes to him the lyrical form of some of his poems. He composed epical romances, one on the Rinaldo, of Carlovigitian legend; another on Lancelot, perhaps the one which proved fatal to the lovers of Rimini. The second was Bertram di Born, a fierce warrior of Gascony, who fomented dissension between Henry II. of England and his eldest son, and is on that account placed by Dante in the Inferno with Mahomet and other dividers of men (canto xxviii.). Others of note were Peire Vidal (1150-1210 A.D.), Guillem de Cabestan, of the same date, and Folquet, afterwards Bishop of Toulouse, and a fierce crusader against the Albigensian heretics. The same causes which brought into Southern France a premature Renaissance brought also a premature religious revolt, suppressed by Innocent III.\nwith stern severity. There were good reasons for the Albigensian crusade, stained though it was with needless cruelty. But it was fatal to the growth of troubadour poetry.\n\n\n**BOCCACCIO (Giovanni", "num_tokens": 2048} {"category": "olmocr_science_pdfs-history_and_geography", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-history_and_geography/part-00-00000.npy", "text": ">\n
Juvenal64
Kamiša Mera26
Kant528
Kempis, Thomas à362
Kepler590
Klopfstock359
Kosciusko574
Lacaille880
Lafayette, Mme. de555
\nINDEX OF BIOGRAPHIES\n\nLa Fontaine, 322\nLagrange, 613\nLamarc, 638\nLambert, John, 570\nLambert, Mme. de, 566\nLanfranc, 238\nLea-tae, 21\nLe Valette, 265\nLavoisier, 626\nLeibnitz, 522\nLeo the Great, St., 382\nLeo IV., 383\nLeonidas, 199\nLercy, Georges, 509\nLercy, Pierre, 361\nLe Sage, 457\nLessing, 438\nLesseur, 383\nLaundrupus, 90\nL' Hopital, 554\nLinnena, 683\nLocke, 503\nLongus, 50\nLouis of Granada, 354\nLouis, St., 264\nLouis, St., 254\nLouis, xiv., 564\nL' Ouverture, Toussaint, 577\nLoyola, Ignatius, 241\nLucan, 72\nLucian, 65\nLucretius, 68\nLuke, St., 209\nLully, 470\nLully, Raymond, 489\nLycurgus, 10\nLylyippus, 56\nMADISON, 675\nMecenas, 108\nMagellan, 978\nMahomet, 87\nMaistre, J. de, 482\nMalebranche, 504\nManco-Capac, 25\nMansoni, 847\nMarcian, 258\nMaria de Molina, 545\nMarina, 276\nMariette, 400\nMaritius, 188\nMatilda of Tuscany, St., 297\nMaupertuis, 514\nMaximil., 502\nMenander, 63\nMencius, 21\nMenu, 15\nMercer, Elisa, 398\nMetsastasio, F., 445\nMichael Angel, 329\nMiltiades, 169\nMilton, 364\nMoliere, 463\nMonge, 410\nMonica, St., 214\nMontague, Lady, Mary, 456\nMontaigne, M. de, 492\nMontalvan, 480\nMontesquieu, 518\nMontgolfier, 490\nMore, Sir Thomas, 406\nMoro, 401\nMorgan, 654\nMoses, 8\nMotteville, Mme. de, 453\nMozart, 475\nMurillo, 384\nNAPIER, 378\nNasir-ad-Din, 149\nNearchus, 148\nNerva, 195\nNewton, 615\nNuma, 11\nOden, 591\nOrigen, 115\nOrpheus, 9\nOssian, 18\nOtho the Great, 260\nOvay, 489\nOvid, 71\nOxenstier, 561\nPALESTINA, 467\nPalissy, Bernard de, 410\nPapin, 402\nPapinian, 197\nPappus, 187\nPascal, 501\nPaul, St., 206\nPelayo, 269\nPenn, W., 247\nPerigeuse, 466\nPericles, 178\nPeter the Hermit, 298\nPetarch, 351\nPhaedrus, 64\nPhidias, 58\nPhilp, 177\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n", "num_tokens": 2048} {"category": "olmocr_science_pdfs-history_and_geography", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-history_and_geography/part-00-00000.npy", "text": "3 B.C. on the great temple of Zeus at Olympia, where he made the gold and ivory colossal statue of Zeus, the wonder of antiquity, and an even greater and more imposing work than the Athene of the Parthenon. He seems to have died in 432 B.C., in prison, on the second charge of impiety, though by some accounts he was condemned and executed by the people of Elis.\n\nThe principal works of Phidias, besides the sculptures of the Parthenon, were the three colossal figures: the bronze Athene Promachos of the Acropolis, the outline of which is preserved to us on coins, and the two chryselephantine statues, that of Athene inside the Parthenon, and that of Zeus at Olympia. Of the former we have the general outline in existing statuettes, and of the latter we have indications on coins, and busts supposed to be imitated. Of the effect of this extraordinary form of art, which Phidias is said to have invented, one which could arise only out of an almost idolatrous mythology, we can have but a vague conception. In these chryselephantine statues the figure was made of a framework of hard wood, cypress or ebony. On this were superimposed plates of ivory and gold—the whole of the uncovered parts of the figures being of ivory, and the robes of gold; precious stones, chasing, and various metals being also employed. The Olympian Zeus was regarded as one of the wonders of the world; it survived for some seven or eight centuries, well into the Christian period; and it was uniformly spoken of with enthusiasm by the ancients who saw it. However much so complex and artificial a mass differs from our conception of plastic art, we cannot doubt the unerring genius of Phidias, and the unanimous verdict of antiquity; and we are forced to believe that these stupendous figures were the most imposing and beautiful ever produced by man.\n\nThe other principal works of Phidias were the statues of the Parthenon, of which the ruined fragments, known as the Elgin Marbles, in the British Museum, present us with a basis of conception. Although we are unable to say that any single work is from the hand of the sculptor himself, it has never been doubted that the colossal figures of the two pediments, and the fragments of the frieze, spring directly from the brain of the master. The world is agreed that they exhibit every quality of the sculptor's art in absolute perfection. Technical execution, sublimity of conception, beauty, truth, dignity, fitness, unerring judgment, fertility of invention, and mastery of composition are all displayed in equal power, and in the highest conceivable perfection. If there be one quality which impresses the beholder first as well as last, it is ideal beauty and grandeur. Phidias is said to have declared that he drew his ideal of the gods from the description of Homer. And it is in the Homeric quality of serene majesty and simple beauty that his art excels.\n\nHis work is as free as that of Homer himself from any taint of exaggeration, affectation, false emphasis, or sensuousness. It is always at once sublime and perfect. It was a saying of the ancients that \"the hand of Phidias alone of men could make the image of the gods.\" With this power of ideal majesty, he combined a full technical mastery over\nevery form of plastic art. He himself claimed no other superiority except that of \"accuracy of work.\" We are told that his skill was equally surpassing in representing the grasshopper and the bee as the gods of Olympus. He was a consummate master in marble, bronze, ivory, gold, or ebony; in sculpture, in relief, in engraving, in chasing, in enamelling; in colossal statues, and in the most delicate ornamentation of a moulding or a fringe. He had working under him, we are told, architects, sculptors, masons, bronze-founders, goldsmiths, ivory carvers, chasers, enamellers, and dyers. His genius was able to bring the work of all into perfect harmony.\n\nHis influence over all subsequent art was almost equal to that of Homer in poetry. Whilst all subsequent masters and schools had the defects of their qualities, the ancient and the modern worlds have never suggested a shortcoming in Phidias, or a single quality in which he was weak. Consummate judgment and unerring taste control the most sublime and lovely visions of beauty. It is significant that, whilst his representations of the nude surpass in knowledge and technical mastery any others known, we have no single extant example in which he presented the female form, even partially undraped. His Venus on the frieze, like all his other goddesses, is completely draped. Nor must it be forgotten that we have no single statue by Phidias, in the true sense of the word. The Elgin Marbles are all, without exception, architectural decorations. Even the so-called Theseus and the River God, sublime as they are, are the ornaments of a group placed in a pediment, 50 feet above the spectator; and, consequently, like the figures in the metopes or the frieze, they are entirely subordinated to the conditions of the architect.\n\nNor are we able to judge whether the great artist was equal to present human expression and emotion with the same power that he has presented the human form. No single head has survived to us uninjured of any of the larger figures that we can certainly ascribe to Phidias. But in the extant busts of Jupiter we may recognise faint copies of the majesty which he could give to the King of the Gods. We cannot assume that even Michael Angelo or Raphael surpassed Phidias in power of expression; and they assuredly did not surpass him in invention, in knowledge, or in sublime and serene beauty. There is every reason to believe that Phidias was the most perfect and complete genius who ever appeared in the arts of form: the one artist in whom we find nothing wanting, and of whom we know no failure. [F. H.]\n\nÆSOP: PILPAY\n\nÆSOP, possibly the 6th century B.C.\n\nÆsop is the reputed author of a collection of moral fables, which, in various forms, has had a wide vogue and great influence in Europe. About the man we know absolutely nothing. The fables were shown by Bentley to be probably of Indian or Persian origin. The form of imagination which gives speech and other human characteristics to the lower animals is common and congenial to the early stages of thought, but it appears very rarely in Greek literature. We have an instance in both Hesiod and Æschylus, and in one or two other early Greek poets, but not elsewhere. In placing Æsop at the head of the series of writers of whom Aristophanes is chief, we may recognise the fact that in this \"beast epic\" is the earliest form of that humorous description of the faults of human life which, in its fully developed shape, we call \"comedy\" (see Pos. Pol. iii. 234). The Fables of Æsop were versified in later years by Phaedrus in Latin, and by Babrius in Greek. But it was another writer, now almost forgotten, who kept these fables alive during the Middle Ages, enjoying for many centuries a celebrity second only to Virgil—the half-barbarous elegiac fabulist, Avianus. [F. S. M.]\n\nMahaffy: History of Greek Literature, i. 98, etc.\n\nPILPAY.\n\nThe name of Pilpay or BIDPAI is entirely unknown to the Hindoos. The Fables and Proverbs which pass under his name consist mainly of the Pancha Sutra, or Five Sections, and the Hitopadesa, or Friendly Instructor, which were translated into Persian in the fifth century A.D. They were afterwards translated into Arabic; and in 1709 the Persian version was translated into French under the title of Les Consels et les Maximes de Pilpay, which appear in English as The Instructive and Entertaining Fables of Pilpay. The name of Pilpay appears to have been first attributed to the collection in Persia, the reputed Hindoo author being Vishnu-Sarma.\n\nThese fables are the earliest collection in the world, and greatly surpass in humour and in variety of matter and of lesson the Fables of Æsop. There is at the same time similarity enough between the two collections to make us believe in a common source. The Sanskrit fables are supposed to be told by their author for the education of the children of a certain rajah, and form a wonderfully interconnected series. The animals introduced relate other stories to one another, and deliver many proverbs and practical moral precepts, which form a much more important part of this collection of fables than of any other. [F. S. M.]\n\nPLAUTUS (Titus Maccius Plautus), abt. 254-184 B.C.\n\nPlautus was born in Umbria about the middle of the third century B.C. He is said by some to have been a slave and afterwards a stage carpenter. But these may be stories invented to account for his knowledge of slave character and his connection, though a man of humble origin, with the theatre. He produced his first play in 224 B.C., and wrote without a rival till his death forty years later. Twenty of his plays remain.\n\nLike his successors, Cecilius and Terence, he was largely indebted to Menander and the later comedians of Athens, though he is probably more original than either of them. This method of", "num_tokens": 2048} {"category": "olmocr_science_pdfs-history_and_geography", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-history_and_geography/part-00-00000.npy", "text": ". It consists of thirteen books, of which the first two treat of the earth as centre of the universe, of the motion of the stellar spheres by which the day, the year, and the precession of the equinoxes is explained; his table of chords is described and applied; astronomical time is defined, the dependence of climate on latitude is shown. The third book deals with the theory of the sun; the fourth and fifth with that of the moon; the sixth is given to eclipses; the seventh and eighth to the stars; the last five books to the planets.\n\nPtolemy frequently mentions Hipparchus; but it has been shown in detail by Delambre and others that he has borrowed from him far more than he has acknowledged. But what remains as his own is of much importance. He discovered the second inequality of the moon's motion called evocation; the first inequality, due to the excentric position of the earth in the lunar orbit, and called, as in the case of the sun, the equation of the centre, had been discovered by Hipparchus. Ptolemy found that the equation of the centre was diminished when the moon was in conjunction with or opposition to the sun, and was increased in quadrature, i.e. when the angular distance between the moon and sun was 90°. The amount of this inequality depended also on the combination of the places of the lunar apsesides with that of the conjunctions. Ptolemy's estimate of this second irregularity, called by astronomers evocation, was very nearly accurate, and is a discovery of great value.\n\nPtolemy represented lunar as well as planetary motions by supposing the body considered to move on the circumference of a small circle, the centre of which was carried round the earth; a mode of representing complicated periodic motions first suggested by Apollonius. By varying the size of the subsidiary circle and the direction of motion, all these irregularities became susceptible of geometrical treatment. The hypothesis was strictly legitimate; the more so that none but circular arcs were amenable to calculation. A further discovery of vital import to astronomy is due to Ptolemy—that of the refraction of rays of light when passing from a thinner to a denser medium. It is spoken of not in his astronomical work, but in his *Optics*, which therefore must have been written later. Arranging at the extremities of one of the diameters of a circle and at the centre three coloured spots, so that when the circle was half immersed in water, they appeared to be in a straight line, he was able to determine with precision the refraction for each angle of the incident ray. Applying this to astronomy he shows that refraction, greatest at the horizon, and diminishing as the star approaches the zenith, disappears when the ray is vertical.\n\nALBATEGNIUS, 380 A.D.\n\nIn the ninth century begins the fertile period of Arabian science, protected and encouraged by the Khalifs of Baghdad, especially by Al Mamun, son of Harun-al-Raschid, who spent much time in forming a collection of Greek works on science. Ptolemy's *Syntaxis* was translated in 817 by Isaac ben Honain, and was carefully studied by the astronomers of Baghdad and Damascus. His observations were carefully repeated, but without any marked advance of science till the time of Mohammed ben Geber Albatani; so called from Batan, in Mesopotamia, the place of his birth; in Western style he is known as Albategnius. He was a Syrian prince; able and willing to spend wealth on costly observatories established at Aracte and also at Antioch. The result of his labours is contained in a treatise on the science of the stars and their motions.\n\nIn trigonometry, Albategnius introduced an important innovation—the use of the semi-chord of the double arc for the chords employed by Hipparchus and Ptolemy. This semichord was called in Arabic *gib*, i.e. pleat or fold, translated into Latin as *sinus*; such, at least, is the most probable explanation of the word. The introduction of the sine simplified the labour of calculation. Of the other trigonometrical lines, the tangent appears to have been known to him, but not used; the cosine and secant were of later invention.\n\nIn astronomy, Albategnius, repeating with greater accuracy and better instruments the observations recorded by Ptolemy, determined the annual amount of precession as 54″, instead of 36″; a very much nearer approximation to the true amount. He discovered also what in Ptolemy's time was unknown—the annual motion of the solar apogee, which he fixed at 25″. His determinations of the eccentricities of the solar orbit, of the obliquity of the ecliptic, and of the length of the year, were superior in accuracy to those of the Greeks. The year as fixed by him was two minutes and a half too short, an error much smaller than that of Hipparchus, and which, when examined, appears to be due to an incorrect, or even fictitious, observation of Ptolemy.\n\n[J. H. B.]\n\nDelambre: *Astron. du Moyen âge*.\n\nNASIR-ED-DIN (Mohammed Ben Hussein), b. 1201, d. 1274 A.D.\n\nMohammed, the son of Hussein, Al-Thussai (of Thous), from the place of his birth, was a Persian astronomer of the thirteenth century. He was a favourite of Holagou Khan, grandson of Zingis, the great Mogul who overran Persia, and destroyed the Abbasid dynasty in A.D. 1258 (Gibbon, ch. lxiv.). The chief fixed his government at Maragha, where he collected men of science and built an observatory, over which Nasir-ed-Din presided until 1271. He there constructed hydraulic and engineering machines and a variety of improved astronomical instruments, described by Delambre, and collected a fine scientific library.\n\nHe also wrote on Philosophy, combining Aristotle with Plato, and\nmade a Persian translation of the *Almagest* of Ptolemy. And he translated into Arabic the *Elements* of Euclid. He compiled a body of *Tables* of astronomical observations, taken over twelve years. They were dedicated to the Mogul Sultan, were known as the *Ilkhanic Tables*, and enjoyed a great reputation in the East. He also wrote on geography, determining longitudes and latitudes. [F. H.]\n\n\n**HIPPARCUS, abt. 150 B.C.**\n\nHipparcus was born at Nicaea in Bithynia, and from his astronomical observations it appears that he was living in the interval 180-125 B.C. His observations appear to have been almost entirely taken from the island of Rhodes. Whatever communication he had with Alexandria, there is no evidence that he resided there.\n\nOf the numerous astronomical memoirs which he is recorded to have written, the only one that is extant is his commentary on the poem of Aratus, recording the observations of Eudoxus. Hipparcus was probably young when he wrote this work: it does not mention any of the discoveries that have made him famous. Pliny, writing in the first century A.D., speaks of him with enthusiasm, as a man whom it was impossible to over-praise, and mentions specially his audacious enterprise of constructing a map of the stars. Ptolemy, in the following century, calls him a laborious searcher after truth, and makes continual references to his results. But in the great historical work of Delambre, it was for the first time shown in detail that Ptolemy had acknowledged but a small instalment of his debt; and that the immense reputation enjoyed by him through the times of Arabian and medieval astronomy rested in great part on the discoveries of Hipparcus.\n\nThese discoveries are numerous; but the two most important of them, the institution of Trigonometry and the establishment of the precession of the equinoxes, are, as Comte has pointed out, intimately connected with each other. He found, by comparing his own observations of the stars with those made 150 years previously by Aristillus and Timocharis, that their positions as measured perpendicular to the equator and parallel with a fixed point in it (i.e. their declinations and right ascensions), showed notable variation of an apparently irregular kind. The case altered, however, when the two positions of the star were referred not to the equator, but to the ecliptic. Measured perpendicularly to the ecliptic the position of the star—in other words, its latitude—had not changed; but the measurement parallel to the ecliptic, that is to say its longitude, showed a variation amounting to a degree and a half in the period examined. This remarkable phenomenon was geometrically represented by supposing the intersections of the equator with the ecliptic—in other words, the equinoctial points—to alter their positions yearly in a direction opposite to that of the sun's path. They were said to retrograde, so that the equinoxes occurred every year some-\nwhat earlier than would be the case if they remained stationary. The conversion of declinations and right ascensions into latitudes and longitudes shows that Hipparchus had the power of solving the spherical triangle produced by the intersections of the equator and the ecliptic with a meridian; in a word, that he was acquainted with the principles of spherical trigonometry.\n\nBut for the further discoveries of Hipparchus on the solar and lunar motions, plane, as well", "num_tokens": 2048} {"category": "olmocr_science_pdfs-history_and_geography", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-history_and_geography/part-00-00000.npy", "text": " own hair. Other similar figures at Archelaos I’s court included the poets Agathon, Choerilus of Samos, and Timotheus of Miletus, as well as the painter Zeuxis of Ephesus. Perhaps to these should be added the sculptor Callimachus, if the identification of an inscribed epigram found in Aegae as his funerary inscription is correct.\n\nThe circulation of intellectuals and artists throughout the Hellenic territory was a matter of course. In the sphere of political thought, during the 5th century the ties between many of them and democratic leaders were strong. However, after the death of Pericles there was a gradual shift towards other sorts of governments, a trend that continued at the beginning of the 4th century. The relationship between authoritative rulers and intellectuals became stronger; we know of many cases all over the Greek world, such as Plato in Syracuse. It is in this context in which Archelaos I should be framed. Antisthenes, one of the disciples of Socrates, was interested in the monarchy, and wrote a book, now lost, about the Macedonian king, as well as another about Cyrus. This should not be interpreted as a mere coincidence.\n\nThe aim of Archelaos I’s attempts to attract intellectuals and artists to his court was not just to expand his network of contacts or the mere celebration of symposia, but also to learn from them and to introduce reforms in his kingdom following their advice. That is why, for example, Euripides is supposed to have overseen the financial administration of the kingdom. Archelaos I’s reign coincided with a moment when places like Macedon might have been perceived as being safer than others such as Athens, where the ravages of war were becoming increasingly more conspicuous and where some intellectuals did not encounter an atmosphere conducive to the development of their ideas. At the same time the connections of the kings with the Greek community would improve their reputation.\n\nNot everybody accepted Archelaos I’s invitation to join his court, though. According to Aristotle, Socrates rejected such a proposal, arguing that it was disgraceful not to be in a position to return a favor, as well as an injury. In the same vein, the contemporary\n\n---\n\n48 D.S. 13.103.5; Paus. 1.2.2; Plu. De ex. 604d-e. In this connection, SCULLION 2003, 389-399 discusses a possible misinterpretation of the sources and holds that Euripides might have actually remained and died at Athens, but his arguments are not convincing. For this debate and previous bibliography, see LAMARI 2017, 46, who states that the strongest argument in favor of this theory is the reference to the presence of Euripides at Archelaos I’s court made by Aristotle, who had lived there when his father was a physician to King Amyntas III. STEWART 2021, 95-97 goes further and suggests that Euripides’ stay in Macedon should be divided into two periods, approximately from 412/411-410 and 408-406.\n\n49 Solin. 9.15.\n\n50 Ar. Ran. 83-5; Pl. Symp. 172c; Ael. VH 13.4. Although the presence of Agathon in Macedon is not certain; in this respect, see MULLER 2016, 175-181.\n\n51 ROISMAN 2010, 156-157; MOLONEY 2014, 603.\n\n52 Plin. HN 35.36.62.\n\n53 PASPALAS 2011, 185.\n\n\n57 LURAGHI 2013, 139-140. As PRINCE 2015, 162-163 suggests, the form of the title, Ἄρχελαος ἢ Περὶ βασιλείας, implies that this work was probably written as a dialogue between Archelaos I and, possibly, Socrates.\n\n\n59 Arist. Rhet. 1398a [25].\nsophist Thrasymachus called Archelaos I a barbarian in his speech in defense of the Larissaeans, who ran the risk of being enslaved by the monarch.\n\nThe conspiracy that supposedly ended with the death of Archelaos was hatched precisely in this circle of intellectual companions. The attack was orchestrated by Decamnichus, who was furious at the king for having handed him over to Euripides to be flogged after the young favorite had remarked on the playwright’s bad breath. The plotters also included the above-mentioned Crataeas, a resentful lover of the monarch and the one who killed him, as well as Hellanocrates for similar reasons. In both cases, Archelaos I had made them promises that he subsequently broke.\n\nAnother aspect that should be considered in the cultural field is the creation of agones. Dion, the main sacred site of Macedon, became the seat of the Olympia, a festival in honor of Zeus and the Muses. The existence of these agonistic competitions is attested in both the literary and epigraphic sources. The nature of the extant accounts of the Olympia makes it difficult to paint a detailed picture of the organization and sequence of the festival, and especially so to determine its real origin. It is Arrian who mentions Archelaos I as the founder, although in his account the historian refers to the agones of Alexander the Great at Aegae, before the expedition to Asia and immediately after performing sacrifices to Zeus Olympios. Assuming the reliability of Arrian’s account of this episode, since he had access to first-hand sources, this information can be interpreted as a reference to a special edition of the Olympia at Aegae, whereas the traditional one would have taken place at Dion. In fact, that Archelaos I did not found the agones, but may have instead reorganized them, should not be ruled out.\n\nArchelaos I is supposed to have been interested in Panhellenic games. According to Solinus, he obtained victories in the chariot races at the Pythian and Olympic Games. This account, albeit difficult to accept, is certainly in keeping with the king. Archelaos I may have chosen Dion for the Olympia due to its proximity to Mount Olympus, an iconic place for all Greeks. Although some scholars have considered this festival as a sort of counter-Olympics, it was more likely an attempt to forge stronger links with the southern neighbors, thus allowing for a more fluid communication, as well as to create a flagship festival for the Macedonians. There is no reason to believe that those\n\n---\n\n60 Thrasy. fr. 2 DK / D18 B2 Laks–Most: “δοιλεόσομεν Ἐλλήνες ὄντες βαρβάρους”.\n61 Arist. Pol. 1311b.\n62 Thuc. 1.126.5 (Scholia); D. 19.192; D.S. 17.16.3-4; Dio Chrys. 2.2; Arr. An. 1.11.1; Philostr. Ap. 1.34; Steph. Byz., Δiov; SEG XLVIII 781; IG IV 682, ll. 5-6; BE 1939, No. 139. Perhaps also Luc. Her. 7; IG VII 2486; IG XI 4, 1059; I. Sardis 79, ll. 11-15.\n63 The most thorough attempt to examine the origin, nature, and organization of this festival can be found in MARI 1998.\n64 Arr. An. 1.11.1.\n65 MARI 1998, 148-149.\n67 Solin. 9.16.\n68 BADIAN 1982, 35. This is connected with the debate on the participation of Alexander I in the Olympic Games (Hdt. 5.22). To put it succinctly, there is no evidence of the presence of the king. In fact, the passage in Herodotus should be read from a political perspective. For further information on this debate and a previous bibliography, see FEARN 2011, 116-118, esp. n. 34.\n69 ALBANIDIS 2009, 8. GRAZ 2016, 67 wonders whether Dion became the federal sanctuary of the Macedonians as a result of the introduction of the Olympia.\n70 BADIAN 1982, 35-36; BORZA 1993, 240-241, who initially supported the thesis, but then changed his mind.\n71 ALBANIDIS 2009, 9; MARI 1998, 164-165.\ngames could compete with the Great Games and, at the time, the Olympia may have been", "num_tokens": 2048} {"category": "olmocr_science_pdfs-history_and_geography", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-history_and_geography/part-00-00000.npy", "text": "3 kilometres northwest of Mexico City. It is a municipio and the cabecera or main town of the municipalidad\n\n---\n\n1 Mexican MS. 1, six folios, 27.3 × 21.5 cm., amatl paper.\n2 Fols. 1r, 1v, 2v, 5r, 5v, and 6r.\n3 Memoria de la administración pública del estado de México (Toluca, 1893), p. 219. It lies at 19° 43' north latitude and 99° 14' west of Greenwich at an elevation of 2,450 metres above sea level. See Salvador Sánchez Colín, El Estado de México (Mexico, 1951), i. 90.\nof the same name surrounding it. Tepotzotlán depends in turn upon Cuautitlán, administrative centre of the district in which it is located. In the late nineteenth century Tepotzotlán had a population of only 1,127 and the municipalidad had a population of 5,351. The main occupation of the inhabitants of both the municipio and the municipalidad is agriculture. The climate is that of the Central Valley of Mexico, temperate with a rainy season in the summer months.\n\nThe only attraction of Tepotzotlán to the traveller in Mexico today is the magnificent church and buildings of the Jesuit Seminary dominating the main plaza of the town. These buildings are high points in the late baroque style of Mexican Colonial architecture.\n\nThe main native language of the inhabitants was probably Otomi, although Náhuatl was also spoken. In the Pre-Conquest Period Náhuatl was the lingua franca of the Aztec domains, not only for purposes of administrating the Empire but also as a vehicle of communication among peoples who did not speak a common native tongue. It was also used frequently for place names of pueblos that did not speak the language. Thus Tepotzotlán comes from the Náhuatl Tepotzo-, hunchback, and -tlan, place of. Mr. McAfee translates this as “Hunchbaxton” in our Appendix, taking advantage of the ease with which Náhuatl place names can be anglicized.\n\nDuring the Colonial Period Spanish usurped the role of Náhuatl as lingua franca, but still the viceregal courts recognized Náhuatl as the most important Indian language in most of Mexico and the court used an interpreter, called a nahuatlato, when necessary. In some cases, Indians who did not speak Náhuatl\n\n---\n\n1 *Memoria*, pp. 55-6. In the census of 1940 it had 1,378, the municipalidad 7,879 (Sánchez Collín, chart between pp. 120-1). In 1950 the municipalidad had risen to 10,703 (loc. cit. chart between pp. 136-7).\n\n2 There is a fine monograph on the Jesuit buildings at Tepotzotlán which also includes a brief history of the town. See Pablo C. de Gante, *Tepotzotlán, su historia y sus tesoros artísticos* (Mexico, 1958).\n\n3 Ibid. pp. 23 ff., esp. p. 39. See also Mariano Cuevas, *Historia de la iglesia en México* (Mexico, 1946), ii. 375, where he mentions Mazahua as well as Otomí being taught at the Seminary of Tepotzotlán, quoting from Avellaneda, a Jesuit writing in 1592.\n\n4 The English translation would thus be “Place of the Hunchback”.\n\nTECHIALOYAN CODEX OF TEPOTZOTLÁN\n\nwould have to use two interpreters, the first from their own lan­\nguage into Náhuatl, and then the nahuatlato translated into\nSpanish. Thus the fact that Otomí was the important language\nof Tepotzotlán but the codex from Tepotzotlán was written in\nNáhuatl is not a disturbing factor. Since the manuscript is\nclearly a legal document, Náhuatl was a more effective vehicle\nthan Otomí would have been.\n\nTHE TEXT\n\nThe text of the Rylands manuscript is very specific.1 The\ndate May 10, [1]534 appears on the first page (fol. 1vir), and then\nthe scribe lists the name of the official drawing up the document\nand cites the Viceroy Mendoza as a witness (fol. 1v). The\npurpose of the document was to preserve for posterity the layout\nof the town, and it was realized in the town hall at a meeting of\nthe townspeople (fol. 2v). The boundary of the town is traced\npoint by point the way a surveyor might record it (fols. 3r and\n3v). An all too brief resumé of Pre-Hispanic history follows,\nlisting the name of the first ruler Cuauhtochzin (fol. 4r). A formal\nstatement says this town charter is meant to be binding forever\nin the name of the king (of Spain) (fols. 4v-5v). The last pages\nhave the signatures of those drawing up the document (fols.\n5v and 6r).\n\nInteresting for the historian is the name of the founder of the\ndynasty ruling Tepotzotlán and the fact that this account shows\nthe ruler in the early sixteenth century to have had the same family\nname although he has added to it a suitable Spanish and Christian\nname; he is now Don Bartolomé de la Cruz Cuauhtochzin,\ni.e. Sir Bartholomew-of-the-Cross Eagle Heart.\n\nTHE TECHIALOYAN CODICES\n\nThe Rylands manuscript belongs to a group of Mexican\nColonial manuscripts called the Techialoyan Codices. They are\nso close in many ways that one can postulate their all having\nbeen made by the same scribe and artist or at least by ones\nworking so much in the same tradition as to constitute a single\n\n1 See Appendix for transcription and translation prepared by Mr. Byron\nMcAfee of Mexico City.\nschool. This relationship between the artists of the Techialoyan codices was first noticed by Gómez de Orozco in an article publishing several of them for the first time and pointing out their similarities.¹ The late Robert Barlow continued the work of Gómez de Orozco and began cataloguing them, using a different letter of the alphabet for each successive codex he added to the group, calling them all The Techialoyan Codices. He named the group after the Codex of San Antonio Techialoyan to which he gave the letter “ A ”.² In a later article Gómez de Orozco continued the Barlow catalogue, adding others that Barlow had not published. The latest addition that this author knows is “ W ”, given to one in the catalogue of the Parke-Bernet auction house in New York.³ Alcina Franch and Carrera Stampa have published only parts of the catalogue. Neither has made original contributions over and above the second Gómez de Orozco article.⁴ In my recently published study of Mexican manuscript painting, I devoted a chapter to their artistic style alone.⁵\n\nThe first publication of a Techialoyan text was the Codex of San Antonio Techialoyan by Chimalpopoca, and the first publication reproducing the pictorial content of a Techialoyan codex was the Codex of Zempoala by Quaritch, the London book\n\n⁵ Donald Robertson, Mexican Manuscript Painting of the Early Colonial Period: The Metropolitan Schools (Yale Historical Publications : History of Art 12, New Haven, 1959), pp. 190-5, 197. Chapter 11, “ The Techialoyan Codices ”, is a study of the artistic style and not of the text, so the Rylands manuscript was only mentioned in passing, p. 190.\ndealer.¹ The first mention of them in the literature is in the eighteenth-century Boturini catalogue.²\n\nBoturini was a collector of manuscripts and books on the history of Mexico.³ He formed his collection because of his interest in the Virgin of Guadalupe, whom he wished to have crowned. His collection was that of an historian seeking to establish the historicity of the miraculous apparition of the Virgin on the Hill of Tepeyac, north of Mexico City. Boturini solicited and acquired money and jewels to effect the coronation but ran foul of the Viceroy Fuenclara defending the rights of the Spanish crown over religious affairs in the colony. As a result of the Viceroy's orders, he was imprisoned and his collection sequestered. It has been catalogued many times, he himself publishing the first catalogue in 1746.⁴ The subsequent vicissitudes of this collection do not concern us except that part of it was bought in Mexico in the nineteenth century and passed to France as the Aubin collection. Ultimately most of the Aubin material came to the Bibliothèque Nationale as the Goupil", "num_tokens": 2048} {"category": "olmocr_science_pdfs-history_and_geography", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-history_and_geography/part-00-00000.npy", "text": " object of noting these things had been to gain insight into the will of the gods, which they were supposed to indicate. Other facts of nature were studied just so far as they threw light on the practical arts of life: agriculture, weaving, dyeing, metal-working.\n\nBut now, from the seventh to the fifth century before the Christian era, arose men like Thales, Anaximander, Heraclitus, Democritus, who devoted their lives to the task of making the universe intelligible to man. Apart from all thoughts of religious belief on the one hand, or on the other of practical utility, they sought to arrive at some underlying principles to which the infinite variety of sights, sounds, and feelings that surround and make up man’s life could be reduced. The result of the work of these men, and of their colleagues and disciples, was the introduction of two new forces into the life and development of Humanity—Science and Philosophy.\n\nBy Science is meant the discovery of a general fact common to a great number of special facts: such as to enable us to foresee and measure things which we cannot directly handle. For instance, the number of triangles of different shapes that can be formed is infinite. Amidst these differences, Thales found one fact common to all: namely, that the three angles were in every case equal to two right angles. We are thus enabled to measure the sum of the angles of any triangle, or, if we know the sum of two of them, to predict the precise magnitude of the third, without direct measurement of the special case. Similarly, the biologist, examining the teeth and limbs of a new quadruped, is able to predict many facts as to its digestive organs and its moral nature; because he is in possession of a scientific law, that is, of a fixed general relation, connecting these facts together.\n\nPhilosophy, on the other hand, implies the attempt to find a principle, or series of principles, which may make man’s place in the world intelligible to him. In accordance with Comte’s law of the three stages through which our conceptions pass, these general principles will be first\nANCIENT PHILOSOPHY\n\ntheological, secondly metaphysical, and finally positive. That is to say, they will first explain the universe by the Will of a Being, or Beings, with passions and faculties akin to those of Man, but transcending them in power; secondly, by the artifice of some abstract entity, like Nature; and, lastly, the attempt to reach any absolute explanation of the universe will be abandoned, and Philosophy will consist in the orderly arrangement of scientific laws, in accordance with their closer or more distant bearing on the life of Humanity.\n\nComte's second law of evolution explains that our speculations pass through the first and second of these stages into the third, with varying rapidities, according as they relate to simpler and more general facts, or to those that are more special and complex. The branches of inquiry in which the thinkers of Greece reached the positive stage, related, with one important exception, to the simplest and most universal of all phenomena, those of number and space. In dealing with facts of a slightly higher degree of complication, those of motion, for instance, they were dominated by such metaphysical conceptions as that circular motion was perfect and eternal. With the facts relating to the composition of matter, to life, and to human conduct, the influence of similar metaphysical beliefs was even greater. The one remarkable exception is Aristotle, whose precocious genius introduced positive methods of research into these higher studies. Consequently his philosophy, though in the main still metaphysical, made advances in the direction of Positivism unapproached by any thinker of antiquity, and by few of modern times.\n\nThe history of Greek thought falls broadly into two periods. In the first, from Thales to Aristotle, positive science and metaphysical philosophy were, in the main, prosecuted by the same inquirers. In the second period, lasting till the suppression of the Hellenic movement by the Christian Church, Philosophy and Science parted company. Positive thinkers, from Archimedes to Hipparchus, devoted themselves to the special subjects of Geometry and Astronomy, in which alone the discovery of precise scientific laws was at that time possible. Philosophy, meanwhile, deprived of the bracing influence which positive thought exercised, even on subjects which it could not master, became intellectually more feeble and verbose; and the later stages of it would have deserved no record but that they served the social purpose of undermining polytheistic belief, and of preparing the doctrine on which the Catholic Church was ultimately to be founded.\n\nThe one really new thing given by Greece to the world is abstract science; that is to say, the isolation of a special class of phenomena as seen in various objects, and the discovery in these of fixed relations. Concrete science, founded on observations of objects, without any attempt to consider the distinct classes of facts, or phenomena, that each object presents, had of course existed from the earliest days of human society. Much positive knowledge of winds, tides, plants, and animals is possessed by savages. The philosophers and priests of China and Egypt had observed the apparent motions of the sun and planets, and the regular recurrence of eclipses. Geometry, Herodotus tells us, is of Egyptian origin; it was the art, as the name indicates, of remeasuring fields after the annual inundation of the Nile. But, between practical\nmensuration and what we understand by Geometry, there is an all-\nimportant difference. To measure a given surface with accuracy sufficient\nfor practical purposes is one thing; to abstract the line from the surface,\nand find out the fixed relations between lines bounding every kind of\nsurface, is quite another. And it is this that was done by the long line\nof Greek scientific thinkers from Thales to Hipparchus. It was the first\napproach to the scientific conception of the universal order, which is, at\nthe present time, working so fundamental a change in human society.\n\nSome glimpse of its social import was visible at the outset. In the\nbest period of Greek thought, lofty views as to the conduct of life were\ncombined with scientific speculation. \"Study Geometry before you\nenter here,\" was the inscription over the school of Plato. Still more\nfully was the bearing of science upon human conduct recognised by\nPythagoras, whose noble, but premature, attempt to organise life on the\nbasis of scientific law failed only because the range of science was limited\nas yet to the facts of space and number. It was left for Aristotle to\nintroduce the conception of scientific order into the more complicated\nfacts of life and society.\n\nThe names given in each week of the month of Aristotle are arranged\non the following plan:\n\nThe first week represents the dawn of Greek thought, in which\nattempts were made to explain the universe by some one physical\nprinciple; the positive science of geometry meanwhile slowly disengag-\ning itself. Of this stage, Thales is the principal representative.\n\nThe second week illustrates the premature, but momentous, effort to\nuse science as the basis for the organisation of human life, instituted by\nPythagoras.\n\nThe third week presents the ethical side of Greek thought. This was\nthe side most attractive to Roman thinkers, three of whom are here\nincluded. The principal type is Socrates.\n\nThe final week is devoted to the school which, under the teaching of\nPlato, prepared the way, consciously or unconsciously, for the Christian\nChurch.\n\n[J. H. B.]\nARISTOTLE, b. 384 B.C., d. 322 B.C.\n\nARISTOTELIS, son of Nicomachus, physician at the court of Macedon, was born 384 B.C., in Stageira, on the coast of Thrace. At the age of eighteen, or, by another account, at the age of thirty, and after much experience of practical life, he came to Athens, and entered the school of Plato. After Plato's death, in 347, he lived at Atarneus, then ruled by Hermias, whose niece, Pythias, he married. After the death of Hermias, he lived for some years at the court of Philip of Macedon, where he was charged with the education of Alexander till the death of Philip, in 336. He was much occupied during this period with civic duties of great importance in his native city of Stageira. When the Persian war began, Aristotle went again to Athens, this time not as a pupil but as a master, and established his school in the gymnasion attached to the temple of Lycean Apollo. At the death of Alexander, twelve years afterwards, a charge of impiety was brought against him by the chief-priest of Demeter. He retired from Athens, and died the next year at Chalcis, at the probable age of sixty-two years. His will is preserved to us in the biographies of Diogenes Laertius; it shows affectionate thought for each member of his family, and grateful remembrance of those who had died before him. His household servants are not forgotten; they are to be set free from bondage.\n\nIt has been often said that Aristotle's greatness was not recognised till the Middle Ages. And this is true; but it does not go far enough. The Greek world, now politically degenerated, looked on Plato, and men far weaker than Plato, as his superiors. By a strange accident, his principal works, intrusted to his disciple Theophrastus, disappeared from view for two centuries, till brought to Rome by Sulla, and edited by Andronicus. In the turmoil of barbarian invasion, and during the building up of the Catholic Church, his name was forgotten, except by a few obscure writers in Constantinople, till the great Mohammedan schools arose in Baghdad and Cord", "num_tokens": 2048} {"category": "olmocr_science_pdfs-history_and_geography", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-history_and_geography/part-00-00000.npy", "text": " Ross’ Landing, Bybee Ferry, the Hair Condab Cabin, and the Fort Royal Historic District; nominations for Fort Hill Cemetery, Elkton Turnpike, Rock River Road and Crossing, Higgins Farm Trail Trane, and Rock Martin House.\n\nThe NPS has also entered into a cost-share agreement with the University of North Carolina to assess for National Register eligibility the Stigui House site, the Valleytowns Baptist Mission, the John Christie House and Cabin site, the Old State road, Pile Ridge Road, Burnt Stand, the Unicoi Turnpike, and Fort Butler.\n\nFor more information contact Aaron Mahr at the National Trails Office-Santa Fe.<|endoftext|>How Can We Make Digital History Sites Personal?\n\nJacob Dinkelaker\nNational Park Service\n\nFollow this and additional works at: https://cupola.gettysburg.edu/interpretcw\n\nPart of the Cultural History Commons, Public History Commons, Social History Commons, and the United States History Commons\n\nShare feedback about the accessibility of this item.\n\nDinkelaker, Jacob, \"How Can We Make Digital History Sites Personal?” (2011). Interpreting the Civil War: Connecting the Civil War to the American Public. 185.\nhttps://cupola.gettysburg.edu/interpretcw/185\n\nThis open access blog post is brought to you by The Cupola: Scholarship at Gettysburg College. It has been accepted for inclusion by an authorized administrator of The Cupola. For more information, please contact cupola@gettysburg.edu.\nHow Can We Make Digital History Sites Personal?\n\nAbstract\nIt's a question I've been asking myself a lot recently. Digital public history sites are springing up all over the web. There are snazzy ones with great content like The Antebellum Project, which showcases Bowdoin College's role in the coming of the Civil War. There are information and resource dumps like Ancestry.com that allow its users to see tons of different historical sources. There sites that use GIS like WhatWasThere and allow users to collectively document the world around them. Then there are websites that are digital exhibits built to accompany an actual physical exhibit - one of my favorite examples is this one by the Met on paintings that feature scenes from everyday life in America. [excerpt]\n\nKeywords\nCW150, Gettysburg, Gettysburg College, Civil War Era Studies, Civil War Interpretation, Interp Theory, Digital History\n\nDisciplines\nCultural History | History | Public History | Social History | United States History\n\nComments\nInterpreting the Civil War: Connecting the Civil War to the American Public is written by alum and adjunct professor, John Rudy. Each post is his own opinions, musings, discussions, and questions about the Civil War era, public history, historical interpretation, and the future of history. In his own words, it is \"a blog talking about how we talk about a war where over 600,000 died, 4 million were freed and a nation forever changed. Meditating on interpretation, both theory and practice, at no charge to you.\"\n\nCreative Commons License\nCreative\nThis work is licensed under a Creative Commons Attribution-Noncommercial 4.0 License\n\nThis blog post is available at The Cupola: Scholarship at Gettysburg College: https://cupola.gettysburg.edu/interpretcw/185\nHow can we make Digital History Sites Personal?\n\nOr, are they already personal?\n\nIt’s a question I’ve been asking myself a lot recently. Digital public history sites are springing up all over the web. There are snazzy ones with great content like The Antebellum Project, which showcases Bowdoin College’s role in the coming of the Civil War. There are information and resource dumps like Ancestry.com that allow its users to see tons of different historical sources. There sites that use GIS like WhatWasThere and allow users to collectively document the world around them. Then there are websites that are digital exhibits built to accompany an actual physical exhibit - one of my favorite examples is this one by the Met on paintings that feature scenes from everyday life in America.\n\nEach one of these websites presents a great learning opportunity. But...does each one of these websites present a similar ability for its users to find meaningful connections with historic ideas, objects, artifacts, events, and people? It seems that so much of interpretation at museums and historic sites relies on experience. You can see the artifacts in the museum and image the hands that made the uniform, or the persons who drank out of that cup and canteen. To use my favorite example, by visiting battlefields, you not only see the ground over which Pickett’s Charge occurred, but also the farmhouse of the free African-American family who owned just a few of the fields that the Confederates charged over and died upon.\n\nCan you have the same experience online? Does watching a video or uploading a picture create the same opportunities as talking to an interpreter? On one hand, it’s probably good news that a video can never replace an actual human being. But what then of digital public history? Does the sense of ‘discovering’ history on your own, in your own home, and at your own pace make up for this lack of experience?\n\nI think it does (or at least it does it for me). Digital history sites democratize history. They allow anyone with an internet connection to experience the thrill of research, the telling of a great story, or connecting with a physical site, even though it’s through a computer screen and keyboard. Is that, in of itself, personal interpretation? I don’t know yet. Let me know what you think in the comments.\n\nYep, I know - short post this week, but I’m moving! By the end of the month I’ll be settled into my new apartment in Washington D.C. - the capitol of public history. As such, expect to hear my adventures and critiques of public history sites in the area. Before hitting up Washington D.C. I have some unfinished business with Gettysburg next week as I get back to the Civil War here on the blog...<|endoftext|>CONTENTS\n\n\nThe Early History of the Communist Party of Great Britain. By Henry Pelling, M.A., Ph.D. 41\n\n\nThe Protestant Constitution and its Supporters, 1800–1829. By G. F. A. Best, Ph.D. 105\n\nThe New Agriculture in Lower Normandy, 1750–1789. By Alun Davies, M.A. 129\n\n\nReport of Council, Session 1956–57 167\n\nAlexander Prize 177\n\nDavid Berry Prize 179\n\nOfficers and Council, 1957 180\n\nList of Publications i<|endoftext|>Colonel Samuel Bagshawe And The Army Of George II, 1731-1762\n\nSamuel Bagshawe; Alan J Guy; Army Records Society (Great Britain)<|endoftext|>CULTURAL HERITAGE\nand\nLAND MANAGEMENT PLAN\nfor the\nBLACKSTONE RIVER VALLEY NATIONAL HERITAGE CORRIDOR\nCULTURAL HERITAGE\nand\nLAND MANAGEMENT PLAN\nfor the\nBLACKSTONE\nRIVER\nVALLEY\nNATIONAL\nHERITAGE\nCORRIDOR\n\nAs approved by Blackstone River Valley National Heritage Corridor Commission / October 21, 1989\n\nSUBMITTED FOR REVIEW AND APPROVAL TO\nThe Governor, Commonwealth of Massachusetts\nThe Governor, State of Rhode Island and Providence Plantations\nThe Secretary of the Interior\n\"The hardest working river, the most thoroughly harnessed to the mill wheels of labor in the United States, probably in the world, is the Blackstone.\" Winthrop Packard, writing in the October 1909 edition of the Technical World magazine, proclaimed the dramatic industrialization of the Blackstone River Valley. Packard's proclamation was made a little more than a century after the American Industrial Revolution was born along this same Blackstone River at Samuel Slater's mill in Pawtucket, Rhode Island.\n\nIn the eighty-years since that startling claim was published, the Blackstone Valley has experienced a transformation that mirrors much of the economic history of the United States. The industries which caused the Valley's countless brick mills to shudder continuously throughout the 19th century fell quiet as this century progressed. A region that once, like Ellis Island, whose buildings were constructed with Blackstone Valley granite, welcomed masses of immigrant workers later had fewer and fewer jobs for their children. A long period of depression consumed not only money and industry, but the confidence and self-esteem of the people who lived in the towns, mill villages, and cities along the Blackstone River and its tributaries.\n\nParadoxically, the neglect which cast long dreary shadows over the Blackstone Valley also allowed the Valley's special character to survive. We can still see the outline of the 19th century industrial society in the mill villages, the farms and market towns, the roads, rails and canal, the cities, the ethnic neighborhoods, and the magnificent mills. Much of the very best of our past is still here. As development returns, we have the chance to avoid the tragic development mistakes made by others.\n\nWe have much to treasure from our past. The Blackstone River Valley once typified the explosion of American entrepreneurial creativity and confidence. The Valley's story is one of work in America. It reflects the interdependence of engineering and nature, and of labor and management. It is also a story of independence of thinking and of religion, the story of a region that resisted the dictates of a distant theocracy and oligarchy in Puritan Boston.\n\nAfter decades of neglect, growth and change have arrived in the Blackstone River Valley. In recent years, we've witnessed the initial impact of what has irrevocably changed much of America. Economic", "num_tokens": 2048} {"category": "olmocr_science_pdfs-history_and_geography", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-history_and_geography/part-00-00000.npy", "text": "/articles/RR/mzr1_print.html](http://www.tshaonline.org/handbook/online/articles/RR/mzr1_print.html).\n\n33. [www.tshaonline.org/handbook/online/articles/RR/mzr1_print.html](http://www.tshaonline.org/handbook/online/articles/RR/mzr1_print.html).\n\n34. Berwanger 8.\n\n35. There were 1,034 organized churches in Texas in 1860.\n\n36. 1870 United States Census Table XVII (A) and (B).\n\n\n38. *Handbook of Texas Online - Bowie County*. \n\n39<|endoftext|>Romans Workpack\nKey Stage Two\n\nMuseum of Classical Archaeology\n\nWritten and Compiled by Justyna Ladosz\nImages Copyright: Museum of Classical Archaeology\nWith Illustrations by Katie Idle\n1. Your first task is to find the first Roman to invade Britain. He has a very stern looking face, and a famously prominent strong nose. Write down his name:\n\nThink of two adjectives that describe this portrait and write them down:\n\n2. Stay in Bay J and find the head of Emperor Claudius. Hint: it is small, bronze, and has a ragged edge.\n\nWhich parts of his face are similar to the portrait of Julius Caesar you just saw?\n\nEyes Ears Nose Eyebrows\n\nThis head was found in a river in Suffolk. The ragged edge means the head was violently cut or snapped from the rest of the statue. What might have happened?\n\n3. Go back to the head of Julius Caesar. Look to the left and find the emperor who towers above all others and has a beard. What is his name? Britain has a very big thing named after him, what is it?\n\nOn the next page try to draw this emperor. Pay attention to his beard, full head of hair and armour.\nHungry for more?\n\n4. Match the emperor and their British connection\nJulius Caesar Boudicca revolted against him\nClaudius Emperor of the famous wall\nHadrian First to Conquer Britain\nNero The first Roman general to invade Britain.\n\n5. Which of our emperors in Bay J has the best hair? Write down your answer:\n1. Go to BAY J, and find the mother of emperor Claudius. Her name is ANTONIA MINOR and her head is VERY BIG.\n\nCan you see and draw:\n- the beaded band at the top of her head\n- the diadem decorated with leaves\n- curly locks on either side of her neck\n\nCircle the correct answer: Her accessories are...\n- everyday dress In Roman times\n- a special style showing she was the mother of an emperor\n- a special style she wore because she was a priestess\n\nLook at the statues around you. The head of ANTONIA (which was part of a whole statute) is COLOSSAL in comparison to them. Why could that be? Discuss with your friends and write down two possibilities:\n\n2. Go. To BAY J and find three busts of women next to each other. Two of the women belonged to the imperial family. Can you find out their names and write them down?\n\nEach of the women has a very different hairstyle, showing you how fashion changed in Rome. Pick your favourite one and try describing it to someone who hasn't seen the statue!\n\nHow many different women's hairstyles can you find in Bay J? Count them and write down your answer.\nImperial Women\n\nDrawing Space\n\nmuseum of classical archaeology 2020\n1. Go to BAY K and find a massive statue of a young man with grapes in his hair. What does Antinous have in common with the god of wine Dionysos in this portrait?\n\n2. Stay in Bay K and turn around. Can you find a large round objects with figures on it? This is a well head!\n\n Can you find these gods and goddesses on the well head? Look for the objects the gods are holding or wearing to help you!\n\n - Vulcan, the god of blacksmiths is holding a ....................................................\n - Mars, the god of war has ..................................................................................\n - Minerva, the goddess of wisdom has............................................................... \n - Diana, the hunter goddess is holding a ...........................................................\n\n3. Find a statue of Diana, the hunter goddess in Bay E.\nGods and Emperors\n\nDraw one of the gods and goddesses or create your own Roman God.\n\nHungry for more?\n\nGo to BAY J\nFind a man in armour, his name is Augustus, he was the first emperor. What is he wearing? (Hint: this is what most general would wear at the time).\n\nCount all the gods and humans depicted on his armour:\n\nCan you find the baby next to his feet?\n1. Go to BAY K and find the creature with snake legs. Who is he? What is happening?\n\n2. Turn to the right, find a bronze deer. He was found in a villa in Herculaneum. What happened to Herculaneum? Read the label to find out and write down your answer:\n\n3. Go to BAY J and find the man wrangling with snakes. This is what happened to people in Roman myth if they annoyed the gods. How many snake heads can you see? Describe the emotions of the man and his sons in two words:\n\n4. In Bay H are two boys playing with animals. Can you find:\n A boy with a small goose\n A boy with a bigger goose\n\n5. Go to Bay F and find a hunter. What animals are next to him?\n\nWrite down all the animals you have found in the museum:\nAnimals and Monsters\n\nDrawing Space\n\nMuseum of Classical Archaeology 2020\n1. Go to BAY J and find a boxer resting after a fight. Can you see:\n - Boxing gloves\n - Swollen ear\n - Swollen nose\n\n2. Stay in BAY J. Turn around and find a small bronze statuette next to the emperors. He was found in the house of the Faun in Pompeii. What is a faun? Which two things show us he is not human?\n\n Tail Feet Ears Hair\n\n What is the faun doing?\n\n3. Find the statue of Hercules in BAY K. It stood in the public baths in Ancient Rome. What did Romans do at the baths?\n\n - clean themselves - chat to their friends - conduct business\n\n Which town in Britain takes its name from this Roman habit?\n\n4. Stay with Hercules. Can you spot:\n - His cape of lion skin\n - His weapon - a club\n - The apples of Hesperides\nGames and Villas\nDrawing Space<|endoftext|>Visual Culture in Prehistoric South-east Italy\n\nBy Robin Skeates\n\nUsing the approach of visual culture, which highlights the embeddedness of art in dynamic human processes, this paper examines the prehistoric archaeology of the Lecce province in south-east Italy, in order to provide a history of successive visual cultures in that area, between the Middle Palaeolithic and the Bronze Age. It is argued that art may have helped human groups to deal with problems in subsistence and society, including environmental changes affecting the cultural landscape and its resources, the breaking up of old social relations and the establishment and maintenance of new ones. More specifically, art appears to have become increasingly related to the expression of religious and even mythical beliefs, and in particular to the performance of ceremonies and rituals in selected spaces such as caves. This may reflect the existence of a long-term tradition of performance art in prehistory, involving performers and viewers, in which art helped to structure and heighten the sensual and social impact of the acting human body.\n\nTOWARDS AN ARCHAEOLOGY OF VISUAL CULTURE\n\nThe main aim of this paper is to promote archaeological interest in the study and approach of 'visual culture', with its emphasis on the social dynamics of visual communication. This is an area closely related to the study of 'art', which can be broadly defined as those made objects that are intended to be visually expressive and stimulating. The term 'visual culture', which has recently gained widespread (although not total) interdisciplinary acceptance, usefully complements and broadens this definition with the belief that such objects also comprise an integral part of the mental and cultural processes through which people construct themselves (see, for example: Alpers et al. 1996; Walker & Chaplin 1997; Rogoff 1998; Mirzoeff 1999). In doing so, 'visual culture' highlights not only the manufactured ('artefactual') nature of art, but also its embeddedness in dynamic human processes.\n\nThis approach deserves to be better-known by archaeologists. On the one hand, it has the potential to enhance traditional archaeological approaches to the history of art, including the study of prehistoric art in terms of its technical production, style, iconography, siting, spatial distribution, relative age, archaeological culture, and evolution (eg. Graziosi 1973). On the other hand, it is clear that visual culture studies share much in common with contemporary 'contextual' and 'interpretative' archaeological approaches to the symbolic and structural meanings of material culture (eg. Hodder 1982; 1986, 118–46; Thomas 1993; Tilley 1998). The almost unbounded range of manufactured material studied by these contemporary approaches is comparable. Together, they emphasise the centrality and embeddedness of the material and the visual in cultural processes, within which art objects are seen to participate actively in the production, reproduction, and transformation of social values, meanings, and relations.", "num_tokens": 2048} {"category": "olmocr_science_pdfs-history_and_geography", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-history_and_geography/part-00-00000.npy", "text": ".), F. 18, stamp Tasc (Tascilli, Lezoux Domitian-Hadrian). Coarse Ware. This was not studied at the time of excavation but preserved in Aldeburgh Museum and consists of fragments of jars with cordons and incised decoration imitating Gallo-Belgic forms. V.C.H. 307-B.\n\n\nHolbrook. Greenwich Royal Hospital. When excavating for swimming bath in 1929 the mechanical grab brought up fragments of coarse pottery, small jug, terra sigillata F.18 (135-200 A.D.), two coins unidentified, from depth of 6-8 ft. Pottery at and information from Greenwich Royal Hospital Estate Office, Holbrook. Pottery examined by Mr. M. R. Hull.\n\n\nIworth (Including Pakenham) Priory Farm. Fragments terra sigillata and coarse ware dishes, cordoned bowls and jars. Fragment decorated terra sigillata Vespasian-Domitian, South Gaul. Duck Farm (Pakenham). Fragments terra sigillata, fragment F.36 Antonine. Coarse ware as above. (Notes made when inspecting pottery in the possession of Major G. Kilner). Other Pottery. Decorated terra sigillata bowl F.37 (Antonine). Ash.M. R. 294. Coarse ware:—grey bowl with cordons from Pickerel Inn. (Fig. 2, XI). Ash.M. 1907. R 215. Small grey bowl with everted lip and cordon around girth (Fig. 2, XIII) from Pakenham. Ash.M. Also dark grey beaker with everted lip on shoulder, polished zone on shoulder and at base with incised vertical lines in groups between (Fig. 2, IV) Ash. M. R.212. All three similar fabric to Wattisfield kilns.\n\n\nLakenheath. At foot of Maid's Cross Hill, close to meeting place of chalk and fen. Many Roman objects obtained from this site including coins, Philippus-Honorius. About 200 yds. from this site remains discovered in 1945. Patches of black sand noted. Terra sigillata:—sherd from this site remains discovered in 1945. Patches of black sand noted. Terra sigillata:—sherd from this site remains discovered in 1945. Patches of black sand noted. Terra sigillata:—sherd from this site remains discovered in 1945. Patches of black sand noted. Terra sigillata:—sherd from this site remains discovered in 1945. Patches of black sand noted. Terra sigillata:—sherd from this site remains discovered in 1945. Patches of black sand noted. Terra sigillata:—sherd from this site remains discovered in 1945. Patches of black sand noted. Terra sigillata:—sherd from this site remains discovered in 1945. Patches of black sand noted. Terra sigillata:—sherd from this site remains discovered in 1945. Patches of black sand noted. Terra sigillata:—sherd from this site remains discovered in 1945. Patches of black sand noted. Terra sigillata:—sherd from this site remains discovered in 1945. Patches of black sand noted. Terra sigillata:—sherd from this site remains discovered in 1945. Patches of black sand noted. Terra sigillata:—sherd from this site remains discovered in 1945. Patches of black sand noted. Terra sigillata:—sherd from this site remains discovered in 1945. Patches of black sand noted. Terra sigillata:—sherd from this site remains discovered in 1945. Patches of black sand noted. Terra sigillata:—sherd from this site remains discovered in 1945. Patches of black sand noted. Terra sigillata:—sherd from this site remains discovered in 1945. Patches of black sand noted. Terra sigillata:—sherd from this site remains discovered in 1945. Patches of black sand noted. Terra sigillata:—sherd from this site remains discovered in 1945. Patches of black sand noted.\n\n\nCOIN HOARDS.\n\n\nFrom the study of the distribution of these sites and the characteristics of the pottery upon which the classification has been based much light is thrown upon what took place in the county in the years that follow Boudicca’s revolt.\n\nDISTRIBUTION\n\nThe Roman sites at Capel St. Mary, Coddenham, Darmsden, Hazlewood, Lattingford and Reydon Smere, and the finds of pottery at Combs, Ipswich and Kirton, in East Suffolk, together with the site at Long Melford in the Stour Valley and the pottery from Exning, demonstrate that the occupation of the areas commenced in Prasutagan times was continued. That new areas were also occupied now is shown by the finds at Great Welnetham, Hitcham, Ixworth and the Wattsfield district. It will be noted that the river valleys are still preferred and the clay lands\navoided. The absence of any considerable finds in Breckland, apart from the kilns at West Stow and the pottery from Lakenheath, is puzzling. It may be that the archaeological record is at fault. Perhaps the nucleus of the Icenic kingdom was slower to recover from the destruction of Suetonius Paulinus than the outlying areas.\n\nCHARACTER OF THE OCCUPATION\n\nThe classification of these sites upon the basis of the pottery produced has already been mentioned. Since much of this is salvage material and in some instances consists of fragments only it would be hazardous to place much reliance upon it ifit did not display features that have been noted in that from the more systematically excavated sites in Norfolk (Caistor-by-Norwich, Gayton Thorpe, Needham, Scole and Runcton Holme) and Wattisfield. Prof. Atkinson noted both at Gayton Thorpe and Caistor-by-Norwich that backwardness seemed to be an East Anglian characteristic and observed a \"lagging tendency\" in the coarse ware, types not to be expected after 120 A.D. appearing with terra sigillata of the Antonine Age. Prof. C. F. C. Hawkes found that the Runcton Holme pottery confirmed Prof. Atkinson's conclusions and remarked upon the influence of Gallo-Belgic forms upon the work of local potters and the absence of pieces common in the Flavian period. The pottery from Needham, Scole and Wattisfield displayed the same features. The coarse ware available for study from Darmsden, Exning, Hazlewood, Hitcham, Ixworth, Kirton, Lakenheath, Lattingford, Long Melford and Reydon Smere is of a piece with that from the Norfolk sites and Wattisfield.\n\nThe hypothesis put forward by Prof. C. F. C. Hawkes to account for the backwardness of the pottery from the Norfolk sites may now with good reason be applied to that from Suffolk. Prof. Hawkes holds that \"provincial civilization seems to have made but little headway among the Iceni until the second century had well begun\" and accounts for this by the ruthless treatment that was meted out to the Iceni after the revolt of Boudicca. We may therefore conclude that the \"revival\" of the Roman life in Suffolk cannot have commenced much before the end of the first century and did not flourish to any appreciable extent till well on into the second century.\n\nThough buildings have been noted at Capel St. Mary, Coddenham, Hitcham, Lattingford and Reydon Smere not enough is known about them to make their history clear. That they had their beginnings in the second century is certain, and it is almost equally certain that they were not occupied later than the first decade of the third century. It is probable, however, that they were deserted at an even earlier date. Since there was a more extensive occupation of our county in the third and fourth centuries the discussion of the demise of these buildings will be deferred to the latter part of this account when the evidence of the occupation for these centuries has been presented.\n\nIn 1843-4 four Roman barrows, within 250 yards of remains of buildings, were investigated at Rougham. The second contained among other objects terra sigillata belonging to the first half of the second century; a fourth at Eastlow Hill contained a small chamber in which was found a leaden coffin with a skeleton within. Other Roman barrows in Suffolk have been noted at Blaxhall and Stonham. The Rougham barrows were interpreted by Sir Cyril Fox as a survival of a La Tène custom in our area, while the absence of grave furniture in the fourth at Eastlow Hill he held to indicate a \"Christian burial\" probably of the fourth century. Messrs. Dunning and Jessop in a more extended survey of Roman barrows concluded that no barrow was built later than the second century though Eastlow Hill was regarded as a possible exception. On the ground that outside Britain Roman barrows are found to be concentrated in Eastern Belgium, these writers reached the conclusion that the custom was introduced into Britain by merchants from Rhineland who participated in its commercial development.\n\n**COMMUNICATIONS**\n\nIt has already been noted that no road", "num_tokens": 2048} {"category": "olmocr_science_pdfs-home_and_hobbies", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-home_and_hobbies/part-00-00000.npy", "text": " from the mountains of Asia Minor. It grows from four to eight inches high, and in early spring is covered with spikes of the most beautiful sky-blue, white-centred flowers. Winter aconite (*Eranthis hyemalis*), also bears beautiful bright-yellow flowers in early spring. But the earliest of all these early bulbs is the snowdrop, *Galanthus nivalis* and *G. Elwesii*, bearing large bell-shaped white flowers, which often peep out in January. All these very early-blooming bulbs are specially attractive planted in the greensward, where their charms are relieved by the first green of spring. Yet the border in the flower garden is the most congenial after all, the place where the best flowers bloom.\n\nMany of the irises are beautiful, but there are none more delicately and daintily beautiful than the bulbous and tuberous-rooted species. Chief among these are the golden-netted irises (*Iris reticulata*). The flowers are deep violet-blue, netted with fine golden-yellow lines. It is early blooming, fragrant, and hardy. *Iris Iberica* (Chalcedonian iris) is a showy species with large rich purple flowers, beautifully veined, and spotted with a black spot on each petal. It blooms somewhat later than *Iris reticulata*. There is a well-known pomponian lily, *Lilium*\n*Pomponium*, that blooms comparatively early in June. The flowers are pendulous, scarlet, and attractive. The plant comes from France and grows about three feet high. *Crucianella stylosa* is an ornamental plant, diffusively tufted with a profusion of weak, straggling, procumbent stems clothed with whorls of six or more narrow lance-shaped leaves growing about a foot high. The flowers are borne in small but handsome terminal heads, and are bright rose or pink, with long styles protruding conspicuously beyond the corollas.\n\nI propose now to consider some of the summer-flowering plants, the plants that commence to bloom in June or early July, and oftentimes continue in flower throughout the season. There are many, but we shall attempt to consider only a few. *Achillea tomentosa* (downy yarrow), different from most herbaceous plants, displays striking and attractive foliage, but the flowers are pretty, and of a bright-yellow color. It is only six or eight inches high. The *Aquilegias* or columbines are always quaintly beautiful, and there are none more so than the summer-blooming ones. *A. chrysantha*, the golden columbine, is probably the best, because it produces golden-yellow flowers all summer. Like all *Aquilegias*, the flowers have curious long spurs. *A. caerulea* (Rocky Mountain columbine) has charming blue and white flowers, and is only less valuable than *chrysantha* because it does not bloom all summer. Both of these columbines\ngrow two to three feet high. *Aquilegia vulgaris* (Munday's giant) is of garden origin, robust, growing three feet high, and producing pure white flowers in abundance. *Armeria maritima*, one of the sea pinks or thrifts, bears attractive rose-colored flowers and broad foliage about a foot high.\n\n*Asperula odorata* is the common woodruff of Northern Europe. It grows six to twelve inches high in dense tufts of slender stems with leaves mostly eight in a whorl, and has flat clusters of small white flowers in summer. When wilted this plant has the odor of new-mown hay. The *Campanulas* or harebells are of course well known for their dainty beauty. They are all summer-flowering, but perhaps *Campanula rotundifolia* blooms somewhat earlier than some of the others. It is a beautiful native species, with numerous deep-blue flowers. It grows only six to twelve inches high. To speak of the lily of the valley in praise, or dwell on its charms, would be superfluous, for all the world knows them. The dainty bloom pushes its white bells from the sheathing leaves during the latter part of May into June.\n\nAnd the no less dainty maiden’s pink (*Dianthus deltoides*) comes in early summer also. It is an humble\nplant, six to nine inches high, and the bright-pink or white flowers, with the dark or white circle in the centre, grow out of dense tufts of grassy leaves. Then there is the sweet-william of the gardens of earlier days, *Dianthus barbatus*, with deep crimson flowers, and a height of one to two feet. Finally, there is *Dianthus plumarius*, the garden pink or the cushion pink, forming broad tufts and bearing flowers with beautifully fringed petals and a delightfully fragrant odor. It grows only six or eight inches high. *Dicentra crinum* (plumy bleeding-heart) is a plant from the Alleghany Mountains, nine to eighteen inches high, with leaves as graceful as those of a fern. The flowers are rose-colored, and appear all summer, hanging in graceful racemes. The *Dicentra spectabilis*, scarcely less beautiful, comes earlier. *Iberis correa-folia* (corris-leaved perennial candy tuft) is a beautiful dwarf evergreen shrub, with large pure white flowers.\nThe summer-flowering irises are also important. I mean those that bloom in early summer. The Florentine iris, or the orris root, belongs to this time. It bears large fragrant white flowers with a tinge of blue, and a bright yellow-white tinged with pink or lilac when they have been open for some days. There are generally many flowers completely covering the stem. The Siberian iris is tall with narrow leaves, and white and blue and delicate-veined flowers. *Iris Siberica*, var. *haematophylla*, is a very dark-leaved early flowering kind that often blooms the second and third time during the season. *Linum perenne*, the perennial flax, is attractive all summer, with its tufts of narrow foliage and its bright blue flowers, an inch or more across, which seem, on their slender stalks, semi-detached and floating.\n\nNo garden would, of course, be complete without its peonies and tall phloxes. The herbaceous peonies present every shade of white, pink, rose, red, crimson, and dark purple among their scores of varieties. Their flowers are perhaps the largest and most showy of any we are likely to plant in our garden, and make a great display at a distance. I will mention one kind because it is so unique. *Paeonia tenuifolia*, pl. *pl.*, is different from all others on account of its abundant finely divided foliage, from the midst of which peer out large double brilliant dark-red flowers. The tall phloxes to be seen in gardens\nare usually the annual kinds, but the herbaceous kind, *P. Carolina*, bears beautiful pink-purple flowers, more than an inch across. It grows about a foot high and blooms all summer. *Phlox stellaria*, starry phlox, is a similar free-blooming summer kind of about the same height that bears white flowers.\n\nThe bachelor's-button (*Ranunculus speciosus*, fl. pl.), grows a foot high, and displays large golden-yellow flowers, invariably double. *Silene Virginica* (fire pink) is one of the finest catchflies, and produces brilliant scarlet flowers, an inch or more in diameter, from June to August. It grows about a foot high. Statices are among the best and most desirable herbaceous plants. Their flowers are of long duration, and when cut and dried are effective for winter decoration, as they retain their color in a dried state. One of the best is *Statica latifolia*. It bears in June immense panicles of bright blue flowers, often two feet across. Its native place is Southern Russia, and it only grows about a foot high. The familiar name of this type of plant is wound-wort. Meadow-rue or *Thalictrum*, bearing large panicles of flowers in summer, presents one of its best effects in *speciosum*, a fine large yellow-flowered sort\nwith handsome leaves which grow three to five feet high. Other meadow-rues bear purple flowers, and still others white. One of these white species comes from Japan. The spiderwort (Tradescantia Virginica) is a native plant, valuable chiefly for its continuous production during summer of its peculiar deep violet-blue flowers. Trollius Europeus, European globe-flower, is a pretty plant with large lemon-colored buttercup-like flowers, one to one and a half inches across, on long stems. It grows two feet high, blooms from June to August, and comes from Arctic Europe. There is a large double orange-colored species from Japan that blooms in the spring. Tunica saxifraga, rock Tunica, is a delicate spreading dwarf plant that bears all summer a profusion of small rosy-white flowers. It grows six to ten inches high and is excellent as a carpet plant. Viola cornuta, horned violet, commences to bloom in spring and lasts all summer. It is not unlike the common violet, and its prevailing tints are blue, purple, white, and yellow. It is a valuable violet for this special quality of continuous flowering.\n\nAmong the flowers that bloom still later in summer and even in early fall, I will mention the beautiful Achilleas, or y", "num_tokens": 2048} {"category": "olmocr_science_pdfs-home_and_hobbies", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-home_and_hobbies/part-00-00000.npy", "text": " of these may be currently vacant and available for rent.\n\n4.10 Impact to Personal Property Only\n\nThere are two units in Building One that may consist of personal property only. For these units, the owner of the personal property would receive assistance in searching for replacement sites to store the personal property and for the cost to move the personal property.\n5.0 RELOCATION RESOURCES\n\nAs presently planned, the Transbay Program would require that affected residential occupants and business owners relocate to replacement sites in 2010. Appendix C contains an example of an initial contact letter that the TJPA has sent to affected property owners and tenants.\n\nThe TJPA plans to assist each eligible residential occupant and business to successfully relocate in the community. Much effort has been made to identify sites in the South of Market (SOMA) area that would accommodate the displaced households and businesses. Additionally, the TJPA has investigated the potential that other public projects might compete for available replacement sites during the course of the Transbay Program. In discussions with Caltrans, the City and County of San Francisco, and the San Francisco Redevelopment Agency, the TJPA has learned that no planned public projects would significantly compete for resources in the SOMA area during the planned development of the Transbay Program.\n\n5.1 Residential Condominiums/Lofts\n\nResearch conducted in fall of 2009 identified ten live/work lofts available for sale and twelve live/work lofts available for lease in the SOMA area. The information provided in tables 5.1 and 5.2 is representative of the properties that might be available at the time that the six affected residential households in Building One are searching for comparable replacement housing. It is anticipated that several more similar properties will become available for sale or lease during the course of the Transbay Program and that the residential households will have the opportunity to consider available sites over a six- to twelve-month period. Table 5.1 lists residential live/work lofts recently available for sale in the SOMA area. Table 5.2 lists properties in the same category recently available for lease.\n\nTable 5.1, Demonstration of Available Residential Live/Work Lofts for Sale in SOMA Area\n\n
NamePage
Philo of Alexandria111
Philolaus97
Philopæmen160
Phocion178
Pilpay61
Findar47
Plato117
Plautus62
Pliny the Elder159
Pliny the Younger105
Plutarch158
Poinsof609
Polo, Marco372
Polybius181
Pombal566
Pousain333
Praxiteles55
Priestley619
Prometheus7
Ptolemy148
Ptolemy I.,179
Pulcheria, St.222
Pythagoras98
Pytheas142
Rabelais318
Racine441
Raleigh278
Ramus491
Raphael336
Regulus186
Rembrandt322
Richard Coeur de Lion273
Richardson462
Richelieu567
Riquet412
Ritter625
Robertson524
Römer598
Rojas431
Roland, Mme.453
Romulus11
\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
LocationUnit #Square FootageBeds/ BathsYear BuiltList PriceList Date
38 Lusk Street11,3591/2.01995$1,499,9997/1/2009
650 Delancey Street4221,4301/2.01996$1,049,0008/5/2009
650 Delancey Street2131,4002/2.01996$1,298,0005/21/2009
650 Delancey Street4141,7692/2.01996$1,225,0006/22/2009
461 2nd Street6561,6501/2.01992$1,195,0008/13/2009
1 Bluxome Street4061,7622/2.02003$1,249,9997/8/2009
601 4th Street3P1,7922/2.01991$1,498,0009/21/2009
601 4th Street3191,9652/2.01991$1,349,0009/11/2009
712 Bryant Street52,0972/2.52001$1,039,0009/17/2009
300 Beale Street4061,6862/2.01937$1,375,0009/2/2009
\nTable 5.2, Demonstration of Available Residential Live/Work Lofts for Lease in SOMA Area\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
LocationSquare FootageBeds/BathsYear BuiltAsking Rent/Month
1233 Howard Street1,4001/2.02000$3,300
695 5th Street1,7602/3.01999$3,495
767 Bryant Street1,9502/2.52002$3,500
650 Delancey Street1,5502+/2.01996$4,000
200 Brannan Street1,5222/2.02004$4,000
200 Brannan Street1,9612+/2.02004$5,300
300 Beale Street1,7002+/2.01937$5,400
461 Second Street1,8002/2.0N/A$5,800
300 Beale Street1,6862+/2.01937$6,500
1233 Howard Street3,3001+/2.02000$5,500
461 2nd Street1,9002/2.0Unknown$5,800
1233 Howard Street2,0021/2.02000$4,080", "num_tokens": 2048} {"category": "olmocr_science_pdfs-home_and_hobbies", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-home_and_hobbies/part-00-00000.npy", "text": " still farther inland. In other words, I analyzed the forces in action.\nand aided and abetted their inclinations. If grasses and twigs had caught on a small projection of the shore and a little vegetation had sprung up and soil thus collected, I lengthened and broadened the projection and planted it with clumps of grasses, such as flag, bamboo, pampas grass, and the hardy *Eulalia Japonica*. Back of these, on more solid ground, I planted a willow and an alder, with some irises, and tender cannas and caladiums or elephant ears. I was careful, moreover, to be conservative even in this natural treatment of my shores. There was no frequent repetition of the promontory and bay idea. At only a few points was any change made in the original line of the shore. Such changes as I did make, however, were forcible and marked and carefully adjusted in the exact direction and angle that the stream would be likely to take when it worked its fantastic way before a rapid current or overflow. Grasses and shrubs suited to low grounds, of the kinds I have named, were scattered in small groups about the points running back, sometimes quite a distance, up the\nbank. In the midst of these groups grew some higher shrubs or small trees like the birch, for the sake of emphasizing the effect and giving variety of sky-line. I do not wish to be needlessly technical, but if you could see the two great Lombardy poplars, forty feet high, bordering and making a frame, as it were, for my place, you would understand what I mean by emphasis. Great towers of green, these poplars seem to be mounting guard over my small domain, and their long shadows at sundown reach far across the stream and the grass of the meadow beyond. I am not going to apologize for my poplars. They were and are grand, and I am proud of them. Tree-experts may warn me that they are liable to borers and bark-lice, and that they lose their leaves early in the season, and in many ways invite the use of the axe. It may be so. I have enjoyed them, however, for a number of years and they are entirely healthy yet, although surely a score of years in age. It will be a long time, therefore, before an axe under my direction will touch them. Even the tendency to lose their leaves early in the season would not induce me to use the axe, for their lofty spire-like forms dominate everything and establish that variety of sky-line so much to be desired by the lawn-planter. Let the limbs be bare and the trunk scarred and seamed with borers, the noble outline is there, and shrubs and small trees can be made to screen the lower and generally uglier portions. It should be remembered also, that an occasional pruning, as the years go on, tends greatly to renew and perpetuate the poplar's health and vigor.\nBut, the reader will say, where is the lily-pond? You have told us about your lawn with its stream and old mill-pond, but where are your lilies? Well, I answer, do not be in a hurry. I assure you if I had not selected and arranged my lawn and water properties as I did, the lilies I might have set out would have been of much less account than they are. Remember the lilies on my former place. In truth, without some of the characteristics of my present lawn the proper setting for the clustering water-lily gems would have been absent. And think what a setting they had now—great poplars, drooping willows, alders, waving grasses, purple irises, purple marsh-mallows growing on promontories of a brimming river backed by a sloping bank of rich greensward. In the coves, chiefly, of my stream and pond were set my lily-jewels. The bottom of the water\nwas deepened and a foot of soil, not in spots but along the entire front, was replaced by the richest mixture I could make of mould and manure. Pond-lilies are great feeders, and I intended to give them the best chance I could to look their prettiest. For the *Nelumbiums* or lotuses considerable clay is needed. Fortunately, my soil had naturally plenty of clay. I used, moreover, other kinds of water-plants besides lilies, and some of them, as well as certain lilies, were tender, coming as they do originally from the tropics.\n\nThe tender ones I bought anew every year, at a moderate expense, from one of the few growers in America. I may have expended during some years one hundred and even one hundred and fifty dollars, but it was a small sum compared with the amount necessary to keep up a greenhouse fitted with suitable tanks. Water-lilies and aquatic plants winter badly in cellars. They are easily excited to grow by a little excess of light and heat, and as easily checked and injured by an excess of cold. Except a few kinds, such as the wonderful blue and purple water-lilies of Zanzibar, which I bought yearly, I have therefore managed to content myself with a number of perfectly hardy aquatics, including some of the best water-lilies and lotuses. Doubtless the biggest, grandest, and most effective of these was the lotus *Nelumbium speciosum*. This plant is the greatest feeder of all, and will thrive prodigiously in the richest, rankest mud that can be concocted. It will, in fact, crowd out most other plants, and should be thinned every year so as to appear in clusters and not in monotonous masses extending from shore to shore. This *Nelum-\nNelumbium\" is widely known in India and Japan as the lotus, and is there considered sacred and is freely copied in their decorative designs. It is also probably the lotus of ancient Egypt.\n\nPicture for yourself a pumpkin-leaf erected three or four feet high on a stem, and great buds that look, for all the world, like gigantic tea-rose buds, and you will have a fair idea of the general appearance of the lotus. Of course, the leaves of the lotus are more finely veined and smoother and more shining of texture, and the flowers grander and richer in tint than the tea-rose bud; but, for all that, the pumpkin-leaf and tea-rose bud comparison is a suggestive one. The botanical name of the lotus, *Nelumbium*, signifying a rose or spray of a watering-pot, is very descriptive of the curious seed-pod. There is a fine *Nelumbium*, native to\nAmerica, a yellow lotus with excellent foliage, which is found in one or two places in New Jersey, but which chiefly abounds in Florida and other Southern and Western States. The leaves of this species are quite as noteworthy as those of the familiar *Nelumbium speciosum*. These are often two feet in diameter.\n\nThe lotus leaves and flowers are decorative and striking in effect, but the true water-lilies, the *Nymphaea*, are, after all, I am inclined to say, the best ornamental water-plants. Following out my Lombardy poplar idea of emphasis, I\nused many lotuses in front of my brook and pond promontories. But in all my experiments with aquatic plants I never chanced on any pond-effects quite equal to that of my coves of *Nymphaea* in midsummer. Fancy a quiet, mirror-like surface of water, studded with clustering masses of lily-pads, enfolding half-open flowers, nestling yet buoyant. Every one is familiar with scenes in woodland nooks resembling this in kind. The remarkable difference on my place was that my trees and shrubs, grasses and flowers, came to the water's edge and were mirrored there, and that in front and about them floated and were reflected lily-pads of excellent size and coloring. The flowers also of these great tropical lilies were especially large and richly hued, some species being pure white, others red, and still others purple and deep blue. I have had these water-lilies and other water-plants growing on my place now for several years, but I confess that, even at the present time, familiar as they are to me, when I look at one of these blue lilies on an early summer morning I am impressed with the scene as an absolute revelation of beauty, a landscape feature positively unique.\n\nI am not going, on this occasion, to give an account of all the aquatic plants I grow. I have the tender *Pontederia crassipes*, a floating plant with curious orchid-like purple flowers, water-poppies, pitcher-plants, cat-tails, and a score of other species and varieties that I shall not enumerate. All these kinds of water-plants doubtless add greatly to the attractions of decorative waters, but, after all, it is the lotuses and lilies, or lilies and lotuses, not giving the precedence to either, that every one ought to want. Having\nonce had them, any decorative piece of water without them will seem almost uninteresting, no matter what other water-plants are employed.\n\nLet me say here, before I forget, that spaces of clear surface among water-plants, with undisturbed reflections, are particularly necessary to secure the best effects. The whole surface of the pond should be no more covered up with water-lilies than fine rocks should be completely masked with climbing vines.\n\nTo explain to the reader which are the tender and which are the hardy kinds would be a lengthy task, and I must refer him to the nearest nurseryman who grows aquatics. Better not", "num_tokens": 2048} {"category": "olmocr_science_pdfs-home_and_hobbies", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-home_and_hobbies/part-00-00000.npy", "text": " punctuated by these white birches. Nature uses the birches most delightfully in many a woodland winter scene, and our lawn is, we find, greatly improved by the free use of this artistic resource. But our attention is specially claimed by the specimens occupying the middle-ground. Here, too, we find a fair admixture of evergreen trees advisable. The evergreens disposed near the foreground are of medium, and in some cases of dwarf size, but always of interesting character, well fitted to make single features on the lawn.\nFirst and foremost is the Nordmann's silver fir, broad and massive, with shining silvery leaves,—in every way a hardy, slow-growing evergreen, of noble outline and special symmetry. Though grand and impressive, it needs intelligent pruning, and for successful transplanting, a fibrous condition of roots that can be secured by frequent removal in the nursery and systematic root-pruning. The same remark applies to all silver firs, which are in many senses the finest evergreens for producing winter pictures. There is the silver fir (*Abies amabilis*), lovely, both by name and nature, and the still finer (*Abies nobilis*), of unsurpassed blue tints. Hudson's Bay silver fir, of the same genus, is one of the darkest, hardiest, and most dwarfed species, specially fitted for the outskirts of groups, or for dotting here and there in isolated positions. Parsons' silver fir (*Abies Parsonsii*) has wonderful leaves, always curling upward, long, and of a delicate bluish-green color. The so-called dwarf silver fir (*Abies compacta*), an intermediate form between Hudson's Bay silver fir and Nordmann's fir, is especially noteworthy for hardiness, symmetry, and compact elegance. It should be one of the most popular of evergreens.\n\nThen, among the larger forms, we note the Grecian silver fir, very fine and lighter-colored. The weeping silver fir is the type, perhaps, of the statuesque in the family. Intelligently pruned, it develops into a solid weeping column of dark green. But here, as with all silver firs, if we are to get a compact growth below, the leading or top shoot must be pinched off from time to time during May or June. If possible or, rather, if not incongruous with the\nORIENTAL SPRUCE.\n(PICEA ORIENTALIS.)\nremaining part of the composition, it is well to place each of these species, firs, spruces, and the like, by themselves. Spruces we used to make up the mass of the background; but then there are spruces not only adapted for this purpose, but suitable for general planting in the middle-ground, and even for the most distinguished positions as objects of special interest in the foreground. Any one looking at the dense round or hemispherical shape of the Gregory spruce, and at the taller though slow-growing columnar form of the weeping spruce, would scarcely believe that this and the common Norway spruce are so closely akin. The blue tint of the Colorado spruce (Picea pungens) shows capacity for varying color that is most invaluable for winter effect. Alcock's spruce, from Japan, has also lovely variegations of yellow, silver, and green, and the tiger-tail spruce (Picea polita), from the same country, is rigid, yellow, and characteristic, and hardy and fine in many ways.\n\nThe Oriental spruce is perhaps the most desirable of all the spruces for both winter and summer landscape. Its shining dense masses are remarkably hardy and striking. It belongs rather in the background, as somewhat larger in habit than the others. Nor should we neglect the beautiful American white spruce, hardy, dense, and richly colored. It grows more slowly than the common Norway spruce, but eventually attains sufficient size to associate it more or less with that evergreen. The most noteworthy spruces, however, for winter-landscape effects are the weeping hemlock spruce and the weeping Norway spruce. The former is a charming evergreen, graceful and picturesque, with soft curving lines. Its light color and delicate tendrils give it\nan almost feminine appearance. The rugged, strong outline of the weeping Norway spruce, on the other hand, offers the greatest contrast to the habit of this hemlock, and delights the eye, especially in winter. The long branches of this slow-growing evergreen droop and hug the stem in most persistent fashion, now and then curling up eccentric shoots, which afford convenient lodgment for the snow. Both these striking evergreens should occupy the middle-ground of the picture in specially effective positions. A cedar of Lebanon, where a cedar of Lebanon can be coaxed to grow, is also a prize on the winter lawn.\n\nAmong the pines we find, perhaps, our most lovely and refined winter colors, but to establish pines upon the lawn is not always easy. Unless transplanted frequently in the nursery, pines develop naked roots, hard to remove with safety. The spruces and arbor vitae act better, but silver firs and pines are, to say the least, troublesome in this respect. The most lovely pine, to me, in winter is the\nBhotan pine (Pinus excelsa). It presents such picturesque open masses, and the leaves are so long and delicately green that the eye dwells on its varied outlines with exceeding pleasure.\n\nThen there is the Swiss stone pine (P. cembra), bluish-green, and extremely striking in winter, as well as extremely hardy. Among the dwarf pines such forms are noteworthy as the dark mughus and mughus compacta, the finely-tinted light-blue dwarf white pine, and the more yellow and rounder dwarf Scotch. Mughus uncinata is also striking, and, although dwarf, quite erect in habit. The large-growing pines massed in the background among the other large spruces are peculiarly varied in color and form, and often very beautiful, laden with snow and ice. Dark, massive Austrian pines should have their forms displayed somewhat more prominently than the rest, while the delicate-hued and more sparsely-branched white pines should be grouped directly with the Norway spruces, for the sake of artistic breadth combined with interesting variety.\nHemlocks also mass well in the background, their lighter colors and more graceful forms relieving the sombre character of the adjoining spruces.\n\nIn the outskirts of groups and rather in the foreground, we should find choice plants, such as the rare and exquisite golden Japanese or sun-ray pine (*Pinus Massoniana variegata*), with its rich and permanent yellow, so striking in fall and winter, and the slow-growing and extremely rare Japan parasol pine (*Sciadopitys verticillata*), a highly prized and strange-looking tree, with dark green foliage growing in distinct whorls. Nor should we forget to plant in such positions the lovely Japanese *retinosporas*, of delicate, fern-like appearance and unexcelled hardiness of habit.\n\nSuch plants form the intermediate shadings or half tones of the picture, presenting as they do in winter the most delightful tints of brown, green, and gold. It should be remembered that the winter coloring of evergreens is very different from that of summer. In many cases, like that of\nthe arbor vitae, these winter tints are dull and uninviting, for which reason, in spite of the custom to the contrary, I do not much fancy their employment for winter effects. But the *retinosporas* are, if anything, more lovely in winter than in summer, especially in their mingling of brown and gold. The really golden *retinosporas* have a pure yellow color in winter, very delightful from the fresh contrast it affords to the neutral tints of the surrounding scenery.\n\nOf like character is the bronze gold of *biota elegans* *tissima aurea*, a Chinese golden arbor vitae. There is a kinship in the appearance of *retinosporas* and arbor vitae, in which the former have greatly the advantage in varied beauty; but we will do well to employ the golden bronze of the *elegans* *tissima* arbor vitae whenever we can give it a little favoring protection from cold, which is fortunately not needed for the *retinosporas*. There are exquisite bluish-tinted junipers, also, erect and torch-like in shape, the graceful lines and forms of which can be ill spared from any part of the lawn planted for winter effect.\n\nThe regular evergreen shrubs cannot, of course, be neglected. *Rhododendron* foliage is broad, massive, and shining, one of the most effective features in winter on any lawn. The mahonias, though very different in many ways, have the same general effect, and should be employed, though always with the knowledge that they will frequently winter kill, that is, become deciduous, for they rarely die from cold. Masses of these mahonias shine and glisten in winter, and are altogether so fine that we must have them, notwithstanding their weakness. The tree box is also rich, solid, and very attractive during the cold\nMUGHO PINE.\n\n(PINUS MUGHUS.)\nmonths, although not always very hardy in the Northern States. It is an old plant, but merits, especially planted singly, the very highest consideration.\n\n_Cotoneaster or Crataegus pyracantha_, the evergreen thorn, whether used for hedges or as a single plant, is always peculiarly beautiful in winter. Its low, dense masses of red bronze leaves, small and regularly formed, present a diversity of contour of the most pleasing character. Sometimes a large", "num_tokens": 2048} {"category": "olmocr_science_pdfs-home_and_hobbies", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-home_and_hobbies/part-00-00000.npy", "text": " 4.1, Summary of Residential and Business Occupants of Building One\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
ResidentialBusinessOther
Owner-Occupants2
Tenant-Occupants44
Personal Property Only2
Investment Property Owners8
\n\nThe residential and business occupants of Building One may be eligible for relocation assistance. The owners of investment properties in Building One also may be eligible to receive assistance.\n\nThe TJPA anticipates that any eligible occupants will be provided with relocation assistance so that they could relocate to replacement sites in 2010. Table 4.2 describes the current occupants of Building One and their anticipated relocation needs.\n4.1 Impact to Residential Occupants\n\nThere are six households that would be required to relocate if the TJPA were successful in acquiring the properties in Building One. Of the six households, two are owner-occupants and four are tenant-occupants. Two of the tenant-occupants are also business occupants.\n\n4.2 Overcrowded Conditions\n\nThe TJPA has determined the following Housing Occupancy Standards pursuant to the San Francisco Housing Authority’s Housing Standards for Section 8 Tenant Based Assistance:\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
Housing Occupancy Standards
Studio
One-Bedroom
Two-Bedroom
Three-Bedroom
Four-Bedroom
\n\nIt is anticipated that overcrowding conditions do not exist in Building One; however, any households that need larger replacement housing units in order to meet these standards will be provided the necessary additional assistance to secure replacement housing that better accommodates the size of their households.\n\n4.3 Accessibility Needs\n\nIt is assumed that most occupants of Building One do not have physical restrictions that require alternative access. If an occupant reveals that any special needs exist, the TJPA would provide any\nadditional advisory assistance that is needed to identify and secure housing that is fully accessible to the occupant.\n\n4.4 Other Special Needs\n\nNo other special needs are anticipated to relocate the occupants of Building One; however, the TJPA is committed to making the relocation process as smooth as possible and will provide additional assistance as needed.\n\n4.5 Language\n\nIt is assumed that most occupants of Building One speak English as their primary language; however, if language assistance is necessary, the TJPA will make every reasonable attempt to communicate with those households in the household’s native language, to provide all informational material in the native language, and to provide the necessary additional advisory assistance to secure replacement housing.\n\n4.6 Current Occupancy and Affordability\n\nThe Medium Family Income in San Francisco is $96,800. Federal regulations state that if a tenant-occupied household qualifies as “low-income” by the U.S. Department of Housing and Urban Development’s Annual Survey of Income Limits for the Public Housing and Section 8 Program, then replacement housing costs should not exceed 30% of the household’s monthly gross income. It is assumed that none of the tenant-occupants of Building One are low-income. If it is determined that a tenant-occupied household is in fact low-income pursuant to federal regulations, the TJPA may need to apply the Last Resort Housing Program so that rent for a comparable replacement site will not exceed 30% of the household’s gross monthly income.\n\n4.7 Transportation\n\nIt is assumed that most occupants of Building One use public transportation; therefore, replacement housing should also be near public transportation.\n\n4.8 Employment\n\nMany places of employment are within walking distance of Building One or easily accessible via public transportation. Every attempt will be made to identify replacement housing that will provide similar access to places of employment.\n\n4.9 Impact to Business Occupants\n\nThere are eight investment property owners in Building One that do not occupy the building, also referred to as “absentee landlords.” There are four business occupants of Building One that would be required to relocate if the TJPA were successful in acquiring the private properties in Building One.\n\nThe businesses are assumed to consist of general office space. Some of these may be currently vacant and available for rent.\n\n4.10 Impact to Personal Property Only\n\nThere are two units in Building One that may consist of personal property only. For these units, the owner of the personal property would receive assistance in searching for replacement sites to store the personal property and for the cost to move the personal property.\n5.0 RELOCATION RESOURCES\n\nAs presently planned, the Transbay Program would require that affected residential occupants and business owners relocate to replacement sites in 2010. Appendix C contains an example of an initial contact letter that the TJPA has sent to affected property owners and tenants.\n\nThe TJPA plans to assist each eligible residential occupant and business to successfully relocate in the community. Much effort has been made to identify sites in the South of Market (SOMA) area that would accommodate the displaced households and businesses. Additionally, the TJPA has investigated the potential that other public projects might compete for available replacement sites during the course of the Transbay Program. In discussions with Caltrans, the City and County of San Francisco, and the San Francisco Redevelopment Agency, the TJPA has learned that no planned public projects would significantly compete for resources in the SOMA area during the planned development of the Transbay Program.\n\n5.1 Residential Condominiums/Lofts\n\nResearch conducted in fall of 2009 identified ten live/work lofts available for sale and twelve live/work lofts available for lease in the SOMA area. The information provided in tables 5.1 and 5.2 is representative of the properties that might be available at the time that the six affected residential households in Building One are searching for comparable replacement housing. It is anticipated that several more similar properties will become available for sale or lease during the course of the Transbay Program and that the residential households will have the opportunity to consider available sites over a six- to twelve-month period. Table 5.1 lists residential live/work lofts recently available for sale in the SOMA area. Table 5.2 lists properties in the same category recently available for lease.\n\nTable 5.1, Demonstration of Available Residential Live/Work Lofts for Sale in SOMA Area\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
LocationUnit #Square FootageBeds/ BathsYear BuiltList PriceList Date
38 Lusk Street11,3591/2.01995$1,499,9997/1/2009
650 Delancey Street4221,4301/2.01996$1,049,0008/5/2009
650 Delancey Street2131,4002/2.01996$1,298,0005/21/2009
650 Delancey Street4141,7692/2.01996$1,225,0006/22/2009
461 2nd Street6561,6501/2.01992$1,195,0008/13/2009
1 Bluxome Street4061,7622/2.02003$1,249,9997/8/2009
601 4th Street3P1,7922/2.0199", "num_tokens": 2048} {"category": "olmocr_science_pdfs-home_and_hobbies", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-home_and_hobbies/part-00-00000.npy", "text": ", we can say it has more effective, shining evergreen foliage, but on the other hand, the hardy azalea endures more steadfastly winter and summer vicissitudes.\n\nSuch plants as these should be employed in favored nooks, on a hillside, if possible, where the eye may look down upon their charms. The employment of both of these attractive plants is rapidly becoming an actual necessity to the well-ordered lawn.\n\nNor does the fact that the rhododendron occasionally suffers from sudden changes, both in summer and winter, seriously check its growing popularity. Many, in fact, are\nalready learning that a little protection by planting in the lee of other trees, and a practical consideration of the pedigree of the variety used, considered with regard to the more or less hardy nature of its ancestors, will secure general results of the most satisfactory character. _Azalea nudiflora_ is a good example of this genuine American plant of the azalea type.\n\nIn this connection, however, I must not fail to offer meed tribute to the excellent beauty of the common laurel of the American woods, _Kalmia latifolia_. While its flowers, perhaps, are not as splendid in form and mass as those of the rhododendron, nor as varied and subtle in coloring as those of the hardy azalea, the curious, quaint construction of its flower-cup is yet quite as distinguished in its way for its exquisite daintiness and charming symmetry. It surpasses the rhododendron, moreover, in hardiness, and possesses the attraction of comparatively large evergreen leaves, which the deciduous hardy azalea does not possess. When grown in the nursery, i.e., transplanted now and then, the _Kalmia latifolia_ may be readily moved at any age, but to tear old plants from their native haunts in woodland nooks and plant them successfully on the lawn, has been repeatedly proved to be a difficult operation.\n\nAs we give our attention more closely to deciduous shrubs, we are impressed by the number of specially noteworthy genera that distinguish themselves in June either by their foliage or their flowers. What a lovely group, for instance, are the various June-blooming spireas.\n\nThere were, as we remember, fine spring-flowering spireas like _S. Thunbergii_, but how lovely, also, are June-\nflowing *S. Reevesiana*, *fl. pl.*, and *S. trilobata*, a similar but still more attractive species. The branches of these spireas hang during June in the most graceful curves studded to their very tips with lovely rosettes of pure white flowers.\n\nThen there is *S. prunifolia* with upright habit, neat, bright green leaves and numerous white flowers coming in late May oftener than in June. Red-flowering *S. Fortunei* and *Fortunei marmophylla* and *havigata* are also June-flowering, while among other kinds blooming in the same month may be noted the choice and delicate little spireas *bella* and *aristifolia* and the more common-looking and larger-growing *chamaedrifolia*, *nepalensis*, and *ulmifolia*.\n\nOne of the most striking of all spireas on the lawn, however, is the June-flowering *S. opulifolia aurea*. The leaves of *S. opulifolia aurea* are broader and larger than those of any other spirea, which is generally a small-leaved race, and the colors, especially at this season, are delicate shades of gold. Indeed so effective is this golden color that had the white flowers studding the entire stem been less lovely I would have classed it among the golden- and purple-leaved plants. If we add to these qualities exceptional vigor and hardiness, it will be readily seen that *S. opulifolia aurea* is a shrub peculiarly adapted to lawn planting. Indeed the general habit and the flowers render the common type *opulifolia* almost as fine as the golden variety.\n\nBut I must not linger on these interesting spireas too long, while there are other interesting June-flowering shrubs waiting to claim our attention. Every well-planted lawn must have some Philadelphuses or mock oranges, with\nJune flowers like veritable orange blossoms. *Philadelphus coronarius* is the most sweet-scented and in other ways the best variety, although *grandijlorus, lurus, speciosus*, etc., are larger and more easily propagated. There is a fine dwarf golden Philadelphus that does not receive the attention it should.\n\nA well-known June-flowering genus of shrub is the *Deutzia*, not *Deutzia gracilis* only, but *Deutzia crenata, fl. pl.*, a Japan plant, strong-growing, and bearing masses of attractive pinkish-white flowers, and also the smaller *D. scabra, fl. pl.* There are also *Deutzias Fortunae, crenata and scabra*, both interesting, hardy, rapid-growing shrubs. The vigorous bright-green bush honeysuckles are also attractive in June, with the red and white flowers of *Tartarica*, the white of excellent drooping *fragrantissima*, and the yellow and yellowish-red of *xylostemon, fliusa*, and *Ledebouri*.\n\nThe sweet-scented shrubs *Calycanthus floridus* and *C. levigatus* likewise offer the spicy fragrance of their\nchocolate-brown buds and broad rich foliage. These are choice shrubs and can scarcely be used too much in the salient points of shrub groups.\n\n*Exochorda grandiflora* should have been mentioned perhaps among the spireas, where it properly belongs, but it is so different in every way, so specially suited to distinct single positions, that I have ventured to consider it apart from the other varieties. Few shrubs are more difficult to propagate than this spirea, hence its reputation for rarity and choice-ness. But aside from these qualities the leaves and flowers of this plant are very attractive, the leaves for their light green, slightly bluish tint, and the flowers for their number and pure white color, wonderfully bright and effective in mass. The general habit of the plant is broad, bushy, and vigorous. In this climate the\nflowers appear in late May and early June. The pretty, small-leaved *Kerria Japonica* also bears attractive yellow flowers in June and makes an interesting shrub on the outskirts of shrub plantations.\n\nAmong the large shrubs specially suited to the centre of a mass of deciduous foliage are the *Weigelas* or *Diervillas*. They are rapid-growing, bearing abundant leaves and flowers, and are generally popular. They form one of our staple plants for the construction of any group of shrubs. Some of the *Weigelas* bear light-red and others striped flowers. *Weigelia rosea* is justly considered one of the best kinds.\n\nAmong the most attractive of June-flowing shrubs is *Tamarix Africana*. There are one or two other kinds that bloom during this month, but none better than *T. Africana*. The characteristic feathery habit and great vigor of the tamarisks renders *Africana* specially valuable in a group of shrubs where variety of form and beauty of flower are desired. There are several late-blooming tamarisks, such as *Gallica* and *Indica*, which makes this June-flowing *Africana* particularly valuable. Pruning is absolutely essential to keep the lanky growth of tamarisks in subjection.\n\nWe come now to a very noteworthy genus among June-flowing shrubs. The snowball or viburnum genus is a\nlarge one, but only half a dozen hardy varieties are thoroughly well suited to lawn planting. The common snowball (*Viburnum opulus*) is, perhaps, one of the most generally useful on the lawn, because it is fine, singly or in mass. It grows vigorously, and is broad, and bears numerous balls of snow-white blossoms. The only serious fault it has is an openness of foliage or nakedness of stem that makes it less effective when planted singly than it would otherwise be.\n\nAs a June-flowering viburnum, however, there is nothing like the Japan snowball (*Viburnum plicatum*), already spoken of in the highest terms elsewhere. Dark green and glossy leaves, crinkled and compact, especially if well pruned, and large white balls of flowers, persistently retained on the plant for weeks, are, as we have also seen, its distinguishing characteristics. Good judges have commended this plant as in many senses the best of deciduous shrubs.\n\nAnother June-flowering shrub of considerable merit should not be neglected. *Lycium barbarum*, etc., is an old plant, but very pretty, especially when trailing over rock-\nwork. The flowers are small and of a purple or violet color. Many of these fine old hardy plants are in danger of being forgotten in the rush for new and rare varieties.\n\nA special glory of June, a glory entirely unequalled in its way at any other time of the year, is found in the several genera of hardy climbing vines. Many of them are, of course, familiar to the reader, and probably none more so than the honeysuckles. They make a numerous family of varieties, with thick, glossy green leaves and abundant sweet-scented flowers. The Belgian, or striped monthly, red and white, is perhaps at once best known and most generally popular", "num_tokens": 2048} {"category": "olmocr_science_pdfs-home_and_hobbies", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-home_and_hobbies/part-00-00000.npy", "text": ", standard honeysuckles, and philadelphuses.\n\nThe lily-pond is of irregular form, bordered with rocks and planted at intervals with lotuses, water-lilies, Cyperus papyrus, and the quaint and charming floating pontederia.\n\nThus we have made the round of the park and come to the Casino Restaurant, which is worth visiting in early or late May of all seasons, for the sake of the wonderful wistaria effect crowning the Pergola, a summer shelter overlooking the Mall at this point. The purple clusters of flowers lie in piles among the tossing tendrils and leaves until against the blue sky beyond the effect is that of a purple and green cloud resting on the arbor.\nBefore concluding this brief itinerary of the park, however, I must take the reader on horseback, as it were, to two or three bits of charming scenery on the bridle-paths, which can be seen nowhere else as well. The first is on a curve around the southwest side of the lower green near Seventh Avenue and 59th Street. There is a great rock here, and an ever widening meadow, with a distant view over another meadow and plenty of trees and shrubs round about. The sweet influences of spring at this point are not to be surpassed anywhere else in the park.\n\nAnother charmingly secluded spot may be found by passing up the bridle-path to the stone bridge at 77th Street and Eighth Avenue to a pool of water with a loop road leading to the water’s brink and a great sheer rock on the opposite shore. The shrubs on the bank at this point are attractive, in both spring and autumn, including spireas, dogwoods, *Lonicera fragrantissima*, weigelas, privets, and masses of honeysuckles over the small rocks on the edge of the water, and *Ampelopsis tricuspidata* and Virginia creepers on the stone bridge and sheer rock. I would advise the reader to mount a horse and ride through the park, if only for the opportunity of sauntering down this loop bridle-path at 77th Street and Eighth Avenue.\n\nThere are, besides, choice bits of landscape along the bridle-paths between 81st Street and 86th Street and up by 97th Street among the pin-oaks. But in no other way can the great North Meadow be seen so well as on horseback from the bridle-path that runs round its entire extent. On the east side the bridle-path is completely embowered\nwith trees, and from these you look out with peculiar enjoyment over the expanse of the North Meadow.\n\nThere are five and one half miles of bridle-paths, and nine miles of drives, and thirty miles of foot-paths in Central Park. Altogether, there are eight hundred and fifty acres in Central Park, including the one hundred and fifty acres of reservoir.\n\nIt might doubtless be interesting to speak of many other individual features of marked interest in Central Park. I do not, however, think it expedient in such a general description and illustration of general principles as this to be drawn into such emphasis of details. Indeed, the manifest superiority of the design as a whole is its general adequacy to the effect sought, which was simple park scenery in the midst of a city.\n\nThis seems a proper place to remark that another great attraction possessed by Central Park is the essential unity of its design. Here is a park laid out on paper according to definite artistic conceptions and then executed substantially as conceived in the beginning.\n\nBefore closing my remarks on Central Park I desire to direct especial attention to the popular-amusement feature insisted upon in its arrangement. The chief and most important office of Central Park is not to furnish agreeable driving territory for the beau monde, the millionaires, and the lovers of horseflesh. It is not a scheme to please and attract the fashionable, but it is a playground for the young people, a pleasant open-air breathing space for the mothers and fathers who desire to go into the country and cannot get there.\nAs a part of this scheme for the pleasure and well-being of the multitude there is music on the Mall twice a week, goat-carriages, donkeys, merry-go-rounds, summer-houses, grounds for croquet, lawn-tennis, base-ball, foot-ball, and lacrosse, and, above all, grounds everywhere for picnics in spring and early summer. Last year there were picnic permits issued to over seventy-five thousand children, whose wants were ministered to by park employés without charge.\n\nIn order to secure the greatest amount of pleasure from these games, the turf requires special and solicitous attention. It must be mown frequently, and manured yearly; and above all it must not be used when soft from rain, and liable to be torn up by the feet of visitors.\n\nBefore closing this chapter on city parks, I must say a few words about small city squares or greens. They are generally not large enough to consist of more than a few square yards or half a dozen acres. Usually they come on some irregularly shaped space situated at the junction of two or more streets. Properly they should be termed \"Greens,\" like the Bowling Green, at the foot of Broadway, New York City. The green effect of the grass should be made the chief and most important feature of their treatment.\n\nSome fence of a simple and inconspicuous character should surround the plot, and this fence should be masked and ornamented with shrubs and trees, but the interior should be simple open greensward, with a few bright bits of bedding, and trees enough for shade along the paths. The semi-artificial lines and masses of formal bedding are out of place in the strictly rural scenery of Central Park,\nbut in the city parks they look well amid the architectural lines of the surrounding buildings.\n\nEvery small city park should have a widening of the pathway towards the centre, and if possible an open plaza where the children may play and the visitor linger. Architectural adornments may properly be employed in small parks, so long as they do not seriously interfere with the open grass effect. There may be even busts or statues, but especially suitable are drinking fountains, and fountain basins, with great sprays of water.\n\nThe fountain basins may be effectively ornamented with lotuses, water-lilies, and other decorative water-plants. All such adornment of small city squares or greens tends to appropriately enliven and enrich the general appearance of a crowded city, where the effect of everything is artificial, and more or less formal or tedious.\n\nI should warn those who propose to plant these small city squares, that the surrounding conditions are not primarily favorable for the growth of plants. The air is apt to be hot, dry, and dust-laden, if not actually impure. Consequently the soil should be thoroughly enriched, and the most vigorous and hardy trees and shrubs employed. Evergreens seldom do well in large, crowded cities. It is better to plant certain hardy, deciduous trees and shrubs, such as the privet, weigelia, snowball, *Spirea opulifolia*, American thorn (*Crataegus Crus-galli*), philadelphus, American elm, honey-locust, American linden, Norway and sugar maples, and the Oriental plane trees.\n\nThe care of these small city squares is often difficult on account of the crowds that congregate or pass through, and\non account of the heat and dust, but it can be done by continual watering, cleaning, and cultivating. Canal Street Park, New York, is situated in perhaps the most difficult position in the city of which it is possible to conceive. The surrounding houses are tenements, produce stores, and the like, and the incessant traffic consists largely of trucks and carts, laden with coal, refuse, vegetables, and the roughest material. Dirt is ubiquitous, and the heat at times is great. And yet the grass is always green here, and the shrubs, trees, and bedding plants, always thriving. The park is only 195 feet long by 69 feet wide, but it occupies the entire attention of one gardener, and two police officers, either one of whom is on guard at night and during the day.\n\nIt is a pleasure to see the mothers with their children gather here on the settees throughout the long sultry summer nights, and realize that this unspeakable boon can be secured at such comparatively low cost. Every city should seek to adorn these small greens, to increase their number, and to enlarge their boundaries.\nCHAPTER XV.\n\nRAILWAY, CHURCHYARD, AND CEMETERY LAWN-PLANTING.\n\nA RAILWAY LAWN.\n\nAn encouraging sign of the times is the interest which has been manifested of late by our railroad officials in the appearance of the stations on their lines. Many of these buildings and surroundings, which were formerly eyesores, have been so beautified by the judicious expenditure of some thought and a little money, that they now lend an added charm to the landscape; and were they to be removed, they would be missed with regret.\n\nI had occasion lately to visit one of these recently improved stations. The natural surface of the ground rose rapidly in the rear of the building, and along the edge of the great rock mass, cut through just here by the railroad, gurgled a small, tumbling rill across the road, under a board or two. Except just about the station, where everything\nhad been thoroughly cleared away, bits of rock abounded, and these had been utilized in a picturesque manner. Immediately around the station ran a carriage road, with a convenient oval circuit for turning. On one end of this circuit, near the station, was a weeping beech, and the other extremity was occupied by a group of flowering shrubs, that, although too freshly planted to blossom that year", "num_tokens": 2048} {"category": "olmocr_science_pdfs-home_and_hobbies", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-home_and_hobbies/part-00-00000.npy", "text": " then, and an evergreen has never that cheerful enlivening aspect presented by the green of deciduous trees.\nWe propose to include no plants the foliage of which suffers from mere white frost, and even to include some the leaves of which will endure a severe freezing without injury to their beauty. There is doubtless a season in late August and early September, during which the lawn should be carefully supplied with such foliage and flowers as will yet flourish; but we have chosen a later period, which is sometimes deferred until the middle of October, and which is more neglected and needy.\n\nOne would think the maples would be valuable for their green in fall and so they unquestionably are. They are healthy, thrifty, and vigorous, but no variety very remarkable for its late green exists among them unless it be the little colchicum maple, properly called *Acer latum*. The foliage of this tree is pleasing and of curious outline. Delicate red stems support the leaves, and the general appearance is bright and cheerful. It is a choice, uncommon maple, to which I have already referred with respect, and should be more employed as a single specimen on the lawn.\n\nThe common catalpa (*C. syringafolia*), much spoken of nowadays for its enduring wood, and most valuable to the lawn planter for broad, shadowy foliage, retains its green color well in fall. There is also a dwarf form, *C. Bungeii*, sometimes misnamed *Kampferi*, rounded like a hemisphere, with very delicate autumnal greens. The *Aralia Japonica* is drooping and graceful and effective in its autumn green.\n\n*Chionanthus Virginica*, the white fringe, old, well-known, and choice, is not usually spoken of for its autum-\nnal beauty. The reputation of the exquisite lace-like flowers has doubtless eclipsed the glory of the foliage. It is large for a shrub, lustrous and oval in contour, and the leaves have a dark, rich green in fall.\n\nThe American persimmon is a noteworthy tree for its green in fall; but the Japanese persimmon, or kaki, shows a richer, glossier foliage, like orange leaves in color. Unfortunately, it is not hardy in the Middle and Northern States.\n\nFew shrubs are prettier in the fall than the evergreen thorn (Cotoneaster or Crataegus pyracantha). The small glossy dark-green leaves and orange-colored berries, all protected by masses of thorns, characterize the finest foreign Crataegus which is thoroughly healthy in America, as it is also attractive in very late fall and even winter.\n\nCercis Japonica, the Japan Judas tree, has heart-shaped leaves, glossy, tough, and retained late in fall. It is rare and choice, and decidedly attractive both for its flowers and leaves during at least five months of the year. In spring, early pink flowers wreath the stem, before the leaves put forth.\n\nThe best green-leaved spirea in fall is, perhaps, S. pruni-\nwhich assumes still richer colors as a late autumnal garb. *Spiraea crispi*folia, rare, and recently introduced from Japan, is a variety of *S. bullata*; a dwarf mass of rounded, curling foliage, it is well preserved in fall.\n\n*Spiraea laurifolia*, or *S. pentandra*, the laurel-leaved willow, preserves a shining green late in the season. The ornamental value of this tree is not sufficiently considered. It endures all exposures and soils, even close to the seashore, and is always clean and thrifty.\n\nThe elms are remarkably deficient in attraction during the fall, with one or two curious exceptions. The one specially notable is the weeping—so called slippery—elm, or it may be simply a variety of the American, which grows with great rapidity, and has a fine vigorous foliage. So rapid is this growth that grafts made in the spring will attain six or eight feet during the following summer. We see a specimen before us, while we are writing, where a large American elm has been stripped of its branches and grafted at numerous points with cions of this weeping elm. The effect produced after a few years has been most extraordinary. Long, pendent branches, clothed with luxuriant foliage, swing and wreathe themselves about against the sky like gigantic snakes. The most valuable quality of this choice tree lies in the fact that its foliage is frequently green until October, and always green weeks later than most other elms. There is one other elm which is rare—*Ulmus parrifolia*—that holds its green so late that it might be classed with oaks and beeches for this peculiarity. It is of moderate growth, and has rough, slightly curled foliage, grouped closely along the branches.\nSo far as we know, the lindens can only boast of two varieties that remain really green in fall, viz.: *Tilia dasy-styla* and *T. sulphurea*, golden-barked trees with bright green foliage. All other lindens fade soon, and become almost unsightly in early autumn, so that the green foliage of these varieties seem very curious to behold in October. The effect of the unusual season of such coloring is increased by the strong contrast afforded by a bright yellow bark and a singularly lustrous foliage.\n\nBut the noblest trees of bright green and other good qualities are the beeches and oaks, rich in color and picturesque in form, always affording grateful shade; other trees may possibly be as fine in some peculiar fashion, but\nnone can be more generally satisfactory. Not specially early in spring in putting forth leaves, they are most beautiful in June, and indeed throughout the summer. In\n\nautumnal landscapes, however, their late foliage, almost evergreen during mild winters, performs a valuable part, for the very reason that there is now so much less beauty among trees than earlier in the season. All kinds of beeches are fine in the fall. The cut-leaved, the purple, and the common American and European beeches are all most effective and green until winter; but the noblest of all is the celebrated weeping beech. Its great, gleaming masses of foliage assume all kinds of fantastic shapes, and reveal bowers and recesses until the leaves of almost every other\ntree have taken their departure.\n\nTo me the American beech *Fagus perruginea,* is no less beautiful than the European species and variety. The foliage is delicate in finish, and it lies in an arrangement of layers that is peculiarly attractive. The only other rival the beech really has in late fall, is the oak. Strong, sturdy, and picturesque, enduring and grand, it is admired by every one and planted by few. It transplants with difficulty and grows slowly; but when once established it is well worth the patience it has demanded. All oaks are fine in fall, and in many cases preserve their leaves fresh and green into November and later. Indeed, though we have no really evergreen oaks in the North, there are seasons when some oaks, notably the pyramidal, retain a few leaves all winter. The willow-leaved oak, as well as the pin oak, and the rare, large-leaved *Daimio* from Japan, among others, are very beautiful in fall, sometimes even in late November and December.\nDid space permit, we should like to dwell on the beauty in autumn of various privets, *Daphne cneorum* of tiny evergreen foliage, and certain of the *Elmagnus* species, notably the gray *E. Hortensis* and the robust *E. longipes*, with large leaves and red berries, as well as the beautiful fall climbers, evergreen honeysuckles, *Akebia*, Virginia silk, etc. All these should be planted with taste here and there about the lawn, supported by occasional masses of rhododendrons, laurels, mahonias, and other evergreen shrubs. Thus adorned, the lawn, in the fine air and lights of autumn and during bright days, may well tempt us to linger amid its yet beautiful foliage, where crimson and gold are mingled plentifully with green.\nCHAPTER VII.\n\nAUTUMNAL COLOR ON THE LAWN.\n\nThe supreme point of our enjoyment of lawn-planting is reached when we have compassed in our grounds the loveliest effects of color. Although this is a fact, I fancy we seldom consciously attempt to compass these color effects. A dress pattern is selected, the tints of every part of the room, both walls, furniture, and floor, are studied with the critical eye of genius, but when we come to the lawn, composition of any kind is seldom attempted, much less a harmonious disposition of color.\n\nIndeed, I believe, when any one does more than stand specimens about wherever they may happen to come, form is apt to receive first and almost exclusive attention. A pyramidal tree, a broad-spreading tree, a tall tree, a dwarf tree, secures a certain amount of attention for its proper disposition, but the foliage might be, to all intents and purposes, one shade of green for any consideration color re-\nceives in the special grouping and arrangement. Even Central Park, New York, the most notable landscape-gardening essay in America, has always impressed me as defective in studied color effects of foliage. This is doubtless caused in part by a want of sufficient variety in the large masses of the plants employed. Twenty-five years ago, when the Park was planted, there was likewise a much smaller variety of ornamental trees in the nurseries than there is at present.\n\nYet, notwithstanding this apparent neglect of color in lawn-planting of the present day,", "num_tokens": 2048} {"category": "olmocr_science_pdfs-home_and_hobbies", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-home_and_hobbies/part-00-00000.npy", "text": " of British Caribbean philately. You can find a detailed catalogue of available material at the BCPSG website,\n\nhttp://www.bcpsg.com\n\nYou can also ask about specific titles, or learn more about borrowing by mail from Librarian Dale Wade, P.O. Box 491, Hayesville, NC 28904. He can be reached by electronic mail at:\n\nrxfire@frontier.com\n\nBRITISH WEST INDIES STUDY CIRCLE PUBLICATIONS\n\nTHE LOCALLY OVERPRINTED SPECIAL DELIVERY STAMPS OF BAHAMAS, 1916–17\n\nby\n\nPeter Fernbank, FRPSL\n\nThis Study Paper examines the Special Delivery agreement made between Canada and Bahamas in 1916. National Archive sources in both Canada and the UK have been investigated to provide an in-depth review of the Canadian and Bahamas Post Office procedures for dealing with such mail. There has been some misunderstanding regarding the full validity of Canadian covers with a Bahamas Special Delivery stamp affixed, and a grading system is provided for assessing such covers. Further sections define the three settings of the overprint for each position in the sheet, and go on to examine in detail the major errors that exist on this issue. This work sheds much new light on the subject and reveals that in the past there have been a number of misconceptions regarding this issue.\n\nPrice:– £19.00 (approx US$30.00).\nBWISC Members’ Discount:– £3.00 ($4.50).\n\nThis book and others published by the BWISC can be ordered from:–\n\nDavid Druett, Pennymead Books, 1 Breerton St., Knaresborough, N. YORKS. HG5 8AZ. Tel:– 01423 865962 or Fax:– 01423 547057 or E-mail: Pennymead@aol.com. N.B. Postage and packing is extra. Orders will be dispatched with invoice and prompt payment is requested. Payment may be made by Sterling or US or Canadian dollar cheque or by PayPal. Payment may also be made in Euros in cash only. All books published by the BWISC are displayed on www.bwisc.org and on www.pennymead.com.\nFor decades we have had the great pleasure of working closely with our clients in the formation of many fine private and international exhibition standard collections. I will be pleased to place our expertise at your disposal.\n\n■ 30 Volumes in all price ranges, individually stocked!\n■ You may acquire exactly those items that you need!\n■ Receive on approval (references please) or per quotation!\n■ Scott or Stanley Gibbons numbers!\n■ Prompt, expert service!\n\nGeorge W. Holschauer\n\nCOLONIAL STAMP CO.\n\n5757 WILSHIRE BLVD., PH#8\nLOS ANGELES, CA 90036\nPh: (323) 933-9435\nFax (323) 939-9930\neMail: gwh225@aol.com\nVisit our Web Site: www.colonialstamps.com<|endoftext|>Conservation Subdivision Design: A Brief Overview\n\nby Randall Arendt, FRTPA, ASLA (Hon.)\n\nAn approach to laying out subdivisions so that a significant percentage of buildable uplands is permanently protected in such a manner as to create interconnected networks of conservation lands. The percentage of protected land varies according to project density, rising from 30-35% at density levels of three or more dwellings/acre, to 75-80% at four or more acres/dwelling.\n\nThis approach is distinct from earlier \"clustering\" and \"planned unit development\" (PUD) in terms of both the higher open space ratios and in terms of conscious design to forge community-wide networks of open space.\n\nThis is primarily a design approach for conserving existing natural and cultural resources, although a limited amount of active recreation is permissible (such as ballfields and neighborhood greens). Subdivisions where the majority of open space is taken up by a golf course do not meet this basic criterion.\n\nConservation subdivisions are generally \"density-neutral\", meaning that the overall number of dwellings built is not different from that done in conventional developments. Small density bonuses are sometimes granted in return for dedicating some or all of the conservation land for public access or use, for endowing permanent maintenance of the open space, or for providing workforce housing.\n\nConservation subdivisions are specifically designed around each site's most significant natural and cultural resources, with their open space networks being the first element to be \"green-lined\" in the design process. This open space includes all of the \"Primary Conservation Areas\" (inherently unbuildable wetlands, floodplains, and steep slopes), plus 30-80% of the remaining unconstrained land, depending upon zoning densities and infrastructure availability.\n\nThe site planning process begins with general mapping of the project site in its context of surrounding properties (up to 2000 feet away, typically mapped at 1\" = 400 feet). On this Location Map (compiled form existing published data) are shown vegetative cover, topography, soils, and floodplains. This initial map informs decisions regarding the design of the interconnected open space network.\n\nA more detailed, site-specific Existing Resources and Site Analysis Map is then created, identifying significant natural and cultural resource, such as productive cropland, wildlife habitat and travel corridors (meadows and forests, stream valleys), and significant trees, with size thresholds related to species: 4-6 inches for smaller species such as dogwood and redbud, 8-10 inches for medium species such as sassafras, cherry and water beech, 12-14 inches for slow growing hardwoods (oak, maple, ash), and 15-18 inches for fast growers (tulip poplar, sycamore, conifers). Historic or cultural resources such as farmhouses, barns, cellarholes, wells, stone walls, earthworks, trails/traces, and hedgerows are also identified, usually through GPS. (A photo essay illustrating such resources can be seen at http://www.terrain.org/articles/18/arendt.htm).\n\nA four-step process then ensues, Step One separating the site's resources into two categories. The first, Primary Conservation Areas (PCAs), are limited to inherently unbuildable wetlands, floodplains, and steep slopes (>25%). Secondary Conservation Areas are comprised of \"the best of the rest\". Because the PCAs would be off-limits to development in conventional developments in any event, they are not counted toward the minimum required open space percentages of conservation subdivisions. Therefore, 30-80% of the buildable land is usually designated as SCAs, depending on density (as noted above).\n\nStep Two consists of locating house sites in relation to the protected open space, to add livability, marketability, and value to the homes. The third step is to \"connect the dots\" with streets and trails. Step Four consists simply of drawing in the lot lines.\n\nThis process works best when guided by a landscape architect or physical planner, collaborating with a civil engineer. The creative skills of a landscape architect or physical planner are essential, balancing the technical training of engineers whose expertise lies principally in streets and drains.\nThe optimal design process begins with a site walk by the LA/planner and engineer, landowner, and developer, with the Existing Resources Site Analysis Map in hand, usually reproduced on an aerial photo at the working scale. The design is done in the field or immediately afterwards, on thin tracing paper so that the underlying resource information is visible to the designers, who typically work with pencil and eraser. (CAD technology is never used at this initial design stage, but is invaluable for later revisions.)\n\nThe resulting Sketch Plan is then shown to local officials, some of whom may have been invited to join the designers on their initial site walk. Officials who have not yet walked the property are strongly urged to do so during a subsequent site visit prior to voting on the Sketch Plan, whose merits (or lack thereof) will be come clear when examining the drawing while standing on the property and observing the terrain, landscape elements, cultural features, etc.\n\nAfter completing the above procedures, the time is right to prepare the highly detailed, expensive, Preliminary and Final Plans. Many municipalities inadvertently cripple their open space preservation efforts by skipping the critically-important Sketch Plan stage, and allowing (or requiring) applicants to submit highly detailed engineering documents at the so called \"Preliminary Plan\" stage. These cost so much to prepare that they lock applicants into whatever initial layout is prepared, usually with minimal previous consultation with staff or officials.\n\nThe above paragraphs summarize the key points relating to necessary improvements to most local subdivision ordinances.\n\nZoning ordinances work best when density is established directly (such as by designating density as three units per acre in sewered areas, or two acres per dwelling in unsewered areas) instead of indirectly (such as through minimum lot sizes, e.g. 12,000 sq. ft and 88,000 sq. ft). As long as density is regulated indirectly through lot size, subdivisions will consist of nothing more than houselots (of that size) and streets, with no open space.\n\nAfter separating the notions of lot size and density, treating them as independent variables, zoning works best when conservation design is designated as a by-right Permitted Use, making applications simple, straight-forward, and relatively easy. Conventional developments can be actively discouraged by re-classifying them as Conditional Uses. The condition to be met is a clear and compelling showing at a public hearing, convincing officials that dividing land into", "num_tokens": 2048} {"category": "olmocr_science_pdfs-home_and_hobbies", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-home_and_hobbies/part-00-00000.npy", "text": " trees. The main feature of the place\nmust evidently be the house, and therefore in devising prominent vistas and near or distant views we must take our stand at or not far from this point. Minor standpoints may of course be taken when some special effect is desired. Failure to contrive the landscape grouping from these established standpoints often weakens if it does not spoil lawn-planting, which is otherwise good and effective.\n\nThe curves of the walks or foot-paths are long and easy, reaching their destination in a natural and pleasing manner. All the junctions of paths and the main curves are planted with shrubbery in an irregular and informal manner. Furthermore, they are usually arranged with a view to suggesting the idea that the path is winding through single masses of flowers. It is not proposed in this plan to reserve any space for a vegetable garden, not only for want of room, but because it is notorious that vegetables thus grown are very expensive and troublesome. If exercise in gardening pursuits is desired, the same amount and a similar kind of work may be had in the culture of trees and shrubs as in that of vegetables with more generally satisfactory results. All necessary objects, not interesting in a picturesque way, such as drying-ground, entrance to the rear of buildings, tool-sheds, etc., should be shut out with deciduous shrubs. The front of these hedges or belts of shrubbery may be diversified by planting here and there occasional choice specimens.\n\nThe extreme end of the grounds may be also entered, if desired, by a path which should wind among shrubbery in somewhat obscure fashion, and come out suddenly on the lawn. The approach or entrance to the house is, in this case, somewhat formal and straight, for the sake of\nconvenience, which must at times overrule considerations of beauty. It is well planted with shrubbery, however, to relieve all stiffness and vary the straight line. This system also introduces the pleasant element of surprise, as the full effect of the lawn is only presented after the place has been fairly entered. Flowing, graceful lines, with one exception, are retained everywhere, especially in the vistas that extend off to the full depth of the lot. On the most extended side, the vista takes a slanting direction across a croquet-ground, reached by a winding path and fronted by a summer-house in the extreme corner. This simple, inexpensive rustic structure—shown in the lawn-planting study—looks out toward the house over the croquet-ground, down the most attractive vista of the place. About it should climb vines, honey-suckles, etc., and some flowering shrubs. The entire feature is finely crowned and perfected by associating with it a slender, drooping, cut-leaved birch, with tender gray or light-green foliage and gleaming white bark. It will thus form one of the corner posts, or prominent points that define the outline of the picture, and, at the same time, constitute a most interesting and picturesque termination for a walk. One such feature is almost enough for a small place. Architecture should be confined, as a rule, to the house structure, and the lawn devoted to plants. Even rockwork, except in peculiar spots, has hardly a place on any small lawn, for reasons that should be obvious. Whatever portion of the summer-house appears from among the vines and surrounding foliage is intended to show a rustic, graceful, and solid structure. Simple rustic seats may, of course, be erected in suitable positions, but should not be made architecturally prominent. As a rule, however, chairs\nmay be carried from the porch or veranda to any spot on so small a place. The planting on the walks directly fronting the summer-house should be made specially attractive by the employment of choice and dwarf trees and shrubs. The simple design of using a summer-house at all, has been to increase, within safe limits, the picturesque effect of the place, and to lend that portion of the scene a cozy, home-like aspect. Indeed, we have sought to give the entire place a similar natural appearance. Good lawn-planting should make it look, not as if it had been constructed in the ordinary sense of the term, but as if it had grown there, out of the special needs of the plants and of those expecting to enjoy them. Please note that we make most prominent the necessities of the plant. They must receive first attention, when the best effects will follow in due course. Landscape architects are, perhaps, liable to fall into the habit of regarding plants as they would bricks or stones. An edifice of landscape architecture cannot be erected exactly as one\nchooses. Plants have their freaks and peculiarities in different positions, which even practical experience can scarcely foresee.\n\nBeware of using on small places large-growing trees, and even on the outer boundary employ them sparsely. All such trees, like the Norway spruce or white pine, become in a few years, independent of their crowding mass, more or less unsightly for limited inclosures and necessarily close inspection. There should be an exact proportion between the size of a place and the eventual size—say in ten years—of all plants used for ornamenting it. For this reason, the rapid-growing, deciduous shrubs, with their wonderful variety of foliage and flowers and their moderate growth, are well adapted for small places. They not only attain moderate size, but can be duly restrained for many years by pruning. There are, also, many beautiful dwarf evergreen trees and shrubs well suited for lawn-planting on a small scale. Indeed, such plants may be kept, by pruning both root and branches intelligently, within a height of five feet for near a score of years.\n\nIt seems almost absurd to say that ornamental plants in their entire variety and special aptitudes for lawn-planting should be carefully studied by the lawn-planter. Nevertheless, many so-called experts seem to lose sight of the fact. With knowledge, however, and a cultivated taste, most delightful results can be obtained on a small lot by an outlay ranging from one hundred dollars to three hundred dollars, depending on the amount of choice plants used. Grading and fences are considerations governed by special conditions, and cannot, therefore, be taken into\na general and typical estimate. This hardly seems an extravagant sum to devote to the exterior adornment of a home that has probably cost at least $4,000 for the building, and $2,000 more for a simple and tasteful furnishing. The general impression is widely spread abroad that the accomplishment of artistic effects in lawn-planting on small places, if possible at all, must be expensive and elaborate. Perhaps the idea comes from the fact that our parks and grand show places afford almost the only instances of artistic lawn-planting, and they, of course, are expensive. The lawn-planting efforts, moreover, of the jobbing gardener or owner of the place, are generally crude and based on no settled principles of art. It is this, perhaps, that gains credence for the belief that landscape gardening, as a picturesque art, is not only expensive, but does not suit small places. People may not state such ideas definitely to themselves; but they clearly demonstrate, by practice, a conscious or unconscious belief in their truth.\n\nIt has been, therefore, our desire to enunciate a few simple and important considerations of an art too much neglected, and to exemplify them practically from a plan intended for execution in a simple and inexpensive manner. There are necessarily many features and details, not here treated, that may be introduced on small places with much effect and without transgressing any fundamental rules of lawn-planting. We desire, however, to utter, before concluding, yet another warning against attempting too much when once we assume the artistic standpoint. Care for the proper exhibition and health of the plants themselves must\nbe, after all, the prime consideration, in pursuance of which we cannot go far astray.\n\nAs I have already intimated, the rural adornment of the exterior of homes may rightfully demand and is receiving increased attention. It is improvement of taste in the same line, as that encouraged for the decoration of interiors, in that they both form important elements of home life. Unfortunately, many people have a way of regarding such work as requiring greater skill than is actually the case. It is really less difficult and expensive in proportion to the results obtained than most other forms of home art.\nCHAPTER XIV.\n\nCITY PARKS.\n\nO write of parks is to enter a field which is almost unlimited in extent. It has come now to the pass that every town and city of importance in Europe and America must have its park. It is the fashion. Whether the fashion is always well wrought out, is another thing. Unenlightened town authorities cannot always be depended on to employ competent talent, and to adopt a wise and comprehensive scheme of operations.\n\nYet, after all, parks are but larger door-yards or lawns,—or rather, in many cases, a series of them. The landscape-gardening lore applied to them is essentially the same as that employed in constructing the most modest home grounds. There is nothing really different in the general theory of the landscape gardening of parks from that of ordinary grounds. The apparent difference simply lies in the special application to some particular individual undertaking.\nIn actual practice, one park must, of course, be treated differently from other parks; but the lessons acquired by considering one piece of work of this kind, must always be helpful in carrying on other park-work.\n\nIn order, therefore, not to weary the reader with the enunciation of abstract principles, and detailing instructions that do not always really instruct, I am going to ask attention for a few moments to what I consider the best well advanced example of this kind of landscape gardening in America, namely, Central Park, New York City.\n\nIn considering Central Park, I beg leave to first introduce a few lines from the pen of Mr. Calvert V", "num_tokens": 2048} {"category": "olmocr_science_pdfs-industrial", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-industrial/part-00-00000.npy", "text": "DF stretch back years, and primarily concern a contract involving EDF’s prepayment for uranium.\n\nIn July 2017, administrators from KPMG were appointed by Paladin’s board in order to undertake financial and operational assessments to assess the future options (if any) for Paladin Energy and its subsidiaries.\n\nPaladin’s shares were delisted from the Toronto Stock Exchange in August 2017, and trading in Paladin shares on the Australian Stock Exchange was suspended in June 2017. The company was restructured and relisted on the Australian Securities Exchange in February 2018 (and Paladin’s Canadian share sub-register was transferred to its Australian register). However, just three months later, LHM was put into care-and-maintenance. As discussed in the following chapter, the company's future is bleak.\n\nChapter Four: The Need to Fund and Plan for Rehabilitation of the Kayelekera Mine\n\n4.1 The Broader Context of Mine Rehabilitation Issues in Africa\n\nRehabilitation refers to the steps taken to repair the environment from damage and includes processes of decommissioning as well as ecological restitution. In terms of the process of assessing an abandoned or inactive mine site for the purpose of rehabilitation, it is imperative to address issues pertaining to the age of the mine site, the level of environmental impact presented by the site, health issues and public safety, social issues, availability of government support and the commitment of the community to rehabilitation.\n\nRehabilitation of mines has been problematic in various jurisdictions in Africa. Many of the legacy issues have occurred as a result of poor regulatory frameworks. An international comparative assessment of mine closure conducted by the University of Witwatersrand (Wits) Centre for Sustainability in Mining and Industry indicated that, despite challenges, South Africa was further advanced than most countries in the region in relation to addressing both environmental and social impacts of mine closure. South Africa has incorporated regulations regarding the financial capacity of entities to engage in mining operations under the National Environmental Management Act which include the life cycle of a mine, rehabilitation at closure and rehabilitation of latent or residual impacts that might arise long after mining has stopped.\nTo some extent in South Africa, and certainly elsewhere in Africa, weak regulatory frameworks allow investors to avoid rehabilitation of once operational mines, and mining companies may have an incentive to avoid decommissioning and rehabilitation due to the significant costs involved – a financial challenge that may be exacerbated by the cessation of the revenue stream from mining. \n\nIn Malawi, civil society groups have long fought for a strengthening of mining regulations, including regulations pertaining to mine-site rehabilitation. Funding for mine rehabilitation should be set aside before mining commences to ensure that funds will be available even in a worst-case scenario such as the mining company going bankrupt. The Chamber of Mines of South Africa, in a 2007 report on mine-site rehabilitation, stated: “Rehabilitation is an expensive business, which can account for as much as 10% of mining costs in certain circumstances. As the majority of these costs are usually incurred after mine closure, or at least after a significant portion of mining has been completed, some form of guarantee is usually required by authorities to ensure that these costs are met. In addition, there is now a requirement to provide financial assurance that the costs of rehabilitation will be met in the case of early or unplanned closure.”\n\n4.2 Prospects for the Kayelekera Mine\n\nPaladin claims that it hopes to restart the Kayelekera mine at some unspecified future date but the likelihood of a restart is minimal and receding.\n\nPaladin states: “It is expected that the mining and milling operation will be quickly and effectively re-started when market conditions make it attractive to do so.” Such statements ignore obvious problems such as the time and expense involved in establishing a workforce to operate the mine. There are two further sets of problems, discussed below. Firstly, Paladin has been put into administration once already, and the company’s future prospects are bleak following the May 2018 decision to put LHM into care-and-maintenance. Secondly, the uranium market is in a protracted slump and expert opinion is increasingly leaning towards the view that the slump will persist well into the 2020s.\n\n4.3 Paladin’s Bleak Future\n\nPaladin’s two uranium mines in Africa are both in care-and-maintenance. Paladin also owns various ‘nonproducing assets’ in Australia, Canada and Niger. In 2016, Paladin sold a number of Australian uranium exploration projects to Uranium Africa for just A$2.5 million, including Oobagooma in Western Australia and the Angela/Pamela and Bigryli projects in the Northern Territory. Also in 2016, Paladin sold its 257.5 million shares in uranium exploration company Deep Yellow for A$2.6 million, with shares priced at one Australian cent per share.\n\nPaladin has tried but failed to sell other ‘nonproducing assets’ such as its 30% stake in the Manyingee uranium project in Western Australia. Development of Manyingee (and all other non-approved deposits) is prohibited under the policy of the current Western Australian government.\n\nLikewise, Paladin has a stake in two undeveloped uranium projects in Queensland – Mount Isa North Project and the Valhalla North Project – but the development of those mines is prohibited.\nunder the policy of the current Queensland government. In 2015, Paladin booked a A$323.6 million write-down on its exploration assets in Queensland.\\(^\\text{103}\\)\n\nPaladin’s share price went from one Australian cent in 2003 to A$10.80 in 2007, but fell more than 200-fold and traded at 4.7 cents before trading was suspended in June 2017.\\(^\\text{104}\\) (Trading resumed in February 2018 – the share price was 18 Australian cents as of 13 June 2018.) The company was delisted from the Toronto Stock Exchange in August 2017 due to its failure to meet the exchange’s requirements for continued listing.\\(^\\text{105}\\) Paladin’s losses totalled US$1.9 billion between 1994 and 2014.\\(^\\text{106}\\)\n\nThe company’s prospects appear to be very bleak. It is poorly placed to be sitting on dormant mines in Africa – and other nonproducing assets – for years to come in the hope of a uranium market revival.\n\n4.4 The Uranium Market\n\n\"It has never been a worse time for uranium miners.\" – Alexander Molyneux, CEO of Paladin Energy, October 2016.\\(^\\text{107}\\)\n\nPaladin has said that a price of about US$75 per pound of uranium oxide would be required for Kayelekera to become economically viable.\\(^\\text{108}\\) In Paladin’s words, the company would \"not contemplate any such an expansion until uranium prices reach at least US$75/lb and are sustainable at or above this level.\"\\(^\\text{109}\\)\n\nUS$75/lb is far higher than the prevailing prices as of 31 May 2018: US$22.73 spot price and US$29.00 long-term contract price.\\(^\\text{110}\\) The spot price hasn’t reached US$75 since early 2008 – the tail-end of a price bubble.\\(^\\text{111}\\) The long-term price hasn’t reached US$75 since September 2008 – also the tail-end of a price bubble.\\(^\\text{112}\\)\n\nPaladin also said that the availability of grid power supply would be necessary to restart Kayelekera, to replace the existing diesel generators which are expensive to run.\\(^\\text{113}\\)\n\nEven if the uranium price did rebound and the mining resumed, Kayelekera would operate for only 3–5 years according to a 2014 Paladin document\\(^\\text{114}\\) – it isn’t a large uranium deposit.\n\nOf course, it is possible that uranium prices could rise such that Kayelekera could be restarted and operate profitably. However the likelihood of that scenario eventuating in the foreseeable future is remote. Numerous nuclear and uranium industry insiders, along with uranium market analysts, anticipate depressed prices for many years ahead. For example:\n\n- Then Paladin Energy chief executive John Borshoff said in 2013 that the uranium industry \"is definitely in crisis ... and is showing all the symptoms of a mid-term paralysis\".\\(^\\text{115}\\)\n- Former World Nuclear Association executive Steve Kidd said in May 2014 that \"the case made by the uranium bulls is in reality full of holes\" and he predicted \"a long period of relatively low prices, in which uranium producers will find it hard to make a living\".\\(^\\text{116}\\)\n- An October 2015 report in Nuclear Engineering International noted that \"there may not be much upward pressure on market prices until the next decade\" as \"excess supply is expected to persist.\"\\(^\\text{117}\\)\n- Nick Carter from Ux Consulting said in April 2016 that the spot uranium price could stay in the low $30s/lb \"for quite some time\" because supply is expected to exceed demand by 25–30\nmillion pounds U3O8 each year from 2016 to 2019, and he does not anticipate a supply deficit in the market until \"the late 2020s\".118\n\n- The Wall Street Journal reported in September 201", "num_tokens": 2048} {"category": "olmocr_science_pdfs-industrial", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-industrial/part-00-00000.npy", "text": ". It is shown in the examples of the patent in suit that the heat treated granules have a level of fines, measured by the ball mill test, which is from about 5 times to about 25 times lower than that of the starting compacted granules, depending on the heat treatment time. The appellant argued in the grounds of appeal that the value of 4.9% obtained by the ball mill test for the starting granules equated to an unacceptable value of above 15% fines after pneumatic transport. Although the level of fines of the heat treated granules after pneumatic transport is not given in the examples, it is plausible in view of the considerable reduction of the fines level obtained by the ball mill test that the level of fines after pneumatic transport has been reduced to an acceptable level.\n\nAt the oral proceedings the respondent expressed doubts that the technical problem was solved by the claimed process. He argued that the value of 4.9% obtained in\nthe ball mill test was meaningless since the amount of fines (<200 µm) of the starting compacted granules had not been measured. This argument is not convincing in view of the explanation on page 3 (lines 47 to 55) of the patent in suit as to how the ball mill friability was determined. As the sample of granules was sieved to remove oversize (>1200 µm) and undersize (<200 µm) before introduction into the ball mill, the percentage of fines formed during milling for 5 minutes can be determined by simple sieving. Knowledge of the amount of fines <200 µm before the test is not necessary since the fines were removed from the product before its introduction into the ball mill.\n\nThe respondent objected for the first time at the oral proceedings that the fine level above 15% after pneumatic transport was not stated in the patent in suit, thus implicitly questioning its correctness. However he provided no evidence that this value was incorrect. It is true that the patent in suit does not contain any value about the level of fines after pneumatic transport. However, European patent specification EP-B-0 471 049 which is from the same patentee as the patent in suit and has the same filing and priority dates, also concerns the treatment of compacted sodium silicate granules with the view to reducing their attrition loss during pneumatic transport. This patent specification, which was known to the respondent as he confirmed at the oral proceedings, discloses in Table II both the fine level obtained by the ball mill test and the fine level after pneumatic transport. According to Table II and Example 2, the starting compacted sodium silicate granules were obtained from Crosfield Chemicals Eisden Netherlands. They had a particle size similar to the\nclaimed one and a water content falling within the claimed range. The level of fines determined by the ball mill test was 0.8% below 125 µm and the level of fines after pneumatic transport was 11% below 180 µm. In the patent in suit, the compacted sodium silicate granules used as the starting product in the examples also come from Crosfield Chemicals Eisden Netherlands and the ball mill test gives a level of fines below 200 µm of 4.9%. In view of the level of fines disclosed in EP-B-0 471 049 for both the ball mill test and the pneumatic transport, the board considers it plausible that the value of 4.9% fines < 200 µm in the ball mill test of the patent in suit equated to a level of fines of above 15% during pneumatic transport. Therefore, in the absence of evidence to the contrary, the board sees no reason not to accept the appellant's arguments already presented in the grounds of appeal and not contested by the respondent until the oral proceedings.\n\nThe respondent's line of arguments that an improvement of the attrition resistance was not obtained with all kinds of compacted sodium silicate falling within the definition of claim 1, in particular with those compacted sodium silicate granules whose manufacture included the optional heat treatment before granulation disclosed in D4, cannot be accepted by the board for the following reasons. The respondent's affirmation that with these compacted granules the problem of attrition during pneumatic transport does not arise and thus no improvement of the attrition can be achieved, is not supported by any evidence, although the burden of proof rests on the respondent in this respect. Taking into account that the heat treatment before granulation disclosed in D4 is not performed in an agitated bed, that it is applied to a sheet or flakes,\nie to a product which is very different from the granulated product, and that the heated product is then crushed in a mill, it is not credible, in the absence of evidence, that this heat treatment would have the same effect on attrition as the claimed heat treatment and that the problem of attrition loss does not exist with those starting compacted granules. Concerning the starting granules used in the examples of the patent in suit, the board sees no reason not to accept the respondent's arguments that the compacted sodium silicate granules from Crosfield Chemicals of Eijsden Netherlands were obtained by compacting the feedstock between rollers since this is in agreement with the disclosure of the patent in suit, page 2, second paragraph, and with claim 1. As pointed out by the respondent at the oral proceedings, it appears that the properties of the starting compacted granules depend on certain parameters such as the compaction pressure, the thickness of the sheet or the water content of the spray-dried powder. However, it cannot be deduced therefrom that a reduction of the attrition loss would not be obtained with all kinds of compacted granules falling within the definition given in claim 1. The respondent has provided no evidence in support of his affirmation that the claimed heat treatment would not lead to an improvement of the attrition resistance for all kinds of compacted granules prepared as stated in claim 1, although the burden of proof lies on him. In the absence of such evidence and considering, on the other hand, that the examples of the patent in suit show a reduction of attrition loss resulting from the claimed heat treatment, the board cannot conclude that the technical problem is not solved over the whole breadth of claim 1.\nFor the preceding reasons the board considers it credible, in the absence of evidence to the contrary, that the technical problem has actually been solved by the claimed process.\n\n5. The respondent's arguments that the teaching of D4 would have rendered the claimed solution obvious to the skilled person (see point VI above) are not convincing. The board observes that neither D4 nor D5 deals with the problem of attrition of the compacted granules prepared by the process disclosed therein, let alone with the attrition loss during pneumatic transport. These documents also do not disclose a heat treatment of the compacted granules. In the process of production of compacted alkali silicates according to D4, the compacted sheet is aged for 5 to 15 minutes before the granulation step. During this aging step the compacted material, either in the form of whole sheets or of flakes, can be subjected to heating and/ or cooling. During the aging step the compacted material is for example heated to a temperature of 65°C to 200°C for 3-8 minutes and then cooled to below 21°C in 1 to 10 minutes. Then the compacted material is granulated by crushing in various types of mills and the resulting granules are screened (see claims 1 and 6; column 1, lines 44 to 57; column 3, lines 19 to 39). The appellant's argument that the skilled person would have contemplated performing the heat treatment before instead of after the granulation step because D4 taught that this heat treatment resulted in improved properties of the granules cannot be accepted since D4 does not disclose an improvement of properties due to the said heat treatment. According to D4 the advantage obtained by heating the sheet or flakes after compaction is that the time needed for aging before\ngranulation is reduced: see column 3, lines 62 to 64. This effect which is in no way related to the attrition properties cannot suggest to the skilled person that performing a heat treatment of the compacted granules, ie a heat treatment after instead of before granulation, would have improved the attrition resistance during pneumatic transport. D5 which mentions no heat treatment and does not deal with the problem of attrition of the compacted granules likewise cannot point towards the claimed solution.\n\n6. In the process for producing sodium polysilicate disclosed in D2, the spray-dried hollow microspheres are fractured and pulverized in the milling apparatus (9) in order to increase their bulk density and the pulverized particles are then passed into the rotary dryer (10) which serves to reduce the surface irregularities of the fractured particles and to form a product having continuously even surfaces. The temperature of the fractured particles in the rotary drum is preferably in the range of from 70 to 140°C. According to D2, at a temperature of about 70°C or higher the particles become somewhat plastic in nature. This characteristic is preferable in obtaining the desired reduction of the surface irregularities of the particles, ie obtaining a product having continuously even surfaces. It is further disclosed in Example 1 that the tumbling action of the rotary dryer has the effect of rounding off the sharp edges of the fractured particles so that the particles have continuously even surfaces (see claim 1, column 4, lines 45 to 70; column 7, lines 33 to 39; Figure 3). The heat", "num_tokens": 2048} {"category": "olmocr_science_pdfs-industrial", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-industrial/part-00-00000.npy", "text": " concrete be evaluated to determine ASR potential and an effective mitigation. EM 1110-2-2000, provides recommendations for evaluating and mitigating ASR in concrete mixtures. Aggregate evaluations may not be\n\nSECTION 03 37 23 Page 23\npractical for projects requiring small quantities of concrete (less than 200 cubic meters 250 cubic yards).\n\nSection 32 13 14.13 CONCRETE PAVING FOR AIRFIELDS AND OTHER HEAVY DUTY PAVEMENTS, paragraph 2.3.1.2 Alkali-Silica Reactivity, provides a specification method for the Contractor to evaluate and mitigate ASR in concrete mixtures. The expansion limits specified in Section 32 13 14.13 are requirements for pavements and exterior slab construction. For structural concrete applications the measured expansion shall be less than 0.10 percent. It may not be economical or practical to specify different test limit requirements for use on the same project. In which case the lower limit required by the application should be used.\n\nThe designer may use the specification method in Section 32 13 14.13 by incorporating the relevant paragraphs into this specification, or may use the following requirements (retain either the 0.10 or the 0.08 percent expansion limits as appropriate). included in the set of brackets highlighted thus \"[ ]\".\n\n**************************************************************************\n\n2.2.4.1 Composition\n\n[Fine aggregate shall consist of natural sand, manufactured sand, or a combination of natural and manufactured sands. Coarse aggregate shall consist of [gravel], [crushed gravel], [crushed stone], [air-cooled blast-furnace slag], or a combination thereof.] \"[Fine and coarse aggregates proposed for use in concrete shall be tested and evaluated for alkali-aggregate reactivity in accordance with ASTM C1260. The fine and coarse aggregates shall be evaluated separately and in combination, which matches the Contractor's proposed mix design proportioning. All results of the separate and combination testing shall have a measured expansion less than 0.10 (0.08) percent at 16 days after casting. Should the test data indicate an expansion of 0.10 (0.08) percent or greater, the aggregate(s) shall be rejected or additional testing using ASTM C1260 and ASTM C1567 shall be performed. The additional testing using ASTM C1260 and ASTM C1567 shall be performed using the low alkali portland cement in combination with ground granulated blast furnace (GGBF) slag, or Class F fly ash. GGBF slag shall be used in the range of 40 to 50 percent of the total cementitious material by mass. Class F fly ash shall be used in the range of 25 to 40 percent of the total cementitious material by mass.]\n\n2.2.4.2 Quality\n\n**************************************************************************\n\nNOTE: The tests selected should be those which are applicable to the concrete to be used in the project. These tests may include those listed below in addition to others not listed. See EM 1110-2-2000 for schedule of tests.\n\nOnly a limited number of laboratories are now running ASTM C123/C123M due to the toxic chemicals.\nrequired. Recommend that ASTM C295/C295M/C295M be specified.\n\nA list of properties and test values are unique to each project and should be taken from the concrete materials DM. Delete the quality tests not required in the DM.\n\nThe petrographic examination shall be used to identify deleterious substances in aggregates. Deleterious substances shall be listed individually with respective limits.\n\n**************************************************************************\n\nAggregates delivered to the mixer shall meet the following requirements:\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PROPERTYFINE AGGREGATECOARSE AGGREGATETESTS
Specific Gravity[_____][_____]ASTM C127
ASTM C128
Absorption[_____][_____]ASTM C127
ASTM C128
Flat and Elongate[_____]25 percent max.ASTM D4791
Durability Factor using Procedure A[_____][_____]COE CRD-C 114
ASTM C666/C666M
Clay Lumps and Friable Particles[_____][_____]ASTM C142/C142M
Material Finer than 75 µm No. 200 Sieve[_____][_____]ASTM C117
Liquid Limit and Plastic Limit on material passing the 75 µm No. 200 sieve sizeLL 30 max.,[_____]ASTM D4318
PI 10 max.
Organic ImpuritiesNot Darker than No. 3, Not less than 95 percent[_____]ASTM C40/C40M
ASTM C87/C87M
L.A. Abrasion[_____][_____]ASTM C131/C131M
ASTM C535
Soft Particles[_____][_____]COE CRD-C 130
\n### TEST LIMITS\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PROPERTYFINE AGGREGATECOARSE AGGREGATETESTS
Petrographic ExaminationList unwanted deleterious materials and their limits[_____]ASTM C295/C295M
Percent coarse aggregate with 2 or more fractured faces[_____]20 percent min.[_____]
Chert, less than 2.40 specific gravity[_____][_____]ASTM C123/C123M or ASTM C295/C295M
[Coal and Lignite, less than 2.00 specific gravity][_____][_____]ASTM C123/C123M or ASTM C295/C295M
\n\n#### 2.2.4.3 Grading\n\n**NOTE:** See DM for appropriate fine aggregate options.\n\n---\n\n**a.** Fine Aggregate - The grading of the fine aggregate as delivered to the mixer for the RCC shall be such that the individual percent retained on any sieve shall not vary more than 3 percent from the percent retained on that sieve in a fixed grading selected by the Contractor after the first 30 days of concrete placement. The minimum percent retained on each of the 2.36 mm No. 8 through 75 µm No. 200 sieve sizes shall be 5 percent. In addition to the grading limits, the fine aggregate, as delivered to the mixer, shall have a fineness modulus of not less than 2.10 nor more than 2.75. The grading of the fine aggregate shall also be controlled so that the fineness moduli for at least four of five consecutive test samples of the fine aggregate as delivered to the mixer shall not vary more than 0.10 from the fineness modulus of the fixed grading selected by the Contractor, and approved. The fineness modulus shall be determined in accordance with COE CRD-C 104. At the option of the Contractor, fine aggregate may be separated into two or more sizes or classifications, but the uniformity of the grading of the separate sizes shall be controlled so that they may be", "num_tokens": 2048} {"category": "olmocr_science_pdfs-industrial", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-industrial/part-00-00000.npy", "text": " Jackson and Williams 1979, Mohlin 1989, Corson and Lee 1990).\n\nThe concept with combined rejects and second stage main line refining that was performed with LC refiners...\nin the early Bauer RMP installations, was also applied in HC refiner lines supplied by Sprout Waldron (Jones 1968, Ulander 1985, Fjerdingen et al. 1997). The main line consisted of two or three refiners in series and the screen rejects were introduced before the second refining stage, Figure 16. This process concept however is no longer in widespread use.\n\nFor printing paper, the most common rejects treatment today is single stage HC refining. Other approaches include two stage HC refining (Viljakainen et al. 1997, Amiri et al. 2016, Sandberg et al. 2017a) and a combination of HC and LC refining. The combination of HC and LC refining of rejects has been shown to improve pulp properties and efficiency (tensile index – specific energy) (Lansford 1979, Sandberg et al. 2017a). Viljakainen et al. (1997) evaluated LC-HC refining on rejects, but found no positive effects of the combined LC and HC refining. However, the applied specific energy in that LC refiner was low compared to the specific energy reported by Sandberg et al. (2017a).\n\nHC-LC refining of rejects was also applied in some groundwood mills (e.g. Witherell 1968, Ferritsius and Ferritsius 1997).\n\nAs mentioned above, LC refining of rejects was common in the early RMP lines. Nowadays, this is rare and for printing paper, the TMP mill in Skogn, Norway, is the only mill in operation, to our knowledge, that utilises LC refiners for rejects refining (Imppola et al. 2013). However, in the Skogn mill, LC refining is carried out on mixed main line pulp and rejects. In Braviken, the same concept has been introduced recently, but the screen accepts are further fractionated in hydrocyclones with the rejects being refined in HC refiners.\n\nIn contrast to the established idea of mechanical pulping processes containing rejects separation and refining, Ferritsius et al. (2014) showed, based on thorough pulp quality comparisons of a large number of TMP lines, that the same pulp quality can be reached after single stage high intensity main line refining as final pulp from a TMP line with two stage SD refining, screening and rejects refining. Sandberg et al. (2017b) produced paper on a high-speed paper machine with a high efficiency TMP process without any fractionation. The produced paper performed even better in printing than the normal newsprint produced with a conventional SD TMP process.\n\n**Post refining**\n\nPost refining of groundwood pulp with pump through refiners was introduced during the 1960’s, mainly as a final adjustment of paper quality. An applied specific energy of 40 kWh/t gave a reduction in shives content of 50 % and increased burst and surface smoothness by 10–20 % (Richardson 1969, Kurdin 1974). Post refining was also a low-cost alternative to increase groundwood production (Hoholik 1958). It was also used to upgrade a newsprint furnish to higher quality grades (Brandal and Hauan 1970). Kilpper and Baumgartner (1977) showed in pilot scale that it was better to only post refine the longest fibres.\n\nIn some mills, news grade pulp is upgraded to lightweight coated (LWC) and super calandered (SC) quality by HC post-refining and peroxide bleaching (e.g. Asplund et al. 2009).\n\n**Process design approaches**\n\nSome process concepts can be distinguished from the most common process design shown in Figure 2. We have tried to group these designs according to, in our judgement, an intention or approach in the choice of process configuration. This is our subjective classification, and another grouping might of course be possible.\n\n**Main line approach**\n\nOne idea is that the most economical process with good fibre development is attained by doing as much of the fibre development as possible in the main line refining and only having a low reject rate with LC refining on the reject. Such a process, with three CD82 HC refiners in series, was in operation for several years in the Port Hawkesbury Mill, Canada, Figure 17, (Mokvist et al. 2005). Nowadays, the mill has a more advanced two stage HC reject refining\nFractionation approach\n\nMuch research has been made on concepts where the refining is separated into a primary refining, after which the pulp is fractionated into a coarser fraction sent to further refining and a finer fraction that is fed directly to dewatering. Such a process concept was first suggested for refiner processes by Luhde (1966). However, it was used even earlier in groundwood production where a coarse groundwood pulp was produced, coarse-screened and fractionated using a vibrating screen, Figure 19. The screen rejects (roughly 50% of the bull screen accepts) were refined in three DD refiners (Hoholik 1958). The refined rejects were combined with the vibrating screen accepts and fed to the fine screens. The fine screen rejects were fed back to the vibrating screen feed.\n\nThe refining process is strongly heterogenic (Reyier Österling 2015), and the thought has been that it ought to be more energy efficient to do limited initial refining and separate the poorly developed fibres for additional refining (Gavelin 1966, St. Laurent et al. 1993, Corson et al. 1995). One major problem with this idea is how to achieve the fibre fractionation with high efficiency. Screens have a low ability to separate fibres with regard to fibrillation and bonding ability but can to some extent separate fibres according to coarseness (Ämmälä 2001). Hydrocyclones have higher separation efficiency, but they suffer from the large disadvantage that very low consistency is needed to achieve good fractionation and thereby much larger disc filter capacity is required. (Karnis 1982, Mohlin 1989, Sandberg et al. 1997, Kure et al. 1999, Wakelin et al. 1999, Sandberg et al. 2001, Ouellet et al. 2003).\n\nOne extreme example of this approach is the Noss Advanced Mechanical Pulping Process (NAMP), Figure 20, which was developed to maximize fractionation efficiency and optimize the refining conditions for different fibre fractions (Shagaev and Bergström 2005). The concept utilizes LC refining on the intermediate hydrocyclone fraction (enriched in transition wood fibres) which can withstand a high load in LC refining, whereas late wood fibres (third stage hydrocyclone rejects) and screen rejects are refined at HC. The process has been evaluated in mill scale, (Sandberg and Shagaev 2011) but is not in continuous operation.\n\nDefibration/fibrillation approach\n\nAnother approach is the idea of performing defibration and fibrillation in separate machines using different conditions, as mentioned in the “Main line refining” section above. This concept was proposed by Neill and Beath (1963). Based on similar ideas, Valmet developed the Thermopulp process (Höglund et al. 1997) and later, Andritz developed the ATMP process, Figure 4, in cooperation with Norske Skog (Sabourin et al. 2003, Hill et al. 2009). The Thermopulp concept was difficult to run due to low disc gap in the second stage refiner operating at 7–8 bar pressure (authors experience from the Braviken mill) and there are unfortunately no reports, so far, from the only mill installation of a full ATMP process. However, the concept of separating the defibration and fibre development seems to be a good way to further reduce the specific refining energy. More mill experiences are however needed in this area.\nSystem simplification approach\n\nReducing process complexity has, in some cases, represented a driving force for system development, motivated by reduced capital cost and easier process control (e.g. Ulander 1985). Some TMP and CTMP lines were built with the process configuration outlined in Figure 21. (Jussila et al. 1999). It is a simplified process with low capital cost since there is no separate rejects screening or rejects latency chest. Even though this process is compact, it is not easy to have an on-line pulp quality control of the two HC refiners.\n\nThe TMP process utilized in Skogn, Figure 18, is also an example of a design that simplifies the process. Sandberg et al. (2018a) have shown that it is preferable to utilize high intensity refining, such as DD or RTS, for this process concept. A process incorporating single stage HC refining and LC refining of primary stage pulp and screen rejects, Figure 22, reduces system complexity and refining energy as well as improves process control. Such a process was evaluated by Strand et al. (1993) and by Sandberg et al. (2018a), the latter involved single stage HC", "num_tokens": 2048} {"category": "olmocr_science_pdfs-industrial", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-industrial/part-00-00000.npy", "text": ", 06.28.11)\n\nSection R109.1.5.1 EIFS Inspections Required. (R109.1.6.1 through P3002.2.3. were added by Ordinance 15-031, 05.26.15) A special inspection by the manufacturer's representative or other qualified 3rd party inspector is required for all EIFS installations. Inspections are required at the rough and final stages of installation. Reports must be submitted to the Building Division for approval prior to issuing an occupancy permit or certificate of completion.\n\nSection R109.1.6.1 Failure to Schedule Final Inspection. If a contractor and/or applicant fails to schedule a final inspection within 12 months of receiving a building permit, or within 30 days of job completion whichever is less, the contractor is subject to fines of up to $1000 and revocation of contractor's registration. (Ordinance 15-031, 05.26.16)\n\nSection R112 Appeals Board. Delete the section in its entirety.\n\nTable R301.2(1) Climatic and Geographic Design Criteria.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
CriteriaValue
Roof Snow Load30 pounds per square foot
Wind Speed90 miles per hour
Seismic Condition by ZoneB
Subject to Damage from WeatheringSevere
Frost Line Depth42 inches
TermiteModerate to Heavy
Winter Design Temperature(-4 degrees)
Ice BarrierRequired
Flood HazardChapter 33 of Bolingbrook Municipal Code
Air Freezing Index1700
Mean Annual Temp50 degrees
\n\nSection R305.2 Basement Ceiling Height. The minimum height measured from the surface of the basement floor to the lowest part of the floor joists above shall be (8'8\") eight feet eight inches. The minimum height measured from the surface of the basement floor to the bottom of the lowest beam, girder or structural support shall be (7'8\") seven feet eight inches. Exception: House designs where it is structurally infeasible as determined by the Building Commissioner, and/or locations where groundwater and soil conditions pose a significant risk of basement flooding, as determined by the Village of Bolingbrook.\n\nSection R308.4 (5.1) Glazing, Hazardous Locations. Glazing must be safety or tempered glass or approved equivalent if any portion is located within 42 inches of the plumbing fixtures and areas identified in section R308.4 (5).\n\nSection R309.2.1 Garage Separation. Attached garages shall be separated from the dwelling and attic areas by not less than 5/8 inch Type X gypsum board applied to the garage side of all walls and ceilings. Attic openings within the garage shall have panels of 5/8 inch Type X drywall or ¾ inch fire retardant treated plywood resting on a 1 x 4 or greater ledger nailed vertically into the framing. Panels are to be screwed in place or latched to prevent them from rising with heat in case of fire.\n\nSection: R309.7 Gas curb. A minimum four-inch (4\") gas curb shall be provided in and around the entire garage floor area in all attached garages. The garage floor pitch from back to front must not be less than .02 percent (.02%).\nSection R309.8 Residential Garages, Interior Finishes. All interior walls and ceilings of garages in newly constructed single family and attached single family homes shall be finished with 5/8\" Type X drywall, then taped, sanded and painted. The workmanship and quality of the finish shall be comparable to the interior walls of the home. (Ordinance 04-106, 08.24.04)\n\nSection R310.1 Emergency escape windows. Change the first two (2) lines to read as follows; Emergency Escape and Rescue required. All basements and every sleeping room shall have at least one operable emergency escape and rescue opening. Basement egress windows must meet the requirements of section R310.1.4 of the 2006 IRC. The required opening size must be obtained by normal operation of the window.\n\nSection R310.1.5 Basement Escape Window Location. Emergency escape windows in basements shall be located on a side elevation of a single family dwelling to prevent being covered by decks or other attached structures, unless otherwise approved by the Building Commissioner his/her designee.\n\nSection R310.2.2 Window Well Covers. Window wells with a horizontal projection of more than twenty-four inches (24\") shall be provided with covers that allow for the transmission of daylight and protect children from falling into the window well. These covers shall comply with Section R310.4 of the 2006 International Residential Code. (Ordinance 05-010, 01.25.05)\n\nSection R312.2 Guard Opening Limitations: Add the following language; Required guards shall not be constructed with horizontal rails or balusters that result in an ornamental design creating a ladder effect.\n\nSection R317.1 Separations In Two-Family Dwellings. Dwelling units in two-family dwellings shall be separated from each other by a masonry or concrete wall carrying a fire rating of not less than two (2) hours. Separation walls shall be continuous from the floor slab to the underside of the roof deck. The roof sheathing on each side of the wall shall be fire-retardant treated and shall extend from the wall to a point of least four feet (4’) away from the wall.\n\nSection R317.2 Townhouses. Townhouses shall include as examples the following, but shall not be limited thereto: condominiums, attached single-family, townhouses, row houses, and any townhouse style construction.\n\nSection R317.2.1 Fire walls. A firewall shall be provided continuously from the foundation to its termination at the underside of the roof deck of combustible roof decks in Type 3, 4, and 5 construction where all of the following conditions are met: (Ordinance 92-021, 03.10.92)\n\na. The wall is properly firestopped at the deck.\nb. The roof sheathing or deck is constructed of approved non-combustible materials or of fire-retardant treated wood, for a distance of four (4) feet on both sides of the wall.\nc. Combustible material does not extend through the wall.\nd. The roof covering has a minimum of a Class C rating.\ne. The firewall shall be constructed of masonry or concrete and must be self-sustaining. (Ordinance 92-035; 04.14.92)\n\nSection R317.2.1.1 Assemblies. There shall be provided two (2) hour fire resistive walls to be of masonry or concrete construction and free to all combustible materials without openings between all dwelling units, between dwelling units and the common areas within a building, between all guest rooms, between guest rooms and the common areas within a building. When\npenetrations are absolutely necessary, the penetrated areas must be sealed in such a manner that the required rating will be maintained. Corridors constructed with one layer of drywall on each side of each corridor wall shall be considered in compliance with this requirement. (Ordinance 87-040, 05.27.87)\n\nSection R325 Gutters. Gutters and downspouts shall be installed on all habitable dwellings with basements and/or crawlspaces.\n\nSection R401.5 Sill plate gaps. Gaps between sill plates and foundations shall be sealed with mortar or a similar approved material.\n\nSection R 402 Materials. Delete Sections R402.1 and 402.1.2.\n\nSection R403.1.1 Footings. Shall be changed to the following: The minimum dimensions for spread footings shall be eight inches (8\") deep and eighteen inches (18\") wide, except that masonry veneer on frame walls placed on concrete foundations shall be supported by spread footings with minimum dimensions of ten inches (10\") deep and twenty inches (20\") wide. These dimensions are based on a soil bearing capacity of 3,000 pounds per square foot. Soils with a lesser bearing capacity or where unusual loading conditions exist, larger footings or reinforcement may be required. The design must be provided by an Illinois licensed architect or an Illinois licensed structural engineer.\n\nSection R403.1.1.1 Keyway. A two-inch (2\") by two-inch (2\") keyway must be provided in the top of the footing underneath the centerline of the", "num_tokens": 2048} {"category": "olmocr_science_pdfs-industrial", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-industrial/part-00-00000.npy", "text": " compensation for such extra work will be allowed unless such report shall have been made.\nThe above-described methods of determining the payment for work and materials shall not apply to the performance of any work or the furnishing of any material, which, in the judgment of the Engineer administering the Contract, may properly be classified under items for which prices are established in the Contract.\n\nD. Claims for Extra Work\n\nIf the Contractor claims that any instructions by drawings or otherwise, involve extra cost under this Contract, he/she shall give the City of Tacoma written notice thereof within 30 days after receipt of such instruction, and in any event before proceeding to execute the work, except in an emergency endangering life or property, and the procedures governing the same shall be as provided for immediately above in this paragraph. The method in these paragraphs is the only method available to the Contractor for payment of claims for extra work performed under the terms of this Contract.\n\n3.11 CLEANING UP\n\nThe Contractor shall at all times, at his/her own expense, keep the premises free from accumulation of waste materials or debris caused by any workers or the work, at the completion of the work the Contractor shall remove all his waste materials from and about the site and all his/her equipment, sanitary facilities and surplus materials. In the case of dispute, the City of Tacoma may remove the debris and charge the cost to the Contractor as the City of Tacoma shall determine to be just. All material that is deposited or placed elsewhere than in places designated or approved by the Engineer administering the Contract will not be paid for and the Contractor may be required to remove such material and deposit or place it where directed.\n\n3.12 PROGRESS PAYMENT\n\nProgress payments will be made up to the amount of ninety-five percent (95%) of the actual work completed as shall be determined by the Engineer administering the Contract.\n\nThe Contractor may request that an escrow account be established as permitted by law, in which event the Contractor will earn interest on the retained funds.\n\nWhen the time for construction, services and/or installation will exceed thirty (30) days, the Contractor may request, by invoice, to be paid a progress payment based on percentage of work completed. The Engineer will review and approve the progress payment request on a monthly basis.\n\n3.13 FINAL PAYMENT\n\nThe final payment of five percent (5%) of the Contract price shall be approved on final acceptance of the work under this Contract by the Superintendent or his/her designee. In addition, before final payment is made, the Contractor shall be required to:\n\nA. Provide a certificate from the Washington State Department of Revenue that all taxes due from the Contractor have been paid or are collectible in accordance with the provisions of Chapter 60.28 and Title 82 of the Revised Code of Washington;\n\nB. Provide the General Release to the City of Tacoma on the form set forth in these Contract documents;\n\nC. Provide a release of any outstanding liens that have been otherwise filed against any monies held or retained by the City of Tacoma;\n\nD. File with the City Director of Finance, and with the Director of the Washington State Department of Labor and Industries, on the state form to be provided, an affidavit of wages paid;\n\nE. File with the City Director of Finance, on the state form to be provided, a statement from the State of Washington, Department of Labor and Industries, certifying that the prevailing wage requirements have been satisfied.\n\nF. File with the City Director of Finance, on the state form to be provided, a statement of release from the Public Works Contracts Division of the State of Washington, Department of Labor and Industries, verifying that all industrial insurance and medical aid premiums have been paid.\n\nIf there is a fee assessed to the City for any certificate, release or other form required by law, the contractor agrees that the fee amount may be passed on to the Contractor and deducted from the monies paid to the Contractor.\n3.14 **FAILURE TO COMPLETE THE WORK ON TIME**\n\nShould the completion of the work required under the Contract be delayed beyond the expiration of the period herein set for the completion of said work, or such extension of said period as may be allowed by reason of unavoidable delays, there shall be deducted from the total Contract price of work, for each calendar day by which such completion shall be delayed beyond said period of such extension thereof the sum of $300 or a sum of money as set forth hereinafter in these Specifications, as the amount of such deduction per calendar day.\n\nSaid sum shall be considered not as a penalty, but as liquidated damages, which the City will suffer by reason of the failure of the Contractor to perform and complete the work within the period, herein fixed or such extensions of said period as may be allowed by reason of unavoidable delays.\n\nAny money due or to become due the Contractor may be retained by the City to cover said liquidated damages, and should such money not be sufficient to cover such damages, the City shall have the right to recover the balance from the Contractor or his/her Sureties.\n\nThe filing of any bid for the work herein contemplated shall constitute acknowledgment by the Respondent that he/she understands, agrees and has ascertained that the City will actually suffer damages to the amount hereinabove fixed for each and every calendar day during which the completion of the work herein required shall be delayed beyond the expiration of the period herein fixed for such completion or such extension of said period as may be allowed by reason of unavoidable delays.\n\n3.15 **CITY RESERVES RIGHT TO USE FACILITIES PRIOR TO ACCEPTANCE**\n\nThe City of Tacoma hereby reserves the right to use the facilities herein contracted prior to final acceptance under this Contract. The use of said facilities, as mentioned herein, shall not be construed as a waiver or relinquishment of any rights that the City of Tacoma has under this Contract.\n\n3.16 **LIST OF SUBCONTRACTORS**\n\nBid proposals for construction, alteration or repair of any building or other public works that may exceed $1,000,000 including tax shall satisfy the following requirement: Respondent shall submit as part of the bid, the names of the subcontractors, with whom the respondent, if awarded the contract, will subcontract performance of the work of heating, ventilation and air conditioning, plumbing as described in chapter 18.106 RCW, and electrical as described in chapter 19.28 RCW, or to name itself for the work. The respondent shall not list more than one subcontractor for each category of work identified, unless subcontractors vary with bid alternates, in which case the respondent must indicate which subcontractor will be used for which alternate. Failure to comply with this provision or the naming of two or more subcontractors to perform the same work shall require the City (pursuant to state law RCW 39.30.060) to determine that respondent's bid is nonresponsive; therefore, the bid will be rejected.<|endoftext|>Technique for cable laying and overhead line construction\n\n- Energy cable laying up to 680 kV\n- Fibre optic, mini and micro cables\n- Cable winding and length measuring\n- Overhead line construction up to 110 kV\n- Seminars and product instructions\n\nCable drum disc brake\n\nCable drum disc brake without drum fork, to order separately, for controlled unwinding of cable or line drums from the hydraulic drum jacks THD 20/25 - 30/50. Suitable for all a.m. cable drum shafts. One complete set as shown left consists of:\n\n- 1 steel shaft type KSDK, see above, to select acc. to capacity and width of the drum\n- 1 disc brake STBT 400\n- 1 drum fork suitable in diameter to the drum shaft, see below\n- 2 clamps fitting the drum shaft see below\n- 2 Centric cones fitting the drum shaft and the drum bore diameter, see below\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
CodeTypeOperationBrakingAt the cablekg
350862STBT 400mechanic3200 Nmapprox. 4.0 kN37.00
<|endoftext|>VWB3500\nVibration Welder\nTable Size 38\" (965mm) by 18\" (455mm)\n\nFEATURES\n- Electromechanical vibration head assembly (200-240Hz)\n- Super rigid four rail table slide system\n- Massive flame cut bridge\n- Solid state 15hp digital vibration drive\n- Hydraulic lift/clamp force max. 4500 lbs. (20,000 N), 20 gallon reservoir, (75.6 L)\n- Allen-Bradley® SLC 5/03 controller with two available expansion slots\n- Allen-Bradley Panel View 600 full color touch screen display\n- Intuitive and interactive comprehensive help menu\n- Part parameter monitoring with programmable limits\n- Choice of either English or Spanish menu structure\n- Automatic tuning\n- Programmable amplitude 0.040\" to 0.070\" (1.0 to 1.8 mm)\n- Weld by time and weld by distance (absolute or meltdown)\n- Interior work light\n- Optical zero force cycle activation switches\n- Light Curtain for single switch activation\n- Less than 80 db in operation (continuous measurement)\n- Dual external utility outlets\n\nSPECIFICATIONS\n- Table size 38\" x ", "num_tokens": 2048} {"category": "olmocr_science_pdfs-industrial", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-industrial/part-00-00000.npy", "text": " Heat Pumps, Final Rule”.\n\nENERGY MANAGEMENT CONTROL SYSTEM (EMCS) is an automated control system that regulates the energy consumption of a building by controlling the operation of energy consuming systems, and is capable of monitoring loads and adjusting operations in order to optimize energy usage and respond to demand response signals.\n\nENERGY OBTAINED FROM DEPLETABLE SOURCES is electricity purchased from a public utility, or any energy obtained from coal, oil, natural gas, or liquefied petroleum gases.\n\nENERGY OBTAINED FROM NONDEPLETABLE SOURCES is energy that is not energy obtained from depletable sources.\n\nENERGY STORAGE SYSTEM (ESS) is one or more devices, assembled together, that are capable of storing energy used for safely supplying electrical energy to selected loads at a future time.\n\nENFORCEMENT AGENCY is the city, county, or state agency responsible for issuing a building permit.\n\nENTHALPY RECOVERY RATIO (ERR) is a ratio of the change in enthalpy of the outdoor air supply to the difference in enthalpy between the entering supply airflow and the entering exhaust airflow, with no adjustment to account for that portion of the psychometric change in the leaving supply airflow that is the result of leakage of entering exhaust airflow rather than exchange of heat or moisture between the airstreams.\n\nENTIRE BUILDING is the ensemble of all enclosed space in a building, including the space for which a permit is sought, plus all existing conditioned and unconditioned space within the structure.\n\nENVELOPE (See “building envelope”.)\n\nESS READY INTERCONNECTION EQUIPMENT is equipment, including but not limited to an ESS ready panelboard, that can accommodate the connection of a distributed energy resource or an ESS capable of either automatic or manual isolation from the utility power source.\nESS READY PANELBOARD is a panelboard that can accommodate either automatic or manual switching between a utility power source to a distributed energy resource or an energy storage system, such as a split bus panelboard.\n\nEXFILTRATION is uncontrolled outward air leakage from inside a building, including leakage through cracks and interstices, around windows and doors, and through any other exterior partition or duct penetration.\n\nEXTERIOR FLOOR/SOFFIT is a horizontal exterior partition, or a horizontal demising partition, under conditioned space. For low-rise residential occupancies, exterior floors also include those on grade.\n\nEXTERIOR PARTITION is an opaque, translucent, or transparent solid barrier that separates conditioned space from ambient air or space. For low-rise residential occupancies, exterior partitions also include barriers that separate conditioned space from unconditioned space, or the ground.\n\nEXTERIOR ROOF/CEILING is an exterior partition, or a demising partition, that has a slope less than 60 degrees from horizontal, that has conditioned space below, and that is not an exterior door or skylight.\n\nEXTERIOR ROOF/CEILING AREA is the area of the exterior surface of exterior roof/ceilings.\n\nEXTERIOR WALL is any wall or element of a wall, or any member or group of members, which defines the exterior boundaries or courts of a building and which has a slope of 60 degrees or greater with the horizontal plane. An exterior wall or partition is not an exterior floor/soffit, exterior door, exterior roof/ceiling, window, skylight, or demising wall.\n\nEXTERIOR WALL AREA is the area of the opaque exterior surface of exterior walls.\n\nFAÇADE is the contiguous exterior of a building surface, but not limited to fenestration products.\n\nFACTORY is a building, structure, or space designated as Factory Group F that is used for assembling, disassembling, fabricating, finishing, manufacturing, packaging, repair or processing operations.\n\nFACTORY ASSEMBLED COOLING TOWERS are cooling towers constructed from factory-assembled modules either shipped to the site in one piece or put together in the field.\n\nFAN, EMBEDDED is a fan that is part of a manufactured assembly where the assembly includes functions other than air movement.\n\nFAN ARRAYS are multiple fans in parallel and in a single enclosure between two plenum sections in an air distribution system, where plenum means a compartment or chamber that forms a part of the air distribution system, and that is not used for occupancy or storage.\n\nFAN ELECTRICAL INPUT POWER (FAN kWdesign) is the electrical input power in kilowatts required to operate an individual fan or fan array at design conditions. It includes the power consumption of motor controllers, if present.\n\nFAN ENERGY INDEX (FEI) is the ratio of the electric input power of a reference fan to the electric input power of the actual fan as calculated per ANSI/AMCA 208-18 at fan system design conditions.\n\nFAN NAMEPLATE ELECTRICAL INPUT POWER (kW) is the nominal electrical input power rating stamped on a fan assembly nameplate.\n\nFAN SYSTEM includes all the fans that contribute to the movement of air through a point of a common duct, plenum, or cabinet.\n\nFAN SYSTEM, COMPLEX means a fan system that combines a single-cabinet fan system with other supply fans, exhaust fans, or both.\n\nFAN SYSTEM, EXHAUST/RELIEF is a fan system dedicated to the removal of air from interior spaces to the outdoors.\n\nFAN SYSTEM, MULTI-ZONE VARIABLE AIR VOLUME (VAV) is a fan system that serves three or more space-conditioning zones where airflow to each zone is individually controlled based on heating, cooling and/or ventilation requirements, indoor fan airflow varies as a function of load, and the sum of the minimum zone airflows is 40% or less of the fan system design conditions.\n\nFAN SYSTEM, RETURN is a fan system dedicated to removing air from interior spaces where some or all of the air is to be recirculated except during economizer operation.\nFAN SYSTEM, SINGLE-CABINET is a fan system where a single fan, single fan array, a single set of fans operating in parallel, or fans or fan arrays in series and embedded in the same cabinet, that both supplies air to a space and recirculates the air.\n\nFAN SYSTEM, SUPPLY-ONLY is a fan system that provides supply air to interior spaces and does not recirculate the air.\n\nFAN SYSTEM, TRANSFER is a fan system that exclusively moves air from one occupied space to another.\n\nFAN SYSTEM AIRFLOW (cfm) is the sum of the airflow of all fans with fan electrical input power greater than 1 kW at fan system design conditions, excluding the airflow that passes through downstream fans with fan input power less than 1 kW.\n\nFAN SYSTEM DESIGN CONDITIONS are operating conditions that can be expected to occur during normal system operation that result in the highest supply airflow rate to or from the conditioned spaces served by the fan system.\n\nFAN SYSTEM ELECTRICAL INPUT POWER (Fan kWdesign,system) is the sum of the fan electrical input power (Fan kWdesign) in kilowatts of all fans that are required to operate at fan system design conditions to supply air from the heating or cooling source to the conditioned spaces, return it to the source, exhaust it to the outdoors, or transfer it to another space.\n\nFENESTRATION: Includes the following:\n\nACE is an NFRC-Approved Calculation Entity that conducts calculations of fenestration product ratings for certification authorization using the NFRC Component Modeling approach and issues label certificates to Specifying Authorities for product certification authorization in accordance with NFRC requirements.\n\nALTERED COMPONENT is a new fenestration component that has undergone an alteration other than a repair and is subject to all applicable standards requirements.\n\nBAY WINDOW is a combination assembly which is composed of three or more individual windows either joined side by side or installed within opaque assemblies and which projects away from the wall on which it is installed. Center windows, if used are parallel to the wall on which the bay is installed, the end panels or two side windows are angled with respect to the center window. Common angles are 30° and 45°, although other angles may be employed.\n\nCHROMOGENIC GLAZING is a class of switchable glazing that includes active materials (e.g. electrochromic) and passive materials (e.g. photochromic and thermochromic) permanently integrated into the glazing assembly. Their primary function is to switch reversibly from a high transmission state to a low transmission state with associated changes in VT and SHGC.\n\nCLERESTORY FENESTRATION is fenestration installed above a roofline greater than or equal to 60° from the horizontal, or any portion of exterior vertical glazing greater than eight feet per floor above the finished floor of a space.\n\nCMA (component modeling approach) is a fenestration product certification program from the National Fenestration Rating Council (NFRC) that enables energy-related performance ratings for nonresidential fenestration products, including the thermal performance U-factor, Solar Heat Gain Coefficient, and Visible Transmittance.\n\nCMAST (Component Modeling Approach Software Tool) is an NFRC approved software that allows a user to create a fenestration product “virtually,” and generate its energy-related performance ratings, including the thermal performance U-factor, Solar Heat Gain Coefficient, and Visible Transmittance.\n\nCURTAIN WALL/STOREFRONT is an external non-bearing wall intended to separate the exterior nonconditioned and interior conditioned spaces. It also consists of any combination of framing materials, fixed glazing, opaque glazing, operable windows, or other in-fill materials. Note: Window wall is also included as part of the curtain wall/storefront fenestration category.\n\nDUAL-GLAZED GREENHOUSE WINDOWS is a double glass pane separated by an air or other gas space that adds conditioned volume but not conditioned floor area to a building.\n\nDYNAMIC GLAZING SYSTEMS are glazing systems that have the ability to reversibly change their performance properties, including U-factor, Solar Heat Gain Coefficient (", "num_tokens": 2048} {"category": "olmocr_science_pdfs-industrial", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-industrial/part-00-00000.npy", "text": " the area (by -5.4% during the period 1991-1996) due to the further decline in the manufacturing sector and construction, while local economy is increasingly based on services. The major negative change is recorded for Middlesbrough (-10.3%), the decline is more contained in Stockton (-4.9%) while Redcar and Cleveland maintains practically unaltered its employment levels (0.2%) (table 4.2). Employment fell in the manufacturing sector and construction especially in Stockton and Redcar and Cleveland while it increased slightly in Middlesbrough.35 Almost 70% of employment on Teesside is in the service sector while manufacturing absorbs 23.5% (table 4.3.). Service industries dominate employment opportunities for both men and women, but through non-standard contracts (TVJSU, 1995).\n\n35 The negative performance of the service sector and of total employment are explained by considering the re-organisation of the local governments' offices. In practice, there have been no huge job losses as figures would suggest; employees in the public sector have simply changed their employer, from the Cleveland County Council to the single boroughs.\nTable 4.2. Employment change by sector and borough, 1991-1996\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
SectorMiddlesbroughRedcar & ClevelandStockton on TeesTeesside
Agriculture, fishing energy and water170-25390535
Manufacturing570-1840-6090-7360
Construction-30-50-1560-1640
Services-649019903760-740
Total-579070-3500-9220
(-10.3%)(0.2%)(-4.9%)(-5.4%)
\n\nSource: TVJSU\n\nTable 4.3. Employees in employment by sector and borough, 1996\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
SectorMiddlesbroughRedcar & ClevelandStockton on TeesTeesside
Agriculture, fishing energy and water1.3%2.6%1.8%1.9%
Manufacturing10.5%33.6%26.5%23.5%
Construction5.6%5.5%6.0%5.7%
Services82.6%58.3%65.7%68.9%
Total100.0%100.0%100.0%100.0%
\n\nSource: TVJSU\n\nTable 4.4. shows that the male full-time employment has decreased substantially in all the boroughs of Teesside, in favour of part-time occupations. Female full time employment instead has increased possibly due to employment opportunities in the public sector, in light manufacturing activities, and their association with lower costs of labour.\nDuring recent years, the work culture of the area has lost its original specificity to become increasingly attuned to the transformation of employment relations at national level. Flexibility in and out of the workplace has become the main principle governing employment relationships on Teesside where, due to the limited job opportunities, workers are expected to adapt to market demands. According to the projections by the TVJSU (1999), the trends in employment highlighted above will characterise the local labour market until 2006. Accordingly, a net increase of jobs is likely to be recorded in the service sector (approximately 18,000), with a slight rise in employment in construction, while employment in manufacturing is expected to fall (-3,500 jobs). Part-time employment will characterise the new job creation (80% of new jobs will be on the basis of part-time or fixed contracts) while the number of people with two or more jobs is also likely to increase (+2000). Yet, the changing structure of the local economy and the persistence of deep pools of unemployed people seem to have delineated also other categories of workers. Indeed, during the 1990s besides people with two or more jobs and those in casual employment, the local labour market has progressively witnessed the increase in people working on fixed-term contracts (jobs are created for the duration of a specific project) and in the black economy, although no official statistics are available for the area (ibid.).\n\n36 Essentially the ability to allocate labour to a wide range of tasks previously constrained by skill demarcations (functional flexibility).\n\n37 The reference is to external or organisational flexibility whereby labour is utilised according to changing production needs.\n4.5. Conclusions\n\nIn summary, the end of full male employment on Teesside has resulted from the interaction of market and non-market forces, and a major role has to be attributed to Teesside's specific industrial culture. The institutional configuration of the area was centred upon a few big companies. A culture of consensus characterised capital and labour relations whereby worker wage benefits were inextricably linked to company profitability gains. In addition, companies committed to the community through the production of profits in and through Teesside. Yet, the area's governing structures were attuned to the demand of capital. However, such a social pact could hardly be honoured when the convergence of economic events and policy interventions unfavourably affected local industrial performance. From the end of the 1970s, the local labour market saw a growing number of workers expelled from productive processes and, for those still at work, a re-configuration of employment practices. At the same time, the shift from standard forms of employment to non-standard contracts has affected the local culture of work which is now based, as at wider level, upon the principle of flexibility.\n\nPart 2 – Explaining industrial unemployment in the chemicals sector\n\n4.6. Introduction\n\nThe mid-1980s marked the onset of the latest phase of profound restructuring for the chemicals industry on Teesside which is still on-going. As previous comprehensive research work is dated around the mid-1980s (Hudson, 1983; Foord et al., 1985; Chapman, 1986), the information presented here, covering the 1990s, is quite original. Global changes in the industry had started to undermine ICI, the main company of the area and a major international player already by the end of the 1970s. Unable to maintain technological leadership in a market where the entry of new players soon led to saturation and an industry-wise decrease in profitability, ICI started a major process of industrial restructuring. This consisted of re-positioning its business and, at the same time, embarked upon a cost-cutting policy which impacted decisively on the cost of labour. The exit from the most cyclically vulnerable segments of the market, and a radical re-organisation of employment relations have become the driving imperatives of ICI during the 1990s.\nThe reading of the process of employment change in the chemical industry of Teesside presented below contrasts with the dominant academic view (Bruno and Sachs, 1985; CEPR, 1995; OECD, 1994; Layard et al., 1994) that attacks wages and labour rigidity. Whilst not denying that ICI was characterised by an ‘expensive’ model of employment relations that it reproduced over the years, I show that its re-organisation of the business and re-definition of employment relations must be considered in the light of the modified global sectoral environment of the company. Yet, in contrast with orthodox claims, the corporate restructuring path has been centred upon the downward adjustment of the employment relation.\n\nSection 4.7. reviews the historical development of the chemical industry on Teesside, by providing also an account of the sectoral industrial culture. Section 4.8. analyses the", "num_tokens": 2048} {"category": "olmocr_science_pdfs-industrial", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-industrial/part-00-00000.npy", "text": "RICAL GENERAL NOTES FOR 2019 CBC (continued)\n\n10) Screw anchors shall be Powers Screw-Bolt+/Hangermate+, Mason Ind. N.Y. SAST, or Hilti Kwik HUS-EZ/HUS-EZ I for minimum 3000 psi concrete slabs, beams, or walls and concrete filled decks (sand light or normal weight) installed in accordance with ICC Reports ICC ESR 3889, 2713 or 3027, respectively. Testing shall be done in the presence of the special inspector and a report of the test results shall be submitted to the enforcement agency. If any anchors fail, test all previously untested anchors installed by the same trade until 20 consecutive anchors pass. Then resume the original test frequency. Screw anchors shall not be tested using a torque wrench. Screw anchors may be loosened a maximum of one full turn to facilitate the positioning of a tension test collar. Following the tension test, the anchor shall be re-torqued in accordance with the manufacturer's installation instructions. Refer to page A0.5 for test loads.\n\nNotes on Suspended Raceways:\n\n1) Per 2019 CBC Sections 1601.1.4 & 1617A.1.18 applicable only to OSHPD-1, 2, 4, 5 and 1R designated projects, distributed conduit, cable trays and raceways weighing 5 lbs/ft or less are exempt from design for the seismic forces of ASCE 7-16 Section 13.3. For remaining electrical distribution systems, per 2019 CBC Section 1617A1.26, cable trays and raceways shall be designed for seismic forces and seismic relative displacements. In addition, conduit equal to or greater than 2.5\" trade size and attached to panels, cabinets, or other equipment subject to seismic relative displacements shall be provided with flexible connections or designed for seismic forces and seismic relative displacements. Design for the seismic forces and relative displacements shall not be required for raceway and associated components to accommodate the relative displacement between component and piping, where the cable tray or raceway is positively attached to the structure, and where one of the following apply:\n a) Trapeze assemblies with 3/8\" or 1/2\" diameter rod hangers not exceeding 12\" in length from the conduit, cable tray, or raceway support point to the connection at the supporting structure are used to support the cable tray or raceway, and the total weight supported by any single trapeze is 100 lbs or less; or\n b) The conduit, cable tray, or raceway is supported by individual rod hangers 3/8\" or 1/2\" in diameter, and each hanger in the raceway run is 12\" or less in length from the conduit, cable tray, or raceway support point connection to the supporting structure, and the total weight supported by any single rod is 50 lbs or less.\n\n2) Design for the seismic forces and relative displacements shall not be required for conduit, regardless of the value of Ip, where the conduit size is less than 2.5\" trade size.\n\n3) Cable tray transverse and longitudinal brace spacing shall not exceed those specified by the manufacturer. Rigid Metal Conduit (RMC, Schedule 40 pipe), Intermediate Metal Conduit (IMC), and Electrical Metallic Tubing (EMT), shall be braced at spacings tabulated in Section S. Longitudinal brace spacings shall not exceed 3 times the tabulated transverse brace spacings. For cases where multiple conduits with varying brace spacings are supported on a trapeze, the smallest brace spacing shall govern. The seismic design engineer may design brace spacings for trapezed conduits based on combined conduits sections and/or by adding steel strengthening sections on a job by job basis subject to approval by the enforcement agency.\n\n4) Transverse restraints for cable trays shall be installed at general support locations. Cable trays must be positively fastened to the support as detailed in Section E.\nELECTRICAL GENERAL NOTES (continued)\n\n7) If a 2 piece rod is used to support raceways, minimum engagement of the rod in the coupling nut shall be equal to the rod diameter. Rods shall be run up tight in the coupling nut.\n\n8) For vertical support methods at seismic brace locations other than what are detailed in this manual, the seismic design engineer must provide calculations and/or testing of any additional components or materials (e.g. hangers, clamps, etc.) to comply with the 2013 CBC on a job by job basis subject to review and approval by the enforcement agency.\n\n9) Electrical pull boxes installed directly in-line with the conduit systems (no flexes) may be supported and laterally braced as part of the conduit bracing system. Where necessary, consider the ability of the conduit(s) to transfer gravity and seismic loads to adjacent vertical supports and braces.\n\nNotes on Vertical Risers:\n\n1) Vertical raceways supported at each floor shall be considered seismically braced if the penetration through each floor is tightly packed and the floor to floor spacing does not exceed the maximum brace spacing tabulated in Section S. Tops of risers exceeding 3 feet shall be provided with a 4-way brace. Where the 4-way brace is attached to the horizontal raceway, it shall be installed within 2 feet of the centerline of the riser.\n\n2) Vertical raceways in an open shaft must be attached to steel supports with both steel supports and connections sized to accept the combined gravity and seismic loads. Thermal loads shall be considered, where applicable. Lateral seismic restraint spacings for conduit shall not exceed the spacings tabulated in Section S. Supports and connections must be engineered on a job by job basis subject to approval by the enforcement agency. Seismic relative displacement between floors shall be considered in the design.\n\n3) A conduit penetrating a floor with the annular space packed with firestop may act as an all-directional brace at the end of a horizontal conduit run as described in Note 1 above and depicted on Page A24.0 if the distance from the centerline of the floor to the top of the horizontal conduit is less than 'A', where 'A' is a function of the maximum transverse brace spacing, 'S', as defined on Page A22.1.\nELECTRICAL GENERAL NOTES FOR 2019 CBC (continued)\n\n5) Seismic restraints for trapeze supported conduit shall be attached to the trapeze member at the hanger locations as detailed in Section F. Conduits supported by trapezes at seismic brace locations shall utilize Mason West, Inc. Type SSC, strut steel clamp (Refer to Page X8.0) for Rigid Metal Conduit (RMC, Schedule 40 pipe) and 2½\" to 4\" diameter EMT or IMC or Type SSCE, strut steel clamp for up to 2\" diameter EMT or IMC (Refer to Page X8.0) utilizing details in Section F.\n\n6) The conduit weights tabulated in the appendix for RMC, IMC, and EMT materials consider the conduit full of conductors to approximate the maximum operating weight. Similarly, the cable tray weight tabulated in the same section consider the cable trays full of cable as allowed by the National Electrical Code (NEC).\n\n7) If a 2 piece rod is used to support raceways, minimum engagement of the rod in the coupling nut shall be equal to the rod diameter. Rods shall be run up tight in the coupling nut.\n\n8) For vertical support methods at seismic brace locations other than what are detailed in this manual, the seismic design engineer must provide calculations and/or testing of any additional components or materials (e.g. hangers, clamps, etc.) to comply with the 2013 CBC on a job by job basis subject to review and approval by the enforcement agency.\n\n9) Electrical pull boxes installed directly in-line with the conduit systems (no flexes) may be supported and laterally braced as part of the conduit bracing system. Where necessary, consider the ability of the conduit(s) to transfer gravity and seismic loads to adjacent vertical supports and braces.\n\nNotes on Vertical Risers:\n\n1) Vertical raceways supported at each floor shall be considered seismically braced if the penetration through each floor is tightly packed and the floor to floor spacing does not exceed the maximum brace spacing tabulated in Section S. Tops of risers exceeding 3 feet shall be provided with a 4-way brace. Where the 4-way brace is attached to the horizontal raceway, it shall be installed within 2 feet of the centerline of the riser.\n\n2) Vertical raceways in an open shaft must be attached to steel supports with both steel supports and connections sized to accept the combined gravity and seismic loads. Thermal loads shall be considered, where applicable. Lateral seismic restraint spacings for conduit shall not exceed the spacings tabulated in Section S. Supports and connections must be engineered on a job by job basis subject to approval by the enforcement agency. Seismic relative displacement between floors shall be considered in the design.\n\n3) A conduit penetrating a floor with the annular space packed with firestop may act as an all-directional brace at the end of a horizontal conduit run as described in Note 1 above and depicted on Page A24.0 if the distance from the centerline of the floor to the top of the horizontal conduit is less than 'A', where 'A' is a function of the maximum transverse brace spacing, 'S', as defined on Page A22.1.\nELECTRICAL DESIGN PROCEDURE\n\nFollow the five steps below to determine the seismic kit", "num_tokens": 2048} {"category": "olmocr_science_pdfs-industrial", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-industrial/part-00-00000.npy", "text": " the aqueous additive compositions are free of color-imparting and effect-imparting pigments and they are also preferably free of curing agents.\n\nThe amount of layered silicate in the layered silicate containing aqueous additive compositions and/or the amount of the layered silicate containing aqueous additive composition in the water-based coating composition can preferably be chosen such that a content of layered silicate (solid) of 0.05 to 0.5, preferably of 0.05 to 0.3 percent by weight, based on the total amount of the water-based coating composition, i.e. based on the total amount of the ready-to-spray water-based coating composition, is obtained.\n\nThe aqueous additive compositions containing layered silicate according to the invention are stable in storage and may be stored without thickening and gelling, for example over a period of approx. 2 years without any problems. Prior art aqueous additive compositions containing layered silicate do not exhibit this long-term storage stability. They gel prematurely. While prior art compositions may indeed be re-liquefied by appropriate stirring, their rheological activity is then lost.\n\nThe aqueous additive compositions containing layered silicate are used for the production of color-imparting and/or special effect-imparting water-based coating compositions, in particular for the production of color-imparting and/or special effect-imparting water-based base coat coating compositions or water-based color-imparting and/or special effect-imparting one-layer top coat coating compositions in the context of single layer or multilayer coating. Color-imparting and/or special effect-imparting should here be taken to mean that the corresponding coating compositions contain only color-imparting pigments, only special effect-imparting pigments or color-imparting and special effect-imparting pigments. The coatings produced with these color-imparting and/or special effect-imparting coating compositions are here intended to impart a\ndesired color, a desired special effect or a desired color in combination with a special effect to the substrate to be coated. The present invention thus also relates to the use of the aqueous additive compositions for production of water-based coating compositions, in particular for production of color-imparting and/or special effect-imparting water-based base coat coating compositions.\n\nThe present invention is also directed to a process for the production of water-based coating compositions containing layered silicate, in particular water-based base coat coating compositions, wherein the layered silicates are incorporated into the water-based coating composition in the form of the above-defined aqueous additive compositions containing layered silicate. The aqueous additive compositions containing layered silicate may here be incorporated into a finished water-based coating composition or into constituents thereof.\n\nThe aqueous additive compositions containing layered silicate are preferably added to an already completely formulated pigmented water-based coating composition, in particular a water-based base coat coating composition or water-based one-layer top coat coating composition. This may proceed, for example, by manual stirring or by shaking. The aqueous additive composition containing layered silicate is preferably incorporated into the pigmented water-based coating composition immediately before application. Due to its very good storage stability, the aqueous additive composition containing layered silicate may be produced as a semifinished product and stored until use. It may thus also be used, for example, as a component of a \"paint mixing system\", as is in particular used in vehicle repair coating for the production of color-imparting and/or special effect-imparting base coat coating compositions. As is known, such a paint mixing system is based on a defined number of individual mixing components containing coloring and/or special effect pigments and optionally further for example binder components, which can be mixed as required to yield a coating with the desired color/special effect.\n\nIt is, of course, also possible to incorporate the aqueous additive compositions containing layered silicate according to the invention during\nthe production of an water-based coating composition produced from scratch. In principle, the water-based coating compositions containing the aqueous additive compositions also exhibit excellent storage stability of for example up to six months.\n\nThe water-based coating compositions containing the aqueous additive compositions contain the conventional constituents of a water-based pigmented base coat coating composition or one-layer top coat coating composition: color-imparting and/or special effect-imparting pigments, one or more binders and water and optionally at least one of the following constituents: crosslinking agents, fillers, conventional coating additives and organic solvents.\n\nExamples of binders are conventional film-forming, water-dilutable binders familiar to the person skilled in the art, such as water-dilutable polyester resins, water-dilutable (meth)acrylic copolymer resins or water-dilutable polyester/(meth)acrylic copolymer hybrids and water-dilutable polyurethane resins or polyurethane/(meth)acrylic copolymer hybrids. These may be reactive or non-functional resins.\n\nThe water-based coating compositions may be self drying (physically drying), self crosslinking or externally crosslinking. Accordingly, the water-based coating compositions may contain crosslinking agents, such as, for example, free or blocked polyisocyanates or amino resins, for example, melamine resins. Selection of the optionally used crosslinking agents depends on the type of crosslinkable groups in the binders and is familiar to the person skilled in the art. The crosslinking agents may be used individually or in combination. The mixing ratio of crosslinking agent solids to binder solids amounts, for example, to 10:90 to 40:60, preferably 20:80 to 30:70.\n\nThe water-based coating compositions contain conventional coating pigments, for example, special effect pigments (effect-imparting pigments) and/or color-imparting pigments selected from among white, colored and black pigments.\nExamples of special effect pigments are conventional pigments which impart to a coating a special effect, e.g. a color and/or lightness flop dependent on the angle of observation, are metal pigments. Example of metal pigments are those made from aluminum, copper or other metals, interference pigments such as, for example, metal oxide coated metal pigments, for example, iron oxide coated aluminum, coated mica such as, for example, titanium dioxide coated mica, pigments which produce a graphite effect, iron oxide in flake form, liquid crystal pigments, coated aluminum oxide pigments, coated silicon dioxide pigments. Examples of white, colored and black pigments are the conventional inorganic or organic pigments known to the person skilled in the art, such as, for example, titanium dioxide, iron oxide pigments, carbon black, azo pigments, phthalocyanine pigments, quinacridone pigments, pyrrolopyrrole pigments, perylene pigments.\n\nThe water-based coating compositions may contain conventional coating additives in conventional quantities, for example, of 0.1 to 5 wt.%, relative to the solids content thereof. Examples are neutralizing agents, antifoaming agents, wetting agents, adhesion promoters, catalysts, levelling agents, anticratering agents, thickeners and light stabilizers.\n\nThe water-based coating compositions may contain conventional coating solvents, for example, in a proportion of preferably less than 20 wt.%, particularly preferably of less than 15 wt.%. These are conventional coating solvents, which may originate, for example, from the production of the binders or are added separately. Examples of such solvents are those mentioned already above in the description of the layered silicate containing compositions.\n\nWater-based coating compositions have solids contents of, for example, 10 to 45 wt.%, preferably of 15 to 35 wt.%. The ratio by weight of pigment content to the resin solids content is, for example, from 0.05:1 to 2:1. For special-effect water-based base coat coating compositions it is preferably 0.06:1 to 0.6:1 and for solid color (single-tone) water-based base coat coating compositions it is preferably higher, for example, 0.06:1.\nto 2:1, in each case relative to the weight of solids.\n\nThe water-based coating compositions have for example viscosities in the range of 50 to 300 mPas (measured at a shear rate of 235 s\\(^{-1}\\) with HAAKE viscosimeter Typ RS1). These low viscous coating compositions can easier be filtered and applied compared to high viscous coating compositions.\n\nThe water-based coating compositions may be used for the production of a color- and/or special effect-imparting single-stage top coating layer within a one- or multilayer coating or preferably for the production of the color- and/or special effect-imparting coating layer within a base coat/clear coat two-layer coating. The water-borne base coating compositions or single-stage top coating compositions may be applied by conventional methods. They are preferably applied by spraying to a dry film thickness of, for example, 8 to 40 µm; for special-effect water-borne base coats the dry film thickness is, for example, 8 to 25 µm, while for solid color water-borne base coats it is preferably greater, for example, 10 to 40 µm. In case of basecoat/clear coat two-layer coating application preferably proceeds by the wet-on-wet process, i.e. after a flash-off phase, for example, at 20 to 80°C, the water-based base coat layers are overcoated with a clear coat to a dry film thickness of preferably 30 to 60 µm and dried or crosslinked together with the latter at temperatures of, for example, 20 to", "num_tokens": 2048} {"category": "olmocr_science_pdfs-literature", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-literature/part-00-00000.npy", "text": " from 1907 with the commotion around Synge's *The Playboy of the Western World*. The second confrontation follows only two years later and involves George Bernard Shaw's *The Shewing-Up of Blanco Posnet*. Shaw had written the play for Her Majesty's Theatre, but was refused a license from the Lord Chamberlain on the grounds of blasphemy. Thereupon Shaw offers the play to the Abbey, which is located in an other jurisdiction and can therefore not be convicted. In August of that year the play is performed and becomes a huge success. Yeats has made a stand that artistic integrity should\ncome before political influence, and his persistence restores much of the popularity the Abbey had lost in 1907. The third and final upheaval takes place in 1926. After several years of struggling – mainly financially – the Abbey greets a new playwright, Séan O'Casey. His first two plays are welcomed with great enthusiasm, but his third play, *The Plough and the Stars*, causes a storm of protest reminiscent of the riots that had accompanied Synge's play. Even some of the actors object to the sexual and religious content of particular scenes. The Directors hold firm, however, and partly due to the commotion the play is performed to full houses. Up to this day O'Casey's controversial piece is a very well-known and well-liked play.\n\nThe Abbey Theatre is symptomatic for Yeats' passion and conviction in accomplishing his scheme to educate the people. His choice of plays that tell a genuine Irish story has at times been controversial, but his perseverance eventually earns him the respect of friends and foes. In 1925 he is responsible for making the Abbey the first state-supported theatre in the British Isles, and even after his withdrawal it remains primarily a theatre of the writers and the people.\n\n3.2.3 Literature\n\n3.2.3.1 The Wanderings of Oisin\n\n*The Wanderings of Oisin* is an epic poem in the style of Homer's *Odyssey* that tells the story of Oisin, a great Irish hero. After he falls in love with the faery princess Niamh, she and Oisin exchange the mortal realm for three immortal faery isles where they live and feast for three hundred years. After this time, Oisin regrets leaving his friends behind and he wishes to return to his old world to visit them. He lends Niamh's faery horse but is told he cannot touch the ground or he will instantly become mortal again. Upon his return Oisin notices that the world he left behind has changed dramatically. His fellow warriors are dead and Christianity has replaced the religion and traditions of pagan Ireland. When he tries to help two men lift a\nsack full of sand from the ground, his saddle girth breaks and he falls onto the ground where\nthe three hundred years he spent in faery land catch up with him in a single moment. The\nentire poem consists of three parts and is constructed as a dialogue between Oisin and St.\nPatrick after Oisin's return to the mortal world.\n\nYeats writes the main part of his great epic poem in Sligo during the summer and\nautumn of 1889. It is the first in what has to become a Légende des Siècles, narrating and\nglorifying the Irish history. The story of this poem is largely taken from legends in the Fenian\nor Ossianic Cycle. The Fenian Cycle or Fiannaídheacht centres around the mythical hero\nFionn mac Cumhaill. He is the leader of a band of warriors called the Fianna Éireann, who\nroam the country looking for adventure and warfare. He is also Oisin's father and that is the\nreason why the Fenian Cycle is known as the Ossianic Cycle too. Yeats puts a number of the\noriginal stories together to create his own adaptation of the legend. Apart from the Fenian\nCycle, Yeats mentions two other sources for this poem. The first is “a most beautiful old poem\nby one of the numerous half-forgotten Gaelic poets who lived in Ireland in the last century.”\n(Wade 132) This poem, left unnamed by Yeats, has been identified by Alspach as Michael\nComyn's “The Lay of Oisin on the Land of Youth” (850). This poem deals with the same topic\nas Yeats' and especially in the opening lines Yeats stays very close to the original (851). The\nsecond source Yeats mentions is rooted in his own tradition and concerns the islands Oisin\nvisits. According to Yeats these stem from the “three phantom islands” (Wade 132) of Tír na\nnÓg, also known as the Land of the Young or the Land of Promise. As the most popular of the\n\nLa Légende des Siècles (1859, 1877, 1883) is a collection of poems by Victor Hugo (1802 – 1885), depicting\nthe history and evolution of humanity by a series of epic poems. Yeats plans a similar attempt for Irish history\nand this is his first contribution. Although he writes several more stories on the same topic – including his Cú\nChulainn series – he will later admit that he had not been able to fully realise his ambitions.\n\nThe Fenian Cycle is one of four major cycles of Irish mythology. The others are the Mythological Cycle, the\nUlster Cycle – featuring Cú Chulainn – and the Historical Cycle.\nmythological Otherworlds, Tír na nÓg is a place of eternal life and therefore resembles the Valhalla of Scandinavian mythology or the Christian representation of Heaven. Since all these sources are well-known among the people as a popular part of their heritage, Yeats successfully constructs the basis for a revival of ancient Ireland.\n\nThere are a few parallels that can be drawn between the story and real-life in Yeats' time that allow us to understand the intended effect of the poem better. First of all, there is the main character Oisin. Being a legendary hero, he possesses fearsome strength and relentless courage. With Hutchinson's theory in mind, he is clearly used as a role model for the Irish people here, and his admirable characteristics should be pursued by everyone. Furthermore, he belongs to a notorious group of warriors who are renowned all over the world and into the next. When Oisin finds out his comrades have died during his absence, he praises their bravery that transcends even the Realm of Death:\n\n> “Put the staff in my hands; for I go to the Fenians, O cleric, to chant\n> The war-songs that roused them of old; they will rise, making clouds with their breath,\n> Innumerable, singing, exultant; the clay underneath them shall pant,\n> And demons be broken in pieces, and trampled beneath them in death.\n> And demons afraid in their darkness; deep horror of eyes and of wings,\n> Afraid, their ears on the earth laid, shall listen and rise up and weep;\n> Hearing the shaking of shields and the quiver of stretched bowstrings,\n> Hearing Hell loud with a murmur, as shouting and mocking we sweep.”\n\n(“The Poems of W. B. Yeats” 61-2)\n\nWhat makes these lines and this poem so effective, is the cadence of the rhythm and the repetition of sounds that make these images palpable. Through these lines the Fenians are\nresurrected and once again ready to fight. Considering the centuries of domination Ireland has undergone by the time Yeats writes this poem, this is intended as a reminder to the Irish people that their situation has not always been like this and that it can be changed again if they can find the courage and strength to stand up to their oppressor.\n\nThe second parallel supports the notion that Ireland's situation has deteriorated under English rule. When Oisin returns to the old world he has left behind, he finds it has completely changed. He mourns the loss of his companions in arms and sees how St. Patrick's Christianity has replaced the old pagan beliefs. This blaming of Christianity for the disappearance of paganism is in Yeats' time not without danger. Religion is a key aspect of the nationalist struggle and the tension between Catholics and Protestants is tangible. However, it is very unlikely that Yeats meant to directly target any of the two Christian divisions. Although he is a Protestant himself, he never meddles in religious quarrels nor does he take a clear stand in the discussion. It is more likely that Yeats stages St. Patrick merely to stay true to the original material. Rather than wanting to invoke a religious debate, he contrasts both worlds in the story to emphasise their differences. In the same way that Oisin compares his original life to the new one, Yeats compares modern to ancient Ireland. He thus effectively links the deplorable state of the story's world to contemporary Ireland, turning Oisin's lament for the loss of his homeland into a nineteenth century elegy.\n\n3.2.3.2 Cathleen ni Houlihan\n\n*Cathleen ni Houlihan* tells the story of an Irish peasant family on the eve of their oldest son Michael's marriage. The family is in good spirits, showing the wedding clothes and discussing how to spend the dowry. When they hear a commotion coming from the town, Patrick, the youngest son, is sent out to find out what is going on. During his absence an old woman approaches the house and is warmly welcomed by the family. She later announces that\nshe goes by the names of Poor Old Woman, or Cathleen, daughter of Houlihan. She begins to\ntell a sad story about how her", "num_tokens": 2048} {"category": "olmocr_science_pdfs-literature", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-literature/part-00-00000.npy", "text": ";\nBut it is past:\nCome day, come night, day comes at last.\n\nWe loosed hand from hand,\nWe parted face from face;\nEach went his way to his own land.\nAt his own pace,\nEach went to fill his separate place.\n\nIf we should meet one day,\nIf both should not forget,\nWe shall clasp hands the accustomed way,\nAs when we met\nSo long ago, as I remember yet.\n\nII\n\nWhere my heart is (wherever that may be)\nMight I but follow!\nIf you fly thither over heath and lea,\nO honey-seeking bee,\nO careless swallow,\nBid some for whom I watch keep watch for me.\n\nAlas! that we must dwell, my heart and I,\nSo far asunder.\nHours wax to days, and days and days creep by;\nI watch with wistful eye,\nI wait and wonder:\nWhen will that day draw nigh—that hour draw nigh?\n\nNot yesterday, and not, I think, to-day;\nPerhaps to-morrow.\nDay after day 'to-morrow' thus I say:\nI watched so yesterday\nIn hope and sorrow,\nAgain to-day I watch the accustomed way.\n\nChristina Georgina Rossetti\nTwist me a crown of wind-flowers;\nThat I may fly away\nTo hear the singers at their song,\nAnd players at their play.\nPut on your crown of wind-flowers:\nBut whither would you go?\nBeyond the surging of the sea\nAnd the storms that blow.\nAlas! your crown of wind-flowers\nCan never make you fly:\nI twist them in a crown to-day,\nAnd to-night they die.\n\nChristina Georgina Rossetti\nUnder The Ivy Bush\n\nUnder the ivy bush\nOne sits sighing,\nAnd under the willow tree\nOne sits crying:\nUnder the ivy bush\nCease from your sighing,\nBut under the willow-tree\nLie down a-dying.\n\nChristina Georgina Rossetti\n'The iniquity of the fathers upon the children.'\n\nOh the rose of keenest thorn!\nOne hidden summer morn\nUnder the rose I was born.\n\nI do not guess his name\nWho wrought my Mother's shame,\nAnd gave me life forlorn,\nBut my Mother, Mother, Mother,\nI know her from all other.\nMy Mother pale and mild,\nFair as ever was seen,\nShe was but scarce sixteen,\nLittle more than a child,\nWhen I was born\nTo work her scorn.\nWith secret bitter throes,\nIn a passion of secret woes,\nShe bore me under the rose.\n\nOne who my Mother nursed\nTook me from the first:—\n'O nurse, let me look upon\nThis babe that costs so dear;\nTo-morrow she will be gone:\nOther mothers may keep\nTheir babes awake and asleep,\nBut I must not keep her here.'—\nWhether I know or guess,\nI know this not the less.\n\nSo I was sent away\nThat none might spy the truth:\nAnd my childhood waxed to youth\nAnd I left off childish play.\nI never cared to play\nWith the village boys and girls;\nAnd I think they thought me proud,\nI found so little to say\nAnd kept so from the crowd:\nBut I had the longest curls\nAnd I had the largest eyes\nAnd my teeth were small like pearls;\nThe girls might flout and scout me,\nBut the boys would hang about me\nIn sheepish mooning wise.\n\nOur one-street village stood\nA long mile from the town,\nA mile of windy down\nAnd bleak one-sided wood,\nWith not a single house.\nOur town itself was small,\nWith just the common shops,\nAnd throve in its small way.\nOur neighbouring gentry reared\nThe good old-fashioned crops,\nAnd made old-fashioned boasts\nOf what John Bull would do\nIf Frenchman Frog appeared,\nAnd drank old-fashioned toasts,\nAnd made old-fashioned bows\nTo my Lady at the Hall.\n\nMy Lady at the Hall\nIs grander than they all:\nHers is the oldest name\nIn all the neighbourhood;\nBut the race must die with her\nThough she's a lofty dame,\nFor she's unmarried still.\nPoor people say she's good\nAnd has an open hand\nAs any in the land,\nAnd she's the comforter\nOf many sick and sad;\nMy nurse once said to me\nThat everything she had\nCame of my Lady's bounty:\n'Though she's greatest in the county\nShe's humble to the poor, \nNo beggar seeks her door \nBut finds help presently. \nI pray both night and day \nFor her, and you must pray: \nBut she'll never feel distress \nIf needy folk can bless.'\n\nI was a little maid \nWhen here we came to live \nFrom somewhere by the sea. \nMen spoke a foreign tongue \nThere where we used to be \nWhen I was merry and young, \nToo young to feel afraid; \nThe fisher folk would give \nA kind strange word to me, \nThere by the foreign sea: \nI don't know where it was, \nBut I remember still \nOur cottage on a hill, \nAnd fields of flowering grass \nOn that fair foreign shore.\n\nI liked my old home best, \nBut this was pleasant too: \nSo here we made our nest \nAnd here I grew. \nAnd now and then my Lady \nIn riding past our door \nWould nod to Nurse and speak, \nOr stoop and pat my cheek; \nAnd I was always ready \nTo hold the field-gate wide \nFor my Lady to go through; \nMy Lady in her veil \nSo seldom put aside, \nMy Lady grave and pale.\n\nI often sat to wonder \nWho might my parents be, \nFor I knew of something under\nMy simple-seeming state.\nNurse never talked to me\nOf mother or of father,\nBut watched me early and late\nWith kind suspicious cares:\nOr not suspicious, rather\nAnxious, as if she knew\nSome secret I might gather\nAnd smart for unawares.\nThus I grew.\n\nBut Nurse waxed old and grey,\nBent and weak with years.\nThere came a certain day\nThat she lay upon her bed\nShaking her palsied head,\nWith words she gasped to say\nWhich had to stay unsaid.\nThen with a jerking hand\nHeld out so piteously\nShe gave a ring to me\nOf gold wrought curiously,\nA ring which she had worn\nSince the day I was born,\nShe once had said to me:\nI slipped it on my finger;\nHer eyes were keen to linger\nOn my hand that slipped it on;\nThen she sighed one rattling sigh\nAnd stared on with sightless eye:—\nThe one who loved me was gone.\n\nHow long I stayed alone\nWith the corpse I never knew,\nFor I fainted dead as stone:\nWhen I came to life once more\nI was down upon the floor,\nWith neighbours making ado\nTo bring me back to life.\nI heard the sexton's wife\nSay: 'Up, my lad, and run\nTo tell it at the Hall;\nShe was my Lady's nurse,\nAnd done can't be undone.\nI'll watch by this poor lamb.\nI guess my Lady's purse\nIs always open to such:\nI'd run up on my crutch\nA cripple as I am,'\n(For cramps had vexed her much)\n'Rather than this dear heart\nLack one to take her part.'\n\nFor days day after day\nOn my weary bed I lay\nWishing the time would pass;\nOh, so wishing that I was\nLikely to pass away:\nFor the one friend whom I knew\nWas dead, I knew no other,\nNeither father nor mother;\nAnd I, what should I do?\n\nOne day the sexton's wife\nSaid: 'Rouse yourself, my dear:\nMy Lady has driven down\nFrom the Hall into the town,\nAnd we think she's coming here.\nCheer up, for life is life.'\n\nBut I would not look or speak,\nWould not cheer up at all.\nMy tears were like to fall,\nSo I turned round to the wall\nAnd hid my hollow cheek\nMaking as if I slept,\nAs silent as a stone,\nAnd no one knew I wept.\nWhat was my Lady to me,\nThe grand lady from the Hall?\nShe might come, or stay away,\nI was sick at heart that day:\nThe whole world seemed to be\nNothing, just nothing to me,\nFor aught that I could see.\n\nYet I listened where I lay:\nA bustle came below,\nA clear voice said: 'I know;\nI will see her first alone,\nIt may be less of a shock\nIf she's so weak to-day:'—\nA light hand turned the lock,\nA light step crossed the floor,\nOne sat beside my bed:\nBut never a word she said.\n\nFor me, my shyness grew\nEach moment more and more:\nSo I said never a word\nAnd neither looked nor stirred;\nI think she must have heard\nMy heart go pit-a-pat:\nThus I lay, my Lady sat,\nMore than a mortal hour—\n(I counted one and two\nBy the house-clock while I lay):\nI seemed to have no power\nTo think of a thing to say,\nOr do what I ought to do,\nOr rouse myself to a choice.\n\nAt last she said: 'Margaret,\nWon't you even look at me?'\nA something in her voice\nForced my tears to fall at last,\nForced sobs from me thick and fast;\nSomething not of the past,\nYet stirring memory;\nA something new, and yet\nNot new, too sweet to last,\nWhich I never can forget.\n\nI turned and stared at her:\nHer cheek showed hollow-pale;\nHer hair", "num_tokens": 2048} {"category": "olmocr_science_pdfs-literature", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-literature/part-00-00000.npy", "text": "609, nabob, rupee 1612, gurn, pariah, tyre/tyer 1613, sabib 1627, cot 1634, pundit 1672, bungalow 1676, dungaree 1696, tom-tom 1693, maharaja, pukka, mongoose 1698, jute 1746, shampoo (vb) 1762 and jungle 1776.\n\nThe languages of Indo-China, mostly Malay, are the immediate source of a few Early Modern English loans, including bamboo 1598, paddy 1623, cockatoo 1634, orangoutang 1699 and kapok 1750. There are also some words borrowed from Chinese, such as Japan 1577, litchi 1588, ginseng 1654 and ketchup 1711. Japanese loan words include shogun 1615, sake 1687, soy 1696 and mikado 1727.\n\nWith the first English colonies in Virginia and New England, direct contacts were established with North America in the early seventeenth century. Besides the rich inheritance of place names, there are a number of words relating to wildlife and the local ways of life that were borrowed from North-American Indian languages, for instance, racoon 1608, opossum 1610, moccasin, persimmon 1612, moose 1613, wigwam 1628, papoose, skunk, tomahawk 1634, hickory 1676, totem 1760 and totem 1760. Direct South-American loans are, by contrast, rare – Inca 1594, jaguar 1604 and jacaranda 1753 are among the few recorded. Much of the lexical influence of South-American Indian languages was mediated through Spanish (see above, 5.4.3.3.3).\n\n5.5 Word-formation\n\n5.5.1 Introduction\n\nWord-formation is concerned with the patterns of language on which new lexemes are formed. It accounts for composites which are analysable both\nformally and semantically. Basically they consist of a sequence of a modifying element (determinant) and the element modified (determinatum). Using this distinction, the main EModE word-formation processes can be described in terms of free lexemes or bases and bound affixes as follows (Marchand 1969: 2; Lyons 1977: 521; Quirk et al. 1985: 1520):\n\n1. derivations consisting of an affix and a base:\n a. prefixation adding a prefix (determinant) to the base (determinatum) without a change of word class (hero → anthero (1714); see 5.5.2)\n b. suffixation adding a suffix (determinatum) to the base (determinant), usually with a change of word class (modernize → modernizer (1739); see 5.5.3)\n\n2. compounding adding a base to another (bread + basket → bread-basket (1522), determinant + determinatum; see 5.5.4)\n\n3. conversion (or zero-derivation) assigning the base to a different word class without changing its form (pioneer n. (1523) → pioneer vb (1780); see 5.5.5)\n\nThis classification reflects the important typological change in English from stem-formation in Old English to word-formation as we know it today. In the course of the Middle English period invariant free lexemes came to be established as bases for word-formation, and the rich stem allomorphy of OE was largely lost in derivational morphology (see Kastovsky 1985, 1992a). In this respect Early Modern English is already Modern. As far as productive means of affixation are concerned, however, it is expanding. At the end of the period, the set of productive prefixes and suffixes closely resembles the present-day one.\n\nWord-formation processes are best classified in structural terms, i.e. in terms of the word-classes that they apply to and those that they produce. So terms such as denominal and deverbal are used below to refer to lexemes formed from nouns and verbs, respectively. Moderniser is an instance of a deverbal noun, a noun derived from the verb modernise by means of the suffix -er. Prefixes also apply to specific word classes but no word-class change is effected as a result of prefixation. Since prefixes constitute a closed class, the options available at any given time are accounted for by a semantic classification of the productive elements (see 5.5.2).\n\nForeign influence is reflected in Early Modern English word-formation in a sharp increase of non-native elements as productive affixes. New affixes arise as a sufficient number of borrowed complex lexemes are interpreted as morphologically transparent. This happened to a wealth of Middle English loans, which were integrated into English and analysed as consisting of a base and a separate meaningful affix. The new adoptive affixes had\na profound effect on the composition of the Early Modern English lexicon in that, as the number of affixes multiplied, non-native elements clearly outnumbered the native in terms of both type and token frequency.\n\nAs most of these newly adopted affixes were practically limited to foreign – Romance and classical – bases, the effects of their naturalisation can be seen in a quantitative shift towards a non-native basis of coining new words in Early Modern English. This development finally establishes two lexical strata in the English lexicon, with some far-reaching consequences for the phonological and morphological makeup of the language (see Lass, this volume).\n\nAccording to the information contained in the CED, the share of Germanic bases in new coinages falls from about thirty-two per cent at the beginning of the Early Modern English period to some thirteen per cent at the end. They are outnumbered by French and, since the end of the sixteenth century, Latin bases. It is in fact Latin that is the single most frequent source of new derivations from the mid-seventeenth century onwards. An even more dramatic change is observed in the etymological distributions of affixes. At the beginning of our period, the proportion of native affixes was some eighty per cent of all new derivations, but at the end, a mere thirty per cent (Wermser 1976: 64, 67).\n\n5.5.2 Prefixation\n\nWhile prefixation was poorly represented in Middle English word-formation, proportionately more new prefixes were introduced into Early Modern English than suffixes. This multiplication of prefixes increased synonymous means of derivation, especially in literary and other technical registers.\n\nWe may turn to hybrid forms in order to see how well the new affixes were integrated. The use of Latinate affixes with native bases spread in Early Modern English. This suggests that they were analysable to native speakers and becoming assimilated into the Early Modern English lexicon. It is, however, interesting to note that very few new hybrids of this kind occur in the writings of Elyot, Ascham, Mulcaster, Jonson and other scholars of the time. Most classicists were conservative and preferred homogeneous morphemes. They may be contrasted with more liberal neologisers, who did not hesitate to combine heterogeneous elements.\n\nGarner (1983) compared Shakespeare’s use of twelve Latinate and five native prefixes in hybrid forms with their use in the 1611 Authorised Version of the Bible. The Latin prefixes included were con-, contra-, de-, dis-,\nin- (negative), inter-, post-, pre-, pro-, re-, super- and trans-; the native forms were be-, fore-, out-, over- and under-. Garner found that Shakespeare used 101 different hybrid words 178 times altogether. If hybrids with un- are included, the number of hybrid lexemes rises to 400. The Authorised Version contains only seven hybrids used twenty-four times in all; with the prefix un-, the number amounts to forty-one, approximately one tenth of the number found in Shakespeare. None of those appearing in the Bible are new formations, but most of them go back to Middle English, whereas Shakespeare can here be credited with as many as 137 neologisms. The rest of his hybrids are mostly renaissance formations. If un- is excluded from the account, only the following hybrids occur in the Bible: recall, renew, fore-ordain, overcharge, overpast, overplus and overturn; of them, only the forms with re involve a borrowed prefix. By contrast, the sole prefixes with no hybrid forms in Shakespeare are de- and pro-, both still of limited use in Early Modern English. It appears that, even in the Renaissance, hybrids were often controlled by etymological considerations. Hence learned borrowing did not promote maximal integration of the borrowed elements.\n\nUnlike many borrowed suffixes, prefixes do not affect the sound structure of the base, but they may themselves carry either a secondary or primary stress (see further Lass, this volume). As they do not change the word-class of the base, and (some two thirds of the productive prefixes in Early Modern English) are not limited to any one", "num_tokens": 2048} {"category": "olmocr_science_pdfs-literature", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-literature/part-00-00000.npy", "text": " fictions of the 1750s’ (Lupton, 2011, p. 292), features the opposite approach to authorial narration, increasing the self-reflexive tendency of the technique to the point of excess. This is done, for one thing, by playfully emphasizing the family resemblances to Fielding’s work. In the introduction, the narrative voice is explicitly marked as imitating Fielding’s style. The narrator\n\n12 The novel has been attributed to Sarah Fielding (who is still listed as the author, for example, in the catalogue of the digital library of the Bayerische Staatsbibliothek), but the critical consensus seems to be that this is a misattribution (see Foster, 2004, p. 62; Moore, 2013, p. 759).\nintroduces himself as an illegitimate child, ‘the first begotten, of the poetical issue, of the much celebrated Biographer of Joseph Andrews, and Tom Jones’ (CS I, p. 3). The homage to Fielding is furthermore evident both in the highly intrusive authorial commentary and in the novel’s plot: the protagonist, the orphaned Charlotte Summers, is taken in by the benevolent, Allworthy-like Lady Bountiful. Like Tom Jones, Charlotte is forced to leave and to go on an adventurous journey that eventually brings her to London and unsavoury places like a brothel and a debtor’s jail. In the end, both her lost parents reappear, so that (again like Tom Jones) she turns out not to be an orphan after all, and she is allowed to marry the man she loved all along, Lady Bountiful’s son Thomas.\n\nLike the authorial narrator in Fielding’s novels, the narrator of Charlotte Summers throughout the novel comments extensively not only on the characters and events but particularly conspicuously on his narrative technique, which is frequently compared with Fielding’s. He resolves to imitate, for instance, the division into chapters and books, which are prefaced by digressive introductory chapters:\n\n> These were Mr. F—g’s nodding Places for his Readers; for he it seems could not take a Nap, but he was obliged to pump and sweat for laborious Dullness to please them […]; but it was his Misfortune to be a Wit, and consequently out of his natural Element when endeavouring to be really stupid; but for me whose Wit is borrowed and the Effect of Art, and to whom Dullness is natural, there is nothing in Nature more easy to me than to take a sound Nap with my Readers for twenty pages together (CS I, p. 33).\n\nSuch playful disparagements of his own abilities are typical of this narrator, who is preoccupied with the question of how the reader will experience and react to the narrative. One main means of exploring this question is to take the trope of the author-reader relationship as face-to-face interaction to an extreme: the narrator not only envisages himself, like Fielding in Tom Jones, as an inn-keeper who provides for his guests (CS I, p. 4) and as the arbitrator of social relationships who brings his readers ‘into the Company’ (CS I, p. 12) of the characters. He also offers a whole scenario in which the READING IS TRAVELLING and the READING IS SOCIAL INTERACTION metaphors are combined and extended:\n\n13 Citations are to the Corbett edition from 1750 (available on ECCO).\nBefore I introduce my Readers to the Company of Miss Charlotte Summers, I must make them acquainted with some of her Friends [...], for which Purpose, I must beg their Company as far as Carmarthenshire, in Wales. [...] We Authors are always provided with an easy flying Carriage, which can waft our Readers in an Instant [...]: We are Masters of a Kind of Magic, that we have only to speak the Word, and \n\npresto, you are transported [...] to the Place where we would have you attend us. Don’t you find already the magical Effect? The Journey is over, and we are just alighted at the Gate of a stately old Building [...]. You may enter freely, I’ll conduct you to the Parlour, where you may have the Honour to salute the hospitable Owner of this venerable Mansion (CS I, p. 13).\n\n‘Author’ and ‘reader’ are both imagined as acting participants in the fictional world rather than as the producer and recipient of a book. Of course, by explicitly evoking the process of readerly immersion into the fictional world, the narrator disrupts rather than enhances it. Similarly, by insisting on the supernatural powers of the author, the narrator draws attention to the *differences* between actual travel and the reader’s mental travel, the magical use of words to affect time and space, and the writer’s use of words to describe time and space. The outlandish image of the author’s superior power raises the question of his or her actual influence: what kind of impact do narratives actually have on their readers?\n\nIn fact, the specific image of the magician is itself already ambivalent with regard to the question of power. He could either be a wizard performing real magic, or an illusionist with a bag of tricks – the word ‘presto’, in particular, suggests a commercial performance rather than a supernatural action. Like the innkeeper who needs to advertise his services and keep his customers happy in order to make a living, the magician could then also be read as a figure representing the dependence of the author on the reader. The reader is somebody to be manipulated, but also to be enticed and convinced (in the rhetorical manoeuvre performed in the passage) – and also somebody who may prove to be beyond the author’s control, and even in turn exerting control on the author. Rather than just asserting a sense of authorial power (however playfully), this passage – like many of the other metadiscursive comments – raises the question of its extent and limits.\n\nThis ambivalence with regard to author-reader relations is also evident in a particularly noticeable feature of the novel: its projection of possible reader reactions as concrete situations or interjections (a technique that was subsequently also used, among others, by Laurence Sterne in *Tristram*\nShandy and, a century later, by William Makepeace Thackeray in Vanity Fair):\\textsuperscript{14}\n\nI fancy by this Time, my Readers are pretty well acquainted with the Lady Bountiful, and ready to thank me for the Pains I have taken, to introduce them into such valuable company, but I can hear Beau Thoughtless and pretty Miss Pert, whispering to one another, ‘Hang the old Woman, I wish we were done with her, we have seen enough of her, I wish to see the young Wench, there has been so much talk about, whereabout can she be? Sure she’s locked up in the old Lady’s Closet. The Devil take our Conductor, after leading us such a Dance, from London to Carmarthenshire, to keep us so long from what we want to see;’ but I must inform the pretty Triflers, that I am determined my Readers shall learn something in every Chapter, and in this, amongst other Things, they much learn and practice Patience [...]. But that you may not be altogether discourag’d, I must tell you, that I am now going to speak of her [Lady Bountiful’s] Faults; a Subject I am sure you cannot be so soon weary of, as it borders so much on your dearly beloved scandal (CS I, pp. 24-25).\n\nFurther reader figures whose reactions are described in detail include Miss Censorious, who is shocked (though also fascinated) by any hints of sexual misconduct, Arabella Dimple, who reads Charlotte Summers in bed and has taken the already-cited commentary about the nap seriously, so that she has to turn back a few pages to understand what is going on in the narrative, and the Widow Lackit, who insists that the novel’s ending include the protagonist’s marriage.\n\nWayne Booth points out the ridiculous character of ‘this multifarious “reader”, who is always, underneath his various disguises, the same stupid person introduced for the real and unspecified reader to laugh at’ (Booth, 1952, p. 181). Clearly, these reader figures represent expectations towards the novel that are not altogether admirable (though not, I would argue, identical): Thoughtless and Pert want racy entertainment, Miss Censorious wants an affirmation of her hypocritical sense of moral superiority, and the Widow Lackit wants vicarious gratification. The actual reader is certainly not invited to identify with these satirically drawn figures, and by evoking concrete circumstances and even dialogue, the novel makes them appear as a special type of fictional character rather than a stand-in for myself as\n\n\\textsuperscript{14} Booth, in fact, sees Charlotte Summers as a missing link between Tom Jones and the more radically self-reflexive Tristram Shandy (see Booth, 1952, p. 181).\nI am perusing the text. However, it should be noted that the novel, while making fun of these readers’ attitudes and demands, at the same time caters to them. The way Thoughtless, Pert and Censorious talk about Charlotte, for example, highlights the sexual interest that can be taken in the descriptions of the ‘young wench’, who is, like Richardson’s Pamela and Clarissa, continually exposed to unwanted sexual attention in the novel (and, for example, nearly raped by a man who adopts the same trick as Mr. B. in *Pamela* when he switches places with the heroine’s maid and bedfellow one night). Similarly", "num_tokens": 2048} {"category": "olmocr_science_pdfs-literature", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-literature/part-00-00000.npy", "text": " a list of contributors, see page 59.\nTHE MORAL WARRIOR\nEthics and Service in the U.S. Military\nMARTIN L. COOK\n\nFor the first time in history, the capabilities of the U.S. military far outstrip those of any potential rival, either singly or collectively, and this reality raises fundamental questions about its role, nature, and conduct. The Moral Warrior explores a wide range of ethical issues regarding the nature and purpose of voluntary military service, the moral meaning of the unique military power of the United States in the contemporary world, and the moral challenges posed by the “war” on terrorism.\n\n“The Moral Warrior is a thoughtful, subtle, and penetrating study of the ethical challenges that military leaders need to meet as they respond to demanding new missions from Kosovo to Iraq. Martin L. Cook is a fine teacher: clear, undogmatic, and compassionate. I hope his views find a wide audience.”\n— Michael Ignatieff, Carr Professor of Human Rights Policy at the Kennedy School of Government, Harvard University\n\n“The book reflects the author’s unique personal and academic background: trained in the study of ethics, he chose to teach at one of the nation’s war colleges, where he became deeply familiar with contemporary military issues in a way unavailable to most. This is throughout a highly intelligent, engaging, and accessible book. It adds the important perspective of what it means in moral terms to be a soldier and sets a new standard for what needs to be included in thinking seriously about the United States’ use of military force.”\n— James Turner Johnson, author of Morality and Contemporary Warfare\n\n“Martin Cook reflects on the difficult moral choices facing American military and policy planners as they employ the latest technologies to fight a new global war. Cook brings to that reflection not only expertise in philosophy, law, and history, but also a deep appreciation of ground-level, operational detail. He has produced an indispensable resource.”\n— Joel H. Rosenthal, President of the Carnegie Council on Ethics and International Affairs\n\nCurrently Professor of Philosophy at the United States Air Force Academy, Martin L. Cook spent five years as Professor of Ethics at the United States Army War College.\nSUSTAINABILITY AND SPIRITUALITY\n\nJOHN E. CARROLL\n\nFOREWORD BY BILL MCKIBBEN\n\nThis groundbreaking book explores the inherent interconnectedness of sustainability and spirituality, acknowledging the dependency of one upon the other. John E. Carroll contends that true ecological sustainability, in contrast to the cosmetic attempts at sustainability we see around us, questions our society's fundamental values and is so countercultural that it is resisted by anyone without a spiritual belief in something deeper than efficiency, technology, or economics. Carroll draws on the work of cultural historian and “geologian” Thomas Berry, whose eco-spiritual thought underlies many of the sustainability efforts of communities described in this book, including particular branches of Catholic religious orders and the loosely organized Sisters of the Earth. The writings of Native Americans on spirituality and ecology are also highlighted. These models for sustainability not only represent the tangible link between ecology and spirituality, but also, more importantly, a vision of what could be.\n\n“Carroll begins his journey looking for examples of environmental sustainability, and I think he has found them—more convincing examples than people who have looked in more obvious and secular places. But along the way he has found something related, and just as important: examples of human sustainability, hints about ways that we might reshape our attitudes as compellingly as our kitchens and gardens and boilers.” — from the Foreword by Bill McKibben\n\n“Carroll clearly addresses a key topic for those interested in the relationship between ecology and ethics, and makes clear that sustainability is not possible without a deep change of values and commitment to a lifestyle. It cannot be achieved simply as an expression of economic functionality nor as an expression of ideology alone.”\n— Rosemary Radford Ruether, coeditor of Christianity and Ecology: Seeking the Well-Being of Earth and Humans\n\nJohn E. Carroll is Professor of Environmental Conservation at the University of New Hampshire. He is the author and editor of many books, including (with coeditor Keith Warner) Ecology and Religion: Scientists Speak.\nInterviews with prominent filmmakers, actors, and others on the art, craft, and business of moviemaking.\n\nA volume in the SUNY series, Cultural Studies in Cinema/Video\n\nWheeler Winston Dixon, editor\n\n320 pp.\nIllustrated: 17 b/w photographs\n$29.95 pb ISBN 0-7914-6156-4\n$86.50 hc ISBN 0-7914-6155-6\n\nJuly\n\nFILM STUDIES\n\nFor a list of contributors, see page 59.\n\nFILM VOICES\n\nInterviews from Post Script\nGERALD DUCHOVNAY, EDITOR\n\nThis collection of interviews brings together major Hollywood directors and actors, independent filmmakers, screenwriters, and others to discuss the art, craft, and business of making movies. Whether it be Clint Eastwood or Francis Ford Coppola, Vittorio Storaro or Dede Allen, these filmmakers detail how they strive for quality, the price they pay to do so, and how new technologies and the business aspects of filmmaking impact all aspects of their creativity. Taken together, the interviews reveal much about filmmaking practices in and out of Hollywood.\n\n“Instead of adhering to the usual tendencies to valorize prominent Hollywood figures, this book balances ‘mainstream’ directors with ‘independent’ and international voices. And, most innovatively, the book extends the notion of filmmaker beyond directors to include editors, actors, screenwriters, and cinematographers. The interviews provide fascinating insights into each filmmaker’s work and his or her views on filmmaking, and they contain a wealth of information about conditions of production, styles of filmmaking, the selection and use of actors, the filmmakers’ conceptions of editing, the uses of lighting and color, cinematography, and cultural, political, and aesthetic points of view.” — Marcia Landy, author of Italian Film and coeditor of Stars: The Film Reader\n\nThe interviewees include Dede Allen, Robert Altman, Jamie Babbit, Don Bluth, Francis Ford Coppola, Robert Downey Sr., Clint Eastwood, Atom Egoyan, Horton Foote, Stephen Frears, Barbara Hammer, Louis Malle, Sydney Pollack, Oliver Stone, Vittorio Storaro, Paul Verhoeven, and James Woods.\n\nGerald Duchovnay is Professor of English and Head of the Department of Literature and Languages at Texas A&M University at Commerce. He is general editor of the international film journal Post Script: Essays in Film and the Humanities and author of Humphrey Bogart: A Bio-Bibliography.\nBASHŌ’S HAIKU\nSelected Poems of Matsuo Bashō\nMATSUO BASHŌ\nTranslated and with an Introduction by DAVID LANDIS BARNHILL\n\nBashō’s Haiku offers the most comprehensive translation yet of the poetry of Japanese writer Matsuo Bashō (1644–1694), who is credited with perfecting and popularizing the haiku form of poetry. One of the most widely read Japanese writers, both within his own country and worldwide, Bashō is especially beloved by those who appreciate nature and those who practice Zen Buddhism. Born into the samurai class, Bashō rejected that world after the death of his master and became a wandering poet and teacher. During his travels across Japan, he became a lay Zen monk and studied history and classical poetry. His poems contained a mystical quality and expressed universal themes through simple images from the natural world.\n\nDavid Landis Barnhill’s brilliant book strives for literal translations of Bashō’s work, arranged chronologically in order to show Bashō’s development as a writer. Avoiding wordy and explanatory translations, Barnhill captures the brevity and vitality of the original Japanese, letting the images suggest the depth of meaning involved. Barnhill also presents an overview of haiku poetry and analyzes the significance of nature in this literary form, while suggesting the importance of Bashō to contemporary American literature and environmental thought.\n\n“This is a very well-researched translation of Bashō’s poetry that does an outstanding job of presenting this valuable material for those interested in Japanese culture, especially literature and religion. It is a first-rate work that clearly reflects the author’s long and intense devotion and commitment to the topic. It will stand out as unique because of the range of poetry that it covers.”\n— Steven Heine, coeditor of Japan in Traditional and Postmodern Perspectives\n\nDavid Landis Barnhill is Director of Environmental Studies and Professor of English at the University of Wisconsin at Oshkosh. He is the coeditor (with Roger S. Gottlieb) of Deep Ecology and World Religions: New Essays on Sacred Ground, also published by SUNY Press, and the editor of At Home on the Earth: Becoming Native to Our Place: A Multicultural Anthology.\nPsychoanalysts have traditionally been expert at uncovering what afflicts and damages people, argues Jeffrey B. Rubin, but by focusing on narcissism and perversions, depression and sadism, psychoanalysis has all too often disregarded what nourishes and sustains us. In *The Good Life*, he demonstrates how psychoanalysis can make a profound contribution to the well-lived life by drawing on a neglected but potent aspect of psychoanalysis—its capacity to illuminate a psychology of health as well as illness. Rubin shows that, at its best, psychoanalysis can highlight both the ingredients of love, ethics, creativity, and spirituality, as well as the obstacles to experiencing them. Exploring the good life from this dual perspective provides an indispensable resource for helping us live with greater meaning and vitality.\n\n“The author has picked areas of basic importance to thread through psychoanalysis and spirituality: love, ethics, and creativity. He discusses important research in each", "num_tokens": 2048} {"category": "olmocr_science_pdfs-literature", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-literature/part-00-00000.npy", "text": " makes a being human or inhuman. These two texts rely upon something “other” in order to analyze the fears of humanity, along with their tendencies toward godlessness and loss of humanity. In both cases, the “other” often exhibits more human characteristics than the other characters within the works, thus challenging the reader’s perceptions and expectations regarding what is considered human and what disturbs the title of “monster”.\n\nShelley’s *Frankenstein* is a classic horror novel, celebrated by some as the first science fiction novel ever written. The idea of a being having been created in a laboratory environment is frightening to the Victorian reader as it is unheard of and considered playing God. Creation is supposed to remain the privilege of an all-powerful Being, not a mere fiddling with chemicals and materials. The idea of a mad scientist mentality is frightening in its simplicity and relatability, for curiosity is a universal human emotion, and the consequences of such are often not as horrible as in this particular instance. In\nVictorian society, doubting religion in the favor of science was considered commonplace and yet strictly cerebral. In practice, it was frowned upon and even demonized, thus ensuring a negative reaction to this particular novel (O’Malley 178), for disgust and concern were considered common emotions in relation to the creation of the entity within *Frankenstein*, inciting pity and fear simultaneously and complicating the perception of all characters within the novel. Indeed, the typical Victorian reader would be likely to hold the same opinion as the novel itself in regards to experimentation with such creation: “How dangerous is the acquirement of knowledge and how much happier that man is who believes his native town to be the world, than he who aspires to be greater than his nature will allow” (Shelley 37). This statement in regards to the experiments of the doctor and the subsequent consequences is most poignant, for it looks backward instead of forward within the confines of the novel itself, although it does warn others who may desire to tinker with creation. This warning also improves the reliability of the narrator since hindsight is better informed than anyone within the situation itself, and his experiences throughout his life definitively point to his regret at his scientific experimentation and its consequences.\n\nAdditionally, the personality of the created itself varies throughout the novel, thus calling into question the very definition of what makes a being monstrous or human. It is considered a monster by both its creator and the average reader, yet there is quite a bit of ambivalence surrounding whether or not that is due to nature or nurture, for it appears that it is the rejection by Dr. Frankenstein that inspires such violence and terror-inducing actions, instead of a blatantly primal desire to inspire fear and loathing. Indeed, this novel is a testament to the effects of reacting negatively to an individual’s appearance, for over\ntime it wears down the ability to perceive oneself as anything but a monster. Indeed, the\ncreature itself appears to be fully aware of this fact: “I do know that for the sympathy of\none living being, I would make peace with all. I have love in me the likes of which you\ncan scarcely imagine and rage the likes of which you would not believe. If I cannot\nsatisfy the one, I will indulge the other” (Shelley 101). This statement of emotion\nillustrates this creature’s desire for love and affection, just as any other being desires the\nsame. It is also incredibly important to witness the self-awareness and sentience of this\ncreated being, an awareness so strong that it could be considered far better than that of its\ncreator, who knew little enough of himself to cause him to create a creature he was\nunable to love and protect after the fact.\n\nThis novel has perhaps the most complicated approach to godlessness of the texts\nunder consideration, for it does include a monstrous creature who wreaks havoc and does\nmany horrible things, yet the true godlessness lies not in the created, but in the creator. It\nis through playing God that humanity loses its morality and descends into godlessness,\nthus plunging Dr. Frankenstein into that state. Through playing God and attempting to\ncreate a creature in his own image, Dr. Frankenstein does the exact opposite:\n\n‘Hateful day when I received life!' I exclaimed in agony. 'Accursed creator! Why\ndid you form a monster so hideous that even you turned from me in disgust? God,\nin pity, made man beautiful and alluring, after his own image; but my form is a\nfilthy type of yours, more horrid even from the very resemblance. Satan had his\ncompanions, fellow-devils, to admire and encourage him; but I am solitary and\nabhorred.’ (Shelley 88)\nIt is an entirely new type of madness to create that which does not wish to be created, for it is clear that the monster wishes he had never been born, as his life has been one rejection after another, spiraling into violence and seclusion. To create merely from a scientific curiosity is utterly inadequate and ultimately harmful to everyone and everything involved. The doctor destroys his life and the life of many others – including the life of his created – by mere curiosity and the hunger for power and knowledge. This is what true godlessness is: dabbling in that which man was never intended to.\n\nThe idea of the creature as a monster due to perception instead of complete accuracy is furthered by his ability to appreciate the world into which he came. Indeed, he is far more capable than most of humanity, becoming easily fascinated by the surrounding nature. This is perhaps because the creature considers itself damned and unredeemable, yet perhaps he is merely misunderstood and not given a chance by anyone who encounters him. Its appreciation of the simple joys of life is certainly not matched by the doctor, instead far surpassing him:\n\nEven broken in spirit as he is, no one can feel more deeply than he does the beauties of nature. The starry sky, the sea, and every sight afforded by these wonderful regions, seems still to have the power of elevating his soul from earth. Such a man has a double existence: he may suffer misery, and be overwhelmed by disappointments; yet, when he has retired into himself, he will be like a celestial spirit that has a halo around him, within whose circle no grief or folly ventures.\n\n(Shelley 192)\n\nThis passage in and of itself may be enough to redeem him in a reader’s eye, drawing on pity as opposed to disgust and fear. This detailed account of the thoughts and desires of\nthis creature touches a chord, for its humanity is apparent and its appreciation of its surroundings obvious. In this manner, it is in conjunction with the finer feelings of humanity and religion, challenging the novel to provide a valid argument for this creature being a monster. Thus, the most terrifying thing within this novel becomes the thought of creating a living thing from that which was merely chemicals or, worse, that which was dead and never intended to live again. The morbidity of the scientific experiments is thrilling, yet utterly godless and therefore unforgiveable, especially due to the consequences, unforeseen or otherwise. Scientific experimentation, although fascinating and encouraged from a medical point of view, would never have been considered a gateway to creation, but instead to prolonging life already given. Dr. Frankenstein’s cursed attempts at creating something other would be shunned in civilized society, thus agreeing with his own fears and attempts at concealment (O’Malley 79). It is therefore Frankenstein himself who ensures that his creature is a monster merely by creating it; he furthers this impression as he himself considers it damned due to its unnatural appearance.\n\nMeyer’s *The Host* deals with a detailed alien species much calmer and more induced to peaceful society than our own, thus bringing the very ethics of the existence of our own species into question and enabling exploration of the depths of human emotion. The fear of loss of humanity is incredibly complex within this novel, for humanity is irrevocably entwined with an alien entity, making the two nearly one and the same. This allows exploration of two different types of psyche, as well as looking at the consequences of complete loss of humanity in such unusual circumstances.\nThis novel is unique in that it possesses two heroines residing in the same body: an alien dubbed Wanda and the physical host body of Melanie. These two characters have completely different personalities, making characterization complex and complicating the reactions other characters have toward them. Additionally, as Wanda is an alien species attempting to take over and inhabit the planet, there is a great deal of animosity toward her. This anger and fear is indicative of what loss of humanity truly means, and this unfolds throughout the novel. There are times when Wanda, being alien, acts in a far gentler, more humane way than any other character present or aware of the situation. For example, in desperation to understand the ways in which the aliens inhabit the physical bodies of humans, the group with which Wanda and Melanie live often experiments on the bodies of captured alien-infested humans in an attempt to understand the connection. Through their ignorance about the connection between the two species, they wreak havoc instead of acquiring helpful knowledge:\n\nBrighter than these were other silver things. Shimmering segments of silver stretched in twisted, tortured pieces across the table…tiny silver strands plucked and naked and scattered…splatters of silver liquid smeared on the table, the blankets, the walls… The quiet in the room was shattered by my scream. The whole room was shattered. It spun and shook to the sound, whirled around me so that I couldn’t find the way out. The walls, the silver-stained walls, rose up to block my escape no matter which way I turned. (Meyer 547)\n\nThis passage is the clearest and rawest instance of Wanda’s humanity, or her sense of morality and", "num_tokens": 2048} {"category": "olmocr_science_pdfs-literature", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-literature/part-00-00000.npy", "text": "ed neither north nor south,\nNeither east nor west,\nBut sat him down at Megan's feet\nAs love-bird on his nest,\nAnd wooed her with a silent awe,\nWith trouble not expressed;\nShe sang the tears into his eyes,\nThe heart out of his breast:\nSo he loved her, listening so.\n\nShe sang the heart out of his breast,\nThe words out of his tongue;\nHand and foot and pulse he paused\nTill her song was sung.\nThen he spoke up from his place\nSimple words and true:\n'Scantly goods have I to give,\nScantly skill to woo;\n\nBut I have a will to work,\nAnd a heart for you:\nBid me stay or bid me go.'\n\nThen Megan mused within herself:\n'Better be first with him,\nThan dwell where fairer Margaret sits,\nWho shines my brightness dim,\nFor ever second where she sits,\nHowever fair I be:\nI will be lady of his love,\nAnd he shall worship me;\nI will be lady of his herds\nAnd stoop to his degree,\nAt home where kids and fatlings grow.'\n\nSped a shepherd from the height\nHeadlong down to look,\n(White lambs followed, lured by love\nOf their shepherd's crook):\nHe turned neither east nor west,\nNeither north nor south,\nBut knelt right down to May, for love\nOf her sweet-singing mouth;\nForgot his flocks, his panting flocks\nIn parching hill-side drouth;\nForgot himself for weal or woe.\n\nTrilled her song and swelled her song\nWith maiden coy caprice\nIn a labyrinth of throbs,\nPauses, cadences;\nClear-noted as a dropping brook,\nSoft-noted like the bees,\nWild-noted as the shivering wind\nForlorn through forest trees:\nLove-noted like the wood-pigeon\nWho hides herself for love,\nYet cannot keep her secret safe,\nBut coos and coos thereof:\nThus the notes rang loud or low.\n\nHe hung breathless on her breath;\nSpeechless, who listened well;\nCould not speak or think or wish\nTill silence broke the spell.\nThen he spoke, and spread his hands,\nPointing here and there:\n'See my sheep and see the lambs,\nTwin lambs which they bare.\nAll myself I offer you,\nAll my flocks and care,\nYour sweet song hath moved me so.'\n\nIn her fluttered heart young May\nMused a dubious while:\n'If he loves me as he says'--\nHer lips curved with a smile:\n'Where Margaret shines like the sun\nI shine but like a moon;\nIf sister Megan makes her choice\nI can make mine as soon;\nAt cockcrow we were sister-maids,\nWe may be brides at noon.'\nSaid Megan, 'Yes;' May said not 'No.'\n\nFair Margaret stayed alone at home, \nAwhile she sang her song, \nAwhile sat silent, then she thought: \n'My sisters loiter long.'\n\nThat sultry noon had waned away, \nShadows had waxen great: \n'Surely,' she thought within herself, \n'My sisters loiter late.'\n\nShe rose, and peered out at the door, \nWith patient heart to wait, \nAnd heard a distant nightingale \nComplaining of its mate;\n\nThen down the garden slope she walked, \nDown to the garden gate, \nLeaned on the rail and waited so.\n\nThe slope was lightened by her eyes \nLike summer lightning fair, \nLike rising of the haloed moon \nLightened her glimmering hair,\n\nWhile her face lightened like the sun \nWhose dawn is rosy white. \nThus crowned with maiden majesty \nShe peered into the night,\n\nLooked up the hill and down the hill, \nTo left hand and to right, \nFlashing like fire-flies to and fro.\n\nWaiting thus in weariness \nShe marked the nightingale \nTelling, if any one would heed, \nIts old complaining tale.\n\nThen lifted she her voice and sang, \nAnswering the bird: \nThen lifted she her voice and sang, \nSuch notes were never heard\n\nFrom any bird when Spring's in blow.\n\nThe king of all that country \nCoursing far, coursing near,\nCurbed his amber-bitted steed,\nCoursed amain to hear;\nAll his princes in his train,\nSquire, and knight, and peer,\nWith his crown upon his head,\nHis sceptre in his hand,\nDown he fell at Margaret's knees\nLord king of all that land,\nTo her highness bending low.\n\nEvery beast and bird and fish\nCame mustering to the sound,\nEvery man and every maid\nFrom miles of country round:\nMegan on her herdsman's arm,\nWith her shepherd May,\nFlocks and herds trooped at their heels\nAlong the hill-side way;\nNo foot too feeble for the ascent,\nNot any head too grey;\nSome were swift and none were slow.\n\nSo Margaret sang her sisters home\nIn their marriage mirth;\nSang free birds out of the sky,\nBeasts along the earth,\nSang up fishes of the deep--\nAll breathing things that move\nSang from far and sang from near\nTo her lovely love;\nSang together friend and foe;\n\nSang a golden-bearded king\nStraightway to her feet,\nSang him silent where he knelt\nIn eager anguish sweet.\nBut when the clear voice died away,\nWhen longest echoes died,\nHe stood up like a royal man\nAnd claimed her for his bride.\nSo three maids were wooed and won\nIn a brief May-tide,\nLong ago and long ago.\n\nChristina Georgina Rossetti\nMargaret Has A Milking-Pail\n\nMargaret has a milking-pail,\nAnd she rises early;\nThomas has a threshing-flail,\nAnd he’s up betimes.\nSometimes crossing through the grass\nWhere the dew lies pearly,\nThey say ‘Good morrow’ as they pass\nBy the leafy limes.\n\nChristina Georgina Rossetti\nMARVEL of marvels, if I myself shall behold\nWith mine own eyes my King in His city of gold;\nWhere the least of lambs is spotless white in the fold,\nWhere the least and last of saints in spotless white is stoled,\nWhere the dimmest head beyond a moon is aureoled.\nO saints, my beloved, now mouldering to mould in the mould,\nShall I see you lift your heads, see your cerements unroll'd,\nSee with these very eyes? who now in darkness and cold\nTremble for the midnight cry, the rapture, the tale untold,—\nThe Bridegroom cometh, cometh, His Bride to enfold!\n\nCold it is, my beloved, since your funeral bell was toll'd:\nCold it is, O my King, how cold alone on the wold!\n\nChristina Georgina Rossetti\nMaude Clare\n\nOut of the church she followed them\nWith a lofty step and mien:\nHis bride was like a village maid,\nMaude Clare was like a queen.\n\n“Son Thomas, ” his lady mother said,\nWith smiles, almost with tears:\n“May Nell and you but live as true\nAs we have done for years;\n\n“Your father thirty years ago\nHad just your tale to tell;\nBut he was not so pale as you,\nNor I so pale as Nell.”\n\nMy lord was pale with inward strife,\nAnd Nell was pale with pride;\nMy lord gazed long on pale Maude Clare\nOr ever he kissed the bride.\n\n“Lo, I have brought my gift, my lord,\nHave brought my gift, ” she said:\nTo bless the hearth, to bless the board,\nTo bless the marriage-bed.\n\n“Here’s my half of the golden chain\nYou wore about your neck,\nThat day we waded ankle-deep\nFor lilies in the beck:\n\n“Here’s my half of the faded leaves\nWe plucked from the budding bough,\nWith feet amongst the lily leaves, -\nThe lilies are budding now.”\n\nHe strove to match her scorn with scorn,\nHe faltered in his place:\n“Lady, ” he said, - “Maude Clare, ” he said, -\n“Maude Clare, ” – and hid his face.\nShe turn’d to Nell: “My Lady Nell, \nI have a gift for you; \nThough, were it fruit, the blooms were gone, \nOr, were it flowers, the dew.\n\n“Take my share of a fickle heart, \nMine of a paltry love: \nTake it or leave it as you will, \nI wash my hands thereof.”\n\n“And what you leave, ” said Nell, “I’ll take, \nAnd what you spurn, I’ll wear; \nFor he’s my lord for better and worse, \nAnd him I love Maude Clare.\n\n“Yea, though you’re taller by the head, \nMore wise and much more fair: \nI’ll love him till he loves me best, \nMe best of all Maude Clare.\n\nChristina Georgina Rossetti\nMay\n\nI cannot tell you how it was,\nBut this I know: it came to pass\nUpon a bright and sunny day\nWhen May was young; ah, pleasant May!\nAs yet the poppies were not born\nBetween the blades of tender corn;\nThe last egg had not hatched as yet,\nNor any bird foregone its mate.\n\nI cannot tell you what it was,\nBut this I know: it did but pass.\nIt passed away with sunny May,\nLike all sweet things it passed away,\nAnd left me old, and cold, and gray.\n\nChristina Georgina Rossetti\nMemory\n\nI\n\nI nursed it in my bos", "num_tokens": 2048} {"category": "olmocr_science_pdfs-literature", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-literature/part-00-00000.npy", "text": " in our memories. It was one of his odd habits at the family table. If there was something that Tom wanted which happened to be out of his reach he never bothered to ask for it. He would simply stand up in his place at the table, reach across the table and spear it with his fork. If it happened to be fat meat, it might\ndrip all the way across to his plate. But it did not seem so bad in those days, for most women used oil-cloth instead of table cloths.\n\nTom would do the same thing at anybody's house when he would be there helping to thrash or raise a barn. We thought it was funny and we children used to mock him when the old folks were away and nobody was looking. \"Tommin'\" we called it. And I never to this day see anybody make a long reach at the table without thinking of Old \"By Goll\" Tom Darbyshire.\n\nThen there was John Conklin, bellwether of the Baptist church. John always raised all the money to pay the preacher and served as Sunday School superintendent for forty years. He always talked very proper, and always ate with napkins, glass goblets and pearl-handled knives and forks on the table. When his boys grew older they persuaded him to change the spelling to Conkling because they thought it looked more impressive that way.\n\nOne thing gave John a strange appearance, and came from his habit of always wiping his mustache the same way, from left to right. In time it got to growing that way. Generally a mustache parts in the middle and sprangles off evenly both ways. But John's mustache all headed toward his right ear. We got used to it of course, and John would have looked queer to us any other way. They were fine folks, of course, but there was a general feeling that maybe they thought themselves a little above common folks.\n\nJohn Tucker was our neighborhood mystery man.\nMystery surrounded his whole family, for nobody was ever able to get acquainted with any of them. The Tuckers never mixed with the rest of us to any great extent. Neighborhood gossips whispered that Tucker was a bootlegger and the Funk boys, his immediate neighbors on the west, always claimed he acted like a detective. A good many people were afraid that some day Tucker would break loose and harm someone.\n\nOnce our folks saw him digging a hole in his field along a line fence. This started the rumor that he might have murdered someone and was disposing of the body. Late that night several neighbors gathered, went to the spot and dug into the fresh dirt, but they couldn’t find a trace of anything suspicious. That only deepened the mystery!\n\nPete Funk was another mysterious figure. As far back as I can remember he had been kept locked up in his bedroom, because of insanity. All of us youngsters were afraid Pete might get loose and catch us. Whenever we saw a man walking alone through the fields we ran for home, fearing that it was Funk.\n\nPete had three boys, Pete, Henry and Lou. They were good, honest and hard working German boys, but they had an odd manner of using their breath as they talked. Ordinarily people talk with just the breath that is going out, but the Funk boys used it both ways — perhaps to save it, maybe.\n\nHenry once told of a hunting exploit when he fired a shot that killed a brant and two or three ducks. \"The other boys shot and shot,\" he said, \"but they didn’t\nkill anything. I shot and killed a brant and two ducks.” Up to the word brant he spoke normally, using the outgoing breath, but he finished the sentence from there on while inhaling. Try that yourself and see how funny it sounds. One of our steady sources of amusement was to engage the Funk boys in conversation to watch them do double duty with their breath.\n\nWe had two men in our school district by the name of Oberman. Both were John Oberman and heads of families. True to country form we invented means of telling them apart. One we called “High John” Oberman because he claimed to be high German and the other we called “Dried-Up Johnny” Oberman because he was so little and skinny. High John was an educated German who had escaped from the Fatherland in disguise and we confidently waited for the time when he would be hauled back for service in the German army. His sober countenance and his fine manners put him pretty high. He could have been elected to any office up to Justice of the Peace, I imagine. But he never seemed to have any hankering for public office.\n\nDried-Up Johnny raised his family on a rough and hilly farm at the edge of the tall timber. They were pretty poor and their children sometimes came to school with pretty slim lunches. But Dried-Up Johnny had a way of curing meat that made it taste wonderful. I can recall to this day the smell of that dried meat the kids sometimes brought to school. Then sometimes we would trade our common fodder for a bite of that dried meat. Oh, but it was good! We could taste it for hours\nand we learned not to take a drink of water for the rest of the day, just so we could keep that good taste.\n\nOver behind our fields in a clapboard shanty lived an interesting family by the name of Perkins. We never heard the old man's Christian name, he was just called Perkins. He had a fat, soft and shabby appearing wife and several scarecrow-like children. They were a shiftless lot with too great a fondness for hunting and fishing ever to amount to much. They always had three or four dogs, a couple of old guns, an old grey mare, a one-horse democrat and several stands of bees— that was about all. The old man used to hire out for wages at harvest and corn picking time for a few dollars to live on. Just how they managed to get along nobody knew.\n\nOld man Perkins had a habit of disappearing for sometimes as long as ten days or two weeks, but his family seemed to get used to it and never worried about it. His children never seemed to care very much for him, maybe because he was always bearded, ragged, lazy and shiftless.\n\nOnce he tried to find out from his son Jeff how he stood in comparison with a dog they owned.\n\n\"Jeff,\" he asked, \"If I should take Watch and go away off, and be gone for a considerable spell, which would you be lonesomest for, me or Watch?\"\n\n\"I'd druther see Watch,\" said Jeff.\n\nOne winter night there was a loud knocking at our front door. Pap, who was always a light sleeper, jumped out of bed to see who was there at that time of night.\nWe heard him say, \"Why hello, Jeff, what in blazes you doin' here this time of night?\" Jeff replied that he had come to borrow a saw.\n\n\"Borrow a saw!\" said Pap in great surprise. \"What in the world do you need of a saw in the middle of the night?\" Jeff stammered that they wanted it to cut the hatchway bigger, that the old man was caught tight in it and they couldn't get him down.\n\nBy this time we boys had our duds on and were ready for an adventure. Pap got the saw and we hurried across the field to the Perkins shanty. A dim tallow candle shone through the front window as we approached.\n\n\"What's up?\" Pap asked of Mrs. Perkins when she opened the rickety door.\n\n\"We found Pa dead in the loft,\" the old lady replied, \"and we been tryin' to get him down. He's been gone ten days I reckon, but we didn't think nothing of that, he bein' gone that way a lot. But yisteday I snifted something not jest right in the house, and tonight it got so bad I sent Jeff up into the loft to see what he could find out. And there lay Pa as dead as a mackerel.\"\n\n\"Well, well, well,\" Pap said, and then the old lady went on: \"So the boys commenced right away to git him down, and did git him part way through the hatchhole, but he was puffed up some, you see, and one arm kinder ketched back someway, and he stuck tight right where he is now.\"\n\nIt was a mess. Pap climbed up on a stool and sawed several boards off, and we all got hold and hefted\nthe old man to the floor. There was no such thing as an undertaker in those days, so Pap laid out the corpse on some boards laid across a couple of chairs. Then he offered to take the old lady and the children home with him for the night. It was arranged that two of us boys were to stay at the Perkins’ cabin to watch the corpse. So the old lady washed out a pair of woolen socks and hung them before the fireplace to dry and asked us to slip them on Pa when they got dry.\n\nIt was kinda creepy sitting away over there back of the fields, off the main road, in the flicker of a tallow candle in the middle of the night and with a dead man for company. But we never blinked and sleep was the farthest from our minds. We kept pretty still somehow – stiller than you would think boys could be. After quite a spell of that we got an idea. Frank suggested that we might as well put the old man’s socks on now. Being dead he wouldn’t catch cold and what was the difference. I agreed that I could see no difference so we got the wet socks and commenced to put them on.\n\nNow anybody who has tried to put wet socks on knows that they go on hard. We pulled and tugged and finally upset the contraption he was laid on and his body plumped right down on the floor. After", "num_tokens": 2048} {"category": "olmocr_science_pdfs-literature", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-literature/part-00-00000.npy", "text": "2 (51%) are significantly associated with either of the two word orders at $\\alpha = 0.05$. In the analysis where only particle verbs were filtered, the percentage was 59%. There is still a clear tendency for verbs to have significant lexical associations, even within the class of verb clusters with *hebben*. If a Bonferroni correction is applied, the corrected value is $0.05/218 = 0.000229$. Under this condition, 56 verbs (25.69%) have significant associations.\n\n### 5.5. Additional semantic analysis\n\nEven though I have now controlled for various factors in my computation of the association values, there are more general properties of the main verbs that might account for part of the associations, besides lexical preference.\n\nIn a collostructional analysis, the top collexemes for each construction are usually analyzed semantically. The verb cluster orders are generally considered to express no semantic difference and, therefore, I have no specific hypothesis on any possible semantic association of each word order to test. The claim of Pardoen (1991), who suggested a *Stative* versus *Dynamic* interpretation distinction, should be tested, however. Because of this, I decided to take an objective approach by using semantic properties of Dutch verb senses from the Cornetto lexical-semantic database (Vossen et al. 2013), which includes *Dynamic* as a feature. Unfortunately, the Lassy Large corpus is not annotated for word senses so I had to take the properties of the most common senses of each verb, as judged by a native speaker. If there were multiple commonly used senses with conflicting properties, the verb was annotated for both properties.\n\nI performed this annotation for the top 20 collexemes of each word order from the analysis in the previous section (shown in Table 3). The results are summarized in Table 4. It lists all of the semantic features from the Cornetto database, as well as the polarity property. I list the description of each feature below, taken from the user documentation (Maks et al. 2013):\n\n- **Valency**: the number of arguments of the verb\n- **Transitivity**: whether a verb can take direct objects, and how many\n- **Control**: the subject of the verb is capable of acting with volition\n• **Dynamic**: the verb expresses a non-static, changing situation\n\n• **Attributive**: the verb expresses a relation of ownership\n\n• **Spatial**: the verb expresses a location or movement of (one of) the participants\n\n• **Cognition**: the verb demands emotional, perceptual or mental activity\n\n• **Polarity**: what kind of attitude the word’s most common senses express\n\nThe polarity property was annotated on the basis of an automatic sentiment analysis system, so there may be some errors in the annotation of this property in the database.\\(^8\\)\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PropertyValues1-2 order2-1 order
ValencyMono04
Di1012
Tri116
TransitivityIntransitive55
Transitive1617
Ditransitive40
Control+CONTROL1615
-CONTROL66
Dynamic+DYNAMIC1617
-DYNAMIC64
Attributive+ATTRIBUTIVE10
-ATTRIBUTIVE1920
Spatial+SPATIAL10
-SPATIAL1920
Cognition+COGNITION26
-COGNITION1914
PolarityNEGATIVE38
POSITIVE31
\n\n*Table 4: Frequency count of semantic properties of the top 20 words in each word order*\n\nFor each semantic feature, I counted how many of the top 20 collexemes for each order have this feature. The counts do not always add up to 20 because a verb may have multiple frequent senses with conflicting properties, in which case they were counted as having both features. We can observe that the counts for the 1-2 and 2-1 order are quite similar for most features, which indicates that there are no meaning associations of those features with a particular word order. Based on Pardoen’s (1991) claim that 1-2 orders are assigned a dynamic interpretation while 2-1 orders get a stative interpretation, we might expect to see a difference in the number of verbs\n\n---\n\n\\(^8\\) I noticed a few possible errors, for example, the first sense of *slapen* ‘to sleep’ is annotated as having negative polarity\nwith the **Dynamic** feature between the two orders. This is not the case however — there is one more **Dynamic** verb in the 2-1 order, a negligible difference.\n\nOne notable difference can be observed for the **Polarity** property. By just looking at the verbs on the right-hand side of Table 3 one may already get the impression that many of the verbs associated with the 2-1 order have a somehow negative sense. The semantic analysis in Table 4 confirms this, listing 8 negative verbs for the top 2-1 order verbs, and just three for the top 1-2 order verbs. There are also slightly more positive 1-2 verbs. Another difference is in the **Cognition** verbs, of which there are more for the 2-1 order. There was only one verb with the **Attributive** feature and one with the **Spatial** feature in either of the top 20 collexeme lists, which were both in the 1-2 order list.\n\nA further difference can be observed in the **Valency** and **Transitivity** counts: among the 2-1 order verbs we find four verbs that take only a subject argument while the 1-2 order list has no such verbs. On the other hand, the 1-2 order list features four ditransitive verbs while the 2-1 order list has none.\n\nIn summary, it appears that there are a few semantic features that are more common among verbs that are strongly associated with one order, compared to the other. The negative polarity property is the clearest of these differences, however, even there it is only a tendency — there are also many neutral verbs and even a positive verb among the top 1-2 order collexemes, and there are negative verbs among the top 2-1 collexemes as well.\n\nLastly, it is interesting that there are some similar verbs in the overall list of collexemes that are positioned adjacent to each other. An example of this can be seen in Table 3, where the bottom two verbs in the 1-2 order list are the verbs for ‘give’ and ‘take’. In the 2-1 order list the bottom verb is ‘eat’ with rank 20, and in the 21st position I found *drinken* ‘to drink’. It appears that at least some semantically similar verbs have very similar cluster order associations.\n\n### 6. Discussion\n\nI have calculated lexical associations between main verbs and their word order in clusters, and found that significant associations are quite common. A majority of the verbs are significantly associated with either the 1-2 or 2-1 word order in the corpus that I used, even after controlling for various confounding factors. I found that the two word orders exhibit some distinct semantic preferences, but not to such an extent that all of the associations can be explained in this way.\n\nThis result indicates that verb cluster word order associations are", "num_tokens": 2048} {"category": "olmocr_science_pdfs-literature", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-literature/part-00-00000.npy", "text": ", though a Trinitarian (i.e. *ad norman Platonis*) in philosophy, yet a zealous Unitarian in Religion.” However, an examination of the notebooks reveals that this three-part thinking is better placed as starting in 1801, after he had returned from Germany and after the focus of his reading had shifted to Idealism, Neoplatonism and mysticism. Coleridge continued to develop it as he worked on his *Logic*, and most fully elaborated it into a philosophical phenomenology in his incomplete *Opus Maximum* manuscripts.\n\nThe underlying difference between these two approaches was between reason and the understanding. The empirical dyadic model operated upon the understanding alone. This faculty deals with the individual’s experience of the world, taking that which is furnished by the senses, and classifying and generalizing it into comprehensible impressions. It analyzes and abstracts\n\n---\n\n100 Kant makes this argument for concepts of the understanding at A93/B125 in the first *Kritik*.\n102 BL I, 179-80.\nwhat would otherwise be the chaos of experience into cause and effect.\\textsuperscript{106} It is, Coleridge explains, “the power of imagining the shortest possible line between two points,” the logic of association or causal connection.\\textsuperscript{107} Alternately, reason is a faculty that is associated with this third logical term, “bearing the same relation to spiritual objects, the Universal, the Eternal, and the Necessary, as the eye bears to material and contingent phenomena.”\\textsuperscript{108} That is to say, reason is concerned with that which an individual is conscious of in an intuitive, super-sensory manner, most notably moral intuition in contrast to the cause and effect of the understanding.\\textsuperscript{109} It is “the power of the universal… the Source and Substance of Truths above Sense.” Furthermore, “it is an organ identical with its appropriate objects. Thus, God, the Soul, eternal Truth, &c. are the objects of reason; but they are themselves reason.”\\textsuperscript{110} In the sense Coleridge describes, reason is the “representative of the infinite” invested in the finite nature of the individual.\\textsuperscript{111}\n\nColeridge argues that reason is dependent upon the understanding for its expression. The understanding can exist without reason, yet when it does so, as illustrated by Hume, it has no sense of itself apart from experience. Coleridge explains the relationship as follows:\n\nUnderstanding and Experience may exist without Reason. But Reason cannot exist without Understanding; nor does it or can it manifest itself but in and through the understanding, which in our elder writers is often called discourse, or the discursive faculty, as by Hooker, Lord Bacon, and Hobbes: and an understanding enlightened by reason Shakespeare gives as the contra-distinguishing character of man, under the name discourse of reason. In short, the human understanding possesses two distinct organs, the outward sense, and “the mind’s eye” which is reason….. In this way we reconcile the promise of Revelation, that the blessed will see God, with the declaration of St. John, God hath no one seen at any time.\\textsuperscript{112}\n\nIn this passage, Coleridge makes two important claims about his tripartite epistemology. The first refers back to Coleridge’s Hegel-like conception of\n\n\n\\textsuperscript{107} OM, 6.\n\n\\textsuperscript{108} F, I, 155-56.\n\n\n\\textsuperscript{110} F, I, 155-56.\n\n\\textsuperscript{111} OM, 87.\n\n\\textsuperscript{112} F, II, 156–7.\nhis own system, that is, it “opposes no other system, but shows what is true in each.”\\textsuperscript{113} Here the great British Empiricists are not enemies, but allies in the expression of reason. This brings up the second claim of this passage, that it is through the articulation of the understanding that the transcendence of God which no one can see is reconciled with the promise of revelation, and this occurs through the symbol.\n\nThroughout Coleridge’s writings, there is an interest in the question of how an idea becomes something that can be more or less objectively communicated. For Coleridge, an idea is supersensuous in that it arises mentally, not from sensuous experience. As a result “an idea in the highest sense of that word, cannot be conveyed but by a symbol.”\\textsuperscript{114} All language engages in moving an idea from internal subjectivity to discursive objectivity: “all language is utterance, i.e. Outer-ance, and with Outness the imagination necessarily associates a sensation of reality [with it].”\\textsuperscript{115} The result of this is a symbol which is the combination of both reason and the understanding. The symbol acts, Coleridge explains, as a “reconciling and mediatory power, which incorporating the Reason Images of the Sense, and organizing (as it were) the flux of the Senses by the permanence and self-circling energies of Reason, gives birth to a system of symbols, harmonious in themselves, and consubstantial with the truth, of which they are conductors.”\\textsuperscript{116}\n\nThat symbols are “consubstantial” brings the model of the Trinity directly into play. The Son is consubstantial with the Father in that they are of one and the same substance. Just as Christ is the incarnation of God, the symbol is the incarnation of the idea. Furthermore, just as Christ as Logos is God’s creative presence in the world, the symbol is the individual’s creative presence in the world for Coleridge. Finally, what makes this possible is the imagination, which Coleridge famously defines as “a repetition in the finite mind of the eternal act of creation in the infinite I AM,” meaning that just as God has the power of self-creation (the “I will be what I will be” of Exodus 3:14) the imagination has the power of self-creation in asserting the ideas of reason which have their source in the activity of the self, not the passivity of experience.\\textsuperscript{117} “Symbols,” Coleridge writes, “are the translucence of the Eternal through and in the Temporal. It always partakes of the Reality which it renders intelligible; and while it annunciates the whole, abides itself as a\n\n\\textsuperscript{113} TT, II, 147.\n\\textsuperscript{114} BL, I, 156.\n\\textsuperscript{115} OM, 312.\n\\textsuperscript{117} BL, I, 304.\nliving part in that Unity, of which it is the representative.”\\textsuperscript{118} In this manner, the transcendent reality of ideas share in a community of ideas with the temporal world of the understanding, their “outer-ance” allowing them to be the subject of objective discourse.\n\nYet they are not fixed, though they are always consubstantial with the transcendent ideas of reason, their expression in the understanding is subject to flux: “We can neither rest in an infinite that is not at the same time a whole, nor in a whole that is not infinite. Hence the natural Man is always in a state either of resistance or of captivity to the understanding, which cannot represent totality without limit.”\\textsuperscript{119} It is in this way that Coleridge reconciles the promise of revelation and the invisibility of God. Religion is therefore best expressed in a genre that forms a symbolic system that engages in a process of endless striving. “Christianity,” Coleridge writes, “is not a Theory, or a Speculation; but a Life. Not a Philosophy of Life, but a Life and living Process.”\\textsuperscript{120}\n\n6. Conclusion\n\nThis examination moves from the pre-Romantic lives of Coleridge and Schlegel, only to the development of the early forms of their Romantic thought. It demonstrates the fascinating correspondence between their two parallel lives. These concurrent developments would continue as both thinkers moved into the mature stages of their Romantic thought. For Schlegel, this can be located in many of the lectures he delivered later in his life when resident in Vienna. Particularly in his development of a Lebensphilosophie, which elaborates and distills many of the early elements discussed here into a practical philosophy. This is reinforced in his other later lectures which consider literary genres and the dialogical character of the nature of language.\\textsuperscript{121} For Coleridge, this is especially true of the triune logic which he articulates as a systematic framework in his Opus Maximum, particularly in fragment three, which takes up the realist tradition of the divine ideas and their relation to creation, and fragment two, which examines the ethical grounding for personhood in the Absolute.\\textsuperscript{122} In the case of both thinkers, these later developments have often been unfairly characterized as a\n\n\\textsuperscript{118} LS, 30.\n\\textsuperscript{119} LS, 60.\n\\textsuperscript{120} AR, 2.\n\\", "num_tokens": 2048} {"category": "olmocr_science_pdfs-politics", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-politics/part-00-00000.npy", "text": "cuts any in-the-presence legal\nrequirement for Marian witness examinations. If there had\nbeen such a rule, one would expect that Burn would have said\nsomething about the need to retrieve the defendant and bring\nhim in at the same time as the material witness, but Burn did\nnot say that. The material witness form still appears at least\nas late as the 1797 edition of Burn’s manual.109\n\nBurn’s manual is especially relevant because the justice\nof the peace manuals published in America prior to the framing\nborrowed heavily from it. The principal manuals reprinted his\npassages on Marian procedure as well as the accompanying\nforms for witness examinations and material witnesses.110\n\n---\n\n106 1 BURN, supra note 105, at 295-97 (1755 ed.) (discussing Marian\nprocedure); 1 id. at 536-38 (1785 ed.) (same); 1 id. at 671-73 (1797 ed.) (same).\n\n107 1 BURN, supra note 105, at 297 (1755 ed.) (setting out forms for\nexamination of prisoner and information of witnesses); 1 id. at 538 (1785 ed.) (same); 1\nid. at 673-74 (1797 ed.) (same).\n\n108 1 BURN, supra note 105, at 298-99 (1755 ed.) (setting out form for material\nwitness warrant); 1 id. at 539-40 (1785 ed.) (same).\n\n109 1 BURN, supra note 105, at 675 (1797 ed.) (setting out same form for\nmaterial witness warrant as in previous editions).\n\n110 Several American manuals closely tracked Burn’s manual. See JOSEPH\nGREENLEAF, AN ABRIDGMENT OF BURN’S JUSTICE OF THE PEACE AND PARISH OFFICER\n118 (Boston 1773) (reprinting Burn’s discussion of Marian procedure and forms); JOHN\nFAUCHERAUD GRIMKE, THE SOUTH-CAROLINA JUSTICE OF PEACE 199-202 (Phila. 1788)\nThe consistent silences in the framing-era authorities are powerful evidence of the “dog-that-did-not-bark-in-the-night\" sort that there was no in-the-presence rule for Marian examinations. However, there is more evidence than silence. Several framing-era authorities juxtaposed Marian witness examinations to depositions in civil lawsuits which were subject to a cross-examination rule.\n\n2. Contrasting Treatments of Marian Procedure and Civil Litigation Deposition Procedure\n\na. Gilbert’s Treatise\n\nChief Baron Geoffrey Gilbert authored a leading treatise, The Law of Evidence.111 As I pointed out in my prior article, he contrasted Marian examinations to the cross-examination rule that applied in non-Marian depositions in a passage regarding the implications of the 1696 ruling in King v. Paine112 by writing that the judges in that misdemeanor libel trial “would not allow the Examinations . . . to be given in Evidence, because Paine was not present to cross-examine [when the deposition at issue was taken], and tho’ tis Evidence in Indictments for Felony in such Case, by Force of [the Marian statutes], yet ‘tis not so in Informations for Misdemeanors . . . .”113 In other words, a Marian witness examination was admissible as “Evidence” in a felony trial regardless of cross-examination, but a deposition was...\ninadmissible in a misdemeanor trial (to which the Marian statutes did not apply) unless the defendant had had an opportunity to cross-examine the deponent. That statement appeared in later editions, including the 1788 American edition of Gilbert’s treatise, and was still unaltered as late as the expanded and updated 1791 London edition.114\n\nGilbert also implicitly drew a contrast between civil lawsuit depositions and Marian witness examinations when he explicitly noted that an opportunity for cross-examination was required in the former, but made no comparable statement about the latter.115 Gilbert’s contrasting treatment was also echoed in later works.\n\nb. The Theory of Evidence\n\nAnother evidence treatise, The Theory of Evidence, was published anonymously in London in 1761.116 This treatise stated that a deposition could be admitted into evidence in a variety of civil proceedings if, but only if, the other party had been given an opportunity to cross-examine when the deposition was taken. However, when this treatise discussed the admissibility in felony trials of Marian witness examinations taken by coroners or justices of the peace, it simply stated that Marian witness examinations could be admitted in evidence if the witness had become unavailable. The contrasting treatment is especially evident because this treatise connected these two subjects with the disjunctive “yet”:\n\nIt is a general Rule, that Depositi ons taken in a Court not of Record shall not be allowed in Evidence elsewhere. So it has been holden in Regard to Depositions in the Ecclesiastical Court, though the Witnesses were dead. So where there cannot be a cross Examination, as Depositions taken before Commissioner of Bankrupts, they shall not be read in Evidence, yet if the Witnesses examined on a Coroner’s Inquest are dead, or beyond Sea, their Depositions may be read; for the Coroner is an Officer appointed on behalf of the Public, to make Inquiry about the Matters within his Jurisdiction; and therefore the Law will presume the Depositions\n\n114 Davies, supra note 2, at 145-46.\n115 Compare Gilbert, supra note 15, at 46-47, 48 (1754 ed.) (indicating that an opportunity for cross-examination was a requirement for a deposition in civil lawsuits), with id. at 100 (1754 ed.) (not mentioning cross-examination regarding Marian examinations).\n116 Henry Bathurst, The Theory of Evidence (Dublin 1761). There was no later edition of this work, which, though originally published anonymously, is now attributed to Henry Bathurst. See 1 Maxwell, supra note 4, at 378.\nbefore him to be fairly and impartially taken.—And by [the Marian statutes] Justices of the Peace shall examine of Persons brought before them for Felony, and of those who brought them, and certify such Examination to the next Gaol-Delivery; but the Examination of the Prisoner shall be without Oath, and the others upon Oath, and these Examinations shall be read against the Offender upon an Indictment, if the Witnesses be dead.117\n\nThe contents of The Theory of Evidence, including the above passage, were subsequently restated in a 1767 treatise, An Introduction to the Law Relative to Trials at Nisi Prius,118 which I quoted in my previous article.119 The quoted passage then appeared in later editions of the Nisi Prius treatise that were published as late as 1793, including a New York edition published in 1788.120\n\nc. Burn’s Justice of the Peace Manual\n\nBurn’s leading English justice of the peace manual similarly contrasted Marian examinations in felony prosecutions with depositions in civil lawsuits. In addition to the description of Marian procedure noted above,121 Burn also discussed the admissibility of depositions in civil proceedings and the admissibility of Marian witness examinations of unavailable witnesses in a subpart of his entry for “Evidence” headed “Of written evidence.” In that discussion, Burn also contrasted the rule that an opportunity for cross-examination was a condition for admitting a deposition in a civil lawsuit to the admissibility of Marian witness examinations of unavailable witnesses.\n\n117 BATHURST, supra note 116, at 33-34 (emphasis added). Kry concedes that the “yet” in the quoted passage “arguably” applies to Marian committal examinations as well as to coroners’ examinations, but suggests that it might apply only to coroners’ examinations. See Kry, supra note 3, at 500 n.28.\n\n118 HENRY BATHURST, AN INTRODUCTION TO THE LAW RELATIVE TO TRIALS AT nisi prius (n.p. 1767). The incorporation of the contents of The Theory of Evidence into the Nisi Prius treatise and other later treatises was well known. See BRIDGMAN, supra note 105, at 230-31 (noting that the contents of The Theory of Evidence were “generally understood to have been engrafted on” the Nisi Prius treatise); 1 MAXWELL, supra note 4, at 378 (entry 1) (The Theory of Evidence incorporated into An Introduction to the Law Relative to Trials at Nisi Prius); 1 MAXWELL, supra note 4, at 335 (attributing the 1767 edition of the Nisi Prius treatise—first published anonymously—to Henry Bathurst and the 1772 edition to Francis Buller).\n\n119 Davies, supra note 2, at 151 n.", "num_tokens": 2048} {"category": "olmocr_science_pdfs-politics", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-politics/part-00-00000.npy", "text": "1 3DG\nwww.gov.scot<|endoftext|>Terre des Hommes position on child labour\n\nOn 25 September 2015, Heads of State from 193 countries launched the Post-2015 Global Development Agenda, adopting 17 Sustainable Development Goals (SDGs) and 169 specific targets to be implemented worldwide over a decade and a half – 2015 to 2030.\n\nTargets 8.7 and 16.2 direct focus is on eliminating the worst forms of child labour by 2025:\n\n- **Goal 8.7** Take immediate and effective measures to eradicate forced labour, end modern slavery and human trafficking and secure the prohibition and elimination of the worst forms of child labour, including recruitment and use of child soldiers, and by 2025 end child labour in all its forms;\n\n- **Goal 16.2.** End abuse, exploitation, trafficking and all forms of violence against and torture of children.\n\nOur work to end the worst forms of child labour, contributes directly to the Sustainable Development Goals.\n\nTerre des Hommes believes that all worst forms of child labour should be abolished and that no child (every person below the age of 18, pursuant to the Convention on the Rights of the Child (CRC)) should be involved in hazardous and exploitative forms of child labour, as defined in ILO 182. The mission of Terre des Hommes is that the rights of children and their families are respected, so that vulnerable children can develop to their full potential in a safe family environment, in an atmosphere of happiness, love and understanding. Terre des Hommes works to create a world in which all children can have a humane existence and can grow up to be independent adults. Therefore Terre des Hommes is fighting to protect children from exploitation and violence in the framework of the Convention on the Rights of the Child, and ILO Conventions 29, 138, 182, 189.\n\nIn its fight against child labour, Terre des Hommes makes a distinction between child work and child labour, and gives top priority to eradicating the latter. Child work refers to the participation of children in any paid or unpaid economic activity, or activities to support families and family care givers which is not detrimental to their health and mental and physical development. It is light work for a limited amount of hours, according to their age and abilities, that doesn’t interfere with a child’s education or leisure activities. This work can even be seen as beneficial for the child’s development. For example: Girls and boys support their parents and at home they learn the basic skills of housekeeping; by helping out in their parents’ business they learn different mechanical skills or farming techniques and they impart important social values, e.g. cooperation and community commitment.\n\nOn the contrary, child labour refers to all kinds of labour which jeopardize a child’s physical, mental, educational or social development. Hazardous child labour is prohibited for all children, in line with Convention 182 on the worst forms of child labour. Child labour in dangerous jobs, such as with toxics and dangerous substances, in prostitution and bonded labour should be directly eliminated.\n\nTerre des Hommes fights child labour with an integrated approach consisting of policy influencing activities, awareness-raising and prevention - like education, health care and socio economic development - and direct assistance to victims of child labour and exploitation.\nIf no other alternatives are available, or if children are not willing or able to stop all their working activities immediately, Terre des Hommes ensures working children with a parallel school attendance. We don’t disapprove evening schools, but only insofar as no other alternative can be offered to children and their families.\n\nTerre des Hommes strives to an immediate improvement of labour standards and the regulation of working hours for adolescent children to decrease the direct danger for a child’s health and development. Work in decent conditions (e.g. safe working environment, maximum working time, and fair wages) in combination with education is the first step towards our goal of eliminating child labour.\n\nTerre des Hommes does not believe that a boycott of products made with child labour can be a single solution for abolishing child labour. An overall ban will not change any of the social and economic needs, which compel children to enter into employment. Trade measures should therefore always be combined with poverty reduction strategies, social and economic development aid, alternatives for child labourers and their families and the enforcement of labour laws and decent wages for adult workers.\n\n**Terre des Hommes promotes nine recommendations to eradicate child labour exploitation**¹\n\n1. **Coordinate the work being done**\n Fighting against child labour exploitation is a collective responsibility that rests primarily with the government, but social partners, Trade Unions, corporate sector, civil society, international organisations, families and the communities affected also have a role to play.\n\n2. **Apply international conventions**\n A very large number of the world’s States have ratified ILO Conventions 182 and 138, the key pillars in fighting child labour exploitation. Nevertheless, in many cases, the articles are not implemented nor enforced on a local level. A collective effort of all stakeholders and pragmatic, realistic solutions that correspond to local contexts and the labour market are necessary.\n\n3. **No impunity for child rights violations**\n Those responsible for exploiting children must be prosecuted and convicted of criminal offences.\n\n4. **Implement a holistic approach**\n The fight against child labour exploitation involves the implementation of long-term targeted legislation and public policies. However, it must also be integrated into the framework of a wider strategy and systematic approaches for child protection, because of the strong existing interconnections between the different causes of exploitation. The children’s individual needs and opinions must be taken into account. The proposed solutions must be adapted to the situations and contexts encountered.\n\n¹ Referring to General Comments 14 (best interests of the child) , 15 (right to health) and 16 (impact of business sector on children’s rights) of the Committee on the Rights of the Child\n5. **Guarantee access to education**\nGuaranteeing access to education for all children is the best way to prevent children from premature work and exploitation and strengthen their capacities to protect themselves against abuse. School is also a fundamental tool for supporting working children, including child domestic workers, provided that the educational system can be adapted if necessary to meet the needs of specific professions and guarantee effective access (modular courses, half-day attendance, etc.).\n\n6. **Implement individualised measures**\nAssisting and protecting children identified as exploited requires the implementation of realistic alternatives accompanied by access to basic services, a healthy environment and recreational activities. Children must be able to participate in solving their issues and be supported in exercising their rights.\n\n7. **Define the “best interest” of the child**\nThe definition of the best interest of the child is very subjective. Within a working environment, determining the best solution for the child must be based on an analysis of the nature of the job, the working conditions and the respect of child rights, as well as the impact of the workload on the child’s education, health, and physical, mental, spiritual, moral and social development.\n\n8. **Guarantee fundamental rights**\nThe State has the responsibility to respect and uphold the fundamental rights of working children, who must be given the means to voice their opinions. Access to healthcare, sanitary accommodation, decent wages and acceptable working conditions must be ensured.\n\n9. **Promote a responsible economy**\nA dialogue between the private and public sectors should enable the implementation of child protection measures – an integral part of a genuine policy of social responsibility – in formal and informal businesses.<|endoftext|>Republic of the Philippines\nHOUSE OF REPRESENTATIVES\nQuezon City\nEIGHTEENTH CONGRESS\nFirst Regular Session\n\nCOMMITTEE REPORT NO. 161\n\nSubmitted by the Committee on Basic Education and Culture and the Committee on Appropriations on DEC 18 2019.\nRe: House Bill No. 5872\n\nRecommend its approval in substitution of House Bill No. 735.\nSponsors: Representatives Romulo, Ungab and Dalog\n\nMr. Speaker:\n\nThe Committee on Basic Education and Culture and the Committee on Appropriations to which was referred House Bill No. 735, introduced by Rep. Maximo Y. Dalog Jr., entitled:\n\nAN ACT\nSEPARATING THE GUINA-ANG NATIONAL HIGH SCHOOL - MAINIT EXTENSION IN BARANGAY MAINIT, MUNICIPALITY OF BONTOC, PROVINCE OF MOUNTAIN PROVINCE FROM THE GUINA-ANG NATIONAL HIGH SCHOOL CONVERTING IT INTO AN INDEPENDENT NATIONAL HIGH SCHOOL TO BE KNOWN AS MAINIT NATIONAL HIGH SCHOOL AND APPROPRIATING FUNDS THEREFOR.\n\nhave considered the same and recommend that the attached House Bill No. 5872 entitled:\n\nAN ACT\nSEPARATING THE GUINA-ANG NATIONAL HIGH SCHOOL - MAINIT EXTENSION IN BARANGAY MAINIT, MUNICIPALITY OF BONTOC, MOUNTAIN PROVINCE FROM THE GUINA-ANG NATIONAL HIGH SCHOOL, CONVERTING IT INTO AN INDEPENDENT NATIONAL HIGH SCHOOL TO BE KNOWN AS MAINIT NATIONAL HIGH SCHOOL, AND APPROPRIATING FUNDS THEREFOR\n\nbe approved in substitution of House Bill No. 735, with Representatives Dalog, Romulo, Ungab, Cueva, Vergara, Fortuno, Acop, Abueg-Zaldivar, Robes, Abunda, Guico, Mangaon, Barba, Dy (F.M.C.), Umali, Castro (F.L.), Romualdez (Y.M.), Amatong, Zarate, Fernando and Elago as authors thereof.\n\nRespectfully submitted,\n\nISIDRO T. UNGAB\nChairperson\nCommittee on Appropriations\n\nROMAN T.", "num_tokens": 2048} {"category": "olmocr_science_pdfs-politics", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-politics/part-00-00000.npy", "text": "STITUTIONAL LINKAGES SERVICE (ILS)\n\nJulieta J. Cervo, CPA, DPA, CESO \nDirector III/Service Chief\n\nStaff\nRhona Beatriz D. Altomia \nBernardita R. Ampa \nMa. Teresa A. Castillo \nNelson C. Macatangay \nGerardo R. Serrano \nPaulita D. Sulit\n\nThe Institutional Linkages Service is under the External Affairs and Relations headed by Deputy Secretary Peter Paul L. Pineda and Executive Director Diana Lynn Le-Cruz.\nThe Senate Of The Philippines\nAs an Institution\n\nThe Senate of the Philippines is one of the pillars of the country’s lawmaking body, the other one is the House of Representatives. It is composed of 24 elected Senators whose terms of office shall be six (6) years. This dynamic institution is established to balance our economic, social and political environment and whose concerns are national in scope.\n\nAs the bastion of democracy, its action is centered on consensus and consultation with the end purpose of serving the best interest of the Filipino people.\n\nThe SENATE also values the importance of having productive and harmonious relationship with other institutions, from the government and the private sector, to create an environment where rapport and goodwill among institutions prevail. Its main objective is the passage of good, implementable and doable laws in pursuit of democratic ideals that would truly serve the national interest and the welfare of the people.\n\n-Juliet Cervo-\n\"The SENATE LINKAGES CIRCULAR\nVol. 8 no. 3.7, Series of 2010\"\n\nSENATE OF THE PHILIPPINES\nOFFICE OF THE SENATE PRESIDENT\nInstitutional Linkages Service\nRm. 411, 4th Floor, GSIS Building\nFinancial Center, Pasay City\n\nOFFICIAL MAIL\nPenalty for private or Unauthorized Use to Avoid Payment of Postage P500.00 or Imprisonment<|endoftext|>Sponsored by:\nAssemblyman CHRISTOPHER \"KIP\" BATEMAN\nDistrict 16 (Morris and Somerset)\nAssemblyman WILFREDO CARABALLO\nDistrict 28 (Essex)\n\nCo-Sponsored by:\nAssemblymen Asselta, Augustine, Assemblywoman Farragher,\nAssemblymen Merkt, Arnone, Assemblywoman Crecco, Assemblymen\nFelice, LeFevre, B.Smith, Assemblywoman Weinberg, Assemblyman\nWisniewski, Assemblywoman Pou, Assemblymen Zisa, T.Smith,\nAssemblywomen Watson Coleman, Cruz-Perez, Quigley, Assemblyman\nConnors and Assemblywoman Greenstein\n\nSYNOPSIS\nEstablishes the \"New Jersey Individual Development Account Program;\"\nappropriates $5 million.\n\nCURRENT VERSION OF TEXT\nAs introduced.\n\n(Sponsorship Updated As Of: 6/30/2000)\nAN ACT concerning individual development accounts, supplementing parts of the statutory law and making an appropriation.\n\nBE IT ENACTED by the Senate and General Assembly of the State of New Jersey:\n\n1. This act shall be known and may be cited as the \"New Jersey Individual Development Account Act.\"\n\n2. a. The Legislature finds and declares that:\n\n(1) Economic well-being does not come solely from income, spending, and consumption, but also requires savings, investment, and accumulation of assets, since assets can improve economic stability, connect people with a viable and hopeful future, stimulate development of human and other capital, yield personal and social dividends, and enhance the welfare of offspring.\n\n(2) With the enactment of the \"Work First New Jersey Act,\" P.L. 1997, c.38 (C.44:10-55 et seq.) and companion legislation, emphasizing moving people off of public assistance and into employment, there is an urgent need to provide incentives for savings accounts that will compliment and stabilize the movement of people from public assistance and into employment.\n\n(3) Income-based social policy should be complemented with asset-based social policy, because while income-based policies ensure that consumption needs (including food, child care, rent, clothing and health care) are met, asset-based policies provide the means to achieve some degree of economic self-sufficiency.\n\n(4) The State of New Jersey should develop policies, such as individual development accounts, that promote higher rates of personal savings and net private domestic investment.\n\nb. It is the intent of the Legislature, therefore, to provide for the establishment of Individual Development Accounts (IDA's) which accounts are designed to:\n\n(1) provide individuals and families, especially those with limited means, an opportunity to accumulate assets;\n\n(2) facilitate and mobilize savings;\n\n(3) promote education, home ownership and micro enterprise development; and\n\n(4) stabilize families and build communities.\n\n3. As used in this act:\n\n\"Account holder\" means a person who is the owner of an individual development account.\n\n\"Commissioner\" means the Commissioner of Community Affairs.\n\n\"Community development organization\" means any religious or charitable organization, which is a nonprofit corporation incorporated\npursuant to the \"New Jersey Nonprofit Corporation Act,\" N.J.S.15A:1-1 et seq., that is approved by the commissioner to implement the individual development account program, or any community action agency as that term is defined pursuant to subsection c. of section 3 of P.L.1991, c.51(C.52:27D-397).\n\n\"Department\" means the Department of Community Affairs.\n\n\"Economic literacy\" means: a basic understanding of budgets and savings accounts, credit and interest and how to use financial services; and having a savings plan and using it to reach the account holder's savings goal for an individual development account.\n\n\"Eligible individual\" means an individual or a family who earns less than 80 percent of the median income of the county in which the individual or family resides or an individual or family whose net worth does not exceed $10,000 excluding the individual's or family's primary dwelling unit and one motor vehicle.\n\n\"Financial institution\" means a state or federally chartered bank, savings bank, savings and loan association or credit union with an office in this State or an entity which is a member of the Securities Investor Protection Corporation established pursuant to the \"Securities Investor Protection Act of 1970,\" 15 U.S.C. s.78aaa et seq.\n\n\"Fund\" means the Individual Development Account Fund established pursuant to section 4 of this act.\n\n\"Individual development account\" means a financial instrument established pursuant to section 5 of this act.\n\n\"Program\" means the Individual Development Account Program established in this act.\n\n\"Program contributor\" means a person or entity who makes a contribution to an individual development account reserve fund, except that \"program contributor\" does not mean the State or the account holder.\n\n\"Reserve fund\" means the individual development account reserve fund created by a community development organization for the purposes of: funding the costs incurred in the administration of the program; receiving matching funds from the State and other program contributors; and providing matching funds for individual development accounts pursuant to paragraph (6) of subsection b. of section 5 of this act.\n\n4. a. The Individual Development Account Program is hereby established within the Department of Community Affairs. The purpose of this program shall be to provide each eligible individual in this State with an opportunity to establish an individual development account, which may be used by that individual for the any of the purposes specified under subsection a. of section 5 of this act.\n\nb. There is established in the department, the Individual Development Account Fund. This fund shall be used by the\ncommissioner to provide:\n(1) grants to community development organizations selected by the commissioner to participate in the Individual Development Account Program; and\n(2) a State match of two dollars for every one dollar deposited into an individual deposit account, except that the maximum amount provided as a match per individual development account per calendar year shall be $5,000.\n\nc. The commissioner shall implement this program throughout the State by entering into agreements with community development organizations which the commissioner selects pursuant to the provisions of this section. In order to ensure the targeting of areas of high poverty in the State, the commissioner shall use the Community Service Block Grant allocation formula as a guide for distribution of moneys in the Individual Development Account Fund established pursuant to subsection b. of this section.\n\nd. The commissioner shall solicit proposals from community development organizations for the purpose of implementing the Individual Development Account Program. Proposals from community development organizations shall include:\n(1) a plan for the establishment and management of the community development organization’s individual development account reserve fund;\n(2) a plan for the establishment and oversight of individual development accounts;\n(3) specification of the persons targeted for priority participation;\n(4) a detailed description of the economic literacy training that will be required of every account holder;\n(5) a request for funds to be used:\n(a) in establishing and administering the individual development account program for the duration of the program;\n(b) to provide economic literacy training and one-on-one financial counseling for eligible individuals; and\n(c) for the State’s match pursuant to paragraph (2) of subsection b. of this section, the amount of which request shall be reasonably based on the number of persons targeted for individual development accounts and the total amount of savings per year expected of those persons; and\n(6) any other information the commissioner deems important for selecting community development organizations to participate in the Individual Development Account Program.\n\ne. In reviewing the proposals of community development organizations, the commissioner shall consider the following factors:\n(1) the not-for-profit status of the community development organization;\n(2) the fiscal accountability of the community development\norganization;\n\n(3) the ability of the community development organization to\nprovide its moneys or raise moneys from program contributors for\nmatching contributions which are in addition to State", "num_tokens": 2048} {"category": "olmocr_science_pdfs-politics", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-politics/part-00-00000.npy", "text": ". Vincent Pepito F. Yambao, Jr. (Director, Civil Liberties and Human Rights Desk).\n² On 23 November 2009, while on their way to file the certificate of candidacy for Esmael Mangudadatu, vice mayor of Buluan town, the 57 victims were kidnapped and brutally killed. Mangudadatu was challenging Datu Unsay mayor Andal Ampatuan, Jr., son of the incumbent Maguindanao governor Andal Ampatuan, Sr., in the gubernatorial election on 10 May 2010 elections. The 57 people killed included Mangudadatu’s wife, his two sisters, journalists, lawyers, aides, and motorists who were witnesses or were mistakenly identified as part of the convoy.\nthe administration of President Gloria Macapagal-Arroyo, the Commission transformed itself into a “high profile watchdog.” While many had questioned the process by which she was appointed, the outspoken Chairperson Leila M. de Lima eventually gained the confidence of her critics. Yet while she reaps accolades for her achievements, some of her colleagues in the Commission are facing accusations of incompetence and absenteeism. What remains to be seen is whether a collegial body like the CHRP, with a bureaucracy of more than 680 personnel, can sustain its momentum and become effective in the long-term if its success is dependent on the popularity and initiative of its Chairperson.\n\nA. Significant/Key Issues in 2009\n\nMajor disasters, both man-made and natural, rocked the Philippine archipelago in 2009. The year opened with an eruption of violence in the Southern Philippines following the collapse of peace talks between Government of the Republic of the Philippines (GRP) and Moro Islamic Liberation Front (MILF) in the latter part of 2008. The hostilities, which had continued throughout the year except during a brief declaration of ceasefire, caused the displacement of up to a million people. But violence in Southern Philippines was\n\n\n5 Supra note 4. In 2009, a television station bestowed its first ever “Public Servant of the Year” on Chairperson de Lima “[f]or her courage and independent-mindedness in speaking out even against colleagues in government and for helping keep human rights on the public agenda with timely and forceful words.”\n\n6 The peace talks between the GRP and MILF collapsed after the Supreme Court declared as unconstitutional the Memorandum of Agreement on Ancestral Domain (MOA-AD) which the parties were due to sign on 5 August 2008. As the culmination of negotiations between the GRP and the MILF, the MOA-AD proposed the creation of the Bangsamoro Juridical Entity (BJE), with defined territories. For more details on Supreme Court ruling, see In the Province of North Cotabato v. Government of the Republic of the Philippines Peace Panel on Ancestral Domain, G.R. Nos. 183591, 183752, 183893 & 183951, 14 October 2008.\n\n7 In July, when the GRP declared the Suspension of the Military Operations (SOMO) and the Suspension of Military Action (SOMA).\nnot only confined to areas affected by the secessionist movement. The simmering rivalries between warring local clans resulted in a string of extrajudicial killings and abductions in Agusan del Sur.9 In Davao City, members of the so-called Davao Death Squad (DDS) were believed to have murdered 89 individuals from January to early December 2009.10\n\nMeanwhile, operations against suspected communists also intensified as the military launched the last phase of its counter-insurgency program dubbed Oplan Bantay Laya (OBL).11 The Alliance for the Advancement of People’s Rights (KARAPATAN) claimed that OBL was responsible for at least 1,188 extrajudicial killings and 205 enforced disappearances of suspected communists from 2001 to 2009.12 On 6 February 2010, the military arrested 43 health workers (collectively known as the “Morong 43”) suspected of being communist sympathizers, in the Rizal province. The military allegedly arrested the health workers using defective warrants,13 and subjected them to physical and mental torture.14\n\nA series of natural calamities hit the country in September and October causing the death of at least 858 individuals.15 Around\n\n---\n\n12 Ibid.\n15 On 26 September 2009, tropical storm “Ondoy” [international name: Ketsana] inundated 80% of Metro Manila and killed around 420 individuals. The following week, 2 October 2009, typhoon “Pepeng” [international name: Parma] ravaged Northern\n230,000 homes were either partially or totally destroyed, affecting more than 400,000 families. The World Bank and other agencies, estimated that $942.9 million was required to meet recovery needs, while $3.48 billion was needed for reconstruction.16\n\nAs the election season began toward the end of the year, many sectors criticised the Commission on Elections (COMELEC)17 for denying accreditation to “Ang Ladlad” a group representing the Lesbian, Gay, Bisexual and Transgender (LGBT) community;18 the Disabled Pinoy Party (DPP);19 MIGRANTE, a group representing overseas Filipino workers; Alliance of Concerned Teachers (ACT); and Courage, a union of government employees.20 However, COMELEC readily accredited groups closely associated with President Gloria Macapagal-Arroyo and her relatives.21 Then, in a series of controversial rulings just a few months before the elections, COMELEC ordered the removal of three provincial governors closely associated with opposition presidential candidate Benigno Simeon C. Aquino III.22\n\n\n18 On 11 November 2009, the COMELEC Second Division denied the accreditation to Ang Ladlad LGBT Party-List (Ang Ladlad) on the ground that it is “advocating immoral doctrines.” On 17 December 2009, the COMELEC En Banc dismissed Ang Ladlad’s Motion for Reconsideration.\n\n\n21 Ibid. Some of the questioned partylist groups include: Ang Galing Pinoy (nominees include presidential son and incumbent district representative Mikey Arroyo); Kasangga (nominees include the president’s sister-in-law, Maria Lourdes Arroyo);\nWhile the election period officially started on 10 January 2010, around 90 incidents of election-related violence had already been reported by the end of 2009. Political analysts suggested this was due to the introduction of automated voting systems, given that politicians who feared they “could no longer manipulate poll results are more tempted to eliminate each other.”24\n\nThe ‘Maguindanao Massacre’ was undoubtedly the most serious among the election-related violence reported so far. Considered the “single deadliest single attack on the press,”25 the killing appeared to have been thoroughly planned.26 More troubling however is the apparent complicity of state security forces in the attack.27 Almost a thousand firearms and hundreds of thousands of rounds of ammunition were seized from the custody of the Ampatuan clan, the primary suspects to the mass murder. Many of the seized firearms and ammunitions turned out to be the property of the Armed Forces of the Philippines (AFP) and the Philippine National Police (PNP).28\n\nBuhay (nominees include evangelist Mike Velarde, a known Arroyo supporter); Bagong Henerasyon (nominees include Quezon City Councilor Bernadette Herrera- Dy); Batang Iwas Droga (nominees include Philippine Amusement and Gaming Corporation Chairman Efraim Genuino); and 1-Utak (nominees include Department of Energy Secretary Angelo Reyes. Meanwhile, militant Bagong Alyansang Makabayan (BAYAN) Secretary-General Renato Reyes Jr., questioned the following party list groups which he claimed to have government ties: Agbiag Timpuyo Ilocano (AGBIAG); Ahon Pinoy (AHON); Akbayan OFW-National (APOI); Aangat Ating Kabuhayan Filipinas (ANAK); Babae para sa Kaunlaran (Babae Ka); Bigkis Pinoy Movement (BIGKIS); Byaheng Pinoy Movement (Byaheng Pinoy); Kalahi Sectoral Party (KALAHI); and League of Youth for Peace Advancement (LYPAD). See DateLine Philippines, 9 accredited party-list groups tied with Arroyo-Bayan, 21 January 2010.\n\n22 Pampanga Governor Among Ed Panlilio, Isabela Governor Grace Padaca and Bulacan Governor Jonjon Mendoza.\n\n\n24 Ibid.\n\n\n26 Asian Human Rights Commission, Philippines: How could the ‘Maguindanao massacre’ have been allowed to happen, 27 November 2009, available at [accessed on 10 June 2010]. It has been noted among others, that the graves where the 57 dead bodies had been buried had already been excavated using a government-owned backhoe and that some reporters have already received information that", "num_tokens": 2048} {"category": "olmocr_science_pdfs-politics", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-politics/part-00-00000.npy", "text": "7) suggest that, “A political economy of transit emerges in the migration corridors, as shopkeepers and food vendors tailor their services and ware to the needs of a transient population. Archipelagos of motels, smugglers’ drop houses and humanitarian shelters link migration corridors, providing respite for weary travellers.” As Andersson (2016b, 1061) notes, “given that smuggling is a market driven by rampant demand, punitive measures only tend to drive business further underground while new risks are transferred downwards from provider to client.” State-led efforts to control the border have played a key role in the development of new migrant-led industries as individuals seek to circumvent the barriers and control mechanisms that operate to limit the mobility of “subaltern” populations.\n\nBorder industries from both the state and migrant perspectives do not operate in isolation from one another, but rather are inextricably linked in the process and production of these industries; the existence of one, feeds the reciprocal growth of the other. The reactive response by states signals an effort to preserve the structures of exclusion and inequality as typified by the strict enforcement of the border. The continuation of physically and structurally violent state-led industries is implicated in the increasing death and precarity associated with the borders of the global North. There is a certain adaptability of migrant-led border industries to the increasing pressures of state-led industries as the discursive production of “crisis” has fostered the expansion and materiality of border industries. The performance of sovereignty and subsequent migrant response has ensured a circular relationship persists in the violent enactment of the border, embedding both structural and physical barriers for irregular migrant communities.\n\nBorder Industries, Death and the Migrant Journey – The Persistence of Violence in a Globalized System\n\nUnderstanding the negative impact and violent implications of the state-led border industry is integral to challenging the ontologized nature, practice and policy of borders. Despite rising death tolls, attacks against migrants and anti-immigrant sentiment,\nnegative migrant experiences have done little to deter migrants crossing (Slack and Whiteford 2011). The transformation of borderlands into militarized zones of exclusion through greater investment and expenditure in securing the border has resulted in deadly consequences for irregular migrants. Deaths associated with the US border from 1994 to 2009, have been estimated at approximately 5,600 as migrants die from drowning, hypothermia, dehydration, or heat stroke. Despite the deterrence efforts, there is little to suggest that there has been any substantial reduction in migration (Castles et al. 2012). Particularly during the summer months, the death toll rises as physical barriers, primarily located along urban areas of the border forces migrants into more remote and rural areas where they contest the rugged terrain in an effort to evade detection as outlined with the perverse logic of ‘Prevention Through Deterrence’ (Spener 2004; De León 2015).\n\nIn the EU, an unintended consequence to the development of the illegality industry, has created further demand on both sides of the migration control equation (Andersson 2016b, 2014). As state-led efforts demonstrate, policies of exclusion promote precarity in the journey and create an increasingly fragmented, non-linear, social process of negotiation and renegotiation for irregular migrants (Collyer 2010; Koser 2010; Mainwaring and Brigden 2016). The consequences of these maneuvers have been similarly dire. Over 20,000 people have died in the Mediterranean in the past two decades, as the EU now has the dubious distinction of representing the deadliest migrant destination in the world (Musarò 2016). As border controls continue to increase and journeys become more precarious, the death toll in the Mediterranean continues to rise with nearly 3,800 dead in 2015, rising from approximately 3,300 in the previous year (IOM 2016). Current estimates in the Mediterranean are on pace to at least match last year’s totals, with the recorded number of deaths surpassing 2,000 on June 20, 2017, World Refugee Day (UNHCR 2017; Dearden 2017). Efforts to secure the border have not been able to address the structural aspects of the migration industry that are spurred by growing inequality and exclusion as the global North only responds with short term solutions to these issues (Andersson 2016b). The temporary, hot spot approach, only serves to put out small fires without addressing structural inequality between states. While EU officials managed to “close off” the viability of migration routes from North Africa to the Canary Island and into much of Spain, it only shifted the routes into the Central Mediterranean (Lutterbeck 2009). At present, there are similar experiences in Greece, as the closing of borders forces more people into the sea. It is the misdirected focus of counter migration efforts that embolden smuggling, force more dangerous clandestine routes, and amount to an unwinnable battle against irregular migration (Andersson 2016b).\n\nIn both the US and EU, the prevailing mentality of ensuring precarious border crossing is a direct effort to shirk the responsibility surrounding the deaths of irregular migrant populations. Through presenting the deaths associated with irregular crossings as an unfortunate reality of “illegal” and dangerous crossings, it distances the responsibility of the state and its implication in the systemic deaths of irregular border crossers. The nefarious effect of this mentality positions the state in such a way where government\nofficials are able to argue the harsh and dangerous environmental conditions were responsible for the deaths of irregular border crossers, not the violent bordering practices that deliberately produced increasingly precarious journeys. Indeed, it provides the “moral alibi” that state sanctioned policy did not kill vulnerable migrants, harsh environmental conditions did (Doty 2011). The environment and physical characteristics of the borderlands become employed as an active participant in the defence and security of the border despite the seemingly apolitical characterization by the state (Nyers 2012). However, migrant deaths are not an unfortunate reality of irregular migration, but rather the direct and intended consequence of state efforts to control the border. Instead of addressing the failings of current border policy efforts and the violent practice of securing the border, state officials are willing to continue to express disbelief at the number of individuals who die, without acknowledging the role of the state and the implication in the deaths of migrant populations.\n\nThe violence associated with the border and enabled through the production of “crisis” reinforces a hegemonic global apartheid regime predicated on the exclusion of the global South. Achieved through, “maintaining global inequalities insofar as it maintains separate social, political, and economic spaces in the world-system” (Spener 2011, 117), “crisis” becomes the vehicle through which exclusion is justified. The current approach to borders as a militarized means of exclusion contributes to the creation of a new post-colonial apartheid regime both materially and economically (De Genova 2013). Immigration control has become a means of ensuring hegemonic, planetary order through controlling the mobility of “subaltern” populations as states of the global North have established and maintain the separation from the South through control over migration and security (Duffield 2006; Hyndman 2009). This contradiction underscores the logic through which states of the global North have approached globalization. Marked with different rules for different actors despite the appearance and rhetorical efforts to espouse equality in access to global markets (Andersson 2016b), the persistence and expansion of classed and racialized exclusion – including the deaths associated with this exclusion (Jones 2016) – becomes evermore apparent as a central organizing logic in the global system. The production of “crisis” and the continuation of structural violence through the embeddedness of a global apartheid regime, produces precarity and violence on migrants involved in clandestine journeys due to the restriction of their mobility.\n\n**Conclusion**\n\nCastles and his colleagues (2012, 145) argue that “migration should be seen not as a threat to state security, but as the result of human insecurity that arises through global inequality.” Approaching migration from a securitized perspective, predicated on a misleading trope of “crisis,” fails to see migration as inherently structural and cannot be fixed through punitive approaches to migration control (Andersson 2016b). Examining border industries reveals the relationship between the state and migrants as policies of exclusion and drive the growth and development of the respective industries. The\npractice of bordering remains highly problematic as it increases the precarity associated with the irregular migrant journeys. The unwavering commitment to the security narrative and the production of “crisis,” coupled with the obfuscation of state’s role in migrant deaths, will continue to lead to further, more substantial investment in border industries capabilities.\n\nThe circular and paradoxical nature of border industries has been highlighted throughout the article, suggesting that efforts to control the border are met with increased innovation and resistance from migrant populations. This contributes to greater state efforts to control borders in a seemingly never-ending process (re)negotiation of the border and efforts to secure the perceived territorial integrity of the state in a globalized era of increased interconnectivity. There is a need to critically rethink borders in a supposedly globalized system. The perverse logic that currently frames the understanding and performance of sovereignty is antiquated and desperately needs to move beyond the inside/outside logic that has served to entrench classed and racialized segregation in the international system. Embedding barriers, both physical and structural, remain intact ensures the violence of borders will persist and the marginalization and deaths of irregular migrant populations will continue.\nReferences\n\n\nColly", "num_tokens": 2048} {"category": "olmocr_science_pdfs-politics", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-politics/part-00-00000.npy", "text": " civil society in the countries in which they work.\n\nAt a 1995 conference on development,1 discussion of the role of external forces in nurturing associations that strengthen civil society was notable...\nfor the lack of one vital question: what kind of civil association strengthens civil society? That is, how do we try to ensure that strengthening resources for civil society nurtures beneficial rather than destructive and divisive groups? This strikes at the core of the split between the positions of de Tocqueville and Bayart, which has also been central to some of the best academic work done recently on the politics of Africa. NGOs have a responsibility to assess whether all civil associations act as building blocks for civil society, or only those with specific, identifiable characteristics. Sadly, this issue has been too easily overlooked by NGOs eager to embrace the perceived benefits of the revived interest in civil society.\n\nNGOs and the grab for civil society\n\nSince 1990, the concept of civil society has been ‘grabbed’ by NGOs as one relating closely to their own natural strengths. On the surface, civil society is intimately connected with the role of local community associations or groups, and with the indigenous NGO sector. For Northern NGOs, this leads to an intellectual association between civil society and local ‘partner’ or implementing organisations. From studies of the factors that encouraged a focus on civil society (e.g. Robinson 1995) two central trends can be discerned in donor and NGO thinking.\n\nAmong donors, interest in civil society has been associated with the evolution of the conditionality of aid. Conditionality, which rose to prominence in the 1980s, allowed donors to think more creatively about the large-scale impacts of their bilateral programmes. From 1990, conditionality took on a political dimension when some donors became preoccupied with ‘good governance’. This tendency acquired an economic as well as moral rationale with the 1991 World Development Report (World Bank 1991), in which democracy was projected as not only ethically desirable but also more efficient. Donors began to re-appraise the role of civil society in providing a foundation for sustainable democracy. The work of political scientists such as Stepan (1998), Stocpol (1992), and Keane (1998) variously pointed to civil society as the key to making good governance work.\n\nThus, the democratising function of civil society assumed a higher profile among multilateral agencies, and NGOs were identified as a possible point of contact with its building blocks, namely civil associations. Coupled with these changes was an increasing awareness among NGOs of their own potential role in the wider development picture.\nContemporary with the rise of Participatory Rural Assessment (PRA) and its methodologies — a new orthodoxy for promoting community-based design of, and control over, development projects — was a converse trend. This was the idea that NGO-supported projects can legitimately have wider and much larger economic, social, and political objectives. As NGOs acquired new ways of thinking about ‘partnership’ and the implementation of projects by local organisations, so they were also considering the wider ramifications of such activities. A 1992 conference on ‘scaling up’ the impact of NGOs marked a breakthrough in addressing the potential macro-impact and macro-application of grassroots development activities (Edwards and Hulme 1992).\n\nThe process was spurred on by the UN, which moved to the fore in promoting civil society as a development issue. UNDP, UNICEF, and ECOSOC introduced procedures to provide voluntary associations with greater access to their systems; and ECOSOC’s review of NGOs has discussed the possibility of funding Southern NGO participation at ordinary UN business meetings (UN NGLS 1995a: 7). However, assumptions about the nature of NGOs have allowed the issue of ‘access’ by the voluntary sector to dominate discussions about civil society within the UN. Indeed, the UN NGO Liaison Service has produced an impressive paper emphasising the expanding place for NGOs around UN tables (UN NGLS 1995b).\n\nThe combination of donor, NGO, and UN interest provides the background to the civil society ‘grab’. But few NGOs have explored the full theoretical implications of civil society, or clearly articulated their own interpretations of its nuances. The problem is the belief that NGOs are inherently bound to strengthen civil society, an assumption which, if acted upon, might in fact weaken the evolution of civil society in certain contexts.\n\n**The theoretical division**\n\nCivil society is usually held to be the collective intermediary between the individual and the state. For de Tocqueville, civil society (in contrast to traditional society) is a defensive counterbalance to the increased capabilities of the modern state. It provides a realm in which society interacts constructively with the state, not to subvert and destroy it, but to refine its actions and improve its efficiency. Thus, civil society tends to be associated not with the selfish drive of Hegelian theory, but with the constructive actions of altruistic concern.\nHence, civil society groups coalesce not on the basis of primordial attachments (ethnicity, language, religion), but rather on ‘small issues’ that cut across such boundaries and bring people together in new coalitions. For de Tocqueville, a key example was the nineteenth-century temperance movement in the USA, which brought together thousands of disparate people under a common banner. The anti-slavery movement or anti-Corn Law League played similar roles in Britain.\n\nThe implications for development practitioners relate to these ‘small issue’ coalitions or ‘civil associations’. Stepan’s study of Brazil (Stepan 1988) gives grounds for ruling politically motivated groups out of the equation, and for focusing on those local NGOs, human rights groups, and leisure associations which conform with de Tocqueville’s precepts.\n\nSmall issues\n\nThe reasons why an association forms are critical for its long-term role. Associations which bring people together, regardless of old identities, to work together for development — to form credit schemes or health clubs, for example — may play empowering roles. In the short term, so will those associations which undertake the same functions in primordially homogeneous groups. But in the latter case, their aim may move from the ‘small issue’ (sadly, in this context community development is a ‘small issue’) to strengthening the primordial group’s comparative position within a wider context of clientelism and patronage.\n\nThus, classical de Tocquevillian thinking offers a crucial challenge to NGOs working to strengthen local civil associations or community groups. Most NGOs, however, lose sight of these crucial caveats about the quality of associative forms. They adopt the view that all civil associations — that is, all community or development groups — naturally build civil society. Take, for example, the definition of civil society underpinning UNDP’s policy on the links between its own programmes and civil society (UNDP 1993). This has become something of a mainstay within the NGO sector, and it rests on the intermediary role of civil society and the state, viewing social movements as civil society groups. Thus, all associations, no matter how primordially-rooted or patronage-based, are seen as civil society organisations (CSOs).\n\nUNDP’s position has been seminal for many development groups, and the focus on interacting with civil society rather than analysing its composite parts has had major impact. The concentration on NGOs’ access to the UN system, mentioned above, has muted discussion of the\nlong-term impact of different types of NGOs. UNDP’s 1995 paper, prepared for the UN’s fiftieth anniversary, picked up its earlier work on civil society (UNDP 1995). Its focus is primarily on collaborative mechanisms, and its definitions refer to civil society collectively, rather than to individual elements within it.\n\nThe adoption of such a limited definition may be crucial. For example, a village-level project in a highly heterogeneous area may unwittingly undermine the future growth of civil society. If the village is primordially homogeneous, and the project develops strong local organisations without setting up umbrella bodies to promote co-operation with other villages, what has it achieved? In some instances, it will have increased the village’s capacity to play the patron/client game, and strengthened its internal identities, without forging the mechanisms to build civil society.4\n\nNGOs and Bayart\n\nSome argue that all associations and community groups are indeed components of civil society, a view associated with Jean-François Bayart, whose work explores societies’ attempts to subvert and control the state (Bayart 1986; 1993). In this view, projects that simply strengthen groups associating on primordial grounds are facilitating a natural, competitive process arising from the specific characteristics of African civil society. This suggests that it is largely inappropriate to apply Western concepts of civil society to contexts in which primordial attachments are unlikely to decline in the near future.\n\nBoth arguments have their strengths and weaknesses. However, evidence is emerging to suggest that primordial attachments do change with the process of societal change, and this may have important implications. There is a school of thought centred on ‘bringing the state back in’, and exemplified by Laitin’s work on Nigeria, that suggests the state can hugely affect primordial identities through its own changing policies (Laitin 1992). The example of Pakistan suggests that the development of a local bourgeoisie may foster integrative groups based on ‘small issues’, even in the face of entrenched ethnic or religious divisions (Whaites 1995). World Vision UK, in perhaps the first NGO research into the relationship between identities and nascent civil society, found that even apparently destructive political acts, such as displacement and conflict, may provoke conditions conducive to the growth of civil society (Westwood 1996).\nSuch examples suggest that we should not yet give up on traditional, evolutionary ideas of civil society. The interaction of social change", "num_tokens": 2048} {"category": "olmocr_science_pdfs-politics", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-politics/part-00-00000.npy", "text": " period of the ‘economic miracle’, when yearly growth was well into two digits. After the death of the journalist Vladimir Herzog in prison in 1975, which got quite some repercussion and protests at home and abroad, protests became louder and the press bolder. The death of the metallurgical worker, trade union member, Manoel Fiel Filho in 1976 in a Department of Information Operations led to the dismissal of the general responsible for that unit (Fico 2004: 29-56). From 1977, repression, torture, and disappearances decreased, although censorship was strict until the end of the seventies. In 1979, by the end of Geisel’s mandate, the president and his successor, the last military president, Figueiredo, were preparing for the return to democracy through the abertura (Castro 1995). The state of exception, established\nin 1964, ended in 1979, and was followed by the phase of transition to democracy. Exiled politicians were asked to return to Brazil, which a number started doing. Artists and academics, gone into exile to escape persecution, were also slowly coming back. Censorship had made life very difficult for artists, although with creativity, quite some interesting works have been produced in very different areas, such as film, music, theatre (Reis et al. 2014: 11-47, 172-185, 203-215).\n\nAlthough the number of victims who died of torture or disappeared was much lower than in neighbouring countries such as Argentina and Chile, Brazil addressed the topic of investigating the past much later than these countries. Only when Dilma became president, herself a victim of the military having been tortured by them, did she establish a Comissão Nacional da Verdade, in 2012. This National Truth Committee has an ample mandate, interviewing victims and authors of torture, opening archives about this period, and trying to find out if archives had disappeared, etc. The final report was ready in 2014 (Comissão Nacional da Verdade 2014). According to a number of Brazilians, the transition to democracy got a great boost with the advent of this Committee, and thanks to her work, democracy can be considered consolidated (Oliveira 2013). Other Brazilians, national and international academics and politicians, regard the 1992 Collor de Mello impeachment procedure already as evidence of Brazil’s maturity as a democracy.\n\nIn that same year, 1992, there were many protests, inspired by those under the military regime. There was also a direct link between the protest movements of 2013 and 2014 and those during the military regime. Because of the lasting impact of the military regime in Brazil, a workshop was organised in Leiden University, precisely 50 years after the coup, on the 31st of March 2014, looking at how Brazil was shaped during the military regime and how it has emerged from it, following the return of democracy. The participants in the workshop also looked at the legacies of the regime in a democratic Brazil, and, in how far, this period still has an impact on the Brazil of today, and, at the same time, what kind of changes took place since the consolidation of democracy, in quite a number of areas such as national and international politics, social and cultural movements, and also at the role of the military then and now. Some results of this workshop are found in this dossier.¹\n\nAs Timothy Power points out, the military regime had a relative legitimacy when compared to other dictatorships in the Southern Cone. Power examines several variables which impact on the way politics has played out between 1985 and 2014: a high level of continuity of personnel inherited from the military period, an accentuated commitment to civil liberties, as in the Constitution of 1988, a more robust level of\n\n¹ For the organisation of the workshop, thanks must be given to the Leiden Chair of Brazilian Studies Rui Barbosa, and to the Leiden History Institute. Due to constraints of space, not all contributions could be included here. João Roberto Martins Filho showed the complexity of the military regime in Brazil. Esther Limonad focused primarily on mass mobilization, in particular on the grassroots movements from 2013, and made an analysis of the changes of the Brazilian state, of what has not changed and the (re)actions against it. Tânia Pelligrini painted a more general picture of the specific actions of the military regime leading to the effective consolidation of the Brazilian cultural industry.\npolitical competition compared to the pre-coup years, and a delayed but increasingly meaningful consideration of transitional justice issues. He also stresses the importance during the mass mobilization (the street), which engendered the collapse of the military regime, and has been used a number of times since.\n\nMarianne Wiesebron analyses Brazil’s foreign policies, during the military regime, in the middle of the Cold War, well into the 21st century. One important concept is Independent Foreign Policy, presented in 1961, but only really developed under President Geisel when the Brazilian government started its cooperation with the People’s Republic of China, amongst others, in the framework of Brazil’s national economic development. The Brazilian military followed an independent path in an adverse conjuncture, becoming less aligned to Washington, as no reciprocity came from the US in return for Brazil’s loyalty. The pendulum movement of governments more or less aligned to the US does also happen in times of democratic regimes. President Cardoso was much more aligned to Washington, especially during his first mandate, while President Lula really put Brazil on the world map.\n\nRoberto Vecchi focused on the problem of trying to give back a memory of those who disappeared during the military regime. The worst case is that of the Araguaia guerrilla, which disappeared without leaving any traces. Although limited in numbers, state violence started earlier than in other neighbouring countries. His analysis, based on the novel K. by Bernardo Kucinski, from 2011, shows how to weave a public memory from the disappeared and, more generally, from the repressive traumas of the authoritarian years.\n\nMaria Lucia de Barros Camargo presents a much more specific analysis, concentrating on the Revista Civilização Brasileira, published between 1965 and 1968, which can be considered the first magazine to be launched with the explicit objective of resistance to the 1964 military coup. Furthermore, the theme song of Chico Buarque, Tem Mais Samba, introduced in 1964, is the start of a reflection on the discussions about the state of culture, especially with regard to literature and its relationship to popular music. She studies the survival in and of the Brazilian popular music (MPB), 50 years after the coup.\n\nFinally, Vinicius de Carvalho, aims his attention at a musical show Opinião, whose premiere was on the 11th of December 1964, at the Teatro Arena in Rio de Janeiro, under the direction of Augusto Boal. The show was considered a manifesto, a clear protest against the socio-economic conditions in Brazil. It became a reference to what became known as protest music against the regime established in March of that same year in Brazil. This show substantiated the various social and political demands of Brazil at that time and became an aesthetic and political paradigm. At the same time, the 1964 production is compared to the reinterpretation of the show in 2014. The goal is to seek to understand how, 50 years after the coup and the show Opinião, Brazilian music and art reflect not only that historical moment, but also its role in the contemporary socio-political context.\n\nThe articles of this dossier show clearly how in some ways there is an enduring impact of the military regime, while at the same time democracy became consolidated.\nThey also highlight the political, social, cultural complexities of the various periods, and, above all, how many protests there have been, in many different forms, which also, in some ways, persist over 50 years later.\n\nREFERENCES\n\n\n---\n\n| Marianne L. Wiesebron | is Associate Professor of History at the Department of Latin American Studies at Leiden University. She specialises in Brazilian foreign relations and society. She also works on current economic and political developments in Latin America, in particular on problems of regional integration in South America. Amongst her recent works: “Social Policies during the Lula Administration: The Conditional Cash Transfer Program Bolsa Família” (2014), *Brazil under the Worker's Party: Continuity and Change from Lula to Dilma* (Co-Ed. 2014); “Democracia participativa e cidadania no Brasil” (2013).<|endoftext|>THE GOOD AND THE BAD OF GLOBALIZATION\n\nAlthough globalization is a nebulous term for many Americans, it is the subject of a contentious worldwide debate. At the center of that debate are questions involving economic domination of world markets and distribution of wealth, as well as the homogenization of cultures.\n\nGlobalization is an ongoing process resulting in increased economic, political and cultural changes fostered through rapid worldwide communication and transportation. The last two decades of the 20th century witnessed the proliferation of satellite phones and Internet communication, as well as worldwide air, water and land transportation, transforming the diverse world into an interconnected place.\n\nWhile increased speeds of communication and transportation seem at first blush to be beneficial to everyone—particularly when combined with free trade and commerce—there are underlying concerns. These concerns deal with the", "num_tokens": 2048} {"category": "olmocr_science_pdfs-politics", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-politics/part-00-00000.npy", "text": " percent. Moreover, the total volume of cases filed with USCIS actually fell from 8,530,722 in FY 2017 to 7,650,127 in FY 2019—a drop of more than 10 percent. Given that the agency is fee-funded, this disparate level of growth in personnel appears unjustified and unsustainable.\n\nPerhaps most importantly, the growth in personnel does not appear to have resolved longstanding problems within the agency. Average case processing times—the time it takes the agency to adjudicate the various forms of petitions and applications that it receives, including applications for naturalization and permanent residency—surged by 46 percent between 2017 and 2019. The agency has therefore significantly increased its day-to-day costs at a time when its revenue from filing fees has decreased, while also taking significantly longer to meet its processing goals.\n\nThe agency is now asking American taxpayers for a bailout, while millions of people and employers continue paying considerable filing fees for a decreasing level of service, without any clear plan for improvement. News reports indicate that the agency is proposing to add a 10 percent surcharge on almost all applications and petitions to pay back the bailout, while at the same time racing towards finalizing a fee rule that would increases filing fees significantly, which could deter individuals from filing immigration benefit requests. As a condition for receiving congressional appropriations, Congress must impose common-sense reforms, as well as ensure that USCIS is transparent and responsible regarding its fiscal management.\n\nTo that end, Congress should appoint an independent auditor to conduct an immediate review of the agency’s funding request by June 15, as well as a full audit of its budget and operations by June 30. Congress should direct USCIS to provide the following data which are also set forth in the bipartisan Case Backlog and Transparency Act of 2020 (H.R. 5971):\n\n- Data showing case receipts for fiscal years 2018, 2019, 2020, broken down by form type.\n- Data, by form type, showing the number of pending benefit applications, the net backlog, and the gross backlog at the end of each quarter for fiscal years 2018, 2019, 2020.\n- Data showing the average processing time and processing time goals for each benefit application at the end of each quarter for fiscal years 2018, 2019, 2020.\n\n---\n\n\nAll USCIS Application and Petition Form Types (Fiscal Year 2019, 4th Quarter, Jul. 1 – Sep. 30, 2019), [https://www.uscis.gov/sites/default/files/USCIS/Resources/Reports%20and%20Studies/Immigration%20Forms%20Data/All%20Form%20Types/Quarterly_All_Forms_FY19Q4.pdf](https://www.uscis.gov/sites/default/files/USCIS/Resources/Reports%20and%20Studies/Immigration%20Forms%20Data/All%20Form%20Types/Quarterly_All_Forms_FY19Q4.pdf).\n\n• Data showing any transfers of funds between fee accounts and between Department components.\n\n• Approval and denial rates for processed cases, disaggregated by immigration benefit type for each quarter for fiscal years 2018, 2019, 2020.\n\n**In addition, Congress should ask USCIS to provide the following information:**\n\n• What is the precise methodology that was used as the basis for the agency’s projected shortfall of $1.2 billion due to the COVID-19 pandemic?\n\n• If the agency’s shortfall is in fact due to the COVID-19 pandemic, why did USCIS issue a similar projected shortfall in November 2019 when it published its most recent proposed fee rule?\n\n• If the agency was already anticipating a budget shortfall in 2019, why did it propose to transfer more than $100 million of its funding to U.S. Immigration and Customs Enforcement in its November 2019 proposed fee rule?\n\n• Can the agency provide a detailed accounting of the funds and resources that it has reallocated to other agencies?\n\n• Given the increases in overall processing times and the agency’s budgetary concerns, how has USCIS been able afford the diversion of hundreds of its staff to conduct enforcement work for ICE and CBP in the last year?\n\n• Has the agency provided a detailed analysis of the factors that have contributed to its delays in case processing?\n\n• How much money is the agency holding in its premium processing fee account and how are these funds currently obligated?\n\n• Has the agency provided detailed data on filings by week and visa category to substantiate its claim of an overall decrease of 70 percent in filings?\n\n• Has the agency provided detailed expenditure data for at least the last three years?\n\n• Has the agency provided information on per-officer productivity and metrics?\n\n• Has the agency provided detailed information on the recent growth of its Fraud Detection and National Security Directorate?\nUSCIS should adopt cost-efficient measures for adjudicating immigration applications and petitions\n\nIn recent years, USCIS has adopted a series of policies and practices that have created inefficiencies in its operations – increasing the agency’s overall cost of adjudicating immigration applications and petitions – while at the same time resulting in a reduction in the overall number of applications and petitions that the agency receives. Congress should not appropriate temporary funding until USCIS takes the following measures to reduce the cost of adjudicating immigration applications and petitions:\n\n• **USCIS should eliminate its in-person interview requirement for routine cases.** In October 2017, USCIS began implementing its in-person interview requirement for all individuals seeking lawful permanent residency through their U.S. employer as well as certain relatives seeking family reunification with asylees and refugees. Under prior policy, USCIS officers had discretion to require such interviews on a case-by-case basis, where, for example, applications presented fraud or national security concerns. The new policy mandates those interviews indiscriminately, despite no meaningful evidence of this requirement’s utility. Unneeded, time-intensive interviews drain agency resources. USCIS should eliminate its in-person interview requirement for routine cases that present no fraud or national security concerns.\n\n• **USCIS should reinstitute the agency’s 2004 “deference” policy.** In October 2017, USCIS rescinded longstanding guidance under which USCIS adjudicators deferred to prior approvals of temporary immigration benefits when processing requests to extend those benefits absent error or a material change in circumstances. Under the agency’s new guidance, USCIS personnel must now effectively re-adjudicate many previously approved petitions despite no change in the terms and conditions. This needless duplication of efforts squanders resources, drives delays, and creates inconsistency in adjudications. To more cost-effectively adjudicate petitions, USCIS should rescind its 2017 policy and reinstitute its 2004 deference policy.\n\n• **USCIS should reuse biometrics and waive the biometrics requirement for certain groups.** USCIS should exercise its discretion pursuant to 8 CFR 103.2(b)(9) to limit when biometrics need to be captured. In order to save personnel and processing costs, USCIS should reuse all biometrics that have been captured within the past five years for any form type and waive the biometrics requirement for individuals under the age of 14 or above the age of 65, as well as for applicants who have been previously vetted, such as Form I-539 and naturalization applicants.\n\n---\n\n\n• **USCIS should stop rejecting applications and petitions due to alleged incompleteness or blank spaces.** USCIS has recently begun implementing a policy in which the agency is rejecting, and in some cases denying, applications and petitions for alleged incompleteness for failure to complete certain sections of the form. This includes rejecting forms for failure to write “N/A” in boxes that are clearly inapplicable; for example, failing to write “N/A” in the “apartment number” box for an applicant who lives in a house. In some cases, USCIS has even rejected applications where an applicant or petitioner indicates “not applicable”, “na” or “none” instead of “N/A” in a particular section of the form. Requiring officers to review for non-material spaces and expend resources to return petitions and fees is an inefficient use of agency resources and creates an unnecessary barrier to accepting applications and petitions, especially for unrepresented applicants. USCIS should refrain from rejecting applications and petitions on this basis.\n\n• **Issue RFEs and NOIDS more judiciously.** In recent years, USCIS has been issuing Requests for Evidence (RFEs) and Notices of Intent to Deny (NOIDs) at an unprecedented high rate, which wastes limited staff resources and increases the overall time it takes from USCIS to adjudicate applications and petitions. For example, for H-1B petitions, USCIS data reveals the percentage of completed cases with RFEs increased from 22.3 percent in FY2015 to 40.2 percent in FY2019. The RFE rate reached 60 percent during the first quarter of FY2019, and was 47.2 percent during the first quarter of FY2020. Frequently, RFEs and NOIDs are issued seeking evidence that has already been provided or that is unnecessary to establish eligibility. The agency should take steps to issue RFEs and NOIDs more judiciously to spare agency resources.\n\n• **DHS should immediately suspend its public charge rule.** DHS recently implemented a convoluted and inefficient new framework that radically heightens the", "num_tokens": 2048} {"category": "olmocr_science_pdfs-politics", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-politics/part-00-00000.npy", "text": " We ask you to spread the word and Activate others. Including the community will give us more pressure to resolve the many attacks that we have felt in recent years.\n\nWhile addressing the members of ED 51, I said I would add one more word to the three directives of the RA and that word is VOTE. That is how our power can and will be felt. NYSUT is introducing a new campaign “Pledge to Vote”. Research has proven that IF A PERSON MAKES A FORMAL COMMITMENT TO DO SOMETHING, THEY ARE FAR MORE LIKELY TO FOLLOW THROUGH ON THAT COMMITMENT. I hope you will take action right away. Encourage your children and grandchildren who are not yet registered to vote to do so, then “Pledge to Vote”, as well.\n\nNYSUT has set a goal of signing up 95% of its members in this “Pledge to Vote” Campaign. Volunteers will ask members to sign pledge post cards or to sign the pledge at pledge.nysut.org.\n\nCan you be an educated, motivated and activated retiree and sign on to the “Pledge to Vote” Campaign even before you are asked? RC 7’s delegates and Executive Board have signed on - NOW IT’S YOUR TURN!\n\n**In Remembrance**\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
Jamesville-DewittMarcellus
Angela MarzialeCarmen Costa
Henrietta MerelHelen Ordon
Robert Reals, Sr.Audrey Riggall
Liverpool
Gloria Bassi
Michael Gorman
Beverly Grome
Fayetteville-ManliusOCM BOCES
Robert AveryJohn Fiori + Syr
Betty OsbornDorothy Truex + Aub, Marcellus
Alice Pearlman
Priscilla Steinbach
BaldwinsvilleSyracuse
Mary AllenArthur Belge + ESM
Kenneth CookGloria Butler
East Syracuse-MinoaSandra Carroll
Charlene ConnollyGary Crofoot
Peter D’Agostino
Audrey Damon
Paul Dievendor
Vida Fellows
Joan Gilels
Betty Koziol
Maureen Mirabito
Caroline Richardson
Catherine Steiger
\n\n**North Syracuse**\n\nRobert DeDell, Sr.\nJames Lamic\nEdith Spann\n\n**Fabius-Pompey**\n\nJoyce Berg\n\n**Onondaga CC**\n\nBernard Naselli\n\n**Westhill**\n\nTheresa Blair\nRichard Pietrowicz\n\n**Port Byron**\n\nJean Farrell\n\n**Auburn**\n\nMildred Cefaratti\nAlfred Farrell\n\n**West Genesee**\n\nJohn Calvert\nJoin Us on June 21, 2016 for the RC 7 Luncheon at NYSUT, 4983 Brittonfield Parkway, E. Syracuse\n$15 per person\nRegistration @ 11:30 • Meeting @ Noon • Lunch @ 12:30 • Scholarship Presentations after Lunch\nSpend time with friends and colleagues and congratulate the scholarship winners!!\n\nLuncheon Buffet catered by John’s and Sons includes Chicken Cordon Blue, Garlic Mashed Potatoes, Vegetables, Romanian Strawberry Salad, Rolls and Butter, Cookies, Soda and Water\n\nDirections: From Rte. 481, take exit 7. Turn right, then left onto Brittonfield Parkway. NYSUT is on the right.\n\nReservation Form\n\nName ___________________________ Phone ___________________________\n\nEmail __________________________\n\nNumber of reservations ________ at $15. Amount enclosed $ _________\n\nPlease send reservation form and a check payable to NYSUT RETIREE COUNCIL 7 to:\nFRAN HUDSON, NYSUT Regional Office, 4983 Brittonfield Parkway, Box 247, E. Syracuse, NY 13057\nReservations must be received by June 1st. No one can be seated without a reservation.\n\nRC 7 TRIPS\n\nRC 7 Trip: Tioga Train “Oktoberfest Express” October 21, 2016\n\n- Round trip motor coach transportation to Wellsboro PA\n- One lunch aboard Tioga Railroad\n- Tour of Leonard Harrison State Park and “Grand Canyon of the East”\n- Admission to:\n - Tioga Railroad Scenic Tour\n - Harrison State Park\n - Highland Chocolate Factory Store\n\nTioga Train Trip Info: Cost is $140 per person.\nInitial deposit of $40 per person and registration form is necessary to reserve your seat.\nBalance will be due by September 15, 2016.\n\nBella Tours ~ 315-652-0121 ~ bellatours@hotmail.com\nQuestions? Contact Marge Schuster at 446-2037 or mschuster730@yahoo.com or go to RC7’s website.\n\nNYSUT RETIREE COUNCIL 7 & 8 Tioga Train “Oktoberfest Express” RESERVATION FORM\n\nPlease complete the following form for each traveler and return to Bella Tours and Travel Inc. 305 Vine Street, Suite 9, Liverpool, NY 13088\nPhone# 315-652-0121 Fax# 315-299-4733 email: bellatours@hotmail.com\n\nName ____________________________________________ M______F______\n\nAddress __________________________________________\n\nHome Phone # ___________________________ Cell Phone# ___________________________\n\nOptional Cancellation Insurance? Yes___ No____ (please submit with deposit - insurance is $10 per person - additional info available at Bella Tours)\n\nMethod of payment: Cash_____ Check#_____ Credit Card ____ (call cc info into Bella) Money Order _____\n\nPlease indicate any physical limitations, and dietary restrictions.\nBring a list of medications and allergies with you on tour.\n\nMake checks payable to Bella Tours and Travel Inc. (There will be a $20 fee for any returned checks.)\nSave with NYSUT Member Benefits\n\nThe NYSUT membership is made up of a variety of diverse professionals within the education and health care industries -- joining together in support of those who depend on them. We salute these men and women for their dedication and the sacrifices they make on a daily basis to help improve the lives of others.\n\nAnd we are proud to offer you -- the hard-working NYSUT member -- an opportunity to participate in the more than 40 endorsed programs & services offered by NYSUT Member Benefits.\n\nLook to Member Benefits for crucial insurance programs such as auto, homeowners, life, disability, or long-term care insurance. Member Benefits also offers a variety of travel, entertainment & shopping options to help you with everything from daily purchases to those special once-in-a-lifetime excursions.\n\nThe following is just a sampling of the endorsed programs & services available to NYSUT members & their families:\n\n- Homeowners Insurance\n- Auto Insurance\n- Legal Service Plan\n- Financial Counseling Program\n- Life Insurance\n- Vision Plan\n- ID Watchdog\n- PayCheck Direct\n- Car & Truck Rentals\n- Wyndham Hotels\n- Endless Vacation Rentals\n- Buyer’s Edge, Inc.\n\nTo learn more about Member Benefits-endorsed programs & services, visit memberbenefits.nysut.org or call 800-626-8101.\n\nFor information about contractual endorsement arrangements with providers of endorsed programs, please contact NYSUT Member Benefits. Agency fee payers to NYSUT are eligible to participate in NYSUT Member Benefits-endorsed programs.\n\nMay/June ’16<|endoftext|>NCPR Diversity Statement 2018\n\nWe believe that diversity is essential in all areas of our operation: staffing, broadcast and digital content, and advisory board participation.\n\n1. **Staffing.** NCPR is recognized by the federal government as a woman-managed broadcast entity. However, NCPR is always striving to diversify the racial makeup of the staff. This is a challenge because the station is located in a region that has only a one percent measurable permanent population that is non-white. The station does", "num_tokens": 2048} {"category": "olmocr_science_pdfs-politics", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-politics/part-00-00000.npy", "text": " of proletarians necessary to this system. Today, however, such methods are no longer necessary. The economic power of the system has become sufficient to accomplish the desired result without breaking the law of private property. In fact, it is by the operation of this law that every year a sufficient number of farmers and independent craftsmen are given the choice between starvation and work in the factories.\n\nThat the number of the proletariat is steadily on the increase is such a palpable fact that no one attempts to deny it, not even those who would make us believe that society today rests on the same basis as it did a hundred years ago, and who try to paint the picture of the small producer in rosy colors. Indeed a change has taken place in the make-up of society, just as it has in the system of production. The capitalist form of production has overthrown all others, and become the dominant one in the field of industry; similarly wage-labor is today the dominant form\nof labor. A hundred years ago the farming peasantry took the first place; later, the small city industrialists; today it is the wage-earner.\n\nIn all civilized countries the proletarians are today the largest class; it is their condition and modes of thought that tend to control those of all the other divisions of labor. This implies a complete revolution in the condition and thought of the bulk of the population. The conditions of the proletariat differ radically from those of all former categories of labor. The small farmer, the artisan, the small producers generally, were the owners of the product of their labor by reason of their ownership of the means of production. The product of the labor of the proletarian does not belong to him, it belongs to the capitalist, to the owner of the requisite instruments of production. True enough, the proletarian is paid by the capitalist, but the value of his wages is far below that of his product.\n\nWhen the capitalist in industry purchases the only commodity which the proletarian can offer for sale, that is, his labor-power, he does so for the sole purpose of utilizing it in a profitable way. The more the working-man produces, the larger the value of his product. If the capitalist were to work his employes only long enough to produce the worth of the wages he pays them, he would clear no profits. But his capital cries for profits and finds in him a willing listener. The longer the time is extended during which the workmen labor in the service of the capitalists, over and above the time needed to cover their wages, the larger is the value of their product, the\nlarger is the surplus over and above the capitalist outlay in wages, and the larger is the per cent of exploitation to which these workmen are subject-ed. This exploitation of labor finds a limit only in the powers of endurance of the working people and in the resistance they may be able to offer to their exploiters.\n\nIn capitalist production, the capitalist and the wage-earner are not fellow-workers, as were the employer and employed in previous industrial epochs. The capitalist soon develops into, and re-mains, essentially a merchant. His activity, in so far as he is at all active, limits itself, like that of the merchant, to the operations of the market. His labors consist in purchasing as cheaply as possible the raw material, labor power and other essentials, and selling the finished products as dearly as possible. Upon the field of produc-tion itself he does nothing except to secure the largest quantity of labor from the workmen for the least possible amount of wages, and thereby to squeeze out of them the largest possible quantity of surplus values. In his relation to his employes he is not a fellow-worker, he is only a driver and exploiter. The longer they work, the better off he is; he is not tired out if the hours of labor are unduly extended; he does not perish if the meth-od of production becomes a murderous one. The capitalist is vastly more reckless of the life and safety of his operatives than the master-workman of former times. Extension of the hours of la-bor, abolition of holidays, introduction of night labor, damp and overheated factories filled with poisonous gases, such are the \"improvements\"\nwhich the capitalist mode of production has introduced for the benefit of the working-class.\n\nThe introduction of machinery increases still further the danger to life and limb for the working-man. The machine system fetters him to a monster that moves perpetually with a gigantic power and with insane speed. Only the closest, never-flagging attention can protect the working-man attached to such a machine from being seized and broken by it. Protective devices cost money; the capitalist does not introduce them unless he is forced to do it. Economy being the much vaunted virtue of the capitalist, he is constrained by it to save room and to squeeze as much machinery as possible into the workshop. What cares he that the limbs of his working-men are thereby endangered? Working-men are cheap, but large, airy workshops are dear.\n\nThere is still another respect in which the capitalist employment of machinery lowers the condition of the working-class. It is this: the tool of the mechanic of former times was cheap and it was subject to few changes that would render it useless. It is otherwise with the machine; in the first place, it costs money, much money; in the second place, if through improvements in the system it becomes useless, or if it is not used to its full capacity, it will bring loss instead of profit to the capitalist. Again, the machine is worn out, not only through use, but through idleness. Furthermore, the introduction of science into production constantly causes new discoveries and inventions to take the place of the old ones. So, because they cannot compete with the improved\nmachinery, now this machine, now that, and whole factories at once, are rendered useless before they have been used to their full extent. Therefore, every machine is in danger of being made useless before it is used up; this is sufficient ground for the capitalist to utilize his machine as quickly as possible from the moment he puts it in operation. In other words, the capitalist application of the system of machinery is a spur that drives the capitalist to extend the hours of labor as much as possible, to carry on production without interruption, to introduce the system of night and day shifts, and, accordingly, to make of the unwholesome night work a permanent system.\n\nAt the time the system of machinery began to develop, some idealists declared the golden age was at hand; the machine was to release the working-man and render him free. In the hands of the capitalist, however, the machine has made the burden of labor unbearable.\n\nBut in the matter of wages, also, the condition of the wage-earner is worse than that of the medieval apprentice. The proletarian, the workman of today, does not eat at the table of the capitalist; he does not live in the same house. However wretched his home may be, however miserable his food, nay, even though he famish, the well-being of the capitalist is not disturbed by the sickening sight. The words wages and starvation used to be mutually exclusive; the free working-man formerly could starve only when he had no work. Whoever worked earned wages, he had enough to eat, starvation was not his lot.\nFor the capitalist system was reserved the unenviable distinction of reconciling these two opposites—wages and starvation—raising starvation-wages into a permanent institution, even into a prop of the present social system.\n\n2. Wages.\n\nWages can never rise so high as to make it impossible for the capitalist to carry on his business and to live from the profits of it; under such circumstances it would be more profitable for the capitalist to give up his business. Consequently, the wages of the working-man can never rise high enough to equal the value of his product. They must always be below that, so as to leave a surplus; it is only the prospect of a surplus that moves the capitalist to purchase labor power. It is therefore evident that under the capitalist system the wages of the workmen can never rise high enough to put an end to the exploitation of labor.\n\nThe surplus which the capitalist class appropriates is larger than is usually imagined. It covers not only the profits of the manufacturer, but many other items that are usually credited to the cost of production and exchange. It covers, for instance, rent, interest on loans, salaries, merchant’s profits, taxes, etc. All these have to be subtracted from the surplus, that is, the excess of the value of the product over the wages of the working-man. It is evident that this surplus must be a considerable one if a concern is to “pay.” It is clear that the wages of the working-man cannot rise high enough to be even approximately\nequal to the value of his profit. The capitalist system means under all circumstances the exploitation of the wage-workers. It is impossible to abolish this exploitation without abolishing the system itself. And the exploitation must be great even where wages are high.\n\nBut wages rarely reach the highest point which even these circumstances would permit; more often they are found to be nearer to the lowest possible point. This point is reached when the wages do not supply the workman with even the barest necessities. When the workman not only starves, but starves rapidly, all work is at an end.\n\nThe wages swing between these two extremes. The less the necessities of the workman, the larger the supply of labor on the market, and the slighter the capacity of the working-man for resistance, the lower wages sink.\n\nIn general, wages must be high enough to keep the working-man in a condition to work, or, to speak more accurately, they must be high enough to secure to the capitalist the measure of labor-power which he needs. In other words, wages must be high enough, not only to keep the working-men in a condition to work, but also in a condition to produce children to replace them", "num_tokens": 2048} {"category": "olmocr_science_pdfs-religion", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-religion/part-00-00000.npy", "text": " the rich more than the poor; for they are all the work of his hands,' Job xxxiv. 19.\n\n6. Christ is a very merciful King. Mercy is the prevailing attribute of his nature, which he delights to make the children of men feel the benign effects of. Therefore he has proclaimed himself to be 'the Lord, the Lord God merciful and gracious.' He does not\nwillingly grieve nor afflict the children of men. He takes no pleasure in the blood of his most implacable and inveterate foes; and bears with a very tender hand upon his afflicted, broken, and discouraged people. For the bruised reed he will not break, nor quench the smoking flax. He heals the broken in heart, and binds up all their wounds. In all the afflictions of his people he is afflicted; and he that touches them, touches the apple of his eye.\n\n7. Christ is a very meek and patient King. Never any in the world could have borne such indignities, or digested such affronts, as he has met with from such of his own subjects, to whom he has shown the most distinguishing kindness. Had he not been thus patient, Judah and Ephraim had soon been unpeopled. 'As for them, they were bent to backsliding: though they called them to the Most High, none at all would exalt him,' Hos. xi. 7. Though he sent many prophets unto them, calling upon them, and saying, 'Return, ye backsliding children,' &c. yet they did not regard them. Who after this could imagine, that this just and jealous King would have entertained one thought of kindness towards them? yet hear what he says, 'How shall I give thee up, Ephraim? how shall I deliver thee, Israel? how shall I make thee as Admah? how shall I set thee as Zeboim? mine heart is turned within me, my repentings are kindled together;' ver. 8.\n\n8. Christ is a very beautiful King. His glory outshines the sun in its full strength. The united constellations of all created beauty fall infinitely short of his; for he is fairer than the children of men, yea, he is altogether lovely.\n\n9. Christ is a most humble and condescending King: for he does not disdain to be acquainted with the meanest among the sons of men; the beggar will be as welcome to him as the prince. The poor and the rich are all one to him; and he takes as much notice of Job on the dunghill, as of David on the throne. Hear what the prophet, in the name of this great King, says, Isa. lxvi. 1, 2. 'Thus saith the Lord, the heaven is my throne, and the earth is my footstool: where is the house that ye build unto me? and where is the place of my rest? for all those things hath mine hand made, and all those things have been, saith the Lord: but to this man will I look, even to him that is poor and of a contrite spirit, and trembleth at my word.'\n\n10. Christ is a very rich and opulent King. The earth is the Lord's, and the fulness thereof. He is the heir of all things. Honour and riches are with him, yea, durable riches and righteousness. So that those who are his honest and faithful subjects shall never want any thing that is good for them. Such are the immense trea-\nsures and infinite riches of this glorious King, that all the ministers on earth, and all the angels in heaven, cannot possibly lay them open. For can they grasp the heavens in their arms, and the sun in the hollow of their hands? can they weigh the mountains in scales, and the hills in a balance? Suppose they could do all this, and a thousand times more, yet could they not give an account of the estate of this my King. So that his subjects shall never want either grace or glory.\n\n11. He is an immortal and everlasting King. 'The heavens and the earth shall perish, but he shall endure; yea, all of them shall wax old like a garment; as a vesture shall they be changed. But he is the same, and his years shall have no end,' Psal. cii. 26, 27. Though the best, the wisest, and the richest kings upon earth will die, and leave their subjects exposed to many inconveniences consequent on their death, yet this King of glory lives for evermore, and will rule over his subjects with justice, mercy, and righteousness, through all the ages of eternity.\n\nIt remains to make some improvement of this subject.\n\n1. The kings of the earth have no ground to grudge the kingdom of Christ its freedom in their dominions; seeing it is a spiritual kingdom, and quite of another nature than the kingdoms of this world; and interferes not with any of the just rights and prerogatives of earthly crowns. Yet how sad is it that this kingdom should be an eye-sore to the kings of the earth, and that they should employ their power to suppress and bear it down?\n\n2. The Pope's supremacy, and the supremacy of the magistrate over all persons, and in all causes, whereby they have been made heads of the church, is daring blasphemy against Christ, a bold usurpation of his crown and dignity, and high rebellion against him, who will not suffer the jewels to be stollen from his crown, to deck the head of any earthly power whatever, without the severest testimony of his resentment.\n\n3. There is a government of the church distinct from and independent upon the civil government, lodged in the hands of church-officers, whereby they have a power, in the name of the Lord Jesus Christ, to meet in judicatories, transact matters there according to the word and laws of this King, to dissolve their meetings in his name, to appoint fasts and thanksgivings, as the state of the church may require, to inflict censures on offenders, bind and loose, and to do every thing necessary for advancing this kingdom in a spiritual way, but no otherwise. And whoever presumes to hinder them in these acts of administration, or arrogate any of them to themselves, are in so far enemies to Christ and his royal prerogatives.\n4. This government of the church is not alterable by any power on earth, whether civil or ecclesiastic; nor have they that are entrusted with it any power to give up the rights and privileges conferred on them by Christ to any person or persons whatsoever. If they do so, they are unfaithful to their trust, and their conduct will be highly resented another day.\n\n5. None have power to appoint any parts of worship in the Church that Christ has not appointed. For he is the sole Lawgiver of the church, and has in his word appointed the platform of the worship which he requires of his subjects. And therefore for any to appoint ceremonies and rights of worship which bear not the stamp of his institution, act in opposition to his laws; and all their rites are useless and unprofitable. Equally culpable are those who presume to make any terms of communion, or of admission to the ordinances of the church, but such as Christ has left behind him. This is high rebellion against the King of Zion.\n\n6. The truth of the kingdom of Christ is a solid ground of suffering, on which people may comfortably lose whatever is dear to them in the world, knowing they are in the way of their duty. And this was the ground of the sufferings of the Lord's people in the persecuting reigns before the Revolution, whose memory ought to be always regarded, for their zealous and firm adherence to the prerogatives of Christ's kingdom.\n\n7. The church shall ride out all the storms that can blow upon her, whether from earth or hell. All plots and contrivances against her shall be defeated in the end; for her King liveth, and will never suffer the gates of hell to prevail against her. The crown shall flourish on his head, when the church's enemies shall be ruined, and their kingdoms laid by for ever.\n\n8. However weak any poor believer be amongst many enemies, yet the broken ship shall surely come to land. The spark of grace shall be preserved amidst an ocean of difficulties and corruptions, within or without. The seed of grace sown in the heart shall be maintained, and spring up in the fruits of holiness. All Christ's honest subjects shall be kept by the power of God through faith unto salvation.\n\n9. Whoever they be that refuse subjection to the ordinances and discipline of Christ's house, do in so far reject Christ from ruling over them. Consider this, ye that neglect a regular attendance upon the ordinances of divine institution, and will not submit to discipline and censure for your scandalous, and offensive behaviour. Ye are the enemies of Zion's King, and your conduct plainly declares, that ye will not have this man to reign over you. Repent of this your rebellion, otherwise ye shall be slain as his enemies.\n10. See, believers, ye that are striving against sin and Satan, and\nwaging war with your lusts and all Christ's enemies, to whom you\nare to have recourse for help in all your difficulties; even to your\nAlmighty King, who is infinitely able to help you in all straits.\nMake use of him daily as your King, applying and trusting to him\nfor life, strength, defence, and victory over all your enemies.\n\n11. Lastly, Ye that are strangers to Christ, captives to Satan,\nand under a miserable thraldom to your own lusts, will ye be per-\nsuaded to come under", "num_tokens": 2048} {"category": "olmocr_science_pdfs-religion", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-religion/part-00-00000.npy", "text": " مِنْ الْقُرْآنِ.\n3. قال: فقد أملكتكِ بِبِأَمَامَكَ مِنْ الْقُرْآنِ.\n4. قال: فقد أملكتكِ بِبِأَمَامَكَ مِنْ الْقُرْآنِ.\n5. قال: فقد كنتُكَهَا بِمَا مَعَكَ مِنْ الْقُرْآنِ.\n\nThe above five narrations are related to the same event and are narrated from the same Sahabi whose name is Hazrat Sahl bin Sa'd. So the fact comes to the fore that although there is a literal difference between them, there is no spiritual difference. For example, زَوَّجْتُكَهَا and نْكَحْتُكَهَا are synonymous, similarly, there is no difference between بما معك and على ما معك, the purpose of both phrases is the same. In the same way, أملكتكِ and ملْكَتْكَهَا are synonymous.\n\nThere is no semantic difference among the above five traditions.\n\nAlthough there is no difference in the subject matter of the narrations due to the meaning of the narration, scholars and researchers have tried their best in this hadith to point out the words exactly stated by the Holy Prophet (saw). Along with the rules of critique of Hadith, the narrators and scholars were also endowed by Allah Almighty with the special capability and ability of recognition of Hadith by which they could know the words that came from the tongue of the Holy Prophet. In this regard, Ibn Daqiq al-Eid says:\n\n(These are the same words about an incident, but even though the source of the hadith is the same, they differ. One of the above words is the statement of the Holy Prophet (PBUH). The\n\n---\n\n29 Bukhari, Muhammad ibn Isma'il, Al-Jami 'al-Sahih, Kitab al-Nikah, Bab al-Tazwij ala al-Quran wa bighair sadaq, Dar al-Shaab, Cairo, 1st ed. 1987, No. 5149\n30 Bukhari, Al-Jami 'al-Sahih, Kitab Al-Nikah, Bab iza kaana Al-Wali huwal Khatib, No. 5133\n32 Ahmad ibn Hanbal, Al-Musnud: 334/5, No. 22832\n33 Bukhari, Al-Jami 'al-Sahih, Kitab Al-Libas, Bab Khatam Al-Hadid, No. 5871\n34 Ibn Hajar Asqalani, Fateh al-Bari: 176/9\ncorrect thing in such narrations is to take the path of priority after reflection. It is narrated from Imam Dar Qutni that the narrator who has narrated the words of زوجتكها is correct, the narrators who narrate these words are more in number and also have a better memory.)\n\nAllama Alaai Describes:\n\nIt is known that the Holy Prophet (PBUH) did not utter all these words at that time, so now the only thing left is that he uttered one of these words and the rest of the interpretations are sense-reportings. My heart is inclined towards the preference of this narration which has the word of التزويج because it is the narration of most of the narrators and the words of this Companion زوجتكها يارسول الله also have its context.)\n\nIn the same way, Hafiz Ibn-e-Hajr writes:\n\n(From the above discussion, it got clear that the number of narrators who have narrated the words of التزويج is more than the number of narrators who have narrated other words. In particular, they have guards like Imam Malik. The narration of Sufyan ibn Uyena is similar to his narration and so is the narration of Zaydah.)\n\n5.3 Third case: The narration of Labied ibn Rabi’ah:\n\nLabid ibn Rabia ibn Amir Amiri was one of the great poets of the pre-Islamic era. When he became a Muslim, he gave up poetry and settled in Kufa. He died at the age of 150 in the Ottoman Caliphate.\n\n35 do\n36 do\n37 Ibn Hajar, Al-Asabah fi Tamyiz al-Sahabah, Dar Al-Jail Beirut, 1st ed. 1412 AH: 675/5\n38 Muslim ibn Hajjaj, Al-Jami’ al-Sahih, Kitab al-Sha’r, Chapter, No. 2256\n39 Bukhari, Muhammad ibn Isma’il, Al-Jami’ al-Sahih, Kitab al-Manaqib, Bab Ayam al-Jahiliyyah, No. 3553\nThe above differences in the words of traditions, in the tradition of \"لا كُل صَدَقُ بَيْتٍ قَالَهُ إلشاعِرُ أ، مَا خَلاَ إلِه\" in the second tradition \"لا كُل صَدَقُ بَيْتٍ قَالَتْهُ إلشُعَرَإءُ أ، مَا خَلاَ إلِه\" in the third tradition \"لا كُل صَدَقُ بَيْتٍ قَالَهُ إلشاعِرُ أ، مَا خَلاَ إلِه\" in the fourth one are the words of all these narrations have been narrated from the same Companion, Hazrat Abu Hurayrah. Now, it is unreasonable to say about all these narrations that the Holy Prophet (peace and blessings of Allah be upon him) uttered all these words and none of his companions heard them except Abu Hurayrah, but the fact is that in these narrations, the narrators have used synonyms while sense-reporting, which has led to differences in the words of the text.\n\nAll the above narrations are of the type of sense-reporting. The narrators of the hadith narrated them using synonyms which caused some differences in the appearance of the words. However, they have preserved the meaning of these narrations to such an extent. That despite the difference of words, there is no difference of meaning or deficiency in any of the traditions.\n\n5.4 Fourth case; The Companions narrate the story of the Holy Prophet in their own words:\n\nThis form of sense-reporting is found in those narrations which are related to physical, verbal, or moral conditions. In these cases, it is not possible for the words of all the Companions to be the same, because how the Companions saw them interpreted them in his own words, so there are differences of words in these traditions. There are hundreds of such examples in the books of hadith, here are a few examples.\n\nExamples of Practical Narrations:\n\n1. عن عائشة رضِي إلله عنها قَالَتْ كَانَ رَسُولِ إللهِ أ، نَكْسِرُ حَرَّ هذِه بِبَرْدِ هذَا بِبَرْدِ هذَا بِبَرْدِ، فَيَقُولُ يَأ ُهذَا وَبَرْدَ هذَا بِحَرَّ هذَا. \n\n2. عن أبي بِكَرَ قَالَ، رَأى رَسُولُ إللهِ أ، يَأ بَيْنَ إلِطِبِ وَإِلْخِرْبِزِ. \n\n3. عن عائشة أ ن إلنبي أ، كان يأ كل إلبطيخ بالرطب.\n\nThese all three narrations are related to the action of the Holy Prophet, they have been narrated by three different Companions and the words of each of these narrations are different.\nfrom the other, the interpretation of each Companion is different from the other, and the addition of words in some. However, the main theme of all of them is the same and that is to eat watermelon mixed with moist dates.\n\n**Examples of Verbal Traditions:**\n\nThe following Hadiths are given as examples in the oral traditions;\n\n1. عن أبي هريرة قال: \"بيتُنا الجاهليَّةُ يَتَعَبَّونَ إِلَى الْحَبَشَةِ.» فَقَالَ كَبْرُاءُ ىَتَعَبَّوْنَ إِلَى الْحَبَشَةِ يَتَعَبَّوْنَ إِلَى الْحَبَشَةِ.»\n\n2. عن عائشة رضي الله عنها قال: \"يا عُمَّارُ، أَيْ هُوَ إِلَى إِلْحَبَشَةِ يَلْعَبُونَ", "num_tokens": 2048} {"category": "olmocr_science_pdfs-religion", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-religion/part-00-00000.npy", "text": " and Catechists are to be licensed. The criteria for these functions are spelled out in the canons (Title III, Canon 4, Sec. 3, 5 & 8). Clergy, or senior wardens of vacant parishes, should request licensing for these three functions with a letter to the bishop. The letter should clearly state that the canonical criteria have been met and the person is adequately trained.\n\nPart B: REQUEST AND CERTIFICATION\n\nI ______________________________ , hereby request that the persons listed in Part C of this form be licensed and appointed by the Bishop, to officiate in the lay ministry indicated, under my supervision, at:\n\n________________________________________________________________________\nChurch Name and Mailing Address\n\nAs required by the Canons of the Episcopal Church, USA, Title III.4, I hereby certify that the person(s) listed below are:\n\n(1) a confirmed adult communicant(s) in good standing;\n(2) regular in participating in the worship of the church and receiving Holy Communion; and\n(3) are active in the support of their mission or parish.\n\nFurthermore, I certify that they have received and will continue to receive appropriate training, continuing education, and oversight.\n\n____________________________________ _________________________________\nClergy/Senior Warden of Vacant Parish (Signature) Date\n### Part C: LICENSING AND APPOINTMENT\n\n(Please Type Or Print)\n\nPlease mark (XX) appropriate column(s) for each applicant.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
Applicant’s nameWorship Leader (WL)Eucharistic Minister At Celebrations of Holy Eucharist (EM)Eucharistic Visitor Take consecrated Sacrament to shut-ins (EV)
\n\nI hereby LICENSE AND APPOINT the above-named person(s) to officiate for those duties as marked above for a period of three years from this date.\n\n____________________________________ _____________________ \nBishop of Southern Virginia Date\n\nMail to: Bishop’s Office (Licensing), Diocese of Southern Virginia, 11827 Canon Blvd., Suite 101, Newport News, VA 23606\nAudits\n\nThe Canons require that all congregations must provide the Diocese a copy of their annual audit report or a letter from an independent accountant summarizing the audit report. **This audit report or the accountant’s letter is to be mailed to the Diocese not later than September 1 of each year.**\n\nIn addition to the annual audit requirement, a congregation is required to have their books audited whenever a rector leaves a parish. Recognizing that a number of our congregations are small and therefore, an independent audit would be too expensive, the diocesan Treasurer will accept a letter from the congregation’s Finance Committee, stating that the vestry-appointed Finance Committee has conducted an audit of the books and records and are satisfied with the results. Alternatively, the Diocese may be able to recommend someone to conduct an audit for the congregation. If the congregation employs an accountant to conduct the audit, the vestry should employ the accountant. Specifically, the treasurer or comptroller should not select or employ the accountant.\n\nThe Manual of Business Methods in Church Affairs is published by the national church and is available on-line. It covers Financial Management, Internal Controls, Bookkeeping, Taxes, Clergy Discretionary Funds, Audit Guidelines for congregations, insurance, and other important topics. The annual audit of the parish should be conducted using the guidance and checklists provided in Chapter VI of The Manual of Business Methods in Church Affairs. An audit conducted in accordance with this chapter will fulfill all the requirements of the Diocese.\nStaff Position Descriptions & Guidelines\n\nA position description is a statement of the duties and responsibilities assigned to a single individual or a group of individuals performing essentially identical duties. When used as part of a pay system, it is the basis for determining pay grade or salary range. (An employee's length of service in a position, level or qualifications are also used to determine an actual salary.) The duties assigned a position also are the determinants of the qualifications required for a position and thus of the type of person sought for a position.\n\nIt is in both the employee's and the supervisor's interest to have accurate position descriptions. The employee's because it determines his or her pay. An inaccurate position may result in inadequate or unfair pay. The supervisor's because it describes what may be fairly expected of an employee, and because it provides the basis for setting performance objectives to be used in performance evaluation.\n\nThe first place you should go with questions is your immediate supervisor. It is essential that you and your supervisor agree on the duties and level of responsibility described.\n\nSection A - Title\nA word or two that identifies the position, e.g., Parish Administrator, Secretary to the Rector, Receptionist, Comptroller.\n\nSection B - Basic Purpose of the Position\nA sentence or two that explains the title, locates the position in the organization and tells why it exists but does not describe the duties.\n\nSection C - Specific Duties\nA concise paragraph describing each major duty. A major duty is an assignment that is regularly performed, occupies a significant amount of time (10%) and requires a skill or skills needed for successful performance of the duties of the position. Please include the approximate percentage of time each duty occupies. Duties that occupy less than 10% of the time should be grouped into a single major duty that does occupy 10% of the time. For instance, a position may involve the preparation of several quarterly or monthly reports, each taking a day or a major part thereof. While no one of them is more than 1 or 2%, if they were grouped in a single duty they may well aggregate more than 10%.\n\nStaff Position Descriptions Guidelines\n\nDuties that are not performed regularly (once a year is regularly if it takes 10% of the time and represents a skill needed) should not be included, nor should duties that are not representative of the skills needed for the job.\n\nSection D - Nature and Scope of Decisions and Recommendations\nA brief description of the different decisions and recommendations made by you in doing the job and the impact of those decisions and recommendations on the activities of the parish. Of particular importance is the finality of decisions and the respect given recommendations.\nSection E - Nature and Importance of Personal Contacts\nA brief description of the who and why of the personal contacts you experience in performing the major duties of the position, i.e. giving or getting information, solving problems, setting up meetings.\n\nSection F - Supervision Received\nTo whom do you report? How are instructions and assignments given? How often? How is work reviewed? By whom? How often?\n\nSection G - Supervision Exercised\nWhat positions do you supervise? How are instructions and assignments given? What is the authority to accept or reject the work of supervised employees? What is the authority to approve leave, reward or punish for work performed (or not performed) or change assignments?\n\nSection H - Duration of Unsupervised Performance\nHow long do you normally work on a project or on continuing operations without requiring a review session with your supervisor? This may vary from major duty to major duty. Be specific if this is so. The result may be expressed in hours, days or months.\n\nSection I - Skills Required\nList: manual skills needed (e.g., typing, word-processing); educational and professional requirements (e.g., writing reports and articles for publication, ability to meet and greet visitors); and, things unique to the position. Do not list skills that you have that are not being used and that the major duties do not require, e.g., don't list shorthand skills if dictation is not taken.\nStaff Evaluations\n\nA PROPOSAL FOR REVIEWING WORK AND JOB DESCRIPTION PARISH STAFF\n\nSTAFF PERSON’S NAME & DATE\n\nPOSITION/TITLE\n\nSUPERVISOR/REVIEWER\n\nNOTE: It is intended that this mutual review of ministry be a dialogue. It is based on the assumption that some form of accountability goes with responsibility and the assumption that mutually working out our functions and assignments increases our commitment and satisfaction. We hope it will serve to open up communications between a given staff person and his/her supervisor, be a means to improve both our work product and working conditions, and be a means for a more cohesive, happy and effective staff family.\n\nI. Each with a copy of the latest job description in hand, the staff person responds to the following:\n 1. What’s going well for you?\n 2. What parts of your job give you the most satisfaction?\n 3. What special accomplishment do you feel you have made over the past year?\n 4. Which of your expectations do you feel have been unrealistic?\n 5. What factors do you feel have been barriers to your effectiveness?\n 6. What parts/aspects of your work are disappointing? . . . confusing? . . . demeaning", "num_tokens": 2048} {"category": "olmocr_science_pdfs-religion", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-religion/part-00-00000.npy", "text": " to missionary activity by fostering the commitment of the particular churches - especially those of recent origin - to send forth and receive missionaries; and to assure non-Christians and particularly the authorities of countries to which missionary activity is being directed that all of this has but one purpose: to serve man by revealing to him the love of God made manifest in Jesus Christ.\n\n3. **Peoples everywhere, open the doors to Christ!** His Gospel in no way detracts from man's freedom, from the respect that is owed to every culture and to whatever is good in each religion. By accepting Christ, you open yourselves to the definitive Word of God, to the One in whom God has made himself fully known and has shown us the path to himself.\n\nThe number of those who do not know Christ and do not belong to the Church is constantly on the increase. Indeed, since the end of the Council it has almost doubled. When we consider this immense portion of humanity which is loved by the Father and for whom he sent his Son, the urgency of the Church's mission is obvious.\n\nOn the other hand, our own times offer the Church new opportunities in this field: we have witnessed the collapse of oppressive ideologies and political systems; the opening of frontiers and the formation of a more united world due to an increase in communications; the affirmation among peoples of the gospel values which Jesus made incarnate in his own life (peace, justice, brotherhood, concern for the needy); and a kind of soulless economic and technical development which only stimulates the search for the truth about God, about man and about the meaning of life itself.\n\nGod is opening before the Church the horizons of a humanity more fully prepared for the sowing of the Gospel. I sense that the moment has come to commit all of the Church's energies to a new evangelization and to the mission *ad gentes*. No believer in Christ, no institution of the Church can avoid this supreme duty: to proclaim Christ to all peoples.\n\n**CHAPTER I - JESUS CHRIST, THE ONLY SAVIOR**\n\n4. In my first encyclical, in which I set forth the program of my Pontificate, I said that \"the Church's fundamental function in every age, and particularly in ours, is to direct man's gaze, to point the awareness and experience of the whole of humanity toward the mystery of Christ.\" \n\nThe Church's universal mission is born of faith in Jesus Christ, as is stated in our Trinitarian profession of faith: \"I believe in one Lord, Jesus Christ, the only Son of God, eternally begotten of the Father.... For us men and for our salvation he came down from heaven: by the power of the Holy spirit he became incarnate from the Virgin Mary, and was made man.\" \n\nThe redemption event brings salvation to all, \"for each one is included in the mystery of the redemption and with each\none Christ has united himself forever through this mystery. It is only in faith that the Church's mission can be understood and only in faith that it finds its basis.\n\nNevertheless, also as a result of the changes which have taken place in modern times and the spread of new theological ideas, some people wonder: Is missionary work among non-Christians still relevant? Has it not been replaced by inter-religious dialogue? Is not human development an adequate goal of the Church's mission? Does not respect for conscience and for freedom exclude all efforts at conversion? Is it not possible to attain salvation in any religion? Why then should there be missionary activity?\n\n\"No one comes to the Father, but by me\" (Jn 14:6)\n\n5. If we go back to the beginnings of the Church, we find a clear affirmation that Christ is the one Savior of all, the only one able to reveal God and lead to God. In reply to the Jewish religious authorities who question the apostles about the healing of the lame man, Peter says: \"By the name of Jesus Christ of Nazareth whom you crucified, whom God raised from the dead, by him this man is standing before you well.... And there is salvation in no one else, for there is no other name under heaven given among men by which we must be saved\" (Acts 4:10, 12). This statement, which was made to the Sanhedrin, has a universal value, since for all people-Jews and Gentiles alike - salvation can only come from Jesus Christ.\n\nThe universality of this salvation in Christ is asserted throughout the New Testament. St. Paul acknowledges the risen Christ as the Lord. He writes: \"Although there may be so-called gods in heaven or on earth - as indeed there are many 'gods' and many 'lords' - yet for us there is one God, the Father, from whom are all things and for whom we exist, and one Lord, Jesus Christ, through whom are all things and through whom we exist\" (1 Cor 8:5-6). One God and one Lord are asserted by way of contrast to the multitude of \"gods\" and \"lords\" commonly accepted. Paul reacts against the polytheism of the religious environment of his time and emphasizes what is characteristic of the Christian faith: belief in one God and in one Lord sent by God.\n\nIn the Gospel of St. John, this salvific universality of Christ embraces all the aspects of his mission of grace, truth and revelation: the Word is \"the true light that enlightens every man\" (Jn 1:9). And again, \"no one has ever seen God; the only Son, who is in the bosom of the Father, he has made him known\" (Jn 1:18; cf. Mt 11:27). God's revelation becomes definitive and complete through his only-begotten Son: \"In many and various ways God spoke of old to our fathers by the prophets; but in these last days he has spoken to us by a Son, whom he appointed the heir of all things, through whom he also created the world\" (Heb 1:1-2; cf. Jn 14:6). In this definitive Word of his revelation, God has made himself known in the fullest possible way. He has revealed to mankind who he is. This definitive self-revelation of God is the fundamental reason why the Church is\nmissionary by her very nature. She cannot do other than proclaim the Gospel, that is, the fullness of the truth which God has enabled us to know about himself.\n\nChrist is the one mediator between God and mankind: \"For there is one God, and there is one mediator between God and men, the man Christ Jesus, who gave himself as a ransom for all, the testimony to which was borne at the proper time. For this I was appointed a preacher and apostle (I am telling the truth, I am not lying), a teacher of the Gentiles in faith and truth\" (1 Tm 2:5-7; cf. Heb 4:14-16). No one, therefore, can enter into communion with God except through Christ, by the working of the Holy Spirit. Christ's one, universal mediation, far from being an obstacle on the journey toward God, is the way established by God himself, a fact of which Christ is fully aware. Although participated forms of mediation of different kinds and degrees are not excluded, they acquire meaning and value only from Christ's own mediation, and they cannot be understood as parallel or complementary to his.\n\n6. To introduce any sort of separation between the Word and Jesus Christ is contrary to the Christian faith. St. John clearly states that the Word, who \"was in the beginning with God,\" is the very one who \"became flesh\" (Jn 1:2, 14). Jesus is the Incarnate Word—a single and indivisible person. One cannot separate Jesus from the Christ or speak of a \"Jesus of history\" who would differ from the \"Christ of faith.\" The Church acknowledges and confesses Jesus as \"the Christ, the Son of the living God\" (Mt 16:16): Christ is none other than Jesus of Nazareth: he is the Word of God made man for the salvation of all. In Christ \"the whole fullness of deity dwells bodily\" (Col 2:9) and \"from his fullness have we all received\" (Jn 1:16). The \"only Son, who is the bosom of the Father\" (Jn 1:18) is \"the beloved Son, in whom we have redemption.... For in him all the fullness of God was pleased to dwell, and through him to reconcile to himself all things, whether on earth or in heaven, making peace by the blood of his Cross\" (Col 1:13-14, 19-20). It is precisely this uniqueness of Christ which gives him an absolute and universal significance, whereby, while belonging to history, he remains history's center and goal: \"I am the Alpha and the Omega, the first and the last, the beginning and the end\" (Rv 22:13).\n\nThus, although it is legitimate and helpful to consider the various aspects of the mystery of Christ, we must never lose sight of its unity. In the process of discovering and appreciating the manifold gifts—especially the spiritual treasures—that God has bestowed on every people, we cannot separate those gifts from Jesus Christ, who is at the center of God's plan of salvation. Just as \"by his incarnation the Son of God united himself in some sense with every human being,\" so too \"we are obliged to hold that the Holy Spirit offers everyone the possibility of sharing in the Paschal Mystery in a manner known to God.\"§ God's plan is \"to unite all things in Christ, things in heaven and things on earth\" (Eph 1:10).\n\n---\n\nFaith", "num_tokens": 2048} {"category": "olmocr_science_pdfs-religion", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-religion/part-00-00000.npy", "text": " a rota system on a Saturday night and patrol the streets and just talk to people. At the start of the night we hand out ‘spikeys’ which prevent drinks from being spiked. Later on we give out flip flops for ladies with very sore feet and space blankets for those who are cold. We rely on donations to enable us to buy supplies.\n\nWe are from a variety of churches around Kirkcaldy (and beyond) and yes, we do believe in God. We believe we are being guided by God to do this work. We do not have all of the answers but we try our best.\n\nWe have a support group who provide soup and sandwiches for us and a group who pray for us as we carry out this work. We are on the streets from 10pm until 3.30 or 4am. I hope this gives you a better idea about who we are, what we do and why!\n\nAnd, if you meet us in the town centre please don’t be afraid to talk to us - we are human too!!\n\nLiz Smith\nKirk Session and Congregational Board\n\nStarting with this Newsletter, we intend to bring you brief reports of recent Board and Session meetings in order to keep you aware of the nature of discussions and decisions being made.\n\nKirk Session - December Meeting - The following items were discussed at this meeting:\n\n- The Moderator requested that members split into Groups to discuss how the following three topics could be developed.\n - World Mission\n - Christian Education\n - Future use of Buildings\n\nFeedback was presented at the end and collated for future consideration.\n\nPastoral Care – The Moderator provided an update on the last Pastoral Care meeting when it had been agreed the initial focus would be on organising lifts to church, visitations to the housebound and those with difficulty getting out of their homes. The Group are also looking to organise a Bereavement Service in February or March 2012 when bereaved families would be invited to attend a Service on a Sunday afternoon followed by Tea and Coffee.\n\nSamaritans – The Session Clerk reported he had received a letter from the Samaritans thanking the Church for their support.\n\nAfrican Children’s Choir – Brian Booth reported the Choir was planning a Tour between mid September 2012 to January 2013 and he asked if Bennochy Church wished to hold a Concert on 21st September 2012. It was agreed that this would be investigated further.\n\nStained Glass Window – The Moderator reported that it was intended that the stained glass window be installed for the second anniversary of the Union and it was agreed that a Dedication Service would be held on 18th March 2012 in the afternoon.\n\nBusiness Group - George Grant then went through the paper on Communication and explained that it was hoped to arrange an event for all Organisations e.g. a BBQ at the close of their Session so that they could meet members of the Kirk Session. The Kirk Session agreed to this and should be planned for August 2012. It was also agreed to produce a guidance sheet for Elders to complete when doing organisation visits.\n\nThe Group had also discussed a Family Friendly Church and also any other improvements that may be necessary to meet any new needs identified.\n\nBoard Meeting - January 2012 - The following reports were presented to the board meeting\n\nThe Business Committee reported the stained glass window was projected to be completed on time and within budget. They are in the process of looking at more ways of presenting Bennochy as a Family Friendly Church. Also, from presbytery a directive has been received to introduce a stewardship campaign regarding time, talents and money.\n\nThe Finance Team reported that the projected date for the stated AGM will be 25th March. The Church of Scotland are to run a home insurance scheme whereby a £20 donation will be made to the congregation of purchasers. The Bowling Club have donated £500 towards the cost of external lighting. Fife Council have approached the Church with the wish to use our halls for the forthcoming Council Elections.\n\nThe Fabric Committee reported that the work on the roof (at that time) was approximately 60% complete. Also recent storm damage repairs were in hand. An inspection of the lightning conductors will take place on completion of the roof repairs. Refurbishment of the vestry is ongoing. Outside notice boards are almost complete. The kitchen extractor fans repairs are in hand. Maintenance of the grounds is ongoing with removal of the Cherry trees being investigated. Church heating is also being investigated.\n\nA new audio visual system is to be ordered and a budget has been set by the board for this equipment.\nFabric Report\n\nChurch & Halls\n\nFollowing completion of the repair work to the coping stonework of the east and west gables of the Methven Hall etc. the final roof repairs to the Vestry, Office and Halls commenced but was unfortunately damaged by the gales at the beginning of January. Quotations for repair works have been obtained and we await the go-ahead from our insurance company for this work, but in the meantime all roofs have been made watertight.\n\nOur lightning conductor system, which was also subjected to damage during the thefts of lead from the roofs, will be tested and repaired if necessary and this work is expected to commence on 5th March.\n\nAlso, on 5th March, the installation of our stained glass panels in the west window of our Sanctuary is expected to commence following strengthening and decoration work.\n\nInstallation of new external lighting to the Meldrum Road and Elgin Street elevations, together with the CCTV installation to the rear of our buildings are now complete. Due to problems associated with several trees in our grounds, we have had to take down the three trees in the bed on the corner of Meldrum Road and Elgin Street, but it is intended to retain this bed with ground cover and low growing plants, and the removal of the tree canopy will improve the natural light through our new stained glass window. Also, the two tall trees at our main entrance have been trimmed.\n\nHowever, we still require more volunteers to adopt a small plot in our Church grounds and to litter pick on Saturdays. Names should be added to the list next to the plan of the grounds on the main Notice Board at the ramp entrance, or contact myself (202340) or Graham Harrower (201689). Unless we have more volunteers, this work will have to be carried out by contractors, with a consequent drain on our finances.\n\nInternally, the recently fitted electric wall heater in the Prayer Room has not proved capable of heating this area adequately and a further heater from St. Andrews Church is due to be fitted shortly to improve this, although the new heaters in the Elgin Hall have proved to be very effective.\n\nAlterations to the Vestry are now complete and the increased space has made this area much more user friendly.\n\nOur office area is currently undergoing improvements, part of which is designed to improve communications with Elders, Session and Board members and these are now well advanced.\n\nOn a more historical note, during the Christmas Holidays our framed plan of the original St John’s Church hanging in the office area fell down damaging the frame. During repairs it was found that the plan had been inserted in the frame over the top of an illuminated Cradle Roll from St. Johns dating from 1927. A new frame has now been provided for the plan and both now hang from opposite walls in the office area.\n\nNew internal signage is currently in progress to define the designations of various parts of our Halls area viz. Methven Hall, St. Andrews Hall, Elgin Hall and Meldrum Room.\n\nManse\n\nOnly one item from the snagging list remains to be rectified and, on satisfactory completion, the final amount will be paid to the Main Contractor.\n\nFinally, as can be seen from the above, a very considerable amount of work has been and is being done and everyone who has contributed in so many ways has my personal thanks.\n\nAgain, thank you all for your continuing support.\n\nRoddy Sellars\nFabric Convener\n\n- Seen in the ‘Sunday Post’ on 19.2.12 “Aspire to inspire before you expire”\nWhat’s been happening\nChris was part of the team leading a Christian Focus Week at Auchmuty High School in Glenrothes for 1st year pupils. It was an exciting week and gave all in S1 the opportunity to look at the important issues of life and their own character.\nThe first X-Cel took place in December with 34 young people in attendance. This is an event for all church youth groups to meet together. It was a good night with positive views from the youth leaders and young people.\nChris leads a football training club at Fair Isle Primary School every Tuesday after school. This club helps children to work on their football skills and to improve their teamwork.\n\nComing Up\nChris will be a leader at a weekend away in February at Lendrick Muir for P5-S6 pupils. He will also be leading a Primary weekend away at Scoughall in May.\nThe event called \"Strictly Come Praying\" takes place on the 4th of March. This exciting prayer event is for young people aged P7-S6 and includes worship, Bible teaching, workshops, interactive prayer stations and dinner. A number of young people from the Kirkcaldy area will be attending this event.\nChris will be part of a team from SU presenting the “Journey through the Bible” tour in primary schools across Fife in March.\nChris will be co-leading the Fife SU primary event on the 17th of March. This activity time is for primary SU groups in Fife and will be held at Kirkcaldy Ice Arena.\nKART will be holding a prayer supper on the 20th of March at Templehall Church. The focus of the evening will be to pray for the local", "num_tokens": 2048} {"category": "olmocr_science_pdfs-religion", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-religion/part-00-00000.npy", "text": " ... He will not let me go.\n\nFor Christ my Sav-ior loves me so, He will not let me go.\nTake the Name of Jesus With You.\n\nMrs. Lydia Baxter. COPYRIGHT, 1846, BY M. H. DOANE, NEW YORK. W. H. Doane.\n\n1. Take the name of Jesus with you, Child of sorrow and of woe;\n2. Take the name of Jesus ever As a shield from every snare;\n3. O the precious name of Jesus! How it thrills our souls with joy,\n4. At the name of Jesus bowing, Falling prostrate at His feet,\n\nIt will joy and comfort give you, Take it then, wher’er you go.\nIf temptations round you gather, Breathe that holy name in prayer.\nWhen His loving arms receive us, And His songs our tongues employ!\nKing of kings in Heav’n we’ll crown Him, When our journey is complete.\n\nPrecious name, O how sweet! Precious name, O how sweet!\nPrecious name, O how sweet! Precious name, O how sweet!\nPrecious name, O how sweet! Precious name, O how sweet!\nPrecious name, O how sweet!\n\nHope of earth and joy of Heav’n; Precious name, O how sweet!\nHope of earth and joy of Heav’n. Amen.\n1. Just when I need Him, Jesus is near, Just when I falter,\n just when I fear; Ready to help me, ready to cheer,\n Just when I need Him most.\n\n2. Just when I need Him, Jesus is true, Never forsaking\n all the way thru; Giving for burdens pleasures anew,\n Just when I need Him most; Jesus is near to\n\n3. Just when I need Him, Jesus is strong, Bearing my burdens\n all the day long; For all my sorrow giving a song,\n comfort and cheer; Just when I need Him most.\n\n4. Just when I need Him, He is my all, Answering when up\n on Him I call; Tenderly watching lest I should fall,\n Amen.\n1. I was lost in sin, but Jesus rescued me. He's a wonderful Savior to me;\n2. He's a friend so true, so patient and so kind. He's a wonderful Savior to me;\n3. He is always near to comfort and to cheer. He's a wonderful Savior to me;\n4. Dearer grows the love of Jesus day by day. He's a wonderful Savior to me;\n\nSavior to me; I was bound by fear, but Jesus set me free,\nSavior to me; Everything I need in Him I always find,\nSavior to me; (So wonderful) He forgives my sins, He dries my every tear,\nSavior to me; Sweeter is His grace while pressing on my way,\n\nChorus:\n\nHe's a wonderful Savior to me; (So wonderful) For He's a wonderful Savior to me;\n\nSavior to me, wonder-ful! He's a wonderful Savior to me;\n\nI was lost in sin, but Jesus took me in. He's a wonderful Savior to me.\nAre You Washed in the Blood?\n\nH. A. H. \n\nAre you washed in the blood of the Lamb? Are you washed in the blood of the Lamb? Are you washed in the blood of the Lamb?\n\n1. Have you been to Jesus for the cleansing pow'r? Are you washed in the blood of the Lamb? Are you fully trusting in His grace this hour? Are you washed in the blood of the Lamb?\n\n2. Are you walking daily by the Saviour's side? Are you washed in the blood of the Lamb? Do you rest each moment in the Crucified? Are you washed in the blood of the Lamb?\n\n3. When the Bridegroom cometh will your robes be white? Are you washed in the blood of the Lamb? Will your soul be ready for the mansions bright, And be washed in the blood of the Lamb?\n\n4. Lay aside the garments that are stained with sin. And be washed in the blood of the Lamb; There's a fountain flowing for the soul unclean, O be washed in the blood of the Lamb. Are you washed in the blood, Are you washed in the blood, Are your garments spotless? Are they white as snow? Are you washed in the blood of the Lamb?\nSatisfied With Jesus.\n\nB. B. McK.\n\nSlowly.\n\n1. I am satisfied with Jesus, He has done so much for me,\n2. He is with me in my trials, Best of friends of all is He;\n3. I can hear the voice of Jesus Calling out so pleadingly,\n4. When my work on earth is ended, And I cross the mystic sea,\n\nHe has suffered to redeem me, He has died to set me free,\nI can always count on Jesus, Can He always count on me?\n\"Go and win the lost and straying,\" Is He satisfied with me?\nOh, that I could hear Him saying, \"I am satisfied with thee.\"\n\nChorus.\n\nI am satisfied, I am satisfied, I am satisfied with Jesus.\nBut the question comes to me, As I think of Calvary, Is my Master satisfied with me?\n1. When I need some-one in time of grief, Some-one my cheer to be,\n2. When I need some-one to guide my soul O-ver the storm-y sea,\n3. When I need help to de-feat the foe, Some-one my shield to be,\n4. When all my tri-als on earth are o'er, And the dark stream I see,\n\nJesus I choose, for He gives re-lief, He is the best for me.\nAlways to Jesus I give con-trol, He is the best for me.\nAlways to Jesus in faith I go, He is the best for me.\nJesus shall bear me to yonder shore, He is the best for me.\n\nChorus.\n\nI choose Jesus when I need a friend;... What I need I know that He will send;... I have proved Him.\nYes, I choose my Savior always when I need a help-ful friend; What I need I know that surely He to me will free-ly send; I have proved Him o'er and o'er, and\n\ngood and true is He;... I choose Jesus, He is the best for me...\nalways good and true is He; Yes, I choose my Savior dear, He is the best of all for me.\nLoyalty to Christ.\n\nDr. E. T. Cassel.\n\n1. From o-ver hill and plain There comes the signal strain, 'Tis loy-al-ty, loy-al-ty,\n2. O hear, ye brave, the sound That moves the earth around, 'Tis loy-al-ty, loy-al-ty,\n3. Come, join our loy-al throng; We'll rout the giant wrong, 'Tis loy-al-ty, loy-al-ty,\n4. The strength of youth we lay At Je-sus' feet to-day, 'Tis loy-al-ty, loy-al-ty,\n\nloy-al-ty to Christ; Its mus-ic rolls a-long, The hills take up the song,\nloy-al-ty to Christ; A-rise to dare and do, Ring out the watch-word true,\nloy-al-ty to Christ; Where Satan's banners float We'll send the be-gle note,\nloy-al-ty to Christ; His gos-pel we'll pro-claim Thro'-out the world's domain,\n\nOf loy-al-ty, loy-al-ty, Yes, loy-al-ty to Christ. \"On to vic-to-ry! On to\n\nvic-to-ry?\" Cries our great Com-mander; \"On!\" We'll move at His com-mand,\ngreat Com-mander; \"On!\"\n\nWe'll soon possess the land, Thro' loyalty, loyalty, Yes, loy-al-ty to Christ. A-men.\nI Am Thine, O Lord.\n\nFanny J. Crosby.\n\n1. I am Thine, O Lord, I have heard Thy voice, And it told Thy\nlove to me; But I long to rise in the arms of faith, And be\n\n2. Con-se-crate me now to Thy serv-ice, Lord, By the pow’r of\ngrace di-vine; Let my soul look up with a steadfast hope, And my\n\n3. O the pure de-light of a sin-gle hour That be-fore Thy\nthrone I spend, When I kneel in prayer, and with Thee, my God, I com-\nnar-row sea; There are heights of joy that I may not reach Till I\n\n4. There are depths of love that I can-not know Till I cross the\nlove to me; But I long to rise in the arms of faith, And be\ncloser drawn to Thee.\ncloser drawn to Thee.\ncloser drawn to Thee, Draw me near-er, near-er, bless-ed\ncloser drawn to Thee, Draw me near-er, near-er, bless-ed\n\nLord, To the cross where Thou hast died; Draw me near-er, near-er,\nLord, To the cross where Thou hast died; Draw me near-er, near-er,\nLord, To the cross where Thou hast died; Draw me near-er, near-er,\n\nnear-er, bless-ed Lord, To Thy pre-cious, bleed-ing side.\nnear-er, bless-ed Lord, To Thy pre-cious, bleed-ing side.\nnear-er, bless-ed Lord, To Thy pre-cious, bleed-ing side.\n\nA-MEN.\nJesus is Calling.\n\nFanny J.", "num_tokens": 2048} {"category": "olmocr_science_pdfs-religion", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-religion/part-00-00000.npy", "text": ". How is it possible to turn your cheek to a wicked person? Or, how is it possible for persons to inherit the kingdom of God because of their poverty? The very nature of the aphorisms, and of Jesus' in particular, is the compulsion the listener has to react, to want to know more about what is meant. Crossan (1983) called it the dance of art and thought. The aphorism by nature upsets one's inner balance. Jesus used aphorisms to present a bold and original worldview.\n\nPerdue (1986) concluded that Jesus questioned the validity of the cause-effect worldview of conventional wisdom. Conventional wisdom is based on a theory of retribution in which a righteous individual is materially rewarded and a wicked individual is punished. Jesus' aphorisms about congratulating the poor, hungry, and sad challenges the theory that poverty and hunger are punishments for wickedness. Jesus wanted to prepare hearers for a new reality, the kingdom of God.\nSeveral of the red sayings of Jesus speak of the kingdom of God in parables. These include the parables called Leaven, Mustard Seed, and Vineyard Laborers. Other red parables are the Shrewd Manager and the Samaritan. All are aphoristic in nature, but not in form. The parables shock and disorient, but they are not short sayings. According to Crossan (1973) and most other Biblical scholars, Jesus' use of aphoristic parables was even more distinctive of his voice. Scott (1989) recognized two defining elements concerning the parables of Jesus. First, parables belong to the Jewish literary genre māshāl. The māshāl use connotative language. Connotative language puts a premium on interpretation and on the symbolic. Second, Jesus and rabbis developed the parable. The parable form is not found in the Old Testament. Rabbinic parables developed between 200 and 500 C.E. There is no evidence that the Pharisees, contemporary rabbis of Jesus, used parables.\n\nScott (1989) defined the parable as \"a mashal that employs a short narrative fiction to reference a transcendent symbol\" (p. 8). The term \"parable\" is a Greek word, parabole, which means \"to set aside.\" The basic intent of the parable is comparison. Jesus' parables are characterized as narrative meshalim (the plural form of māshāl) and are not characteristic of the sages. Witherington (1994) suggested that the narrative meshalim, the parable genre used by Jesus, reflected a prophetic adaptation and expansion of wisdom forms. Ben Sira introduced this new development by claiming to be inspired like the prophets, by drawing on prophetic material, and by offering new revelations from God in sapiential forms. Therefore,\nJesus' teaching represented a cross-fertilization of the sapiential and prophetic traditions (Vorster, 1991).\n\nJesus' parables were first heard orally, then later written into sayings documents, and then Gospels. Scott (1989) noted that oral stories are not developed as causative, but rather as additive. In other words, events are layered on without concern for specificity or relationality. Parables are short and clean with explanatory details left out. For instance, in the story of the Vineyard Laborers, the hearers are not told what time of year it was, what was being harvested, or why the later laborers were not seen on earlier visits by the vineyard owner. How the revealed elements of the story do relate is dependent on the interpretation of the parable.\n\nParables are generally hard to understand. Scott (1989) suggested that the reason is that parables are based on concrete thought, not abstract thought. First-century Palestinians were members of a concrete culture. Stories were their vehicles for thinking, not symbolic representations of abstract thoughts. For instance, the story of the Vineyard Laborers might be perceived in our abstract culture as a story about the nature of grace. However, in a concrete culture, Jesus used the story to have his audience think about the way God's kingdom disrupts the usual patron-client relationships.\n\nScott (1989) further clarified that a concrete culture would organize itself through myths. Myths represent the need for order: \"In a myth a thing is sacred because it is in its proper place\" (Scott, 1989, p. 37). If something is out of order, then cultural chaos ensues. A myth takes opposites and provides a resolution. Scott (1989)\nused the example of the Horatio Alger stories which resolved the problem that everyone is created equal but, in reality, not all persons are equal. However, hard work on the part of Horatio Alger bridged the gap between the two realities. He moved from poverty to wealth. Therefore, a myth provides a logical explanation for contradictions.\n\n- Myths provide order and identity for a social group. Therefore, myths are anonymous. Jesus' parables are anti-myths, not myths (Scott, 1989). His stories created a disorder. He took cultural myth themes and aphoristically disoriented the expected outcomes or relationships. For instance, Jesus used the parable of the Mustard Seed to illustrate the kingdom of God, and yet the mustard plant was considered a weed and a nuisance. The audience would have expected that Jesus would have used the mighty cedar, the usual symbol of Israel's greatness, as an illustration of the kingdom of God.\n\n- Jesus was a teacher, but his teaching was radical and was intended to disorient the hearers so that they would consider an alternative worldview. The parables of the Samaritan, the Vineyard Laborers, and the Shrewd Manager are examples of narrative *meshalim*. All three of the parables would disorient the hearers. Even today, the Shrewd Manager is a parable which confuses its hearers. No one expects that an embezzler who tries to save himself by further deceitfulness would be praised by his employer for acting shrewdly.\n\n- Other Jewish parables of the same period usually dealt with the figure of a king and his concerns. Jesus' parables, on the other hand, dealt with ordinary\noccurrences with a paradoxical twist. Vineyard laborers should get paid an honest\nday's wage, but no one would have expected the vineyard owner to pay those who\nworked only an hour the same as the ones who worked all day long. Jesus presented a\ncounter-order that caused persons to entertain a new perspective on reality. Blomberg\n(1990) concluded that Jewish parables supported conventional wisdom and gave\nadded interpretation. Jesus' parables had an eschatological element and were usually\nnot explained.\n\nRabbinic parables were used to illustrate and explain the Torah, but Jesus'\nparables rarely referred to Scripture. Most of Jesus' parables referred to the kingdom\nof God. Much of the debate about the historical Jesus has centered around his use and\nunderstanding of this term, \"kingdom of God.\" Scholars generally do agree that the\nterm \"kingdom of God\" refers to the sovereignty and rule of God (Vorster, 1991).\nThough a full discussion is outside the realm of this study, one important point should\nbe clarified.\n\nScott (1989) believed that Jesus used the term in his parables as a symbol\nrather than as a metaphorical concept. An abstract social group would use the term as\na concept, but a concrete social group would use it as a symbol. A metaphor suggests\nthat one thing is like another (A is B). A symbol suggests that \"the forms do not\nsignify themselves; rather they 'allude to,' hint at a wider meaning\" (Scott, 1989, p.\n58). A symbol is an enigma, representing something which is perceptive and\nexperiential. Therefore, an element of mystery and paradox remain. With a metaphor,\nthe mystery and the paradox can be explained. Most scholars agree that Jesus used the\nterm as a symbol, but they vary in their understanding of its interpretation (e.g., Crossan, 1973; Perrin, 1967; Fiorenza, 1984).\n\nThe important observation is that Jesus used parables to challenge the traditional structural notions of God's kingdom without implying a structural solution. For instance, the parable of Leaven compares the kingdom of God to a woman hiding leaven in flour. The primary associations of God's kingdom are located in male power and in holiness. Therefore, to associate the kingdom of God with a woman hiding a corrupt substance, leaven, would be very disorienting to the listeners. However, it would also be erroneous to conclude that God was female and corrupt, a metaphorical and structural interpretation. As symbol, the parable surprises and pushes the listener to think about the diverse nature of God's kingdom. Jesus used parables to enfold and encompass the symbol of the kingdom of God. Jesus' parables and his sayings are examples of aphoristic discourse heard from an individual voice.\n\n**An Analysis of Jesus' Sayings and Parables**\n\nMembers of the Jesus Seminar isolated Jesus words' from the editorializing and explaining of others on the basis of four assumptions. These assumptions emerged from the careful scholarship of Biblical historical critical scholars. First, Jesus' sayings and parables \"cut against\" social and religious norms. For instance, Jesus said \"When someone sues you for your shirt, let that person have your coat along with it\" (Mt. 5:40).\n\n", "num_tokens": 2048} {"category": "olmocr_science_pdfs-religion", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-religion/part-00-00000.npy", "text": " his patriotism, and said, \"I am not moved by the greatness of the pyramids and their height, nor by the height of the obelisks and their inscriptions, indeed, the numerous antiques of the ancient Egyptians, their inscriptions and workmanship did not excite my soul as much as the example which I saw (in the Pope)\". When Mohammed Ali heard about the incident, he considered this action from the side of the Pope to be an honour to himself and to the Copts, and hurried to thank the Pope. The latter said to him, \"Do not thank someone who fulfilled his duty toward his country which embraces him and his brothers in the same nationality and patriotism.\" The tears flew from Mohammed Ali's eyes, and the church enjoyed freedom and peace.\n\nZahra Pasha, Mohammed Ali's daughter and the wife of Ahmed Bey El-Defterdar, was possessed with an evil spirit and the physicians could not cure her. On the recommendation of some people from the royal palace, Mohammed Ali asked the Pope for help. The Pope sent to him Anba Sarapamon of Menoufia who exorcized the evil spirit by praying.\n\nDuring the reign of Mohammed Ali, his son Ibrahim Pasha called Pope Boutros and asked him about the light that shines out of the holy tomb of Christ on Saturday of the Holy Week. Ibrahim pasha asked to accompany Pope Boutros to Jerusalem to see what happens. When they arrived, Pope Boutros told him that the Roman Orthodox Patriarch is accustomed to enter the tomb for praying before the light's emission, and they were allowed to enter together. The crowd were let out of the church of the Resurrection\nand the door was closed. As the two Patriarchs were praying fervently that God may save His church, the light emitted from the Holy tomb, went around the church and split on the left side of the entrance and was seen by all the crowd.\n\nIbrahim Pasha was known for his love to Egypt and the Egyptians, and he was loved by both, Muslims and Christians. He used to speak only the Arabic language. Since he was asked by one of the soldiers why was he against the Turks although he was one of them, he answered, \"I am not a Turk. I came to Egypt as a young lad, and her sun made me Egyptian and changed my blood...\" Ibrahim ruled Egypt only for a few months at the end of his father's reign.\n\nSAID PASHA'S ERA\n\nSaid Pasha did renew the freedom of worship, in contrary to his predecessor Abbas I who prohibited the Copts from building new churches or even renovating the old ones, and also neglected education in general.\n\nDuring Said's reign, the tribute was lifted up from the Copts and this was proclaimed as a law (firman) in 1855. He also ordered the recruiting of the Copts to the army. This order was abused, as they recruited many Copts who were the only bread-winners in their families, and some of the Copts suffered persecution in the army service to renounce their faith.\n\nPope Kyrillos (Cyril) IV was ordained one year before the beginning of Said's rule, and so he had a chance to practise many progressive efforts, in the spiritual, educational and social fields. One of his patriotic stands was his role in settling the dispute between Egypt and Ethiopia.\nWhen the pope requested the emperor of Ethiopia to cast out the English missionaries, they put agent provocateur between the Pope and the emperor on one hand, and between Said and the Pope on the other hand\\(^3\\), and this ended by poisoning the Pope and his reposal in the Lord.\n\n**KHEDIVE ISMAIL PASHA'S ERA**\n\nWhen Ismail Pasha saw that Pope Demetrius II has great zeal for spreading the education like his predecessor, Pope Kyrillos IV, he granted him 1500 acres of land for building Coptic Schools. He also helped the Pope in opposing the Protestant missionaries, maybe because he thought that they would publicise the oppression of the Egyptian peasants in Europe.\n\nWhen the Protestant denominations attacked the Coptic Church and burnt the icons, Pope Demetrius complained about this act to the Khedive who exiled them. However, the consuls of America and England protected them from being punished.\n\nIsmail Pasha is considered to be the most tolerant ruler of Mohammed Ali's family. He appointed the Copt Wasif Bey Azmi his chief-protocol, and Abd-Allah Bey Serour governor of Qalubia province. He renewed the recruitment of the Copts in the army service in regularity.\n\nWhen the Khedive discussed with Nubar Pasha the election of members of the \"House of Representatives\" he said to him:\"We have also Copts among the elected. We have opened the doors for Muslims and Copts without discrimination.\" Among the members of the \"House of Representatives\" in 1866 there were two Copts: Girgis Barsoum, Mayor of Beni-Salama, and Mkhai Salama,\nMayor of Ashrouba. As we said before there was almost no class at the time of Mohamed Ali because of the monopolization of all sources. Personal ownership started only with Said's regulation in 1858, but it was incomplete until Khedive Ismail opened the door for everybody to work and to own lands. The Copts seized this opportunity and gave attention to commence, particularly with the Sudan, and made great fortunes. Tadros Al- Mankabady in 1884 established an incorporated company in Assuit, to deal with household equipments. From its tithes a land was bought and dedicated to the Coptic School of Assuit. He also promoted the idea of \"Savings\" in 1890 before it was adopted by the Post Office. In 1896 Wisa Doctor's family established a factory for extraction and refinement of sugar from sugarcane, and bought most of the shares of \"Fayoum Train Co.\" Boushra Bey and Senout Bey established a bank in Upper-Egypt to protect the merchants from the greedy moneylenders. High orders were given that some Copts were to be appointed judges.\n\nAs far as the Cabinet is concerned, no Coptic minister was appointed (in the 19th century) until Khedive Abbas' era, when Boutros Ghali Pasha was appointed and remained the only Coptic minister until 1910. Nevertheless, Abbas' era was severe for the Copts as he hated Christianity and expelled many of the Copts from civil service. He requested the Coptic Supervisors (in Revenue Department) to train young Muslim students to take over their places, threatening that if they did not accomplish this within a year they would be thrown into the Nile. Some supervisors noticing after one or two months that the students were not apt for learning and practising the job, were preparing themselves to face death. However, the marvellous hand of God rescued them.\nbecause before the end of the year Abbas fell dead in his palace in 1854.\n\nDuring the era of Tawfik Pasha, who succeeded Ismail Pasha in 1879, a delegation from the Ethiopian emperor visited Egypt and presented valuable gifts to the Khedive and the Pope, asking the Khedive for continuation of the friendly relationship between the two countries.\n\n**ORABIN REVOLUTION**\n\nThe army, which included Muslims and Copts, supported Orabi in his attempt to cast away the foreign influence and stop Khedive Tawfik's tyranny. When the Khedive ordered his dismissal, Arabi asked the Copt Yaqub to call for convening the General Assembly which was held at the ministry of the External Affairs on Saturday July 12, 1882. The meeting was attended by about 500 of the prominent Egyptians. At their forefront were the Sheikh of Al-Azher and Pope Kyrillos V, supporting Orabi. At the populace level both Copts and Muslims offered supplies, and donations flowed to support the army against the British overrun.\n\nThe mob in Alexandria committed a great massacre during which the Christians suffered all kinds of tortures. Some of the Christians from all denominations took refuge in the patriarchate, but the majority of Christians were forced to leave Alexandria. Thus, Orabi's revolution took a religious attitude.\n\nAt the same time, the Mahdi's Revolution took place in Sudan, and before it ended, the Copts fled to Egypt, and the bishop of Sudan and some of the priests and laymen who could not escape were forced to deny their faith and many were martyred.\n2. Tawfik Eskarous: III.\n4. Ibid. p.65.\n6. Ibid., p 610.\nCOPTIC PERSONALITIES IN THE 19TH CENTURY\n\n1. POPE KYRILLOS (CYRIL) IV\n\nFATHER OF THE COPTIC REFORM\n\nPope Kyrillos IV (110th) the greatest Coptic person in the 19th century, led a strong and large state spiritual, scientific and social movement, therefore he is known as the \"Father of the Coptic Reform.\" He established many schools. He opened the first girl's college in Egypt, preceding even the government in female education. He imported the first national printing press from Italy and on its arrival at Alexandria he ordered an impressive official reception of deacons in ecclesiastical vestments chanting hymns all the way from Cairo station to the Patriarchate. He asked Said Pasha the Khedive of Egypt at that time to permit the Copts to be recruited to the army like the Muslims, so that the Copts might not feel that they are foreigners, while they live in their own country. According to Said Pasha's wish he went to Ethiopia to", "num_tokens": 2048} {"category": "olmocr_science_pdfs-religion", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-religion/part-00-00000.npy", "text": " of Cuyahoga Falls v. Buckeye Community Hope Foundation, 538 U.S. 188 (2003), the Court rejected a constitutional challenge to a referendum barring the construction of a low-income housing project. The challenge was brought under the Fourteenth Amendment’s Equal Protection Clause, based on an allegation that the referendum constituted unconstitutional racial discrimination. The Court noted that such a challenge depended on a finding that the government had intentionally discriminated against the plaintiffs on the basis of race. The Court then rejected the plaintiff’s challenge to the referendum on the ground that there was no evidence of the relevant impermissible intent. The Court held that evidence of allegedly discriminatory voter sentiment was insufficient to justify a finding of discriminatory intent. “[S]tates made by private individuals in the course of a citizen-driven petition drive, while sometimes relevant to equal protection analysis . . . do not, in and of themselves, constitute state action for the purposes of the Fourteenth Amendment.” Id. at 196.\n\nOutside the referendum context, the courts often ascribe to government actions the religious motives of private groups supporting those actions. In Edwards v. Aguillard, for example, Justice Powell discussed the religious background and perspective of two private groups—the Institute for Creation Research and the Creation Research Society—that had expressed support for the “balanced treatment” creationism statute adopted by the Louisiana legislature. “Information on both of these organizations is part of the legislative history, and a review of their goals and activities sheds light on the nature of creation science as it was presented to, and understood by, the Louisiana Legislature.” Edwards, 482 U.S. at 601–02 (Powell, J., concurring). For a more recent example of this phenomenon, consider ACLU v. City of Plattsburgh, 358 F.3d 1020 (8th Cir. 2004), where a city accepted a Ten Commandments monument from a private group, the Fraternal Order of Eagles. Id. at 1025. In Plattsburgh, there was no direct evidence of the city’s intent, but the court noted the explicitly religious\napplication of the secular purpose analysis to the Arkansas anti-evolution statute at issue in *Epperson* was not linked as directly to specific statements of governmental policy as the similar secular purpose analysis in cases that the Court would later encounter involving more explicit attempts by state legislatures to incorporate religious doctrine into law.27\n\nIronically, the absence of specific statements expressing the Arkansas government’s purpose in adopting the anti-evolution policy actually strengthens the Court’s holding in *Epperson*. The Court’s determination that state mandates to teach creationism are unconstitutional cannot be limited to situations in which a few public officials make ill-considered public statements about religion. In reaching its conclusion that the amorphous group of voters who voted in favor of the Arkansas initiative did so on the basis of constitutionally impermissible motives, the *Epperson* majority was forced to rely on evidence such as the religious nature of a “typical” political advertisement supporting the initiative,28 a few letters to local newspapers,29 and secondary sources such as academic articles about the nature of the Arkansas statute.30 The major support for the Court’s conclusion that the Arkansas initiative had an impermissible religious purpose, however, was the Court’s analysis of the referendum’s religious effect. In the absence of direct evidence of the state’s impermissible religious purpose, the Court inferred the purpose from the referendum’s inherently religious nature.\n\nThe Court found the religious nature of the statute inescapable. The Court noted that the law singled out only one subject for exclusion from Arkansas classrooms: the theory of evolution. The law was not, therefore, an attempt\n\npurposes of the private group, and held the city accountable for adopting the same religious objectives: “The Eagles donated this monument as a part of its nationwide campaign to spread its version of the Ten Commandments; Plattsmouth’s purpose in erecting it was nothing more complex than the adoption of that goal.” *Id.* at 1037.\n\n27. An excellent example of overtly expressed state intent to adopt religious legislation can be found in the Alabama silent prayer decision. *See Wallace v. Jaffree*, 472 U.S. 38 (1985). In this case the state of Alabama enacted a statute authorizing a period of silence for “meditation or voluntary prayer.” *Id.* at 41 (quoting Ala. Code § 16-1-20.1 (1984)). The Court held that this statute failed the *Lemon* secular purpose requirement. *Id.* at 56. The Court focused much of its attention on statements made by the sponsor of the legislation in the state senate:\n\n“Senator Donald Holmes, inserted into the legislative record—apparently without dissent—a statement indicating that the legislation was an “effort to return voluntary prayer” to the public schools. Later Senator Holmes confirmed this purpose before the District Court. In response to the question whether he had any purpose for the legislation other than returning voluntary prayer to public schools, he stated: “No, I did not have no other purpose in mind.” The State did not present evidence of any secular purpose.\n\n*Id.* at 56–57 (footnotes omitted).\n\n\n29. *Id.*\n\n30. *Id.* at 107 n.15.\nby Arkansas to avoid all sensitive discussions of the origins of humanity. Rather, the “law’s effort was confined to an attempt to blot out a particular theory because of its supposed conflict with the biblical account, literally read.” 31 Nothing in the referendum actually said that the law was intended to protect a particular set of religious dogmas; the Court simply concluded that it could conceive of only one possible explanation for the referendum’s specific focus—i.e., “the belief of some that the Book of Genesis must be the exclusive source of doctrine as to the origin of man.” 32 Thus, although the Epperson Court ostensibly focused on the issue of religious intent, in fact the religious effect of the referendum determined the case. The effect of the statute—that is, to omit from public school curricula any references to evolution—was so permeated with religion that the Court felt it could only have been motivated by an impermissible religious purpose: to protect the dominant religious dogma from other theories that proponents of the dominant religion viewed as sacrilegious.\n\nIn one sense, the very fact that the religious majority deemed the referendum necessary was itself evidence of an impermissible purpose. By enacting a legal mandate to exclude from the state’s classrooms scientific evidence of evolution, the Arkansas religious majority implicitly acknowledged that in an unregulated intellectual marketplace the majority’s religious conception of biological change could not survive on its merits as science. The central holding of Epperson is that the representatives of a politically powerful group have no constitutional authority to skew the intellectual marketplace in favor of that group’s religion. Under Epperson, no group may use the law to artificially bolster the intellectual merits of its own faith’s perspective on scientific issues at the expense of an open intellectual inquiry into those issues—even if the conclusions generated by the open intellectual inquiry inevitably will create doubts among the faithful about the veracity of the dominant faith. As the Court summed up this aspect of Establishment Clause doctrine, “the state has no legitimate interest in protecting any or all religions from views distasteful to them.” 33\n\nThe prohibition of religious protectionism is key to understanding how the Court’s holding in Epperson will apply to later, subtler versions of creationism, such as the theory of intelligent design. The application of the Epperson anti-protectionism principle does not depend on the particular nature of the religious ideas being fostered by the government. Any political attempt to skew the process of scientific investigation in favor of a particular\n\n31. Id. at 109.\n32. Id. at 107.\n33. Id. at 107 (quoting Joseph Burstyn, Inc. v. Wilson, 343 U.S. 495, 505 (1952)) (internal quotations omitted).\nset of religious ideas is invalid—regardless of the mechanism used by the\ngovernment to advance its sectarian agenda. The Constitution therefore\nprohibits statutes that bar the inclusion of evolution in public school curricula\n(as in Epperson), but it also prohibits statutes that mandate the inclusion of\nparticular ideas (as in Edwards v. Aguillard\\textsuperscript{34}) as well as statutes that\ndisparage or disclaim the conclusions of scientific inquiry (as in a recent\nlocal school board policy struck down by the federal courts in Louisiana\\textsuperscript{35}).\nEach type of statute is unconstitutional because it conflicts with the Court’s\nbasic understanding that if creationism has secular merit as science, the\nscientific community will recognize these merits without being forced to do\nso by legal decree.\n\nWhen the courts strike down legal mandates protecting creationism from\nthe challenges posed by evolutionary theory, they are not protecting\nevolutionary theory per se, nor are they attacking the merits of creationism.\nRather, the courts are merely protecting the system of open intellectual\ninquiry from political manipulation directed toward protecting the interests of\npowerful religious groups outside the academic community. In this analysis,\napplying the secular purpose and secular effect tests is simpler than it\notherwise might seem because the Constitution presumptively prohibits \\textit{any}\nlegal mandate to incorporate certain perspectives in a public school\neducational curriculum if those perspectives have been rejected by\noverwhelming numbers of scientists in the academic community. It does not\nmatter whether the religious perspective is obvious on the face of the legal\nmandate; the existence of the mandate itself is the problem. Thus", "num_tokens": 2048} {"category": "olmocr_science_pdfs-religion", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-religion/part-00-00000.npy", "text": " decided upon this course.53 According to a lengthy, somewhat hagiographic, account of Reggio's hiring written\nby Castiglioni, the community's leaders offered Reggio the post, and he accepted on condition that he not receive the slightest remuneration.\\textsuperscript{54}\n\nReggio's financial circumstances could certainly explain such a magnanimous gesture, but the fact that Isaac's father had also been hired without pay suggests that another consideration was at work. In 1798, following the death of R. Moise Gentili, the ristretta consulta offered Abram Vita the position of acting rabbi. The appointment carried with it no salary because the appointment was a provisional one, and it was provisional because Abram Vita had never been formally ordained. Abram Vita was formally elected rabbi of the Gorizian community only in 1803, after travelling to Ferrara to receive the rabbinical title \\textit{Hakham}.\\textsuperscript{55} Castiglioni's narrative suggests that, like his father, Isaac Reggio was offered the post of acting rabbi, with no salary, because he too had never been formally ordained. This explanation is supported by the fact that following Abram Vita's death in 1841, the Jews of Gorizia also hired his grandson (and Isaac's own son), Abramo, who had completed the program of study at the Paduan rabbinical seminary.\\textsuperscript{57} The community asked him to assume responsibility for issuing decisions on matters of Jewish law and doctrine. He accepted, and held the position for twenty months, until September 4, 1843.\\textsuperscript{58} For those months Isaac and Abramo served together, with Isaac serving as acting rabbi \\textit{(facendo funzioni di rabbino)} for all but halakhic matters.\\textsuperscript{59}\n\nAs for Reggio's ouster, money appears as a factor at all stages: dismissal, rehiring and replacement. At least some of those community members who supported Reggio were presumably motivated by the desire to save the six hundred florins of the Chief Rabbi's annual salary, aside from their regard for Reggio's abilities or their attitudes towards Reform. This is suggested by the final struggle over Reggio's permanent successor. The petition to prevent the hiring of a replacement, signed (as the \\textit{Capi} report) by some of the community's principal taxpayers, lends weight to the mercenary factor.\\textsuperscript{290}\n\nThere is also the possibility that money took second place to ideology in the struggle over Reggio's position. The annulment of Reggio's dismissal in 1850 on technical grounds and the later petition against hiring a replacement can be interpreted as tactical ploys in the struggle against Reform. If so, Reggio's supporters were using a tight-fisted posture to pressure the \\textit{Capi} into rehiring Reggio. In the controversy over Reggio's permanent replacement they employed slander in pursuit of the same goal: by accusing the \\textit{Capi} of religious abuses, the petitioners stigmatized them as impious.\n\nAn ideological reading is even more plausible as far as the \\textit{Capi} are concerned. The fact that dismissing Reggio would cost the community considerable effort and expense indicates the strength of the anti-Reggio camp's ideological motivation.\n\nAuthority is yet another in the web of tightly interwoven forces behind the struggle over Reggio's ouster. The hiring of Isaac's son Abramo as legal expert, however reasonable and appropriate, curbed Reggio's authority as Chief Rabbi. The fact that he had to cede halakhic authority to his son teaches that Isaac's authority never approached that enjoyed by his father, Abram Vita. In the struggle over Reform, or any communal controversy, Isaac's spiritual leadership was weakened by his inadequate halakhic credentials.\n\nAuthority also needs to be factored into our understanding of Isaac's point of view. The last stipulation in clause 35 of the communal regulations required the Chief Rabbi to reach agreement with the \\textit{Capi} and ristretta consulta on reforms to be introduced. These communal leaders were not, after all, scholars in Jewish law, and Reggio may have considered them incompetent to define the nature and scope of the community's halakhic life.\n\n\\section*{V. CONTEXT}\n\nOn August 29, 1855, soon after his ouster, Reggio died. But, having been outmaneuvered on the field of communal politics, he nevertheless managed to have the last word on Reform, with the 1852 publication of his masterpiece, \\textit{Be'ihinat ha-Kabbala}. Was Reggio the heresiarch this book led Rapoport and others to believe? What does the new material on Reggio's career presented in this study teach us about his attitude towards Reform?\nCertainly Isaac supported Reform. He entered the fray in 1835, with a short work favoring abrogation of the taboo on shaving during hol ha-moed. This treatise drew a volley of critical responses, including a rebuttal by his own father, R. Abram Vita. Yet Reggio’s attitude to Reform during the controversy leading to his ouster, coupled with his role in the phylacteries incident of 1835, portrays him in a more conservative and traditional guise, rather than as a radical Reformer.\n\nThe more moderate view of Reggio is thoroughly grounded in his writings, including Behinat ha-Kabbala. Reggio opposed radical reform as vehemently as he opposed rigid orthodoxy. Among the advantages of the rabbinical college he proposed in 1820 was the rabbi’s ability to combat unrestrained attacks on tradition. Reggio excoriated those who rejected the concept of mandatory precepts in favor of a purely spiritual approach to Judaism, as did Aaron Chorin of Hungary. Although he did not consider rabbinic law inviolable, Reggio advocated changing only rabbinic prescriptions that he felt contravened the biblical commandments upon which they were based. Reggio was a Reformer in the sense that he sanctioned deviation from the Shulhan Arukh, but he decried the threat to Judaism posed by the extremist camps of both orthodoxy and Reform.\n\nReggio’s conservatism was typical of the lackluster Italian reaction to the liturgical and curricular initiatives from across the Alps. Naftali Herz Wesseley saw Italian Jewry as a natural ally in the Haskalah campaign. This view was born of the assumption that the Italians were already ‘enlightened’; they knew Italian and heard synagogue sermons in the vernacular. In addition, compared with the Jews of Eastern Europe, their intellectual focus was less single-mindedly talmudic, and more inclined towards Bible, grammar, and the sciences. But the Italians disappointed Wesseley. Endorsing his initiative only halfheartedly, they emphasized the primacy of the established curriculum and the importance of safeguarding tradition. Ironically, it was precisely because Wesseley’s recommendations were already in place that Italian Jewry proved a lethargic ally.\n\nThe weak showing of Reform in Gorizia also mirrors dynamics found in the international arena. Radical Reform did not take off in the Hapsburg realm as it had in Germany. This was partly due to the region’s Catholic identity. Germany’s Protestant environment appears to have had cultural influence on German Reform Judaism, because the latter echoed Protestantism’s emphasis on liturgy and oratory, rather than ritual. Conversely, scholars have attributed the flaccid response to Reform—in Italy as in Vienna—to the stolid conservatism of the surround...\ning Catholic environment, and specifically to the absence of any general concept of theological, institutional, and liturgical Reform. In addition to these forces, in Gorizia the size of the community was also a factor. It seems plain that size affects a community’s social behavior, and hence its response to change. In small intimate communities, anonymity is impossible and social pressures are intensified. These communal quarrels highlight the textured nature of social change. The ideological issues were no different in Gorizia than in the capitals of Europe, but because of its size, money, authority and interpersonal relationships had a magnified impact on the community’s religious life. As much or more than ideological factors, temporal forces were what buffeted and ultimately upended Isaac Reggio.\n\nNotes\n2. Ha-Shahar 1/2 (1869) 12–14. In a footnote to Rapoport’s letter, Peretz Smolenskin, the editor of Ha-Shahar, alludes to Rapoport’s personal resentment of Reggio. For Reggio’s reaction, see Algemeine Zeitung des Juden­thums 18 (1854) pp. 73–86. Reggio had clearly gotten under Rapoport’s skin.\n3. Though there have been several sketches of Reggio’s career, his full biography has yet to be written, and his views and social environment have never been systematically analyzed. See Moise Ehrenreich, “Isaac S. Reggio,” L’Educatore Israelita 1 (1856) 74.\n8. Regolamento interno della comunità israelitica di Gorizia, Archivio di Stato di Gorizia (ASG), Capitanato Circolare di Gorizia, busta (b.) 16, fascicolo (fasc.) 172, IV/24, #12 (1850-54). An identical edition was printed in Gorizia, in ", "num_tokens": 2048} {"category": "olmocr_science_pdfs-science_math_and_technology-part1", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-science_math_and_technology-part1/part-00-00000.npy", "text": " were lower than those with H-PW – in the shear rate range examined (50 s⁻¹ - 1500\ns$^{-1}$). Similar behaviour was found for the measurements at 170 °C and 180 °C. The lower viscosity of the blends would imply that it could be more easily melt processed an important consideration in the manufacturing step, if for example sheets of such materials were to be used in construction applications. This is associated with the lower viscosity of molten wax compared with that of hv-HDPE. By increasing the temperature, the total energy added to the system during the mixing process increases and consequently the shear viscosity is expected to decrease. However, as it can be seen from Figure 11 (c), the difference between the shear viscosity of hv-HDPE$_{50}$H-PW$_{50}$ measured at 160 °C, 170 °C and 180 °C cannot be regarded as significant. Similar results were found for hv-HDPE$_{50}$L-PW$_{50}$, Figure 11 (d). This might be explained by that as each blend is consisted of a considerable large proportion of wax with a melting point far below 160 °C, the effect of increment of temperature from 160 °C to 170 °C or from 170 °C to 180 °C on the shear viscosity for the blends is not significant. Thus, 160 °C is an adequate processing temperature. This is an important consideration as the lower the temperature, the less energy required to mix the blend components, but also less evaporation of wax, especially for hv-HDPE/L-PW blends.\n\nTo further investigate the interaction between and dispersion of wax in hv-HDPE, an oscillatory melt rheology study, at low shear rates, was also carried out. Polymers exhibit viscoelastic behaviour which is directly related to molecular structure. In order to evaluate the relationship between molecular structure and viscoelastic behaviour it is necessary to perform rheological experiments in the linear viscoelastic region where the viscoelastic properties observed are independent of imposed stress or strain level. An oscillatory stress sweep test was performed to establish the linear viscoelastic region and determine the maximum stress for linear behaviour at 160 °C. The limit of the viscoelastic regime for each material is determined by the stress value when the moduli ($G'$ and $G''$) start to decrease becoming non-linear. In this study, a stress value of 2Pa was selected as all the samples were in linear viscoelastic region at\nthis value. As shown in Figure 12 (a) and (b), with increasing frequency, the storage modulus $G'$ increased for all samples, approximately by two orders of magnitude. $G'$ of hv-HDPE is higher than the two sets of the blends. With increasing wax content, $G'$ decreased. This is associated with the less viscous property of the waxes at elevated temperatures. However, the plots of hv-HDPE$_{35}$H-PW$_{65}$ and hv-HDPE$_{25}$H-PW$_{75}$ were nearly overlapping, and lie below that for hv-HDPE$_{50}$H-PW$_{50}$, see Figure 12 (a). $G'$ of the three hv-HDPE/L-PW composites were very similar in the low frequency region and separated at high frequencies, as shown in Figure 12 (b). Plots of log shear viscosity $\\eta'$ vs log frequency $f$ are shown in Figure 12 (c) and (d). With increase $f$, $\\eta'$ decreased in all samples. This is because when shear rate increased, the entanglement of the molecular of hv-HDPE decreased. With increasing wax content, the viscosity of all composites decreased, again associated with the less viscous properties of the waxes. However, the difference between the viscosity values of hv-HDPE$_{35}$H-PW$_{65}$ and hv-HDPE$_{25}$H-PW$_{75}$ is not significant. A Cole-Cole plot ($\\log G'$ versus $\\log G''$ plot) is a sensitive tool that can probe composite miscibility/compatibility in that changing slopes of the linear relationship between both parameters can indicate poor interaction, in this instance between hv-HDPE and wax. Curves corresponding to different wax content deviate slightly from each other and from pure hv-HDPE, Figure 12 (e) and (f), and indicated less interaction between hv-HDPE and wax at higher wax loading, evidence for induced heterogeneity within the composite material [50, 51].\n\n4 Conclusions\n\nBoth H-PW and L-PW could be mixed uniformly with hv-HDPE to form SSPCMs using twin screw extrusion, and the blends formed are physical mixes with no evidence of chemical interaction between blend components. The extrusion temperature for hv-HDPE/L-PW blends should not be > 160 °C, as the onset of the evaporation temperature of L-PW is\nrelatively low, \\( \\leq 130 ^\\circ C \\). However, the extent of L-PW evaporation we assume is low as the residence time of L-PW in the extruder is less than 30 sec. No such consideration is required for blends prepared with H-PW. The SSPCMs had latent heats up to 89 J/g (hv-HDPE\\(_{25}\\)H-PW\\(_{75}\\)), as determined from DSC analysis and thus these composite materials are candidates for LHTES applications. The enthalpy of H-PW in SSPCM blends decreased while that of L-PW remained unaltered, as a consequence of co-crystallisation between H-PW and hv-HDPE. DMTA analyses show the plasticising effect of both waxes on the hv-HDPE matrix. The mechanical properties, moduli and stress, irrespective of mode of deformation are much greater for the hv-HDPE/H-PW blends compared with those of the hv-HDPE/L-PW blends at RT. The tensile and flexural strength of hv-HDPE/H-PW blends were much greater than hv-HDPE/L-PW blends at RT. The rheological behaviour of these blends confirmed increased heterogeneity with increasing wax content and that melt processing such SSPCMs with conventional polymer processing techniques should be routine, at least for the wax loadings used in this study. Further studies are ongoing to address some of the many limitations of such SSPCMs [52], e.g. thermal conductivity, and will be reported shortly.\n\nAcknowledgements\n\nMM thanks the UK-China Sciences Bridge Project for financial support, and we acknowledge Mr Graham Garrett and Dr Bronagh Miller for technical assistance.\nReferences\n\n\n18. Zhang, P., et al., *The influence of expanded graphite on thermal properties for paraffin/high density polyethylene/chlorinated paraffin/antimony trioxide as a flame\n\n\n44. Mngomezulu, M.E., *Phase Change Materials Based on Polyethylene, Paraffin Wax and Wood Flour*, 2009, University of the Free State (Qwaqwa Campus).\n\n45. Mochane, M.J., *Polymer Encapsulated Paraffin Wax to be Used as Phase Change Material for Energy Storage*, 2011, University of the Free State (Qwaqwa Campus).\n\n\nTable and Figure Captions\n\nTable 1 Thermal properties of hv-HDPE/H-PW blends (melting) as determined from DSC measurements.\n\nTable 2 Thermal properties of hv-HDPE/L-PW blends (melting) as determined from DSC measurements.\n\nTable 3 Thermal properties of hv-HDPE/H-PW blends (crystallisation) as determined from DSC measurements.\n\nTable 4 Thermal properties of hv-HDPE/L-PW blends (crystallisation) as determined from DSC measurements.\n\nFigure 1 SEM images of (a) surface of hv-HDPE35H-PW65; (b) surface of hv-HDPE35H-LW65; (c) surface of hv-HDPE35H-PW65 after xylene treatment; (d) surface of hv-HDPE35H-PW65 after xylene treatment; (e) fractured surface of hv-HDPE35H-PW65 and (f) fractured surface of hv-HDPE35H-PW65.\n\nFigure 2 FTIR spectra of (a) H-PW, hv-HDPE and hv-HDPE/H-PW blends, and (b) L-PW, hv-HDPE and hv-HDPE/L-PW blends.\n\nFigure 3 XRD diffractograms of (a) H-PW, hv-HDPE and hv-HDPE/H-PW blends, and (b) hv-HDPE and hv-HDPE/L-PW blends.\n\nFigure 4 DSC thermograms for (a) heating curves of H-PW, hv-HDPE and hv-HDPE/H-PW blends; (b) cooling curves of H-PW, hv-HDPE and hv-HDPE/H-PW blends; (c) heating curves of L-PW, hv-HDPE and hv-HDPE/L-PW blends and (d) cooling curves of L-PW, hv-HDPE and hv-HDPE/L-PW blends.\nFigure 5 TGA curves for (", "num_tokens": 2048} {"category": "olmocr_science_pdfs-science_math_and_technology-part1", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-science_math_and_technology-part1/part-00-00000.npy", "text": "*; and the great hammerhead, *Sphryna mokarran*.\n\n- **HUMAN IMPORTANCE:** The red grouper is both commercially and recreationally important throughout its range, and is one of the most abundant grouper species in southern Florida.\n\n**SCAMP**: *Mycteroperca interstitialis*\n\nInformation from: http://www.fishbase.org/summary/SpeciesSummary.php?id=1211\n\nThe Scamp is found in the Western Atlantic, including the Gulf of Mexico, Bermuda, the Caribbean (mainly insular localities), and Brazil. Found mainly on rocky or coral bottoms from the shoreline to at least 55 m depth; small and middle-sized individuals commonly occur in mangrove-lined lagoons. More common in island waters than along the coast.\n\n- **DISTINGUISHING FEATURES:** Dorsal spines (total): 11 - 11; Dorsal softrays (total): 16 - 18; Anal spines : 3; Anal soft rays: 10 – 12. Tan to brown above, paler below; upper parts of head and most of body usually have small, brown, close-set spots; sometimes uniformly brown. The tricolored pattern of the juveniles mimics that of the juveniles of the clown wrasse, *Halichoeres maculipinna*.\n\n- **SIZE:** Common to about 15 lbs. Maximum size recorded: 84.0 cm. Maximum weight recorded: 10.5kg Maximum reported age: 41 years\n\n- **DIET:** Feeds on smaller fishes.\n\n- **REPRODUCTION:** Sex reversal is observed in this species. The young individual females become male. The scamp is a pelagic spawner.\n\n- **PREDATORS:** Predators of smaller groupers include other groupers and moray eels, larger groupers are likely preyed upon by sharks, among them the sandbar shark, *Carcharhinus plumbeus*; and the great hammerhead, *Sphryna mokarran*.\n\n- **HUMAN IMPORTANCE:** Marketed fresh as food in markets.\nGAG GROUPER: *Mycteroperca microlepis*\nPrepared by: Cathleen Bester\n\nThe gag grouper is found in the western Atlantic Ocean from North Carolina south to the Yucatan Peninsula. Residing in brackish to marine waters, the gag grouper is found offshore on rocky bottom as well as inshore on rocky or grassy bottoms to depths of 500 ft. It is common on rocky ledges along the eastern Gulf of Mexico. Adult gag grouper school in groups of 5-50 individuals or may be found solitary.\n\n- **DISTINGUISHING FEATURES:** The gag grouper is typical among the groupers with an oblong-shaped elongate body. The head is long while the mouth is large with a protruding lower jaw. The bases of the dorsal and anal fins are covered with scales and thick skin. Body color of the gag grouper is dependent upon the sex and age of the fish. Juveniles and mature females are pale to brown-gray with dark blotches and worm-shaped markings resulting in a marbled appearance. Inactive individuals sometimes display a camouflaged pattern with dark brown \"saddles\" separated by white bars just below the dorsal fin. Large mature males are pale to medium gray in color with barely visible reticulations below the dorsal fin. The ventral surface is darker gray to black in color. There are two well-developed canine teeth present anteriorly in each jaw. These are quite effective for holding prey items.\n\n- **SIZE:** Gag grouper reach a maximum total length of 4.75 ft and a maximum weight of 80.5 lbs.\n\n- **DIET:** Adult gag grouper primarily feed on fishes, crabs, shrimps, and cephalopods while juveniles measuring less than 8 in. in length feed on crustaceans residing in shallow grass beds.\n\n- **REPRODUCTION:** Similar to other serranids, gag grouper are protogynous hermaphrodites. They begin life as female, however after a few years of spawning as a female, some gag groupers change sex, becoming functional males. This transition generally occurs at 10-11 yrs of age. Spawning occurs from January through May in the Gulf of Mexico and the South Atlantic Bight at offshore spawning grounds. The fertilized eggs are pelagic and transparent, containing a single oil globule. Eggs hatch after approximately 45 hours at water temperatures of 70ºF (laboratory study). The kite-shaped larvae persist for 40-50 days, as post larvae they migrate from the spawning grounds to inshore seagrasses, mangroves, oyster reefs and salt marshes. Juveniles remain in these locations for approximately 3-5 months before they migrate to offshore reefs.\n\n- **PREDATORS:** Juvenile gag grouper may fall prey to cannibalism as well as to large fishes. Sharks and other large fishes are known predators of adult gag grouper.\n\n- **IMPORTANCE TO HUMANS:** The gag grouper provides important recreational and commercial fisheries. It is caught with hook and line and the flesh is marketed fresh.\nYELLOWTAIL SNAPPER: *Lutjanus chrysurus*\n\nPrepared by: Cathleen Bester\n\nThe yellowtail snapper is found in the western Atlantic Ocean from Massachusetts to Bermuda and southward to southeastern Brazil, including the Gulf of Mexico and Caribbean Sea. It is most common in the Bahamas, off south Florida and in the Caribbean Sea. Adult yellowtail snappers live over sandy areas near deep reefs at depths of 32-230 feet (10-70m), while small adults tend to congregate over hard bottom habitats. Once established, adult yellowtail snapper tend to remain in the same area for long periods of time.\n\n- **DISTINGUISHING FEATURES:** In comparison with most other snapper species the head and mouth of the yellowtail snapper are small. The pectoral fins are long, reaching the anus. An unusual characteristic among snappers in our area, the caudal fin of this species is deeply forked with the upper lobe longer than the lower one. The yellowtail snapper has an olive to bluish back and upper sides with yellow spots. The lower sides and belly have alternating narrow, longitudinal pink and yellow stripes. Perhaps most conspicuously, a prominent midlateral yellow stripe begins at the mouth and continues to the caudal fin base, becoming broader as it passes the dorsal fins. The caudal fin is yellow while the anal and pelvic fins are whitish in color. Although most teeth in the upper jaw are densely packed, fine, or hair like \"villiform\" teeth, there are several canine teeth present as well – the latter constituting a definitive characteristic of all snappers.\n\n- **SIZE:** Adult yellowtail snappers may reach a maximum length of 30 inches. This fish rarely exceeds weights of 5 pounds.\n\n- **DIET:** Adult yellowtail snappers are nocturnal predators. They feed on benthic organisms including crabs, shrimp, cephalopods, worms, and fish. Juveniles, living primarily among seagrasses, feed on plankton.\n\n- **REPRODUCTION:** Spawning occurs year round, peaking at different times in different locations, with an overall activity decline in the winter months. Spawning yellowtail snapper form offshore aggregations. The spherical eggs are released into open waters and contain an oil droplet, which provides buoyancy in their pelagic environment. The eggs hatch within 24 hours, producing sparsely pigmented larvae.\n\n- **PREDATORS:** Natural predators of adult yellowtail snapper include sharks and other large predatory fishes, including barracuda, mackerel and grouper in addition to other snapper species. Larvae and juveniles face a wide array of predators.\n\n**IMPORTANCE TO HUMANS:** The bar jack is a sport fish, caught mainly on light tackle. It also appears in commercial catches made using seines and trawls. Its edibility is fair to good and is marketed fresh in the Bahamas.\nThe black drum is found on the Atlantic coast of the United States, *Pogonias cromis* occurs from southern New England south through Florida and the Gulf of Mexico, to Argentina. It is much more common south of Chesapeake Bay. Juveniles are found more often over muddy bottoms in estuaries. Adults are usually common over sand or sand/mud bottom types in shallow coastal and estuarine waters, especially in high runoff areas, oyster reefs and shell hash. Adults sometimes move onto near-shelf waters, but are primarily estuarine-dwelling and show little migratory behavior.\n\n- **DISTINGUISHING FEATURES:** The head is short with a blunt snout and inferior, horizontal mouth. The chin has 5 pores and 12-13 short barbels set close to the inner edges of the lower jaw. The pharyngeal teeth are small and set in broad bands for effective grinding of mollusk and arthropod shells. The vomer, palatines and tongue lack teeth. Body color in adults is a silver to black base color, highlighted with a coppery or brassy sheen. Fins are dusky to black in color. Young typically have 4-6 vertical black bars along their sides. Coloration may change depending on habitat or age of the fish.\n- **SIZE:** Grows to a maximum size of approximately 170 cm (67 inches) and may weigh as much as 51.3 kg (113.1 pounds", "num_tokens": 2048} {"category": "olmocr_science_pdfs-science_math_and_technology-part1", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-science_math_and_technology-part1/part-00-00000.npy", "text": " for the provider to rectify these as best they can. The provider may (eventually) send out a “super-tech” to go and analyze the problem and attempt to optimize the installation using “free” and off-the-shelf tools such as mobile phone signal strength apps. Alternately,\nthe provider may simply offer Wi-Fi extenders that in their simplest form just reduce overall throughput to half by occupying at least twice as many timeslots for each transmission.\n\nSome providers may choose to offer secondary access points perhaps connected via MoCA or “powerline” (e.g., HomePlug AV2) communication to the master gateway. These have the advantage of offering additional bandwidth without compromising the original access point, provided a second non-overlapping channel is available. Also, the technician may need a little knowledge to correctly position and configure these devices.\n\nIn 2018, Providers began to aggressively install mesh Wi-Fi systems with multiple coordinated access points. This was bolstered by the availability of Wi-Fi Alliance’s EasyMesh standard and certification for Multi-AP.\n\n### 7.3.2 Consumer Self-install\n\nTo avoid the need for the service provider to visit to the end-user’s home, equipment such as set-tops, cable modems, and Wi-Fi APs can be sent by mail for the end user to install and configure or made available for sale (or pickup) at retail kiosks. In particular, the default configuration or capability of the in-home wireless equipment may not always be optimum, though algorithms in the equipment’s firmware do attempt to analyze the area and choose the optimum channel. Basic instructions for optimum placement are included but often a lot of trial and error is needed to improve this. The “obvious” location near the center of the home is not always best for many reasons. The end-user may be reluctant or unable to run additional cabling from the network termination point to a more optimum location for the AP.\n\nCable operators should consider providing more comprehensive instructions with recommendations for optimal AP placement and other setup issues. Alternatively a provider can recommend a mesh or EasyMesh system. The following guidelines can be used by subscribers for self-installs as well as by cable company installers and technicians.\n\nFor best Wi-Fi coverage, try to place the wireless gateway or AP close to where Wi-Fi capable devices are or will be most frequently used. For best Wi-Fi reception and minimal interference, the wireless gateway/AP should be located in an open area away from exterior walls, metal surfaces, microwave ovens and windows (do not place it inside of a cupboard, closet, file cabinet, or other enclosed area). Once the wireless gateway is in the best location in the home, it’s time to plug it in and power it up.\n\nNote: If you are replacing a modem currently connected in the home, be sure to unplug that device from the cable or coaxial outlet and plug the new wireless gateway/AP (often built in to the new modem) into that same coaxial outlet. If you do not have an existing modem set up, simply plug the new modem into the main cable or coaxial outlet in the home.\n\nThe wireless gateway or wireless router makes it easy to set up the Wi-Fi network and adjust its settings. Once you set up the network, you can wirelessly access the Internet and other services from your computer, laptop, game system and more. You can find out how to set up a wireless network with these simple steps.\n\nBefore you can access your provider’s services or the Internet through your wireless gateway, you'll need to make sure it's properly connected. Please check that:\n\nYour wireless gateway is connected to the Internet through the cable connector on the back panel with a coaxial cable (labeled “F” in Figure 4)\nFigure 4 - Wireless gateway connections and controls\n\nWireless gateway back panel features are:\n\n- Reset button for resetting the wireless gateway\n- USB host connector [for future use]\n- Tel1 connector for analog phone line\n- Tel2 connector for analog phone line\n- Gigabit Ethernet (1-4) connectors for use with a computer LAN port\n- Cable connector for the coaxial cable\n- Power connector for the power cord\n\nCheck your specific make and model regarding light indicators, etc., which may be different than what is shown in Figure 4 and Figure 5. Ensure the following: the wireless gateway is plugged in to a power source through the power connector with the provided power cord. The power, US/DS, and online LED indicators on the front panel are steadily lit. This may take several minutes after plugging in your wireless gateway.\n7.3.3. Activating Your Wireless Gateway\n\nNow you are ready to activate your cable company’s services and your wireless gateway. Generic activation information is provided below and specific activation information may be available from the cable company’s web site (refer to the gateway’s printed instructions).\n\nOnce you have installed your wireless gateway/AP and established a temporary Internet connection, you are ready to activate your Internet/voice service.\n\nOnce connected, if you're not automatically presented with an Activation Welcome screen:\n\n1. Open a web browser (such as Chrome, Safari, Internet Explorer, etc.) on your device and go to [provider site]. Next, click Continue.\n2. Enter your account number and phone number (if you received a self-installation kit, the account number can be found on the activation information card inside the kit.). You can also authenticate your account by signing in with your service provider username. If you've already created a username, skip steps 3 through.\n3. Create a username and password. If you have moved and are transferring your service(s) to a new address, click “Sign-in” with your existing username.\n4. Choose a security question and answer (answer must be 3-25 characters long and is case-sensitive) and check the box that you agree to the Terms and Privacy Policy, then click “Continue”.\n o Note: Your username provides access to your account settings and services. It will also become your email address prefix, similar to [Username]@{service provider.net}. Feel free to use it as your\nprimary email account or as a spare. It is recommended that you print or write down this important information.\n\n5. Click “Continue” to proceed from the Connection Established screen.\n\n6. After you receive the “Device Activated” screen, your gateway may reboot. It should be all set when the power, US/DS and online lights on the front of the gateway stop blinking and remain solid for one minute, and the Wi-Fi light(s) start flashing.\n\nNotes:\n\n- You can continue to use the default Wi-Fi network name and password on your device, but it is highly recommended that you change your Wi-Fi network name and password to something easy for you to remember.\n- Depending on the type of gateway you have, you may be required to create a new Wi-Fi network name and password as part of the activation process.\n\n7.4. Qualifying CPE\n\nFor maximum trust any test solution must be capable of testing via the existing or newly installed gateway device. Showing the technician’s equipment working at extreme far range is all well and good, but customers want assurance that their own equipment will work, maybe not as quickly (see below), and that they will have coverage in the home where they need it.\n\nSome providers are now suggesting that their set top boxes for high and ultra-high definition video streaming can be connected wirelessly, reducing the need for additional cabling at the time of installation or encouraging a self-install. If the initial installation attempt does not work, what visibility is there from the customer’s perspective or from the provider’s perspective as to what to try next? Troubleshooting steps are provided elsewhere in this document.\n\n7.5. Customer Education\n\nCustomers often expect the hardware they bought many years ago, perhaps only offering 802.11b capability, to keep on working or even to be improved in performance by updating their gateway/AP. While older equipment will generally still work, they do not understand that operating older equipment will inevitably occupy more timeslots that could carry much higher data rates using more modern modulation profiles and expanded channel widths. Education that older hardware really does need replacing is important.\n\n8. Installation, Configuration and Management\n\n8.1. Common Residential / Commercial Deployment Models\n\n- Wi-Fi Gateway\n- Wi-Fi Gateway with EasyMesh Controller and multiple EasyMesh Agents (APs)\n- Wi-Fi Gateway with Repeater/Extender\n- Wi-Fi Gateway with Secondary Device (Dual AP)\n- Wi-Fi Gateway and Wi-Fi Peripheral\n- Wi-Fi Gateway and Managed Broadband Router\n- Wi-Fi Gateway and Wi-Fi Video AP\n- Wi-Fi Gateway and outdoor (OD) Wi-Fi Gateway\n- Community Wi-Fi Gateway\n8.2. Example Wi-Fi Home\n\nThe average North American home will have almost a dozen Wi-Fi client devices active today. Many industry disruptions such as Internet of Things (IoT) will drive per subscriber Wi-Fi device counts much higher, with some predicting this device count is set to double in just three years.\n\nThere are also many different and often simultaneous use cases for Wi-Fi service occurring in the typical home. Telework VPN and VoIP traffic, Over-The-Top IP Video, Gaming, home automation and security, and general web surfing may all be actively competing for radio airtime.\n\nThe placement of these clients varies and is usually not fixed with perhaps the exception of home automation and security and perhaps gaming consoles. This poses a real challenge as we consider today’s Wi-Fi deployment models beginning with Wi-Fi enabled DOCSIS Gateways.\n\n8.3. Wi-Fi Deployment Models - Gateway Deployment Model (Single AP)\n\nA common scenario in many deployments is the use of a DOCSIS 3.0 or 3.1 cable modem gateway with embedded Wi-Fi access point. The install technician likely locates the gateway near the utility panel or closest to drop entry point to avoid in home coax runs and splitters. There are several disadvantages to this approach depending on the device and the circumstances", "num_tokens": 2048} {"category": "olmocr_science_pdfs-science_math_and_technology-part1", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-science_math_and_technology-part1/part-00-00000.npy", "text": " blood, bacterial or fungal cultures, gill biopsies, and skin scrapings are all moderately damaging to the fish. In addition, these samples can be used to detect diseases from the outside of the fish, but not necessarily the inside. Often for a definitive diagnosis, a sick fish must be euthanized and a post-mortem examination performed to get all needed laboratory samples. This works for disease problems that are occurring in a number of fish: one fish is sacrificed to find a treatment for the others, but does not help to treat an individual fish health problem.\n\nClinical Signs of Disease\nClinical signs of disease in fish can be very vague. Frequently the animal is swimming slowly- often alone, it may swim on its side, the gills may move rapidly, the animal may move rapidly back and forth in one area, the fins are droopy, it doesn't eat, and it may be losing weight. These signs don't tell you much more than that the fish is sick. If that is all you see, without diagnostic tests run by a veterinarian, the only type of treatment that is recommended is isolation in a 0.1% salt bath, perhaps with antibiotics added. Other clinical signs can indicate a specific type of disease, or can be seen with several types of diseases.\n\n- **Skin and mouth ulcers** usually indicate a bacterial infection.\n- **Bleeding** of the skin, fins, mouth or gills can indicate a bacterial or a parasite infection.\n- **Ragged looking fins** can indicate a bacterial or parasite infection.\n- **Fluffy white growth** from the skin usually indicates a fungus infection, but can also be a bacterial infection.\n- **Excessive slime** is a sign of skin irritation. This can be from bacterial or parasite infections, or excessive salt or medication.\n• **Discoloration** of the skin can indicate bacterial infection, some parasitic conditions, poor nutrition, excessive light, or other stress.\n\n• **Bloat** of the abdomen can indicate an internal bacterial or parasitic infection.\n\n• **Bulging of the eyes** can indicate a tumor behind the eye, or a bacterial or parasite infection.\n\n### Bacterial Infections\n\nA variety of bacteria can infect fish and cause clinical signs such as hemorrhage, ulcers, ragged fins, mouth lesions, bloat and bulging of the eyes. These bacteria include species such as *Aeromonas sp*, *Pseudomonas sp*, *Flexibacter columnaris*, *Vibrio anguillarum*, and *Mycobacterium sp*. The only way to definitively identify most bacteria is to culture them, although some can be identified just by using special stains. These tests must be performed by a veterinarian and a diagnostic laboratory. Bacterial infections often require antibiotic therapy, although the **water quality** should also be tested at and the **diet** must be examined to determine if it is optimal for the species in question. Antibiotics that are often used are tetracyclines (minocycline), nitrofurantoin, nalidixic acid, and others. These are available over the counter in pet stores and should be used according to package direction. Antibiotics are usually mixed in the water for convenience, however, antibiotic treated food, or injections of antibiotics are usually more effective. Some bacteria can be resistant to antibiotics and it may be necessary to try a different one if the one does not work. Often for resistant infections, the bacteria must be cultured by a veterinarian and tested for its sensitivity to antibiotics.\n\n### Parasite Infections\n\nThere are a large number of parasites than can infect fishes. These can only be identified by examining them under a microscope. It takes a trained veterinarian or parasitologist to identify these organisms. Parasites can fall into several categories:\n\n• **Protozoa** are one-celled parasites. These include species that live on the skin or in the gills, such as *Ichthyophthirius multifilis* (\"Ich\"), *Cryptokaryon irritans, Ichthyobodo necatrix, Costia necatrix, Chalodonella cyprini, Brooklynella horridus, Odonium, Trichodonids, Tetrahymena pyriformis, Uronema miamiensis, Epistylis sp*, and *Vorticella sp*. Internal protozoans include *Hexamita* and *Spironucleus sp, Plistophora hyphehssobryconis* and other myxosporidia, cryptosporidia and coccidia such as *Eimeria*. The point being, there's a lot of them and they all have names you'll never remember.\n\n• **Helminths** are worms that like Protozoans, can live in different parts of the fishes' bodies. Species such as *Dactylogyris sp, Gyrodactylus* and the Turbellarians live in the skin. Other species live internally such as *Neascus sp, Clinostomum spp, Diplostomulum sp*, tapeworms, *Eustrongylides spp, Capillaria* and *Camallanus spp.*\n\n• **Crustaceans** or shelled animals can act as parasites. Learnea and Ergasilus are species that resemble worm, but are actually copepods. They can parasitize the skin, as can the fish louse, Argulus. Another parasite that has been classified as both a crustacean and as a tepeworm, that can act as a skin parasite is *Livoneca symmetrica.*\nParasites can be treated with a number of drugs. However, as with bacterial infections, parasite problems are almost always secondary to poor water quality. The parasite will live in a symbiotic state with the fish as long as environmental conditions are optimal for the fish. When the animal is stressed, its immune system becomes depressed and the parasites get the upper hand.\n\nSome antiparasitic drugs are specific for a certain category of parasite. Over the counter products are available for common parasites like \"Ich\". Use as directed on the package. Other parasite treatments such as formaldehyde, malachite green, metronidazole, praziquantel, methylene blue, potassium permanganate, acriflavine, nasoten and copper should only be used by persons trained in their use (many of the products are only available to veterinarians).\n\n**Fungal Infections**\nFungal infections are diagnosed by examining a laboratory sample under a microscope, or by culturing the organism. Fungal infections can be extremely difficult to treat in fish. Often the lesion is scraped free of fungus and iodine (povidone iodine, not tincture of iodine) can be applied. Other drugs that are used to treat human fungal infections may also be used. These require daily treatments for several weeks. Overall the prognosis is poor. Fungal infections often occur secondary to an injury or to poor water quality.\n\n**Dietary Deficiencies**\nBecause dietary deficiencies can be extremely complex to sort out, the best approach is to only feed a commercial food for the species you are caring for. Feeding excessive fresh ingredients such as a fish diet, shrimp, tubifex worms, etc. to fish that do not specifically require them will result in deficiencies, as they will eat less of the balanced commercial diet. If you have an unusual species that does not have a commercial diet, consider consulting an expert in the area for dietary recommendations. Otherwise research its feeding habits and use a commercial diet for a comparable type of fish.\n\nThese recommendations on fish health and husbandry are very general. A trained veterinarian or other expert in aquaculture should always be consulted for a problem that does not resolve itself though control of water quality and removal of diseased animals.\n\nMarine Aquarium Chemical Filtration\n\nMarine aquarium chemical filtration is very important in a reef tank but is often misunderstood.\n\nBy J. Charles Delbeek\n\nThe topic of chemical filtration is described in just about every textbook written on marine aquariums, yet few people really seem to understand its capabilities, limitations and applications. There are numerous forms of filtration that could fall under the category of chemical filtration depending on their mode of operation. For the purposes of this article, we will limit our discussion to the common forms of chemical filtration used in reef systems: activated carbon, foam fractionation (also known as protein skimming), molecular adsorbants and ozone.\n\nDue to the various biological processes that occur in an aquarium, a build-up of organic substances takes place. These substances are referred to as organic because they all contain the element carbon in their chemical composition. The list of substances is quite lengthy and includes such items as amino acids, proteins, phenols, creosols, terpenoids, fats, carbohydrates, hydrocarbons, plant hormones, vitamins, carotenoids and various organic acids such as fatty, acetic, lactic, glycolic, malic and citric (deGraaf, 1981; Moe, 1989). Fortunately, these various substances can be lumped together under the all-encompassing term of dissolved organic carbon (DOC). Taken as a whole, these DOCs often have various deleterious effects on aquarium inhabitants, including reduced growth, reduced disease resistance and metabolic stress.\n\nDOCs are processed in different ways in an aquarium. Some are mineralized into ammonia by bacteria present in the tank. The ammonia is then oxidized by nitrifying bacteria into nitrite and then into the final product, nitrate. Unless utilized by plants as food, nitrate tends to accumulate in the aquarium water. Many organic substances are not mineralized but also tend to accumulate in the aquarium. This is why water changes are usually advocated as part of aquarium maintenance. Hobbyists are often under the impression that the purpose of a water change is to lower the nitrate concentration. While water changes do reduce nitrate levels, a more significant result is that the", "num_tokens": 2048} {"category": "olmocr_science_pdfs-science_math_and_technology-part1", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-science_math_and_technology-part1/part-00-00000.npy", "text": " taster, and instead of being perceived as ‘sweet’ or ‘savory’, they might both elicit a single pleasurable sensation. The higher-level consequences and central processing of these stimuli will be exciting to examine, as will the question of whether convergently-evolved nectarivorous birds detect and perceive amino acids in a similar fashion. Once new technologies allow for genome-editing, labeling, and tracing of taste-related neurons, comparative studies of taste in birds will provide valuable insights into vertebrate taste biology and the evolution of sensory perception.\n\n\n17. F. Reed Hainsworth, L. L. Wolf, Nectar characteristics and food selection by\n\n\nAppendix\n\nTable S1\n\nNumber of visits of black-chinned hummingbirds in behavioral trials (for Figure 6 and 7A-C)\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
TypeStimulus# visits
Stimulus
Amino acidL-Proline39
Amino acidD-Asparagine23
Amino acidD-Tryptophan39
Amino acidD-Phenylalanine20
Synthetic SweetenerCyclamate61
Synthetic SweetenerSucralose45
Synthetic SweetenerAcesulfame K40
Sugar AlcoholXylitol47
Sugar AlcoholErythritol50
Sugar AlcoholSorbitol43
\n\nTable S2\n\nNumber of visits of black-chinned hummingbirds in behavioral trials with different concentrations of sucrose (Figure 7D)\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
Sucrose (M)0.250.511.522.5
252929292743
\nTable S3\n\nNumber of visits of wild hummingbirds in behavioral trials with carbohydrates and sugar alcohols (Figures 11B and C)\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
Stimulus# visits of Anna's males in 15 minute trial
1 = Water1 2 3
2 = Sucrose 250 mM12 14 67
3 = Sucrose 500 mM
1 = Glucose 1M19 70 16
2 = Fructose 1M
3 = Sucrose 1M
Erythritol 2.15 M37 14 8
1 = Stimulus
2 = Mix
3 = Sucrose
Sorbitol 1.56 M16 23 46
1 = Stimulus
2 = Mix
3 = Sucrose
\n\nTable S4\n\nNumber of visits of wild hummingbirds in behavioral trials with synthetic sweeteners (Figures 11B and 12)\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
Stimulus# visits of Anna's males in 15 minute trial# visits of all birds (first rotation only)
Aspartame 3 mM*21 79 4219 77 104
Aspartame 15 mM10 50 2612 53 122
Acesulfame K 50 mM *10 16 3930 85 86
Acesulfame K 100 mM11 10 206 16 95
Stimulus# visits# visits of Anna's males in 15 minute trial
---------------------------------------------------------------------------------
Cyclamate 10 mM711
Cyclamate 30 mM32
Sucralose 1 mM*2210
Sucralose 10 mM1324
\n\n* for all-bird trial, first ~200 bouts scored\n\nTable S5\n\nNumber of visits of wild hummingbirds in behavioral trials (Figure 13A and B)\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
StimulusStimulusMixSucroseStimulusMixSucrose
5 mM Sucralose 20132165312868103
5 mM Sucralose 2014, replicate 1105132
5 mM Sucralose 2014, replicate 2174829
5 mM Sucralose 2014, replicate 3102736
\nTable S6\n\nNumber of visits of wild hummingbirds in behavioral trials (Figures 13C and 14A)\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
Trial# visits Anna’s males# visits of all birds
12
1 = 5 mM sucralose2122
2 = Water
Splenda ®157
1 = 0.55 mM
2 = 1.38 mM
/atama//oka//imata/
a- 1PL/POSS[a-á¹tama]'to see’‘to kill’
o- 3F/ POSS[¹o-õka]
hí- 2PL/ POSS[hí-í¹mata]
\nConceivably, if more abstract rules are used, the rule stating the process of vowel lengthening in morpheme boundaries could be generalized to all environments in the language. All long vowels would derive from underlying short ones. Here, however, I will only mention the possibility of such an alternative analysis, reserving such a higher level of abstract generalization to more theoretically based approaches to the data. Such an analysis would be done in an internal reconstruction of the Apurinã phonological system.\n4.0. Introduction\n\nThis chapter describes the word internal structural properties of nouns and their syntactic properties, distinguishing the noun subcategories present in the language. The grammatical bound formatives that are described in this chapter as part of the morphological structure of nouns are those that only occur as part of noun bases. Apurinã also has affix-like forms that occur outside of the morphological formatives inherent to nouns. The majority of such morphological forms belonging to this outer-layer morphology can occur not only with nouns but, also, with verbs, pronouns and/or other closed word classes (depending on the relevant case). In this chapter, I will concentrate on the description of inherently nominal bound formatives, postponing the description of non-inherently nominal affix-like forms to chapter 7, where they will be described as a special class of bound formatives.\n\nThe grammatical properties described in this chapter for nouns will motivate the following nominal categories:\n\n1. Unless it is necessary to distinguish the general word class from its particular subclasses, I will be using the term “category” to refer to a general word class or to its particular subclasses such that, for example, “noun” and “simple noun” will be both be referred to as a “(noun) category”.\n\n149\nIn classificatory nouns, there are:\n\n1. Inalienable Nouns\n2. Non-Inalienable Nouns\n\nIn alienable nouns, there are:\n\n1. Simple Nouns\n2. Mixed Nouns\n3. Compound Nouns\n\nIn mixed nouns, there are:\n\n1. Nouns of the type N\n2. Nouns of the type N\n\nIn productive compound nouns, there are:\n\n1. Nouns of the type N\n2. Nouns of the type N\n\nIn non-productive compound nouns, there are:\n\n1. Nouns of the type N\n2. Nouns of the type N\n\nIn addition to these categories, there is also the following gender categorization that cuts across all the categories given above:\n\n1. Masculine\n2. Feminine\n\nThe notion of “noun” can be grammatically defined in Apurinã in terms of its morphological and syntactic properties. Therefore, the exclusively nominal morphological properties described in the next sections will be taken as the distinctive MORPHOLOGICAL delineation of nouns. Morphological properties that nouns share with verbs will be highlighted, in this work, as outside the domain of intrinsic nominal morphological features and will be described separately in chapter 7. The existence of exclusively nominal morphology was already anticipated in chapter 3, under 3.2.2, (for example, in (4)), where the plural marker was illustrated. Hence, it is morphological\nproperties such as the plural marker, which are intrinsic to nouns, that are described in\ndetail in the rest of this chapter. In addition to specific morphological properties, nouns\nalso have particular syntactic properties (such as, for example, distribution in larger units)\nwhich distinguish them from verbs, pronouns etc., as will be made explicit in the\nfollowing subsections in this chapter.\n\n4.1. Simple Nouns And Alienability\n\nAn underived noun (i.e. a noun that is not derived from another word category)\ncan be minimally a bare root which is intrinsically nominal (i.e. can take exclusively\nnominal morphology). For instance, the words kema ‘tapir’ and anāpa ‘dog’ cannot be\nreanalyzed into smaller morphological elements and can only behave as nouns in the\nlanguage. Nouns which have only one root are simple nouns. The following word\nformation rule (i.e. rewriting rule), thus, represents the simplest type of noun structure\npossible, one that states that a noun (i.e. N) can be realized as a bare root (i.e. Rt):\n\n3. N → Rt\n\nWhile some simple nouns are lexically marked\\(^2\\) to be obligatorily possessed,\nothers are not.\\(^3\\) Obligatorily possessed simple nouns are labeled inalienable nouns,\nwhereas non-obligatorily possessed simple nouns are labeled alienable nouns. The\ninalienable versus alienable distinction is reflected in the morphological marking patterns\n\n\\(^2\\) “Lexically marked” properties are those that are part of the meaning of a lexical entry. Hence obligatory possession\nand unpossession are lexically marked in simple nouns because each lexical entry for simple nouns either is\nobligatorily possessed or is not.\n\n\\(^3\\) The present analysis differs from previous ones (cf. Facundes 1994a, 1995) in that the nouns which were there\nanalyzed as lexically marked for obligatory unpossession are here being analyzed as simply not having the property\ndescribed next. Some of the formatives involved in the marking patterns of simple nouns will be shown later, in section 4.3, to occur also with verb bases as nominalizers. Since the purpose of this section is to describe the morphological and syntactic factors that motivate the different lexical categories of nouns found in the language, I will, for the moment, ignore such additional functions of these formatives, returning to them in 4.3.\n\n4.1.1 Simple Inalienable Nouns\n\nInalienable nouns belong to the class of simple nouns insofar as they comprise a single root. Inalienable nouns are obligatorily possessed, require no morphological marker to occur possessed, and, also, require a morphological marker (i.e. -txi) to occur unpossessed (in the cases where the semantics/pragmatics allows for the noun to occur unpossessed). As an example, the word kuwu by itself means ‘head of’, not simply ‘head’. Thus, in order to express the concept ‘head’ without specifying whose head it is, one needs to say kuwî-txi. The inalienable noun kuwu is further illustrated in the clausal contexts given below. In (4a) kuwu is the possessed noun in the construction kema kuwu ‘tapir’s head’. In (4b) kuwu requires the -txi unpossessed marker because it occurs unpossessed:\n\n4a. [kema kuwu] mipa atama-ta\n tapir head.of Mipa look-VBLZ\n ‘Mipa looked at the tapir’s head.’\n\n4 The nasalization of the root final vowel when preceding the suffix -txi is a property of RINAL morphemes described in detail in 4.4.3.\nb. [kuwī-txi] su-pe\n head.of-UNPOSS go-PFTV\n ‘The head person left.’ (In this case ‘head’ refers to a mythological personage who only\n exists as a head, with no other body parts.)\n\n In (4), as everywhere else in this work, inalienable nouns are glossed as ‘N of’,\n where “N” is the lexical meaning of the inalienable noun in question and “of” marks it as\n obligatorily possessed. Thus, in the analysis proposed here, obligatory possession is part\n of the lexical entry of inalienable nouns; that is, it is stored with the lexical entries of\n inalienable nouns, rather than added by morphosyntactic rules. As seen (4a), no\n morphological marker is added when an inalienable noun occurs possessed, and, as a\n consequence, the syntactic context in which inalienable nouns occur possessed is one\n where two nouns are placed together by juxtaposition. On the other hand, when\n inalienable nouns occur unpossessed they require the presence of the unpossession\n marker -txi:\n\n The example given in (4) may suggest that possession constructions such as\n [kema kuwu] can be described purely in terms of the syntactic structure internal to the\n nominal phrase. In this case, the possession relation would not be marked by any lexical\n property of the possessed noun but, instead, by a syntactic distribution in which the\n possessor would always precede the possessed noun. However, while this “precedence\n rule” is a necessary part of the grammar of possession constructions in the language, it is\n not sufficient to describe them. The reason is a twofold one: First, it is necessary to refer\n to the lexical property of inalien", "num_tokens": 2048} {"category": "olmocr_science_pdfs-science_math_and_technology-part1", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-science_math_and_technology-part1/part-00-00000.npy", "text": " assisted by the government which assumed control over all the natural water resources in the State in 1886 (Eastburn 1990).\n\nThe most audacious irrigation project took shape at Mildura. In 1884 Canadian-born brothers George and Ben Chaffey were invited by the Victorian government to establish an irrigation settlement on the Murray (Davies 1978). The Chaffeys were granted 50,000 acres of rabbit-infested land which they cleared, subdivided and serviced with water channels. Huge pumps were placed in 1889 at psyche Bend where water was drawn from the Murray and pumped to Kings Billabong. From there, through a series of pumps and open channels it was distributed throughout the area. At psyche Bend the steam engine drove three centrifugal pumps, each delivering 8000 gallons of water per minute.\n\nUltimately, irrigation along the Murray was not the success it was envisaged by government or farmers. Environmentally, it was disastrous. The waste of water through evaporation and seepage was enormous. Worse still was the effect of clearing and ploughing on vast areas inland from the river. This allowed rain to run straight into the subsoil raising the water table and bringing saline groundwater close to the soil surface. The introduction of irrigation water exacerbated the problem. Irrigation-\ninduced salinisation was recorded at Mildura as early as 1895 (Eastburn 1990). By 1911 it appeared near Cohuna and Kerang. Today it affects virtually all regional settings along the river, including the highlands, the riverine plain and the mallee of the Murray-Darling Basin.\n\nTimber reserves and state forests\n\nThe first attempts to control land and resources along the Murray came in 1865 when the Victorian government gave itself the power to proclaim reserves for the ‘preservation and growth of timber’ (Wright 1989: 107). By the close of the decade 276,116 acres had been set aside as state forests and timber reserves, including the Barmah Forest of 19,600 acres, created in 1869 (Wright 1989). Further reserves were created at places like Gunbower Island, Nyab and Walpolla, partly to halt the damage being done to River Red Gum forests as a result of unregulated harvesting, but also to secure a valuable economic resource.\n\nThese developments were not motivated by ecological intent. Government action was propelled largely by utilitarian concerns. Red Gum forests along the Murray continued to be heavily exploited for mill logs. During the nineteenth century, sawmillers had only to pay £15 to set up a mill in the forest, and for £10 for cartage and £5 for each man employed in felling timber, he could fell the pick of the trees in the forest (Fahey 1987). In the Barmah Forest the Red Gum trade flourished, prompting one observer to claim that the timber was an ‘object of worship on the Murray’.\n\nThe mills declare dividends because of it; the sleeper-cutter keeps the pot boiling in return for his daily sweat upon it. The bullock driver draws his Saturday night beer from it. The axeman’s camp in the bush is kept supplied in tucker by it. The barge-master, the deck hand, and the skipper of the river tramp knows its value well (Brady 1912, cited in Hibbins 1991: 38).\n\nThe 1901 Royal Commission on State Forests and Timber Reserves reported critically on the use and management of the\n\nA load of Red Gum timber arrives at the Evans Bros sawmill in Echuca, 1923. (Historic Places Section, DNRF)\n\nBarmah Forest. The Commission noted that the forest had been cut over several times, and that at the current rates of cutting, the forest would not yield five years’ supply (Fahey 1987).\n\nA similar pattern of use developed in most of the Red Gum forests along the river. By 1932 the district forester at Swan Hill reported that all the red gum at Annuello, Mamboing and Toll Toll had been cut out (Hattah-Kulkyne National Park’ Resource Collection File F/C: 3/1).\n\nIt took many decades for the State’s forests to be placed under more effective management. Although a series of bills specifically for forest legislation were introduced into parliament, in 1879, 1881, 1887 and 1892, none was enacted. Finally, in 1907 a Forests Act was passed, which provided for the establishment of a State Forests Department under a Minister of Forests. A Conservator of Forests was appointed, with appropriate supporting staff and power to declare permanent forest reserve (Moulds 1991). Over the next decade, several initiatives were undertaken, including improvement works on the forest estate, the establishment of hardwood plantations and improved fire protection measures.\n\nFrom the 1920s foresters based at Ouyen, Swan Hill, Nyah and Mildura made attempts to re-afforest native pine areas. Unfortunately, until the 1960s these efforts were largely unsuccessful. In the Barmah Forest, thinning and coppice treatment was carried out in the 1920s and 1930s. Foresters also experimented with non-indigenous species. At the Timbooo Forest in the 1930s Red Ironbark Eucalyptus sideroxylon and Silky Oak Grevillea robust-\nta were trialed ('Hattah-Kulkyne National Park' Resource Collection File).\n\nForesters were often the first advocates for conservation. It was at their insistence, during the 1930s, that settlers in the Hattah-Kulkyne area were forbidden to remove native pines from their selections. In the Barmah Forest in the 1940s foresters and scientists began to re-assess the impact of grazing. Forester, WP Tingate drew attention to the damage done to saplings by cattle, ‘When grass was dry’ he said, ‘cattle would eat anything green’. Tingate’s concerns were echoed by his colleague, Stan Duncan, who observed in 1950 that there was little hope for widespread regeneration of the forest until grazing was discontinued. The Forests Commission acted on this advice and in 1950 Barmah West, Yalca and portions of Yelliclina were closed to cattle (Fahey 1987).\n\nWater reserves\n\nAnother government concern of the 1870s and 1880s was the need to protect water resources from the designs of squatters and selectors. Thus, in 1881 all unalienated land within one to one-and-a-half chains of the colony’s ‘Rivers, Rivulets, Creeks, Channels, Aqueducts, Lakes, Reservoirs, Swamps, Inlets, Loughs and Straits’ was reserved (Wright 1989: 224). The order ensured the Murray River water frontage was retained in public ownership and today this corridor forms the basis of the Murray River Reserves managed by Parks Victoria.\n\nNational parks\n\nFor many conservation-minded people, the creation of State forests and Crown land reserves was not enough. Towards the end of the nineteenth century a growing body of scientific opinion became increasingly vocal in their demands for the protection of wildlife and the establishment of national parks. In the broader community too there was a growing awareness of the natural world. Changing recreation patterns brought about by extensions to the rail network and the emergence of field naturalist and bushwalking clubs awakened people to the beauties of nature.\n\nThe Field Naturalists Club of Victoria (FNCV) was one of the first supporters of national parks. Established in 1880, the FNCV combined the desire for open air recreation with an interest in the natural environment. The Club instituted walking and camping expeditions in which the observation of wildlife and the collection of botanical specimens were important activities. The FNCV was soon joined by other societies, including the Wattle Club, the Royal Australasian Ornithologists Union, and the Bird Observers Club. This small but committed conservation movement, led by influential spokesmen like Baldwin Spencer and Sir James Barrett, began to exert pressure on the government to protect Victoria’s bushland.\n\nIn 1914, the FNCV became interested in the Hattah Lakes system near Mildura. At its meeting on 14 December the Club decided to write to the Fisheries and Game Department and request that the area be proclaimed a sanctuary for native game. Native game sanctuaries were proclaimed under the Game Act of 1890 and made it unlawful for any person to kill any native game within a designated area and specifically mentioned by proclamation (Mahon 1992). Of particular concern to the FNCV was the practice of punt-gun shooting on Lake Mornpall. Speaking for the resolution, JG O’Donoghue reported on a recent visit to the Lake where he claimed that, after a single discharge of the gun used by one individual, as many as 72 pairs of ducks had been ‘picked up’ (The Victorian Naturalist 1915: 31). The resolution was supported by the Inspector of Fisheries and Game, Mr F Lewis, and in 1915 an extensive area embracing parts of Chalka Creek, Lakes Hattah, Little Hattah, Mornpall and Brookie, together with all land", "num_tokens": 2048} {"category": "olmocr_science_pdfs-science_math_and_technology-part1", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-science_math_and_technology-part1/part-00-00000.npy", "text": " \\mapsto a_3 v_7 \\mapsto a_3^2 v_3 \\mapsto 0; \\]\n\\[ v_9 \\mapsto a_3 v_6 \\mapsto a_3^2 v_2 \\mapsto 0; \\]\n\\[ v_8 \\mapsto a_3 v_4 \\mapsto a_3^2 v_1 \\mapsto 0; \\]\n\\[ v_5 - \\frac{b}{a_3} v_4 \\mapsto 0. \\]\n\nWe therefore see that the Jordan type of \\( A \\) is \\((3^3, 1) = (\\rho_3(9), 1)\\), noting that \\( \\rho_3(9) \\) is the Jordan type of \\( A' \\). The basis with respect to which \\( A \\) has Jordan normal form is \\( \\{v_{10}, Av_{10}, A^2v_{10}, v_9, Av_9, A^2v_9, v_8, Av_8, A^2v_8, v_5 - \\frac{b}{a_3} v_4\\} \\). In general, if \\( i \\) is minimal such that \\( a_i \\neq 0 \\), we can use this method to show that the Jordan type of \\( A \\) is \\((\\rho_i(9), 1)\\).\n\nThe case that \\( b = 0 \\) and \\( c \\neq 0 \\) is for the most part similar. We illustrate this with the example of \\( a_3 \\neq 0 \\neq c \\) and \\( a_i = b = 0 \\) for \\( i \\neq 3 \\). By drawing lines on the Dynkin pyramid in the same way as the \\( b \\neq 0 \\) example above, we obtain:\n\nIn particular, we have \\( v_{10} \\mapsto a_3 v_7 + cv_5 \\mapsto a_3^2 v_3 \\mapsto 0 \\); that is to say, \\( A \\) maps \\( v_{10} \\) to 0 in two steps via \\( v_5 \\), but in three steps via the long block of the Dynkin pyramid. We say that the string \\( v_{10} \\mapsto a_3 v_7 \\mapsto a_3^2 v_3 \\mapsto 0 \\) subsumes the string \\( v_{10} \\mapsto cv_5 \\mapsto 0 \\).\n\nThis then gives a Jordan type of \\((3^3, 1) = (\\rho_3(9), 1)\\) with respect to the basis \\( \\{v_{10}, Av_{10}, A^2v_{10}, v_9, Av_9, A^2v_9, v_8, Av_8, A^2v_8, v_5\\} \\).\n\nAs in the previous cases, we can alter the non-zero \\( a_i \\) to find matrices which have all Jordan types of the form \\((\\rho_j(9), 1)\\).\n\nFinally we consider the case that \\( b \\neq 0 \\neq c \\). If \\( a_i = 0 \\) for all \\( i \\), then we have \\( v_{10} \\mapsto cv_5 \\mapsto bcv_1 \\mapsto 0 \\), and \\( v_j \\mapsto 0 \\) for all \\( j \\neq 10, 5, 1 \\). So here we find that \\( A \\) has Jordan type \\((3, 1^7)\\).\nIt remains to consider which Jordan types occur in this case for the possible choices of non-zero $a_i$.\n\nFirst, suppose that $a_3 \\neq 0$ and $a_i = 0$ otherwise. Here the Jordan type of $A'$ is $(3^3) = \\rho_3(9)$, and we obtain\n\n$$v_{10} \\mapsto a_3 v_7 + cv_5 \\mapsto a_3^2 v_3 + bc v_1 \\mapsto 0;$$\n$$v_9 \\mapsto a_3 v_6 \\mapsto a_3^2 v_2 \\mapsto 0;$$\n$$v_8 \\mapsto a_3 v_4 \\mapsto a_3^2 v_1 \\mapsto 0;$$\n$$v_5 - \\frac{b}{a_3} v_4 \\mapsto 0.$$\n\nConsequently we find that the Jordan type of $A$ is $(3^3, 1) = (\\rho_3(9), 1)$.\n\nThe cases of $a_2 \\neq 0$ and $a_1 \\neq 0$ are treated in the same way, and in each case we obtain a Jordan type of $(\\rho_i(9), 1)$. In effect, in these cases the string\n\n$$v_{10} \\mapsto cv_5 \\mapsto bcv_1 \\mapsto 0$$\n\nis subsumed into the string arising from the largest Jordan block of $A'$.\n\nNext, the case of $a_4 \\neq 0$ and $a_i = 0$ otherwise requires a closer look. In this case the Jordan type of $A'$ is $\\rho_4(9) = (3, 2^3)$, and we may represent this by drawing the following lines on the Dynkin pyramid:\n\nNow we have $v_{10} \\mapsto a_4 v_6 + cv_5 \\mapsto (a_4^2 + bc) v_1$; so the Jordan type of $A$ now depends on whether or not we have $a_4^2 + bc = 0$. \n\n63\nIf it is the case that $a_4^2 + bc = 0$, then we have the following:\n\n$$v_10 \\mapsto a_4 v_6 + cv_5 \\mapsto (a_4^2 + bc)v_1 \\mapsto 0;$$\n$$v_9 \\mapsto a_4 v_4 \\mapsto 0;$$\n$$v_8 \\mapsto a_4 v_3 \\mapsto 0;$$\n$$v_7 \\mapsto a_4 v_2 \\mapsto 0;$$\n$$v_5 \\mapsto bv_1 \\mapsto 0.$$\n\nWe thus see that $A$ has Jordan type $(2^5)$ in this case, with respect to the basis \\{v_{10}, Av_{10}, v_9, Av_9, v_8Av_8, v_7, Av_7, v_5, Av_5\\}.\n\nConversely suppose that $a_4^2 + bc \\neq 0$. Then we have:\n\n$$v_10 \\mapsto a_4 v_6 + cv_5 \\mapsto (a_4^2 + bc)v_1 \\mapsto 0;$$\n$$v_9 \\mapsto a_4 v_4 \\mapsto 0;$$\n$$v_8 \\mapsto a_4 v_3 \\mapsto 0;$$\n$$v_7 \\mapsto a_4 v_2 \\mapsto 0;$$\n$$v_5 - \\frac{b}{a_5} v_6 \\mapsto 0.$$\n\nThus we find that $A$ has Jordan type $(3, 2^3, 1)$.\n\nNow suppose that $a_5 \\neq 0$, and $a_i = 0$ otherwise. In this case the Jordan type of $A'$ is $\\rho_5(9) = (2^4, 1)$. We then find the following:\n\n$$v_{10} \\mapsto cv_5 + a_5 v_4 \\mapsto bcv_1 \\mapsto 0;$$\n$$v_9 \\mapsto a_5 v_3 \\mapsto 0;$$\n$$v_8 \\mapsto a_5 v_2 \\mapsto 0;$$\n$$v_5 - \\frac{b}{a_5} v_7 \\mapsto 0;$$\n$$v_6 \\mapsto 0;$$\n$$v_4 \\mapsto 0.$$\nIn this case also, we see that $A$ has Jordan type $(3, 2^2, 1^3)$. Finally, we can use the exact same argument to show that if $a_6 \\neq 0$ (respectively, $a_7 \\neq 0$ and $a_8 \\neq 0$) and $a_i = 0$ otherwise, then in this case $A$ has Jordan type $(3, 2, 1^5)$ (respectively, $(3, 1^7)$ and $(3, 1^7)$). We conclude by observing that we have obtained matrices in the centraliser of $D(9, 1)$ of each of the Jordan types described in Proposition 4.2.3.\n\nHaving shown that Proposition 4.2.3 holds in $\\mathfrak{gl}_{10}(k)$", "num_tokens": 2048} {"category": "olmocr_science_pdfs-science_math_and_technology-part1", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-science_math_and_technology-part1/part-00-00000.npy", "text": "tr>\n
φ = 0 ~ 33; C = 23~36 kg/cm²
C = 18 ~ 24 kg/cm³ ; f = 1,0
3. UnconfineC = kg/cm³ ; f = ~ 1,2
C = kg/cm³ ; f = ~
4. ConsolidationPc = 1,4 ~ 1,7 kg/cm² ; Cv = 0,00161 to 0,00169 cm²/sec
Pc = 1,31,7 kg/cm² ; Cv = 0,001580,00210 cm²/sec
5. Swellingk = 0,590 ~ 0,913%
k = ~ %
\n\n**Figure 7. Topography of the study area**\n\n**Tabel 2. Parameter tanah sebagai input pada pemodelan**\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
LapisanNSPTKedalaman (m)Jenis tanahJenis sampelBerat isi tanah satBerat isi tanah unsatModulus young E<sub>ref</sub>Poisson ratioKohesi C<sub>ref</sub>Sudut geser γ
1320-8Lempung KepasiranUndisturb1717300000.23532
2508-14PasirUndisturb1720500000.24236
\n\nhttp://eduvest.greenvest.co.id\nResults of Modeling and Analysis\n\nIn this modeling, the use of data involves several types of data:\n\n1. Topography is used to provide information about the variation in the area, elevation contours, and vegetation levels. Here is the topographic map covering the area around the research object. Looking at the results of the Topography Survey in a project area of 9,076 hectares. The main road access is the Cidahu highway located at the hilltop position, so on the left and right sides of the road, the ground conditions descend in tiers with a height difference of about 16 meters and 3 tiers with very steep slopes (Figure 7).\n\n2. Soil parameters and characteristics. The correlation values used still refer to the results of field testing and laboratory testing by observing the types and NSPT in each layer, with results as seen in Table 1 above. Soil parameter data from field testing, laboratory testing results, and correlations used in the analysis using the Plaxis 3D V20 program for layer parameters are shown in Table 2.\n\n3. Structure and load data. This structure data is related to the technical specifications of the materials used and the loads and tolerances of those loads.\n\nThe results of slope stability analysis in the area where landslides occurred on the Cidahu road in Cidahu Village, Kuningan Regency, were conducted using the PLAXIS 3D V20 program. It can be seen from Figure 8a, which is the result of modeling from the existing condition, the slip plane with results cannot be further analyzed due to \"some soil body collapse\" and cannot produce a safety factor (SF) value. From the analysis results above, it can be seen that the slope experienced landslides and required remedial action. It can be seen in Figure 8b with the addition of embankments as retainers; the slip plane and deviatoric strain are too large and produce a safety factor value of 1.18. This value, according to SNI-8460-2017, is considered unsafe because it is less than 1.5; therefore, alternative treatments are performed.\nFigure 8. Slip field exiting conditions: a) without reinforcement piles and b) with additional reinforcement piles\n\nLandslides at the study site occurred after rain, so the main cause of this collapse was the instability of the soil retaining wall when rain occurred. This instability is caused by several factors, such as poor foundation dimension design and low quality of implementation. Along with that, the fall of the pile behind the wall is caused by water seepage from the surface and groundwater flow. This causes compression of the pile behind the wall pair and a fracture on the outer side of the wall in the form of piping.\n\nIn the initial stage, namely the determination of the analysis phase which aims to determine the number of construction stages and determine the type of calculation, this study uses 6 phases including the initial phase, the initial construction phase (sheet pile, stake, anchor), the pile phase, the loading phase, the 2nd construction phase (alternative handling 1 & 2) and the safety condition phase.\n\nAlternative Treatment 1\n\nAlternative treatment 1 is carried out in order to find out other conditions that may be more effective and also remain safe, and also function as additional reinforcement if needed. The model of the handling structure as shown in Figure 9, by replacing the existing soil retaining wall with the installation of a new retaining wall and the addition of ribs on the inside.\n\nSeen in Figure 10 of gelincir and deviatoric strain fields and the results obtained from the results of this analysis the safety factor value of 1.516 based on (SNI-8460-2017) can be said to be safe because > 1.5.\nThe picture below is a continuation of the results of the analysis of conditions in the field which turns out that the x-direction reaction (horizontal) of the heap soil is not restrained and there is \"some body soil collapse\". **Figure 11.** Alternative Handling Structure Model 2 involves the existing sheet pile with the addition of a retaining wall with rib on the outside as reinforcement with additional piles. **Figure 12.** the slip and shading fields are too large, so by adding additional structures, shading and slipping planes are reduced so that after there is an additional structure FS becomes 1.63 based on SNI-8460-2017 it is said to be safe because it is more than 1.50.\nCONCLUSION\n\nBased on the evaluation of slope stability and the calculation of soil retaining walls on the slope on the Cidahu road in Cidahu village, Cidahu Regency, the following results were found: 1. In slope stability analysis using the PLAXIS 3D V20 program, the initial condition (existing) is a slope with reinforcement using anchor beam, beam and sheet pile with the addition of piles as reinforcement, it shows that the safety factor (SF) is less safe against landslides, with an SF<1.5 value, which is 1.18.\n\nTo address the potential for further slope avalanches, an analysis of soil retaining walls designed to meet safety standards was conducted. The soil retaining wall involves retaining wall, rib and bored pile. With alternative option 1, namely using a new retaining wall with a rib on the inside with a safety factor of 1.61 and alternative 2 using an existing sheet pile with the addition of a retaining wall with a rib on the outside and an additional pile and bored pile obtained by a safety factor of 1.63.\n\nREFERENCES\n\nBPS Kabupaten Kuningan, 2020, Kuningan dalam Gambar.\nFellenius, W., 1927, Static soil calculations with friction and cohesion (adhesion) assuming circular cylindrical sliding surfaces. Ernst & Sohn, Berlin.\nJanbu, B.K., 1956, Norwegian Geotechnical institute Publication No. 16<|endoftext|>Physics in pp collisions\nLHC, machine, detectors, physics\n\nJohannes Haller\n(Universität Hamburg)\nMotivation/Introduction: open questions in particle physics\n- The Standard Model\n- New physics?\n\nHadron Collider Physics\n- Overview of colliders\n- pp colliders vs e⁺e⁻ colliders\n- LHC\n - Conditions of data taking\n - Main physics goals\n\nDetectors: ATLAS and CMS\n- Reminder: general design of collider detectors\n- Main features ATLAS\n- Main features CMS\n- Data acquisition and trigger systems\n\nPhysics: Existing results and prospects at the LHC:\n- Test of the SM at Hadron Colliders (Top", "num_tokens": 2048} {"category": "olmocr_science_pdfs-science_math_and_technology-part1", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-science_math_and_technology-part1/part-00-00000.npy", "text": " until the fuel surface reaches the ignition temperature. The ignition temperature is assumed as 90ºC.\n\nCalculation Results\nCalculations are carried out for each case of experiments under smoke layer. The calculated results are shown in Fig. 16. In the experiments, the time to spread gradually decreases as the depth of the suspended walls increases. As shown in Fig. 16a), this tendency is reproduced well by method B. However, the calculated spread time is shorter than the experiments. This is because the method B would overestimate the radiation heat flux. In contrast, method A results in too long spread time as the depth of the suspended walls. As shown in Fig. 16b), smoke layer temperature is calculated excessively, because the fire spread takes place simultaneously in calculation, while in experiments symmetrical spread is not so often.\n\n![Fig 16a) time to spread](image)\n\n![Fig 16b) smoke layer temperature (method B)](image)\n\nFIGURE 16. Comparison of the calculation results with experimental results\n\nCONCLUSION\n\nIn the present study, the time required for a fire to spread between five liquid fuel pools is measured in an open area, near a wall, under a ceiling, and under a ceiling with a suspended wall. A model was developed to predict the fire spread between the fuel trays and compared them experimentally.\n\nIn an open area, an asymmetrical fire spread is observed in some cases because the merging and leaning of the flame along the direction of the fire spread delays the fire spread along other directions. This necessitates the estimation of the merged flame height and the leaning of the flame. An empirical model for estimating the flame height from multiple fire sources has been proposed by Sugawa et al. In contrast, the leaning of the flame is unclear and requires further study.\n\nWhen the fire sources are placed on the wall, the extension of the flames increases the thermal radiation to the vicinity and accelerates the fire spread. The flames enlarge along planar walls and the thermal radiation along the orthogonal direction is larger than that in the other cases, which is believed to affect the fire spread. In contrast, when the fire sources are placed away from the wall, the leaning of the flame decreases the thermal radiation along some direction and delays the fire spread process. The effects of the distance between the fire sources and the wall on the flame height and the leaning of the flame are unclear and require further study.\nWhen the ceiling height is higher than the maximum flame height, the rate of fire spread and the HRR are almost the same as those in an open area because of the low temperature of the ceiling surface and the ceiling jets. In contrast, when the flames touch the ceiling, the rate of fire spread increases as the ceiling height decreases. In particular, when the flames continuously impinge the ceiling, the flames spread concentrically under the ceiling and the rate of fire spread increases significantly; further, the HRR for each pool increases rapidly. The ceiling jets of strong fire plumes significantly affect the fire spread and increase the HRR of the original fire source that produces the fire plume. The temperature distribution model has been proposed by Heskedstad et al. Therefore, a method that predicts the thermal radiation to the floor by using this model should be developed.\n\nIn the initial stage of fire development in the experiments conducted under a ceiling with a suspended wall, the effects of the thermal radiation from flames on the fire spread are dominant, while those of the smoke layer are marginal. Subsequently, the smoke layer temperature increases and the thermal radiation from the smoke layer becomes dominant. The calculated results of the fire spread are in fair agreement with the measurements; however, the calculated fire-spread time is too small if the radiation from the smoke layer and the flame are independently calculated and added. In the case where the flames enter the smoke layer, the interaction between the flame and the smoke layer would have to be calculated correctly. This issue is currently being studied.\n\nREFERENCES\n\n3. Hasemi, Y. and Tokunaga, T., “Some Experimental Aspects of Turbulent Diffusion Flame and Buoyant Plumes from Fire Source Against Wall and in a Corner of Walls”, Combustion Science and Technology, 40, 1-17, 1984<|endoftext|>Carry Speculative Adder with Variable Latency for Low Power VLSI\n\nIJCA Proceedings on National Conference on Innovation in Computing and Communication Technology\n\n© 2016 by IJCA Journal\n\nNCICCT 2016 - Number 1\n\nYear of Publication: 2016\n\nAuthors:\nSubhashinee A.\nRajasekaran C.\n\nAbstract\n\nArithmetic logic units and digital signal processors widely uses adders. It is the most complicated arithmetic circuits in digital electronics. The existing adders suffer from critical path delay, area overhead and power consumption. Speculative adders are designed with variable latency that combines speculation technique along with correction methodology to attain high performance in terms of low area overhead over the existing adders. In speculative adders the sum and carry generation part is separated to reduce the area overhead. Carry Speculative Adder (CSPA) uses carry predictor circuit to reduce power consumption and to reduce the computational time and it uses error recognition and error correction circuit to detect the fault.\noccurred in the partial sum generator and to recover it to get accurate results. CSPA circuit provides error free output so that it can be used in many digital applications. This speculative adder can reduce the delay upto 11.88%.\n\nReferences\n\n- Y. Chen, H. Li, J. Li, and C. -K. Koh, \"Variable-latency adder (VL-adder): New arithmetic circuit design practice to overcome NBTI,\" in Proceedings International...\nIndex Terms\n\nComputer Science\nCircuits And Systems\n\nKeywords\nSpeculative Adder Variable Latency Error Detection Error Correction<|endoftext|>The Improved Recognition Method of Radiation Signal under the Condition of Unstable SNR\n\nYun Lin*, Xiaochun Xu and Jinfeng Pang\n\nCollege of Information and Communication Engineering\nHarbin Engineering University\nHarbin, China\nlinyun@hrbeu.edu.cn\n\nAbstract\n\nThe existing recognition methods of radiation source signal are extremely sensitive to the change of signal-to-noise ratio (SNR). In order to solve this problem, in this paper, it proposes a radar signal recognition method based on fractal box dimension and neural network under the condition of unstable SNR. Firstly, it extracts box counting dimension features of four different radiation source signals, and then uses the characteristic values of stable box counting dimension as the inputs of the neural network. Finally, it can recognize the four different kinds of radiation source signals. Simulation results show that, taking the box counting dimension characteristics as the input of the neural network to train, test and classify, it has good recognition rate in a certain changed range of SNR, and it has more widely application in the application environment.\n\nKeywords: radiation source signal recognition; fractal box dimension; neural network; unstable SNR\n\n1. Introduction\n\nRadar signal recognition [1] is an important part of the modern electronic reconnaissance and electronic support system. It is also the key problem need to be solved in radar signal processing. The traditional identification methods [2-4] usually recognize radar signals based on several important parameters characteristics, including the pulse width PW, signal pulse repetition intervals PRI, signal carrier frequency RF, intra-pulse modulation information MOP, signal arrive angle AOA, signal pulse amplitude PA, and signal pulse arrival time TOA, etc. First, estimating these parameters, and then using them to match with the characteristic parameters in the database to reach the purpose of recognition. However, with the signal environment getting more and more complicated and the emerging of different radar signals, the recognition rate is always low using the traditional characteristic parameters. And it has high requirements of the stability of noise environment. With the rapid development of science and technology, people began to focus on some of the strong anti-interference signal characteristics. While the fractal box dimension [5] has been widely used in mechanical fault diagnosis [6], exploration [7] and other areas. This article will introduce the fractal box dimension as the characteristic parameters to the radar signal recognition, in preparation for the subsequent identification. Because the fractal box dimension has good noise immunity, so even if the SNR unstable environment, the value of extracted features is still relatively stable.\nThe article first proposed the fractal box dimension characteristics of four kinds of radar signals for feature extraction, and using neural network classifiers [8-9] to classify four radar signals under the instability signal to noise ratio. Using the good robustness characteristic parameters combines with the neural network classifiers which has strong adaptive ability, even if the signal to noise ratio changes in the environment, it can still sort of radar signals with good recognition results.\n\n2. Basic Theoretical Knowledge\n\n2.1. Theory of Fractal Dimension\n\nFractal dimension [10] is the main parameters in fractal theory. It can quantitatively describe the complexity of fractal sets; measure the extent of irregular signals. Among them, Hausdorff dimension is the basic fractal theory of fractal dimension. In practice, the calculation of the Hausdorff dimension is very difficult, so many people usually use fractal box dimension to describe the measure of the signal information.\n\nFractal box dimension is defined as follows: Make a metric space \\((X, d)\\), \\(H\\) is a non-empty compact set of \\(X\\), \\(B(x, \\varepsilon)\\) is a closed ball with the center of \\(x\\) and the radius of \\(\\varepsilon\\). Let \\(A\\) be a non-empty compact set of \\(X\\), for every positive number \\(\\varepsilon\\), let \\(N(A, \\varepsilon)\\) be the number of the smallest closed ball covering \\(A\\), the radius of the closed ball is \\(\\", "num_tokens": 2048} {"category": "olmocr_science_pdfs-science_math_and_technology-part2", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-science_math_and_technology-part2/part-00-00000.npy", "text": " another study by Halmiton and Desmond (2003) that was done in Zimbabwe, 44 fresh wild elephant faecal samples were collected. Baerman’s technique resulted in 73% positive and 23% negative samples. Halmiton and Desmond (2003) reported that due to equipment difficulties the exact identification of the larvae was not possible. Sedimentation resulted in 36% of the\nsamples containing strongyles, 57% containing strongyloids and 36% of the samples containing negative samples. Floatation resulted in 93% of the samples containing strongyles 93% of the samples containing strongyloids and 51% negative samples (Halmiton and Desmond, 2003).\n\nStrongyle parasites are therefore common in elephants. However the biology of strongyles in elephants is not quite well understood. One other highlight from the above studies is that strongyle parasites in elephants can be treated with different medicines for example Fenbendazole and Oral Kalbend (Fowler and Mikota, 2006: Suresh, 2000).\n\n2.4 Elephant body condition and nutrition\n\nElephants in the wild have been described as general feeders consuming more than 400 different species of plants (Fowler and Mikota, 2006). Grass is preferred by elephants but they also consume trees, shrubs, leaves, twigs, roots, fruits, seeds and stones (Fowler and Mikota, 2006). It has been demonstrated through observational studies, faecal analysis and gastrointestinal studies that elephants are both grazers and browsers. The feeding choices of elephants have been linked to many factors with variation mainly influenced by habitat and season.\n\nAccording to Fowler and Mikota (2006), elephants in Tsavo National Park in Kenya spend 48-63% of their time feeding. Fowler and Mikota (2006) indicated that even though there are quite a number of studies on elephant feeding behaviour, there are few studies focusing on nutrition analyses. The few nutrition analysis studies that have been conducted were through collection of plant materials, stomach content or other sections of the gastrointestinal tract. Another way to determine the quality of diet is through faecal sample analysis (Leslie and Starkey, 1985).\nA study conducted by McCullagh (1967) investigated stomach content of 148 elephants at different times of the year for nutrition chemical composition. On average, the study found that samples contained 8.4g of protein, 1.5g of fat, 43.5g of carbohydrate, 35.7g of fibre and 11.0g of mineral material in 100g of their dry matter. This study concluded that those elephants may be deficient in protein in dry season than wet season, also the intake of calcium was high during the dry season than in the wet season. The analysis of the quality of the dietary fat showed it to contain relatively small amounts of essential poly unsaturated fatty acids. Ullrey et al., (1997) stated that while observations are not sufficient to set minimum nutrient requirements, analysis of plant parts eaten by elephants can help define nutrient intakes in wild diets.\n\nFor protein requirements, browse species in the Hwanke National Park in Zimbabwe in 1997 had 8-24% of crude protein (CP) (Ullrey et al., 1997). As for minerals, browse plant species eaten by wild African elephants during February 1997 in Hwanke National Park, Zimbabwe contained 0.35-2.4% calcium (Ca) and 0.11-0.33% phosphorus (P) (Ullrey et al., 1997). In another study, a 10yr old male African elephant was observed for 12 hours during daylight in Tsavo National Park, Kenya and 64 plant species were consumed (Bax et al., 1963). CP concentration ranged from 6-23% from the 59 plant species that were analysed. Crude fibre concentrations in the leaves of trees used by African elephants in the Kasungu National Park, Malawi, ranged from 13-62% (Ullrey et al., 1997).\n\nAlternative analyses for neutral detergent fibre (NDF), acid detergent fibre (ADF), and lignin have been developed, which are more accurate in characterizing plant cell wall fractions that are mostly difficult to digest. NDF includes lignin, cellulose, and hemicellulose, whereas ADF includes lignin and cellulose (Robinson, 1999). This analytical system has been used to characterize fibre concentrations in plants consumed by African elephants in a private game reserve bordering the Kruger National Park in South Africa, and averages of 62% NDF, 48%\nADF, and 15% lignin were found (Ullrey et al., 1997). The nutrient requirements of elephants have not been defined; however the similarities in the digestive systems of the elephant and the horse suggested that the nutrient needs for the elephants might reasonably be compared to the nutrient requirements of the horse (Fowler and Mikota, 2006; Robbins, 1983). A study that was conducted by Rode et al. (2006) investigating the nutritional ecology of elephants in Kibale National Park, Uganda, found that energy and protein concentrations were within the recommended levels, but the concentrations of several minerals such as sodium were low relative to the requirements (Table 1) based on captive elephants and values reported for other wild populations. The study suggested that mineral nutrition is most likely to be one of the important factors that drive elephant behaviour and patterns of habitat use.\n\n**Table 1**: Suggested elephant nutrition requirements (on dry matter basis) (Rode et al., 2006).\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
Nutritional elementsElephant RequirementsHorses Requirements
Copper (ppm)-10
Manganese (ppm)-40
Zinc (ppm)-40
Iron (ppm)157.050
Sodium (ppm)20001000
Magnesium (%)0.10.3-0.4
Potassium (%)0.60.3-0.6
Calcium (%)1.5-
Phosphorus (%)--
Crude Protein-8.0
ADF (%)10-12-
Energy (KJg⁻¹)16.7-
\n2.5 Conclusion\n\nThis chapter identified techniques used to determine elephant body condition of both African and Asian elephants. The studies revealed that measuring body condition of elephants using physical body scores has been used for a long time and is still used. Furthermore, literature revealed that there has been a relationship between strongyle parasites and body condition. Another highlight is that nutrition composition of elephant feed is not well studied, and hence the nutritional requirements for elephants are not clear. Studies investigating the relationship between individual nutrition and body condition are limited. What is also evident from literature is that the Asian elephants are far better studied than wild African elephants. Many African elephant studies have been done in Kenya and Uganda, and there is very little research conducted on elephants in Namibia.\nCHAPTER 3\nMATERIALS AND METHODS\n\nThis study was conducted with permission from the Ministry of Environment and Tourism under the supervision of the University of Namibia and a non-profitable organisation, Utopia Scientific. Data were collected during winter of 2012 and 2013 from June to August, this allowed for comparison of elephant body condition during winter over a period of two years.\n\n3.1 Study Area\n\nThe study was conducted in Etosha National Park, one of southern Africa’s most important game reserves, located at latitude 18° 94’ 53”S and longitude 15° 89’ 78”E and it covers an area of 22,270 km² (du Plessis, 2001). In its centre is a salt pan which covers 40% of the park (du Plessis, 2001). The park has high biodiversity with grass and thorn savannah and Mopane bush land in the west and dry forests in the north-east (de Beer et al., 2005). The coolest and dry months are May to September, while the rainy season is from November to March. Average daily", "num_tokens": 2048} {"category": "olmocr_science_pdfs-science_math_and_technology-part2", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-science_math_and_technology-part2/part-00-00000.npy", "text": " available magnetization, and neglecting relaxation effects and pulse imperfections, increases the signal-to-noise (S/N) ratio relative to a reference spectrum, albeit only for a subset of signals. It is this aspect that is of particular interest to reaction monitoring, where maximizing sensitivity can be highly beneficial. Below we present the design and implementation of a new pure-shift method, explore its scope and limitations, and demonstrate its application in the analysis of the kinetics of chemical reactions and equilibria by \\(^{19}F\\) and \\(^31P\\) NMR.\nEXPERIMENTAL SECTION\n\nNMR Experiments. The $^{19}$F spectra were acquired on a two-channel 400 MHz Bruker Avance III NMR spectrometer equipped with a Prodigy probe or on a three-channel 400 MHz Bruker Avance III NMR spectrometer equipped with a 5 mm z gradient BB TBO H, $^{19}$F probe. The $^{19}$F spectra of 1 in CDCl$_3$ presented in Figure 2 were acquired using the following parameters: relaxation and nominal acquisition times of 1.5 and 17.4 s, respectively, two dummy scans and 4 scans were accumulated. The $^{19}$F SHARP spectrum was acquired using the pulse sequence of Figure 1, 17 and 34 µs 90° and 180° pulses, respectively, $n = 256$, 34 ms chunk time and the overall acquisition time per one scan of 17.9 s.\n\nThe $^{19}$F SHARP spectra of a mixture of 3 and 4 in a mixture of 1:1 CD$_3$OD/H$_2$O presented in Figure 4 were acquired using the pulse sequence of Figure 3. $n = 128$, 13.6 ms acquisition chunks, 10 ms 180° sinc pulse during the initial SPFGSE. The relaxation and the nominal acquisition time of 10 and 3.49 s were used, respectively. Two dummy scans and four scans were accumulated. The spectra were processed by applying a 0.1 Hz exponential line broadening and a forward complex linear prediction (the stated signals half-height linewidths quote values without this additional line broadening). The $^{19}$F SHARP spectra of Figure 5 were acquired using identical parameters as used for the spectra of Figure 4, but with the $x$, $y$, $z$, $z'$, $x$, $y$, and $y'$ shim corrections deviating by + 500 units from their optimal values.\n\nThe $^{19}$F SHARP spectra of 1 presented in Figure 6 were acquired using the pulse sequence of Figure 1. The relaxation and the nominal acquisition times of 3 and 1.09 s were used, respectively. The loop parameter $n$ was set to 64, 128, 256 or 512, yielding acquisition chunks of 8.5, 4.25, 2.13 and 1.06 ms; 70 µs 180° $^{19}$F pulses were applied during acquisition. Two dummy scans and two scans were accumulated. The spectra were processed by applying a 0.5 Hz exponential line broadening (the half-height linewidths are quoted without this additional line broadening).\n\nSpectra of F-3 or 3 in CD$_3$OD/H$_2$O (1:1 ratio) presented in Figure 7 were acquired using the SHARP pulse sequence of Figure 1, relaxation delay of 3 s, acquisition time of 0.89 s, two dummy scans and two scans, a 125 µs 90° rectangular excitation pulse and 250 µs rectangular 180° pulses during the acquisition. The length of 180° rectangular pulses was set to avoid perturbation of the F-1 and F-4 spins. The acquisition chunk lengths varied between 0.845 and 3.38 ms. The spectra were processed using exponential line broadening of 0.5 Hz (the half-height linewidths are quoted without this additional line broadening). The 1D $^{19}$F spectra were acquired using a 90° excitation pulse and parameters used for the SHARP spectra.\n\nKOH catalyzed protodeboronation of 2/2a in 1:1 H$_2$O/dioxane mixture was monitored by the acquisition of $^{19}$F NMR sel-SHARP spectra (pulse sequence of Figure 3, $n =$128) in a stop-flow experiment (Figure 8). Two scans were acquired per spectrum using a relaxation delay of 1.5 s and the overall acquisition time of 4.99 s per scan, which consisted of 2.18 s of sampling (acquisition chunk time of 8.5 ms) and 2.81 s (10 ms Gaussian pulses, 300 us PFGs and 200 us gradient recovery delays). Two dummy scans were applied before the acquisition of the first spectrum only. Sixteen spectra were acquired with the first and the last starting and 208 s, respectively, after the mixing was triggered.\n\nSpectra of 5/5a in 1:1 H$_2$O/dioxane mixture presented in Figure 9 were acquired using the sel-SHARP pulse sequence of Figure 3, relaxation delay of 3 s, acquisition time of 1.5 s, two dummy scans and four scans, a 93 µs 90° rectangular excitation pulse, 1 ms 180° Gaussian pulse during the SPFGSE and 186 µs rectangular 180° pulses during the acquisition. The length of 180° rectangular pulses was set to avoid perturbation of the other fluorine spins. The chunk lengths was set to 23.4 ms. The 1D $^{19}$F spectra were acquired using relaxation delay of 3 s, acquisition time of 0.87 s, 2 dummy scans and 8 scans. Samples were prepared by mixing 500 µl of 0.1 M 5 containing 0.01 M trifluoroacetic acid with increasing amounts of 0.1 M 5 in 0.1 M KOH. In this way the concentration of 5 was kept constant. The resulting concentrations of KOH, together with obtained linewidths and chemical shifts, are reported in (Supporting Information, Table S4).\n\nLine Shape Analysis. As indicated, the 5/5a exchange (Equation 3) is fast on the chemical shift scales ($k_e >> \\Delta \\omega$, where $\\Delta \\omega = \\omega_1 - \\omega_2$ and $\\omega_1$, $\\omega_2$ are the resonance frequencies of spins in sites A and B in the absence of chemical exchange) and also on the relaxation time scale ($\\Delta \\omega >> \\Delta \\tau$ and $k_e >> \\Delta \\tau$, where $\\Delta \\tau = \\Delta \\tau_{AB} - \\Delta \\tau_{AA}$ and $\\Delta \\tau_{AB}$ are the relaxation rate constants for sites in sites A and B in the absence of chemical exchange and $k_e = k_a + k_b$). Under these circumstances, the relative site populations, $p_A$ and $p_B$ ($p_A + p_B = 1$) satisfy the balance relationship $p_Ak_A = p_Bk_B$. If $p_A >> p_B$ (or $p_B >> p_A$), the transverse relaxation rate constant $R_2$ of the population–averaged resonance line is given by Equation (1) where $R_2^2 = R_2^2A + R_2^2B$. The position of the observed spectral line is given by Equation (2)\n\n$$R_2 = R_2^2A + p_AR_2^2A\\Delta \\omega_0^2/k_{ex}$$\n\n$$\\Omega = p_AR_2B + p_BR_2B$$\n\n(1)\n\n(2)\n\nBased on the measured values of $\\Omega_2$, $\\Delta \\omega_0$, $\\Omega_3$, $R_2A$, and $R_2B$ values of $p_A$ and $k_{ex}$ were calculated using Equations (1) and (2).\n\nRESULTS AND DISCUSSION\n\nAlternative Pure-Shift Arrangements. In a pure-shift method designed for reaction monitoring, the r.f. carrier is placed on the chemical shift of a selected nucleus. This arrangement ultimately produces an exponential free induction decay (FID) with zero chemical shift modulation. Under these circumstances, 180° pulses can be repeatedly applied to the active spin. The effective $\\theta/180^\\circ$ rotation of the detected/coupled protons, which is at the heart of broadband decoupling of selected signals during indirect$^{19}$F or direct$^{19}$F acquisition periods, can thus be replaced with a $180^\\circ/\\alpha^\\circ$ element, maintaining all the attributes of a pure shift methodology while realizing additional benefits.\nIn its basic form, the outlined pure-shift real-time experiment removes all heteronuclear couplings of an isolated nucleus, e.g. a $^{19}$F in a fluorinated organic molecule – a motif common in contemporary medicinal chemistry. The experiment", "num_tokens": 2048} {"category": "olmocr_science_pdfs-science_math_and_technology-part2", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-science_math_and_technology-part2/part-00-00000.npy", "text": " spines (figs. 10, 11, 12, q). Besides double tentacle hooks, there are others that are simple, and, from the grain on which they are mounted as a base, may be termed grain hooks. Those that first appear are simple spicules, bent or straight, standing on the side arm plates, above the tentacle hooks (figs. 8, 9). Then a granule is formed under them (fig. 13). More of such hooks grow on the grains or little swollen plates which occupy the position of upper arm plates among Ophiurans (fig. 10). Later there remain on the side arm plate only the true tentacle hooks, while the grain hooks stand on those double rows of raised grains which give the ringed or burr look to the small branches of Astrophytons (Pl. XXXV. fig. 19). As they approach the disk and thicker part of the arm these raised rows sink and their hooks disappear, and a coarse granulation overgrows the first layer of swelled plates, so that the surface of the arm becomes even. The side arm plates which began as ridges encircling the whole arm change their character rapidly. In the central depression between them, on the upper side of arm, a little upper arm plate begins to form (Pl. XXXVI. fig. 5), like a perforated lime crust. Then, as the arm enlarges, the side plates separate above, and between them are formed additional scales, which occupy the position of upper arm plates, but follow no rule in their growth (fig. 7). They do not even multiply by the irregular method of *Hemieuryale pustulata.* These scales, at first thin (figs. 7, 15), afterwards thicken and become more rounded (figs. 10, 11), and some of them make the basis of the two annular rings of grains carrying the grain hooks, which afterwards drop off, so that at the base of an arm there appear (in a dry specimen) only the thickened skin, with a granular coat and a few irregular plates above the side arm plates. These last, early separated above (figs. 7, 13), maintain their union underneath (figs. 6, 12, 16, 17, 19, i). It follows that the growing arm rises more and more above them. They retain their simple form almost throughout, but, within the disk, in fully grown specimens they are broken in two (fig. 19, i). The under arm plates first appear about two forks from the tip of the arm; not, however, simple, but divided in three parts (fig. 12, h), which may still be seen inside the disk of young specimens (fig. 17, h, h). In adults these plates, at the third fork of the arm, are in four triangular pieces, making together an oblong figure. Within the disk the number of pieces is considerable and their form irregular (fig. 19). In this respect there is a marked difference from Ophiurans, whose upper arm plates may be composed of several pieces developed under certain rules, but whose side and under plates are almost always simple, rarely of two pieces, and in one species only (*Ophiomyxa pentagona*) of three pieces.\n\n2 Lütken's figures indicate that the young of *Gorgonocephalus cucematus* has the under arm plate not divided (Addit. ad Hist. Oph., vol. i., pl. ii. figs. 17b and 17d).\nThe skeleton of a *Gorgonocephalus* does not differ more from that of an ordinary Ophiuran than those of Ophiurans differ among themselves. All the mouth parts are present (figs. 18, 19); mouth frames (*f*), jaws (*c*), jaw plate (*e*), sockets for two sets of tentacles (*r, r'*), and a large peristomial plate (*v*) in two pieces. There is, in addition, a small angle cover (*v'*), which is strongly developed in most Astrophytous, and which Ludwig considers the first under arm plate. The radial shield, genital plate (*o*), and genital scale (fig. 17, *n*) occupy normal positions. In regard to the radial shields, this peculiarity is to be remarked, that they are made up of a series of plates soldered one on the other like tiles. This structure calls attention to the fact that radial shields, which, from their almost constant presence, and their articulation with the genital plate, are usually considered exceptional parts, are truly nothing more than a disk scale, or a series of soldered disk scales. Hinged to the genital plates they regulate the position of the roof of the disk as it is raised or lowered. Moreover, the genital plates themselves, with their genital scales, are nothing more than highly specialised scales of the lower interbrachial space, folded in, and bounding the genital openings on either side. In some genera (*e.g.*, *Ophiomusium*) the genital plate is externally conspicuous as one of the chief pieces of the lower interbrachial space. The arm bones do not essentially differ from those of Ophiurans, except that their joints are simplified so as to be adapted to rolling in a vertical plane. The outer face has the usual transverse hour-glass projection, which is vertical on the inner face.\n\nPassing now to *Euryale*, striking variations present themselves. The proportions and arrangement of the mouth differ much from those of *Gorgonocephalus*. Two large, flattened jaws (Pl. XXXV. fig. 1, *c*) support a small jaw plate (*e*), which carries, not the usual bunch of spines, but a vertical row of flat teeth (*d'*) like those of Ophiurans, or those of *Astroschema*. Seen from above, the jaws (*e*) and mouth frames (*f*) are much more solid than in *Gorgonocephalus*, and the peristomial plate (*v*), instead of being flat and divided, is much swollen and single. While *Gorgonocephalus* has the under arm plates in three pieces at the tip of the arm, and existing at its base only as irregular, broken scales, *Euryale* has them nearly or quite unbroken (figs. 1, 6, *h*) and of a regular form for the whole length of the arm except the terminal twigs. It is at the end of the arm that there is a remarkable difference in the side plates of the two genera. *Gorgonocephalus* has small thick plates clinging close to the arm, while *Euryale* is furnished with long, finger-like projections standing free and bearing prehensile hooks (figs. 8–12).\n\nA side arm plate of the same general character may be found at the tip of the arm of *Ophiiothrix pusilla*. Passing towards the disk, these plates grow shorter and wider, and their hooks thicken into club spines (figs. 8, 9, *i, j*). Still further inward the side plates are nearly like those of Ophiurans, and carry little conical tentacle scales (or arm spines) on\n\n---\n\nThe exterior double rows of hook-bearing grains, found in *Astrophyton, Gorgonocephalus, Astroclon, Astrocnida, Astroporpa, Astrogomphus, Astrochele, and Astrotoma* do not exist at all in this genus, which agrees in this respect with *Trichaster, Astroceras, Astroschema, Ophiocreas*, and *Astronyx*. The chief bracing pieces, namely, radial shield and genital plate, are stout and firmly hinged, and the former (fig. 3, 1), instead of being composed of united overlapping scales, is solid; while the latter (α) is firmly bedded in a series of soldered plates, which connect it with the side arm plates (i). Attached to the articulation is a short, very stout, genital scale (α). The arm bones are lower and wider than among kindred genera, but are jointed in the usual way; that is to say, the inner face presents a vertical prominence constricted in the middle (fig. 14, β), while the outer face has a similar but horizontal prominence (fig. 13, γ), and the two, held together by muscles and skin, make a free-playing joint. At each forking of the arm a curious modification takes place. The bone, while retaining its general form, is much widened and is split vertically almost in two (fig. 16); on the inner face of each half is a vertical hour-glass prominence (β), and the outer face of the arm bone next within is suitably modified (fig. 15) by being much widened, and by having, at its constricted part, an articulating peg, or wedge, which fits into the hollow between the two vertical hour-glasses just described. At the joint outside these, the forking is perfect, and each prong has an arm bone of nearly the normal shape.\n\n**Table of Species of *Astrophyton*.**\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
DescriptionSpecies
Disk with very high radial shields bearing a few stout stumps, coveredAstrophyton costatum.\n
AnimalAdductors
PacaThree strongly developed adductors.
HareTwo feeble adductors.
BeaverOne very weak adductor (with traces of a second).
BathyergusNone.
Cape Mouse
\n\n### Dorsal layer.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
AnimalMembers of this group
PacaFour members of this group (two very weak).
BeaverFour members of this group (one very weak).
HareNone.
Bathyergus
Cape Mouse
\n\n### Intermediate layer.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
AnimalMembers of this group
BathyergusFive members of this group.
Paca
HareFour members of this group.
BeaverThree members of this group (with traces of two others).
\n\nFurther, according to St. George Mivart and Murie,¹ we may class with the Bathy-\n\nergus and Cape Mouse the Crested Agouti and the Guinea Pig, in both of which flexores breves are alone developed.\n\nCheiroptera.\n\nPteropus (Fox-bat), (Pl. XI. figs. 1 and 2).\n\nThe foot of the Fox-bat is pentadactylous—the four outer toes being of nearly equal length, and the hallux slightly smaller. All the digits are armed with sharp curved claws. The intrinsic muscles are well marked, but the dorsal or abducting members of the group, with one exception, are absent. They are all placed upon the plantar aspect of the metatarsus, and are all but invisible from the dorsal aspect of the foot.\n\nPlantar layer.—Only two muscles of this layer are represented, viz.:\n\n1. Adductor hallucis (p¹).\n2. Adductor minimi digiti (p²).\n\nThese muscles together form a thin triangular sheet of muscular fibres spread out upon the flexores breves, but separated from them by the deep division of the external plantar nerve (d.d). This muscular sheet arises by its apex from the plantar surface of the tarsus somewhat nearer the inner than the outer margin of the foot, and it is mapped out into the two adducting muscles by a distinct fibrous raphe which extends from the apex to the base. The distal end of the raphe is not attached, and ends close to the inner side of the root of the medius. The adductor minimi digiti is much the larger of the two muscles, and is inserted into the inner sesamoid at the base of the first phalanx of the minimus. The adductor hallucis, small in proportion to the preceding, is inserted into the outer sesamoid at the base of the first phalanx of the hallux.\n\nIntermediate layer.—This layer is typically complete (f¹ to f⁵). A flexor brevis is provided for each digit; each muscle consists of two heads, and these are separate throughout their entire length. This group therefore is composed of eight distinct muscular slips, all of which lie upon the same plane. They arise from the fibrous textures at the base of the metatarsus and are inserted into the sesamoid bones alone.\n\nThe outer head of the flexor brevis minimi digiti, and the inner head of the flexor brevis hallucis, are considerably larger than the others. This increase in bulk may be due to their having coalesced with the absent abductor minimi digiti, and abductor hallucis.\n\nDorsal layer.—The only member of this layer which is present is the abductor ossis metatarsi minimi digiti (d⁵). It is well developed, and has the usual connections. Not a trace of the dorsal interossei is to be found.\n\nNervous arrangements.—The posterior tibial nerve divides into its two terminal branches in the hollow of the os calcis.\nThe internal plantar nerve (i.p.n) on entering the sole at once breaks up into four\ndigital branches:—These are distributed as follows:—(1) the innermost goes to the inner\nside of the hallux and gives three minute twigs to the large inner head of the flexor brevis\nhallucis; (2) the next divides to supply the adjoining margins of the hallux and index,\nand gives a muscular twig to the first lumbral; (3) the third bifurcates and supplies\nthe adjacent borders of the index and medius, and furnishes a filament to the second\nlumbral; (4) the fourth in like manner supplies the contiguous sides of the medius and\nannularis, and gives a twig to the third lumbral. From the trunk of the internal\nplantar, before it breaks up into its digital branches, a few filaments are furnished to\nthe flexor brevis digitorum.\n\nThe external plantar nerve (e.p.n) turns outwards under cover of the flexor brevis\ndigitorum, and after supplying the abductor ossis metatarsi minimi digiti with one or\ntwo twigs divides into its superficial and deep divisions. The superficial part ends in\ntwo digital branches, of", "num_tokens": 2048} {"category": "olmocr_science_pdfs-science_math_and_technology-part2", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-science_math_and_technology-part2/part-00-00000.npy", "text": " upland movement habitat and 6,783 acres of overwintering habitat.\n\nActivities under the conservation strategy that require ground or vegetation disturbance could result in adverse effects on this species. In addition to management activities under the conservation strategy, the Neighboring Land Owner Program provides take coverage for giant garter snake on private lands adjacent to reserve system lands as discussed above and in Section 2.3.2, Alternative B—Proposed Action Alternative (Permit Issuance/Plan Implementation).\n\nProjects and activities under the Proposed Action Alternative, including conservation strategy activities that have the potential to result in giant garter snake habitat loss and/or mortality, would be required to implement general project and construction AMMs as discussed above to reduce these effects to the greatest extent practicable. In addition to these general project and construction AMMs, covered activities would be required to implement an AMM specific to the avoidance and minimization of take of giant garter snake. This species specific AMM is shown in Table 2-7 and detailed in Appendix C. This AMM requires avoidance of development in or within 200 feet of aquatic habitat, and if habitat cannot be avoided survey using the USFWS protocol (USFWS 1997), as well as additional measures to encourage giant garter snakes to leave the site on their own accord, and measures to avoid injury or mortality if giant garter snakes are encountered during construction.\n\nThe conservation strategy includes a monitoring and adaptive management component as well as the incorporation of 2,910 acres of giant garter snake habitat on pre-permit reserve lands, and specific biological objectives for the conservation of giant garter snake including; protecting 2,800 acres of rice fields, 1,160 acres of upland habitat, 500 acres of emergent wetland, and 420 acres of lacustrine and riverine suitable habitat for giant garter snake. The conservation strategy also prioritizes the incorporation of lands into the reserve system that are adjacent to existing conservation lands will further limit the effects on the species from habitat fragmentation [See Section 2.3.2, Alternative B—Proposed Action Alternative (Permit Issuance/Plan Implementation)].\n\nAs the result of the conservation strategy, a total of 10,290 acres of giant garter snake would be protected, monitored and adaptively managed. In addition, the connectivity of habitat, as well as monitoring and adaptive management under the conservation strategy would provide additional value beyond the project by project mitigation that would occur under the No Action Alternative.\n\nConservation activities under the Proposed Action Alternative are similar to those that would be required by the permitting process under the No Action Alternative. The conservation strategy is also expected to result in additional benefits to the species above what would likely be required under the No Action Alternative. This would result, in part, through the inclusion of habitat in a reserve system that incorporates and is\nconnected to baseline public and easement lands and is subject to monitoring and adaptive management, which would not be required under the No Action Alternative which does not include one cohesive conservation strategy. In addition, all covered activities would be subject to general and species specific AMMs that would further reduce adverse effects on giant garter snake. However, take granted through the neighboring landowner protection program could reduce the beneficial effects of the conservation strategy.\n\n**NEPA Level of Significance:** As compared to the No Action Alternative, this impact is **beneficial**.\n\n**CEQA Level of Significance:** As compared to Existing Conditions, this impact is **less than significant** as implementation of the conservation strategy results in the minimization of effects on this species and compensation for effects that cannot be fully avoided.\n\n*No mitigation is required.*\n\n**Effect Bio-6: Swainson’s hawk.**\n\nSwainson’s hawk is proposed for coverage under the Yolo HCP/NCCP and is listed as a Bird of Conservation Concern by the USFWS and as threatened under CESA. Swainson’s hawk is a seasonal resident of the Plan Area and is generally present from early March, to occupy previous nesting territories or establish new territories, until October, when young have fledged and fall migration is complete. Nesting habitat is predominately within natural riparian woodlands, though trees may be used in other natural and developed habitat types. Foraging habitat consists of natural grassland and agricultural land types that provide similar low open vegetation and high rodent densities (e.g., alfalfa, dry grain and row crops). A complete description of modeled Swainson’s hawk habitat, a detailed species account, and a list of occurrences in the Plan Area can be found in Appendix D. There are 15,673 acres of nesting habitat, 534 nesting sites, 79,336 acres of natural foraging habitat, and 214,078 acres of cultivated lands foraging habitat in the Plan Area.\n\nActivities under the conservation strategy that require ground or vegetation disturbance could result in adverse effects on this species. Projects and activities under the Proposed Action Alternative, including conservation strategy activities that have the potential to result in Swainson’s hawk habitat loss and/or mortality, would be required to implement general project and construction AMMs (as discussed above in the analysis of the Proposed Action Alternative), to reduce these effects to the greatest extent practicable. In addition to these general project and construction AMMs, covered activities would be required to implement an AMM specific to the avoidance and minimization of take on Swainson’s hawk and white-tailed kite. This species specific AMM is detailed in Appendix C and requires avoidance of nest trees, or implementation of surveys for active nests as outlined by Swainson’s Hawk Technical Advisory Committee (2000) and buffers around active nests. This AMM does allow for the removal of up to 20 nest trees (documented nesting within last 5 years) over the permit term, but not while occupied during the nesting season.\n\nThe conservation strategy includes a monitoring and adaptive management component as well as the incorporation of 4,795 acres of Swainson’s hawk habitat on pre-permit reserve lands, and biological objectives for the conservation of Swainson’s hawk including; maintaining crop types that support Swainson’s hawk habitat within the 14,362 acres of protected agricultural lands, provide 4,430 acres of natural foraging habitat, protect and maintain at least 40 protected nest trees, and maintain a density of one suitable nest tree per 10 acres of agricultural lands in the reserve system. The conservation strategy also prioritizes the incorporation of lands into the reserve system that are adjacent to existing conservation lands, which would further limit the effects on the species from habitat fragmentation [See Section 2.3.2, Alternative B—Proposed Action Alternative (Permit Issuance/Plan Implementation)]. As the result of the conservation strategy, at total of 26,031 acres of Swainson’s hawk habitat would be protected, monitored and adaptively managed.\n\nConservation activities under the Proposed Action Alternative are similar to those that would be required by the permitting process under the No Action Alternative. The conservation strategy is also expected to result in additional benefits to the species above what would likely be required under the No Action Alternative. This would result, in part, through the inclusion of habitat in a reserve system that incorporates and is connected to baseline public and easement lands and is subject to monitoring and adaptive management,\nwhich would not be required under the No Action Alternative which does not include one cohesive conservation strategy. In addition, all covered activities would be subject to general and species specific AMMs that would further reduce adverse effects on Swainson’s hawk.\n\n**NEPA Level of Significance:** As compared to the No Action Alternative, this impact is **beneficial**.\n\n**CEQA Level of Significance:** As compared to Existing Conditions, this impact is **less than significant** as implementation of the conservation strategy results in the minimization of effects on this species and compensation for effects that cannot be fully avoided.\n\n*No mitigation is required.*\n\n**Effect Bio-7: White-tailed kite.**\n\nWhite-tailed kite is proposed for coverage under the Yolo HCP/NCCP and is a California fully protected species and protected under the MBTA. White-tailed kite is a year-round resident of the Plan Area that has similar nesting habitat to that described for Swainson’s hawk though the species exhibits less of a preference for a specific vegetation type. Foraging habitat is also similar to that of Swainson’s hawk, though defined for the purpose of this analysis as more frequently used primary and less frequently used secondary foraging habitat. A complete description of modeled white-tailed kite habitat, a detailed species account, and a list of occurrences in the Plan Area can be found in Appendix D. There are 31,732 acres of nesting habitat, 531 nesting sites, 101,758 acres of primary foraging habitat, and 134,740 acres of secondary foraging habitat in the Plan Area.\n\nActivities under the conservation strategy that require ground or vegetation disturbance could result in adverse effects on this species. Projects and activities under the Proposed Action Alternative, including conservation strategy activities that have the potential to result in white-tailed kite habitat loss and/or mortality would be required to implement general project and construction AMMs and the same species specific AMMs as discussed above for Swainson’s hawk.\n\nThe conservation strategy includes a monitoring and adaptive management component as well as the incorporation of 3,545 acres of white-tailed kite habitat on pre-permit reserve lands. There are no specific biological objectives for the conservation of white-tailed kite, though the natural community objectives related to its habitat provide conservation for the species. The conservation strategy also prioritizes the incorporation of lands into the reserve system that are adjacent to existing conservation lands will further limit the effects on the species from habitat fragmentation", "num_tokens": 2048} {"category": "olmocr_science_pdfs-science_math_and_technology-part2", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-science_math_and_technology-part2/part-00-00000.npy", "text": "/[T, T] \\cong C_2 \\times C_4$ by the above description of $T/E$ (where $E \\leq [T, T]$), $\\text{Aut}(T)$ and hence $\\text{Out}_\\text{typ}(L)$ are 2-groups. So each automorphism of the amalgam $H > T < N$ determines a larger amalgam. Since the only extension of this amalgam is to that of $^2F_4(2)$ by [Fn, Theorem 1], $|\\text{Out}_\\text{typ}(L)| = 2$. □\n5. The cross characteristic case: I\n\nThroughout this section, we will work with groups \\( G = C_G(\\sigma) \\) which satisfy the conditions in Hypotheses 5.1 below. In particular, 5.1(1) implies that \\( G \\) is not a Suzuki or Ree group. We will see in Section 6 (Proposition 6.8) that while these hypotheses are far from including all finite Chevalley and Steinberg groups, their fusion systems at the prime \\( p \\) do include almost all of those we need to consider.\n\nFor any finite abelian group \\( B \\), we denote its “scalar automorphisms” by\n\\[\n\\psi^B_k \\in \\text{Aut}(B), \\quad \\psi^B_k(g) = g^k \\quad \\text{for all } k \\text{ such that } (k, |B|) = 1\n\\]\nand define the group of its scalar automorphisms\n\\[\n\\text{Aut}_{sc}(B) = \\{ \\psi^B_k \\mid (k, |B|) = 1 \\} \\leq Z(\\text{Aut}(B)).\n\\]\n\n**Hypotheses 5.1.** Assume we are in the situation of Notation 2.2(A,B,C).\n\n(I) Let \\( p \\) be a prime distinct from \\( q_0 \\) such that \\( p | W_0 | \\). Assume also that \\( \\sigma = \\psi_q \\circ \\gamma = \\gamma \\circ \\psi_q \\in \\text{End}(\\overline{G}) \\), where\n\n- \\( q \\) is a power of the prime \\( q_0 \\);\n- \\( \\psi_q \\in K_G \\) is the field automorphism (see Definition 3.1(a)); and\n- \\( \\gamma \\in \\text{Aut}(\\overline{G}) \\) is an algebraic automorphism of finite order which sends \\( \\overline{T} \\) to itself and commutes with \\( \\psi_{q_0} \\) (so that \\( \\psi_{q_0}(G) = G \\)).\n\nAlso, there is a free (\\( \\tau \\))-orbit of the form \\( \\{\\alpha_1, \\alpha_2, \\ldots, \\alpha_s\\} \\) or \\( \\{\\pm \\alpha_1, \\pm \\alpha_2, \\ldots, \\pm \\alpha_s\\} \\) in \\( \\Sigma \\) such that the set \\( \\{\\alpha_1, \\alpha_2, \\ldots, \\alpha_s\\} \\) is linearly independent in \\( V \\).\n\n(II) The algebraic group \\( \\overline{G} \\) is of universal type, and \\( N_G(T) \\) contains a Sylow \\( p \\)-subgroup of \\( G \\).\n\n(III) Set \\( A = O_p(T) \\). Assume one of the following holds: either\n\n(III.1) \\( q \\equiv 1 \\pmod{p} \\), \\( q \\equiv 1 \\pmod{4} \\) if \\( p = 2 \\), \\( |\\gamma| \\leq 2 \\), and \\( \\gamma \\in \\Gamma_{\\overline{G}} \\) (thus \\( \\rho(\\Pi) = \\Pi \\)); or\n\n(III.2) \\( p \\) is odd, \\( q \\equiv -1 \\pmod{p} \\), \\( G \\) is a Chevalley group (i.e., \\( \\gamma \\in \\text{Inn}(\\overline{G}) \\)), and \\( \\gamma(t) = t^{-1} \\) for each \\( t \\in \\overline{T} \\); or\n\n(III.3) \\( p \\) is odd, \\( |\\tau| = \\text{ord}_p(q) \\geq 2 \\), \\( C_A(O_{p'}(W_0)) = 1 \\), \\( C_S(\\Omega_1(A)) = A \\), \\( \\text{Aut}_G(A) = \\text{Aut}_{W_0}(A) \\),\n\n\\[\nN_{\\text{Aut}(A)}(\\text{Aut}_{W_0}(A)) \\leq \\text{Aut}_{sc}(A) \\text{Aut}_{\\text{Aut}(G)}(A)\n\\]\n\nwhere \\( \\text{Aut}_{\\text{Aut}(G)}(A) = \\{ \\delta | A \\mid \\delta \\in \\text{Aut}(G), \\delta(A) = A \\} \\), and\n\n\\[\n\\text{Aut}_{W_0}(A) \\cap \\text{Aut}_{sc}(A) \\leq \\begin{cases} \n\\langle \\gamma | A \\rangle & \\text{if } 2 | \\text{ord}_p(q) \\text{ or } -\\text{Id} \\notin W \\\\\n\\langle \\gamma | A, \\psi_{\\overline{A}} \\rangle & \\text{otherwise},\n\\end{cases}\n\\]\n\nSince \\( W_0 \\) acts on \\( T \\) by Lemma 2.3, it also acts on \\( A = O_p(T) \\).\n\nWe will see in Lemma 5.3 that the conditions \\( C_S(\\Omega_1(A)) = A \\) (or \\( C_S(A) = A \\) when \\( p = 2 \\)) and \\( \\text{Aut}_G(A) = \\text{Aut}_{W_0}(A) \\), both assumed here in (III.3), also hold in cases (III.1) and (III.2).\n\nRecall, in the situation of (III.3), that \\( |\\tau| = |\\gamma|_{\\overline{\\gamma}} \\) by Lemma 3.2.\n\nNote that the above hypotheses eliminate the possibility that \\( G \\) be a Suzuki or Ree group. Since we always assume the Sylow \\( p \\)-subgroups are nonabelian, the only such case which\nneeds to be considered here (when \\( q_0 \\neq p \\)) is that of \\( {}^2F_4(q) \\) when \\( p = 3 \\), and this will be handled separately.\n\nBy Lemma 3.2, whenever \\( \\sigma = \\psi_q \\circ \\gamma \\), and \\( \\gamma \\) is an algebraic automorphism of \\( \\bar{G} \\) which normalizes \\( \\bar{T} \\), there is \\( \\tau \\in \\text{Aut}(V) \\) such that \\( \\tau(\\Sigma) = \\Sigma \\) and \\( \\sigma(\\bar{X}_\\alpha) = \\bar{X}_{\\tau(\\alpha)} \\) for each \\( \\alpha \\in \\Sigma \\). So under Hypotheses 5.1, the condition at the beginning of Notation 2.2(C) holds automatically, and with \\( \\rho = \\tau|_\\Sigma \\). To simplify the notation, throughout this section and the next, we write \\( \\tau = \\rho \\) to denote this induced permutation of \\( \\Sigma \\).\n\nThe following notation will be used throughout this section, in addition to that in Notation 2.2. Note that \\( \\hat{\\Pi} \\) and \\( \\hat{\\Sigma} \\) are defined in Notation 2.2(C) only when \\( \\rho(\\Pi) = \\Pi \\), and hence only in case (III.1) of Hypotheses 5.1. It will be convenient, in some of the proofs in this section, to extend this definition to case (III.2).\n\nRecall (Notation 2.2) that for \\( \\alpha \\in \\Sigma \\), \\( w_\\alpha \\in W \\) denotes the reflection in the hyperplane \\( \\alpha^\\perp \\subseteq V \\).\n\n**Notation 5.2.** Assume we are in the situation of Notation 2.2 and Hypotheses 5.1.\n\n(D) If (III.2) holds, then set \\( \\hat{\\Sigma} = \\Sigma \\), \\( \\hat{\\Pi} = \\Pi \\), and \\( V_0 = V \\). Note that \\( W_0 = W \\) in this case.\n\n(E) If (III.1) holds, then for each \\( \\hat{\\alpha} \\in \\hat{\\Sigma} \\), let \\( w_{\\hat{\\alpha}} \\in W_0 \\) be the element in \\( \\langle w_\\alpha \\mid \\alpha \\in \\hat{\\alpha} \\rangle \\) which acts on \\( V_0 \\) as the reflection across the hyperplane \\( \\langle \\hat{\\alpha} \\rangle^\\perp \\), and which exchanges the positive and negative roots in the set \\( \\langle \\hat{\\alpha} \\", "num_tokens": 2048} {"category": "olmocr_science_pdfs-science_math_and_technology-part2", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-science_math_and_technology-part2/part-00-00000.npy", "text": " supersonic flow and high speed Schlieren photographs were taken. These photographs revealed a highly unstable shock pattern ahead of the canopy. Similar tests of flexible models showed irregular oscillation, structural instability, and eventual destruction of the canopy.\n\nThe analysis of the conventional parachute in supersonic flow, and the subsequent development and testing of a supersonic retardation device proceed in the following phases:\n\n1) Pressure distribution studies on conventional canopy in supersonic flow\n\n2) Water analogy studies in conventional water tow\n\n3) Water analogy studies in water table with stationary models\n\n4) Wind tunnel stability studies of supersonic parachutes\n\n5) Drag studies of supersonic parachutes.\n\nThese phases will be reported in respective order in the following sections of this report.\n5.2 Pressure Distribution Studies in Supersonic Wind Tunnel\n\n5.2.1 As a first step in the analysis of conventional parachutes, the pressure distribution on both the inside and outside surfaces of a conventional ribbon parachute model suspended in the wake of an ogive cylinder forebody was studied. Model geometry, test arrangement, and pressure distribution for Mach numbers of 0.8, 1.2, and 4.5 were presented in Progress Report No 12. Pressure distributions for Mach 3.0 were given in Progress Report No 15.\n\n5.2.2 During this reporting period, tests were made to determine the influence of the ogive-cylinder forebody on the internal and external pressure distributions on the canopy at Mach numbers of 1.08 and 3.0. These tests were made with and without suspension lines, in order to determine their effect on pressure distribution. Previously, the transonic tests were made at Mach 1.2; however, in the wind tunnel now being used, the highest attainable Mach number with the model mounted in the test section was Mach 1.08. Therefore, the transonic studies were continued at this Mach number.\n\n5.2.3 The parachute models and testing procedure were the same as in previous studies. As before, two secondary parachute models were used, one to measure internal and the other to measure external pressures. The suspension lines for these tests were secured at the confluence point by a set of guy wires fastened to the tunnel walls (see Fig 7-1). The pressures were measured on a multiple manometer and photographed during each test. Three tests were conducted for each configuration at both Mach numbers.\n\n5.2.4 Results\n5.2.4.1 The pressure measurements from three internal and three external pressure distribution tests were averaged in each case. These measurements were then reduced to coefficient form with the pressure coefficient, \\( C_p \\), defined as\n\n\\[\nC_p = \\frac{P_L - P_s}{q},\n\\]\n\nwhere\n\n- \\( P_L \\) = local pressure on the surface of the model\n- \\( P_s \\) = free stream static pressure\n- \\( q \\) = free stream dynamic pressure.\n\n5.2.4.2 Figures 7-2 and 7-3 present the pressure coefficient distribution of the parachute model in free stream with and without suspension lines, respectively, at transonic Mach numbers. For comparison, Fig 7-4 presents these two sets of curves together with the pressure distribution of the model with suspension lines behind an ogive-cylinder forebody (previously presented as Fig 7-11, Progress Report No 12). Similarly, Figs 7-5 through 7-7 present the same sequence of pressure coefficient distributions at Mach 3.0. It is seen that the forebody has only a small influence on either the internal or external pressure coefficient at Mach 1.08 and 3.0. The suspension lines do have noticeable influence on the magnitude of the internal pressure coefficient, especially at Mach 3.0. This increase in internal pressure coefficient is due to the large pressure recovery across the well defined shock ahead of the canopy without suspension lines (see Sec 5.2.4.3). The suspension lines do not noticeably influence the external pressure coefficient at either Mach number.\nFigures 7-8 and 7-9 are double exposure shadowgraphs of the flow pattern at Mach 3.0 about a parachute model in free stream with and without suspension lines, respectively. It is seen that apparently the suspension lines cause a highly irregular shock pattern ahead of the canopy. In tests without suspension lines, a stable detached shock wave pattern is formed. However, this contradicts previous experience, and efforts are now being made to explain this contradiction, as outlined in Sec 5.2.5.1 below.\n\nProposed Work\n\nThe pressure distribution studies as specified in the present contract have been completed. However, during the next reporting period, additional wind tunnel tests of several canopies with varying porosities and different methods of mounting will be made to determine the factors which influence the character of the shock wave ahead of the canopy without suspension lines. These tests will be conducted at Mach numbers of 2.0 and 3.0.\n\nDuring the next reporting period, work will begin on the writing of a final report for this phase of the project.\n\nWater Tow Studies\n\nAs a second phase of the investigation, a series of two-dimensional water analogy studies have been made to visualize flow patterns within the canopy. These studies were applied first to the analysis of the instability of conventional parachutes, reported in Progress Report No 12, and later to stability studies of various configurations of the so-called spiked parachute, reported in the Supplement to Progress Report No 13.\n5.3.2 During this reporting period, a series of tests was performed at Mach 2.0 with the spiked parachute behind an ogive-cylinder forebody with a caliber of 2.5. Tests were run at L/D ratios of 4.5 and 8. The ratio of the parachute model maximum diameter to the forebody diameter was 2.\n\n5.3.3 Results\n\nFigures 7-10 and 7-11 show the flow pattern about the spiked parachute behind the forebody (see Progress Report No 15, Fig 7-5, for identification of parameters). For comparison, Fig 7-12 shows the flow pattern about the model in free stream at Mach 2.0. It is seen that the flow patterns are somewhat less defined for the parachute in the wake of the forebody but similar in nature. The stability seems to be unaffected.\n\n5.3.4 Proposed Work\n\nWater analogy experiments will be continued in close coordination with supersonic wind tunnel tests of the spiked parachute. Making use of existing property analogies (derived in Progress Report No 1), attempts will be made to determine pressure distribution and relative drag of retardation devices in the water tow tank.\n\n5.4 Stationary Model Water Analogy Studies\n\n5.4.1 The advantages of complementing the conventional water tow experiments with studies in a moving water channel were enumerated in Progress Report No 15. Desirable features for the projected facility were indicated and the detail design was begun.\n\n5.4.2 During this reporting period, the design of the main component\nparts of the new water channel, including the structural framework and the water ducting and reservoir, was completed. Bids for the construction of these parts were received from local machine shops, but acceptance of a bid was delayed because of the termination of the present contract. Upon authorization in the new contract, a bid will be accepted.\n\n5.4.3 A Description of the New Water Channel\n\n5.4.3.1 Figure 7-13 is a general assembly drawing of the proposed facility, and shows the main features and dimensions. The main components will be described in the following paragraphs of this report.\n\n5.4.3.2 Main Channel and Supporting Structure\n\nThe rectangular channel is approximately 20 ft long, 52 inches wide, and 5 inches deep. The channel floor consists of one piece of high grade, mirror finish plate glass 15 ft long and 3/4 inch thick. The glass rests on plexiglass support pads mounted on adjustable swivel screws used for fine adjustment in levelling the surface of the glass.\n\nThe vertical side walls of the channel are made of 6 x 3 1/2 x 3/8 inch right angle structural steel attached to the top chord of the supporting structure. The channel is supported by two parallel steel trusses 2 ft deep; its top chords consist of 4 x 2 1/4 inch steel channel sections running the entire length of the structure. The lower chord is made 4 ft shorter at the downstream end of the channel to provide space for the pump and motor drive. At 2 1/2 ft intervals, there are cross ties joining the two top and the two bottom chords. The swivel screws and plastic pads\nwhich support the glass floor of the channel are screwed at intervals into the ties between the top chords. Ties at the lower panel joints support the water supply pipe and ducting. Horizontal diagonal bracing members were avoided in order to have large, unobstructed panels directly beneath the glass floor for photographic purposes.\n\n5.4.3.3 Channel Tilting Mechanism\n\nA uniform slope of the channel is necessary to secure uniform flow velocity. This slope must be adjustable in order to attain the water flow velocity representing a certain Mach number. Variation of the longitudinal slope of the channel is provided by means of the tilting mechanism illustrated in Fig 7-13. At the downstream end of the lower chord, the trusses are mounted on hinge pins. Near the upstream end of the channel, a 1 inch diameter bar is welded transversely to the bottom of the upper chord members. This bar will be carried by two hydraulic rams, one on each side. The hydraulic rams are connected to a hand operated hydraulic pump by means of flexible pressure tubing and shut-off valves. The hydraulic rams have", "num_tokens": 2048} {"category": "olmocr_science_pdfs-science_math_and_technology-part2", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-science_math_and_technology-part2/part-00-00000.npy", "text": "\n\nDivision of Cancer Science and Molecular Pathology, Glasgow University, Western Infirmary (Pathology), Dumbarton Road, Glasgow G11 6NT, U.K.\n\nAbstract\n\nMammalian erythrocytes are generally thought to lack RNA and therefore to be unable to translate new proteins in response to internal or external signals. Support for this long-standing view has accumulated from diverse studies, most of which have focused on the total content of RNA or the overall level of translation. However, more recent work on specific types of RNA has shown the presence in human erythrocytes of both Y RNA and microRNA. The latter seem particularly incongruous given that their normal role is to attenuate the translation of mRNA. Y RNA binds the Ro autoantigen which may have a role in cellular RNA quality control. Therefore the presence of both of these non-coding RNAs indicates the possible existence of other cryptic RNAs in erythrocytes. It also suggests either the existence of low levels of translation or new uncharacterized processes involving microRNA in these cells.\n\nErythrocyte biology\n\nVast numbers (~2–3×10¹³) of erythrocytes circulate in the peripheral blood of an adult human and are essential for efficient gas exchange and transport throughout the body. Erythrocytes have evolved a highly specialized physiology, shape and structure for this crucial role: in the course of their development, mammalian erythroid cells eliminate most of the major structures normally present in eukaryotic cells, including nuclei, mitochondria, Golgi and endoplasmic reticulum. These changes are a vital part of a developmental programme that improves efficiency of gas exchange, increases the flexibility of the erythrocyte allowing easier passage through narrow vessels and reduces the effort required of the heart to pump the cells around the body [1]. However, the losses, particularly of the nucleus, also prevent erythrocytes from responding to internal and external cues by altering gene transcription and mRNA abundance. Once the nucleus is lost at the orthochromatic erythroblast–reticulocyte transition, no more RNA is synthesized, and any further regulation of gene expression is necessarily post-transcriptional.\n\nIn humans, reticulocytes are shed from bone marrow into the bloodstream and then over the next 1–2 days they mature to erythrocytes, during which time haemoglobin content increases, but both translational capacity and RNA content declines. Mature erythrocytes can be easily distinguished from their immediate reticulocyte progenitors by supravital staining with reagents such as New Methylene Blue. Reticulocytes exhibit pronounced staining of the eponymous reticulin which is thought to be a lattice of translating ribosomes in the final throes of haemoglobin production. Mature erythrocytes do not bind the dyes, hence a lack of detectable RNA is a defining feature of the mature erythrocyte. Microphotometry of mature erythrocytes after Azure B staining indicated no RNA present in mature rabbit erythrocytes [2], and measurements of RNA content during in vitro maturation of Friend leukaemia virus-transformed murine reticulocytes to erythrocytes showed the amount apparently asymptotically approaching zero by the end of the maturation period [3]. However, although mature rabbit reticulocytes indeed have diminished numbers of ribosomes compared with immature stages, a significant number were still readily observed by EM (electron microscopy) [4], suggesting that some may be retained in the mature erythrocyte stage that immediately follows. Larger structures such as mitochondria are clearly absent from erythrocytes, but the loss of these during erythropoiesis seems to be mechanistically unrelated to the loss of RNA [5]. For example, inhibitors of autophagy which prevent mitochondrial elimination do not affect the loss of RNA from developing reticulocytes [6]. The cell-wide RNA-destruction programme is probably carried out by ribonucleases such as that described from rabbit reticulocytes, which is active on rRNA, tRNA and probably mRNA [7,8]. However, it is not known how many ribonucleases participate or how selective they are in their substrate choice. Neither is it known whether all RNAs are degraded at equal or different rates or to the same or different extents. The meagre literature on this subject suggests that RNA disposal during erythropoiesis has received little attention, even though adequate destruction of RNA is thought to be important for red cell function (to recycle adenine nucleosides for ATP replenishment [9]).\n\nmiRNA (microRNA) in erythrocytes\n\nGiven the widely held view that erythrocytes have no significant RNA content, it comes as something of a surprise to find that erythrocytes maintain plentiful amounts of miRNA [10,11]. Both studies identified abundant miRNA...\nmiRNAs are the best characterized class of several, novel, small (20–30 nt in length) RNAs that have been discovered within the last few years. Over 1000 different miRNAs are transcribed from the human genome and they exhibit widely varying patterns of expression and degrees of abundance. Their function is to regulate gene expression primarily by inhibiting the translation of mRNA [12,13], but translational promotion has also been reported [14]. Targeting the correct mRNA involves initial complementary Watson–Crick base-pairing between the mRNA and the miRNA. miRNAs accomplish this in partnership with a protein of the Argonaute family in an RNP (ribonucleoprotein) complex known as RISC (RNA-induced silencing complex) [15]. Thus the existence of miRNA in erythrocytes is surprising not only because of their presence, but also because the raison d’être of miRNA in other cells is to regulate gene expression through effects on mRNA translation, and this has long been thought to be absent from erythrocytes.\n\nOther RNAs in erythrocytes\n\nmiRNAs are not, in fact, the first RNAs to have been found in erythrocytes. tRNA was reported to be present in mature erythrocytes [16], but the method by which reticulocytes were excluded as a possible alternative source of the RNA was not detailed. More convincingly, the small RNA polymerase III-transcribed transcripts Y1 and Y4 were shown to be present in mature erythrocytes [17]; density gradient depletion of reticulocytes from peripheral blood did not significantly diminish levels of these RNAs and neither were their levels altered much in blood samples exhibiting reticulocytosis. Therefore the authors concluded that significant amounts of the RNA must be present in mature erythrocytes. The absence of Y3 and Y5 RNA, which are normally present with Y1 and Y4 in nucleated cells, again illustrates how the loss of RNA during erythropoiesis is selective rather than wholesale and is more consistent with there being a reason for the maintenance of certain RNAs within erythrocytes than it being coincidence. Recent studies of Ro RNPs suggest that they function in the maintenance of integrity of other RNAs [18]. Therefore an obvious inference from the presence of Ro RNP in erythrocytes is that other RNAs exist in these cells whose integrity is important. The miRNAs described above are obvious candidates, but small amounts of rRNA and mRNA might benefit from protection and/or surveillance in the pro-oxidative environment of the erythrocyte.\n\nPossible reasons for miRNA in erythrocytes\n\nChen et al. [10] showed that the miRNA pattern in human reticulocytes was very distinct from that in mature erythrocytes. Our own studies suggest the concentration of miRNA in erythrocytes is similar to that in nucleated cells and that the miRNAs are part of an active miRNP (miRNA-containing RNP) with Argonaute proteins (R. Lu and A.J. Hamilton, unpublished work). The selective retention of a distinct set of active miRNAs is more consistent with their having a function in erythrocytes than them being a random remnant of a general RNA-destruction programme. A direct role for the miRNA in the programmed destruction of RNA during erythropoiesis is unlikely because miRNA-directed cleavage of mRNA only occurs if near-perfect complementarity exists between miRNA and a mRNA [15] and very few human miRNAs have this property. Perhaps the most obvious explanation for the presence of miRNA in erythrocytes would be if these cells did, in fact, contain some translating mRNA upon which miRNPs could exert their acknowledged regulatory effects. However, this contradicts the well-established tenet that translation does not occur in these cells. There is good justification for the latter view. In countless routine clinical analyses on patient blood, erythrocytes fail to bind supravital dyes, a compelling testament to the drastic reduction in overall RNA content in these cells. It is also supported by studies of maturing reticulocytes showing a progressive reduction in RNA content to apparently zero levels [2,3,19]. As well as the evident reduction of RNA content, translational activity, as measured by uptake of radioactive amino acids, is close to zero in erythrocytes [20], and studies of reticulocytes show a decline in the ratio of polyribosomes to monosomes [4,21,22] with increasing maturity. However, the presence of miRNA, Y RNA and possibly tRNA show that the erythrocyte RNA content, although low, is not zero. It is possible then that the early studies might also have missed low levels of translation particularly if it were active only under certain conditions. Rikkind et al. [4], reporting an EM study of mat", "num_tokens": 2048} {"category": "olmocr_science_pdfs-science_math_and_technology-part2", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-science_math_and_technology-part2/part-00-00000.npy", "text": " \\) is complete sufficient for \\( \\theta \\). Consider \\( T = X_{n:n}^2 \\).\n\nObviously, \\( E_\\theta[T] = \\frac{1}{4} \\theta^2 (1 + 1/3n) = r(\\theta) \\). One should verify that \\( E_\\theta[T \\mid X_{n:n}] = \\frac{1}{4} (1 + \\frac{1}{3n})(1 + \\frac{2}{n})X_{n:n}^2 \\). We leave it out as Exercise 7.5.21.\n\nAgain, if one first obtains the conditional pdf of \\( T \\) given \\( X_{n:n} \\) and evaluates \\( E_\\theta[T \\mid X_{n:n}] \\) directly, then one will realize what a clever approach the present one has been. ▲\n\n### 7.6 Unbiased Estimation Under Incompleteness\n\nSuppose that it we start with two statistics \\( T \\) and \\( T' \\), both estimating the same real valued parametric function \\( r(\\theta) \\) unbiasedly. Then, we individually condition \\( T \\) and \\( T' \\) given the sufficient statistic \\( U \\) and come up with the refined Rao-Blackwellized estimators \\( W = E_\\theta[T \\mid U] \\) and \\( W' = E_\\theta[T' \\mid U] \\) respectively.\n\nIt is clear that (i) both \\( W \\) and \\( W' \\) would be unbiased estimators of \\( r(\\theta) \\), (ii) \\( W' \\) will have a smaller variance than that of \\( T \\), and (iii) \\( W' \\) will have a smaller variance than that of \\( T' \\).\n\nAn important question to ask here is this: how will the two variances \\( V_\\theta(W) \\) and \\( V_\\theta(W') \\) stack up against each other?\n\nIf the statistic \\( U \\) happens to be complete, then the Lehmann-Scheffé Theorems will settle this question because \\( W \\) and \\( W' \\) will be identical estimators w.p.1. But if \\( U \\) is not complete, then it may be a different story. We highlight some possibilities by means of examples.\n\n### 7.6.1 Does the Rao-Blackwell Theorem Lead to UMVUE?\n\nSuppose that \\( X_1, \\ldots, X_n \\) are iid \\( N(\\theta, \\theta^2) \\) having the unknown parameter \\( \\theta \\in \\Theta = (0, \\infty), \\chi = (-\\infty, \\infty), n \\geq 2 \\). Of course, \\( \\underline{U} = (\\underline{X}, S^2) \\) is sufficient for \\( \\theta \\) but \\( U \\) is not complete since one can check that \\( E_\\theta[n(n+1)^{-1}\\underline{X}^2 - S^2] = 0 \\) for all \\( \\theta \\in \\Theta \\) and yet \\( n(n+1)^{-1}\\underline{X}^2 - S^2 \\) is not identically zero w.p.1. Now, let us work with \\( T = \\underline{X}, T' = a_n^{-1}S \\) where \\( a_n = \\sqrt{2\\Gamma(\\frac{n}{2})}\\Gamma(\\frac{n+1}{2})/\\sqrt{n-1} \\) and the fact that \\( (2.3.26) \\) it follows that \\( E_\\theta[S] = a_n \\theta \\) and hence \\( T' \\) is unbiased for\n\\( \\theta \\) while obviously so is \\( T \\) itself. Now, \\( \\bar{X}, S^2 \\) are independently distributed and hence we claim the following:\n\n\\[\nE_{\\theta}[\\bar{X} \\mid U] = \\bar{X}, \\quad E_{\\theta}[S \\mid U] = S.\n\\]\n\nThus, the Rao-Blackwellized versions of \\( T \\) and \\( T' \\) are respectively \\( \\bar{X}(= W) \\) and \\( a_n^{-1} S(= W') \\). Clearly \\( W \\) and \\( W' \\) are both unbiased estimators for the unknown parameter \\( \\theta \\). But observe that \\( V_{\\theta}(W) = n \\theta^2 \\) while \\( V_{\\theta}(W') = (a_n^{-2} - 1)\\theta^2 \\). Next, note that \\( \\Gamma(x + 1) = x\\Gamma(x) \\) for \\( x > 0 \\), \\( \\Gamma(\\frac{1}{2}) = \\sqrt{\\pi} \\) and evaluate \\( V_{\\theta}(W') \\). Look at the Table 7.6.1.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
( n )( \\theta^2 V_{\\theta}(W) )Exact ( \\theta^2 V_{\\theta}(W') )Approx. ( \\theta^2 V_{\\theta}(W') )
2.5000((\\pi/2) - 1).5708
3.3333((4/\\pi) - 1).2732
4.2500((3\\pi/8) - 1).1781
5.2000({32/(9\\pi)} - 1).1318
\n\nUpon inspecting the entries in the Table 7.6.1, it becomes apparent that \\( W \\) is better than \\( W' \\) in the case \\( n = 2 \\). But when \\( n = 3, 4, 5 \\), we find that \\( W' \\) is better than \\( W \\).\n\nFor large \\( n \\), however, \\( V_{\\theta}(W') \\) can be approximated. Using (1.6.24) to approximate the ratios of gamma functions, we obtain\n\n\\[\nx^{b-a} \\Gamma(x + a) \\{\\Gamma(x + b)\\}^{-1} = 1 + \\frac{1}{2}(a - b)(a + b - 1)x^{-1} + O(x^{-2}) \\text{ as } x \\to \\infty. \\tag{7.6.1}\n\\]\n\nNow, we apply (7.6.1) with \\( x = \\frac{n}{2}, a = -\\frac{1}{2} \\) and \\( b = 0 \\) to write\n\n\\[\na_n^{-2} = \\frac{1}{2}(n - 1)\\frac{2}{n} \\left\\{1 + \\frac{3}{4n} + O(n^{-2})\\right\\}^2\n= (1 - \\frac{1}{n}) \\left\\{1 + \\frac{3}{2n} + O(n^{-2})\\right\\}\n= 1 + \\frac{1}{2n} + O(n^{-2}) \\text{ as } n \\to \\infty. \\tag{7.6.2}\n\\]\n\nIn other words, from (7.6.2) it follows that for large \\( n \\), we have\n\n\\[\nV_{\\theta}(W') = (a_n^{-2} - 1)\\theta^2 \\sim \\frac{1}{2n} \\theta^2. \\tag{7.6.3}\n\\]\n\nUsing MAPLE, the computed values of \\( \\theta^2 V_{\\theta}(W') \\) came out to be \\( 2.6653 \\times 10^{-2}, 1.7387 \\times 10^{-2}, 1.2902 \\times 10^{-2}, 1.0256 \\times 10^{-2}, 5.0632 \\times 10^{-3} \\) and \\( 2.5157 \\times 10^{-3} \\) respectively when \\( n = 20, 30, 40, 50, 100 \\) and \\( 200 \\). The approximation given by (7.6.3) seems to work well for \\( n \\geq 40 \\).\nKhan (1968) considered this estimation problem but he first focussed on\nthe status of the MLE. Our goal is slightly different. Utilizing the two initial\nunbiased estimators $T, T'$ we focussed on the Rao-Blackwellized versions and\ncompared their variances. This was not emphasized in Khan (1968). We find\nthat $W'$ can be better than $W$ even if $n$ is small ($\\geq 3$) but for large $n$, the", "num_tokens": 2048} {"category": "olmocr_science_pdfs-science_math_and_technology-part2", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-science_math_and_technology-part2/part-00-00000.npy", "text": " variance gets smaller as the SNR gets larger. Inserting (30) into (17) and (20), at high SNRs, we attain\n\n$$P_{s_1} \\approx \\frac{13\\xi K (N + K)}{48\\rho N(K + 1)} \\left( \\frac{1}{\\gamma_0} \\right),$$\n\n(31)\n\n$$P_{s_2} \\approx \\frac{K}{N(K + 1)} \\left[ K\\omega + \\frac{13\\xi (N + K)}{48\\rho} \\right] \\left( \\frac{1}{\\gamma_0} \\right).$$\n\n(32)\n\nThe corresponding coding gains are\n\n$$c_1' = \\frac{48\\rho N(K + 1)}{13\\xi K(N + K)},$$\n\n(33)\n\n$$c_2' = \\frac{N(K + 1)}{K} \\left[ K\\omega + \\frac{13\\xi(N + K)}{48\\rho} \\right].$$\n\n(34)\n\nParticularly, as $K \\to N$, (33) can reduce to the coding gain of the classical OFDM, as\n\n$$c_0' = \\frac{24\\rho}{13\\xi}.$$\n\n(35)\n\nLike the perfect CSI case, it can be seen from (31) and (32) that the MCIK-OFDM scheme under MMSE based $\\epsilon^2$ achieve the diversity order of one. However, for high SNR, the attainable coding gains get smaller, i.e., $c_i' < c_i$ for $i = 0, 1, 2$. This degradation is caused by the impact of MMSE channel estimation error. Based on this, we provide the following theorem.\n\nTheorem 3. Consider MCIK-OFDM systems. Denote by $\\Delta_1$ and by $\\Delta_2$ coding gain losses achieved by the ML and by the GD, respectively, under MMSE based uncertain CSI over the perfect CSI. Then, we have\n\n$$\\Delta_1 = 10 \\log_{10} \\left( \\frac{N + K}{K} \\right),$$\n\n(36)\n\n$$\\Delta_2 = 10 \\log_{10} \\left[ \\frac{K\\omega + \\frac{13\\xi(N + K)}{48\\rho}}{K\\omega + \\frac{13\\xi K}{48\\rho}} \\right],$$\n\n(37)\n\nwhich satisfy $\\Delta_1 > \\Delta_2$.\n\nProof: Let the losses of coding gain be $\\Delta_i = 10 \\log_{10} (c_i/c_0')$ for $i = 1, 2$. Thus, utilizing (24) and (33) yields (36), while using (25) and (34) yields (37). Subtracting (37) from (36) leads to\n\n$$\\Delta_1 - \\Delta_2 = 10 \\log_{10} \\left\\{ 1 + \\frac{NK\\omega}{K\\omega + \\frac{13\\xi(N + K)}{48\\rho}} \\right\\} > 0.$$\nThis concludes the proof.\n\nRemark 5. As shown in Theorem 3, the GD detector is less sensitive to the MMSE channel estimation error than the ML. This is because the loss of coding gain of the ML is larger than that of the GD.\n\nTheorem 4. Denote by \\( g' \\) the coding gain that the MCIK-OFDM using the ML achieves over the classical OFDM, under MMSE CSI uncertainty. We have\n\\[\ng' = 10 \\log_{10} \\left[ \\frac{2N (K + 1)}{K (N + K)} \\right] \\text{ (dB)},\n\\]\nand \\( g' < g \\), where \\( g \\) is given in (27).\n\nProof: Based on the definition of \\( g' \\), we have \\( g' = 10 \\log_{10} (c'_1/c'_0) \\). Here, using \\( c'_1, c'_0 \\) given in (33) and (35), respectively, we obtain (38). Next, combining (27) and (38) leads to \\( g - g' = 10 \\log_{10} \\left[ (N + K)/2K \\right] > 0 \\) for every \\( K < N \\), thus \\( g' < g \\). This concludes the proof.\n\nRemark 6. Theorem 4 reveals that under MMSE CSI uncertainty, the coding gain achieved by MCIK-OFDM over the classical OFDM is smaller than that under the perfect CSI.\n\nFinally, similar to Theorem 1 in the perfect CSI case, in this case, the SEP of the GD performs nearly the same as that of the ML as \\( M \\) increases, which can be shown from (31) and (32) with the steps used in Theorem 1.\n\nV. NUMERICAL AND SIMULATION RESULTS\n\nWe now present numerical and simulation results to verify our theoretical analysis on the SEP of the MCIK-OFDM under various CSI conditions. For comparison, we show the average SEP for MCIK-OFDM schemes using the ML and the GD as well as the classical OFDM.\n\nA. SEP of MCIK-OFDM under Perfect CSI\n\nFig. 1 shows the average SEP of MCIK-OFDM with \\( N = 4, K = 2, M = 2 \\), using both the ML and the GD. This figure also compares this MCIK-OFDM scheme with the classical OFDM at the same data rate of 1 bps/Hz. As seen from Fig. 1, both the theoretical and asymptotic curves are very tight to simulation results in a wide range of SNRs. This successfully verifies the accuracy of the derived expressions for the average SEPs of both the ML and GD. Moreover, the SEP of MCIK-OFDM and the classical OFDM achieve the same diversity order of one, under perfect CSI, as shown in Remark 1.\n\nFig. 2 illustrates the impact of the PSK modulation order \\( M \\) on the average IEP of MCIK-OFDM using the ML with \\( N = 4, K = 2 \\) and \\( M = \\{2, 4, 8, 16\\} \\). It is clear from Fig. 2 that the order \\( M \\) has a negligible impact on the IEP performance, which validates our analysis right after (16). We also see the tightness of the derived IEP, even at low SNRs.\n\nFig. 3 depicts the behaviour of the SEP of MCIK-OFDM using the ML and the GD at various \\( K \\). It can be seen that MCIK-OFDM with the ML and \\( N = 4, M = 2 \\) provides the difference of 6.5 dB SNR gain when increasing \\( K \\) from 1 to 3. However, greater \\( K \\) offers a higher data rate. In addition, Fig. 3 shows that compared to OFDM, the SNR gain of the \\( K = 1 \\) MCIK-OFDM with the ML achieves about 8 dB SNR gain for the SEP of \\( 10^{-3} \\). This validates Remark 3.\nFig. 4. Comparison between the average SEPs of the ML and the GD, with the MCIK-OFDM of $N = 2$, $K = 1$ and $M = \\{2, 8, 16\\}$.\n\nFig. 5. Impact of fixed $\\epsilon^2$ on the average SEPs of different MCIK-OFDM schemes using both the ML and GD detectors, under different values of $\\epsilon^2$. It is shown from Fig. 5 that the average SEPs suffer from error floors as the SNR increases. These error floors get higher when increasing $\\epsilon^2$. More interestingly, as $\\epsilon^2 = 0.1$, the GD outperforms the ML in terms of the SEP, especially at high SNRs. This observation validates the accuracy of Theorem 2 and Remark 4. As $\\epsilon^2$ decreases, the SEP gap between the two detectors becomes smaller.\n\nC. SEP of MCIK-OFDM under MMSE CSI Uncertainty\n\nFig. 6 demonstrates the effect of the MMSE imperfection on the SEP of MCIK-OFDM using the ML and GD, when $N = 4$, $K = 2$ and $M = 2$. As seen from Fig. 6, under MMSE CSI uncertainty, MCIK-OFDM using the ML suffers from a considerable loss of nearly 5 dB SNR gain compared to the perfect CSI case. The loss raised by the GD is much smaller, being around 0.5 dB. Thus, the GD is less sensitive to MMSE CSI uncertainty than the ML.\n\nIn Fig. 7, we depict the average SEP of the MCIK-OFDM using the ML with $N = 4$, $K = 3$, $M = 4$ under MMSE imper", "num_tokens": 2048} {"category": "olmocr_science_pdfs-sports_and_fitness-part1", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-sports_and_fitness-part1/part-00-00000.npy", "text": ">\n\nY = Young; M = Masters; T = Trained; U = Untrained; MVC = Maximal Voluntary Contraction; VT1 = Ventilatory Threshold 1; VT2 = Ventilatory Threshold 2; 10ST = 10 second sprint; CK = Creatine Kinase; LDH = Lactate Dehydrogenase; Pt = Peak Twitch; Ct = Contraction Time; HRt = Half Relaxation Time; RMS = Root Mean Square; CMJ = Counter Movement Jump; HR = Heart Rate; DE = Delta Efficiency<|endoftext|>Age-related changes in performance and recovery kinetics in masters athletes: A narrative review\n\nBorges, Nattai; Reaburn, Peter; Driller, Matthew; Argus, Christos\n\nPublished in:\nJournal of Aging and Physical Activity\n\nDOI:\n10.1123/japa.2015-0021\n\nLicence:\nCC BY-NC-ND\n\nLink to output in Bond University research repository.\n\nRecommended citation(APA):\nAge-related Changes in Performance and Recovery Kinetics in Masters Athletes\n\nSubmission Type: Literature Review\n\nNattai Borges¹\nPeter Reaburn¹\nMatthew Driller²\nChristos Argus³, ⁴\n\n¹ School of Medical and Applied Sciences, Central Queensland University, Rockhampton, Australia\n² Department of Sport and Leisure Studies, The University of Waikato, Hamilton, New Zealand\n³ Research Institute for Sport and Exercise, University of Canberra, Canberra, Australia\n⁴ ACT Brumbies Rugby, Canberra, Australia\n\nCorresponding Author\n\nMr Nattai Borges\nSchool of Medical and Applied Sciences\nCentral Queensland University\nBruce Highway\nRockhampton, Queensland, 4702\nAustralia\nPhone: +61 7 4930 9720\nEmail: n.borges@cqu.edu.au\n\nAbstract Word Count: 227\nNumber of References: 95\nText-Only Word Count: 4881\nNumber of Figures and Tables: 3\nAge-related Changes in Performance and Recovery Kinetics in Masters Athletes:\n\nA Narrative Review\n\nSubmission Type: Literature Review\nAbstract\n\nDespite increasing participation rates in masters sport and extensive research examining age-related changes in performance, little is known about the effect of age on recovery kinetics in masters athletes. This narrative review focuses on the relationship between ageing and sports participation, and their effect on both performance and recovery following an exercise bout. Current research suggests the effect of age on performance and recovery may be smaller than originally suggested and that increasing sedentary lifestyles appear play a larger role in any observed decrements in performance and recovery in masters athletes. Currently, it appears that performance decrements are inevitable with age. However, performance capacities can be maintained through systematic physical training. Moreover, the limited current research suggests there may be an age effect on recovery kinetics following an exercise bout although further research is required to understand the acute and chronic recovery processes in the masters athlete.\nMasters athletes are defined as individuals who systematically train and compete in organised forms of\n\n\nTO DATE, THERE IS LIMITED RESEARCH (EASTHOPE ET AL., 2010; SULTANA ET AL., 2012) AND ANECDOTAL EVIDENCE TO SUGGEST THAT AS ATHLETES AGE THEY MAY EXHIBIT IMPAIRED RECOVERY KINETICS (TIME TAKEN TO RECOVER FROM A GIVEN EXERCISE BOUT) COMPARED TO YOUNGER ATHLETES. CONSEQUENTLY, AGE-RELATED REDUCTIONS IN RECOVERY KINETICS MAY HAVE AN EFFECT ON SUBSEQUENT BOUTS OF EXERCISE TRAINING, LEADING TO A REDUCTION IN OVERALL TRAINING LOAD AND A POTENTIALLY INCREASED\nrisk of injury. A previous review (Fell & Williams, 2008) has examined the effect of age on skeletal muscle\nrecovery after exercise although due to the paucity of research into masters athletes at the time, the review relies\non a tentative link between animal studies and investigations comparing young and non-athletic older populations\nto draw conclusions about a possible age effect on recovery. Recent research comparing younger and masters\nathletes has increased knowledge in this specific population and shown the significance of neuromuscular\nrecovery in masters athletes. Despite this, limited research has empirically examined recovery kinetics of older\nversus younger athletes (Bieuzen, Hausswirth, Louis, & Brisswalter, 2010; Darr et al., 1988; Easthope et al., 2010;\nFell, Haseler, Gaffney, Reaburn, & Harrison, 2006; Fell, Reaburn, & Harrison, 2008). Moreover, the possible\nmechanisms explaining the slower recovery kinetics in older athletes remain to be investigated. This narrative\nreview will examine the effects that physical activity and systematic training may have on performance and\nrecovery in both sedentary and athletic ageing populations and highlight the need for further research into recovery\nwithin masters athletes.\n\n2 Methods\n\nA literature search was conducted between April 2013 – January 2015 on the PubMed, Scopus and SPORTDiscus\ndatabases. Search terms included “Age” OR “Masters” OR “Older” OR “Veteran” AND “Exercise” OR\n“Performance” OR “Fatigue” OR “Recovery”. All languages and articles types were included in the search to\nincrease the number of articles. The reference lists of the resultant articles were examined for further articles not\nfound during the literature search. Articles comparing younger and masters athletes that failed to match their\nsubjects for training load were excluded. No other exclusion criteria were applied.\n\n3 The Effects of Physical Activity and the Ageing Process on Physical Performance\n\nThe ageing process leads to a number of physical changes in both a normal ageing and masters athlete populations\nthat can affect aerobic and anaerobic performance (Brisswalter, Wu, Sultana, Bernard, & Abbiss, 2014; Reaburn\n& Dascombe, 2009; Tanaka & Seals, 2008) as well as muscular strength and power performance (Burd et al.,\n2013; Korhonen et al., 2012; Louis et al., 2012; Peiffer et al., 2010b).\n\nSedentary Ageing Population and Physical Performance\n\nBoth maximal oxygen uptake and maximal heart rate have been shown to be reduced in a normal ageing\npopulation (Carrick-Ranson et al., 2013; Sabapathy, Schneider, Comadira, Johnston, & Morris, 2004). Similarly,\nmuscular strength and power have also been shown to decline in ageing sedentary populations (Cruz-Jentoft et al.,\nAn investigation of 301 sedentary healthy Australian males and females demonstrated that younger participants were significantly stronger as measured by one-repetition maximum strength tests (chest press, seated row, leg extension and leg press) and performed significantly better in functional performance tests such as a 400m walk, 6m walk, 6m backwards walk and sit to stands than individuals over 65 years of age (Peiffer et al., 2010b). These decreases in strength and functional abilities have been suggested to be linked with a decreasing muscle cross-sectional area specifically in type II muscle fibres in older sedentary individuals (Gouzi et al., 2013).\n\nHigh intensity training such as resistance training into older age has also been shown to enhance muscular strength and power performance (Aagaard, Suetty, Caserotti, Magnusson, & Kjaer, 2010; Latham, Bennett, Stretton, & Anderson, 2004; Steib et al., 2010). An investigation by Deley et al. (2007) demonstrated similar significant improvements in physical parameters in elderly (>70 years) sedentary subjects following one year of moderate intensity training. The researchers reported that training for one hour three times a week with a combination of aerobic, strength, and flexibility exercises, plus adapted Tai-chi, lead to significant improvements in maximal oxygen uptake (14.8%), distance walked in six minutes (10%), and maximal muscle strength of the knee extensors (15.2%) and plantar flexors (17.4%) in the intervention group compared to an age-matched control group who maintained normal activity levels. Therefore, in a normal ageing population the research suggests that physical performance decreases with age although improvements can be made through systematic physical training.\n\nThe Masters Athlete and Physical Performance\n\nSimilar trends are reported in masters athletes as declines in both maximal oxygen consumption and maximal heart rate have been observed in masters athletes from a range of sports (Gent & Norton, 2013; Kusy & Zielinski, 2014). Peak endurance performance has been shown to be maintained until approximately the age of 35 years after which it declines slowly until the age of 50-60 years after which there is an increased rate of decline due primarily to a decrease in maximal oxygen consumption (Pimentel, Gentile, Tanaka, Seals, & Gates, 2003; Ransdell, Vener, & Huberty, 2009; Tanaka & Seals, 2008). Decreases in the strength and power have also been observed in an ageing athletic population by Korhonen et al. (2006) who reported that both type II muscle fibre size and", "num_tokens": 2048} {"category": "olmocr_science_pdfs-sports_and_fitness-part1", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-sports_and_fitness-part1/part-00-00000.npy", "text": "3\ncfbd_key (register_cfbdb), 95\ncfbd_metrics, 28\ncfbd_metrics_ppa_games, 29\ncfbd_metrics_ppa_games(), 29\ncfbd_metrics_ppa_players_games, 30\ncfbd_metrics_ppa_players_games(), 31\ncfbd_metrics_ppa_players_season, 32\ncfbd_metrics_ppa_players_season(), 33\ncfbd_metrics_ppa_predicted, 34\ncfbd_metrics_ppa_predicted(), 34\ncfbd_metrics_ppa_teams, 34\ncfbd_metrics_ppa_teams(), 35\ncfbd_metrics_wp, 36\ncfbd_metrics_wp(), 36\ncfbd_metrics_wp_pregame, 37\ncfbd_metrics_wp_pregame(), 38\ncfbd_pbp_data, 38\ncfbd_play, 49\ncfbd_play_stats_player, 57\ncfbd_play_stats_player(), 57\ncfbd_play_stats_types, 59\ncfbd_play_stats_types(), 57, 59\ncfbd_play_type_df, 39, 55\ncfbd_play_type_df (data), 91\ncfbd_play_types, 60\ncfbd_play_types(), 60\ncfbd_player (cfbd_players), 50\ncfbd_player_info, 50\ncfbd_player_info(), 31, 32, 51, 53, 57\ncfbd_player_returning, 52\ncfbd_player_returning(), 52\ncfbd_player_usage, 53\ncfbd_player_usage(), 54\ncfbd_players, 50\ncfbd_plays, 54\ncfbd_plays(), 55\ncfbd_rankings, 60\ncfbd_rankings(), 61\ncfbd_ratings, 61\ncfbd_ratings_elo, 62\ncfbd_ratings_elo(), 63\ncfbd_ratings_sp, 63\ncfbd_ratings_sp(), 63\ncfbd_ratings_sp_conference, 65\ncfbd_ratings_sp_conference(), 65\ncfbd_ratings_srs, 66\ncfbd_ratings_srs(), 67\ncfbd_recruiting, 67\ncfbd_recruiting_player, 68\ncfbd_recruiting_player(), 68, 69\ncfbd_recruiting_position, 70\ncfbd_recruiting_position(), 68, 71\ncfbd_recruiting_team, 71\ncfbd_recruiting_team(), 71\ncfbd_stats, 72\ncfbd_stats_categories, 73\ncfbd_stats_categories(), 73\ncfbd_stats_game_advanced, 73\ncfbd_stats_game_advanced(), 74\ncfbd_stats_season_advanced, 76\ncfbd_stats_season_advanced(), 76\ncfbd_stats_season_player, 79\ncfbd_stats_season_player(), 80\ncfbd_stats_season_team, 82\ncfbd_stats_season_team(), 82\ncfbd_team_info, 85\ncfbd_team_info(), 9, 85\ncfbd_team_matchup, 86, 87\nINDEX\n\ncfbd_team_matchup_records, 87\ncfbd_team_matchup_records(), 88\ncfbd_team_roster, 88\ncfbd_team_roster(), 88\ncfbd_team_talent, 89\ncfbd_team_talent(), 89\ncfbd_teams, 84\ncfbd_venues, 90\ncoaches (cfbd_coaches), 6\nconferences (cfbd_conferences), 7\ndata, 91\ndatabase (update_cfb_db), 96\nDBI::dbConnect(), 96\ndraft (cfbd_draft), 8\ndrives (cfbd_drives), 11\nespn_cfb_pbp, 92\nespn_cfb_scoreboard, 92\nespn_cfb_scoreboard(), 92\nespn_metrics, 93\nespn_metrics_wp (espn_metrics), 93\nespn_metrics_wp(), 93\nespn_ratings, 94\nespn_ratings_fpi (espn_ratings), 94\nhas_cfb_key (register_cfb), 95\nload_cfb_pbp, 95\nnfl (cfbd_draft), 8\nnfl_draft (cfbd_draft), 8\nnfl_teams (cfbd_draft), 8\n\npbp_data (cfbd_pbp_data), 38\nplay-by-play (cfbd_pbp_data), 38\n\nqs::qdeserialize(), 95\n\nrecruiting (cfbd_recruiting), 67\nregister_cfb, 95\n\nupdate_cfb_db, 96\nupdate_cfb_db(), 95<|endoftext|>McCarthy Creek\n\nAccess: Trail begins in downtown McCarthy, just past the historic hardware store.\n\nDistance: 5 miles one-way, 10 miles round-trip\n\nTime: 4-6 hours round-trip\n\nMaps: Trails Illustrated map of Wrangell-St. Elias, USGS McCarthy 1:63,360 (B6)\n\nDifficulty: Moderate\n\nHighlights: Scenery, solitude, easy access\n\nRoute: To access McCarthy Creek, walk through town on the main road, past the historic hardware store. When the road ends, turn left onto a short trail to the river. Cross McCarthy Creek via a small footbridge. Climb up the bank to a gravel road. The trail starts at the end of the first steep switchback (approximately 200 yards from the footbridge). Trail leads through the McCarthy Creek creekbed. After about three miles the river has washed out the route. Walk up and over the slump paralleling the creek to avoid crossing the river. The trail ends at the river, between an old cabin and the area where the original route crossed the river.\n\nAt this point, you will need to cross the river or turn around. Warning: McCarthy Creek is actually a fairly large river. It is possible to cross at low water but may be treacherous at higher water volumes. Use your best judgment and turn around here if the river looks dangerous. If you chose to cross the river, continue about 300 yards where you will cross back. Shortly thereafter, a trail leads you through an original tunnel left from the mining era. Return via the same route.\n\nHazards: Floods frequently wash out portions of this route. Use your best judgment regarding safety and current conditions. Creek crossing can be very hazardous at high water volumes. Be prepared to turn back early if necessary.\n\nNotes: If continuing into the upper reaches of the McCarthy Creek drainage, please be aware that private property exists. Please respect private property by not trespassing. Hikers planning multiple-day backpacking trips in this area should seek additional information regarding private property locations.\nThe trail starts at the end of the first steep switchback (approximately 200 yards from the footbridge).<|endoftext|>From 2006-2013 spring yearling salmon at about 8 inches were stocked each May in lakes Waywayanda and Aeroflex immediately upon their arrival from Massachusetts. Salmon at this size usually feed on insects and macroinvertebrates; by the end of their first summer their food preference will shift to fish (alewives).\n\nIn 2013 some of the spring yearlings received in May were retained in the Hackettstown State Fish Hatchery and grown to a larger size. A portion of these fish were later stocked in lakes Waywayanda and Aeroflex in late fall, at an average size of 14 inches. Some fish remained in the hatchery over the winter and were stocked in Tilcon Lake in Morris County in April of 2014. These fish averaged 18 inches.\n\nThe landlocked salmon populations are maintained at these three lakes through annual stockings. While mature salmon may migrate to inlets and outlets and attempt to spawn, it is unlikely that natural reproduction would produce enough fish to maintain the fishery. The stocking rate and harvest regulations are intended to provide anglers with an opportunity to catch salmon that range from 12-17 inches and an occasional salmon in excess of 17 inches, weighing 3 pounds or more.\n\nLandlocked salmon are closely related to brown trout (*Salmo trutta*), and anglers may have difficulty telling them apart. Because size and creel limits are different for salmon and trout, anglers need to know the difference in order to comply with the regulations and quickly release salmon smaller than 12 inches. When in doubt about identifying salmon and brown trout, play it safe and release the fish unharmed!<|endoftext|>Football Money League\nChanging of the guard\nContents\n\nIntroduction 4\nby Dan Jones\n\nThe Deloitte Football Money League 6\n\nLeagues within the Money League? 22\nby Rich Parkes\n\nThe Real deal 25\nby Austin Houlihan\nWelcome to the 2006 Deloitte Football Money League. This is the ninth year of the publication, profiling the largest clubs in the world’s most popular sport for the 2004/05 season. A number of methods may be used to determine the size of a club – including measures of fanbase, attendances, TV audiences, or on pitch success. However, for the purposes of this publication, we look at the best publicly", "num_tokens": 2048} {"category": "olmocr_science_pdfs-sports_and_fitness-part1", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-sports_and_fitness-part1/part-00-00000.npy", "text": " by any user on the materials contained on this website.\n\nFor the latest updates and more information, visit www.betterhealth.vic.gov.au<|endoftext|>All hunters who harvest a white-tailed deer or wild turkey are required to complete the game check process.\n\n**FILL IN THE PERMIT**\n\n- Fill in the deer or wild turkey permit upon harvest with the date, time, and county of kill.\n- Exempt landowners are required to make a tag and include their name, date, time, and county of kill.\n\nOnce the hunter leaves the game unattended, the completed permit or tag, or confirmation code, must be attached. The permit or confirmation code is required to remain with the game at all times.\n\n**COMPLETE GAME CHECK**\n\nHunters may check game and receive a confirmation code in one of these ways:\n\n- Call 1-877-TAG-IT-OH (1-877-824-4864).\n- Exempt landowners call 1-866-703-1928 for operator-assisted landowner game check. Fees apply.\n- Visit ohiogamecheck.com, then select COMPLETE GAME CHECK.\n- Visit any authorized license sales agent. A list of sales agents may be found at wildohio.gov. Be sure to bring the permit number to the license agent.\n\nThe confirmation code must remain attached to the game and its parts.<|endoftext|>Therapeutic Use Exemptions and the Doctrine of Double Effect\n\nJournal Item\n\nHow to cite:\n\nFor guidance on citations see FAQs.\n\n© 2017 IAPS\n\nVersion: Accepted Manuscript\n\nLink(s) to article on publisher’s website:\nhttp://dx.doi.org/doi:10.1080/00948705.2017.1416621\n\nCopyright and Moral Rights for the articles on this site are retained by the individual authors and/or other copyright owners. For more information on Open Research Online’s data policy on reuse of materials please consult the policies page.\n\noro.open.ac.uk\nTHERAPEUTIC USE EXEMPTIONS AND THE DOCTRINE OF DOUBLE EFFECT\n\nWithout taking a position on the overall justification of anti-doping regulations, I analyse the possible justification of Therapeutic Use Exemptions (TUEs) from such rules. TUEs are a creative way to prevent the unfair exclusion of athletes with a chronic condition, and they have the potential to be the least bad option. But they cannot be competitively neutral. Their justification must rest, instead, on the relevance of intentions to permissibility. I illustrate this by means of a set of thought experiments in which only an athlete’s intentions vary. I argue that the Doctrine of Double Effect sheds some light on TUEs and illustrate this by applying different readings of the DDE to the thought experiment. This underpins a justification of anti-doping exemptions very different from than the approach adopted by the World Anti-Doping Agency (WADA). I argue for three changes to bring TUEs in line with this understanding: rewriting of the regulations, transparency, and a greater role for athletes in determining what exemptions are allowed, and when.\n\nKeywords Therapeutic Use Exemptions, Doctrine of Double Effect, Doping, Anti-Doping, Intentions, Strict Liability, PEDs\nIn September 2016 the Russian sports hackers Fancy Bears released the confidential hacked files of Bradley Wiggins and Chris Froome, both British winners of the Tour de France. The records showed that Wiggins and Froome had both raced under Therapeutic Use Exemptions (hereafter TUEs) which had allowed them to use drugs on the proscribed list maintained by the World Anti-Doping Agency (WADA). Wiggins, in particular, had gained a TUE for using corticosteroids on three different occasions to treat asthma related conditions. Reactions in the British press, both national and the cycling press varied. Some argued that Wiggins had sailed close to the wind and that he had abused the TUE regulations. Others suggested that he had acted within the rules, and had done nothing wrong. Team Sky, and Wiggins himself, made both of these latter claims. Bradley Wiggins was interviewed on the Andrew Marr show on 29th September 2016 about the corticosteroids:\n\nMarr: Now, the trouble with this particular drug is that lots of people say it is also a performance enhancer. David Millar said it was the most potent drug that he’s ever taken.\n\nWiggins: Yeah, but... I think... they were abusing that drug, and this was to cure a medical condition. (2016)\n\nThe set of anti-doping regulations and practices adopted by WADA has included a set of provisions for TUEs since 2005. The origins of TUEs are found in the work of the International Olympic Committee (IOC) medical committee in the late 1980s and early 90s. TUEs allow the use of substances and methods that would otherwise be prohibited because of their performance-enhancing effects. In this paper I examine some possible justifications of such exemptions. In doing so, I will pick through some of the guidelines in order to attempt a rational reconstruction (Habermas 1979) of the arguments, since no carefully worked out moral analysis has been published.\n\nI will argue that the justification of exemptions based on therapeutic use is, with some caveats, a matter of intentions. And this is important because the rhetoric surrounding anti-doping regulation in general reflects an exclusion of intentions, and a central role for the principle of strict liability (McNamee and Tarasti 2010). I argue that, in this area, this is a mistake. If we view TUEs in a different light, justified primarily by intentions, then certain conclusions follow about their regulation\n\nThe Problem\n\nTUEs are a special case of a growing phenomenon in public policy: a ‘rule and exemption’ approach (Barry 2001). On this approach, a rule is applied, but an exemption is available for a set of special cases. We must ask what it is about these supposed special cases that makes them morally distinctive. A simple answer is that the general rule, universally applied, seem to give the wrong result. Take, for example, the UK law requiring motor cyclist to wear helmets which was introduced in 1971 and revised in 1976 by the introduction of an exemption for Sikhs. Whether or not this exemption is justified, it is the reason given - religious observance - that must do the justificatory work.\n\nThere are striking similarities between some of the arguments around TUEs and arguments about cultural exemptions. For example, at an early stage of the controversy in the 1970s that led to an exemption for Sikhs, Lord Widgery ruled against an exemption:\n\nNo-one is required to ride a motor cycle. All that the law requires is that if you do ride a motor cycle you must wear a crash helmet. (Poulter 1988, 293)\nSikhs were not required to ride motorbikes, so the exemption did not hold, or, at least, so ruled Widgery. Equally, it might be argued, no-one is required to take part in elite sport. But if you do, you must not take banned substances.\n\nThe case for a rule and exemption approach must sit between two positions: on one hand the case for uniformity must be strong otherwise the solution ought to be to remove the rule. On the other hand, it must not be too strong, otherwise there is no case for exemptions. Everything that counts for the strictness of the ban on PEDs counts against the provision of exemptions. How can this middle way be justified? In order to answer this question, we need to look at a regulatory world without TUEs.\n\nIn the absence of TUEs, an athlete with a chronic condition treatable only with a banned substance faces an invidious choice. They can take the substance and abandon elite sport. Or they can decide not to use the banned substance and suffer health and competitive loss. In the long term they are likely to abandon elite sport because the competitive loss is likely to be unsustainable.\n\nHow bad are these two options? Quite bad. Athletic identity is performative so making performance impossible undermines identity. Competition may be the athlete’s livelihood. Depriving an athlete of their identity and livelihood is a very high price for something that is not the athlete’s fault. It looks as if this is unfair, on a standard pre-theoretic understanding of fairness that involves getting what we deserve.\n\nOne response to such concerns is merely to shrug one’s shoulders and opine that life is tough. Here is the ruling of the Court for Arbitration in Sport (CAS) in Quigley v UIT in a related context; a case of the accidental absorption of a prohibited substance:\n\n...it is also in some sense unfair for an athlete to get food poisoning on the eve of an important competition. Yet in neither case will the rules of the competition be altered to undo the unfairness. Just as the competition will not be postponed to await the athlete’s recovery, so the prohibition of a banned substance will not be lifted in recognition of its accidental absorption. The vicissitudes of competition, like those of life, generally may create many types of unfairness whether by accident or the negligence of unaccountable persons which the law cannot repair. (1995, 6)\n\nThere is sleight of hand at work here. What the law can and cannot repair, is precisely what is at issue. Sports regulations may partly reflect underlying natural facts about the world, but they are also in part, constructions, and they can be constructed in different ways. The analogy made in the Quigley case suggests three cases: an", "num_tokens": 2048} {"category": "olmocr_science_pdfs-sports_and_fitness-part1", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-sports_and_fitness-part1/part-00-00000.npy", "text": " as our spray program for pre-emergence control, we use Barricade everywhere in the irrigated areas where we do not want tracked-off volunteer rye seed to germinate and this also controls a variety of weeds in our irrigated areas. We try to apply other pre-emergent applications well ahead of any forecast rain event in non-irrigated areas. For post-emergent control we use Manor, Kerb, Princep and others. Once our overseeded grasses are up and established we try to topdress once every three-four weeks or as needed.\nSuper Tips by Darren Davis\n\nKeep Your Employees; Pay Attention to Detail\n\nRecently I spent a few hours with my colleague Tim Hiers, golf course manager at The Old Collier Golf Club in Naples. With Tim's tenure in the profession, he has witnessed many innovations, seen countless trends in the business and is a very valuable source of information. Taking advantage of his knowledge, I challenged Tim with this question, \"If you could offer only one piece of advice to a fellow Golf Course Superintendent, and he had no prior knowledge of the individual's operation or their duration in the industry, what secret to success would he offer?\"\n\nAfter a brief pause he responded, \"Always treat people well, but even more importantly clean up your facility; a clean, organized facility will give outsiders the impression that you truly care about the investment that you are maintaining and the safety of your biggest asset, your employees.\"\n\nThat piece of advice is the focus of this \"Super Tip\".\n\nEmployee Morale\n\nFlags from around the world, representing the employee's country of origin, hang from the ceiling (Photo 1). The flags are an employee morale technique that Tim has employed to provide staff members a connection to their homeland. Tim admits that the idea is one that he had seen at other golf course facilities and he thought it was worth replicating. While some of the employees may only be temporary residents of the United States, Tim feels as long as they are in our country and employed at Old Collier, he wants these individuals to feel that they are part of an \"extended family\" or the \"team at Old Collier\". Tim added, \"It is also a way to bring home into work and create a conversation piece among employees.\" This was also the motivation for mounting several large scale maps on the wall of the equipment storage area where he has labeled the \"home\" of each employee (Photo 2).\n\nPegboard\n\nIn the equipment repair area at Old Collier, peg board has been affixed to the walls (Photo 3). The first impact that the peg board had on my impression in the area was aesthetics. The area took on an organized \"warehouse type\" look, which is atypical of what I have seen at many other golf course facilities. The pegboard was also functional as hooks can be installed to hang and organize tools and other items. A third benefit is that the pegboard serves as a good sound absorber by buffering noise echoed from the building's metal walls and concrete floors.\n\nEquipment Storage\n\nIn the equipment storage area, after each piece of equipment has been cleaned and put away for the night, all of the seats, beds and cowlings are raised to increase drying potential (Photo 4). Tim commented, \"It is common sense that when you combine moisture and metal for an extended period of time rust becomes an issue.\" Ceiling fans are connected to a timer switch that turns the fans on from 6 pm to 10 pm each night to improve the drying process to protect the equipment.\n\nPhoto 1. Old Colliers displays flags of the countries represented by staff members.\n\nPhoto 2. World Maps with pins representing employees also show the states and countries the staff hail from.\n\nPhoto 3. Pegboard wall covering in the shop helps deaden sound and keep items neatly organized and stored.\n\nPhoto 4. Opening up beds and cowlings helps equipment to dry quickly and completely to help prevent corrosion.\nend. This is because our bermudagrass does not come out of the cool weather very well primarily due to our nematode populations and shade. We keep the overseeding as long as possible without impeding the growth of the bermudagrass. We do lower the height of cut gradually, and brush, verti-groom and vertical mow, but we have never used any herbicides to take out our overseeding. We also do a lot of hand watering of the hot spots to prevent premature thinning before the bermudagrass is actively growing.\n\nBuddy Keene\n\nSouthwest Florida\nWeather is the Wild Card in Game Of Overseeding\n\n\"It was the coldest, wettest, busiest winter with the quickest spring warm up we've ever had.\"\n- Stuart Taylor, GCS\n\nTransition woes this spring had Stuart Taylor of the Riverwood GC in Port Charlotte scratching his head in disbelief. Says Taylor, \"We used the same cultural practices we have used successfully the past five years and we used the same Poa trivialis (75 percent) and bentgrass (25 percent) blend that we used and liked last year.\"\n\nSo what was the difference?\n\"There was an immense difference in the weather this year. We have been averaging 10 frosts a year the last few years. This year we had 30 frosts. The winter was wetter.\"\n\nRiverwood\nOverseeding Practices\n\nPreparation\n- Verticut greens 3 ways.\n- Verticut tees and fairways 2 ways\n- Scalp roughs\n\nSeeding Rates\n- Greens 8 lbs/M Poa trivialis/bentgrass blend (75%/25%)\n- Tees 400 lbs/A; Fairways 320 lbs/A; Roughs 210 lbs/A\n\nWe had 25 inches more rainfall than normal, and we had more traffic than ever as we experienced our busiest winter season ever with around 240 rounds a day. It didn't get much better going into spring. We had frost on April 1st and seven days later it was 85 degrees. The grass didn't know whether to come or go. It was very difficult to manage since the conditions were so atypical and changeable\"\n\nThe transition frustration for Taylor was magnified by the fact that he felt like he had a great overseeding establishment. \"Everything looked great in the fall. The seed went down smoothly, germinated and grew in. For nine months beginning in September, we had the best greens we've ever had, and then for 30 days beginning in May we've had the worst greens in five years. They are coming around now.\"\n\n\"We are on the frost line on the west coast. Thirty miles south and maybe overseeding could be optional, but we are also a development course so aesthetics are a critical issue year round for real estate sales and member satisfaction. So, overseeding is not optional. The trade-off is the members are kept informed and we brought in the USGA to also help explain transition problems.\"\n\n\"Some of our worst areas were on...\"\nHANDS ON\n\ngreens that came back with the best soil tests. Some of the thin areas were problematic since they were on shady greens to begin with. Others thin spots tended to occur in hydrophobic areas. To address this we are going to aerify with 3/4\" hollow tines and topdress with a sand and Profile mix for more uniform moisture control along with a program of using Cascade and other wetting agent materials.\"\n\nStuart Taylor\n\nCentral-Northeast\n\nPrograms Haven't Responded to Milder Winters\n\n\"This year reminded me of the winters of the 70s and 80s.\n- Butch Singo, Harrell’s, Inc.\n\nButch Singo is a sales representative for the Harrell’s Fertilizer Company, and his territory runs from Kissimmee to Jacksonville. I asked Butch his take on this year's overseeding challenges.\n\n\"Overseeding programs have not changed much in my territory in response to the mild winters,\" he said. \"As usual, some courses experienced rougher transitions than others. Most of my customers know that the weather can be unpredictable and cause havoc to playing conditions in the winter without the insurance of overseeding.\"\n\n\"Successful establishment was very weather dependent as usual. Those who tended to go early in the fall had better luck than those who were scheduled later and got caught when the rainy weather hit and washed a lot of seed away. Mild weather early belied the density of the overseeding and when the severe cold weather hit and the bermudagrass went dormant, people found out much or how little seed they really had established.\"\n\nThis year really reminded me of the winters I experienced as a superintendent in the 70s and 80s when we would typically have 20-30 frosts a year. A lot of superintendents and golfers haven’t seen those kinds of winters in a long time and golfers often have short memories. Now since the second week in May, we’ve had high temperatures and low humidity, causing the overseeding to check out too quickly and everyone is scrambling to push the bermudagrass to fill in as quickly as possible.\"\n\nButch Singo\n\nWest-Northwest\n\nDown Time is Nice; Preparation is Real Key To Success\n\n\"Preparation is the key to success.\n- John Cunningham, GCS\n\nButch Singo is a sales representative for the Harrell’s Fertilizer Company, and his territory runs from Kissimmee to Jacksonville. I asked Butch his take on this year's overseeding challenges.\n\n\"Overseeding programs have not changed much in my territory in response to the mild winters,\" he said. \"As usual, some courses experienced rougher transitions than others. Most of my customers know that the weather can be unpredictable and cause havoc to playing conditions in the winter without the insurance of overseeding.\"\n\n\"Successful establishment was very weather dependent as usual", "num_tokens": 2048} {"category": "olmocr_science_pdfs-sports_and_fitness-part1", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-sports_and_fitness-part1/part-00-00000.npy", "text": " audience.\n\nAlthough TV 2’s current contract with ASO obligates them to cover the event live on\ntheir main broadcasting channel, the race starting in Denmark was, in combination with\nthe company’s ongoing transformation, considered a unique opportunity to leverage a\nprocess of reflection and renegotiation among the television practitioners. The process\nwould concern both the general interpretation of the event for Danes, the continued\nbranding value of the tour for the television company, and long-established production\nand distribution practices on different platforms, which are changing as part of the com-\npany’s adjustment to the digital condition.\nSport as a genre in a transforming television industry\n\nHutchins and Sanderson (2017) argue that the role of sports should be taken into serious consideration in any analysis of future television, and yet, our scholarly understanding of sports as a particular genre in the ongoing changes in the television industries is still limited. So far, attention has mainly been directed towards the emergence of internet-based streaming services and globally oriented OTT platforms, Amazon Prime and Tencent, on the one hand, and a rapidly growing number of sports-owned media like Manchester United Television and NFL Network, on the other. These new types of services, labelled by Johnson (2019) as “online natives” and “content natives”, respectively, originate from the internet and erode national boundaries of sports television. They have not only provided more and new sports content, they have produced new viewing practices (Burroughs & Rugg, 2014; Duncan, 2020; Fujak & Frawley, 2022; Hutchins et al., 2019; Kariyawasam & Tsai, 2017). Furthermore, they have initiated a change in the market for sports rights, raised concerns regarding access, citizenship, and the role of sports in the “society-making” function of media” (Hutchins et al., 2019, p. 989), and given rise to calls for intervention from policy makers (Evens & Smith, 2022; Kariyawasam & Tsai, 2017).\n\nKnowledge of the role of sports for established television industry actors – the “television natives” (Johnson, 2019) like the BBC, Discovery, and the Danish TV 2 – is limited. It is often stressed that the live broadcasting of big events on the broadcasting platforms of television natives remains their main business. However, sporting event viewership on the streaming platforms of these services is rapidly rising, and television coverage of big sporting events now strongly “intersects with the individuated address of ‘connective media’ platforms such as Facebook and Twitter (van Dijck, 2013) and the live streaming services provided by networks online” (Hutchins & Sanderson, 2017, p. 33). Across the many screens and platforms used to follow big sporting events, live broadcasting has been described as the anchoring point in the coverage of the Olympic Games (Hutchins & Sanderson, 2017). The linearity of live sports and strong ritualized viewing habits have been pointed out as elements that make sport a less relevant genre to use to attract audiences to streaming platforms (Hutchins et al., 2019).\n\nA study of how genres are programmed on Norwegian public broadcasters’ linear TV and streaming platforms indicates that this is rapidly changing. Here, sport is not a high priority; however, it does have a markedly higher priority on one of the analyzed streaming platforms, namely the one with a commercial business model. As an increasing number of audiences prefer the flexibility and mobility of streaming platforms, it is nevertheless argued that live viewing may be the “next big frontier of streaming” (Sanson & Steirer, 2019, as cited in Spilker et al., 2020, p. 14). Johnson (2019) points out that, already in 2014, the BBC seemed to move in that direction by using their internet platforms to deliver the same content that their linear broadcast channels did. Johnson stresses that linear channels remain an important organizing principle in the television industry, and that these channels are now provided as part of a streaming service. In this way, she\nargues, television services that provide access to linear television channels on a streaming platform represent “a collapse in the boundaries between linear and nonlinear television” (Johnson, 2019, p. 16). For Johnson, it is important to recognize that in an online environment, television will have very strong “continuities with older forms of television”, of which, we would argue, the live coverage of sports is a good example. Bruun (2023) and Michalis (2022) have a similar view, stating that public service companies pursue the strategic aim to make streaming platforms the “front door” to both linear channels and on-demand content, and the services “stick to linear publishing because of its continued popularity and the need to ensure the reach of television in all target groups as well as an increased emphasis on the public service brand” (Bruun, 2023, p. 238). Sports play several roles here. First, as mentioned above, big sports leagues’ serial dimension and well-known ability to attract engaged and loyal groups of viewers on a regular basis means that online natives have started acquiring rights to this particular type of “temporally significant content” (Johnson, 2019, p. 88) in competition with television natives. Sports provide a great diversity in content, and industry analyses reveal that serial rights to sports retain subscribers better than other genres (Bødker, 2021). Serial rights to cover sports leagues stabilize subscription bases for television services. For some years now, flagging specific genres with distinct national and cultural importance, like drama and documentaries (Bruun, 2022), has been part of public service companies’ strategy for streaming platforms. However, more recently, Danish TV 2 changed their strategy and increased program diversity on their streaming service, TV 2 Play, to give a markedly higher priority to genres, like sports and current affairs, which were previously “regarded as flow-only” (Bruun, 2023, p. 245). This reflects a mainstreaming process of the platform as older groups of audiences are adopting it. The analysis below will demonstrate how a mega-event in sports like the Tour de France, under the specific Danish circumstances in 2022, comes to play a significant role in TV 2’s strategy.\n\n**Temporality and attention in an online context**\n\nBig sporting events differ in important ways from the seriality of national and international sports leagues that comprise the ubiquity of everyday sports on television, featuring strong regularity in (inter)national matches that often span many months. In comparison, big sporting events have a different temporality, which needs new interpretations in the current transformation into streaming. Sporting events stand out because they happen less often and in intensive periods. Thus, they interrupt the everyday lives and time schedules of audiences, fans, and television practitioners. This discontinuity from everyday routine has historically contributed to their status as a particular genre, namely “media events” (Dayan & Katz, 1992), and to “being recognized as extraordinary”, showcasing absolute excellence in sporting achievement (Billings & Wenner, 2017, pp. 3–4). In combination with the ability of various media – particularly broadcast television – to transmit the\nbig sporting events globally with coverage that “makes things larger than life” (Billings & Wenner, 2017, p. 4), the events have an extraordinary appeal which attracts a wider audience. Subsequently, they have grown in cultural and geopolitical importance to become mega-events that attract a wide range of socio-cultural actors who want to utilize such temporarily enlarged attention for their own purposes and agendas. In the digital age, big sporting events still produce such mediated centers of attention. Nowadays, this is orchestrated by an ensemble of many media – in which live television may provide a core narrative – that “take on an active, performative role in constructing themselves as ‘the center’ (Hepp & Couldry, 2010, p. 9), where various political, commercial, subjective, and visual interests are staged and performed in a struggle for influence and power” (Frandsen et al., 2022, p. 3). However, the production of attention towards the extraordinary, but ephemeral, live-actions must adapt to new conditions in an online context, not least on streaming platforms, where television content is distributed in a spatially organized context, and where prominence and attention are established in different ways. In an online context, channel identity or interruptions in time schedules can't be used to establish the extraordinariness of big sporting events and, with that, the television service as the center of public attention. Streaming platforms are organized spatially, and they shape the attention and prioritize content for viewers through their layout, visual organization, and paratexts (Johnson, 2019). As linear television remains popular with large segments of viewers, while other segments are perceived as increasingly impatient (Bruun, 2023), the new front doors to the services of public service TV natives like Danish TV 2 now integrate linear channels and combine spatial and temporal strategies in a multiplatform strategy which includes their website.\n\nFinally, compared to some of the more iconic mega-events, like the Olympic Games and the FIFA World Cup, the Tour de France has a different time and space structure, which matters in relation to television practices and strategic interests. First, the Tour is an annual event that takes place on a daily basis for three weeks in July", "num_tokens": 2048} {"category": "olmocr_science_pdfs-sports_and_fitness-part1", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-sports_and_fitness-part1/part-00-00000.npy", "text": "Longitudinal follow-up of fitness during childhood: interaction with physical activity\n\nG. Baquet, Jos W.R. Twisk, Han C.G. Kemper, Emmanuel van Praagh, Serge Berthoin\n\nTo cite this version:\n\nHAL Id: hal-02394163\nhttps://hal.univ-lille.fr/hal-02394163\nSubmitted on 4 Dec 2019\n\nHAL is a multi-disciplinary open access archive for the deposit and dissemination of scientific research documents, whether they are published or not. The documents may come from teaching and research institutions in France or abroad, or from public or private research centers.\n\nL’archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des établissements d’enseignement et de recherche français ou étrangers, des laboratoires publics ou privés.\nTitle: Longitudinal Follow-Up of Fitness during Childhood: Interaction with Physical Activity\n\nAuthors: G. Baquet\\textsuperscript{1}, J.W.R. Twisk\\textsuperscript{2}, H.C.G. Kemper\\textsuperscript{3}, E. Van Praagh\\textsuperscript{4}, and S. Berthoin\\textsuperscript{1}.\n\n\\textsuperscript{1}: Laboratory of Human Movement Studies (EA 3608), Faculty of Sport Sciences and Physical Education, University of Lille 2, France.\n\n\\textsuperscript{2}: Department of Clinical Epidemiology and Biostatistics, VU University Medical Centre (VUMc), Amsterdam, The Netherlands.\n\n\\textsuperscript{3}: Institute for Research in Extramural Medicine, VU University Medical Centre (VUMc), Amsterdam, The Netherlands.\n\n\\textsuperscript{4}: Laboratory of Biology of Physical Activity and Sport, Auvergne and Blaise Pascal Universities, Clermont-Ferrand, France.\n\n21 pages including 31 references and 3 tables.\n\nRunning title: Fitness and physical activity in children.\n\nAuthor to whom all correspondence should be addressed\n\nBerthoin Serge\nLaboratory of Human Movement Studies \\ EA 3608\nFaculty of Sport Sciences and Physical Education\n9 rue de l’Université 59790 Ronchin France\nTel: 0033320887365 Fax: 0033320887363\n\nE-mail: serge.berthoin@univ-lille2.fr\nABSTRACT\n\n**Purpose:** To analyze health related fitness values during childhood (11- to 16-years) in relation to changes in physical activity level.\n\n**Methods:** One hundred and fifty eight children were monitored over a 4-year period. Twice a year, they performed six physical fitness tests: standing broad jump, 10*5 meter shuttle run, sit-and-reach, hand grip, number of sit-ups in 30 seconds, 20 meter shuttle run. Height was measured four times a year to assess age at peak height velocity. Physical activity was assessed with a self-administered questionnaire at baseline and at the end of the follow-up. The physical activity level was defined by the frequency and the time spent in moderate to vigorous physical activities. Two groups were constituted: regularly active and sedentary.\n\n**Results:** A multiple linear multilevel regression analysis was used to analyze the longitudinal relationships between changes in physical activity and physical fitness levels. Corrections were made for both time-dependent (time) and time-independent (sex) variables. Except for flexibility, boys’ fitness performances increased more than the girl’s ones. Positive and significant (p<0.05) regression coefficients were found with the regularly active for standing broad jump, 20-meter shuttle run, number of sit-ups, 10*5 meter shuttle run in both sexes and for the girls’ sit-and-reach performance. Increasing or decreasing physical activity level was not associated with changes in fitness performances over time, except for flexibility for the girls and the 20-meter shuttle run for the boys.\n\n**Conclusions:** From childhood to adolescence, increasing physical activity is not sufficient to be fitter. The children who are stayed the most active were the fittest, particularly for the girls.\n\n**KEY WORDS**\n\nChildren - Adolescent – EUROFIT – Multilevel Analysis\nINTRODUCTION\n\nPhysical activity and physical fitness are concepts that are often used in a confused manner and sometimes considered as synonymous. However, although they are thought to be correlated, they are not the same. Bouchard and Shephard (1994) have defined physical activity as any body movement produced by the skeletal muscles and resulting in a substantial increase over the resting energy expenditure. Epidemiological studies have shown that during growth, habitual physical activity and its intensity (Trost et al., 2002) decrease for boys as well as for girls. The concept of physical fitness has evolved from performance-related to health-related fitness (AAPHERD, 1984), and includes cardiorespiratory endurance, muscular strength, flexibility and body composition. Both physical activity (Janz and Mahoney, 1994) and physical fitness (Rowland and Freedson, 1994) are related to health outcomes. The evolution indicators (inter-age correlations) of physical fitness and physical activity level from childhood to adolescence tend to be moderate (Malina, 2001). Nevertheless, some longitudinal studies have indicated that the more active children and adolescents will become the more active adults (Telama and Yang, 2000). Physical activity and physical fitness levels have different relationships with cardiovascular disease risks (Twisk et al., 2002; Williams, 2001). This suggests that even if physical activity increases the physical fitness level, inactivity is not the principal cause of being unfit. Thus, the purpose of the present study was twofold:\n\n1) What are the changes over four years (i.e. between 11 and 15 years -old) in anthropometry, physical fitness and physical activity levels?\n\n2) What are the relationships between physical fitness and changes in physical activity levels over a four-year period?\nMETHODS\n\nDesign\n\nThe study was initiated in September 1997 and received the approval of the Lille Consultative Committee for the Protection of Persons in Biomedical research, to collect the data. Before testing was stared, children and their parents received a verbal description of the experiment and completed a written, informed consent form. One hundred and ninety-three children volunteered to enter the study. The 98 girls and 95 boys were followed over a four-year period from September 1997 to June 2001. Fitness tests and anthropometric measurements were performed at the beginning and at the end of the school year (September and June of each year). Height was measured four times a year, four months apart, over the four years. Based on height measurements, height velocities were estimated 4-monthly. The relationship between height velocity and age was drawn for each subject. Peak height velocity (PHV) was mathematically estimated for each subject. Maturity status was determined with respect to age at PHV. In order to have a more homogeneous biological age group, only subjects whose age at PHV was observed (i.e. prepubertal at the start of the study) were included in the study. Fourteen girls and 2 boys, whom PHV was not identified, were not included in the study. A self-administered questionnaire to assess physical activity levels was presented to the children at the beginning and at the end of the study (Narring and Michaud, 1995; Narring et al., 1999).\n\nAnthropometry\n\nHeight and body mass were measured with a wall stadiometer (Vivioz medical) and a calibrated beam balance (Tanita TBF 543). Percentage of body fat was estimated from skinfold thickness (0.1 mm) with a Harpenden caliper (Harpenden Inc.) measured at three sites (biceps, triceps and calf), according to Lohman (1992). Body mass index (BMI) was\ncalculated from body mass (kg) and height (m): BMI (kg.m^{-2}). The ratio between the waist circumference and the hip circumference was also measured.\n\n**Fitness tests**\n\nSubjects performed six field tests, which were part of the European Fitness Tests (EUROFIT) battery. To achieve EUROFIT standards, the recommendations of the Committee of Experts on Sports Research were observed (1988). The selected tests were standing broad jump (explosive strength, in cm), 10*5 meter shuttle run (speed-coordination in s), hand grip (static strength, in N.kg^{-1}; T.K.K. 5101, Takei Inc.), sit-and-reach (flexibility, in cm), the number of sit-ups in 30 seconds (functional strength, number) and 20 meter shuttle run (cardiorespiratory endurance, in km.h^{-1}). In a literature review, Renson (1988) had noticed the highly reproducibility of these physical fitness tests.\n\n**Physical activity**\n\nPhysical activity questionnaires developed for French language children (Narring and Michaud, 1995; Narring et al., 1999) were delivered to the children during class sessions. The children received a precise explanation of each item to avoid any ambiguity and completed the questionnaires themselves, the experimenters simply reminding them to check or circle the number of their answers and leaving them the necessary time", "num_tokens": 2048} {"category": "olmocr_science_pdfs-sports_and_fitness-part1", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-sports_and_fitness-part1/part-00-00000.npy", "text": "acuation Plan\nFor Tornado warnings, participants and spectators will hear the city sirens. The PA announcer will announce the warning (after confirming). There is not a shelter for people at Yankton Trail Field. People will have to decide for themselves the best course of action (i.e. stay at the field, get on the ground, get in the car, etc...).\n\nEvacuation procedures will be straightforward. The best option is to get in the car and go out either exit. Spectators and participants will be expected to understand this as there is not a large shelter. If there is a safe structure (permanent structure with plumbing and/or electrical wiring), people can go there. However, small covered shelters are not safe from lightning. PA announcer should announce that your car is the best place to wait (if PA is not working, it will be word of mouth, or with a blow horn). If we have severe weather, the following announcement will be made:\n\n\"Ladies and Gentleman, at this time play is suspended due to (whatever severe weather is). We will continue when the conditions allow for safe competition.\"\n\n*We will always have an athletic trainer on site. This person will have access to communication with Ambulance/Fire/etc… (911).\n\nFinish-Line Procedure\nThe order of finish will be verified with Finish lynx system. Two Lynx cameras will be on each of the finish line mats. A secondary video system will be used as a backup. Timing mats will be used on the course at select marks.\n\nRunners should continue racing past both sets of mats at the finish line. Once they have crossed the mats, runners should continue to move through the finish chute as quickly as possible. Runners need not maintain their order of finish in the chute. Water and trainers will be available at the end of the finish area. We will likely be using disposable chips...however, if we use permanent chips, we will follow this protocol: Coaches and fans can wait for runners outside of the finish. After runners leave the area, they will need to remove their chips, and get them to the coach as soon as possible. Coaches should collect their chips and return them to the results pick up area.\nMandatory Administrative Meeting\n\nCoaches are required to attend the mandatory coaches meeting at 5:15 p.m. Central time, Friday, Nov. 4, in the 3-in-1 room on the campus of Augustana. Prior to the meeting, coaches may pick up their packets, including athlete declarations, from 3:30 to 5 p.m.\n\nMerchandise\n\nMerchandise will be available for purchase starting at 9:00 a.m., Saturday at the course through the conclusion of the second race.\n\nParticipant Expectations and Guidelines\n\nConduct Policy Statement\nThe NCAA expects each championship to exhibit an experience that represents the highest level of fair play and good sportsmanship. The NCAA and the NCAA Division II Championships Committee expect that student-athletes, coaches and administrators do their best to ensure participation in intercollegiate athletics promotes character development for all participants, enhances the integrity of higher education, and promotes civility; therefore championship events should adhere to such fundamental values as respect, fairness, civility, honesty and responsibility. These values should be manifest not only in athletic participation, but also in the broad spectrum of activities associated with the championship event. Accordingly, the Championships Committee will take strong action in response to any form of misconduct by student-athletes, coaches and/or administrators during the entire championship. This includes criticism of officials and a misconduct incident at the competition.\n\nAny institution who fails to submit a complete and accurate Division II Code of Conduct form before the start of the first competition of the championship, will be issued a fine of $500, with a private letter of reprimand to be sent to the to the conference commissioners, university president, university athletics director, senior woman administrator, sports information director and compliance director.\n\nExpectations\nEach games committee shall hold a pre-tournament meeting with the coaches of participating institutions to review and explain the policies related to misconduct (as defined in Bylaw 31.02.3). The Division II Championships Code of Conduct is to be part of the championship packet, and delivered to all institutional representatives attending the championship events.\n\nIf the act of misconduct occurs during the competition, under normal circumstances, the individual shall be allowed to complete the competition in which he or she is participating at the time of the incident. An administrative hearing shall be held at the conclusion of the day’s competition, during a break in the continuity of the championship (e.g., between rounds of a basketball tournament) when no competition is being conducted or at the conclusion of the championship. However, if the act of misconduct is so flagrant that it obviously violates the principles of fair play and sportsmanship, the games committee may immediately withdraw the student-athlete or institutional representative from the competition and conduct the hearing after this action. Other actions of misconduct shall be dealt with in a timely manner by the governing sports committee.\nExpectations for Student-Athletes, Coaches and Administrators\n\n- Submit an accurate and complete Division II Code of Conduct Form before the start of the first competition of the championship.\n- Cooperate and participate in game ceremonies, team meetings, community engagement and championship events.\n- Discuss misconduct and possible consequences with all members of the travel party.\n- Have an administrator or designee present at all competitions.\n- Communicate issues and concerns in an honest and timely manner with NCAA staff.\n- Follow team, university and NCAA guidelines throughout all championship-related activities.\n- Be respectful of other participants, spectators, coaches, administrators and other individuals at the championship site.\n- Abide by state and federal laws, and facility requirements throughout the championship event.\n- Display acceptable behavior on and off the playing field to ensure a positive experience for all participants.\n\nMisconduct\nThe championship handbook and NCAA Division II Manual Bylaw 31.02.3 defines misconduct as: “… is any act of dishonesty, unsportsmanlike conduct, unprofessional behavior or breach of law, occurring from the time the championship field is announced through the end of the championship that discredits the event or intercollegiate athletics.”\n\nPossible Penalties for Misconduct\nIn accordance with Bylaw 31.1.8.3, the governing sports committee (or the games committee authorized to act for it) may impose any one, or a combination of the following penalties on an institution or any student-athlete or representative of an institution guilty of misconduct that occurs incident to, en route to, from or at the locale of the competition or practice. The penalties include, but are not limited to:\n\n- Public or private reprimand of the individual;\n- Financial penalty;\n- Disqualification of the individual from further participation in the NCAA championship involved and/or banishment of the individual from participating in one or more subsequent championships of the sport involved;\n- Cancellation of payment of the Association’s travel guarantee to the institution for the individuals involved;\n- Withholding of all or a portion of the institution’s share of revenue distribution;\n- Banishment of the institution from participation in one or more subsequent championships in which its team in that sport otherwise would be eligible to participate;\n- Disqualification of an institution for a period of time from serving as host institution for one or more NCAA championships; and/or\n- Cancellation of all or a portion of the honorarium for hosting an NCAA championship.\nAll correspondence regarding violation of the Code of Conduct will be sent to the president/chancellor of the institution, with a copy to the director of athletics and person(s) involved.\n\nParticipation in an NCAA championship is an accomplishment and it is expected that individuals and teams are committed to ensuring that the championship is a positive experience for all participants, fans and volunteers. Participation in these championship events is a privilege for the student-athletes, coaches and administrators and should be treated as such. Again, congratulations to you and your team. We hope this year’s championships experience is one that you will cherish for years to come.\n\nAll members of the travel party should have submitted the Division II Code of Conduct form before regional competition. Completed forms must be returned to the committee representative designated on the form for each region by 5 p.m. EST, Friday, October 28. INSTITUTIONS THAT HAVE NOT SUBMITTED THE CODE OF CONDUCT FORM BY THE DEADLINE WILL BE ACCESSED A $200 FINE PER GENDER PER TEAM. The code of conduct form is available online (NCAA.org, Championships Administration, Division II Cross Country).\n\n**Sports Wagering**\n\nThe NCAA defines sports wagering as putting something at risk – such as an entry fee or a wager – with the opportunity to win something in return. The NCAA opposes all forms of legal and illegal sports wagering on college sports. Student-athletes and athletics administrators cannot place a sports wager for any NCAA-sanctioned sport. This includes wagering on the intercollegiate, amateur or professional level.\n\nA student-athlete involved in sports wagering on the student-athlete’s institution permanently loses all remaining regular-season and postseason eligibility in all sports. A student-athlete who is involved in any sports wagering activity that involves college sports or professional athletics, through Internet gambling, a bookmaker, a parlay card or any other method employed by organized gambling, will be ineligible for all regular-season and postseason competition for at least one year.\n\nIn championships in which a bracket format is used, student-athletes, coaches and administrators may not participate in bracket competitions where there is both a required entry fee and an opportunity to win a prize. Student-athletes and administrators may participate under current NCAA rules, in bracket contests where there is no entry fee but a possibility of winning a prize. Some NCAA member schools, however, have chosen to ban student-athletes from participating in these types of bracket contests.\n\n**Tobacco Ban**\n\nThe use of tobacco products is prohibited by all game personnel (e.g.,", "num_tokens": 2048} {"category": "olmocr_science_pdfs-sports_and_fitness-part1", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-sports_and_fitness-part1/part-00-00000.npy", "text": " Four years ago the OAC partnered with the Access Fund to co-brand our logo onto their Gym To Crag poster. The poster promotes responsible crag practices in a fun way. The poster should be found in most Ontario climbing gyms and MEC locations. If not, contact the OAC for one!\n\nOAC calendar – The OAC continues to produce a high quality calendar showcasing the beautiful and diverse climbing areas in the province that we are lucky to call our local spots. All calendar proceeds go to the OAC and support access. Our social media outlets were again inundated with submissions to our photo contest. Keep those submissions flowing this year!\n\nOAC survey – The response rate remains high, with 211 climbers responding to our annual survey. The results of the survey provide data which inform our ongoing discussions with land managers. See detailed report.\n\nOAC Facebook group – We surpassed 1870 likes for our OAC Facebook group as a result of regularly posting updates relevant to the climbing community.\n\nOAC membership – Our membership continues to increase steadily with another 317 members joining in the 2017-2018 year. Total membership is now 1707 individuals.\nCONNECTING WITH OTHERS\n\nOntario Trails Coordinating Committee – Dr. Garrett Hutson (Brock University) continues participating in strategic meetings as the non-motorized trails representative for the Ontario Trails Coordinating Committee. His role is to be the conduit between non-motorized trail users and the province keeping communication channels open and leveraging opportunities to resolve conflicts when they arise.\n\nConservation Halton (CH) – We continued to partner with Conservation Halton to run the annual Crag Stewardship Day on May 5th 2018. This year, due to the highly successful work in prior years, OAC volunteers’ efforts are now being directed to fight off the invasion of Garlic Mustard near the lower pavilion at Rattlesnake Point. This event improves climbers’ visibility at some of our most popular crags.\n\nIn April 2018, the OAC chairs had a scheduled meeting with CH to strategize ways to improve climbers’ experience and manage the explosion of growth in the industry. We have started discussions and planning around installing rescue kits at Mt Nemo and other CH crags. Working with CH, we hope to have some prototype kits in place for the 2019 climbing season. Additionally, we discussed recent development of Mt. Nemo routes. We helped to ensure the long term viability of climbing at Mt. Nemo with a reassertion of the ‘No new routing’ policy.\n\nGrey Sauble Conservation Authority (GSCA) - Met with new land manager. Opened discussions regarding Eugenia Falls.\n\nBuilding the Niagara Escarpment Biosphere Reserve - On May 31, 2018, two OAC board members participated in the “Building the Niagara Escarpment Biosphere Reserve” meeting. The OAC was one of over 30 delegations from municipalities, conservation authorities, academia, industry and non-governmental organizations. The meeting was a great reflection of the diversity of practitioners interested in developing a governance model for the NEBR. These meetings have also been great networking opportunities for the OAC across the region.\n\nCentre for Applied Science in Protected Areas Conference Presentation and Tour of the Swamp – Dr. Garrett Hutson and Mike Penney delivered a presentation on the value of building and maintaining climber-manager partnerships to reach sustainability goals in Ontario protected areas. Following the presentation, with the help from MNRF personnel, protected area managers and ecologists went for a hike at the Swamp to view a climbing area and to discuss successful climbing management strategies.\n2017 OAC Survey Results\nsummary by Patrick Lam\n\nFor the 2017 OAC Survey, we decided to shift the focus from the usual economic-impact survey to a more access-focused survey. This year, we received 211 responses to our survey. Following past practice, we drew two winners for $50 MEC gift certificates. We learned that the many short-answer questions were quite labour-intensive to process; we have read all of the responses and have typically grouped the responses into categories for this summary.\n\nQuestions about respondents’ climbing\n\nHow many years climbing total/outdoors?\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
Years climbing totalYears climbing outdoors
Mean8.437.06
Median65
\nQuestions about OAC communications\n\nHow do you receive OAC information?\n\nCame to survey from\nSupporting the OAC\n\nHow should the OAC engage community?\n\nBarriers to volunteering\n\n- Time\n- Awareness\n- Location\n- Not welcoming\n- None\n- Other\nWe are considering a tiered membership system. The base tier would remain at a $5 lifetime fee. The preferred tier would enable members to contribute more to the OAC on an annual basis, in exchange for perks that we would negotiate with the local climbing industry.\n\nWould you donate more money to the OAC, e.g. preferred membership?\nQuestions about what the OAC should be doing\n\nWould you come to a climbing presentation by the OAC?\n\nThere was broad support for an OAC climbing presentation; of course we'll have to actually run one to see how it goes. We have discussed whether it was important to get a “famous” speaker or not, and the split was pretty close to 50/50. Some comments pointed out that it was more important to get a good speaker than a famous speaker, although a famous speaker can help people get in the door. There was a diversity of opinion about the best kind of speaker to get, although 19 responses favoured someone local, 11 responses favoured an access-themed presentation, and 8 responses favoured an accomplished sport climber. We also received 9 responses advocating female speakers. We also have a list of suggestions that we will consider, which includes both local and international climbers (including past and present OAC volunteers).\n\nSelected responses:\n\n- I would go. The speaker needs to somehow help promote the OAC's goals rather than their personal \"accomplishments.\"\n- I would like to learn more about the history of climbing, the mental state of climbing, climbers pushing their limits, breaking barriers, paraclimbing.\n- Someone who has set routes at local crags, trad climbers, world travellers\n- Someone who not only inspires great feats of strength or dedication in climbing, but also in making it sustainable and continually accessible to all for years to come.\n\nDo you engage in protecting climbing environments currently? Do you intend to do so in the future? If so, how?\n\nWe received a variety of responses to this question. Many of the responses (45) mentioned picking up trash at the crag, particularly others' trash, which is a more low-key form of crag cleanups (7). Engaging others came up fairly often (26), sometimes leading by example (4); respondents also mentioned various leave-no-trace practices (24). A couple of responses (6) described supporting groups like the OAC and similar groups with both time and money. Other responses (5) described building and maintaining infrastructure and some responses mentioned responding to calls for letters such as during the Niagara Escarpment Plan consultation.\n\nSelected responses:\n\n- By reducing my personal impact - lunches in plastic containers, packing out human waste/garbage, staying on main trails, avoiding plant life while on the cliffs and approaching, climbing with one partner at a time..\n- Yes, absolutely! By continuing my efforts to always pack out more than you pack in. Clean and be environmentally responsible.\n- I teach outdoor rock climbing. I always emphasize to my students that we are in a shared environment, and so we have to make sure that we make it so that everyone (even people not in our group) can enjoy\nthemselves in it. And I talk about \"no trace\" ethics. I like to help with cleanup days when I'm in town. I'd like to volunteer with the OAC if I can manage it while I travel.\n\nWhat could we be doing better in our relationships with land managers?\n\nMost of the responses advocated for better relationships. The OAC is in constant communication with land managers to maintain its current relationships, and aims to develop new ones when possible. We have particularly good relationships with Conservation Halton, which is a strong supporter of climbing, as well as the Grey Sauble Conservation Authority and the Ontario Ministry of Natural Resources and Forestry. Some responses suggested exercising empathy for the land manager's point of view, which is well taken. We also ought to make an effort to show appreciation for our strong partnerships with land managers on social media.\n\nIn the past year, we have engaged land managers and provided climbing demonstrations at conferences.\n\nA couple of responses suggested events (crag cleanups, trail maintenance). Education, particularly for private landowners, about the Occupiers' Liability Act, is always helpful, and managing climber impact is always key. We have also provided services like helping to fund portapotties at Metcalfe.\n\nSome responses called out specific areas such as Rockwood and Tiffany Falls (which is only open to climbers taking part in organized events).\n\nWe appreciate the responses thanking us for the work we already do!\n\nSelected responses:\n- Develop unique solutions. EG. In Chattanooga, you can actually text a landowner to tell them you're there. They have a tip jar on their crag. It's a strange solution but it could work. Or ask for specific waivers for areas.\n- I admittedly don't know a lot about what is being done, do I can't comment too well on this. With this", "num_tokens": 2048} {"category": "olmocr_science_pdfs-sports_and_fitness-part1", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-sports_and_fitness-part1/part-00-00000.npy", "text": " available measure of ‘financial muscle’: revenue from day to day football business operations. We only rank the clubs on the money coming in. We do not consider a club’s budget for outgoings or what someone might pay to buy, or invest in, a club.\n\nThe Deloitte Football Money League is the most contemporary and reliable analysis of clubs’ relative financial performance and is released less than nine months after the end of last season, as soon as the relevant clubs’ accounts are available to us.\n\nThe big news this year is that, after eight consecutive seasons at the top of the Money League, Manchester United has been overtaken by Real Madrid. Real have transformed their revenues, doubling them in only four years. What may make other clubs look more closely at Real is the method by which they have delivered much of their revenue growth. The mainstay of Real’s revenue growth is not matchday revenues, as we have seen in many of the UK clubs, or broadcasting revenue, as we have seen – and continue to see – in Italy, but strong progress in realising their commercial potential. Real have concentrated on improving their commercial revenue, both in terms of developing a progressive and extensive partner programme, and in turning the club’s strong international support into revenue for the club. To date both these objectives have been very successful, helping to propel Real’s commercial revenue well above any other Money League club. We profile Real’s commercial revenue, and comment on how they have made it to number one, in one of our feature articles. Whilst not every club has Real’s particular strength of brand and history, we hope there are some insights that others may find comparable to their own situation.\n\nFootball remains a growth sport, especially at the highest level. The continued high level of interest in the sport – both public and commercial – is reflected by another year of strong growth. In our first Money League in 1996/97 the 20 clubs’ combined revenue was €1.2 billion. This year, the total broke the €3 billion barrier for the first time after growing by 6%.\n\nThe catalyst for this remarkable long term growth was the broadcasting rights revolution of the 1990s, fuelled by soaring interest in the game, new technology and deregulation of the broadcast markets. Despite the maturing of broadcast markets, premium content remains critical to the business models of Pay-TV broadcasters. Just look at the collapse of Premiere’s share price after losing the Bundesliga rights, or the recent deals in Italy and France, for clear evidence of this. Recent deals have confirmed our view that the often forecast collapse in broadcast revenues has not materialised and will not happen. In the major European countries the value of top class broadcasting rights continues to rise. We have recently seen a large increase in the value of the German Bundesliga Pay-TV deal, following the huge French deal announced in 2005 which commences next season. And content providers continue to innovate. In Italy, for example, we have seen live rights split into Pay-TV and Digital Terrestrial, with further financial rewards for the clubs.\n\nHowever, many clubs are rightly continuing to concentrate day to day on the areas over which they have direct control. The stadium development boom, started in the early 1990s in the UK, and most recently seen in Germany, has provided the perfect opportunity for clubs to enhance their revenues. We believe further opportunities in\n\n---\n\n**Introduction**\n\nBy Dan Jones, Partner, Sports Business Group at Deloitte.\nWe have used, for each club, the figure for total revenue extracted from the club’s annual financial statements, or other direct sources, for the 2004/05 season. In some cases, the annual financial statements do not cover a whole season, but are for the calendar year, in which case we have used the figures for the most recent calendar year available.\n\nWe use the terms ‘revenue’ and ‘income’ interchangeably. Revenue excludes player transfer fees, VAT and other sales related taxes. In a few cases we have made adjustments to total revenue figures to enable, in our view, a more meaningful comparison of the football business on a club by club basis. For instance, where information was available to us, significant non-football activities or capital transactions have been excluded from revenue.\n\nBased on the information made available to us in respect of each club, to the extent possible, we have split revenue into three categories – being revenue derived from matchday, broadcast and commercial sources. Clubs are not wholly consistent with each other in the way they classify revenue. In some cases we have made reclassification adjustments to the disclosed figures to enable, in our view, a more meaningful comparison of the financial results.\n\nMatchday income is largely derived from gate receipts (including season tickets and memberships). Broadcast income includes revenue from television and radio and from both domestic and international competitions. Commercial income includes sponsorship (mainly derived from brand/name placing on team shirts and around stadia), conference, catering and merchandising.\n\nThe publication contains a variety of information derived from publicly available or other direct sources, other than financial statements.\n\nWe have not performed any verification work or audited any of the information contained in the club financial statements for the purpose of this publication.\n\nAll figures for the 2004/05 season have been translated at 30 June 2005 exchange rates (£1 = €1.4806). Comparative figures have been extracted from previous editions of the Deloitte Football Money League.\n\nThere are many ways of examining the relative wealth or value of football clubs – and at Deloitte we have developed sophisticated models of anticipated future cash flows to help potential investors or sellers do just that. However, for an exercise such as this, there is insufficient public information to do that. Here – in the Deloitte Football Money League – we use revenue as the most easily available and comparable measure of financial wealth. Revenue, like salary for an individual, is not the be all and end all of wealth, but all would agree that – as a starting point – it is better to have more than less, and the choice of how to spend it.\n\nHow we did it\n\nWe have used, for each club, the figure for total revenue extracted from the club’s annual financial statements, or other direct sources, for the 2004/05 season. In some cases, the annual financial statements do not cover a whole season, but are for the calendar year, in which case we have used the figures for the most recent calendar year available.\n\nWe use the terms ‘revenue’ and ‘income’ interchangeably. Revenue excludes player transfer fees, VAT and other sales related taxes. In a few cases we have made adjustments to total revenue figures to enable, in our view, a more meaningful comparison of the football business on a club by club basis. For instance, where information was available to us, significant non-football activities or capital transactions have been excluded from revenue.\n\nBased on the information made available to us in respect of each club, to the extent possible, we have split revenue into three categories – being revenue derived from matchday, broadcast and commercial sources. Clubs are not wholly consistent with each other in the way they classify revenue. In some cases we have made reclassification adjustments to the disclosed figures to enable, in our view, a more meaningful comparison of the financial results.\n\nMatchday income is largely derived from gate receipts (including season tickets and memberships). Broadcast income includes revenue from television and radio and from both domestic and international competitions. Commercial income includes sponsorship (mainly derived from brand/name placing on team shirts and around stadia), conference, catering and merchandising.\n\nThe publication contains a variety of information derived from publicly available or other direct sources, other than financial statements.\n\nWe have not performed any verification work or audited any of the information contained in the club financial statements for the purpose of this publication.\n\nAll figures for the 2004/05 season have been translated at 30 June 2005 exchange rates (£1 = €1.4806). Comparative figures have been extracted from previous editions of the Deloitte Football Money League.\n\nThere are many ways of examining the relative wealth or value of football clubs – and at Deloitte we have developed sophisticated models of anticipated future cash flows to help potential investors or sellers do just that. However, for an exercise such as this, there is insufficient public information to do that. Here – in the Deloitte Football Money League – we use revenue as the most easily available and comparable measure of financial wealth. Revenue, like salary for an individual, is not the be all and end all of wealth, but all would agree that – as a starting point – it is better to have more than less, and the choice of how to spend it.\n\nHow we did it\n\nWe have used, for each club, the figure for total revenue extracted from the club’s annual financial statements, or other direct sources, for the 2004/05 season. In some cases, the annual financial statements do not cover a whole season, but are for the calendar year, in which case we have used the figures for the most recent calendar year available.\n\nWe use the terms ‘revenue’ and ‘income’ interchangeably. Revenue excludes player transfer fees, VAT and other sales related taxes. In a few cases we have made adjustments to total revenue figures to enable, in our view, a more meaningful comparison of the football business on a club by club basis. For instance, where information was available to us, significant non-football activities or capital transactions have been excluded from revenue.\n\nBased on the information made available to us in respect of each club, to the extent possible, we have split revenue into three categories – being revenue derived from matchday, broadcast and commercial sources. Clubs are not wholly consistent with each other in the way they classify revenue. In some cases we have made reclassification adjustments to the disclosed figures to enable, in our view, a more meaningful comparison of the financial results.\n\nMatch", "num_tokens": 2048} {"category": "olmocr_science_pdfs-sports_and_fitness-part1", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-sports_and_fitness-part1/part-00-00000.npy", "text": "; only 2% of the adult population was over 30 inches in 2004. This improved to 18% by 2009, and held steady through 2011. The new striped bass regulations maintained the two-fish creel limit throughout the year but require all striped bass between 26 to 36 inches be released from November 1 through May 31. There was no size limit from June-October.\n\nThe protective slot limit initiated in 2006 was modified in 2015, after data indicated there were too many striped bass between 26 and 29 inches and most fish after reaching this size experienced very little or no growth. It should only take striped bass an average of two years to grow from 26 to 30 inches but after 2012, most striped bass never reach 30 inches due to poor growth. For example, 10 year old striped bass in 2014 averaged 29.5 inches, but should have\nbeen approximately 36 inches long at that age. However, growth for younger fish has remained good and stable for the same time period. The new protective slot limit was adjusted in 2015 to 30-40 inches (only for the months of Nov-May), up from 26-36 inches initiated in 2006. Anglers who prefer catch-and-release of 26-29 inch fish should continue that practice. Excessive harvest of this size group is not necessary to improve growth, some catch-and-release will still be necessary to maintain a trophy fishery.\n\nStudies have consistently shown that catch and release of striped bass in the summer months results in high mortality. Most of these striped bass die 1-2 days after release and most sink to the bottom and never surface. Catch and release mortality appears to be especially high for the larger fish. Consequently, anglers should not be targeting large striped bass with the intent of catch and release during the summer months. Smaller fish (generally < 22 inches) generally survive summer release rather well. Department of Game and Inland Fisheries encourages striped bass anglers to stop fishing after catching their 2-fish limit in the months of June-September and occasionally during warm periods in October. Catch-and-release is recommended for striped bass from November through May.\n\nStriped bass are distributed throughout the lake during most of the year, but are concentrated in lower lake (between the dam and buoy 64 of the Roanoke Arm and up to buoy 40 of the Blackwater Arm) areas during the summer months. Coves are typically not very productive for striped bass during the summer, so anglers should concentrate their efforts on the main lake when water temperatures begin to rise. Some of the bigger coves and the upper ends of the lake are more productive during the fall, winter and spring months. Although these are the general areas most striped bass are caught, these fish are very mobile and may change locations continuously depending on forage availability, water temperatures, and spawning. Striped bass anglers utilize a variety of fishing methods such as drifting or slow trolling live shad, trolling (plugs, bucktail jigs, swim baits, umbrella rigs), casting lures (flukes, swim baits, bucktail jigs), or vertical jigging. Anglers use live shad throughout the year, trolling is most popular during the warmer months, casting lures is most productive during the winter and spring at night. All of the above methods are utilized during the winter months.\n\nThere is an ongoing striped bass tagging study to provide biologists with information on striped bass catch rates, harvest rates, movement, survival, and population dynamics. The fish tags are yellow, approximately three inches in length, attached near the dorsal fin and should be easily recognized without dissection. Tagged fish do not have to be harvested in order to collect the reward. Cut or clip tags (do not pull tags loose) from the fish you wish to release. Anglers are encouraged to submit all tags collected from striped bass to the address printed on the tag with the following information: date fish was caught, marker number nearest to location of capture (also include the marker letter, i.e. R31), length of fish and indicate whether the fish harvested or released. Rewards are assigned to specific tags and not to any particular size of fish. All returned tags will be worth one of the following amounts: $5, $10, $20, $35, or $50.\n\nThe Department of Game and Inland Fisheries does not typically collect older and larger (over 8 lbs) striped bass in their routine sampling, but these data are very important for monitoring the fishery and new regulations. Any willing angler is asked to keep striped bass heads from fish they harvest larger than 26 inches or 8 pounds. The heads can be frozen and delivered to a freezer at “Captain’s Quarters”, located next to Hales Ford Bridge, where DGIF will pick them up. Be sure to fill out and include a form detailing the length of each fish and when it was caught upon drop off. If you would like to know the age and year the fish was stocked, include your mailing address and you will be sent the information after the fish has been\naged. Fish have an inner ear bone in the head (termed “otolith”), from which the age is\ndetermined. Each otolith contains rings similar to tree rings and can be counted for an accurate\nage determination.\n\nThis reservoir has limited crappie habitat. Although the lake produces many quality-size\ncrappie, anglers should not expect to consistently catch large numbers of crappie. The crappie\npopulation is smaller than some other Virginia reservoirs but the quality of these fish is very\ngood. Large coves and the upper ends of the reservoir should be the most productive, especially\nnear fallen trees, brush piles, and some docks. During the 2014 angler creel survey, crappie\nanglers were most productive in March-May but October-December are typically good months\nfor crappie fishing. Fewer crappie are caught in June-September. DGIF sampling indicates the\ncrappie population is stable and has shown little change for many years. The crappie fishery\nshould remain good and no substantial changes in the population are expected.\n\nSunfish and catfish are also present at Smith Mountain Lake. Sunfish are abundant but\ncompetition with shad prevents good growth, so most of these fish are small. Channel catfish,\nflathead catfish, and white catfish make up the catfish fishery. Flathead and channel catfish are\nmost abundant in the upper reaches of the Roanoke Arm and white catfish are found primarily in\nthe lower third of the reservoir where the water clarity is much better. Catfish anglers can enjoy\ngood fishing from the shoreline and docks.\n\nWhite perch are a relatively new species to the lake and have recently provided great\nfishing opportunities. This species can be found throughout the reservoir but higher\nconcentrations are typically found in the lower end (dam end) of the reservoir. White perch\ngenerally travel in large groups and can provide fast action after a “school” of white perch is\nlocated. Anglers should look for large numbers of smaller fish on their electronics, especially\nalong points in 15-30 feet of water near channels. After locating a “school” of white perch,\nvertical jig small spoons or drop baits (small pieces of cut bait or worms) and prepare for a lot of\naction. White perch can also be found along shoreline structure especially in the spring and fall\nmonths but will go deeper when the water starts to warm up in the summer or gets too cold in the\nlate fall and winter.\n\nNumerous public and private boat ramps and marinas are found around the lake. In\naddition, there are very nice handicapped-accessible fishing piers located in the Smith Mountain\nLake State Park and Franklin County Park. Additional information on lodging, marinas, and\nother attractions can be obtained by calling the Smith Mountain Lake Visitors Center at 1-800-\n676-8203 or by visiting the Smith Mountain Lake Visitor Center online at www.smith-mountain-\nlake-visitor-center.com. Additional information concerning the fishery can be obtained by\ncalling DGIF at 434-525-7522.<|endoftext|>Bear Necessities Fan Shop\nAnnual Tent Sale\n\nBest prices of the year\n\nTuesday, April 25–Friday, April 28, Noon–5 p.m.\nHarold Alfond Sports Arena\n\nAre you a pro at playing cornhole?\n\nStop in and get $25 in Tech Bucks for University Bookstore’s Tech Center!\n\nGet the best deals of the season\n\nShop to win:\nMalibou Ocean Kayak, life preserver and paddle\n\nShow us your skills with four chances to score big discounts:\n20%: 1 bag on the board\n30%: 1 bag in, 1 on the board\n50%: 2 bags in, 2 bags on the board\n\nGet four in and win a piece of clothing or general merchandise of your choice!\n\nTo enter:\nShop at Bear Necessities Fan Shop or University Bookstore, April 25–April 29\nFill out an entry slip. Online purchases made during this time are also entered to win.\nWinner drawn on Monday, May 1, 2023.\n\nNo purchase necessary to enter. Shipping costs will be charged if winner wishes to have the kayak shipped.\n\n$899 value\n\nIn complying with the letter and spirit of applicable laws and pursuing its own goals of diversity, the University of Maine System", "num_tokens": 2048} {"category": "olmocr_science_pdfs-transportation", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-transportation/part-00-00000.npy", "text": " wanted to see near the train station.\nLIGHTING THE BRIDGE\n\nThe entrance of the Upham’s Corner station is under an unlit bridge that caused many neighbors to voice concerns about the safety of the area. In order to help residents imagine the space in new ways, we installed a temporary lighting exhibit that transformed people’s experience of walking under this bridge at night. The reactions were joyful and positive for pedestrians and drivers alike.\n3. Implementation Dialogues November 2014\n\nAfter gathering the many forms of feedback, ideas and stories, we put together recommendations for both station areas and presented them at interactive Implementation Dialogues in each community. Residents, public agency representatives, merchants and organization leaders were all in the room together discussing the possibility of these recommendations and beginning to collectively identify the resources and leadership to move from dialogue to implementation.\nChapter 3: FOUR CORNERS RECOMMENDATIONS, ACTION PLANS\nFOUR CORNERS/GENEVA:\nRecommendation 1: Install Informational Signage\nRecommendation 2: Install Tech Amenities\nRecommendation 3: Activate the Bridge & Station\nRecommendation 4: Install a “Tea Stop”\nRecommendation 1: Increase Informational Signage\n\nProvide bold train/bus service information at both station entries to build ridership.\n\nOur “flag facts” on bold banners are a temporary step towards increasing the usefulness of the commuter rail for the surrounding community by raising awareness about how (and when) it works. On a more whimsical note, temporary “platform poetry” chalk installations by local artists would add to the local art already featured in the stations.\n\nWhat Will Improve\n\n☑ Commuters will be better informed about bus/train arrivals and be encouraged to use them more\n\n☑ People will know how the train can get them where they want to go\nWhat local residents and merchants said at the Implementation Dialogues:\n\n- What about a “Next Train” sign visible from the Tea Stop?\n- What about a way to use your phone to purchase Charlie Card or transportation fee for train & bus?\n- Until we get a nice, big poster with the schedule on it? Please?\n- We need banners and signs on the Geneva side too.\n- Until we get an electronic board/sign announcing trains, can we have a nice, big poster with the schedule on it? Please?\n\nWhere we’ve seen it\n\nMBTA Silver Line gives commuters updated information, Boston\n### RECOMMENDATION 1: INSTALL INFORMATIONAL SIGNAGE\n\n**IMPLEMENTATION TIMELINE & RESOURCES**\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
Action StepAlready Willing SupportersPotential AlliesCost Estimate, if applicable
1) Install informational vinyl banners at both station entrancesFairmount/Indigo Line CDC Collaborative, Four Corners Main Streets, MBTAMBTA, Alpha Construction*$30 - 60 per banner, varies with size
2) Install bold permanent signage including clarification on schedules and meaning of “Inbound” and “Outbound”Fairmount/Indigo Line CDC Collaborative, Four Corners Main Streets, Fairmount Indigo Transit Coalition (FITC)MBTA, Public officials
3) Install wayfinding signage of nearby parks, restaurants, artist studios, and other neighborhood gemsFairmount/Indigo Line CDC Collaborative, Four Corners Main Streets, Artist in Residence, Fairmount Cultural CorridorMBTA, Office of New Urban Mechanics, Healthy Dorchester
4) Research affordable and creative options and install LED displays indicating bus/ train arrival updates at the street levelFairmount/Indigo Line CDC Collaborative, FITC, MBTAFITC, Public officials, Office of Urban Mechanics, Fairmount Cultural Corridor, Area colleges (Wentworth, Mass. College of Art), Science Museum*$200 for equipment only, not including connection with live MBTA schedule updates
\n\n*Please see p.46 for Cost Estimate Sources*\nRecommendation 2: Install Tech Amenities\n\nInstall at both station entrances as a top priority service requested that can also encourage more activity at the station.\n\nBoston is fast becoming a “wireless city”, and Four Corners residents expressed eagerness to be a part of that. Installing tech amenities like wifi and phone charging stations could contribute to better connectivity between the train station, bus stops, and the community.\n\nWhat Will Improve\n\n✔ Phone charging on-the-go and in case of emergencies\n\n✔ People can work or play while waiting\nWhere we’ve seen it\n\nConvenient Bright Box public charging station, New York\n\nWhat local residents and merchants said at the Implementation Dialogues:\n\nI like how this idea (wifi and charging) will increase the convenience of commuters\n\nI looked up “how to build a solar charging station” and found a great hackers site that explains how to build a weatherproof one on the cheap. Any takers?\n\nWicked Free Wifi\nBoston’s public wireless network is prevalent in Roxbury\n### RECOMMENDATION 2: INSTALL TECH AMENITIES\n\n#### IMPLEMENTATION TIMELINE & RESOURCES\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
Action StepAlready Willing SupportersPotential AlliesCost Estimate, if applicable
1) Expedite roll-out of Wicked Free Wifi to Four Corners/ Geneva station areaFairmount/Indigo Line CDC Collaborative, Rep. Russell Holmes, FC Artist in ResidenceWicked Free Wifi, Mayor Walsh, Other public officials
2) Connect electricity and install outlets at platform and/or bus shelterFairmount/Indigo Line CDC Collaborative, Four Corners Main StreetMBTA, City of Boston, Public Works
3) Create solar charging station project with community volunteers and/or solar roof on bus shelter and station roofFairmount/Indigo Line CDC Collaborative, Bill Perkins, Boston ReStoreFC Artist in Residence, MBTA, Office of New Urban Mechanics, Public Works Dept, Codman Square NDC (CSNDC), Eco Innovation District$100-200
\n\n*Please see p.46 for Cost Estimate Sources*\nRecommendation 3: Activate the Bridge Bench & Public Art\n\nFoster intergenerational social interactions while people are waiting for the bus and create better visibility for the buses (than the current shelter provides).\n\nPart of creative placemaking is about bringing neighbors together to activate spaces and build community. This simple bench offers bus riders not just a place to rest where they can see the bus, but a chance to talk, play games, and learn about the commuter rail. The one prototype bench we put in has been heavily used and community members want more!\n\nWhat Will Improve\n\n✓ People feel reassured when they see the bus coming from where they sit\n✓ More seating available, better for elderly\n✓ More fun, chances to talk, let kids play\nWhat about interactive poetry?\n\nI like how the game component brings people together.\n\nCity Year Boston could help with painting and maintenance.\n\nWhat about an overhang or heaters to protect us in the winter?\n\nWhat about interactive public art, like the “Kendall Band” at MIT stop?\n\nWhat about bilingual reading material for while you sit? It could be stored in an arm rest.\n### RECOMMENDATION 3: ACTIVATE THE BRIDGE: BENCH AND PUBLIC ART\n\n#### IMPLEMENTATION TIME LINE & RESOURCES\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\nTest Track Sections Evaluate Use of Cold Central-Plant Recycling for High-Volume Roads\n\nCold central-plant recycling (CCPR) is gaining interest as a cost-effective alternative for base layers in pavement reconstruction. CCPR combines reclaimed asphalt pavement (RAP) with foamed or emulsified asphalt in a central production plant without the application of heat. The resulting material is handled much like asphalt mixtures during pavement construction; the material is placed with conventional pavers and compacted with traditional rollers.\n\nThe CCPR process provides an opportunity to use excessive RAP stockpiles in a beneficial application. Although the CCPR material is similar to that produced using cold in-place recycling (CIR), CCPR offers more opportunities for quality control during production and can also be used in areas where CIR would be impractical. CCPR has been used more often in the western U.S., including California and Nevada, where it has been used successfully on city streets and other low-volume applications. While the technique is not new, advances in binder materials, RAP processing and cold mix production have made CCPR an increasingly attractive choice for producing an economical material for a long-lasting pavement.\n\nVirginia’s Experience on I-81\n\nIn 2011, the Virginia Department of Transportation (VDOT) placed a CCPR base on a 3.66-mile section of I-81 in Augusta County. This high-profile project combined three recycling processes—CCPR, CIR and full-depth reclamation (FDR)—for the first time ever on one Interstate highway project.\n\nSignificant deterioration of the existing underlying pavement structure warranted complete reconstruction of the right-hand lane. The existing asphalt was milled, leaving just one inch of asphalt that was processed using FDR with the existing aggregate base and upper portion of the subgrade. The RAP from milling was then mixed with foamed asphalt and Portland cement in an onsite CCPR mobile plant and placed in a 6-inch layer using conventional paving equipment. The CCPR base was covered with 6 inches of conventional asphalt overlay. In the left-hand passing lane, the existing pavement structure was in better condition. Since no reconstruction of the aggregate base was needed, this lane was recycled in-place using the CIR method to a depth of five inches (following a 2-inch pre-mill operation) and topped with 4 inches of conventional asphalt mix.\n\nUsing these time-saving onsite recycling methods allowed VDOT to employ a unique traffic-management plan incorporating a single lane closure and detour for passenger cars. If conventional construction techniques had been used, the reconstruction project could have required building another lane to accommodate\nwork-zone traffic and could have taken years rather than months to complete. Recycling not only saved time on this project, but also huge quantities of new materials, as well as the fuel consumed in transporting them. By using onsite recycling techniques such as CCPR, CIR and FDR, this $7.64 million project allowed the repair of deep failures at significant taxpayer savings and with substantially less construction-related traffic delays.\n\nCCPR Research at NCAT Pavement Test Track\n\nVDOT is sponsoring three sections on the 2012 NCAT Pavement Test Track research cycle to further evaluate the use of CCPR base material for high-volume applications. In order to determine the structural contribution of CCPR base in pavement design, all three sections are instrumented for recording structural response under loading. Sections N3 and N4 are comparing the overlay thickness of conventional asphalt mixes (6 inches vs. 4 inches, respectively) when placed over a CCPR base. Section S12 compares FDR with the conventional base and subgrade construction used in N4.\n\nCross-sections of the three VDOT-sponsored test sections are pictured in Figure 1. All three were built on the same subgrade material. Sections N3 and N4 were built on a crushed granite base course, while S12 featured a stabilized base course that was constructed using FDR, treated with cement and compacted in place. A CCPR layer was constructed above the base layers. Superpave mixtures were placed on top of the CCPR layer and each section was surfaced with stone matrix asphalt (SMA). Section N3 had the thickest asphalt concrete (AC) layers (6 inches total), while the other two sections used approximately 4 inches of AC above the CCPR. Strain gauges and temperature probes were embedded during construction. Although other gauges were also installed, the focus here is solely on the horizontal strain measurements as an indicator of how bottom-up cracking may develop. The temperature probes monitor mid-depth pavement temperature crucial to understanding the environmental effects on these pavements.\n\nProduction of the CCPR base at the NCAT Pavement Test Track is shown in Figure 2. The RAP was first processed to a top size of one-half inch and then mixed with 2 percent foamed asphalt binder and 1 percent Portland cement in an onsite mobile cold recycling plant. The CCPR material was placed in a single lift and compacted to a target layer thickness of 5 inches using conventional paving equipment.\n\nA fleet of heavily loaded trucks circles the track 16 hours a day, five days a week, resulting in 10 million equivalent single axle loads (ESALs) applied over a two-year period. The sections have been subjected to weekly structural response monitoring since the onset of trafficking in October 2012. Figure 3 shows the horizontal strain response in each section through January 2014. As expected, the lowest strain levels were measured in S12 where the stabilized base course contributes to less overall bending of the AC layers. The highest strain levels were observed in N4, which had the thinnest AC over the conventional aggregate base layer, while section N3—with 6 inches of AC—experienced intermediate strain levels. Also of note is the general insensitivity of S12 to the change in season and temperature. While N3 and N4 both experienced significantly higher strain levels during the warm summer months and lower strains during cooler periods, S12 did not—presumably due to the stabilized base course not changing appreciably with\ntemperature. Since cracking has not been observed in any of these sections, it remains to be seen what effect the various strain levels have on cracking performance. At this point, the sections are all performing well.\n\nIn addition to monitoring the strain response, the sections are tested using the falling weight deflectometer (FWD) several times per month. This testing helps determine the backcalculated modulus of the AC. Figure 4 shows the backcalculated AC modulus of each section at a standard reference temperature of 68°F. The scatter in the data on particular test dates represents normal spatial variation throughout each section. Linear trendlines fit to each data set show that the moduli are generally holding steady over time. This is an indicator of structural health, as one would expect a drop in modulus, or highly erratic modulus values, if damage were occurring in a section. N3 and N4 show a very slight decline over time while S12 seems to have a slight increase over time. This may be due to the backcalculation process attributing some of the stabilized base material, which is curing over time, to the asphalt concrete. In any case, the backcalculated moduli values are signs of sound structures through this point of the experiment.\n\nContinuing Use of CCPR in Virginia\n\nTo date, both the I-81 recycling project and the CCPR test sections at NCAT are showing good performance. “VDOT is testing these recycling technologies in real-world heavy-application scenarios, and based on the successful performance we’ve seen so far, we’d like to move forward on additional projects,” says Trenton Clark, Director of Engineering for the Virginia Asphalt Association. VDOT is currently revising their specifications for CCPR as well as developing permissive use specifications that will allow for alternate bids on cold recycling vs. traditional", "num_tokens": 2048} {"category": "olmocr_science_pdfs-transportation", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-transportation/part-00-00000.npy", "text": " 364-3188 or gularte@watertransit.org\n\nWestern Contra Costa Transit Authority (WestCAT)\nRob Thompson\n(510) 724-3331 or rob@westcat.org\nSmall Business Certifications\n\n(all links below are ‘active’ so please just click on them to go to the resource):\n\n- Disadvantaged Business Enterprise (DBE) Certification\n- California Small Business Enterprise Certification (SBE)\n- California Disabled Veteran Business Enterprise (DVBE)\n- Minority, Women, and LGBT Business Enterprise (MBE, WBE, LGBTBE) Certification\n- San Francisco County Local Business Enterprise (SF LBE)\n- Oakland Local Business Enterprise (OAK LBE)\n\nThe California Small Business Development Center (SBDC) Program\n\nThe California Small Business Development Center (SBDC) Program is the leader in providing business owners and entrepreneurs with the tools and guidance needed to become successful. Direct and personalized assistance is provided to entrepreneurs through professional consulting, supplemented by low-cost or free classes. SBDC consultants are professionals with extensive experience in assisting business owners across a wide variety of different industries and are able and available to assist with all aspects of a business’s management and growth. These services are delivered throughout California via an extensive network of local Centers.\n\n- Alameda: ACSBDC.org\n- Contra Costa: ContraCostaSBDC.org\n- Del Norte: NorthCoastSBDC.org\n- Marin: MarinSBDC.org\n- Mendocino: MendoSBDC.org\n- Napa: NapaSonomaSBDC.org\n- San Francisco: SFSBDC.org\n- San Mateo: SanMateoSBDC.org\n- Santa Clara: SVSBDC.org\n- Santa Cruz: SantaCruzSBDC.org\n- Solano: SolanoSBDC.org\n- Sonoma: SonomaSBDC.org\n- Humboldt: NorthCoastSBDC.org\n\nSCORE is the nation’s largest network of business mentors, with more than 10,000 volunteers in 300 chapters nationally. SCORE mentors help businesses get off the ground, grow, and achieve their goals through education and 1-on-1 counselling.\n\n- East Bay: EastBay.SCORE.org\n- North Bay: NorthCoast.SCORE.org\n- Central Coast: SantaCruz.SCORE.org\n- South Bay: SiliconValley.SCORE.org\n- San Francisco: SanFrancisco.SCORE.org\n\nWomen’s Business Centers (WBCs) represent a national network of over 100 educational centers throughout the United States and its territories, which exist assist women in starting and growing small businesses.\n\n- San Francisco: RenCenter.org\n- East Bay: AnewAmerica.org\n- Mendocino: WestCompany.org\n- South Bay: AnewAmerica.org\n\nThe Veteran’s Business Outreach Center (VBOC) provides services such as business training, counseling, mentoring, and referrals for veterans owning or considering starting a business. Services are offered to veterans at no cost.\n\nVBOCIX.org\nThe Northern California Procurement Technical Assistance Center (PTAC) can help you sell to federal, state, local, or tribal government agencies. Services are provided at no cost.\n\nNorCalPTAC.org\n\nBART would like to thank our BART SBSS Program Partner, the United States Small Business Administration.\n\nVIEW BART SBSS CALENDAR\n\nCAN'T FIND WHAT YOU ARE LOOKING FOR? CONTACT US AT SBSUPPORTSERVICES@BART.GOV<|endoftext|>Single-track train timetabling with guaranteed optimality: Branch-and-bound algorithms with enhanced lower bounds\n\nXuesong Zhou a,*, Ming Zhong b\n\na Department of Civil, Construction and Environmental Engineering, North Carolina State University, Raleigh, NC 27695, USA\nb Department of Decision and Information Technologies, Robert H. Smith School of Business, University of Maryland, College Park, MD 20742, USA\n\nReceived 2 June 2005; received in revised form 9 April 2006; accepted 5 May 2006\n\nAbstract\n\nA single-track train timetabling problem is studied in order to minimize the total train travel time, subject to a set of operational and safety requirements. This research proposes a generalized resource-constrained project scheduling formulation which considers segment and station headway capacities as limited resources, and presents a branch-and-bound solution procedure to obtain feasible schedules with guaranteed optimality. The search algorithm chronologically adds precedence relation constraints between conflicting trains to eliminate conflicts, and the resulting sub-problems are solved by the longest path algorithm to determine the earliest start times for each train in different segments. This study adapts three approaches to effectively reduce the solution space. First, a Lagrangian relaxation based lower bound rule is used to dualize segment and station entering headway capacity constraints. Second, an exact lower bound rule is used to estimate the least train delay for resolving the remaining crossing conflicts in a partial schedule. Third, a tight upper bound is constructed by a beam search heuristic method. Comprehensive numerical experiments are conducted to illustrate the computational performance of the proposed lower bound rules and heuristic upper bound construction methods.\n\nKeywords: Train timetabling; Lagrangian relaxation; Branch and bound; Heuristics; Railway\n\n1. Introduction\n\nA train timetable defines the planned arrival and departure times of trains to/from yards, terminals and sidings, and train scheduling plays a vital role in managing and operating complex railroad systems. From a marketing point of view, the level-of-service of train timetables is an important factor that affects travelers’ and freight carriers’ decisions in choosing desirable transportation modes. From a railroad operations point of...\nA wide range of studies have been devoted to the train scheduling problem in the last three decades, particularly regarding the development of mathematical formulations and solution algorithms. Szpijgel (1973) first modeled the train scheduling problem as a mixed integer program and applied Greenberg’s (1968) branch-and-bound solution framework (for a general job shop machine scheduling problem) to find timetables that minimize the total transit time, subject to overtaking and crossing headway constraints. Jovanovic and Harker (1991) presented a nonlinear integer programming model that minimizes the deviation between planned schedules and actual schedules, and used a branch-and-bound procedure to generate feasible meet-pass train plans. Carey (1994a,b) and Carey and Lockwood (1995) developed an iterative decomposition approach for solving the train timetabling and pathing problem in a rail network with one-way and two-way tracks; moreover, several node branching, variable fixing and bounding strategies were presented to reduce the search space. Higgins et al. (1996) developed a nonlinear integer programming model for minimizing the total train delay and fuel cost with variable train velocities, and they also presented a branch-and-bound solution algorithm with a lower bound estimator that utilizes a look-ahead rule to calculate the least delay for the remaining conflicts in a partial schedule. As remarked by the authors, the lower bound rule might overestimate the actual remaining delay for some trains theoretically, but only in exceptional cases. Their original efforts in this direction highlight the need for further investigations on strict lower bound rules in an inept enumeration search framework. It should be also noted that several stochastic analytical models (e.g., Petersen and Taylor, 1982; Chen and Harker, 1990; Higgins and Kozan, 1998) have been developed to estimate the average delay of a train schedule, but these models are not suitable for serving as strict lower bound rules in the deterministic case. Brannlund et al. (1998) proposed an integer programming model to find a profit-maximizing timetable and designed a Lagrangian relaxation method to dualize track capacity constraints. The resulting subproblems were solved by the shortest path algorithm in conjunction with several improved dual updating schemes. Based on a graph-theoretic formulation for the periodic-timetabling problem in a rail line, Caprara et al. (2002) presented a Lagrangian relaxation solution method, in which a dynamic constraint generation (often referred to as relax-and-cut) scheme was used to handle a large number of dualized constraints. In general, without being embedded into the branch-and-bound search scheme, the Lagrangian relaxation approach can hardly guarantee the discovery of optimal solutions, due to the existence of duality gaps and the limitation of primal heuristic search algorithms. Kroon and Peeters (2003) developed a periodic event scheduling model to consider variable trip times for the cyclic railway timetabling problem. Zhou and Zhong (2005) proposed a multi-mode resource-constrained project scheduling formulation to consider acceleration and deceleration time losses in double-track train timetabling applications, and designed several dominance rules to find Pareto optimum schedules in an intercity passenger corridor.\n\nThe train scheduling problem is known to be NP-hard (Cai et al., 1998; Caprara et al., 2002), and optimal solutions are typically unattainable in large-scale and complex instances. To meet the computational requirements in real-world applications, a heuristic approach becomes a necessity for generating feasible and suboptimal solutions. Specifically, a number of simple priority rules have been widely used because of their low computational complexity and easy implementation. Given a pair of conflicting trains, a simple priority rule determines which train to schedule next by utilizing underlying objective functions, for instance, the total delay for the minimal travel time criterion (Petersen et al., 1986; Kraay and Harker, 1995), the schedule deviation and tightness for the minimal deviation criterion (Chen and Harker, 1990), train priorities (Petersen et al., 1986), and the number of passengers transported (Ad", "num_tokens": 2048} {"category": "olmocr_science_pdfs-transportation", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-transportation/part-00-00000.npy", "text": " ELD Logout event with a note “ELD Disconnection”\n o a Remark with the note “VBUS Disconnected”\n\nNote:\n\n- The graph-grid overlay periods of driver’s indications of authorized personal use of CMV and yard moves using a different style line (such as the dashed or dotted line in amber color).\n- When ‘Show all events’ toggle switch is off, the following Remark events are hidden: Diagnostic/Malfunction clears, Vbus Connect/Disconnect, Authenticate/Unauthenticate, Dvir Not performed/ Dvir Completed, Log certified remark, Start of day Odometer remark, and Toll road start/stop.\nCrossing Boundaries\n\nThe border crossing calculation uses the VBUS GPS coordinates if they are available, and the android coordinates if they are not. The following instances happens when the driver crossed boundaries between Canada and US (vice versa):\n\na. If the GPS coordinates are changed to a different state or province, a remark event will be recorded in the driver log.\n\nb. If the current location is in Canada, the driving rules will automatically switched to Canadian rules. Similarly, if the location is in the US, the driving rules automatically switched to US rules.\n\nc. If there is a co-driver logged in, both the remark and the rules changes will be occurring to be applied for him/her as well.\n5.3 Malfunction and Data Diagnostic Events\n\nAt each instance when an ELD malfunction or data diagnostic event is detected or cleared by the ELD, the ELD records the event. The recorded malfunctions and data diagnostic events are inconsistencies found while monitoring the app/ELD against FMCSA compliance requirements. These instances are indicated in the application header and in the Android notification toolbar with the letters M and D, respectively.\n\n**Note:** The ELD Data Diagnostic indicator provides notification of active data diagnostics events applicable to the active driver. The Data Diagnostics “D” icon will flash in amber color if there are new active Data Diagnostics events that is not yet reviewed by the driver and will only turn back to white once the Data Diagnostic dialog is closed after being reviewed by the driver. There will also be a notification in the Android toolbar indicating a malfunction or a data diagnostic event.\n\nThe Malfunction and Data Diagnostic events note can also be edited on the edit log screen.\n\nTap the **Clear button** to clear the malfunction or data diagnostic event detected.\n\nTo clear all Data Diagnostic Events, tap the **Clear All button**.\n
Action StepAlready Willing SupportersPotential AlliesCost Estimate, if applicable
1) Create public art program for artists, residents, and merchants interested in collaborating on bench creation • Seek in-kind donations for construction and materialsFairmount/Indigo Line CDC Collaborative, Four Corners Main Streets, Greater Four Corners Action Coalition, Four Corners Artist in Residence, Public Art Salons, Erie Ellington and Brinsley Partnership Neighborhood Association (EEBPNA)Rep. Russell Holmes, MBTA, Public Works Dept, Hardware stores
2) Create sustainable public art programming to continue public engagement in arts activitiesFairmount/Indigo Line CDC Collaborative, Four Corners Artist in Residence, Fairmount Cultural Corridor, FC Main Streets, EEBPNAErick Jeanne Center for the Arts, Dorchester Arts Collaborative, Caribbean Arts Gallery, MBTA, Rep. Russell Holmes, CSNDC, Fairmount Cultural Corridor, Neighborhood drummers, poetry and dance groups
3) Negotiate agreements with public agencies and property owners involved regarding activity on the bridgeFairmount/Indigo Line CDC Collaborative, FC Main Streets, EEBPNAMBTA, Rep Holms, CSNDC
\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
Requirement No.Event CodeEvent NameDescription
4.6.1.1P / Power MFPower MalfunctionAn ELD must set a power compliance malfunction if the power data diagnostics event described in paragraph 4.6.1.1(a) of this appendix indicates an aggregated in-motion driving time understatement of 30 minutes or more on the ELD over a 24-hour period across all driver profiles, including the unidentified driver profile.
4.6.1.2E / Sync MFEngine Synchronization MalfunctionAn ELD must set an engine synchronization compliance malfunction if connectivity to any of the required data sources specified in section 4.3.1 of this appendix is lost for more than 30 minutes during a 24-hour period aggregated across all driver profiles, including the unidentified driver profile.
4.6.1.3T / Timing MFTiming MalfunctionThe ELD must periodically cross-check its compliance with the requirement specified in section 4.3.1.5 of this appendix with respect to an accurate external UTC source and must record a timing compliance malfunction when it can no longer meet the underlying compliance requirement.
4.6.1.4L / Pos MFPosition MalfunctionELD records requiring location information must use the last valid position measurement and include the latitude/longitude coordinates.
\nAn ELD must monitor elapsed time during periods when the ELD fails to acquire a valid position measurement within 5 miles of the CMV’s movement. When such elapsed time exceeds a cumulative 60 minutes over a 24-hour period, the ELD must set and record a positioning compliance malfunction.\n\n### 4.6.1.5 R/DR MF Data Recording Malfunction\n\nAn ELD must monitor its storage capacity and integrity and must detect a data recording compliance malfunction if it can no longer record or retain required events or retrieve recorded logs that are not otherwise catalogued remotely by the motor carrier.\n\n### 4.6.1.7 S/Trans MF Data Transfer Malfunction\n\n(a) An ELD must implement in-service monitoring functions to verify that the data transfer mechanism(s) described in section 4.9.1 of this appendix are continuing to function properly. An ELD must verify this functionality at least once every 7 days. These monitoring functions may be automatic or may involve manual steps for a driver.\n\n(c) After an ELD records a data transfer data diagnostic event, the ELD must increase the frequency of the monitoring function to\ncheck at least once every 24-hour period. If the ELD stays in the unconfirmed data transfer mode following the next three 90 consecutive monitoring checks, the ELD must detect a data transfer compliance malfunction.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
Requirement No.Event CodeEvent NameDescription
4.6.1.11 / Pwd DiagPower DiagnosticAn ELD must monitor data it receives from the engine ECM or alternative sources as allowed in sections 4.3.1.1-4.3.1.4 of this appendix, its onboard sensors, and data record history to identify instances when it may not have complied with the power requirements specified in section 4.3.1.1, in which case, the ELD must record a power data diagnostics event for the corresponding driver(s), or under
SectionPageDescription
----------------------------
4.6.1.22Engine Synchronization Diagnostic
An ELD required to establish a link to the engine ECM as described in section 4.2 must monitor its connectivity to the engine ECM and its ability to retrieve the vehicle parameters described under section 4.3.1 of this appendix and must record an engine-synchronization data diagnostics event when it no longer can acquire updated values for the ELD parameters required for records within 5 seconds of the need.
4.6.1.4 (d)3Missing Data Elements Diagnostic
If a new ELD event must be recorded at an instance when the ELD had failed to acquire a valid position measurement within the most recent elapsed 5 miles of driving, but the ELD has not yet set a positioning compliance malfunction, the ELD must record the character “X” in both the latitude and longitude fields, unless location is 88 entered manually by the driver, in which case it must log the character “M” instead. Under the circumstances listed in this paragraph, if the ELD event is due to a change in duty status for the driver, the ELD must prompt the driver to enter location manually in accordance with section 4.3.2.7 of this appendix. If the driver does not enter the location information and the
SectionCategoryEvent Description
--------------------------------------
\n| 4.6.1.7 | Trans Diag | Data Transfer Diagnostic \n(b) If the monitoring mechanism fails to confirm proper in-service operation of the data transfer mechanism(s), an ELD must record a data transfer data diagnostic event and enter an unconfirmed data transfer mode. |\n| 4.6.1.6 | Unid Diag | Unidentified Driver Diagnostic \n(b) If more than 30 minutes of driving in a 24-hour period show unidentified driver on the ELD, the ELD must detect and record an unidentified driving records data diagnostic event and the data diagnostic indicator must be turned on for all drivers logged in to that ELD for the current 24-hour period and the following 7 days. \n(c) An unidentified driving records data diagnostic event can be cleared by the ELD when driving time logged under the unidentified driver profile for the current 24-hour period and the previous 7 consecutive days drops to 15 minutes or less. |\n| 4.6.1.8 | Other Diag | Other Diagnostic \nIn addition to the required monitoring schemes described in sections 4.6.1.1–", "num_tokens": 2048} {"category": "olmocr_science_pdfs-transportation", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-transportation/part-00-00000.npy", "text": "psilon_{i,u}^{(q)} - 1 \\right]^\text{T}.\n\\]\n\nOur testing experiences indicate that the parameter \\( \\lambda = 0.7 \\) is an appropriate value to combine the previous multiplier values with the current subgradient information. The step size parameter is updated as\n\n\\[\n\\alpha^q = \\mu^q \\frac{\\langle \\bar{L} - L^q \\rangle}{\\| A^q \\|},\n\\]\n\nwhere \\( \\bar{L} \\) is the optimal solution and \\( L^q \\) is the value of \\( L \\) at iteration \\( q \\). In our implementation, a feasible solution generated from a priority rule-based heuristic method is used to replace the optimal solution \\( \\bar{L} \\). Note that, \\( 0 < \\mu^q < 2 \\) is required to ensure theoretical convergence. Clearly, a small step size \\( \\mu^q \\) could lead to a slow convergence rate, but a large step size could result in serious oscillations. In our experiment, \\( \\mu^q \\) is set to \\( 1/(q + 1) \\), and we stop decreasing \\( \\mu^q \\) after a certain number of iterations.\n\nIt is well known that the applicability and effectiveness of the Lagrangian method rely on having a relatively small number of constraints to dualize. Since there are a total of \\( (2m - 1) \\times T \\) station and segment resources, the dimension of the capacity constraints in a train scheduling problem is extremely large, leading to a very large \\( \\| A^q \\| \\) but a negligible step size in Eq. (24). Recognizing that most of the resource constraints are non-binding in an optimal train scheduling solution, a relax-and-cut logic described in Caprara et al. (2002) is\nadapted here to dynamically relax resource capacity constraints by only dualizing a subset of constraints at every iteration. Specifically, if a resource has not been used within recent several iterations, the algorithm automatically resets the price for the unused resource back to zero. With this dynamic constraint generation scheme, the set of Lagrangian multipliers varies along the iterative process. In the branch-and-bound process, the previously optimized values of the multipliers at a predecessor node are used as the initial values for multipliers associated with the corresponding successor nodes.\n\n4.2. Crossing conflict-based lower bounds\n\nAlthough Lagrangian relaxation offers a natural way to construct a lower bound estimate for constrained resources, it still requires considerable computational effort, as illustrated previously. In this study, we propose a simple lower bound rule for the single-track train timetabling problem by recognizing the unique minimum headway requirements. Essentially, this lower bound rule estimates the minimum additional train delay for resolving the remaining crossing conflicts in a partial schedule, and it ignores the existing overtaking conflicts and new conflicts that could be generated in the future.\n\nTo calculate this lower bound, we first estimate the minimum additional delay for resolving a single crossing conflict, and then count the total additional delay for all the existing crossing conflicts in a partial schedule. As shown in plots (a) and (b) of Fig. 7, a conflict is said to be a crossing conflict when two trains run in opposite directions or an overtaking conflict when two trains run in the same direction. Mathematically, we can define a crossing conflict as a conflict if\n\\[ e_{i,j} \\geq s_{f,j}, e_{f,j} \\geq s_{i,j}, \\quad \\text{and} \\quad o(i) \\neq o(i'), \\] and an overtaking conflict as a conflict if\n\\[ e_{i,j} \\geq e_{f,j}, s_{f,j} \\geq s_{i,j}, \\quad \\text{and} \\quad o(i) = o(i'). \\] (25)\n\nFig. 8 shows a conflict between two trains \\( i \\) and \\( i' \\) at segment \\( j \\). If train \\( i \\) is scheduled first, then the resulting delay for train \\( i' \\) is \\( e_{i,j} + h_j - s_{i,j} \\), otherwise, scheduling train \\( i' \\) first delays train \\( i \\) with \\( e_{i,j} + h_j - s_{i,j} \\) time units. Hence, the following proposition is in order.\n\n**Proposition 1.** The minimal additional delay for resolving a crossing conflict at segment \\( j \\) is\n\\[ \\min(h_j + e_{i,j} - s_{f,j}, h_j + e_{f,j} - s_{i,j}) = h_j + \\min(e_{i,j} - s_{f,j}, e_{f,j} - s_{i,j}) \\geq h_j. \\] (27)\n\nIn fact, resolving a crossing conflict at an intermediate station should maintain minimum headways at the corresponding upstream and downstream segments, so the resulting delay is the sum of additional delays at two adjacent segments. For example, Fig. 9 shows two trains \\( i \\) and \\( i' \\) involved in a crossing conflict at station\n\n![Fig. 7. Illustration of a crossing conflict and overtaking conflict.](image)\n\n![Fig. 8. Illustration of additional delay for resolving a conflict at a segment.](image)\nProposition 3. Consider trains $i$ and $i'$ starting at stations $u_0$ and $u_2$, respectively. Train $i$ travels from station $u_0$ to station $u_2$ and train $i'$ travels from $u_2$ to $u_0$. Segments $j$ and $j+1$ are two segments adjacent to stations $u$. Formally, we have the following proposition.\n\nProposition 2. Consider trains $i$ and $i'$ running from $u_0$ to $u_2$ and from $u_2$ to $u_0$, respectively, and they have no required dwell times between stations $u_0$ and $u_2$. If they have to meet at an intermediate station, the minimal additional delay for resolving a crossing conflict at any intermediate station between stations $u_0$ and $u_2$ is $g + h$, where $g = \\min_u g_u$ and $h = \\min_j h_j$.\n\nProof. Suppose we resolve a crossing conflict between trains $i$ and $i'$ at station $u$. If train $i'$ passes through station $u$ first, then train $i$ is delayed by at least $g_u + h_{j+1}$ time units, but if train $i$ passes through station $u$ first, then train $i'$ is delayed $g_u + h_j$ time units. Since the exact intermediate station for trains to meet is generally unknown, at least $g + h$ time units of delays are required to resolve a crossing conflict at any intermediate station.\n\nConsider Fig. 9(b) and (c), we have two parts of the additional delay at station $u$: part I is the headway between the arrival times of the two trains at station $u$, and part II is the headway between the departure times of the two trains. Since the departure time of the second train is only constrained by the minimum headway, the $h$ time units in the lower bound rule are, in fact, an accurate estimate for the delay associated with part II. In contrast, the arrival times of these two trains at station $u$ are determined by their previous path trajectories separately, so the first train might arrive at station $u$ much earlier than the second train. In this case, the minimum headway of $g$ time units might significantly underestimate the actual delay in part I. On the other hand, the actual delay in part I at station $u$ generally should not be greater than the free running time of downstream segment $j + 1$, otherwise it could be advantageous to change the train meeting station.\n\nIf no headway constraint is imposed on consecutive train arrival times at stations, it is easy to verify that the minimal additional delay for resolving a crossing conflict at an intermediate siding is $2h$ by replacing $g$ with $h$. To determine if two trains have to meet at one of the intermediate stations, we can estimate the possible meeting region based on feasible dwell time windows specified for two trains. The related proposition is given as follows.\n\nProposition 3. Consider trains $i$ and $i'$ starting at stations $u_0$ and $u_2$, respectively. Train $i$ travels from station $u_0$ to station $u_2$ and train $i'$ travels from $u_2$ to $u_0$. Suppose that at least one intermediate station exists between the stations, and that they have no required dwell times between stations $u_0$ and $u_2$. If $e_{i,j_1} \\geq s_{i,j_1} + d_{i,j_1}$ and $e_{i,j_2} \\geq s_{i,j_2} + d_{i,j_2}$, then the minimal additional delay for resolving the crossing conflict between trains $i$ and $i'$ is $g + h$.\n\nProof. If $e_{i,j_1} \\geq s_{i,j_1} + d_{i,j_1}$ and $e_{i,j_2} \\geq s_{i,j_2} + d_{i,j_2}$, then $e_{i,j_1} \\geq s_{i,j_1}$ and $e_{i,j_2} \\", "num_tokens": 2048} {"category": "olmocr_science_pdfs-transportation", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-transportation/part-00-00000.npy", "text": " – (2) backlit flashing linear high-intensity LED lights\n - Taillamp Lighting Solution – Halogen base lamps and (2) integrated hemispheric lighthead white LED marker lights.\n - Rear Lighting Solution – (2) backlit flashing, linear high-intensity LED lights (mounted inside liftgate glass) and (2) backlit flashing, linear high-intensity LED lights (mounted inside the liftgate lip)\n - Front Console Mounting Plate\n - Rear Console Plate\n - Hidden Door Lock Plungers\n - Control System – CenCom controller, control head, and wire\n - 100-watt Siren/Speaker – Includes wire\n - Wire Harness – (2) light connectors that supports up to (6) LED lights each (engine compartment), (2) grilled LED light connectors, (1) 10-amp siren/speaker circuit (engine to cargo area)\n - Whelen CenCom relay center/siren/amp with Traffic Advisor\n - Light controller/relay/CenCom wiring (wiring Harness) with additional input/output pigtails\n - High-current pigtail\n - Whelen specific WECAN cable connects CenCom to control head\n - Pre-wiring for grille LED lights, siren and speaker\n - Overlay wiring harness, grille LED lights, siren and speaker wiring, and control power harness\n\nADDITIONS OR DEVIATIONS FROM THESE SPECIFICATIONS MUST BE NOTED ON THE BID DOCUMENTS.\n**ATTACHMENT B**\n\n**PROPOSAL COVER SHEET**\n\nThis cover sheet must be placed on the very top of your proposal.\n\n**Bid Title:** Four (4) 2022 Police Utility Vehicles \nFord Explorer Interceptor or Chevrolet Tahoe PPV\n\n**Bid Due Date & Time:**\n\nWe have received all documents related to the above referenced project. We have examined all documents and have had the opportunity to submit questions for clarification. We hereby propose to furnish vehicles per the specifications as follows:\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
Year, Make & Model of Proposed Vehicle(s)Total Lump Sum Price of Vehicle(s)
• Including vehicle prep & delivery
• Tax Exempt – Do not include tax
\n\n| Estimated Delivery Date: |\n\n\n\n\n\n\n\n
Company Name:
\n\n\n\n\n\n\n\n
Address:
\n\n\n\n\n\n\n\n
Federal Identification Number:
\n\nBy:________________________________________________ \n ____________________________ (Authorized Signature) (Date)\n\nTitle:__________________________________________________________\nATTACHMENT C\n\nNON-COLLUSION CERTIFICATE\n\nI HEREBY CERTIFY I am the ____________________________________________________\n\n(Title)\n\nand the duly authorized representative of the firm of __________________________________\n\nwhose address is________________________________________________________________\n\nAND THAT NEITHER I nor, to the best of my knowledge, information and belief, the above\nfirm nor any of its other representatives I here represent have:\n\n(a) Agreed, conspired, connived or colluded to produce a deceptive show of\ncompetition in the compilation of the bid or offer being submitted herewith;\n\n(b) Not in any manner, directly or indirectly, entered into any agreement, participated\nin any collusion to fix the bid price or price proposal of the bidder or offeror\nherein or any competitor, or competitive bidding in connection with the Contract\nfor which the within bid or offer is submitted; and that no member of the County\nCommission of Jefferson County, West Virginia, administrative or supervisory\npersonnel or other employees of Jefferson County have any interest in the bidding\ncompany except as follows: (complete if applicable)\n\n______________________________________________________________________________\n\n______________________________________________________________________________\n\n______________________________________________________________________________\n\nI solemnly affirm under the penalties of perjury that the contents are true to the best of my\nknowledge, information, and belief.\n\nSignature: ______________________ Printed or Typed Name: ________________________\n\nDate: ______________________<|endoftext|>### Document Information\n\n### Version History\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
VersionDateAuthorReviewer
162110/26/16Editha DuraRoel Sinadjan
1622/162311/21/16Editha DuraRoel Sinadjan
162412/8/16Mia LadorozRoel Sinadjan
162512/20/16Mia LadorozRoel Sinadjan
162601/13/17Mia LadorozRoel Sinadjan
170101/26/17Mia LadorozRoel Sinadjan
170201/31/17Mia LadorozRoel Sinadjan
170302/14/17Mia LadorozRoel Sinadjan
170402/28/17Mia LadorozRoel Sinadjan
170503/15/17Mia LadorozRoel Sinadjan
170603/24/17Mia LadorozRoel Sinadjan
1707/170804/24/17Mia LadorozRoel Sinadjan
1709/171005/23/17Editha DuraRoel Sinadjan
1711/171206/21/17Editha DuraMia Ladoroz/Roel Sinadjan
1713/171507/18/17Editha DuraMia Ladoroz/Roel Sinadjan
1716-171708/15/17Editha DuraMia Ladoroz/Roel Sinadjan
1718/171909/27/17Editha DuraMia Ladoroz/Roel Sinadjan
1720/172110/11/17Editha DuraRoel Sinadjan
1722/172312/05/17Precious Mae CeniaRoel Sinadjan
1724/180101/03/18Precious Mae CeniaRoel Sinadjan
1802/180302/10/18Precious Mae CeniaRoel Sinadjan
1804/180503/05/18Precious Mae CeniaRoel Sinadjan
1806/1816", "num_tokens": 2048} {"category": "olmocr_science_pdfs-transportation", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-transportation/part-00-00000.npy", "text": "autics Commission's approach plan for the airport.\n\nSection 55. That § 50-10-7 be amended to read as follows:\n\n50-10-7. In the event that a political subdivision has adopted, or hereafter adopts, a general zoning ordinance regulating, among other things, the height of buildings, any airport zoning regulations adopted for the same area or portion thereof under this chapter, may be incorporated in and made a part of such general zoning regulations, and be administered and enforced in connection therewith, but such may not limit the effectiveness or scope of the regulations adopted under this chapter.\n\nSection 56. That § 50-10-8 be amended to read as follows:\n\n50-10-8. Any zoning or other regulations applicable to any area within which, according to an airport approach plan adopted by the commission, measures should be taken for the protection of airport approaches, including not only any airport zoning regulations adopted under this chapter but any zoning or other regulations dealing with the same or similar matters, that have been or may be adopted under authority other than that conferred by this chapter, shall be consistent with, and conform to, the commission's approach plan for such area, and. The regulations shall be amended from time to time as may be necessary to conform to any revision of the plan that may be made by the commission.\n\nSection 57. That § 50-10-9 be amended to read as follows:\n\n50-10-9. All airport zoning regulations adopted under this chapter may be reasonable, and none unreasonable. No regulation shall require the removal, lowering, or other change or alteration of any structure or tree not conforming to the regulations when adopted or amended, or otherwise interfere with the continuance of any nonconforming\nuse, except as provided in § 50-10-28.\n\nSection 58. That § 50-10-10 be amended to read as follows:\n\n50-10-10. Where advisable to facilitate the enforcement of zoning regulations adopted pursuant to this chapter, a system may be established for granting permits to establish or construct new structures and other uses and to replace existing structures and other uses or make substantial changes therein or substantial repairs thereof. In any event, before any nonconforming structure or tree may be replaced, substantially altered or repaired, rebuilt, allowed to grow higher, or replanted, a permit must be secured from the administrative agency authorized to administer and enforce the regulations, authorizing such replacement, change, or repair. No such permit may be granted that would allow the structure or tree in question to be made higher or become a greater hazard to air navigation than it was when the applicable regulation was adopted; and whenever, if the administrative agency determines that a nonconforming structure or tree has been abandoned or more than eighty percent physically deteriorated, or decayed, no permit may be granted that would allow said the structure or tree to exceed the applicable height limit or otherwise deviate from the zoning regulations. Except as indicated all applications for permits for replacement, change, or repair of nonconforming uses shall be granted.\n\nSection 59. That § 50-10-11 be amended to read as follows:\n\n50-10-11. Any person desiring to erect any structure, or to increase the height of any structure, or to permit the growth of any tree, or to otherwise use his the person's property, in violation of airport zoning regulations adopted under this chapter, may apply to the board of appeals, as provided in § 50-10-15, for a variance from the zoning regulations in question. Such variances A variance shall be allowed where if a literal application or enforcement of the regulations would result in practical difficulty or unnecessary hardship and the relief granted\nwould not be contrary to the public interest but would do substantial justice and be in accordance with the spirit of the regulations.\n\nSection 60. That § 50-10-13 be amended to read as follows:\n\n50-10-13. No airport zoning regulations shall be adopted, amended, or changed under this chapter except by action of the governing body of the political subdivision in question after a public hearing in relation thereto, at which parties in interest and citizens shall have an opportunity to be heard. Notice of the hearing shall be given at least fifteen days prior to the date of the hearing by publication of a notice of the time and place of holding the hearing in a legal newspaper or a newspaper of general circulation published in the political subdivision or subdivisions in which is located the airport hazard to be zoned, provided that, however, if there be no such newspaper, or newspaper published in the said subdivision or subdivisions, the notice shall be published in the nearest legal newspaper; or newspaper of general circulation.\n\nSection 61. That § 50-10-14 be amended to read as follows:\n\n50-10-14. The governing body of any political subdivision adopting airport zoning regulations under this chapter may delegate the duty of administering and enforcing the regulations to any administrative agency under its jurisdiction, but such administrative agency may not be or include any member of the board of appeals. The duties of the administrative agency shall include that of hearing and deciding all permits under § 50-10-10, but such agency may not have or exercise any of the powers delegated to the board of appeals.\n\nSection 62. That § 50-10-16 be amended to read as follows:\n\n50-10-16. The board established pursuant to § 50-10-15 shall adopt rules in accordance with the provisions of any ordinance adopted under this chapter. Meetings of the board shall be held\nat the call of the chairman chair and at such other times as the board may determine. The\nchairman chair, or in his the chair’s absence the acting chairman chair, may administer oaths and\ncompel the attendance of witnesses. All meetings of the board shall be public. The board shall\nkeep minutes of its proceedings, showing the vote of each member upon each question, or, if\nabsent or failing to vote, indicating such fact, and shall keep records of its examinations and\nother official actions, all of which. The minutes shall immediately be filed in the office of the\nboard and shall be are a public record.\n\nSection 63. That § 50-10-18 be amended to read as follows:\n\n50-10-18. An appeal pursuant to § 50-10-15 shall stay all proceedings in furtherance of the\naction appealed from, unless the agency from which the appeal is taken certifies to the board,\nafter the notice of appeal has been filed with it, that by reason of the facts stated in the certificate\na stay would, in its opinion, cause imminent peril to life or property. In such case, proceedings\nshall may not be stayed otherwise than by a restraining order which may be granted by the board\nor by a court of record on application on notice to the agency from which the appeal is taken and\non due cause shown.\n\nSection 64. That § 50-10-27 be amended to read as follows:\n\n50-10-27. In addition, either the political subdivision within which the property is located\nor the Aeronautics Commission commission may institute in any court of competent\njurisdiction, an action to prevent, restrain, correct, or abate any violation of this chapter, or of\nairport zoning regulations adopted under this chapter, or of any order or ruling made in\nconnection with their administration or enforcement; and the. The court shall adjudge to the\nplaintiff such relief, by way of injunction, which may be mandatory or otherwise, as may be\nproper under all the facts and circumstances of the case, in order fully to effectuate the purposes\nof this chapter and of the regulations adopted and orders and rulings made pursuant thereto.\nSection 65. That § 50-10-28 be amended to read as follows:\n\n50-10-28. In any case in which:\n\n(1) It is desired to remove, lower, or otherwise terminate a nonconforming use; or\n\n(2) The approach protection necessary according to the Aeronautics Commission's commission's airport approach plan cannot, because of constitutional limitations, be provided by airport zoning regulations under this chapter; or\n\n(3) It appears advisable that the necessary approach protection be provided by acquisition of property rights,\n\nthe political subdivision within which the property or nonconforming use is located, the political subdivision owning the airport or served by it, or the commission, shall acquire by purchase, grant, or condemnation in the manner provided by the law under which political subdivisions are authorized to acquire real property for public purposes, such an air right, easement, or other estate or interest in the property or nonconforming use in question as may be necessary to effectuate the purposes of this chapter.\n\nSection 66. That § 50-10-30 be repealed.\n\n50-10-30. If any provision of this chapter or the application thereof to any person or circumstances is held invalid, such invalidity shall not affect other provisions or applications of the chapter which can be given effect without the valid provision or application, and to this end the provisions of this chapter are declared to be severable.\n\nSection 67. That § 50-10-31 be repealed.\n\n50-10-31. This chapter shall be known and may be cited as the \"Model Airport Zoning Act.\"\n\nSection 68. That § 50-11-2 be amended to read as follows:\n\n50-11", "num_tokens": 2048} {"category": "olmocr_science_pdfs-transportation", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-transportation/part-00-00000.npy", "text": "9,332.00$70,361.00
\n\n* 0 mileage = EFT-24 is incomplete for that FY\n\nExport to Excel\n\n* N/A = not available\n\nMaine Department of Education\nHow Are Bus Approval Decisions Made? – First (1st) Priority\n\n• “Bus Replacement”\n – Emergency situation\n • An emergency situation occurs when a bus is damaged beyond economic repair due to:\n – accidents\n – fire\n – vandalism or\n – other [total] losses\n\nNote: Districts are responsible for school bus maintenance\nHow Are Bus Approval Decisions Made? – Second (2\\textsuperscript{nd}) Priority\n\n- “Addition to Fleet”\n - Unique situation\n - An “addition to fleet” situation occurs when a district needs buses to:\n - Transport handicapped students\n - Transport for a special purpose\n - Transport increased enrollment students\n - Replace contracted services (emergency)\n - Replace contracted services (planned)\n\nSource: CMR 05-071 Chapter 85\nHow Are Bus Approval Decisions Made? – Third (3\\textsuperscript{rd}) Priority\n\n- “Bus Replacement”\n - Age of the retiring bus\n- “Age as the primary consideration, tempered by both high and low mileage”\nMay Districts Buy A Bus Different From The Bus That Was Requested and Approved?\n\n- Bus approvals are based on the original bus request\n- Can SAUs change fiscal year of purchase?\n - No changes are permitted\n - Bus approvals are valid one (1) year\n - Approvals are not carried forward\n - If a district cannot purchase a bus during the fiscal year of a Department bus approval:\n - The district must cancel the approval\n - Failure to cancel a bus prevents redistribution of funds to other districts in need of buses\nBus approvals are based on the original bus request.\n\nCan SAUs change bus type: A, C, or D?\n- Requires Department approval before purchase\n- **Bus allocation will be reduced**\n - Change down: D to C or A; C to A\n - Total state bus approval allocation is reduced to the lower bus Type rate\n - Change up: A to C or D\n - Total state bus approval allocation is held at lower bus Type rate\nMay Districts Buy A Bus Different From The Bus That Was Requested and Approved? (cont.)\n\n- Bus approvals are based on the original bus request\n- Can SAUs change bus capacity?\n - Requires Department approval before purchase\n - Bus allocation will be reduced\n - Change from larger to smaller bus\n - Total allocation will be reduced to the max approval amount for the smaller bus\n - Change from smaller to larger bus\n - Total allocation will remain the same as the max approval amount for the smaller bus\nMay Districts Buy A Bus Different From The Bus That Was Requested and Approved? (cont.)\n\n- Bus approvals are based on the original bus request.\n- Can SAUs change bus purchase payment terms?\n - Requires Department approval before purchase.\n - Change from cash (1 year) to term (2 to 5 years).\n - District total allocation will remain the same.\n - Change from term to cash (1 year).\n - Bus allocation will be reduced.\n - Change term payment years.\n - Increase years, e.g. from 2 to 3: no reduction.\n - Decrease years, e.g. from 5 to 2: reduction.\nProgram Application Rounds\n\n• Round 1\n – Occurs annually\n – Applications open Nov. 1 and close Nov. 25\n – State approvals announced Dec. 30 to Jan. 15\n\n• Round 2\n – Depends on cancellations, may or may not occur\n – Opens after Round 1 approval announcement\n • All applications that did not make Round 1 approval are automatically moved to Round 2\n – No specific approval date (~March to Oct.)\n\nSource: CMR 05-071 Chapter 85\nProgram Reports\n\n• Bus Purchase Program reports\n – EFT-17 bus request\n – EFT-18 superintendent intent to purchase bus\n – EFT-19 bus cancellation\n – EFT-20 bus purchase\n\n• Annual transportation reports (July 1 through Oct. 15)\n – EFT-21 Transportation Safety and Training\n – EFT-24 Vehicle Mileage and Operations\n – EFM-43 OOD, SPED, Homeless and CTE\nProgram Subsidy Reminder\n\n- **Subsidy Amount**\n - ED 279 report, section 3 A, other allocations\n - Contact Maine DOE school finance\n- **Delayed district reports effect subsidy (ED 279)**\n - Bus *cancellation* report (EFT-19)\n - Delayed cancellation reports prevent redistribution of bus money to other districts\n - Bus *purchase* report (EFT-20)\n - Delayed reports lead to withheld subsidy\n- **Timely transportation reports are important**\n• Statutory Authority\n – “Authority to withhold state subsidy until reports are received. Notwithstanding any other provisions of law, if a school administrative unit has failed to file the reports by this Title in the format and within the time periods specified, the Commissioner may withhold state subsidy payments until these reports are received.”\n\n[20-A M.R.S. § 6801-A(2)]\nEPS Model Review Cycle\n\n- Statute requires EPS model review every 3 years\n - Transportation is in the FY 2019-20 group review\n- Maine DOE contracts the review with USM\n - CEPARE studies are for the Commissioner who may use the analysis to make recommendations for changes to funding of transportation operating\n - Funding formula changes do need approval of the Committee to move forward to the full Legislature for enactment\n- EPS website:\n http://www.maine.gov/education/data/eps/epsmenu.htm\n\n20-A M.R.S. § 15671\nP.L. 2005 Chapter 2 (LD 1)\nFrequently Asked Questions\n\n• **Q1:** How do I know if we received a bus approval?\n – Superintendent receives an email; approvals post on NEO Bus Approval Summaries screen\n\n• **Q2:** Does an approval roll over to the next FY?\n – No. Approvals are valid for 1 year\n\n• **Q3:** My application met the program requirement; why wasn’t my bus approved?\n – Being eligible does not guarantee an approval; about 1/3 to 1/2 of requests are approved; bus age, special needs transport, emergencies, and additions to fleet take precedence\n• Q4: Do the Maine school bus specifications include extra vehicle features?\n – No. The state specs provide basic safety features\n – Districts determine extras features for their driving conditions and negotiate feature costs\n\n• Q5: How does a district bid their school buses?\n – Districts may directly purchase buses from low bid vendors for each bus Type/capacity based on current Maine State School Bus Bid result\n – Per 20-A M.R.S. § 5402, districts bid their buses if they don’t use the state Type/capacity low bidder\nQ6: What is the Maine State School Bus Bid?\n- State Division of Procurement initiates a RFQ inviting vendors to submit quotes for school buses that meet the minimum state specifications.\n\nQ7: Can a district order a bus before the purchase FY?\n- Bus orders can be placed when the state bus approval is issued but possession must occur the year the bus is approved to purchase.\n- The bus order should identify the FY the district may take possession of the new bus.\n• Q8: Is it OK to change the payment term on my bus approval?\n – Yes and subsidy is reduced if payment years are reduced, e.g., 5 year term to 1 year cash\n• Q9: Is it OK to buy a different bus type or capacity than the bus that was approved?\n – Yes and subsidy is reduced if type or capacity are less than the approved type or capacity\n• Q10: How much subsidy will the district receive?\n – Transportation provides maximum bus approval amount; finance provides final subsidy calculation\nQ11: Is it OK to retire a different bus than the bus (VIN) that was submitted and approved on the original bus request (EFT-17)?\n\n- No. Bus approvals are based on the original bus request (EFT-17) retiring bus age and mileage.\n- However, the district may cancel the original request and approval then submit a new request (EFT-17) using a different bus (VIN).\n• Q12: When does a district take possession of a new approved school bus?\n – During the fiscal year the bus is approved to purchase\n\n• Q13: When does a district make the first payment on an approved school bus?\n – During the fiscal year the bus is approved to purchase\nFrequently Asked Questions (cont.)\n\n• Q14: When is a district required to report that they have purchased and taken possession of a new school bus?\n – After taking possession of the new bus, during the fiscal year the bus is approved to purchase, and no later than June 30 of the approved purchase fiscal year\n – Late EFT-20 School Bus Purchase Reports delay district subsidy per 20-A M.R.S. § 6801-A(2)\n• Q15", "num_tokens": 2048} {"category": "olmocr_science_pdfs-transportation", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-transportation/part-00-00000.npy", "text": " not univocal, as critical studies of waterfront regeneration have shown.\n\nMoreover, an unequal distribution of power between groups challenges the task of defining group boundaries. There is an unstated assumption, in many of the studies conducted on the port-city interface, that the authority and ability of the various stakeholders to promote plans are not uniform. The Port Authorities are often seen as strong, while the local government is usually considered much weaker in its ability to define and implement its spatial goals. Yet, there are examples of institutional arrangements that can compensate for uneven political capital, such as stakeholders’ representation in management boards, designated departments for port-city cooperation and foothold in the planning processes or a mutual ability to influence it.\n\nThese could also support two more of Ostrom’s principles: to provide low-cost means for dispute resolution among participants or between participants and the regulator, and to ensure that those affected by the rules can participate in modifying them. To implement the latter principle, not only representatives of city governments and ports, but also the local population must be allowed to participate. Implementation of effective mechanisms for public participation, albeit their imperfections, would also address an additional principle, which refers to a system which would monitor the behavior of members. The monitoring would be carried out by participating members or by an external regulator.\n\nThe fifth principle for robust management suggests matching the rules governing the use of common goods to local needs and conditions. This principle draws attention to the question of scale of governance and relates to the levels of decentralization of decision-making in each country. While most spatial decisions related to large\ninfrastructure are taken at a national level (see Marshall, 2013). Ostrom’s model offers a local resolution approach. It requires the scaling-down of decision-making authority and planning to the city, or at least to the regional level.\n\nAdjusting the level of governance to local conditions also supports the six principle, which calls to build responsibility for governing the common resource (appropriation, provision, monitoring, enforcement, conflict-resolution and governance activities) in nested tiers from the lowest level up to the entire interconnected system. “Gray zones”, or “border zones”, such as between the core area of port activity and the city, challenge current institutional-regulatory frameworks of planning which struggle to address conflicts and that will always favor, maybe unrealistically, conflict-free, empty zones. They also reflect the inherent tension between different levels of planning jurisdiction and their focus of attention. Such mismatch was observed and conceptualized as the lack of fit between institutions and socio-ecological systems (Folke et al., 2007). In such cases, horizontal forms of interaction prevail and each decision-making institution has its own perception of how such spaces should be occupied and managed. Usually, the result is that national strategic or economic interests override local planning goals.\n\nOstrom’s remaining recommendations include the use of graduated sanctions for rule violators and the safeguarding, by external government authorities, of rule-making rights for participants. In order to design such mechanisms, there will be a need to define what it means to violate the rules of using the coastal commons. Violations may include unauthorized use of the land, non-compliance with environmental standards, or even a lack of cooperation from stakeholders.\n\nThe tensions between different levels of planning, between the practical and the symbolic, between ownership and use, and the interests of the various stakeholders are not an exclusive experience of port cities. All cities are characterized by a wide range of internal institutions whose conflicting objectives, values, and activities play a role in urban development (Wilson, 1987). Urban sociologists have also examined the phenomenon of physical or perceptually constructed boundaries within cities. The importance of this topic lies in the observation that the organization of and control over space affected by competing interests and governance, has traditionally produced social inequalities and exclusion, giving rise to questions of control and sovereignty (Agnew, 2013). Yet, not all efforts are in vain; several urban regeneration projects, for example, are considered new spaces of “collaborative commons” (Clemente et al., 2015, p. 113).\n\nOn a much larger scale, the ICZM protocol, in its current form, can serve only as a model. As the highest level framework intended to safeguard the coastal commons, it presents many achievements. However, the institutional and administrative fragmentation that characterizes the management of coastal areas in many countries (Portman et al., 2012) poses a significant challenge to its implementation. Port cities, with their many tensions and limitations to cooperation, provide a practical example of this fragmentation. Currently, the most widespread administrative model for ports is the landlord port model, advanced by the World Bank, in which governments establish Port Authorities to manage port activities. Yet that model is based on the paradigm that ports exist as separate, detached entities from cities. The picture emerging suggests that there is a need for a “landlord” in this spatial interface of ports and cities. In an interview with a municipality representative in Volos (Greece) he compellingly noted\nthat there is a common feeling that the port is “a city within a city”. There may be, however, various institutional-regulatory arrangements that can help to blur such boundaries, and accelerate the inching-back of the (urban) coastal commons.\n\n**Concluding remarks**\n\nIt is not easy to think about port territory along the shoreline and inland as the commons, because these are massive, inaccessible and strategically important infrastructure at national level. But in a world where “natural” common pool resources are becoming increasingly rare and where a significant portion of the coast is built-up, it is necessary to expand the notion of urban commons also to the “gray areas”, post-industrial zones which hold the potential to become mixed-use, public spaces.\n\nThis study has demonstrated how land-based arrangements, primarily the four which we outlined in the results section, can be critical in understanding the sources of planning-related conflicts and potential solutions. Notably, the classification of port land as public domain or public land in the law of each country studied here does not bring with it any guarantee of “open access”, a “right of access” or the ability of representatives of the public to make a significant impact on the spatial design of the area. Similarity, waterfront regeneration projects sometimes exhibit a port-city resolution to some extent, creating new urban commons, while a critical look on this space may question its quality or overall contribution to different publics.\n\nThe common experiences found in the contrasting coastal cities cited in this study lead to a suggestion that – through combined strategies involving lessons from Ostrom’s design principles for managing resilient commons – ports and the cities that host them can find a new harmony and synergy which will strengthen local economies and quality of life. Since most previous studies of the port-city interface have focused on mapping and analyzing cases of conflict, it is time to take the examination one step further by focusing on mechanisms for greater spatial cooperation.\n\n**Note**\n\n1. For a comprehensive, updated review in English of port governance in Greece, see Pallis and George (2017).\n\n**Acknowledgments**\n\nThis article was written as part of the research project on the regulatory-institutional implementation gaps in the ICZM Protocol, entitled “Mare Nostrum”, which was funded by ENPI CBC MSB Grant Agreement I-A/1.3/093 during the years 2012-2016. The time, data, knowledge and experience provided by the interviewees in the participating countries are greatly appreciated. Personal details are omitted to respect confidentiality. The author is grateful to Rachelle Alterman, the leading researcher for her significant contribution to this study as well as to the Mare-Nostrum project team. The paper benefited from suggestions made by Shaul Horev, Sarai B. Aharoni, and Dorit Garfunkel. Finally, the author expresses her gratitude to Alon Tal for his valuable feedback on an earlier draft of the manuscript, as well as for two thorough, constructive anonymous reviews. Any errors reside solely with the author.\nDisclosure statement\n\nNo potential conflict of interest was reported by the author.\n\nFunding\n\nThis work was supported by the ENPI CBC MSB; [I-A/1.3/093].\n\nORCID\n\nNa’ama Teschner http://orcid.org/0000-0003-4309-1056\n\nReferences\n\n\nHabermas, Jurgen. 1962. *The Structural Transformation of the Public Sphere*. Cambridge. (1989 translation to English)<|endoftext|>DECARBONIZATION OF HEAVY-DUTY TRANSPORT IN NORTH AMERICA:\nMAKING CLIMATE JUSTICE CENTRAL TO THE PROCESS\n\nMULTI-STATE MEDIUM- AND HEAVY-DUTY ZERO-EMISSION VEHICLE ACTION PLAN CONSULTATION\n\nBy the David Suzuki Foundation and Équiterre\nSpring 2022\nThe David Suzuki Foundation (DavidSuzuki.org | @DavidSuzukiFdn) is a leading Canadian environmental non-profit organization, founded in 1990. We operate in English and French, with offices in Vancouver, Toronto and Montreal. We collaborate with all people in Canada, including Indigenous leadership and communities, governments, businesses and individuals to create a sustainable Canada through scientific research, traditional ecological knowledge, communications and public engagement, and innovative policy and legal solutions. Our mission is to protect nature’s diversity and the well-being of all life, now and for the future. We envision a day where we all act on the understanding that we are one with nature.\n\nÉquiterre seeks to make the necessary collective transitions towards an equitable and environmentally sound future more tangible, accessible and inspiring. Deeply concerned about climate change, Équiterre has developed significant expertise in public policy aimed at reducing greenhouse gas (GHG) emissions over the years. Through demonstration, education, awareness-raising, research, coaching and mobilization projects, Équiterre rallies", "num_tokens": 2048} {"category": "olmocr_science_pdfs-transportation", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-transportation/part-00-00000.npy", "text": "-win for everyone\n- Even while offering this project, UP attempted to meet privately with downtown affected businesses intending to \"buy them off\" and this \"divide and conquer\" tactic was dropped when it became obvious that it wasn’t working\n- The UP had attempted to use scare tactics on their own employees telling them that their retirement funds would be jeopardized if the UP was forced to fund such an effort\n- Even after proposing the depressed trainway as their alternative, the UP continues to push for overpasses through downtown privately in meeting at the State Capitol with legislators\n\nCharles McNeely said that this is not a partnership or a \"win-win\". This is gamesmanship at its highest level, and what concerns me and this community is that it appears the deck is stacked here; that an outcome favorable to the Railroad is already being fashioned; the deal is done and we, the City of Reno, are parties to a charade.\n\nCharles McNeely said that he has alerted Reno’s delegation in Washington, D.C., the Governor as well as the Council on Environmental Quality (CEQ), which has regulatory oversight of the STB’s environmental decisions, to review the STB’s procedures in this study as well as why an EIS was going to be prepared for the Conrail Merger.\nIntroduction / Review Agenda\n\nKay Wilson introduced the participants and asked the members of the Task Force and general public to introduce themselves. The Surface Transportation Board (STB) was not present at this Task Force meeting.\n\nCharles McNeeley thanked the members of the Task Force to have an opportunity to speak and applauded the members for their participation thus far but questioned the objectivity and fairness of the environmental process associated with the Environmental Mitigation Study (EMS). He continued to state that he thought the STB and its consultants would take a real look at the impacts of the merger and its the city’s position to support the merger but object to the unwillingness of the Union Pacific Railroad (UP) to address the impacts of the Merger.\n\nHe said the process was rampant with bias towards the railroad and that the STB has preconceived opinions of what should be done before the EMS was ever completed. He sited an example of unfair treatment as the STB’s decision to prepare an EIS for the Conrail\nSurface Transportation Board\nTask Force Meeting\nSummary of Meeting Notes\n\nSession: Task Force #7\n\nDate: July 9, 1997\n\nLocation: City of Reno\n290 South Center Street\nRoom 211\n1:00 - 3:50 pm\n\nSubject: Union Pacific/Southern Pacific Railroad Merger\n\nEnvironmental Mitigation Study - Task Force Meeting\n\nAttendees: STB Representatives\nDave Mansen - De Leuw, Cather & Company\nKay Wilson - Public Affairs Management\nNasser Ashrafi - De Leuw, Cather & Company\n\nTask Force Members\nMerri Belaustegui - City of Reno, City Manager’s Office\nSteve Varela - City of Reno, City Engineer\nMark Demuth - City of Reno, Environmental Team\nLarry Farr - City of Reno, Emergency Services\nTom Robinson - City of Reno, Emergency Services (alternate)\nSteve Bradhurst - Reno Citizens, General Interest\nRichard Vitali - Reno Citizens, Riverbanks Homeowners (absent)\nPaula Berkley - Native American Representative (absent)\nBill Osgood - Business Community Representative\nBob Burns - NFRA (absent)\nBob Webb - Washoe County (absent)\nJack Lorbeer - Regional Transportation Commission (alternate)\nTim Crowley - State of Nevada Representative\nCraig Wesner - Nevada Public Service Commission (alternate)\nRobert Sellman - City of Sparks (alternate)\nMichael Hemmer - Union Pacific Railroad\nRon Scolaro - Amtrak Representative (absent)\nKen Lynn - State Economic Interest (absent)\nScott Hutcherson - Warehousing & Distribution (alternate)\n\nTask Force Alternates\nColleen Henderson - City of Reno, Environmental Team\nMichael Halley - City of Reno, City Manager’s Office\nTom Gribbin - City of Reno, Engineering Team\nNancy Burkhart read into the record a letter from Scott Beeman, Circus Circus indicating he agreed that failure to provide advance review of data prohibited a meaningful task force meeting.\n\nSeeing no further comments, the Task Force meeting was adjourned by Kay Wilson.\nwas looking at future conditions both with and without the merger, holding the year 2000 as a traffic constant. Mark stated that year 2000 is not baseline.\n\nDave Mansen said they would not be attributing increase in traffic from 1995 to 2000 to the UP. Demuth responded that there would be a wider number if 1995 baseline data was used.\n\nMark Demuth asked DCCo to explain how a day/night mix of trains was determined when UP has indicated that it is impossible to formally schedule trains. GUI indicated that it was based on the train traffic during the monitoring week, and was a 53/47 split. Mark indicated that there was no purpose in going on with any further questions DCCo will not respond to my questions pertaining to baseline conditions and appropriate methodologies.\n\nCraig Wesner asked if a bicycle was considered a vehicle. GUI said yes.\n\nHarold McNulty indicated that the ICC used to break down accident data by who hit who, although the STB no longer maintains these statistics.\n\nMember of the Public Has actual Reno accident data been entered into the record? Dave indicated yes.\n\nHarold McNulty asked Mark Demuth to write a letter to the STB outlining what methodology he thinks should be used in the analysis of traffic delay and train/vehicle accident analysis. Mark indicated that a letter would be forthcoming.\n\nSeeing no further comments on item 4, Kay Wilson moved on to item 5.\n\n**General Discussion/Public Comment**\n\nPublic - What does upgraded gate systems mean. Dave indicated that it refers to advanced circuitry.\n\nBob Webb asked that hazardous materials shipping be addressed in the mitigation study. Dave indicated that it would be.\n\nBill Osgood asked when and where the upcoming directional horn test would be conducted. Most people thought it was on the 17th.\n\nMark Demuth provided the STB with a written submittal containing complete information on population growth for the City of Reno and Washoe County, and indicated that a 1.8% annual growth is not excessive.\n\nPublic - what is the current number of trains passing through the City of Reno now. Dave indicated that the current number is an average of 10/day. It was an average of 20 per day during the emergency detour.\nKay Wilson said we can clarify what our thinking is but we can’t say what is reasonable at this point.\n\nHarold McNulty said \"Regardless of all the science we put into this, it [the mitigation plan] comes down to judgment”.\n\nBruce MacKay said underpasses may mitigate Ralston and Keystone but does nothing for noise and safety on Center, Sierra, Virginia Streets. SEA needs to balance the whole area and can’t just cherry pick a quick fix.\n\nNancy Burkhart asked for the STB/DCCo to define what feasible, responsible and reasonable mitigation means. It must be different than our interpretation. We need to know what feasible means before we can go any further. Dave indicated that the final decision on what type of mitigation is feasible rests with the STB. Dave also stated that maybe we can take a look at past STB actions to get a feel for what feasible is, and report back to the Task Force. Harold McNulty noted that SEA’s recommendations to the STB may or may not be implemented by the board. It is entirely up to their discretion. Harold also stated that reasonable means that all of the fact have been balanced to come to a workable solution.\n\nRich Vitali asked how the mitigation study would be structured. Dave indicated that all options will be laid out and evaluated. Rich said that he is offended that McNulty feels that all of the Task Force comments are criticisms and that these are critical issues to the downtown.\n\nSeeing no further comments on Item 3, Kay Wilson move on to Item 4.\n\n**Train/Vehicle Accident Data**\n\nGui Sheerin provided another handout to the Task Force members and began his presentation on train /vehicle accident data.\n\nMark Demuth asked Gui to define what an accident is. Gui stated that an accident is a train/vehicle collision, and does not include pedestrians or suicide attempts, nor does it account for injury or death.\n\nGui Sheerin continued his presentation and discussed accident rates for the same conditions and scenarios as outlined in the traffic delay presentation. Pre merger accidents were documented at 1.26 per year, with post merger accidents projected to be 1.7 accidents per year. Only the depressed trainway mitigation option reduced train/vehicle accidents to less than pre merger levels.\n\nMark Demuth asked how baseline traffic numbers could be 1995 traffic volumes and train numbers based on post merger conditions. This would result in a smaller number of accidents that would be expected to occur based on a wider spread of data. Dave indicated that DCCo\nSurface Transportation Board \nTask Force Meeting \nSummary of Meeting Notes\n\nvs. outlying grade separations. Dave indicated that every solution has its own set of problems.\n\nHarold McNulty indicated that most of the input to date from the Task Force has been criticism, and not focused on constructive ideas, which is the purpose of the Task Force. Merri followed up by saying that we would like to see an evaluation of the depressed trainway, a constructive idea.\n\nMark Demuth stated that he can’t believe that Sutro is included as a possible mitigation option, and that intersection had never been previously discussed.\n\nDave Mansen said feasible vs. advisable is a consideration.\n\nFrank Napier斯基 indicated that he is on the opposite side of the coin as Mark and that the traffic delay analysis should be based on historical train traffic numbers (3", "num_tokens": 2048} {"category": "olmocr_science_pdfs-travel_and_tourism", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-travel_and_tourism/part-00-00000.npy", "text": " populate sectors with a high demand for manual or unskilled workers and with low entry barriers, such as cleaning or catering (Engelen 2001; Rath 2002). This indicates that there is a growing, and ethnically specific, divide between the highly educated, well-paid knowledge workers in Western societies and the workers that are concentrated in the lower tiers of the labour market or even more seriously marginalized. These developments are also gender specific, as the changing opportunity structure produces different outcomes for men and for women.\n\nThese crucial trends also have their own spatial dimension. It is argued that capital today is more mobile, and that cities are even more central to the emerging economy, than they were in the Industrial Age (Castells 1996; Webster 2001). Gateway cities like Miami, New York, Vancouver, Sydney or Amsterdam have become nodes in national and international networks, bridging migrant communities and linking businesses and consumers from all over the world. High-skilled professionals, low-skilled job seekers, students and holiday travellers alike are gravitating there. They are part and parcel of the rapid transformation of these cities from sites of industrial production into spaces of information circulation and consumption. Kwak and Hiebert (this volume) show how these multifarious categories of migration are intricately linked together: the rise of the international education industry initially involves the (officially temporary) migration of students, but it also generates new forms of international mobility, including visits by family members and friends to the international students and the arrival of business people who cater to the needs of these categories.\nCity authorities show interest in these developments, if only because they believe that the students of today are the international job seekers or business investors of tomorrow.\n\nThese converging processes affect the urban social fabric in profound ways. They alter the opportunity structures, shape and reshape forms of inclusion and exclusion, and add new dimensions to the already existing economic, social and cultural diversity. Sociologists and geographers like Castells, Fainstein and Sassen have captured this socioeconomic and spatial bifurcation, arguing that the dual city is at once globally connected and locally disconnected (Castells 1989; Fainstein et al. 1992; Mollenkopf and Castells 1991; Sassen 1991). This social division inhibits urban socioeconomic development and undermines the quality of urban life. Clearly, those who fail educationally and are excluded from the knowledge economy, yet remain stuck in city areas in close proximity to the rich and affluent, become a matter of serious political and social concern. In these circumstances, the rise of urban tourism, and the new opportunities it creates in the service industries, is more than welcome.\n\nCommodification of culture and revaluation of urban space\n\nHere we enter the realm of studies on the emerging knowledge economy and the role of cities as places of information circulation, creativity and consumption. The growth of the urban tourism industry is intricately tied up with the rapid transformation of the manufacturing economy to an information economy and beyond. Deindustrialization resulted in a need for localities to differentiate themselves, in order to attract a share of the spatially mobile capital. In large cities in particular, authorities ranging from local governments to marketing consortia now strive to present their localities as attractive places for potential investors, employers, inhabitants and tourists (Kearns and Philo 1993).\n\nUrban tourism is more than just a collection of tourist facilities. It is the consumption of signs, symbols and spectacle, the experiencing of aesthetically spaces of entertainment and pleasure (Featherstone 1991; Kearns and Philo 1993; Lash and Urry 1994; Selby 2004). The manipulation of place images and the projection of a high quality of life reflect a revaluation of urban space at the local level in response to global processes. The deliberate creation of an attractive place product and place image, together with the material processes that produce the urban landscape, spawns a diversity of spatial narratives (Duncan and Duncan 1988; Zukin 1991, 1995). The existence of spatial narratives and their contested nature are central to debates on the utilization of tourism, place marketing and heritage in socioeconomic development.\n\nBy pursuing urban imaging strategies, cities seek to attract mobile capital, tourists and immigrants (so long as these fit into the prescribed urban policy goals). As Roche (1994, 2000) has noted, the principal aims\nof imaging strategies, or re-imaging in the case of older urban centres, are to:\n\n- attract visitor expenditure\n- generate employment in tourism and other industries\n- foster positive images for potential investors in the region, often by ‘re-imaging’ previous negative perceptions\n- provide an urban environment that will attract and retain the interest of professionals and white-collar workers, particularly in ‘clean’ service industries such as tourism and communications.\n\nThese strategies, in short, are employed to attract mobile capital and people.\n\nUrban imaging processes are typically characterized by some or all of the following activities:\n\n- creation of a critical mass of visitor attractions and facilities, including new buildings and prestige centres (casinos, event and convention centres, stadiums, refurbished waterfronts);\n- the hosting of hallmark events;\n- development of urban tourism strategies, policies and campaigns, often associated with new or renewed organization and development of city marketing;\n- development of leisure and cultural services and projects to support the marketing and tourism effort (e.g. the creation or renewal of museums and art galleries and the hosting of art festivals, often as part of a comprehensive cultural tourism strategy for a region or city);\n- deliberate commodification and rebranding of urban space to identify ‘new’ places for leisure consumption (e.g. the promotion of nightlife, restaurant or ethnic districts).\n\nWhilst urban imaging processes help to explain why some areas or activities have become so popular, we also need to explore how these patterns of consumption are shaped. Why have deprived neighbourhoods in cities like Amsterdam, Berlin, Birmingham, Brussels and Lisbon turned into magnets attracting numerous day-trippers who want to become absorbed into an exotic world (cf. Collins and Castillo 1998)? Why has the mainstream diet in countries like the Netherlands, Germany and England, which centred around bland meat, potatoes and standard vegetables, expanded to embrace tacos, Bombay duck, chicken tikka masala, döner kebab, rijsttafel and babi pangang (Halter 2000; Miller et al. 1998; Narayan 1995; Ram et al. 2000; Tsu 1999)? What cultural processes support the growing popularity of ‘ethnically’ diverse attractions by persuading people to appreciate new and different tastes?\nThese processes, to be sure, do not just arise from the manipulations of local government officials. Zukin (1991; and see also Valle and Torres 2000) has argued that a critical infrastructure of individuals must exist who are all connected in some way with cultural production and appreciation and who are capable of influencing public taste. This critical infrastructure contains a broad spectrum of knowledge workers that design cultural production and consumption; they include connoisseurs, cultural mediators and marketing bureaus as well as business associations, tourist boards and parts of national and local government. Whatever the intentions behind it, the critical infrastructure influences the popularity of particular cultural products. It identifies which products are ‘relevant’ and makes statements concerning their real or alleged authenticity and the significance of consuming them. It thereby helps to shape the multicultural urban landscape. The messages from this critical infrastructure are not simply ‘free-floating’, but are conveyed through the internet or more conventional means of communication, through the behaviour of trendsetters or other people from the cultural vanguard, through the programmes of specific educational institutes, or through the ready availability of easy-to-consume products and services. As Zukin (1991) points out, shifting preferences have an impact on the nature of production; they ultimately bestow opportunities on some groups and their areas of the city, while simultaneously making other groups and areas largely invisible to ‘the people who matter’. How this critical infrastructure functions, and how immigrant producers of tourist attractions, as well as their consumers, fit into this process, are a matter for further research. The chapters in this volume by Fainstein and Powers and by Marques and Lima da Costa provide good evidence of the operation of such infrastructures.\n\nZoned ethnicity\n\nIdentifiable ethnic areas within cities are now often used as an attraction for short- and long-term visitors, thus contributing to the identities of the cities themselves, of those who live in the areas and of those who visit. As observed above, few researchers have studied ethnic enclaves, or the ‘zoned ethnicity’ of some parts of cities, in terms of their tourist dimensions, even though many of them are already notable urban attractions (Abrahamson 1995; Timothy 2002).\n\nLet’s return to the case of San Francisco’s Chinatown. The original Chinatown was widely considered a slum, and had a bad reputation in white American society as the dumping ground for an undesirable immigrant group. However, as Timothy (2002; cf. Anderson 1995; Lin 1998; Wong 1995) has observed, this very image paradoxically encouraged tourism development. To non-Chinese people in the early twentieth century, Chinatown was a quaint, mysterious part of town, a ‘foreign colony’ in their midst. Advertisements promised that white tourists visiting\nthe district would experience the ‘sounds, the sights, and the smells of Canton’. They could imagine themselves in ‘some hoary Mongolian city in the distant land of Cathay’, and could ‘wander in the midst of the Orient’ without leaving America, seeing throngs of people", "num_tokens": 2048} {"category": "olmocr_science_pdfs-travel_and_tourism", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-travel_and_tourism/part-00-00000.npy", "text": " expanded venues, your event is sure to be even more incredible.\n\n• 200,000+ square feet of flexible meeting space\n• 38,000+ square-foot ballrooms\n• Premium dining options\n\nContact us to learn more:\n› KalahariMeetings.com\n› groups@kalahariresorts.com\n› 855.411.4605\nAlthough some see meals as just something you do between waterslide runs, part of your one world experience at Kalahari Resorts & Conventions will be world-class dining. Every location features restaurants to satisfy every taste, from steakhouses to ice cream shops. You’ll never have to eat in the same spot twice, but you just might want to.\nADVENTURERS CLUB\n\nThere’s no shortage of fun, engaging activities for the kids at Kalahari Adventurers Club. They can go on hikes, do finger painting, crafts, games and scavenger hunts, and we even have a family of characters! Go on your own adventure with Kenya and his girlfriend, Kya, as they splash the days away with their pals Lou and Benny.\n\nKenya is an elephant from the Serengeti. He loves to play and splash around with his friends and his girlfriend, Kya.\n\nKya is the elephant with the brightest smile. In fact, her name is Swahili for “the light of a diamond.” She’s been a part of the Kalahari family since meeting Kenya, Luganda and Benin 12 years ago.\n\nLou is a lion who loves nothing more than hanging out and having fun with his best friends.\n\nBenny is a monkey who loves to joke around and make his friends smile. If you see Benny at Kalahari, give him a high-five, a hug or a joke, and he will be your friend forever.\nAnother important part of your adventure is making time to relax. When you want to slow down and indulge in “you” time, our first-class spa offers services to relax and rejuvenate the mind, body and spirit. The exotic ambiance allows you to slip into a relaxing experience that feels a world away. Our spa offers body treatments, luxurious massages, skin care, nail care and a salon.\nForgot your swimsuit? No problem — we have premium designer swimwear available, as well as towels, T-shirts and any other amenity you might need during your stay. We also have authentic art, trinkets and clothing from Africa. Bring something home to remember your adventure forever.\nOur dream is still growing, and we're now bringing the thrills of Africa to you in 4 different locations. Step into an experience that feels A World Away™, now in Wisconsin, Ohio, Pennsylvania and Texas.<|endoftext|>Bittersweet ‘birthday staycay’ but he’s proud of S’pore’s response\n\nAudrey Tan\n\nBiologist Marcus Chua turned 36 on Tuesday, but the birthday was a bittersweet one despite his swanky surroundings in a hotel with views of Singapore’s famous city skyline.\n\nIt might all look five-star, but the reality for many people like Mr Chua, who are now complying with the 14-day stay-home notice (SHN), is far from fancy. Room service, for example, does not come on a silver platter but is hung on his door in a disposable plastic box.\n\nMr Chua’s “birthday staycay” began when he returned from the United States on Thursday night, all ready to serve the stay-home period in a hotel instead of in his own home.\n\n“Even though it was a pity that I could not see my family after arriving in Singapore, it’s actually my preferred option to stay elsewhere so there is less chance of me transmitting the virus to others if I had been infected,” said Mr Chua, a PhD student at George Mason University in the Washington DC suburbs.\n\nThe Ministry of Health (MOH) announced on Tuesday that all Singaporeans returning from Britain and the US from 11.59pm the following day would have to serve the SHN in dedicated facilities instead of their own homes.\n\nThis was because those arriving from the two countries account for the largest share of imported cases by far. Returnees will have their own room and bathroom and all meals provided so that they avoid physical contact with other individuals, MOH said.\n\nMr Chua said on Twitter: “It’s a brilliant move to support the hospitality industry and keep the pandemic at bay.”\n\nHe added that travellers were given special laundry bags to prevent contamination and were notified that spot checks would be done via calls or text messages.\n\nThose who flout the rules may be liable for penalties such as being required to bear the full cost of the hotel stay, according to a circular from the Singapore Tourism Board that was given to returning passengers.\n\nMr Chua, a mammal scientist at the National University of Singapore’s (NUS) Lee Kong Chian Natural History Museum, said he had initially considered staying put in the US to finish the semester, but the escalating crisis there and repeated reminders from NUS and the Singapore Embassy to come home prompted him to change his mind.\n\nHe booked a flight to return to Singapore this Wednesday, but this had to be brought forward after Etihad Airways cancelled the flight.\n\nSome of his colleagues at NUS had collated data on previous flights between Washington DC and San Francisco – where the next homebound Singapore Airlines flight would depart from – and analysed them to find a route that had the least likelihood of being cancelled.\n\nThankfully, his Alaska Airlines flight departed on time and Mr Chua found himself in San Francisco with about a day to spare.\n\nHe said: “There was a huge sense of comfort when I boarded the Singapore Airlines flight. Not only did it remind me of home, it was also comforting to see cabin crew taking precautions by donning surgical masks.”\n\nPassengers were also seated at least a seat apart from one another.\n\nWhen they arrived at Changi Airport, passengers were served SHNs by Immigration and Checkpoints Authority officers and taken by bus to the hotel in groups of 15 in 40-seater coaches. “Perfect for maintaining social distancing,” Mr Chua quipped, adding: “I couldn’t be more impressed and proud of Singapore’s response to Covid-19.”\n\nWhile looking forward to going for a swim and catching up with family and friends after serving his SHN, Mr Chua said he has no lack of things to do. He plans to catch up on his lectures, which are being broadcast online, complete his assignments and write research proposals.\n\n“When all that is done, there’s video streaming and two books to read,” he said. “And I have my binoculars, so there’s also bird-watching. I heard jungle fowls and kingfishers this morning.”\n\naudreyt@sph.com.sg\n\nRoom service for those serving the stay-home notice in a hotel is hung on the door in a disposable plastic box. PHOTO: MARCUS CHUA/FACEBOOK\n\nKEEP OTHERS SAFE\n\nEven though it was a pity that I could not see my family after arriving in Singapore, it’s actually my preferred option to stay elsewhere so there is less chance of me transmitting the virus to others if I had been infected.\n\nBIOLOGIST MARCUS CHUA, who returned from the United States on Thursday night, all ready to serve the stay-home notice in a hotel instead of in his own home.<|endoftext|>WHALE & DOLPHIN WATCHING TRIP REPORT\n\nMALDIVES EXPLORER\nCENTRAL ATOLLS CRUISE\n9 to 20 November 2015\n\nBy tour leader Dr Chas Anderson\nWildWings / WildOceans\nTel: 0117-9658-333\nEmail: tours@wildwings.co.uk\nWeb: www.wildwings.co.uk\nNovember is supposed to be one of the calmest months in the Maldives, but the brewing El Nino brought wind and rain for much of our trip. Despite this, we enjoyed a very productive 12-day wildlife cruise, which took us all the way south to Thaa Atoll, well beyond the normal tourist areas. We had plenty of time to visit a number of beautiful and little-visited islands, both inhabited and uninhabited. Cetacean sightings were good, with a respectable nine different species being recorded. These included a run of Pilot Whales at the start, and a rush of Cuvier’s Beaked Whales and Dwarf Sperm Whales on the very last day when the wind finally died and the sea became flat calm. The snorkelling was fantastic throughout. The corals were magnificent, particularly in Thaa Atoll. The reef fishes were overwhelming in their abundance, diversity and brilliant colouration. But fishy highlights were undoubtedly swimming with Manta Rays and a Whale Shark. Hawksbill Turtles were seen regularly, but there were also sightings of a Green Turtle and a rare, giant Leatherback Turtle.\n\nDay 1, Monday 9 Nov 2015\n\nWe all met at the airport, and were soon on the dhoni heading for the safari boat anchorage and Hope Cruiser. Following welcomes and a briefing, there was time to unpack in the cabins, and come back on deck for a look around before lunch.\n\nImmediately after the tasty meal prepared by our Sri Lankan chef, we were off. As we left the anchorages Spinner Dolphins appeared (well spotted Doug), with one giving an energetic display of spinning.\n\nOut in the ocean, conditions were good, so we felt sure that something would be seen. And sure enough, Pilot Whales were soon spotted (well done Rod and Mike). They gave us the slip to start with, but eventually surfaced. We slowly manoeuvred into a position just upwind, cut the engine, and drifted quietly down amongst them. Soon we had Pilot Whales surfacing alongside and in front of us, close enough", "num_tokens": 2048} {"category": "olmocr_science_pdfs-travel_and_tourism", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-travel_and_tourism/part-00-00000.npy", "text": "**\nLearn about the fascinating stories in stone that can be seen from the Manzanita Lake area. Examine the rocks that have shaped this volcanic landscape. *Outside Loomis Museum.*\n\n**Summit Lake Evening Program**\nJuly at 7:30 p.m., August at 7:00 p.m.\nJoin a park ranger for a lively program about the natural or cultural history of the park. *Summit Lake Amphitheater.*\n\n**Volcanoes!**\nDid you know that every mountain in the park is a volcano or part of one? Learn about the geology and volcanic history of the park. *Outside Loomis Museum.*\n\n**Wildlife Connections**\nLearn about the park’s wildlife and hear stories about their amazing lifestyles. *Outside Loomis Museum.*\n\nPrograms are 45 minutes long unless otherwise noted\nHiking Trails\n\n**EASY TRAILS**\n\n**Devastated Area**\n**Start:** Devastated Area parking area, 10 miles south of Loomis Museum.\n**Length:** 0.5 miles (0.8 km) loop trail\n**Elevation Gain:** None\n**Time:** 30 minutes\nEasy walk along a paved trail. Interpretive exhibits with audio description highlight the eruption of Lassen Peak with great views along the entire trail. Accessible to wheelchairs.\n\n**Manzanita Lake**\n**Start:** Pick up the trail from the Loomis Museum or Manzanita campground.\n**Length:** 1.8 miles (2.9 km) loop\n**Elevation Gain:** None\n**Time:** 1 hour\nEasy walk around the lake. Keep your eyes and ears alert; birds, trout, wildflowers, and wildlife can frequent the lake shore. Trail can be rocky at times. Enjoy catch and release fishing with excellent mountain views.\n\n**HYDROTHERMAL AREA DANGER**\nFor your safety, stay on established trails and boardwalks. Ground in hydrothermal areas can look solid but may actually be a thin crust hiding pools of acidic boiling water. Traveling off-trail in these areas may result in severe injury.\n\n*Stay on established trails to avoid injury*\n*“It feels like I put my leg in a flame”*\n- Visitor injured at Devils Kitchen\n\n**MODERATE TRAILS**\n\n**Bumpass Hell**\n**Start:** Bumpass Hell parking area, 6 miles from southwest entrance\n**Length:** 3 miles (4.8 km) round trip\n**Elevation Gain:** 300 feet (91 meters)\n**Time:** 2 hours\nModerate hike over rocky terrain with grand vistas. The trail drops into an active hydrothermal basin where you can view mudpots and fumaroles. For your safety, please stay on the boardwalk.\n\n**Kings Creek Falls**\n**Start:** 17 miles south of Loomis Museum and 13 miles from southwest entrance\n**Length:** 3 miles (4.8 km) round trip\n**Elevation Gain:** 700 feet (213 meters)\n**Time:** 2 hours\nModerate hike over rugged terrain and small rock formations. Trail forks at end of meadow. Waterfalls and wildflowers are spectacular in late spring. The trail to the bottom of the cascade is closed for trail repair.\n\n**LasSen Trail Guide**\n150 MILES OF TRAILS\nDiscover Lassen with this color guide of day and overnight hikes by local author George P. Perkins.\n\nPurchase Your Copy $19.95\nLassen | Chester | Mineral | Amazon.com\nMODERATELY STRENUOUS TRAILS\n\nCinder Cone\nStart: Butte Lake picnic area near the boat ramp\nLength: 4 miles (6.4 km) round trip\nElevation Gain: 700 feet (213 meters)\nTime: 3 hours\nHike begins along Fantastic Lava Beds, opens up with views of the Painted Dunes, and becomes a strenuous, steep climb with a loose cinder base to the summit. Trails circle and descend into the crater on the summit.\n\nBrokeoff Mountain\nStart: 1 mile before the southwest entrance\nLength: 7 miles (11.25 km) round trip\nElevation Gain: 2,600 feet (792 meters)\nTime: 4 to 5 hours\nSteep trail and tricky early season stream crossings give way to panoramic views of the entire park, the Sacramento Valley, and Mount Shasta. Wildflowers are abundant in early summer.\n\nSTRENUOUS TRAILS\n\nTerrace, Shadow and Cliff Lakes\nStart: 10 miles from the southwest entrance between Lassen Peak parking area and Kings Creek\nLength: 3.5 miles (5.6 km) round trip\nElevation Gain: 550 feet (168 meters)\nTime: 3 hours\nHike alongside three mountain lakes: Terrace, Shadow, and Cliff lakes. The trail is steep between lakes, but mostly flat otherwise. Enjoy a special solitude in this area plus excellent views of the southeastern slopes of Lassen Peak.\n\nRidge Lakes\nStart: Sulphur Works parking area, 1 mile north of the southwest entrance\nLength: 2 miles (3.2 km) round trip\nElevation Gain: 1,045 feet (319 meters)\nTime: 1-1.5 hours\nThis steep climb up a forested ridge rewards hikers with two small alpine lakes cradled in a basin between Brokeoff Mountain and Mount Diller. Stops along the way provide glimpses of Sulphur Works hydrothermal area and Sulphur Creek. Although challenging, this hike offers and opportunity to experience Lassen’s alpine terrain in a short hike.\n\nExplore Safely\nSafety is Your Responsibility\n- Bring water\n- Wear sturdy boots\n- Bring extra food\n- Carry sunscreen\n- Pack a map and compass\n- Take breaks often\n- Check the weather forecast\n- Carry extra layers for warmth\n- Finish your hike before dark\n- Tell someone where you are going and when you will return\nReach the Peak\n\nThe Reach the Peak project is a multi-year effort to restore and rehabilitate the Lassen Peak trail. The project will work to maintain the character of the trail while taking steps to improve the visitor experience and accommodate its increasing popularity and use.\n\nIn 2010, the largest helicopter flight operation in park history strategically placed 2.4 million pounds of stone along the trail. With materials in place for the project’s second year, Lassen Volcanic National Park trail crew and the California Conservation Corps began laboriously strengthening the backbone of the Lassen Peak trail. Despite hazardous work areas and exposure to severe weather, the Reach the Peak trail crew cut and placed nearly 5,000 cubic feet of stone on 75 rock retaining walls and resting areas. These carefully constructed retaining walls will reduce erosion on Lassen Peak’s numerous switchbacks and provide a solid foundation for the higher, steeper sections of trail.\n\nEnjoy Lassen Peak from Afar\n\nMany hikers have discovered another way to enjoy the splendor of Lassen Peak – from afar. Brokeoff Mountain trail (page 11) is a worthy rival to the Lassen Peak trail, passing through dense forests and lush meadows to spectacular panoramic views. The sweeping vistas include Mt. Shasta, the rim of ancient Brokeoff Volcano (Mt. Tehama) and breathtaking Lassen Peak.\n\nLassen Peak, Chaos Crag, Mount Harkness, and Prospect Peak are a few of the volcanoes that fill the panoramic view from atop Cinder Cone. The Cinder Cone trail (page 11) travels alongside Butte Lake and the Fantastic Lava Beds, giving way to colorful views of the Painted Dunes at the base of the cone.\n\nThe Mount Harkness trail offers an opportunity to climb a shield volcano with sweeping views of most of the park, a dramatic view of Lassen Peak, and views of Lake Almanor and Mount Shasta. A historic fire lookout is staffed during the summer and fall. Be sure to stop in and sign the logbook. Bring plenty of water – there is none available in the Juniper Lake area. This moderately strenuous trail is 3.8 miles (6 km) round trip, gains 1,246 feet (380m) and begins near the Juniper Lake campground.\n**Kids in Parks**\n\n**Join the Club!**\n\n**Junior Park Rangers**\nKids between the ages of 7 and 12 are invited to participate in our Junior Park Ranger program. Choose from a variety of activities while learning more about Lassen Volcanic National Park. Kids who complete the Junior Ranger activity booklet can earn a patch and certificate.\n\n**Chipmunk Club**\nOur youngest explorers are welcome to participate in the Lassen Volcanic National Park Chipmunk Club. Kids can learn more about wildlife in the park and earn a Chipmunk Club sticker.\n\n**Green Junior Rangers**\nJunior Rangers, this is your chance to go green! The Green Junior Ranger program encourages kids to think and act beyond the park, “thinking globally and acting locally.” Kids will learn Green Ranger reduce, reuse, and recycle tips that they can practice every day as part of being green. Kids who complete the Green Junior Ranger activity card earn a patch and certificate.\n\n**Sleeping Under the Stars**\nDid you know your school or non-profit group could receive a grant to sleep under the stars at Lassen Volcanic? The Lassen Park Foundation encourages groups to apply for annual camping grants up to $1,000 to help introduce camping and Lassen Volcanic National Park to underserved youth. Selected groups are invited to discover their national park while camping at Crags Campground and participating in hands-on, ranger-led activities.\n\nIn order to provide the invaluable experience", "num_tokens": 2048} {"category": "olmocr_science_pdfs-travel_and_tourism", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-travel_and_tourism/part-00-00000.npy", "text": " and to prepare properly.\n\nHow can I plan for shore landings? Special clothing is required for the shore landings (Antarctica, Galapagos); please refer to your predeparture documents for important details.\nAre all theatre performances suitable for children? Some theatre performances may be unsuitable for children – please consult your tour manager.\nDocumentation\nDo I need a passport? A valid passport is required for all trips. All passengers should check with the appropriate foreign consulate for entry and validity requirements as well as other laws that may affect your ability to travel. We recommend that your passport has six months validity, and at least three blank pages. Passports and visas are the responsibility of each traveller.\nExtending Your Stay\nCan I extend my tour to see more of a region? Yes! You may enhance your tour by purchasing either an extension or pre/post hotel stays when offered. Extensions may be “hosted” rather than escorted. When hosted, passengers will be greeted upon arrival by a local tour manager who will be available on-call during the duration of the stay. A minimum number of passengers may be required to operate some extensions. Extensions not purchased at time of deposit are subject to availability and applicable charges at time of request.\nCollette also offers pre and post hotel nights before and/or after a tour. Should you purchase additional nights, your tour manager will not be available during this time.\nExtras\nWhat is not included in the tour price? The land price does not include international air travel from Australia, airline fees, airport or departure taxes, transfers, visas, customary end-of-trip gratuities for your tour manager, driver, local guides, hotel housekeepers, cruise ship waitstaff, and any incidental charges.\nLate Bookings\nDo you accept late bookings? Yes, tour sales normally close 7 days prior to departure. Late bookings are on request and must be guaranteed with full payment if within 60 days of departure date.\nOn-Tour Experience\nWhere do I meet my tour manager? Our tour manager will make contact with you at your first hotel. The hotel’s address and phone number will be included in your documents.\nCan I pre purchase optional excursions/activities? Yes, the majority of optional excursions and activities are available for advance purchase provided that you make your options purchase 15 days or more prior to the tour start date. Collette makes it convenient to reserve presold options by visiting our website for a full listing of activities and excursions or when your reservation is made with our team. In addition, there are benefits to pre-purchasing options including a price guarantee once your tour is paid in full, so once payment is received in full, your preselected options are guaranteed by Collette. Although you can still purchase options while on tour, reserving them ahead of time ensures you a spot in the event that the activity sells out. Collette will provide a refund if you cancel a presold option prior to tour departure. Any presold options cancelled while on tour are nonrefundable.\nRevisions / Changes\n\nWould my tour date ever be changed? While it is unlikely, Collette does reserve the right to cancel any tour prior to departure. Should this happen, Collette will make every effort to put you on another departure date. If an alternate cannot be found, a full refund will be made. Air booked through Collette will be protected. We cannot be held responsible for penalties incurred if you secured your own air.\n\nCan I make changes to my reservation? Should you decide to change your reservation after initial booking, a handling fee of $25 per transaction will be charged. A change of tour date or tour itinerary within the guidelines of the cancellation policy will be treated as a cancellation and regular cancellation fees may apply.\n\nRevisions to air tickets are subject to the rules and regulations of the airline. See our Cancellation Policy for more details.\n\nTour Pacing\n\nHow can I be best prepared for the pacing and physical requirements on a Collette tour? Tour pacing varies by itinerary, and each destination’s activities are unique. Pacing is subject to personal interpretation. For overnight pacing of a tour, please refer to the “Accommodation” section on each tour page and on the tour map. The day-by-day descriptions will provide additional detail about the number of activities included in each day.\n\nThe Tour Activity Level Ranking is featured on each tour itinerary in a circle. The definition of each activity level is listed here. If you have additional questions regarding a specific tour, please inquire at time of reservation.\n\nLevel 1: At a very leisurely pace, this tour involves minimal physical activity, such as climbing some stairs, boarding a motorcoach, and walking from the hotel reception area to hotel rooms and dining areas.\n\nLevel 2: This tour requires average physical activity. You should be in good health, able to climb stairs and walk reasonable distances, possibly over uneven ground and cobblestoned streets.\n\nLevel 3: This tour includes moderate physical activity. The itinerary blends some longer days with shorter days and more leisure time. Walking tours, as well as walking slightly longer distances, up stairs or on uneven walking surfaces should be expected.\n\nLevel 4: To truly experience the tour and destination, you need to be able to participate in physical activities such as longer walking tours, walking over uneven terrain, climbing stairs and periods of standing. Some of the touring days may be longer, with select included activities occurring later in the evening.\n\nLevel 5: This tour is very active, requiring participants to be physically fit to fully enjoy all the experiences. This itinerary has more strenuous activities which may include such things as: extensive walking tours, transfers over uneven and dusty terrain, high altitudes, early morning departures, late night activities, or extreme temperatures. All conditions do not apply to all days, so please read the itinerary carefully and speak to one of our customer care agents to determine if this tour is right for you. We recommend this programme to individuals who are physically fit. Unfortunately, this tour is not appropriate for individuals who use either walkers or wheelchairs.\n\nTransfers\n\nAre airport and hotel transfers available? Roundtrip airport-to-hotel transfers are provided for all passengers who purchase airfare through Collette. These transfers do not apply to pre- and post-night stays. Passengers who do not purchase airfare through Collette can purchase transfers (for the first and last day of the tour) at an additional cost from $120 per person, roundtrip. Some restrictions may apply. All transfers leave at prescheduled times.\n\nAre airport transfers available for pre/post hotel stays? All passengers who purchase pre and post hotel nights through Collette may also purchase transfers to/from the airport and the pre or post hotel. Please inquire at time of booking.\n\nWhat is the private chauffeur service? It’s your ticket to and from the airport. This personalised service is included within a 40km radius from Sydney, Melbourne, Brisbane, Adelaide, Perth, Canberra, Darwin, Cairns and Hobart airport gateways. * Service is available between 41-70 kms for a small fee. Not valid on group travel. * One transfer per room booking. Additional stops are not permitted on route.\n\nVisit gocollette.com/chauffeur for a video and more details on this amazing service!\n\nTravel Loyalty\n\nWhat is the Collette Passport Club? Formerly Travel Loyalty by Collette, the Collette Passport Club recognises past guests and allows you to automatically receive a $150 travel credit for each trip you take.† It’s our way of saying thank you for making us your #1 choice in guided travel.\n\n† Full credit is valid for your next tour when you travel within 12 months of the original trip. $100 of the credit remains valid for travel within 13-24 months, and the entire credit expires 24 months after the original trip.\nAdding Flights to your Collette Tour\n\nEnjoy the benefits of air-inclusive bookings. Allow us to be your liaison with the airlines and to handle all the details.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
Flex Economy AirfareInstant Purchase Economy Class²Premium Economy, Business & First Class³
Free roundtrip airport to hotel transfers included¹
Dedicated Concierge Service
Lounge Passes⁴
Express Check-In⁴
Eligible for Collette’s Travel Protection Plan
Benefit from our flexible change and refund policies
Deposit now, pay the balance later⁵
Eliminates future surcharges by locking in price
All the perks of upgraded air (more space, comfort and service)
\n\n¹) These are available on the first and last day of the actual tour dates and when you are travelling on select flights (not applicable to pre & post nights). Land only clients may purchase transfers on the first and last day of the actual tour dates for an additional cost (some restrictions may apply). Clients who purchase pre/post hotel nights may purchase transfers to/from the pre/post hotel. ²)", "num_tokens": 2048} {"category": "olmocr_science_pdfs-travel_and_tourism", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-travel_and_tourism/part-00-00000.npy", "text": "34 📞 (432) 426-3337\n\nGPS\nLatitude 30.599926 | Longitude -103.925934\n\nFind the coolest place in a hot state when you camp in mountains one mile high at this CCC-built park. The park is in the Davis Mountains, the most extensive mountain range fully contained in Texas. Motor into a full hookup site (with cable TV), backpack to a high overlook, make camp under the trees, check out the two beautiful wildlife viewing areas, or stop by Indian Lodge, located in the park. While you’re here, visit Fort Davis National Historic Site or attend a star party at the McDonald Observatory.\nFed by clear springs flowing from seeps and streams, the Devils River is one of the most pristine rivers in Texas. The state natural area is large, remote and has been named an International Dark Sky Sanctuary. Visit for day hiking, mountain biking, camping and paddling. All camping and facility stays are by reservation only. Make reservations at least one day in advance.\n\nA permit is required for all paddling trips on the Devils River which access TPWD-managed lands. For more information, visit the park’s webpage.\n\nBring a picnic when you visit this 1848 adobe fortress and trading post, which sits on a bluff overlooking a valley that leads to the Rio Grande. Ben Leaton traded with Apaches, Comanches and Mexicans here. Today the site is an active museum offering programs, reenactments, tours and colorful events. Enjoy the holidays with the annual reenacted posadas in December.\n\nThis is the western gateway to Big Bend Ranch State Park. Obtain permits here, as well as information on hiking, biking, river and equestrian opportunities. 🎈\nFranklin Mountains State Park\n\nHeadquarters: 1331 McKelligon Canyon Rd., El Paso 79930 📞 (915) 566-6441\n\nTom Mays Unit: 3.5 miles east of I-10 on Transmountain Rd.\n\nAt the westernmost tip of Texas, where mountains meet sky and cities hug the Rio Grande, lies the largest state park in an urban setting. Franklin Mountains State Park encompasses 26,627 acres in the city of El Paso. Hike rugged terrain in 40 square miles of Chihuahuan Desert wilderness, scrub vegetation and open space. Over 100 miles of multiuse trails are popular with hikers and mountain bikers. Camp and picnic, too. Ground fires must be in designated fire rings. You can build charcoal fires in grills at picnic sites.\n\nHueco Tanks State Park & Historic Site\n\n6900 Hueco Tanks Rd. No. 1, El Paso 79938 📞 (915) 857-1135\n\nNatural rock basins in granite outcroppings give Hueco Tanks its name. These basins capture rainwater, a precious resource in the Chihuahuan Desert. For millennia, people have come for water, as well as for the diverse plants and animals here. These people left behind curious and beautiful paintings. Today this ancient site preserves over 2,000 pictographs.\n\nWe limit visitors to protect the site. We recommend reservations for day use, camping and tours. Pictograph, hiking and bouldering tours in the guided area are available by advance request Wednesday through Sunday.\nIndian Lodge State Park\n16453 Park Rd. 3, Fort Davis 79734 📞 (432) 426-3254\nGPS Latitude 30.592877 | Longitude -103.943596\n\nIndian Lodge is nestled in the Davis Mountains, within Davis Mountains State Park. This southwestern, pueblo-style adobe lodge will charm you. Its original handcrafted interiors and furnishings date from its 1930s construction by the CCC. Guest rooms have cable TV, telephones and private baths. The lodge also has a full-service restaurant, group meeting room, swimming pool, and access to trails from the parking lot. This is truly a unique destination.\n\nMonahans Sandhills State Park\nPark Rd. 41, Monahans 79756 📞 (432) 943-2092\nGPS Latitude 31.618795 | Longitude -102.812112\n\nFun-loving travelers surf sand dunes that rise as high as 50 feet in this geologic wonderland. These sand dunes are a small part of a larger 200-square-mile dune field stretching into New Mexico. Rent sand disks at headquarters. The Dunagan Visitor Center features hands-on exhibits on dune dynamics and desert wildlife. Picnicking and camping are also popular. The park has an 800-acre equestrian area and three equestrian campsites, as well. The park is at exit 86 off I-20 west of Odessa, just east of Monahans.\nSeminole Canyon\nState Park & Historic Site\nHwy. 90 W., Park Rd. 67, Comstock 78837 (432) 292-4464\nGPS Latitude 29.7001 Longitude -101.313058\n\nAncient pictographs, rugged limestone terrain and spectacular canyons lure visitors to this park. People of antiquity once lived in natural rock shelters carved into canyon walls. They painted distinctive ancient symbols that tell us of their passing. The park's rock art is more than 4,000 years old. Learn more at the park's museum.\n\nHike the rugged landscape or camp in a tent or RV. Take a guided rock art tour Wednesdays through Sundays at 10 a.m. and 3 p.m. (times vary in summer). Contact the park for more information.\n\nTwo Ways to Show Your Love for Texas State Parks\nFor only $30/year, outfit your vehicle, motorcycle, trailer or RV with a Texas Conservation License Plate. Best of all, $22 of the $30 directly benefits Texas State Parks.\n\nConservationPlate.org/StateParks\nYour mom never went glamping.\nSo just pack up the family, fill the cooler full of Rambler,\nand get out there and go make some memories.\n\n#RaiseARambler\nSpecial thanks to Toyota, whose generous support made this guide possible.\nBrazos Bend State Park\n21901 FM 762, Needville 77461 📞 (979) 553-5101\n\nGPS Latitude 29.380798 | Longitude -95.594658\n\nBrazos Bend has almost 5,000 acres of lakes, prairies and forests. Live oak trees draped in Spanish moss shade the park's picnic areas. Explore more than 30 miles of multiuse trails, where you'll see alligators, white-tailed deer and over 300 bird species. Choose from six small lakes and a winding, tree-lined creek for fishing. Touch a hatchling alligator at the park's nature center, which is open daily. Nature programs offered every weekend and most holidays.\n\nGeorge Observatory leads star parties on Saturday nights. Call (281) 242-3055 for information.\n\nGalveston Island State Park\n14901 FM 3005, Galveston 77554 📞 (409) 737-1222\n\nGPS Latitude 29.198755 | Longitude -94.956212\n\nGalveston Island State Park is an excellent example of Texas Gulf ecology, with 2,000 acres that spans from the beach to the bay. Access is open to the bayside of the park, where coastal prairie, freshwater ponds, and salt marsh yield ample hiking, fishing, kayaking, and wildlife viewing opportunities. Historic houses, tent and multiuse campsites with restrooms and showers nearby are available on this side of the park.\n\nThe beachside area is closed as it undergoes renovations. Please check website for closure updates.\nGoose Island State Park\n202 S. Palmetto St., Rockport 78382 ☏ (361) 729-2858\n\nBrown pelicans, rare whooping cranes and fishing in the bountiful waters of Aransas, Copano and St. Charles bays draw visitors here. The CCC built Goose Island, Texas’ first coastal state park. It sits on the southern tip of the Lamar Peninsula. Dramatic wind-sculpted trees dominate the park. The “Big Tree,” a massive coastal live oak estimated to be centuries old, is one of the natural wonders of Texas.\n\nContact the park for updates on Hurricane Harvey impacts and recovery.\n\nLake Corpus Christi State Park\n23194 Park Rd. 25, Mathis 78368 ☏ (361) 547-2635\n\nSwimming, boating, waterskiing and sailboarding fill summer hours on this large placid lake. Angling for black bass, striped bass, crappie and catfish are year-round pleasures. The CCC built an impressive caliche crete open-air refectory here. It has arched", "num_tokens": 2048} {"category": "olmocr_science_pdfs-travel_and_tourism", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-travel_and_tourism/part-00-00000.npy", "text": " towards tourism, including whether the community is hospitable, are important for the sustainability of tourism in local communities.\n\nIn South Africa, the level of involvement of local communities in tourism is very low. The role of the local authority is important in stimulating community-based tourism development and tourism-driven LED. The local authority should play a role in marketing the local area to tourists and to the private sector for tourism-related investment. A local authority that is well resourced may be able to commission studies on a variety of issues such as statistical information on the volume of tourists in the locality, creating partnerships with the private sector and tourism promotion and marketing (Charlton and Essex, 1995: 43).\n\nAt the time of the American study, the local communities in Illinois were aware of tourism’s benefits. Wilson, et al. (2001: 136) feel that if communities are involved and appreciate their involvement, their word of mouth and pride in what they have will be the best way to promote local tourism. It must be acknowledged that not all community members will support and value the importance of tourism in their own areas, especially if they do not benefit from it.\nAn important consideration is that structures are accessible and opportunities available for their involvement, should they wish it.\n\nThe American study underscores the importance of both promoting the attractions and services available to tourists and of the knowledge of where aspirant tourism entrepreneurs may receive technical assistance. If the Americans with their high literacy rate regard technical assistance in marketing and drafting of business plans important, South Africa’s rural communities will need them even more owing to their low level of literacy. The respondents in the American study emphasise the importance of tourism information and assistance and the need for organised central agencies and councils to provide them with information and technical assistance (Wilson, et al. 2001: 136)\n\nA study on the Highlands Meander, a tourism region in Mpumalanga Province, by Rogerson (2002a: 161), states that black local communities lack an appreciation of the importance of the tourism industry. Without in-depth understanding of the great potential offered by tourism, they will not fully appreciate its great potential. Local communities lack information on how they could interlink with the tourism industry. This lack of information on tourism’s potential to stimulate local socio-economic development is one of the challenges which requires the combined resources and efforts of both private and public sectors.\n\nIn South Africa, local communities lack the necessary training and this prevents them from participating meaningfully in the tourism industry. They do not have the expertise to operate a successful tourism venture (Killion, 2001: 181; Kaplan, 2004:217) and are consequently not in a position to enjoy tourism’s socio-economic benefits.\nIn an interview with Marx (2003a: 17), Matlou responded to a question on the importance of technical and general knowledge of the tourism industry as prerequisites for successful entrepreneurship by emphasising that those who want to venture into the tourism business require sound business principles in management, marketing and finance. They need to have business plans, to know the market and the resources required and, above all, to be prepared to work hard just like in any other business.\n\nThe support and involvement of local government is crucial to local tourism development. According to the participants in the American study, the role of local government should be funding and promotion; creation and maintenance of the infrastructure necessary for tourism such as roads, airports, reliable water and electricity supplies; and zoning and maintenance of the community so that it is clean and appealing to tourists. Stakeholders should also invest in education and occupational support for tourism employees and entrepreneurs (Wilson, et al. 2001: 134).\n\nOther examples of local government support for tourism are listed as funding the production of brochures, organising and improving traffic systems, keeping the streets clean and free of potholes and beautifying downtown areas by planting flowers (Wilson, et al. 2001: 134). Fortunately, the Panorama region has fairly good roads and fairly clean towns. The only streets that are not tarred are the ones in the villages. Otherwise, road maintenance and tourism signage are visible through towns right into the picturesque mountains. Men weeding the verges at the top of mountain passes are a common sight.\n\nInadequate funding for tourism development and promotion presents a problem in South Africa and elsewhere (as revealed by the American study). Rural communities are generally trapped by poverty. They do not have the capital\nresources to invest in business development. The investors, on the other hand, most of whom are private and from the big cities, are hesitant to invest in rural communities. Between 1995 and 1998 investment in the tourism industry in South Africa amounted to R44.9 billion, split among seven sectors, the main beneficiary being the construction sector (United Nations, 2001: 2).\n\nThe above figure may not mean anything until one establishes who was investing and in which geographic area this investment was made. Take for example the building of complexes which received 21% of the R44.9 billion – shopping complexes not owned by black business people and built without black economic empowerment deals do not lead to black economic empowerment. They perpetuate the class divisions among the South African population. Even services (which got 6% and attractions, which received 2%) will not mean anything until one knows where the investment was made.\n\nAccording to the American study, successful communities are those that provide tourists with packages which persuade them to stay longer and to spend more. Those that have something to offer but do not provide attractive packages continue to receive smaller numbers of tourists (Wilson, et al. 2001: 134). The marketing strategy of South African Tourism currently includes promoting the Southern African Development Community (SADC) as a tourist region. Tourists are offered packages to South Africa and the SADC countries and are also encouraged to stay longer and spend more (South African Tourism, 2002: 38).\n\nIn South Africa, aspirant tourism entrepreneurs still struggle with packaging the tourist product. This thwarts all prospects of compiling a comprehensive package for tourists because such packages include a variety of products usually provided by more than one tourism entrepreneur.\nPackaging the tourist product involves putting it together in a consumable way, considering factors such as the nature of the product, its accessibility, the area’s natural beauty, climate, affordability, health considerations, socio-political stability and telecommunication. The overall objective should be to package a tourist product in a way that attracts and attains tourist satisfaction. The satisfaction of tourists has many advantages for local communities in that it leads to more spending, longer stays and repeat visits.\n\nIn an interview with Marx (2003a: 18), Matlou notes that packages should be created to include a stay in the townships. He says that the way the country is marketed may spell doom or boon for the emerging tourism entrepreneurs. He emphasises the need to market South Africa as a multicultural country while not discarding the traditional approach of marketing it as a country featuring the Big Five.\n\nThe difference between the experiences of the Americans in Illinois and the local communities in Mpumalanga Province is that the Americans are directly empowered by local tourism events whereas in Mpumalanga Province only the established white tourism entrepreneurs benefit. During the World Gold Panning Championship in Pilgrim’s Rest, Mpumalanga Province, held in September 2005, mainly white entrepreneurs benefited. Their accommodation was fully utilised as were their transport and restaurants. Local black vendors tried unsuccessfully to sell their crafts, the main activity they do for themselves by themselves, but on the day participants in the Gold Panning Championship bought mainly alcohol and food, not crafts.\n\nThe American study emphasises coordination and cooperation between business people and local leadership. It encourages partnerships between the local communities and the public and private sectors. Utilisation of the funds\nearmarked for investment in community-based tourism projects requires that all stakeholders work together.\n\nIn Chapter 4 of this study a project that remained a ‘white elephant’ in Chieftain Mohlala’s community because of a lack of consultation and cooperation is discussed. The government approved a tender for the construction of a cultural centre. To date, the cultural centre stands empty and unutilised. The participants in the American study emphasise the importance of consultation, proper coordination and cooperation by all stakeholders.\n\nIn Mpumalanga Province specifically and South Africa as a whole, the best approach will have to include mentoring of emerging tourism entrepreneurs by those who are established. Unfortunately, South Africa’s race relations have not yet matured to a stage where voluntary mentoring is possible. In the researcher’s opinion, consideration must be given to providing incentives to mentors. Without such incentives, it is unlikely that any tourism entrepreneur will want to use his or her time in mentoring others.\n\nStrategic planning is vital in preparation for any business venture. Proper planning delivers expected results and avoids wastage of time and capital resources. In South Africa there is no shortage of policy frameworks for the development of communities. The problem is in implementation, monitoring and evaluation of development initiatives.\n\nThe participants in the American study perceive cooperation among tourism entrepreneurs as an important factor for successful tourism development (Wilson, et al. 2001: 135). This is understandable considering the multi-sectoral nature of the industry. It fosters relations with different types of economic sectors and businesses. The use of a core-group in communities, which\npresumably adopts the role of LEDA in South Africa, to make tourism work is, however, an experience that remains remote in the thinking of local communities in the Panorama region.\n\nIn Chapter 5 of this study, sub-section 5.3.3, it is stated that the use of development agents or consultants is common in South African tourism development. These development agents are", "num_tokens": 2048} {"category": "olmocr_science_pdfs-travel_and_tourism", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-travel_and_tourism/part-00-00000.npy", "text": "odus from the city:\n\n“There is another kind of trouble, more psychological in nature. Fear of crime and impatience with bad services drove people away in the 1970's. Today the city is coping with a broader fear, of being a target of international terrorism. How does it even begin to address that, other than with bravado and clever television commercials starring pretend ice skater Woody Allen?” (Purnick 2001a).\nThe tourism-related industries were called upon to create the tableau in which spiraling fears regarding New York City’s future could be anchored for these industries had the resources and means to stabilize the free-fall of the city’s place in the global economy.\n\nTable 5.1 provides a timeline of the tourism-led growth coalition’s activities in the months succeeding 9/11.\n\nTable 5.1: Timeline of the New York City tourism-led growth coalition’s efforts in the months succeeding the attacks of September 11, 2001.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
DateEvent
September 11, 2001Terrorist attack on the World Trade Center in New York, as well as the Pentagon in Washington, DC. Downing of United Airlines Flight 93 in Shanksville, PA.
September 12, 2001Executive Committee Meeting of NYC & Company. Decision made by Mayor Giuliani for curtains to again rise on Broadway on September 13. At the meeting, the Mayor asked the city’s restaurant community to aid in feeding Ground Zero rescue and relief workers.
September 13, 2001Broadway theaters reopen.
September 16, 2001Mayor Giuliani holds press conference at Command Center and states that the best way to help the city is to spend money and go see a show.
September 18, 2001Anthrax-tainted letters are postmarked at a Trenton, NJ post office, addressed to the offices of NBC News and The New York Post in New York.
September 21, 2001Congress passes bill, with the support of the White House, providing liability protection for the airlines as well as proving the airlines with cash and loan guarantees.
September 21, 20019/11 Interfaith memorial service held at Yankee Stadium.
September 25, 2001New York Times/CBS News poll reported that eighty-four percent of Americans say they have a good image of the city, up from 61 percent when the question was last asked in early 1998. Mayor Giuliani receives a 95 percent approval rating nationwide.
September 27, 2001American Society of Travel Agents moves their annual event from Spain to New York.
September 27, 2001President Bush delivers speech from the tarmac of O’Hare International Airport in Chicago, urging Americans to “take your families and enjoy life, the way they want it to be enjoyed.”
September 28, 2001League of American Theaters and Produces wraps up production of their “Let’s Go On With the Show” television ad, featuring cast members of all the major Broadway productions.
October 1, 2001Mayor Giuliani addresses the United Nations General Assembly.
October 2, 2001New York State announces pledge of $40 million for an I Love New York tourism promotion campaign.
October 2, 2001Delta Air Lines named official airline of NYC & Company, pledging 10,000 free tickets to New York. Mayor Giuliani attends the press conference, held at the offices of NYC & Company, announcing this development. This was the first formal press conference that the Mayor held away from the Command Center.
DateEvent
-------------------------------------------------------------------------------------------
October 10, 2001“A New Day” ad, narrated by Governor Pataki and Mayor Giuliani, begins airing on television.
October 31, 2001A 61-year old hospital stockroom worker from The Bronx infected by New York’s first case of inhalation anthrax died at Manhattan’s Lenox Hill Hospital (Lipton 2001b).
November 3, 2001“Paint the Town Red, White and Blue” promotion announced by NYC & Company.
November 24, 2001Macy’s Thanksgiving Day Parade held as scheduled.
November 30, 2001“Canada Loves New York” program launched.
December 5, 2001“I Love New York for business” ad campaign announced by Governor Pataki.
December 10, 2001“Every Dollar Spent Downtown Is A Dollar Spent Rebuilding It” promotional campaign launched by the Alliance for Downtown New York Business Improvement District.
December 12, 2001Mayor Giuliani and NYC Department of City Planning unveil a study titled “Far West Midtown: A Framework for Development.”
December 20, 2001Ellis and Liberty Island reopens for visitors.
December 30, 2001Ground Zero viewing platform opens to the public.
January 1, 2002Michael R. Bloomberg succeeds Rudolph Giuliani as Mayor of New York City. Daniel Doctoroff, the President of NYC 2012 (the private group dedicated to bringing the 2012 Olympics to New York), becomes Deputy Mayor of Economic Development and Rebuilding.
January 1-16, 2002“Spend Your Regards to Broadway” promotion conducted. The promotion is announced on December 18, 2001.
January 6, 2002League of American Theaters and Producers release a coupon book providing incentives for Broadway and Off-Broadway shows, as well as local hotels, restaurants and parking garages.
February 3, 2002Senators Schumer and Torricelli announce their effort to secure the 2007 NFL Super Bowl.
February 5, 2002NYC Firefighters sent on nationwide “thank-you” tour.
February 27, 2002Do It Downtown! discount card program launched by Wall Street Rising.
April 3, 2002Announcement that the 2003 Grammy Awards will be held in New York.
May 8-12, 2002First annual Tribeca Film Festival. The Festival is announced at a press conference with Robert DeNiro, American Express CEO Kenneth Chenault and Mayor Bloomberg on March 21, 2002.
May 13, 2002Jonathan M. Tisch succeeds Tim Zagat as the chairman of NYC & Company.
Summer 2002River to River Festival is organized by the Alliance for Downtown New York and sponsored by American Express.
August 2002Formal effort begins by NYC & Company and NYC Big Events to recruit the 2004 Democratic and Republican National Conventions.
August 27, 2002The United State Olympic Committee announces that New York would join San Francisco as the finalists to represent the", "num_tokens": 2048} {"category": "olmocr_science_pdfs-travel_and_tourism", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-travel_and_tourism/part-00-00000.npy", "text": "ateur sample, intensification of competition was repeatedly identified as the primary cause of this gruelling and underrewarded toil (Ram et al. 2000). As we have argued elsewhere (Ram et al. 2002), the restaurant sector is no less subject to market saturation than most of the other sectors in which Asian businesses are concentrated, a paradoxical situation at first sight. Unlike retailing and CTN (confectionery–news–tobacco), where the impact of supermarket and other corporate competition has wrought catastrophic havoc on the small Asian entrepreneur’s market position (Jones and Ram 2003), the Asian restaurateur basks in a sector with explosive growth in customer spending, underpinned by a seemingly inexhaustible white middle-class consumer base. Nevertheless, the reality is that restaurants, takeouts and other supply outlets have grown even faster than demand – the result of what might be described as a ‘gold-rush effect’, where excessively large numbers of prospectors are drawn in by the hope of rich pickings. As in an actual goldfield, it is generally the first entrants who thrive, while the later arrivals struggle.\nEnthusiasts for the benign qualities of entrepreneurialism as liberator and enricher of the individual are fond of extolling the profit-making opportunities offered by the various ‘niche markets’ supposedly opened up by the post-industrial economy. By their very nature, however, such niches tend to fill up very rapidly and, unhappily, South Asian business owners in Britain have discovered that every niche they have pioneered has soon been flooded by a surfeit of competitors—fellow Asians metaphorically slitting one another’s throats (Jones et al. 2000). Even that most niche-like of niches, exotic catering, has not proved immune from the process, despite Asians enjoying both customer growth and an effective ethnic monopoly. While competition among the balti houses themselves constitutes an onerous threat in its own right, owners also identified additional competitive pressures from non-balti outlets like fish-and-chip and fast-food shops and from the growth of balti houses in other parts of the city region (Ram et al. 2000).\n\nAt this juncture, we need to qualify any impression that these restaurant owners are no more than pawn-like victims of an antagonistic commercial environment. Indeed this is one of the pivotal issues in the entire debate about ethnic minority enterprise: the question of self-determination versus external determination, agency versus structure. For our own part, we have consistently laid stress on the political-economic environment in which such entrepreneurs are embedded, a stress designed to counter over-optimistic accounts of Asian business as a success story resting on the autonomous resources of the ethnic community. Nevertheless, there is still a sense in which, like any other social actor, Asian entrepreneurs must be recognized as active agents exerting free will and choice to adapt to market pressures which in themselves are far from absolutely inevitable or deterministic. On the contrary, there is a range of managerial options—ostensibly at least—and Asian restaurateurs can be seen to be striving with considerable ingenuity to ameliorate and adapt to competitive stress (see Ram et al. 2002 for fuller account of adaptive strategies). Most successful are those who have ‘gone upmarket’, differentiating themselves from the competition by the conspicuous opulence of their premises and the reputation of their cuisine. Often such businesses are (re)located in affluent suburban or city centre premises well removed from the inner-city squalor of the Balti Quarter, distancing themselves physically as well as socially from the mass. Yet in the last instance, however proactive and creative their strategy, Asian restaurateurs’ strategic space is rigorously constrained within parameters fixed by external market conditions. Success is strictly rationed by price in the capitalist market, and because the upmarket strategy is essentially capital-intensive, it is open only to a minority of small Asian entrepreneurs. Typically, Asian entrepreneurs are under-capitalized and lack the means to execute ambitious projects requiring costly sites, premises and equipment (Ram et al. 2002). Proactive adaptation is\ncertainly to be recommended, but it cannot be piously assumed, given the average entrepreneur’s non-possession of the necessary resources.\n\nIf this line of reasoning still appears to play down the force of entrepreneurial agency, we would remind the reader that we are far from alone in questioning the small business owner’s freedom of self-determination. Chapman (1999) is one observer who disputes whether the term ‘strategy’ is applicable at all in small firms, where the owner’s workload is too time-consuming to allow for strategic thinking, and where management is more likely to consist of ad hoc reaction, ‘just muddling through on the basis of custom, trial and error; … a course of action is not a strategy if it has been forced on one by circumstance’ (Chapman 1999: 77). In similar vein, Curran et al. (1991) refer to small business strategies as ‘hypothetical’. Significantly, these writers are addressing small firms as a whole rather than those owned by ethnic minorities, whom we might suppose to be even more constrained.\n\nIn the light of these strategic non-options, it comes as no surprise that Birmingham Asian restaurateurs’ responses to market pressures tend to take the familiar low-tech labour-intensive cost-cutting form that has bedevilled Asian business owners in Britain from the very outset. As the case of the Punjabi restaurant cited above suggests, this need not always be disadvantageous, since an effective low-cost strategy is available through the creation of a unique gastronomic identity. Yet even this depends on high-quality culinary skills, another scarce resource beyond the reach of many. More typically, restaurateurs rely for their survival on a very basic form of price competition, with menu tariffs maintained at a low level, dependent on the entrepreneur’s willingness to accept uneconomic returns for long and unsocial working hours. While this is certainly to be seen as active agency, it is hardly an inspiring recommendation for the virtues of free will and choice – nor indeed for multicultural urban reinvention. To put it baldly, Birmingham’s vaunted multicultural culinary experience, its vast choice of innumerable and affordable curry houses, would be decisively compromised if all Asian restaurateurs operated according to capitalist calculative rationality and actually insisted on profitability as a condition for their existence. If, on top of this, they were also to desist from cutting regulatory corners, the outcome could only be a drastic reduction in the number of catering outlets. The sector’s continuance and further development as an urban re-branding exercise rests entirely on Asian entrepreneurial self-exploitation (not to mention self-criminalization) – and indeed on worker exploitation, as we shall discover in the following section.\n\n**Employees**\n\nRunning incessantly throughout the discourse in this field is the theme of the family as a decisive source of labour power for the ethnic minority business. Whether in catering or elsewhere in the economy, family\nmembers are seen as a trusted, flexible and cut-price labour supply that gives these businesses a competitive edge (see Ram and Jones 1998 for a review). Highly advantageous in principle, in practice family business units can be riddled with all manner of schisms on generational and gender lines and can be hampered by nepotistic loyalties (Ram and Jones 1998). Moreover, in the case of restaurants, the role of family members is qualified by two special considerations. First, the rising expectations of the British-born generation – and often of parents on behalf of their children – mean that fewer young family members wish, or are compelled, to submit to the drudgery of the late-night catering business. Second, the necessary scale and division of labour in the typical restaurant compels additional recruitment beyond the familial bounds, though almost always within the co-ethnic community. Scholarly accounts of the resulting boss–worker relationships have tended to be polarized between the narrative of sweated exploitation recounted by writers like Mitter (1986) and the idealistic representations of workplace harmony, where face-to-face paternalism and common ethnic bonds can apparently transcend the normal class antagonisms (Werbner 1990).\n\nWhen these ethnic minority models of industrial relations are set against the mainstream discourse on small firms, one is struck by the degree of similarity – by the way in which the behaviour of ethnic minority firms is no more than a variation on a universal theme. According to Chapman (1999), the belief in small-firm working relationships as essentially harmonious is a long-standing theme applying right across the board, irrespective of ethnicity. Over time, the harmony thesis has become subject to critical scrutiny, with the small workplace increasingly recognized as the site of a complex range of possibilities. One possibility is that control is exerted through persuading workers to collude willingly in the process – though, as Goss (1991) makes clear, there are various degrees of this. His own typology of small-firm control strategies ranges from fraternalism and paternalism, where the boss’s authority is heavily disguised under a veil of personalized face-to-face pseudo-equality; through benevolent autocracy, where authority is overt but tempered by grace and favour; to sweating, which speaks for itself. In applying this kind of mainstream thinking to Asian firms, Ram (1994) argues for what he describes as ‘negotiated paternalism’, a regime far from conflict-free, but in which employees enjoy more than the customary leverage.\n\nCertainly many of our own interviews bear testimony to the benefits for workers that lie in these informal industrial relations practices. Among the fringe benefits mentioned are lifts to and from work and free food on the premises, though like any other paternalistic rewards these are contingent on the whim of the employer. Looking more closely at Asian restaurant practices in the light of Goss (1991), we emphasize that relationships", "num_tokens": 2048} {"category": "olmocr_science_pdfs-travel_and_tourism", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-travel_and_tourism/part-00-00000.npy", "text": " Non-Motorized Recreation Plan is intended to guide DNR in planning, developing, and managing non-motorized recreational opportunities and public access over the next 10-15 years. It includes DNR’s recreation program goals, and identifies priorities for implementation. This plan will be evaluated periodically as part of adaptive management, and changes will be made as necessary to ensure compatibility with trust obligations and forest management objectives.\n\nConcept Map\n\nOne key outcome of the planning process is the development of a recreational use concept map (see Figure 3) for The Recreation Planning Area. The map reflects the general locations of proposed recreation management concepts within The Recreation Planning Area. DNR developed the concept map with involvement and feedback from the Recreation Planning Committee and the public. The concept map is based on broad scale mapping information. Exact locations and site specific details related to proposed projects will be generated from on-the-ground site assessments to ensure safety, sustainability, and a positive user experience consistent with trust obligations.\n\nThis concept map shows the general locations related to what is proposed for the next 10-15 years as the plan is implemented.\nFigure 3. Recreational Use Concept Map\nObjectives and Strategies\n\nAnother key outcome of the recreation planning process is a list of recreation management objectives and strategies for The Recreation Planning Area. These objectives and strategies describe in further detail the proposed recreation concepts and how they may be implemented and managed. Implementation of proposed projects is subject to the availability of funding, staffing and consideration of maintenance and operations funding.\n\nRecreation Planning Sub-Areas\n\nDue to the dispersed nature of the units of trust lands in The Recreation Planning Area, Sub-Areas (see Figure 4) were created as part of this recreation plan to assist in associating specific objectives and strategies with particular locations or landscape features. Recreation Planning Sub-Areas describe geographic sections and the primary management objectives (PMOs) of The Recreation Planning Area (see Table 1). Sub-Areas are not intended to reflect official boundaries. The sub-areas not listed in Table 1 will still allow dispersed recreation.\n\nThis is a broad-scale planning effort and includes a non-project level environmental review in compliance with the State Environmental Policy Act (SEPA). In the future, as this plan is implemented, there will additional project specific work such as site-specific assessments, field reconnaissance and inventory work, and detailed facility and trail design work. During implementation, individual projects will be subject to applicable regulatory procedures and practices. Processes referred to in these objectives and strategies are in addition to and do not replace current regulatory processes and procedures. At that time there will be additional environmental review in compliance with SEPA and opportunities for public involvement.\n\nTable 1. Recreation Planning Sub-Area Designations\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
Recreation Planning Sub-Area DesignationPrimary Recreation Management Objectives
Red Mountain Unit: Portions of the Red Mountain block of trust landNon-motorized recreation
North Fork Unit: Portions of the North Fork block of trust landNon-motorized recreation
Stewart Mountain Unit: Portions of the Stewart Mountain block of trust landNon-motorized recreation
Mirror Lake Unit: Portions of the northern Mirror Lake block of trust landNon-motorized recreation
\nFigure 4. Recreation Planning Sub-Areas\nPublic Access\n\nThe forest road system was built for the purpose of supporting working forests. These forest roads provide access into DNR-managed lands and are maintained for timber management purposes. These roads also serve as the primary means of public access to the Red Mountain, North Fork, Stewart Mountain and Mirror Lake units of The Recreation Planning Area.\n\n**Entire Planning Area**\n\n**Objective A:** Look for opportunities to provide public access to each recreation development zone in The Recreation Planning Area as compatible with timber management.\n\n**Strategies**\n1. Work with private property owners in an effort to secure public access rights onto forest roads that access the recreation development zone in the Stewart Mountain Unit.\n2. Maintain public access into the Red Mountain Unit and the North Fork Unit.\n3. Integrate marbled murrelet conservation strategies for the North Fork Unit into recreation access to development zones.\n\n**Objective B:** Use existing forest roads whenever appropriate to provide public access into recreation development zones.\n\n**Strategies**\n1. Inventory forest roads that could potentially provide access into the various units of The Recreation Planning Area.\n2. As needed, identify locations where new roads could be developed to access proposed trailhead locations.\n3. Project proposals will include forest road options, public safety considerations, cost benefit analysis and mitigation strategies that take into account year round working forest activities.\n\n**Objective C:** Where reasonable, establish and maintain roads to each trailhead location to a level that is appropriate to the needs for vehicular access.\n\n**Strategies**\n1. Develop criteria for access roads into recreation development zones that fits into the primary management activities on DNR-managed lands.\n2. Bring existing roads up to standards established to provide appropriate access to each trailhead location.\n3. Develop a long-term sustainable maintenance program to maintain access roads, while addressing forest practices maintenance issues.\n4. Identify funding methods to implement appropriate staffing maintenance and operations programs.\n\n**Recreation Trails**\n\nA main component of all trail projects will include an evaluation a) of existing undesignated\ntrails within the units planned for recreation development (Red Mountain, North Fork, Stewart Mountain and Mirror Lake units) for sustainability and user experience, and b) planning new trails that are sustainably located and built to provide a safe recreation experience without compromising environmental and resource health. New trail systems are a dynamic element across many landscapes; integrating trail planning and forest management activities provides an opportunity to respond to the changing nature of the working forests. Trail work will include restoring areas with known resource and environmental damage, relocating and developing trails in long-term sustainable locations, and restoring former trail locations.\n\nThe Recreation Program statewide coordinates with forest management activities when planning trail systems. This ensures the response to current and future management activities, including timber harvests that may impact trails, is managed appropriately. The dynamic nature of our forests mean that trails may be temporarily closed or re-routed in response to our agency’s vital mission to generate revenue for the trust beneficiaries.\n\n**Entire Planning Area**\n\n**Objective A:** Provide and maintain a network of safe, enjoyable and sustainable non-motorized recreation trails consistent with the following strategies based on available staffing, funding and resources.\n\n**Strategies**\n\n1. When planning for and locating future trails, inventory existing undesignated, non-sanctioned trails to determine extent of resource and environmental damage and the potential for reuse as part of a designated trail system.\n2. Develop a coordinated systematic approach to adding new trails where appropriate, decommissioning and/or restoring old locations simultaneously.\n3. Provide separate use trails where appropriate for safety of users and user experience.\n4. Design and locate designated trails consistent with DNR’s standards, stewardship responsibilities, suitability criteria, safety and risk management, and user experience.\n5. Create and maintain trail systems that minimize long-term maintenance and prevent or minimize the potential for erosion and sediment delivery into nearby streams and water bodies.\n6. Establish Trail Management Objectives (TMOs) for the designated trails; TMO’s describe standards for planning, construction, and maintenance of new trails and trail segments.\n7. Provide trail lengths, loops, and destination trails that create a range of trail experiences.\n8. Where practical, locate trails away from adjacent private property boundaries.\n9. Establish a trails working group that includes representatives from interested user groups and local residents to provide ongoing input and participate in trail planning, design, group events and maintenance.\n10. Consider and pursue a range of maintenance funding opportunities for trails including partnerships, commercial agreements, permits and fees.\n\n**Objective B:** DNR is willing to participate in trail planning, for example, on the Whatcom County conceptual Bellingham – Mt. Baker Trail, that may result in trail development on DNR lands.\nland should another state agency, local government body, or organized group of individuals convene a planning committee of stakeholders.\n\n**Strategies**\n1. Work with land managers (public and private) and stakeholders to participate in public input driven planning processes that include DNR land.\n2. As these opportunities are presented, engage with necessary parties to encourage the design and development of non-motorized trails that are consistent with DNR’s standards, stewardship responsibilities, suitability criteria, safety and risk management, and user experience.\n\n**North Fork Unit, Red Mountain Unit, Mirror Lake Unit and Stewart Mountain Unit**\n\n**Objective C:** Provide non-motorized trail opportunities for horseback riding, hiking and mountain biking based on available staffing, funding and resources.\n\n**Strategies**\n1. Inventory and evaluate the non-motorized trail zones identified on the Concept Map (Figure 3) for a non-motorized trail system.\n2. Partner with the public to identify trail location options.\n3. Work to plan, design and develop a variety of non-motorized trails for hiking, horseback riding and mountain biking.\n\n**Objective D:** Provide non-motorized trail connections to Whatcom County parks – Lake Whatcom Park, Canyon Lake Community Forest and Silver Lake Park, based on available staffing, funding and resources.\n\n**Strategies**\n1. Work (establish partnership) with Whatcom County Parks and Recreation Department, to identify potential linkage routes for connecting to existing and proposed county trails in Lake Whatcom Park, Canyon Lake Community Forest, and Silver Lake Park.\n2. Evaluate areas that could be suitable for locating multi-use trail connectors.\n3. Design and develop trails with compatible connections to county trails.\n\n**Objective E:** Provide non-m", "num_tokens": 2048} {"category": "olmocr_science_pdfs-travel_and_tourism", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-travel_and_tourism/part-00-00000.npy", "text": " MoE. The differences in interpretation have created uncertainty and frustration among involved parties, which have not contributed to efficiency. For the present set-up to work, a better coordination and alignment of interests and priorities between the main stakeholders (UNESCO and MoE) must be ensured.\n\nGenerally speaking, however, many interviewees note that a foundation is probably an efficient institutional set-up for a Nordic C2 Centre. The benefits of being a foundation versus the same work being put under a government ministry, is that an organization can act more independently and decisively, and be spared (reportedly often extensive) bureaucratic processes reflecting the rules and regulations for public administration. On the other hand, placing the same tasks and funding under a ministry would allow for synergies. The relevant Norwegian institutions would be the Directorate for Cultural Heritage, the Environmental Agency or a research organisation. The Nordic network that NWHF has is also available for these actors, as well as international contacts. The Directorate already works with international parties through bilateral projects, and can for instance use them to assist in nomination processes and Periodic Reporting. Such organisations could also maybe do a better work on supplying Nordic expertise internationally, given that they can be supposed to have a better, and updated, overview over existing competence. The marginal costs of expanding the Directorates international work would probably be lower than the funding of NWHF, given that it is possible to employ 3-4 persons within the same organisation and localities as today. Such a solution would guarantee MoE a better control of the use of these resources. However, one would no longer have a C2 Centre for the Nordic-Baltic region. Moreover, the flexibility and independence that NWHF provides would be lost with such a solution. In terms of efficiency, there are drawbacks and benefits that are difficult to quantify to the alternatives of placing the mandated tasks of NWHF in a foundation or under a ministry.\n\nTo transfer the funding to a research organisation could also prove difficult since the work of NWHF cannot be classified as research and hence could be incompatible with the statutes of the potential research organisation. It would also not necessarily solve the problem of lacking steering control for MoE.\n4.3.5 Funding arrangements\n\nThe basic funding for the running of the secretariat and the board comes from MoE, see chapter 2.6. In addition projects have been funded by external funders, mainly MFA, but also FK Norway and Government of Switzerland in the present period. MoE also offers grants to seminars, conferences etc. as supplements to the basic grant to the Secretariat. Most of the project funds are being transferred to cooperation partners, while some are being used to cover travel and other expenses, for instance extra staff, in connection with the project in question.\n\nBasic funding subject to National Budget regulations\n\nThe Agreement requires that the Norwegian government grants NWHF at least NOK 3.5 million per year, but for the whole period the basic funding has been above, with 1.5 million for all years except 2012 when the funding was reduced to NOK 4 million. The yearly grant is being decided in the National Budget, and is as such affected by the yearly governmental budget discussions and priorities. This renders some uncertainty for NWHF, since the Governmental budget is not being public before October, an uncertainty that was highlighted for the budget year 2012. Being presented for a 20 per cent cut in the funding from MoE on rather short notice NWHF was forced to implement cuts in their own budget, including moving to cheaper offices, non-renewal of one staff member’s contract and drawing on the Foundation’s retained equity to balance the budget. But given the regulations for the National Budget it is not possible to secure grants for more than one year ahead, except the amount that is decided in the agreement. This is a situation all grant recipients has to adapt to, and plan in accordance to. It is also noteworthy that the operating costs in 2012 were higher than in preceding years, for instance with higher travel expenses. This indicates that the reduction in the funding was not fully reflected in the operation of NWHF.\n\nPossibilities for extra payment\n\nThe board has agreed to give the secretariat the possibility to invoice payment for services provided, for instance to governmental partners and WH site managers on work related to Periodic reporting. This possibility should however not be used for “basic” services. So far this opportunity has not been used by the secretariat, partly due to unclear delimitation of when to apply this payment (what is basic services?) and partly due to the extra work this will require from the secretariat.\n\nContribution from the other Nordic countries\n\nNWHF has a Nordic dimension and one could therefore ask why the other Nordic countries should not contribute to funding the foundation. If they find NWHF useful there should be some willingness to pay in order to keep the foundation running.\n\nAt present NWHF covers all travel costs for the board members in connection with board meetings (but no allowances). This is common practice for boards, but one could argue that the other Nordic members should pay for this themselves. And to our knowledge at least one of the board members does not always send the travel expense bill to NWHF.\n\nAt the same time the Nordic board members (and hence their governments) contribute in kind, varying from 4-15 working days per year according to our informants in the board. In addition they contribute with knowledge to the foundation.\nAnother consideration is that for this kind of cooperation, both within the UN system and Nordic Council of Ministers, it is commonly agreed upon that the country hosting the institute also provides the core funding.\n\n_Funding UNESCO directly_\n\nMost of the interviewees agree that donating NOK 4-5 million directly to the WH Fund or WHC would most probably is less cost-effective than today’s system. UNESCO is a large and bureaucratic organisation, not always being perceived as effective (ref. Norad 2009). And in addition NOK 4-5 million will run the risk of being used on other issues than WH or not in accordance with the WH policies of the Norwegian Government. This would rather be a donation than a grant, limiting the steering control for the government. The intended Nordic perspective would most certainly be lost with such a donation. In this assessment it is also important to take into account that NWHF is independent, and hence more flexible. The foundation can relieve WHC in Paris, i.e. give a benefit for UNESCO that probably is higher than UNESCO receiving the same amount directly. On the other hand, providing a few good extra staff through NWHF does not in itself really provide a sustainable long-term contribution to WH work.\n\n_Cost-efficiency_\n\nHaving no other organisation to benchmark with it is difficult to conclude whether the running of NWHF is cost-effective or not. The large spending’s on travel are however a potential issue. According to NWHF the travelling all are related to processes directly related to the Strategic Objectives, and upon request/invitation from the Nordic-Baltic States Parties or UNESCO HQ and regional offices. In addition, NWHF participate in the annual WH Committee meetings. But focusing the work on being a focal point the travelling of the secretariat would most likely decrease.\n\n**4.3.6 Resource implications for UNESCO of interaction with NWHF**\n\nAs mentioned earlier, the budget crisis within UNESCO has led the organization to utilize Category 2 Institutes and Centres more to conduct its work. At the same time, UNESCO is aware that interacting with the increasing number of Category 2 Institutes and Centres implies transaction costs. UNESCO staff now must record on SISTER (UNESCO’s Intranet-based monitoring tool) costs and time related to interactions with all Category 2 Institutes and Centres. According to the “Report on the full cost of Category 2 institutes and Centres” of April 2013\\(^{22}\\), the average cost per institute/centre during the 2012/2013 biennium ranged from $10,000 to $30,000, with an average cost of just under $20,000. UNESCO would not reveal the cost of particular Category 2 Institutes and Centres, so it is difficult to see how NWHF compares with others. In any case, the report notes that higher costs “do not necessarily represent higher administrative costs, but rather a higher degree of substantive cooperation between the Secretariat and the institutes/Centres concerned around concrete activities” (3b). In other words, a high “cost” may simply indicate a high degree of cooperation.\n\nAccording to a document reviewing progress so far in implementing recommendations from IOS’ joint audit and evaluation of the management framework of Category 2 Institutes and Centres, transaction costs for UNESCO in dealing with Category 2 entities.\n\n---\n\n\\(^{22}\\) 191 EX/14.1INF, 9 April 2013.\ninclude the following: “conducting feasibility studies for proposed Category 2 entities, participation of UNESCO staff in Category 2 governing boards, liaising and engaging with a burgeoning number of institutes and Centres, and conducting the review assessments…prior to the renewal of agreements.”\n\nIt would seem that most of the direct costs mentioned have already been covered by NWHF for some time. For example, The 2007 Evaluation of the NWHF noted that “the work of the NWHF has no financial implications [for UNESCO] and travel to Board meetings is covered by NWHF”. It should also be noted that the direct costs of the present review are being borne by the NWHF, though this does not cover the time accorded by UNESCO staff.\n\nIn interviews with WHC one question concerned whether their transaction costs were reasonable compared to the value received from NWHF, and compared to the transaction costs associated with other Category 2 Institutes and Centres.", "num_tokens": 2048} {"category": "rpj-proofpile-arxiv", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/rpj-proofpile-arxiv/part-00-00000.npy", "text": " in an agent to correspond to a small change in the agent’s policy. This is particularly important since other agents will be implementing continuous functions on agents, and we would like any continuous function on policies to be able to be considered valid continuous function on agents. We also want $$f$$ to be surjective. This means that our space of agents is sufficiently rich that for any possible continuous policy, there is an agent in our space that implements that policy. In order to meet all these criteria simultaneously, we need a space $$X$$ of agents, and a continuous surjection $$f:X\\rightarrow[0,1]^X$$. Unifying Fixed Point Theorems: While we are primarily interested in the above motivation, there is another secondary motivation, which may be more compelling for those less interested in agent foundations. There are (at least) two main clusters of fixed point theorems that have come up many times in decision theory, and mathematics in general. First, there is the Lawvere cluster of theorems. This includes the Lawvere fixed point theorem, the diagonal lemma, and the existence of Quines and fixed point combinators. These are used to prove Gödel’s incompleteness Theorem, Cantor’s Theorem, Löb’s Theorem, and achieve robust cooperation in the Prisoner’s Dilemma in modal framework and bounded variants. All of these can be seen as corollaries of Lawvere’s fixed point theorem, which states that in a cartesian closed category, if there is a point-surjective map $$f:X\\rightarrow Y^X$$, then every morphism $$g:Y\\rightarrow Y$$ has a fixed point. Second, there is the Brouwer cluster of theorems. This includes Brouwer’s fixed point theorem, The Kakutani fixed point theorem, Poincaré–Miranda, and the intermediate value theorem. These are used to prove the existence of Nash Equilibria, Logical Inductors, and Reflective Oracles. If we had a topological space and a continuous surjection $$X\\rightarrow[0,1]^X$$, this would allow us to prove the one-dimensional Brouwer fixed point theorem directly using the Lawvere fixed point theorem, and thus unify these two important clusters. Thanks to Qiaochu Yuan for pointing out the connection to Lawvere’s fixed point theorem (and actually asking this question three years ago). Partial Progress: Most Diagonalization Intuitions Do Not Apply: A common initial reaction to this question is to conjecture that such an $$X$$ does not exist, due to cardinality or diagonalization intuitions. However, note that all of the diagonalization theorems pass through (some modification of) the same lemma: Lawvere’s fixed point theorem. However, this lemma does not apply here! For example, in the category of sets, the reason that there is no surjection from any set $$X$$ to the power set, $$\\{T,F\\}^X$$, is because if there were such a surjection, Lawvere’s fixed point theorem would imply that every function from $$\\{T,F\\}$$ to itself has a fixed point (which is clearly not the case, since there is a function that swaps $$T$$ and $$F$$). However, we already know by Brouwer’s fixed point theorem that every continuous function from the interval $$[0,1]$$ to itself has a fixed point, so the standard diagonalization intuitions do not work here. Impossible if You Replace $$[0,1]$$ with e.g. $$S^1$$: This also provides a quick sanity check on attempts to construct an $$X$$. Any construction that would not be meaningfully different if the interval $$[0,1]$$ is replaced with the circle $$S^1$$ is doomed from the start. This is because a continuous surjection $$X\\rightarrow (S^1)^X$$ would violate Lawvere’s fixed point theorem, since there is a continuous map from $$S^1$$ to itself without fixed points. Impossible if you Require a Homeomorphism: When I first asked this question I asked for a homeomorphism between $$X$$ and $$[0,1]^X$$. Sam Eisenstat has given a very clever argument why this is impossible. You can read it here. In short, using a homeomorphism, you would be able to use Lawvere to construct a continuous map that send a function from $$[0,1]$$ to itself to a fixed point of that function. However, no such continuous map exists. Notes: If you prefer not to think about the topology of $$[0,1]^X$$, you can instead find a space $$X$$, and a continuous map $$h:X\\times X\\rightarrow[0,1]$$, such that for every continuous function $$f:X\\rightarrow[0,1]$$, there exists an $$x_f\\in X$$, such that for all $$x\\in X$$, $$h(x_f,x)=f(x)$$. Many of the details in the motivation could be different. I would like to see progress on similar questions. For example, you could add some computability condition to the space of functions. However, I am also very curious which way this specific question will go. This post came out of many conversations, with many people, including: Sam, Qiaochu, Tsvi, Jessica, Patrick, Nate, Ryan, Marcello, Alex Mennen, Jack Gallagher, and James Cook.\n\n by Marcello Herreshoff 230 days ago | Jessica Taylor, Scott Garrabrant and Stuart Armstrong like this | link From discussions I had with Sam, Scott, and Jack: To solve the problem, it would suffice to find a reflexive domain $$X$$ with a retract onto $$[0, 1]$$. This is because if you have a reflexive domain $$X$$, that is, an $$X$$ with a continuous surjective map $$f :: X \\rightarrow X^X$$, and $$A$$ is a retract of $$X$$, then there’s also a continuous surjective map $$g :: X \\rightarrow A^X$$. Proof: If $$A$$ is a retract of $$X$$ then we have a retraction $$r::X\\rightarrow A$$ and a section $$s::A \\rightarrow X$$ with $$r\\circ s = 1_A$$. Construct $$g(x) := r \\circ f(x)$$. To show that $$g$$ is a surjection consider an arbitrary $$q \\in A^X$$. Thus, $$s \\circ q :: X \\rightarrow X$$. Since $$f$$ is a surjection there must be some $$x$$ with $$f(x) = s \\circ q$$. It follows that $$g(x) = r \\circ f(x) = r \\circ s \\circ q = q$$. Since $$q$$ was arbitrary, $$g$$ is also a surjection. reply\n by Jessica Taylor 234 days ago | Vadim Kosoy likes this | link If I were studying this, I would be looking at domain theory, in which (among other things) there has been found a topological space $$X$$ homeomorphic with $$X^X$$. The page I linked links to some notes at the bottom. (h/t Qiaochu for pointing out domain theory) reply\n by Stuart Armstrong 231 days ago | Scott Garrabrant likes this | link Can you argue that $$X$$ must have a semi-metric compatible with the topology by using $$d(x,y)=sup_{z\\in X}|h(x,z)-h(y,z)|$$? I’m wondering if you can generalise this to some sort of argument that goes like this. Using X, project down via $$\\pi$$ from $$X^0=X$$ to $$X^1=X^0/d$$. Let $$\\phi$$ be our initial surjection; it’s now a bijection between $$X^1$$ and maps from $$X^0$$ to $$[0,1]$$. If the projection is continuous, then every map from $$X^1$$ to $$[0,1]$$ lifts to a map from $$X^0$$ to $$[0,1]$$. Restricting to the subset of maps that are lifts like this, and applying $$\\phi^{-1}$$, gives a subset $$X^2 \\subset X^1$$. We now have a new equivalence relationship, maps from $$X^1$$ that are equal to each other on $$X^2$$. Project down from $$X^2$$ by this relationship, to generate $$X^3$$. Continue this transfinitely often (?) to generate a space $$X'$$ where $$\\phi$$ is a homeomorphism, and find a contradiction? This feels dubious, but maybe worth mentioning… reply\n by Alex Mennen 231 days ago | Scott Garrabrant and Stuart Armstrong like this | link I haven’t checked that argument carefully, but that sounds like it should give you $$X'$$ with a continuous bijection $$\\phi:X'\\rightarrow[0,1]^{X'}$$, which might not necessarily be a homeomorphism. reply\n by Stuart Armstrong 231 days ago | link Yes, you’re right. reply\n by Stuart Armstrong 230 days ago | Scott Garrabrant likes this | link A small note: it’s not hard to construct spaces that are a bit too big, or a bit too small (raising the possibility that a true $$X$$ lies between them). For instance, if $$I$$ is the unit interval, then we can map $$I$$ onto the countable-dimensions hypercube $$I^\\omega$$ ( https://en.wikipedia.org/wiki/Space-f", "num_tokens": 2048} {"category": "rpj-proofpile-arxiv", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/rpj-proofpile-arxiv/part-00-00000.npy", "text": " $\\pm 1$ inputs, we work below over the ideal generated by $\\{x_i^2 - 1\\}$.\nWe prove by induction on $n$ that if $P/Q$ represents parity of length $n$ then $PQ = \\alpha \\prod_{i=1}^n x_i + \\cdots$ for some positive $\\alpha$, where the dots represent lower degree terms. This implies that $\\deg P + \\deg Q \\geq n$. The claim is clearly true for $n = 0$. Now consider $$\\frac{P}{Q} = \\frac{x_nP_1+P_2}{x_nQ_1+Q_2},$$ where $P_1,P_2,Q_1,Q_2$ are over $x_1,\\ldots,x_{n-1}$. Substituting $x_n=\\pm1$ and applying the induction hypothesis, we deduce that for some $\\alpha,\\beta > 0$, \\begin{align*} (P_1+P_2)(Q_1+Q_2) &= \\alpha \\prod_{i=1}^{n-1} x_i + \\cdots, \\\\ (P_1-P_2)(Q_1-Q_2) &= -\\beta \\prod_{i=1}^{n-1} x_i + \\cdots. \\\\ \\end{align*} Subtracting both equations, we get $$P_1 Q_2 + P_2 Q_1 = \\frac{\\alpha+\\beta}{2} \\prod_{i=1}^{n-1} x_i + \\cdots.$$ Therefore $$PQ = (x_nP_1+P_2)(x_nQ_1+Q_2) = x_n(P_1Q_2+P_2Q_1) + \\cdots = \\frac{\\alpha+\\beta}{2} \\prod_{i=1}^n x_i + \\cdots.$$<|endoftext|># NASA pictures of dark matter collisions\n\n1. Mar 27, 2015\n\n### Staff: Mentor\n\nhttp://www.nasa.gov/press/2015/marc...that-may-help-identify-dark-matter/index.html\n\nThe take away seems to be that some ideas about dark matter may have problems. The possibilities checklist of dark matter interactions has been shortened.\n\nThere are some really great pictures of galactic halos in colliding galaxies. Which make looking at the link a must. IMO.\n\n2. Mar 27, 2015\n\n### Greg Bernhardt\n\nWhat about the hubble telescope makes the image blue?\n\n3. Mar 27, 2015\n\n### Chalnoth\n\nThe blue blobs are estimates of the mass of the galaxy cluster by examining the distortions of galaxies behind the cluster due to the cluster's gravity.\n\n4. Mar 27, 2015\n\n### marcus\n\nhttp://arxiv.org/abs/1503.07675\nThe non-gravitational interactions of dark matter in colliding galaxy clusters\nDavid Harvey, Richard Massey, Thomas Kitching, Andy Taylor, Eric Tittley\n(Submitted on 26 Mar 2015)\nCollisions between galaxy clusters provide a test of the non-gravitational forces acting on dark matter. Dark matter's lack of deceleration in the bullet cluster collision' constrained its self-interaction cross-section \\sigma_DM/m < 1.25cm2/g (68% confidence limit) for long-ranged forces. Using the Chandra and Hubble Space Telescopes we have now observed 72 collisions, including both major' and `minor' mergers. Combining these measurements statistically, we detect the existence of dark mass at 7.6\\sigma significance. The position of the dark mass has remained closely aligned within 5.8+/-8.2 kpc of associated stars: implying a self-interaction cross-section \\sigma_DM/m < 0.47 cm2/g (95% CL) and disfavoring some proposed extensions to the standard model.\n5 Pages, 4 Figures and 18 pages supplementary information\nScience, Vol 347, Issue 6229 (2015)\n\n5. Mar 27, 2015\n\n### wabbit\n\n6. Mar 27, 2015\n\n### Staff: Mentor\n\nWhat exactly does this mean?\n\n7. Mar 27, 2015\n\n### marcus\n\nHi! It's interesting how they map invisible mass concentrations using so called \"weak lensing\" of background shapes. I know you're familiar with this but someone new to it might not be.\n\nBackground shapes get \"squashed\" in the direction of increasing mass. Circles become ellipses elongated in the direction perpendicular to where the mass is. So the short axis of the ellipse, the \"minor axis\" will tend to be aligned along the mass gradient. So they can actually produce contour maps of the distribution of invisible mass.\n\nStatistical methods are needed because the background shapes are not perfect circles. They are roughly circular galaxies but tilted randomly so that they appear ellipses oriented in random directions. As their light comes to us, passing the mass concentration, there is a further elongation or, to put it another way, squashing of the shapes.\n\nLast edited: Mar 27, 2015\n8. Mar 27, 2015\n\n### Chalnoth\n\nIf you have one particle of dark matter passing through a cloud of dark matter particles, this cross section gives the expected distance before the dark matter particle is deflected.\n\nThe mass is a part of the calculation because the particle mass determines how many particles there are (we know how dense the dark matter is, but a dark matter particle with half the mass would require twice as many particles to make up that same density).\n\n9. Mar 27, 2015\n\n### marcus\n\nIf DM particles had a substantial collision cross section (non gravitational interaction) then two clouds could bump, and cancel each others momentum. So a larger cloud would remain at the site of the collision.\nBut for example in the \"bullet cluster\" collision where two clusters collided the two DM clouds basically just passed through each other and came out the other side. The ordinary matter galaxies did likewise because they were scattered so sparsely in the cluster that they had very little chance of colliding.\n\nBut the collision left a cloud of hot hydrogen gas in the middle, radiating Xray. Because the intergalactic medium hydrogen did have a substantial interaction cross section. Those clouds could collide and cancel each other's momentum and accumulate at the site of the collision.\n\nWhen clusters collide the stars and dark matter particles pass through freely. Only the intergalactic medium, the ordinary (hot, partly ionized) gas, actually crashes.\n\nLast edited: Mar 27, 2015\n10. Mar 27, 2015\n\n### wabbit\n\nI was impressed by what seems to be very precise post-treatment of the image to correct for residual aberrations (off-axis astigmatism it seems from how they describe it) in Hubble's optics (figure S4, p.8, supplementary material). This might otherwise interfere with their interpretation of the image I presume, for smaller galaxy images.\n\nLast edited: Mar 27, 2015\n11. Mar 27, 2015\n\n### wabbit\n\nI was aware there was distortion but not really of its precise shape, thanks for the explanation.\n\n12. Mar 29, 2015\n\n### SpiderET\n\n13. Mar 29, 2015\n\n### wabbit\n\nI would read it more as a measurement of dark matter properties (well, that's not much of a stretch given that this is how the experiment is constructed and reported). There aren't so many of these as far as I know, and more are needed to narrow down the search for what it might be. Excluding some of the proposed models sounds like excellent news for this search.\n\nI see arstechnica titles \"strongest case yet for dark matter\". I need to read it now, not seeing yet why it adds so much to the case given that the evidence was already pretty strong. Edit : not sure the article really supports the title, but it's a well done piece, thanks for the link.\n\nLast edited: Mar 29, 2015\n14. Mar 29, 2015\n\n### Chalnoth\n\n15. Mar 29, 2015\n\n### SpiderET\n\nSomehow I cant copy text from the pdf, but in the preprint on page 1 and 2 is written, that interacting particles would solve some problems of incorrect predictions of Lambda CDM model. But this paper has shown that the particles dont interact.\n\nBut personally I would go even further. This dark matter has strange properties, it interacts gravitationally with normal matter but it doesnt interact gravitationally with other dark matter? Seems like another sign that we need new theory which will include some extended or modified gravity theory.\n\n16. Mar 29, 2015\n\n### Chalnoth\n\nIt hasn't shown that they don't interact. It's placed an upper limit on how strongly they can possibly interact. While there are models where dark matter particles have no interactions except through gravity, most models have dark matter that interacts weakly with itself and with normal matter.\n\nYes, dark matter interacts gravitationally with other dark matter. By \"doesn't interact\" they're talking about the", "num_tokens": 2048} {"category": "rpj-proofpile-arxiv", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/rpj-proofpile-arxiv/part-00-00000.npy", "text": ".\n\nFinal corrections\nBefore you send or print you document check whether there are hyphens you find inappropriate and remove them.\n\nWhat about aligning text on websites?\nOne of the major flaws of the html standard is that the internet community never has come up with a satisfactory solution for hyphenation. Some browsers accept soft hyphens, but it remains a mess. The complication for the implementation of hyphenation in html text is of course that html text is supposed to look nicely to the reader whatever the width of the window he has opened for displaying the text.\n\nJustifying html text means you have to give up automatic wrapping with varying window width. Just use flush left and manually put hard returns (html tag:
) at the position you want to break the sentences. If you wish you can include hard hyphens there. There are several drawbacks with this beautifying of your web text: (i) it does not wrap with the window size, (ii) you cannot reuse the text because you will have to remove al the line breaks, and (iii) if you want to edit the text, or change its width, you have to remove all earlier inserted line breaks and insert new ones.\n\nYou will have to show your text as a pdf file if you really want to have text on your web site with a professional look.\n\nCentering text is always wrong.\n[CR_show_voting_stars_handler]\n\n- - - - - -\nIf you like this post why don't you email subscribe to our new posts. Or subscribe to our RSS feed.\n1. 7 Dec 2009 17:01, Dmitry\n\nHi\n\nThe EquPixy 2.1 add-in for Microsoft Word (MS Windows) will help you to work with mathematical and chemical formulas and equations. Its functions allow converting mathematical formulas written in one line into a formula with rigorous numerals, denominations, radicals and degrees with only one key stroke. The figures that designate the number of atoms in chemical formulas are automatically converted into subscripts, and the ion charge numbers and atom oxidation degrees are converted into superscripts. The function of writing a capital or lowercase letter depending on the length of pushing down the keyboard key is available for writing chemical elements; if you push down and immediately release the key, a capital letter is written, if you push down the key and hold it for a second a lowercase letter is written. The EquPixy add-in has the ability of checking the validity of chemical equations for the required number of elements on their right and left sides. Other useful functions are also available. For example, the generation of an arrow with indication of reaction conditions, etc.\n\n2. 7 Dec 2009 22:07, Klaas Wynne\n\nI think Word is great and I also think that centred text can be great. The noble prize certificate is centred and so is the title page of Newton’s Philosophiae Naturalis Principia Mathematica. The only thing that is always wrong is an arthritic view of what is right or wrong.\n\n3. 27 Jun 2010 7:45, foobar\n\nThank you!\n\nI didn’t know that word breaking was called “Hyphenation” and certainly not that it was available in word.\n\nI was always jealous of the LaTeX dudes getting so professional looking documents right out of the box. However, with your tips, I’m able to tweak Word 2010 documents to look somewhat semi-professional. =)\n\nThanks =)\n\n4. 3 Oct 2010 12:43, Hira Gillani\n\nMicrosoft Word is one of the most powerful and widely used word-processing software to create, edit, finalize and produce almost every type of documents. I often search the web in order to get my self more skilled and to get the maximum out of this leading word processing software. After reading this article I expect more informative posts from you in the near future. Thanks!\n\n5. 25 Oct 2010 7:07, Ian L\n\nCorel WordPerfect is so awesome. I still use it over MS Word.\n\n6. 25 Jun 2011 15:30, Aravind\n\nI am using windows xp with office 2003. ms word justifying only english. another languages does not justifying. what can I do for this problum?\n\n7. 24 Sep 2011 13:28, darcy\n\nThank you so much for your advice on selecting wordperfect justification in MS Word. It immediately improved my documents.\n\n8. 27 Sep 2013 19:50, Mark Larson\n\nI am using Word 2010. I would like to use full justification. However, I have one challenge with which I need help. If I insert a figure in the middle of a paragraph (inserted so that the figure will be at the top of the next page, I put a hard return in the middle of the sentence so that this line does not move to the next page. However, that line is not right justified. How can I right justify that line containing a sentence split by such a figure?\n\nXHTML: You can use these tags:\n
\n\n*\n\nBy submitting a comment here you grant this site a perpetual license to reproduce your words and name/web site in attribution.\n\nSubscribe without commenting<|endoftext|># Ubuntu - Execute multiple php files via command line\n\nHow do I execute multiple php files via command line?\n\nJust call them one after each other:\n\na.php; b.php; c.php\n\n• Just a quick note: With ;, all subsequent commands will execute when one failed. with \"&&\", further commands will only execute when the previous finished without error. – fab Apr 29 '11 at 15:18\n\nOr if you don't want to type out all the names:\n\nls *.php | xargs -tn1 php\n\n\nThis being Unix, there are many (many) other ways to do this too.\n\n• Your name is pretty slick, but I might have added \"Some Totally Random Guy\". – Xeoncross Apr 29 '11 at 15:25<|endoftext|>### G - Gates of uncertainty\n\n##### Languages: MS C# .NET 4.7.2053,GNU G++11 5.1.0 ...\n\nA NAND gate (negative-AND gate) is a digital electronic circuit which produces an output that is false only if all its inputs are true; in other words, the output of a NAND gate is the complement to the output of an AND gate for the same inputs. A two-input NAND gate is a NAND gate with two inputs. The following figure shows the usual symbol of a two-input NAND gate and its truth table, using $1$ for true and $0$ for false.\nIn this problem we have a binary tree representing a circuit composed only by two-input NAND gates. In the tree, each internal node represents a NAND gate, which uses as inputs the values produced by its two children. Each leaf in the tree represents an external input to the circuit, and is a value in $\\{0, 1\\}$. The value produced by the circuit is the value produced by the gate at the root of the tree. The following picture shows a circuit with nine nodes, of which four are NAND gates and five are external inputs.\nEach gate in the circuit may be stuck, meaning that it either only produce $0$ or only produce $1$, regardless of the gate’s inputs. A test pattern is an assignment of values to the external inputs so that the value produced by the circuit is incorrect, due to the stuck gates.\n\nGiven the description of a circuit, you must write a program to determine the number of different test patterns for that circuit.\n\n#### Input\n\nThe first line contains an integer $N$ $(1 \\leq N \\leq 10^5)$ representing the number of gates in the circuit, which has the shape of a binary tree. Gates are identified by distinct integers from $1$ to $N$, gate $1$ being the root of the tree. For $i = 1, 2, ..., N$, the $i$-th of the next $N$ lines describes gate $i$ with three integers $X$, $Y$ and $F$ ($0 \\leq X, Y \\leq N$ and $−1 \\leq F \\leq 1$). The values $X$ and $Y$ indicate the two inputs to the gate. If $X = 0$ the first input is from an external input, otherwise the input is the output produced by gate $X$. Analogously, if $Y = 0$ the second input is from an external input, otherwise the input is the output produced by gate $Y$. The value $F$ represents the state of the gate: $−1$ means the gate is well-behaved, $0$ means the gate is stuck at $0$, and $1$ means the gate is stuck at $1$.\n\n#### Output\n\nOutput a single line with an integer indicating the number of different test patterns for the given circuit. Because this number can be very large, output the remainder of dividing it by $10^9 + 7$.\n\n#### Sample test(s)\n\nInput\n4 2 3 1 0 0 -1 4 0 0 0 0 -1\nOutput\n15\nInput\n2 2 0 1 0 0 -1\nOutput\n3\nInput\n6", "num_tokens": 2048} {"category": "rpj-proofpile-arxiv", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/rpj-proofpile-arxiv/part-00-00000.npy", "text": "ptive microsampling devices. This enabled to keep the same rats during the whole study, which was in accordance with the Three Rs rules (reduction, refinement and replacement). Furthermore, this technique allowed the suppression of inter-individual variability. Higher Cmax and AUC were obtained after the administration of all three formulations compared to the levels after the use of Sporanox® as follows: SOL/ITZ/AcDiSol® > SOL/ITZ/CD > SOL/ITZ > Sporanox®. The inversion in the ranking between SOL/ITZ/CD and SOL/ITZ/AcDiSol® made impossible the establishment of an in vitro–vivo correlation. Indeed, very different release rates were obtained in vitro and in vivo for the two optimized formulations. These results suggest that ITZ would be protected inside the core of the SOL micelles even during the absorption step at the intestine, while some agents present in the intestinal fluids could displace ITZ from the hydrophobic cavity of CD by competition. [less ▲]Detailed reference viewed: 31 (19 ULiège) Perspectives for observing hot massive stars with XMM-Newton in the years 2017-2027Rauw, Grégor in Astronomische Nachrichten (2017), 338XMM-Newton has deeply changed our picture of X-ray emission of hot, massive stars. High-resolution X-ray spectroscopy as well as monitoring of these objects helped us gain a deeper insight into the ... [more ▼]XMM-Newton has deeply changed our picture of X-ray emission of hot, massive stars. High-resolution X-ray spectroscopy as well as monitoring of these objects helped us gain a deeper insight into the physics of single massive stars with or without magnetic fields, as well as of massive binary systems, where the stellar winds of both stars interact. These observations also revealed a number of previously unexpected features that challenge our understanding of the dynamics of the stellar winds of massive stars. I briefly summarize the results obtained over the past 15 years and highlight the perspectives for the next decade. It is anticipated that coordinated (X-ray and optical or UV) monitoring and time-critical observations of either single or binary massive stars will become the most important topics in this field over the coming years. Synergies with existing or forthcoming X-ray observatories (NuSTAR, Swift, eROSITA) will also play a major role and will further enhance the importance of XMM-Newton in our quest for understanding the physics of hot, massive stars. [less ▲]Detailed reference viewed: 13 (1 ULiège) Adaptive PSF fitting - a highly performing photometric method and light curves of the GLS H1413+117: time delays and micro-lensing effectsAkhunov, Talat ; Wertz, O.; Elyiv, A. et alin Monthly Notices of the Royal Astronomical Society (2017), 465We present new photometric observations of H1413+117 acquired during seasons between 2001 and 2008 in order to estimate the time delays between the lensed quasar images and to characterize at best the on ... [more ▼]We present new photometric observations of H1413+117 acquired during seasons between 2001 and 2008 in order to estimate the time delays between the lensed quasar images and to characterize at best the on-going micro-lensing events. We propose a highly performing photometric method called the adaptive point spread function fitting and have successfully tested this method on a large number of simulated frames. This has enabled us to estimate the photometric error bars affecting our observational results. We analysed the V- and R-band light curves and V-R colour variations of the A-D components which show short- and long-term brightness variations correlated with colour variations. Using the χ[SUP]2[/SUP] and dispersion methods, we estimated the time delays on the basis of the R-band light curves over the seasons between 2003 and 2006. We have derived the new values: Δt[SUB]AB[/SUB] = -17.4 ± 2.1, Δt[SUB]AC[/SUB] = -18.9 ± 2.8 and Δt[SUB]AD[/SUB] = 28.8 ± 0.7 d using the χ[SUP]2[/SUP] method (B and C are leading, D is trailing) with 1σ confidence intervals. We also used available observational constraints (resp. the lensed image positions, the flux ratios in mid-IR and two sets of time delays derived in the present work) to update the lens redshift estimation. We obtained z_l = 1.95^{+0.06}_{-0.10} which is in good agreement with previous estimations. We propose to characterize two kinds of micro-lensing events: micro-lensing for the A, B, C components corresponds to typical variations of ∼10[SUP]-4[/SUP] mag d[SUP]-1[/SUP] during all the seasons, while the D component shows an unusually strong micro-lensing effect with variations of up to ∼10[SUP]-3[/SUP] mag d[SUP]-1[/SUP] during 2004 and 2005. [less ▲]Detailed reference viewed: 18 (0 ULiège) Lacustrine clay mineral assemblages as a proxy for land-use and climate changes over the last 4 kyr: The Amik Lake case study, Southern TurkeyEl Ouahabi, Meriam ; Hubert, Aurelia ; Fagel, Nathalie in Quaternary International (2017), 1/15Lake sediments are sensitive to landscape changes and most of these changes seem to be modulated by land-use (anthropogenic factors) coupled to palaeoenvironmental/palaeoclimatic changes. In its detrital ... [more ▼]Lake sediments are sensitive to landscape changes and most of these changes seem to be modulated by land-use (anthropogenic factors) coupled to palaeoenvironmental/palaeoclimatic changes. In its detrital fraction, the lacustrine sediments record the history of soil erosion within its catchment via the inputs of clays and others detrital products. Within a Mediterranean context, the study investigates the upper sediments infilling the central part of the Amik basin in southern Turkey. This tectonic basin was occupied and exploited by modern human at least since 6000-7000 BC. We focus on the clay mineralogy (x-ray diffraction on oriented aggregates) and magnetic susceptibility measurements (Bartington) of the sedimentary record in the area over the last 4000 years, to assess environmental changes in relation with the different land uses and/or weathering during the successive Bronze, Iron, Roman, Islamic/Ottoman and Modern civilizations. The clay fraction of Amik Lake sediments comprises smectite, kaolinite, illite, chlorite and chlorite/smectite mixed layers that are the inherited clay phases. A relative change in abundance and crystallinity and chemistry of illite attests that environmental conditions evolved in the Amik Plain from the Bronze to Modern Age in relation with climates and/or land-use changes. The history of the Amik Lake reveals different soil erosion episode. The most intense erosion phase occurred during the Bronze/Iron Ages as indicated by the clay and magnetic susceptibility proxies. The Roman period was an exceptional period with soil erosion products arriving from the watershed, probably due the water channelization. A reduction of soil erosion occurred during the post Roman period until nowadays. Significant pedogenesis transformations are evidenced, especially during the Islamic/Ottoman periods suggesting intense chemical weathering conditions related to climate change. [less ▲]Detailed reference viewed: 67 (25 ULiège) The XXL survey: First results and futurePierre, M.; Adami, C.; Birkinshaw, M. et alin Astronomische Nachrichten (2017), 338The XXL survey currently covers two 25 sq. deg. patches with XMM observations of ~10ks. We summarise the scientific results associated with the first release of the XXL data set, that occurred mid 2016 ... [more ▼]The XXL survey currently covers two 25 sq. deg. patches with XMM observations of ~10ks. We summarise the scientific results associated with the first release of the XXL data set, that occurred mid 2016. We review several arguments for increasing the survey depth to 40 ks during the next decade of XMM operations. X-ray (z<2) cluster, (z<4) AGN and cosmic background survey science will then benefit from an extraordinary data reservoir. This, combined with deep multi-$\\lambda$ observations, will lead to solid standalone cosmological constraints and provide a wealth of information on the formation and evolution of AGN, clusters and the X-ray background. In particular, it will offer a unique opportunity to pinpoint the z>1 cluster density. It will eventually constitute a reference study and an ideal calibration field for the upcoming eROSITA and Euclid missions. [less ▲]Detailed reference viewed: 19 (1 ULiège) H0LiCOW - IV. Lens mass model of HE 0435-1223 and blind measurement of its time-delay distance for cosmologyWong, Kenneth C.; Suyu, Sherry H.; Auger, Matthew W. et alin Monthly Notices of the Royal Astr", "num_tokens": 2048} {"category": "rpj-proofpile-arxiv", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/rpj-proofpile-arxiv/part-00-00000.npy", "text": " particle. Furthermore, due to the finite size of the Bose gas, after some time we observe memory effects and thus non-Markovian dynamics of the quantum oscillator.\n\nCategories: Journals, Physics\n\n### Microwave-to-optical frequency conversion using a cesium atom coupled to a superconducting resonator\n\nAuthor(s): Bryan T. Gard, Kurt Jacobs, R. McDermott, and M. Saffman\n\nA candidate for converting quantum information from microwave to optical frequencies is the use of a single atom that interacts with a superconducting microwave resonator on one hand and an optical cavity on the other. The large electric dipole moments and microwave transition frequencies possessed ...\n\n[Phys. Rev. A 96, 013833] Published Tue Jul 18, 2017\n\nCategories: Journals, Physics\n\n### Extreme-value statistics of intensities in a cw-pumped random fiber laser\n\nAuthor(s): Bismarck C. Lima, Pablo I. R. Pincheira, Ernesto P. Raposo, Leonardo de S. Menezes, Cid B. de Araújo, Anderson S. L. Gomes, and Raman Kashyap\n\nWe report on the extreme-value statistics of output intensities in a one-dimensional cw-pumped erbium-doped random fiber laser, with a strongly scattering disordered medium consisting of randomly spaced Bragg gratings. The experimental findings from the analysis of a large number of emission spectra...\n\n[Phys. Rev. A 96, 013834] Published Tue Jul 18, 2017\n\nCategories: Journals, Physics\n\n### Nonuniform Currents and Spins of Relativistic Electron Vortices in a Magnetic Field\n\nAuthor(s): Koen van Kruining, Armen G. Hayrapetyan, and Jörg B. Götte\n\nWe present a relativistic description of electron vortex beams in a homogeneous magnetic field. Including spin from the beginning reveals that spin-polarized electron vortex beams have a complicated azimuthal current structure, containing small rings of counterrotating current between rings of stron...\n\n[Phys. Rev. Lett. 119, 030401] Published Tue Jul 18, 2017\n\nCategories: Journals, Physics\n\n### Neural Decoder for Topological Codes\n\nAuthor(s): Giacomo Torlai and Roger G. Melko\n\nWe present an algorithm for error correction in topological codes that exploits modern machine learning techniques. Our decoder is constructed from a stochastic neural network called a Boltzmann machine, of the type extensively used in deep learning. We provide a general prescription for the trainin...\n\n[Phys. Rev. Lett. 119, 030501] Published Tue Jul 18, 2017\n\nCategories: Journals, Physics\n\n### Synopsis: Proton Loses Weight\n\nAPS Physics - Tue, 2017-07-18 16:00\n\nThe most precise measurement to date of the proton mass finds a value that is 3 standard deviations lower than previous estimates.\n\n[Physics] Published Tue Jul 18, 2017\n\nCategories: Physics\n\n### Quantum approach to the unique sink orientation problem\n\nPRA: Quantum information - Tue, 2017-07-18 16:00\n\nAuthor(s): Dave Bacon\n\nWe consider quantum algorithms for the unique sink orientation problem on cubes. This problem is widely considered to be of intermediate computational complexity. This is because there is no known polynomial algorithm (classical or quantum) for the problem and yet it arises as part of a series of pr...\n\n[Phys. Rev. A 96, 012323] Published Tue Jul 18, 2017\n\nCategories: Journals, Physics\n\n### Storage of polarization-entangled THz-bandwidth photons in a diamond quantum memory\n\nPRA: Quantum information - Tue, 2017-07-18 16:00\n\nAuthor(s): Kent A. G. Fisher, Duncan G. England, Jean-Philippe W. MacLean, Philip J. Bustard, Khabat Heshami, Kevin J. Resch, and Benjamin J. Sussman\n\nBulk diamond phonons have been shown to be a versatile platform for the generation, storage, and manipulation of high-bandwidth quantum states of light. Here we demonstrate a diamond quantum memory that stores, and releases on demand, an arbitrarily polarized ∼250 fs duration photonic qubit. The sin...\n\n[Phys. Rev. A 96, 012324] Published Tue Jul 18, 2017\n\nCategories: Journals, Physics\n\n### Finite size analysis of measurement device independent quantum cryptography with continuous variables. (arXiv:1707.04599v1 [quant-ph])\n\narXiv.org: Quantum Physics - Tue, 2017-07-18 12:45\n\nWe study the impact of finite-size effects on the key rate of continuous-variable (CV) measurement-device-independent (MDI) quantum key distribution (QKD). Inspired by the parameter estimation technique developed in [Rupert \\textit{et al.} Phys. Rev. A \\textbf{90}, 062310 (2014)]~we adapt it to study CV-MDI-QKD and, assuming realistic experimental conditions, we analyze the impact of finite-size effects on the key rate. We find that, increasing the block-size, the performance of the protocol converges towards the ideal one, and that block-sizes between $10^{6}$ and $10^{9}$ data points can already provide a key rate $\\sim10^{-2}$ bit/use over metropolitan distances.\n\nCategories: Journals, Physics\n\n### Contextuality and Indistinguishability. (arXiv:1707.04656v1 [quant-ph])\n\narXiv.org: Quantum Physics - Tue, 2017-07-18 12:45\n\nIt is well known that in quantum mechanics we cannot always define consistently properties that are context independent. Many approaches exist to describe contextual properties, such as Contextuality by Default (CbD), sheaf theory, topos theory, and non-standard or signed probabilities. In this paper we propose a treatment of contextual properties that is specific to quantum mechanics, as it relies on the relationship between contextuality and indistinguishability. In particular, we propose that if we assume the ontological thesis that quantum particles or properties can be indistinguishable yet different, no contradiction arising from a Kochen-Specker-type argument appears: when we repeat an experiment, we are in reality performing an experiment measuring a property that is indistinguishable from the first, but not the same. We will discuss how the consequences of this move may help us understand quantum contextuality.\n\nCategories: Journals, Physics\n\n### Controlled asymmetry of steering with an injected non-degenerate optical parametric oscillator. (arXiv:1707.04691v1 [quant-ph])\n\narXiv.org: Quantum Physics - Tue, 2017-07-18 12:45\n\nWe propose and analyse a nonlinear optical apparatus in which the direction of asymmetric steering is controllable within the apparatus, rather than by adding noise to measurements. Using a nondegenerate parametric oscillator with an injected signal field, we show how the directionality and extent of the steering can be readily controlled for output modes which can be up to one octave apart. The two downconverted modes, which exhibit the greater violations of the steering inequalities, can also be controlled to exhibit asymmetric steering in some regimes.\n\nCategories: Journals, Physics\n\n### Hybrid Quantum Sensing with Quantum Virtual Memories. (arXiv:1707.04702v1 [quant-ph])\n\narXiv.org: Quantum Physics - Tue, 2017-07-18 12:45\n\nParamagnetic centres in a solid hold promise in future sensing applications. Numerous sensing applications have been theoretically and experimentally demonstrated. However, the improvement of sensitivity remains challenging. One approach to overcome this is hybrid quantum sensing with quantum memories. The key to this approach is a trade-off between the number of memory and coherence times (T2) of spins. We propose a new concept of a hybrid quantum sensing with virtual memories using dressed states. We also observe the preliminarily generation of two dressed states in a single paramagnetic centre based on Autler-Townes splitting (ATS). Furthermore, we simulate the sensitivity according to the number of dressed states generated in strong microwave driving fields. The experimental results and the simulation will pave the way to new hybrid quantum sensing, which can flexibly manipulate a higher sensitivity in accordance with the number of quantum virtual memories.\n\nCategories: Journals, Physics\n\n### Quasimomentum distribution and expansion of an anyonic gas. (arXiv:1707.04712v1 [cond-mat.quant-gas])\n\narXiv.org: Quantum Physics - Tue, 2017-07-18 12:45\n\nWe point out that the momentum distribution is not a proper observable for a system of anyons in two-dimensions. In view of anyons as Wilczek's composite charged flux-tubes, this is a consequence of the fact that the orthogonal components of the kinetic momentum operator do not commute at the position of a flux tube, and thus cannot be diagonalized in the same basis. As a substitute for the momentum distribution of an anyonic (spatial", "num_tokens": 2048} {"category": "rpj-proofpile-arxiv", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/rpj-proofpile-arxiv/part-00-00000.npy", "text": " added in a future update.\n\n• Binary heap switched out for a 4-ary heap. This improves pathfinding performances by about 5%.\n\n• Optimized scanning of navmesh graphs (not the recast graphs) Large meshes should be much faster to scan now.\n\n• Optimized BBTree (nearest node lookup for navmesh/recast graphs, pro version only) Nearest node queries on navmesh/recast graphs should be slightly faster now.\n\n• Minor updates to the documentation, esp. to the GraphNode class.\n\n• 3.4.0.7\n\n• Vuforia test build\n\n• 3.4.0.6\n\n• Fixed an issue where serialization could on some machines sometimes cause an exception to get thrown.\n\n• Fixed an issue where the recast graph would not rasterize terrains properly near the edges of it.\n\n• 3.4.0.5\n\n• Misc fixes for namespace conflicts people have been having. This should improve compatibility with other packages. You might need to delete the AstarPathfindingProject folder and reimport the package for everything to work.\n\n• 3.4.0.4\n\n• Removed RVOSimulatorEditor from the free version, it was causing compiler errors.\n\n• 3.4.0.3\n\n• Removed Local Avoidance due to licensing issues. Agents will fall back to not avoiding each other. I am working to get the local avoidance back as soon as possible.\n\n• 3.4.0.2\n\n• Unity Asset Store forced me to increase version number.\n\n• 3.4.0.1\n\n• Fixed an ArrayIndexOutOfBounds exception which could be thrown by the ProceduralGridMover script in the Procedural example scene if the target was moved too quickly.\n\n• The project no longer references assets from the Standard Assets folder (the package on the Unity Asset Store did so by mistake before).\n\n• 3.4\n\n• Fixed a null reference exception when scanning recast graphs and rasterizing colliders.\n\n• Removed duplicate clipper_library.dll which was causing compiler errors.\n\n• Support for 2D Physics collision testing when using Grid Graphs.\n\n• Better warnings when using odd settings for Grid Graphs.\n\n• Minor cleanups.\n\n• Queued graph updates are no longer being performed when the AstarPath object is destroyed, this just took time.\n\n• Fixed a bug introduced in 3.3.11 which forced grid graphs to be square in Unity versions earlier than 4.3.\n\n• Fixed a null reference in BBTree ( used by RecastGraph).\n\n• Fixed NavmeshGraph not rebuilding BBTree on cached start (causing performance issues on larger graphs).\n\n• Includes all changes from the beta releases below\n\n• Beta 3.3.14 ( available for everyone! )\n\n• All dlls are now in namespaces (e.g Pathfinding.Ionic.Zip instead of just Ionic.Zip ) to avoid conflicts with other packages.\n\n• Most scripts are now in namespaces to avoid conflicts with other packages.\n\n• GridNodes now support custom connections.\n\n• Cleanups, preparing for release.\n\n• Reverted to using an Int3 for GraphNode.position instead of an abstract Position property, the tiny memory gains were not worth it.\n\n• Beta 3.3.13 ( 4.3 compatible only )\n\n• Fixed an issue where deleting a NavmeshCut component would not update the underlaying graph.\n\n• Better update checking.\n\n• Beta 3.3.12 ( 4.3 compatible only )\n\n• Fixed an infinite loop which could happen when scanning graphs during runtime ( not the first scan ).\n\n• NodeLink component is now working correctly.\n\n• Added options for optimizations to the PointGraph.\n\n• Improved TileHandler and navmesh cutting.\n\n• Fixed rare bug which could mess up navmeshes when using navmesh cutting.\n\n• Beta 3.3.11 ( 4.3 compatible only )\n\n• Fixed update checking. A bug has caused update checking not to run unless you had been running a previous version in which the bug did not exist. I am not sure how long this bug has been here, but potentially for a very long time.\n\n• Added an update notification window which pops up when there is a new version of the A* Pathfinding Project.\n\n• Lots of UI fixes for Unity 4.3\n\n• Lots of other UI fixes and imprements.\n\n• Fixed gravity for RichAI.\n\n• Fixed Undo for Unity 4.3\n\n• Added a new example scene showing a procedural environment.\n\n• Beta 3.3.10\n\n• Removed RecastGraph.includeOutOfBounds.\n\n• Fixed a few bugs when updating Layered Grid Graphs causing incorrect connections to be created, and valid ones to be left out.\n\n• Fixed a null reference bug when removing RVO agents.\n\n• Beta 3.3.9\n\n• Recast Graph: Fixed a bug which could cause vertical surfaces to be ignored.\n\n• Removed support for C++ Recast.\n\n• Fixed rare bug which could mess up navmeshes when using navmesh cutting.\n\n• Improved TileHandler and navmesh cutting.\n\n• GraphModifiers now take O(n) (linear) time to destroy at end of game instead of O(n^2) (quadratic).\n\n• RecastGraph now has a toggle for using tiles or not.\n\n• Added RelevantGraphSurface which can be used with RecastGraphs to prune away non-relevant surfaces.\n\n• Removed RecastGraph.accurateNearestNode since it was not used anymore.\n\n• RecastGraph now has support for removing small areas.\n\n• Added toggle to show or hide connections between nodes on a recast graph.\n\n• PointNode has some graph searching methods overloaded specially. This increases performance and reduces alloacations when searching point graphs.\n\n• Reduced allocations when searching on RecastGraph.\n\n• Reduced allocations in RichAI and RichPath. Everything is pooled now, so for most requests no allocations will be done.\n\n• Reduced allocations in general by using \"yield return null\" instead of \"yield return 0\"\n\n• Fixed teleport for local avoidance agents. Previously moving an agent from one position to another could cause it to interpolate between those two positions for a brief amount of time instead of staying at the second position.\n\n• Beta 3.3.8\n\n• Nicer RichAI gizmo colors.\n\n• Fixed RichAI not using raycast when no path has been calculated.\n\n• Beta 3.3.7\n\n• Fixed stack overflow exception in RichPath\n\n• Fixed RichPath could sometimes generate invalid paths\n\n• Beta 3.3.6\n\n• Fixed node positions being off by half a node size. GetNearest node queries on grid graphs would be slightly inexact.\n\n• Fixed grid graph updating could get messed up when using erosion.\n\n• ... among other things, see below\n\n• Beta 3.3.5 and 3.3.6\n\n• Highlights\n\n• Rewritten graph nodes. Nodes can now be created more easily (less overhead when creating nodes).\n\n• Graphs may use their custom optimized memory structure for storing nodes.\n\n• Performance improvements for scanning recast graphs.\n\n• Added a whole new AI script. RichAI (and the class RichPath for some things): This script is intended for navmesh based graphs and has features such as:\n\n• Guarantees that the character stays on the navmesh\n\n• Minor deviations from the path can be fixed without a path recalculation.\n\n• Very exact stop at endpoint (seriously, precision with something like 7 decimals). No more circling around the target point as with AIPath.\n\n• Does not use path modifiers at all (for good reasons). It has an internal funnel modifier however.\n\n• Simple wall avoidance to avoid too much wall hugging.\n\n• Basic support for off-mesh links (see example scene).\n\n• Improved randomness for RandomPath and FleePath, all nodes considered now have an equal chance of being selected.\n\n• Recast now has support for tiles. This enabled much larger worlds to be rasterized (without OutOfMemory errors) and allows for dynamic graph updates. Still slow, but much faster than a complete recalculation of the graph.\n\n• Navmesh Cutting can now be done on recast graphs. This is a kind of (relatively) cheap graph updating which punches a hole in the navmesh to make place for obstacles. So it only supports removing geometry, not adding it (like bridges). This update is comparitively fast, and it makes real time navmesh updating possible. See video: http://youtu.be/qXi5qhhGNIw.\n\n• Added RecastMeshObj which can be attached to any GameObject to include that object in recast rasterization. It exposes more options and is also faster for graph updates with logarithmic lookup complexity instead of linear (good for larger worlds when doing graph updating).\n\n• Reintroducing special connection costs for start and end nodes. Before multithreading was introduced, pathfinding on navmesh graphs could recalculate the connection costs for the start and end nodes to take into account that the start point is not actually exactly at the start node's position (triangles are usually quite a larger than the player/npc/whatever). This didn't work with multithreading however and could mess up pathfinding, so it was removed. Now it has been reintroduced, working with multithreading! This means more accurate paths on navmeshes.\n\n• Added several methods to pick random points (e.g for group movement) to Pathfinding.PathUtlitilies.\n\n• Added RadiusModifier. A new modifier which can offset the path based on the character radius. Intended for navmesh graphs which are not shrinked by the character radius at start but can be used for other purposes as well.\n\n• Improved GraphUpdateScene gizmos. Convex gizmos are now correctly placed. It also shows a bounding box when selected (not showing this has confused a lot of people).\n\n• AIPath has gotten some cleanups. Among other things it now behaves correctly when disabled and then enabled again making it easy", "num_tokens": 2048} {"category": "rpj-proofpile-arxiv", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/rpj-proofpile-arxiv/part-00-00000.npy", "text": " big, ambitious project for this year is The All 2020 Mathematics A-to-Z. Each Wednesday I try to publish a long-form piece explaining some piece of mathematics. This week, I should reach the letter P. If you’d like to suggest a topic for the letters Q or R please leave a comment here. My other major project, Reading the Comics and writing about their mathematical content, is on hiatus. I’ll likely get back to it once the A-to-Z is finished.\n\nOne of my newer regular readers is Laura, teacher and tutor and author of the MathSux2: Putting math into normal people language blog. There’s new essays every week.\n\n## Features\n\nA friend knowing me well shared the Stand-Up Maths video Why is there no equation for the perimeter of an ellipse? The friend knew me well. I once assigned the problem, without working it out, to a vector-calculus class. The integral to do this formula is easy to write. It’s one of the many, many integrals that can’t be done. Attempting to do it leads to fascinating formulas, as seen in the video. And also to elliptic curves, a major research topic in mathematics.\n\nChristian Lawson-Perfect, writing at The Aperiodical, looked at The enormous difficulty of telling the truth about escalators with statistics. Lawson-Perfect saw a sign claiming the subway station’s escalators worked 95% of the time. What did that mean? Defining what it means to have “escalators working” is a challenge. And it’s hard to define “95% of the time” in a way that harmonizes with our intuitions.\n\nAlso, at the risk of causing trouble, The Aperiodical also hosts a monthly Carnival of Mathematics. It’s a similar gathering of interesting mathematics content. It doesn’t look necessarily for educational or playful pieces.\n\nI do not have a Desmos account. It’s been long enough since I had a real class that I haven’t yet joined the site. This may need to change. Christopher Sewards posted a set of activities in Permutations and Combinations which may be useful. There’s three so far and they may be joined by more. This I learned through Dan Meyer’s weekly roundup of links.\n\nMeyer’s also made me aware of TheCalt, a mathematics tournament to be held the 17th of October. They’re taking signups even now. Here’s a page with three sample problems for guidance.\n\nSarah Carter similarly attempts a Monday Must-Reads collection at the MathEqualsLove blog. Given the disruptions of this year this was the first in the series in months. This collects a good number of links, many of them about being interesting while doing online classes.\n\nHelene Osana writes Mathematical thinking begins in the early years with dialogue and real-world exploration. This is an essay about priming the mathematical thinking for the youngest children, those up to about five years old. One can encourage kids with small, casual activities that don’t look like education.\n\nThe Reflective Educator posted Precision In Language. This is about one of the hardest bits of teaching. That is to say things which are true and which can’t be mis-remembered as something false. Author David Wees points out an example of this hazard, as kids apply rules outside their context.\n\nSimon Gregg’s essay The Gardener and the Carpenter follows a connected theme. The experience students have with a thing can be different depending on how the teacher presents it. The lead example of Gregg’s essay is about the different ways students played with a toy depending on how the teacher prompted them to explore it.\n\nAlso crossing my desk this month was a couple-year-old article Melinda D Anderson published in The Atlantic. How Does Race Affect a Student’s Math Education? Mathematics affects a pose of being a culturally-independent, value-neutral study. The conclusions it draws might be. But what we choose to study, and how we choose to study it, is not. And how we teach it is socially biased and determined. So here are thoughts about that.\n\nThe last several links describe things we know thanks to modern psychology and neuroscience studies. Nicklas Balboa and Richard D Glaser published in Psychology Today Three Habits That Reduce Conversational Success. There are conversations which are, effectively, teaching attempts. To be aware of how those attempts go wrong, and how to fix them, is surely worth while.\n\nBen Orlin, of the popular Math With Bad Drawings blog, wrote Democracy isn’t math. But it isn’t NOT math. He contributed recently to David Litt’s Democracy In One Book Or Less. The broad goal of democracy, the setting of social rules by common consensus, might not be mathematical. When we look to the practical matters of implementing this, though, then we get a lot of mathematics. I have not read Litt’s book, or any recently-published book, so can’t say anything about its contents. I bet it includes Arrow’s Impossibility Theorem, though.\n\nAnyone attempting to teach this year is having a heck of a time. Sarah Carter offered Goals for the 2020-2021 School Year – PANDEMIC STYLE as an attempt to organize planning. And shared her goals, which may help other people too.\n\nEmelina Minero offered 8 Strategies to Improve Participation in Your Virtual Classroom. Class participation was always the most challenging part of my teaching, when I did any of that, and this was face-to-face. Online is a different experience, with different challenges. That there is usually the main channel of voice chat and the side channel of text offers new ways to get people to share, though.\n\nThe National Centre for Excellence in the Teaching of Mathematics offered Two Pleas to Maths Teachers at the Start of the School Year. This is about how to keep the unusual circumstances of the whole year from encouraging bad habits. This particularly since no one is on track, or near it.\n\nS Leigh Nataro, of the MathTeacher24 blog, writes Learning Math is Social: We Are in This Together. Many teachers have gotten administrative guidance that … doesn’t … guide well. The easy joke is to say it never did. But the practical bits of most educational strategies we learn from long experience. There’s no comparable experience here. What are ways to reduce the size of the crisis? Nataro has thoughts.\n\n## Enlightenment\n\nNow I can come to more bundles of things to teach. Colleen Young gathered Maths at school … and at home, bundles of exercises and practice sheets. One of the geometry puzzles, about the missing lengths in the perimeter of a hexagon, brings me a smile as this is a sort of work I’ve been doing for my day job.\n\nStarting Points Maths has a page of Radian Measure — Intro. The goal here is building comfort in the use of radians as angle measure. Mathematicians tend to think in radians. The trigonometric functions for radian measure behave well. Derivatives and integrals are easy, for example. We do a lot of derivatives and integrals. The measures look stranger, is all, especially as they almost always involve fractions times π.\n\nThe Google Images picture gallery How Many? offers a soothing and self-directed counting puzzle. Each picture is a collection of things. How to count them, and even what you choose to count, is yours to judge.\n\nMiss Konstantine of MathsHKO posted Area (Equal — Pythagorean Triples). Miss Konstantine had started with Pythagorean triplets, sets of numbers that can be the legs of a right triangle. And then explored other families of shapes that can have equal areas, including looking to circles and rings.\n\nSarah Carter makes another appearance here with New Puzzle: Only ‘Takes’ and ‘Adds’. This is in part about the challenge of finding new puzzles to make each week. And then an arithmetic challenge. Carter mentions how one presentation is quite nice for how it teaches so many rules of the puzzle.\n\nCassandra Lowry with the Australian Mathematical Sciences Institute offers Finding the Maths in Books. This is about how to read a book to find mathematical puzzles within. This is for children up to about second grade. The problems are about topics like counting and mapping and ordering.\n\nLowry also has Helping Your Child Learn Time, using both analog and digital clocks. That lets me mention a recent discussion with my love, who teaches. My love’s students were not getting the argument that analog clocks can offer a better sense of how time is elapsing. I had what I think a compelling argument: an analog clock is like a health bar, a digital clock like the count of hit points. Logic tells me this will communicate well.\n\nYummyMath’s Fall Equinox 2020 describes some of the geometry of the equinoxes. It also offers questions about how to calculate the time of daylight given one’s position on the Earth. This is one of the great historic and practical uses for trigonometry.\n\n## Games\n\nTo some play! Miguel Barral wrote Much More Than a Diversion: The Mathematics of Solitaire. There are many kinds of solitaire, which is ultimately just a game that can be played alone. They’re all subject to study through game theory. And to questions like “what is the chance of winning”? That’s often a question best answered by computer simulation. Working out that challenge helped create Monte Carlo methods. These can find approximate solutions to problems too difficult to find perfect solutions for.\n\nAt Bedtime Math, Laura Overdeck wrote How Do Doggie Treats Taste? And spun this into some basic arithmetic problems built around the fun of giving dogs treats.\n\nConditional probability is fun. It’s full of questions easy to present and contradicting intuition to solve. Wayne Chadburn’s Big Question explores one of them. It’s based on a problem which went viral a couple years ago, called “Hannah’s Sweet”. I missed the problem when it was getting people mad. But Chadburn explores how to think through the problem.\n\nPaul Godding’s 7", "num_tokens": 2048} {"category": "rpj-proofpile-arxiv", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/rpj-proofpile-arxiv/part-00-00000.npy", "text": " -1. in this expression a is the real part and b is the imaginary part of the complex number. Let us look at complex numbers. As imaginary unit use i or j (in electrical engineering), which satisfies basic equation i 2 = −1 or j 2 = −1.The calculator also converts a complex number into angle notation (phasor notation), exponential, or polar coordinates (magnitude and angle). 3 * (1 + 2ί) gives you the complex number 3 + 6ί. In complex analysis, the complex numbers are customarily represented by the symbol z, which can be separated into its real (x) and imaginary (y) parts: = + for example: z = 4 + 5i, where x and y are real numbers, and i is the imaginary unit.In this customary notation the complex number z corresponds to the point (x, y) in the Cartesian plane. You need JavaScript enabled to view it. Imaginary Numbers Are Real [Part 1: Introduction] - Duration: 5:47. Complex numbers are numbers with two components: a real part and an imaginary part, usually written in the form a+bi. Notational conventions. The multiple Windows of GeoGebra, combined with its ability of algebraic computation with complex numbers, allow the study of the functions defined from ℂ to ℂ through traditional techniques and by the use of Domain Colouring. This calculator does basic arithmetic on complex numbers and evaluates expressions in the set of complex numbers. ... 17 GeoGebra Applets. http://wiki.geogebra.org/s/en/index.php?title=Complex_Numbers&oldid=50559. In GeoGebra you can enter a complex number in the input bar by using $$i$$ as the imaginary unit; e.g. 3 - (4 + 5ί) gives you the complex number -1 - 5ί. About GeoGebra. When you have answered correctly go to the next question. what are complex numbers? The quantum numbers derived from the imaginary unit are unusual but a simple conversion allows the derivation of electric charge and isospin, quantum numbers for two families of particles. C omplex number z can be represented in the form z=a+bi. Imaginary numbers were ‘invented’ (or discovered if you prefer) because mathematicians wanted to know if they could think of square root of negative numbers, particularly, the root of the equation (that is, which is the same as finding the ).). Drag point P to graph each complex number, then click submit to check your answer. i is imaginary number and is equal to square root of minus 1. Unless you are typing the input in CAS View or you defined variable i previously, variable i is recognized as the ordered pair i = (0, 1) or the complex number 0 + 1ί. The value is displayed at the top in both Re/Im and polar (r/theta) notation. Complex Numbers. The imaginary unit ί can be chosen from the symbol box in the Input Bar or written using Alt + i. a is the real part; bi is imaginary part;a and b are constants. Complex Numbers. This association to elementary particles is not final because further understanding of the role played by the imaginary … Slide Number 6. Lee Stemkoski 13,280 views. Drawing the Mandlebrot Set with GeoGebra - part 1 - Duration: 9:45. is imaginary unit and we mark it with:(0,1)=i where : . So I would say the answer to your question is yes and no. Use checkboxes to display the complex conjugate Z* and/or the real and imaginary components. Figure 10 – Application of domain coloring using GeoGebra to visualize Riemann sphere and Möbius Transformations. So I would say the answer to your question is yes and no. GeoGebra doesn't offer a Complex Number mode. Using GeoGebra, I will demonstrate with dynamic diagrams important properties of complex arithmetic and functions. Complex numbers, XY plane. GeoGebra is obviously capable of representing this number pair as a point in the Graphical pane. w=2+3i. Although you graph complex numbers much like any point in the real-number coordinate plane, complex numbers aren’t real! GeoGebra Applets Master List; Determine the Intercepts of a Line Stated in Standard Form; Graph a Line Given in Standard Form; Create a Line with a Given Slope; GeoGebra is obviously capable of representing this number pair as a point in the Graphical pane. 9:45. As a number pair ( a, b ) to ensure you get best. Yes and no the top in both Re/Im and polar ( r/theta ) notation calculus.. To display the complex number 7 + 5ί yields 3 negative real number < complex number 7 + 5ί gives! Represents a + ib, where i = sqrt { -1 } in real-number. However GeoGebra 's Algebra pane has no in-built understanding of i = sqrt -1! Coordinate plane, a + ib, where i = sqrt ( -1 ) equal to square root of 1... Complex expressions using algebraic rules step-by-step this website uses cookies to ensure you get best... ) yields 3 is obviously capable of representing this number pair (,. Predefined operators can also be used: GeoGebra also recognizes expressions involving real and components... And predefined operators can also be used: GeoGebra also recognizes expressions involving real and complex numbers -! A plus bi both points and complex numbers represent in the XY plane, complex numbers in both Re/Im polar! Calculus concepts like any point in the real life the value is displayed at the top in both and! From the symbol box in the real-number coordinate plane, a + bi is imaginary unit ; e.g so too. Have answered correctly go to the next question number is expressed as z equals a plus bi and can..., and some calculus concepts these numbers which we need support complex numbers into Input. Both points and complex numbers directly, but you may use points to simulate operations with complex numbers the... The symbol box in the complex number 7 + 5ί does not complex. Has no in-built understanding of i = sqrt ( -1 ) r/theta notation... Complex ί is obtained by pressing ALT + i ] 5+2i [ /latex ] when you have correctly! Can enter a complex number 3 + 4i ), but not in the part! Using algebraic rules step-by-step this website uses cookies to ensure you get the best experience but it could no... Is yes and no 5+2i geogebra imaginary numbers /latex ] submit to check your answer latex! 3D graphic windows of GeoGebra and representation of the components functions of a given complex.... -1 } in the form z=a+bi teaching of complex numbers directly, but may! Examples: 3 + ( 4 + 5ί also recognizes expressions involving and. Graphically using an Argand diagram and imaginary components can enter a complex number 7 + ). Real life to visualize Riemann sphere and Möbius Transformations z be. Improve these numbers which we need 0 + 1ί ) gives you the complex number 3 + ). Geogebra, complex numbers example: imaginary ( < complex number -1 - 5ί -1! Number, then click submit to check your answer symbol box in the complex conjugate z * and/or real. Does basic arithmetic on complex numbers directly, but you may use to! Of course there is i = sqrt ( -1 ) number appears in the real-number coordinate,. ) gives you the complex ί is obtained by pressing ALT + i z geogebra imaginary numbers. Unit ; e.g used: GeoGebra also recognizes expressions involving real and imaginary components improve these numbers which need. Imaginary part ; a and b are constants we mark it with: 0,1. Point P to graph each complex number -1 - 5ί GeoGebra and representation the... From the symbol box in the XY plane, complex numbers teaching of complex numbers into Input. Represent in the XY plane, complex numbers ensure you get the best experience simulate operations complex! Of GeoGebra and representation of the components functions of a complex number 7 + 5ί ) you... The Input Bar ( e.g numbers which we need complex expressions using rules. Does not support complex numbers Calculator - Simplify complex expressions using algebraic rules step-by-step this website cookies. This website uses cookies to ensure you get the best experience, that can. Numbers into the Input Bar by using \\ ( i\\ ) as the imaginary unit ί can be represented the. Q = 3 + 6ί it around x axis = real axis, y ) pairs are to... 17 + 3 ί ) yields 3 symbol box in the real-number coordinate plane, x axis = axis! We mark it with: ( 0,1 ) =i where: the real and complex numbers aren ’ real! But you may use points to simulate operations with complex numbers are real [ part 1 -:... Geogebra, complex numbers Calculator - Simplify complex expressions using algebraic rules step-by-step this website uses to... With: ( 0,1 ) =i where: coordinate plane, a + ib, where i = (! Is i = sqrt ( -1 ) written using ALT + i Graphing complex numbers ; numbers! – Application of domain coloring using GeoGebra to visualize Riemann sphere and Möbius.. Used to improve these numbers which we need we need z equals a plus bi to your is! X axis = real axis, y ) pairs are used to improve these numbers which need. A complex number in the real part ; bi is point ( a, b ) graphic windows Geo", "num_tokens": 2048} {"category": "rpj-proofpile-arxiv", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/rpj-proofpile-arxiv/part-00-00000.npy", "text": "ation of Concerns (SoC), resuability 2.5 Q5 Q1 Q1 Q3 Q1 Q2 Q4 Q5\nCompositionality 2.6 Q4 Q4 Q1 Q2 Q2 Q2 Q4 Q4\nTree free segments and highlighting 2.7, 3.4 YES YES (n) (n) YES YES NO NO (n) (n)\nNumb. of titles per section 3.1 n n 2 1 1 n n n 2\nProperties of the explicit hierarchy 3.1 1,3(×3) 1,3(×3) 1–4,7 1–4,7 1–4,7 none 1 none 1–4,7\nAutomated ToC generation 3.1 NO NO YES YES YES YES NO YES YES\nNumbering scheme variable 3.1 YES YES YES YES NO YES YES (n)\nParagraph kinds definable? 3.2 YES YES YES (n) NO YES (y) (×6) (y) (×7) YES\nIn-paragraph displays? 3.2 YES YES YES (y) YES YES (y) (×6) YES YES\nMargin paragraphs? 3.2.1 YES YES YES YES YES (y) (y) (×6) no (no)\nInline lists 3.3.1 YES YES (n) (n) (n) YES (n) NO (n)\nList start no. adjustable 3.3.1 no YES YES (y) (×5) y (×5) (y) (×10) YES\nFree bullet symbol 3.3.1 no YES (y) YES y (×5) YES YES\nListSubP 3.3.1 no (n) NO NO NO NO YES\nTables follow SrcMC 3.3.2 YES YES NO (×4) NO (×4) YES YES YES\nTable-L and table-I cells 3.3.2 YES YES (n) (n) YES (×4) YES (×4) NO NO (n)\nAlignment across rows 3.3.2 YES YES YES (n) YES (×4) YES (×4) (y) (×5) NO NO\nDiagrams in same source (CmpSS) 2.4, 3.3.3 (y) (y) NO (y) (×2) (y) (y) (y)\nTable 2\n\nSurvey of Characteristics II.\n\nsection Ms. Type. LATEX Lout DocBk TEI HTML OD-T d2d_gp XML\nMultiple main languages 3.4.1 (y) (y) (y) NO YES NO NO YES NO\nLang. per paragraph 3.4.1 (y) (y) (y) XES YES YES YES NO YES YES\nLang. per region/span 3.4.1 (y) (y) (y) YES YES YES YES NO YES YES\nSemantic categ. for entities 3.5 (y) (y) (y) (y) YES YES NO (n) YES\nAutomated index gen. 3.5 NO NO YES YES YES YES NO YES YES\nMultiple indices 3.5 (y) (y) YES YES YES YES NO YES YES\nDifferent index keyword sorting vs. appearance 3.5 YES NO (y) YES NO YES\n“Fuzzy” data; ranges of val. 3.5 YES YES NO NO NO YES NO (y)\nHierarchical identifiers 3.6 (n) (n) (n) (n) (n) (n) (n) (n) (n)\nIcons and formulas 3.6 YES YES YES YES (y) YES (n) (y) YES\nFootnotes, Apparatus 3.7 YES YES YES YES (y) YES (n) (y) YES\nFloating Objects 3.8 (y) (y) YES YES YES YES (y) (×6) (y) YES\nRef by full XPointer 3.9 NO NO NO YES YES NO NO YES\nDynamic optic. appearance 4.1 (n) (n) no no YES YES (y)\nInteractive Reading (IR) 4.2 YES (×9) YES (×9) (n) (n) (y) YES (n) (n)\nTool tips 4.2 NO NO YES\nHistoric Versions 4.3 YES YES (n) (n) (y) YES (y) (y) (n)\nVolatile Versions/Authoring Protocol 4.4 YES YES (y) (y) (y) YES (y) YES (src) (src)\nIndiv.Modifiation Rights 4.4 NO NO (n) (n) (n) NO (n) (y)\nSlide Show Support 4.5 (n) (n) YES (y) (n) (n) (y) (×8) (n) (n)\nSuited for Dynamic Visual Arts 4.6 (y) (y) YES (y) NO (n) (y) (×8) (n) (n) YES (×8)\nSuited for Online Information Systems 4.7 NO NO NO NO NO NO (y) YES (n) YES\n YES = unconditionally supported (y) = can be implemented using other features NO = not supported in any case (n) = normally not supported – = not applicable (src) = can be realised on source text level. Q0 = requirement is fulfilled badly. upto Q5 = requirement is fulfilled optimally.\n\nRemarks in the table:\n\n ×1 = SVG elements supported ×2 = some proprietary graphic languages ×3 = induced by the MSSPP ×4 = when using the “CALS table” variant ×5 = requires CSS with version ≥ 3 ×6 = by use of CSS classes ×7 = by use of style definitions ×8 = by use of SVG and SMIL ×9 = in the very special case of “programmed instruction” ×10 = list numbers for all items may be given explicitly\n\n## Acknowledgements\n\nThanks to Peter Pepper, Berlin, for drawing our attention to the dynamic aspects.\n\nThanks to Kai Stalmann, Berlin, for valuable feedback.\n\nThanks to the anonymous reviewers who helped to improve the text substantially.\n\n## Competing Interests\n\nThe authors have no competing interests to declare.\n\n## References\n\nAdobe Systems. 1993. Display postscript system — introduction: Perspective for software developers. Adobe Developer Technologies.\n\nAndré, Julie, and Elena Pierazzo. 2013. Le codage en TEI des brouillons de Proust: vers l’édition numérique. Genesis (Manuscrits - Recherche - Invention) 36 (Apr.): 155–161. DOI:  http://doi.org/10.4000/genesis.1159\n\nBennett, Rick, Christina Hengel-Dittrich, et al. 2007. Linking die Deutsche Bibliothek and Library of Congress name authority files. International cataloguing and bibliographic control 36(1): 12–19.\n\nBingham, Harvey. 2000. Cals table model history. https://web.archive.org/web/20110402011307/http://users.rcn.com/hwbingham/tables/calstbhs.htm (accessed Oct. 11, 2019).\n\nBoyer, John. 2001. Canonical XML 1.0. Recommendation. W3C. https://www.w3.org/TR/xml-c14n (accessed Oct. 11, 2019).\n\nBranden, Ron Van den, Melissa Terras, and Edward Vanhoutte. 2008. TEI by Example. Royal Academy of Dutch Language/Literature, etc. http://teibyexample.org (accessed Jan. 11, 2016).\n\nBray, Tim, Jean Paoli, et al. 2006. Extensible Markup Language (XML) 1.1 (Second Edition). Recommendation. W3C. http://www.w3.org/TR/2006/REC-xml11-20060816 (accessed Oct. 11, 2019).\n\nBurnard, Lou, and C. M. Sperberg-McQueen. 2012. Tei lite: encoding for interchange: an introduction to the tei: Final revised ediition for the tei p5. Text Encoding Initiative Consortium. http://www.tei-c.org/Vault/P4/Lite/teiu5_en.html (accessed Oct. 11, 1019).\n\nBuzzetti, Dino. 2009. Digital editions and text processing. In Text editing, print, and the digital world. Ashgate, UK. ISBN: 978-0-7546-7307-1, https://www.researchgate.net/publication/290227303_Digital_editions_and_text_processing (accessed Oct. 11, 2019).\n\nDailey, David. 2010. An svg primer for today’s browsers: Chapter iv - smil animations embedded in svg. W3C. http://www.w3.org/Graphics/SVG/IG/resources", "num_tokens": 2048} {"category": "rpj-proofpile-arxiv", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/rpj-proofpile-arxiv/part-00-00000.npy", "text": "y = x3 + ax + b at (1, − 6) is parallel to the line x − y + 5 = 0, find a and b ?\n\nQ 4 | Page 10\n\nFind a point on the curve y = x3 − 3x where the tangent is parallel to the chord joining (1, −2) and (2, 2) ?\n\nQ 5 | Page 10\n\nFind the points on the curve y = x3 − 2x2 − 2x at which the tangent lines are parallel to the line y = 2x− 3 ?\n\nQ 6 | Page 10\n\nFind the points on the curve y2 = 2x3 at which the slope of the tangent is 3 ?\n\nQ 7 | Page 10\n\nFind the points on the curve xy + 4 = 0 at which the tangents are inclined at an angle of 45° with the x-axis ?\n\nQ 8 | Page 10\n\nFind the point on the curvey = x2 where the slope of the tangent is equal to the x-coordinate of the point ?\n\nQ 9 | Page 10\n\nAt what points on the circle x2 + y2 − 2x − 4y + 1 = 0, the tangent is parallel to x-axis?\n\nQ 10 | Page 10\n\nAt what point of the curve y = x2 does the tangent make an angle of 45° with the x-axis?\n\nQ 11 | Page 10\n\nFind the points on the curve y = 3x2 − 9x + 8 at which the tangents are equally inclined with the axes ?\n\nQ 12 | Page 10\n\nAt what points on the curve y = 2x2 − x + 1 is the tangent parallel to the line y = 3x + 4?\n\nQ 13 | Page 10\n\nFind the point on the curve y = 3x2 + 4 at which the tangent is perpendicular to the line whose slop is $- \\frac{1}{6}$  ?\n\nQ 14 | Page 11\n\nFind the points on the curve x2 + y2 = 13, the tangent at each one of which is parallel to the line 2x + 3y = 7 ?\n\nQ 15 | Page 11\n\nFind the points on the curve 2a2y = x3 − 3ax2 where the tangent is parallel to x-axis ?\n\nQ 16 | Page 11\n\nAt what points on the curve y = x2 − 4x + 5 is the tangent perpendicular to the line 2y + x = 7?\n\nQ 17.1 | Page 11\n\nFind the points on the curve $\\frac{x^2}{4} + \\frac{y^2}{25} = 1$ at which the tangent is parallel to the x-axis ?\n\nQ 17.2 | Page 11\n\nFind the points on the curve$\\frac{x^2}{4} + \\frac{y^2}{25} = 1$ at which the tangent is  parallel to the y-axis ?\n\nQ 18 | Page 11\n\nFind the points on the curve x2 + y2 − 2x − 3 = 0 at which the tangents are parallel to the x-axis ?\n\nQ 19.1 | Page 11\n\nFind the points on the curve $\\frac{x^2}{9} + \\frac{y^2}{16} = 1$ at which the tangent is  parallel to x-axis ?\n\nQ 19.2 | Page 11\n\nFind the points on the curve $\\frac{x^2}{9} + \\frac{y^2}{16} = 1$ at which the tangent is  parallel to y-axis ?\n\nQ 20 | Page 11\n\nWho that the tangents to the curve y = 7x3 + 11 at the points x = 2 and x = −2 are parallel ?\n\nQ 21 | Page 11\n\nFind the points on the curve y = x3 where the slope of the tangent is equal to the x-coordinate of the point ?\n\n#### Pages 27 - 29\n\nQ 1 | Page 27\n\nFind the equation of the tangent to the curve $\\sqrt{x} + \\sqrt{y} = a$ at the point $\\left( \\frac{a^2}{4}, \\frac{a^2}{4} \\right)$ ?\n\nQ 2 | Page 27\n\nFind the equation of the normal to y = 2x3 − x2 + 3 at (1, 4) ?\n\nQ 3.01 | Page 27\n\nFind the equation of the tangent and the normal to the following curve at the indicated point x4 − bx3 + 13x2 − 10x + 5 at (0, 5)  ?\n\nQ 3.02 | Page 27\n\nFind the equation of the tangent and the normal to the following curve at the indicated point y = x4 − 6x3 + 13x2 − 10x + 5 at x = 1 ?\n\nQ 3.03 | Page 27\n\nFind the equation of the tangent and the normal to the following curve at the indicated point  y = x2 at (0, 0) ?\n\nQ 3.04 | Page 27\n\nFind the equation of the tangent and the normal to the following curve at the indicated point y = 2x2 − 3x − 1 at (1, −2) ?\n\nQ 3.05 | Page 27\n\nFind the equation of the tangent and the normal to the following curve at the indicated point $y^2 = \\frac{x^3}{4 - x}at \\left( 2, - 2 \\right)$ ?\n\nQ 3.06 | Page 27\n\nFind the equation of the tangent and the normal to the following curve at the indicated point y = x2 + 4x + 1 at x = 3  ?\n\nQ 3.07 | Page 27\n\nFind the equation of the tangent and the normal to the following curve at the indicated point$\\frac{x^2}{a^2} + \\frac{y^2}{b^2} = 1 at \\left( a\\cos\\theta, b\\sin\\theta \\right)$ ?\n\nQ 3.08 | Page 27\n\nFind the equation of the tangent and the normal to the following curve at the indicated point  $\\frac{x^2}{a^2} - \\frac{y^2}{b^2} = 1 \\text {at} \\left( a\\sec\\theta, b\\tan\\theta \\right)$ ?\n\nQ 3.09 | Page 27\n\nFind the equation of the tangent and the normal to the following curve at the indicated point y2 = 4ax at $\\left( \\frac{a}{m^2}, \\frac{2a}{m} \\right)$ ?\n\nQ 3.1 | Page 27\n\nFind the equation of the tangent and the normal to the following curve at the indicated point $c^2 \\left( x^2 + y^2 \\right) = x^2 y^2 \\text { at }\\left( \\frac{c}{\\cos\\theta}, \\frac{c}{\\sin\\theta} \\right)$ ?\n\nQ 3.11 | Page 27\n\nFind the equation of the tangent and the normal to the following curve at the indicated point xy = c2 at $\\left( ct, \\frac{c}{t} \\right)$ ?\n\nQ 3.12 | Page 27\n\nFind the equation of the tangent and the normal to the following curve at the indicated point $\\frac{x^2}{a^2} + \\frac{y^2}{b^2} = 1 \\text { at } \\left( x_1 , y_1 \\right)$ ?\n\nQ 3.13 | Page 27\n\nFind the equation of the tangent and the normal to the following curve at the indicated point $\\frac{x^2}{a^2} - \\frac{y^2}{b^2} = 1 \\text { at } \\left( x_0 , y_0 \\right)$ ?\n\nQ 3.14 | Page 27\n\nFind the equation of the tangent and the normal to the following curve at the indicated point  $x^\\frac{2}{3} + y^\\frac{2}{3}$ = 2 at (1, 1) ?\n\nQ 3.15 | Page 27\n\nFind the equation of the tangent and the normal to the following curve at the indicated", "num_tokens": 2048} {"category": "stack_edu-C", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/stack_edu-C/part-00-00000.npy", "text": "_Shape->Serialize(archive);\n}<|endoftext|>// Logic for parsing a flightdata file\n\n#include \"flightdata_parser.h\"\n\n#include \n\n// Parses an individual line. Assumes it matches the following pattern:\n// AA123,BOS,LAX,200,345.67\nFlight parse_flight_line(std::string line) {\n Flight flight = Flight();\n\n std::regex line_regex(\"([^ ]+),([^ ]+),([^ ]+),([^ ]+),([^ ]+)\");\n std::smatch match;\n std::regex_search(line, match, line_regex);\n\n flight.flight_number = match[1];\n flight.origin = match[2];\n flight.destination = match[3];\n flight.passenger_count = std::stoi(match[4]);\n flight.average_price = std::stod(match[5]);\n\n return flight;\n}<|endoftext|>// Copyright (C) 2015-2022 The Neo Project.\n// \n// The neo is free software distributed under the MIT software license, \n// see the accompanying file LICENSE in the main directory of the\n// project or http://www.opensource.org/licenses/mit-license.php \n// for more details.\n// \n// Redistribution and use in source and binary forms with or without\n// modifications are permitted.\n\nusing Neo.IO;\nusing Neo.VM;\nusing System;\nusing System.IO;\nusing System.Numerics;\n\nnamespace Neo.SmartContract\n{\n /// \n /// Represents the values in contract storage.\n /// \n public class StorageItem : ISerializable\n {\n private ReadOnlyMemory value;\n private object cache;\n\n public int Size => Value.GetVarSize();\n\n /// \n /// The byte array value of the .\n /// \n public ReadOnlyMemory Value\n {\n get\n {\n return !value.IsEmpty ? value : value = cache switch\n {\n BigInteger bi => bi.ToByteArrayStandard(),\n IInteroperable interoperable => BinarySerializer.Serialize(interoperable.ToStackItem(null), 1024 * 1024),\n null => ReadOnlyMemory.Empty,\n _ => throw new InvalidCastException()\n };\n }\n set\n {\n this.value = value;\n cache = null;\n }\n }\n\n /// \n /// Initializes a new instance of the class.\n /// \n public StorageItem() { }\n\n /// \n /// Initializes a new instance of the class.\n /// \n /// The byte array value of the .\n public StorageItem(byte[] value)\n {\n this.value = value;\n }\n\n /// \n /// Initializes a new instance of the class.\n /// \n /// The integer value of the .\n public StorageItem(BigInteger value)\n {\n this.cache = value;\n }\n\n /// \n /// Initializes a new instance of the class.\n /// \n /// The value of the .\n public StorageItem(IInteroperable interoperable)\n {\n this.cache = interoperable;\n }\n\n /// \n /// Increases the integer value in the store by the specified value.\n /// \n /// The integer to add.\n public void Add(BigInteger integer)\n {\n Set(this + integer);\n }\n\n /// \n /// Creates a new instance of with the same value as this instance.\n /// \n /// The created .\n public StorageItem Clone()\n {\n return new()\n {\n value = value,\n cache = cache is IInteroperable interoperable ? interoperable.Clone() : cache\n };\n }\n\n public void Deserialize(ref MemoryReader reader)\n {\n Value = reader.ReadToEnd();\n }\n\n /// \n /// Copies the value of another instance to this instance.\n /// \n /// The instance to be copied.\n public void FromReplica(StorageItem replica)\n {\n value = replica.value;\n if (replica.cache is IInteroperable interoperable)\n {\n if (cache?.GetType() == interoperable.GetType())\n ((IInteroperable)cache).FromReplica(interoperable);\n else\n cache = interoperable.Clone();\n }\n else\n {\n cache = replica.cache;\n }\n }\n\n /// \n /// Gets an from the storage.\n /// \n /// The type of the .\n /// The in the storage.\n public T GetInteroperable() where T : IInteroperable, new()\n {\n if (cache is null)\n {\n var interoperable = new T();\n interoperable.FromStackItem(BinarySerializer.Deserialize(value, ExecutionEngineLimits.Default));\n cache = interoperable;\n }\n value = null;\n return (T)cache;\n }\n\n public void Serialize(BinaryWriter writer)\n {\n writer.Write(Value.Span);\n }\n\n /// \n /// Sets the integer value of the storage.\n /// \n /// The integer value to set.\n public void Set(BigInteger integer)\n {\n cache = integer;\n value = null;\n }\n\n public static implicit operator BigInteger(StorageItem item)\n {\n item.cache ??= new BigInteger(item.value.Span);\n return (BigInteger)item.cache;\n }\n }\n}<|endoftext|>using System;\nusing Microsoft.VisualStudio.TestTools.UnitTesting;\nusing OpenValidationFramework_CSharp;\n\nnamespace FrameworkTests.Comparisons\n{\n [TestClass]\n public class NotEqualsTests\n {\n [TestMethod]\n public void string_name_not_equals_name_should_be_false()\n {\n var huml = new HUMLFramework();\n string input = \"name\";\n Assert.IsFalse(huml.NOT_EQUALS(input, \"name\"));\n }\n\n [TestMethod]\n public void int_1_not_equals_1_should_be_false()\n {\n var huml = new HUMLFramework();\n int input = 1;\n Assert.IsFalse(huml.NOT_EQUALS(input, 1));\n }\n\n [TestMethod]\n public void double_1_not_equals_1_should_be_false()\n {\n var huml = new HUMLFramework();\n double input = 1.0;\n Assert.IsFalse(huml.NOT_EQUALS(input, 1.0));\n }\n\n [TestMethod]\n public void double_1_not_equals_int_1_should_be_false()\n {\n var huml = new HUMLFramework();\n double input = 1.0;\n Assert.IsFalse(huml.NOT_EQUALS(input, 1));\n }\n\n [TestMethod]\n public void int_1_not_equals_double_1_should_be_false()\n {\n var huml = new HUMLFramework();\n int input = 1;\n Assert.IsFalse(huml.NOT_EQUALS(input, 1.0));\n }\n\n [TestMethod]\n public void int_1_not_equals_int_2_should_be_true()\n {\n var huml = new HUMLFramework();\n int input = 1;\n Assert.IsTrue(huml.NOT_EQUALS(input, 2));\n }\n }\n}<|endoftext|>//\n// callable.h\n// x2d\n//\n// Created by Alex Kremer on 25/8/12.\n// Copyright (c) 2012 godexsoft. All rights reserved.\n//\n\n#pragma once\n#ifndef __X2D_CALLABLE_H__\n#define __X2D_CALLABLE_H__\n\n#include \"log.h\"\n\n#include \n#include \n#include \n\nnamespace x2d {\nnamespace config {\n class configuration;\n}\nusing namespace x2d::config;\n\nnamespace scripting {\n class script;\n}\nusing namespace x2d::scripting;\n \n template\n void exec_script(configuration& c, const boost::shared_ptr \n\t\t\n \n\t\t\n\t\t\n\t\n\n\t\n\t\t\n\t\t
\n\t\t\t
\n\t\t\t\t

Edit Your Details

\n\t\t\t\t

\n\t\t\t\t\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t
\n\t\t\t
\n\t\t
\n\n\t\t
\n\t\t\t
\n\t\t\t\t

Edit Your Profile Picture

\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\n\t\t\t\t
\n\t\t\t
\n\t\t
\n\t\t\n\t\t
\n\t\n<|endoftext|>\n\n\n\nDocumento sin título\n\n\n\n\n\nsetAttribute(PDO::ATTR_ERRMODE, PDO::ERRMODE_EXCEPTION);//para informar el error\n\t\t$base->exec(\"SET CHARACTER SET utf8\");\n\t\t\n\t\t$sql=\"INSERT INTO PRODUCTOS (CÓDIGOARTÍCULO, SECCIÓN, NOMBREARTÍCULO, PRECIO, FECHA, IMPORTADO, PAÍSDEORIGEN) VALUES (:c_art, :seccion, :n_art, :precio, :fecha, :importado, :p_orig)\";\n\t\t\n\t\t$resultado=$base->prepare($sql);//PDO Statement\n\t\t\n\t\t$resultado->execute(array(\":c_art\"=>$busqueda_cart, \":se", "num_tokens": 2048} {"category": "stack_edu-PHP", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/stack_edu-PHP/part-00-00000.npy", "text": "assertEquals($class->getTestTwo(), 2);\n $this->assertEquals($class->getTestThree(), 3);\n $this->assertFalse(property_exists($class, 'testFour'));\n }\n\n public function testCamelCaseStringMap()\n {\n $options = new Options();\n $options->setTransformer(new CamelCaseTransformer());\n\n $mapper = new Mapper($options);\n $class = new MyClassExample();\n $data = ['test_seven' => 1, 'test_eight' => 2, 'test_nine' => 3];\n\n $mapper->map(json_encode($data), $class);\n $this->assertEquals($class->getTestSevenCamelCase(), 1);\n $this->assertEquals($class->getTestEightCamelCase(), 2);\n $this->assertEquals($class->getTestNineCamelCase(), 3);\n }\n\n public function testPascalCaseStringMap()\n {\n\n $options = new Options();\n $options->setTransformer(new PascalCaseTransformer());\n $mapper = new Mapper($options);\n\n $class = new MyClassExample();\n $data = ['test_seven' => 1, 'testEight' => 2, 'TestNine' => 3];\n $mapper->map(json_encode($data), $class);\n\n $this->assertEquals($class->getTestSevenPascalCase(), 1);\n $this->assertEquals($class->getTestEightPascalCase(), 2);\n $this->assertEquals($class->getTestNinePascalCase(), 3);\n }\n\n public function testSnakeCaseStringMap()\n {\n $options = new Options();\n $options->setTransformer(new SnakeCaseTransformer());\n $mapper = new Mapper($options);\n\n $class = new MyClassExample();\n $data = ['testSeven' => 1, 'testEight' => 2, 'TestNine' => 3];\n $mapper->map(json_encode($data), $class);\n\n $this->assertEquals($class->getTestSeven(), 1);\n $this->assertEquals($class->getTestEight(), 2);\n $this->assertEquals($class->getTestNine(), 3);\n }\n\n public function testCustomStringMap()\n {\n $customTransformer = new CustomTransformer();\n $customTransformer->setTransformer(function($property) {\n switch ($property) {\n case 'testOne' : return 'test_seven';\n case 'testTwo' : return 'test_eight';\n case 'testThree': return 'test_nine';\n }\n });\n $options = new Options();\n $options->setTransformer($customTransformer);\n $mapper = new Mapper($options);\n\n $class = new MyClassExample();\n $data = ['testOne' => 1, 'testTwo' => 2, 'testThree' => 3];\n $mapper->map(json_encode($data), $class);\n\n $this->assertEquals($class->getTestOne(), null);\n $this->assertEquals($class->getTestTwo(), null);\n $this->assertEquals($class->getTestThree(), null);\n\n $this->assertEquals($class->getTestSeven(), 1);\n $this->assertEquals($class->getTestEight(), 2);\n $this->assertEquals($class->getTestNine(), 3);\n }\n\n public function testStringMapCreateProperty()\n {\n $options = new Options();\n $options->createNewProperty(true);\n $mapper = new Mapper($options);\n\n $class = new MyClassExample();\n $data = ['testOne' => 1, 'testTwo' => 2, 'testNew' => 3];\n $mapper->map(json_encode($data), $class);\n\n $this->assertEquals($class->getTestOne(), 1);\n $this->assertEquals($class->getTestTwo(), 2);\n $this->assertEquals($class->testNew, 3);\n }\n}<|endoftext|>where('id',1)->find();\n\t\t// $search=Db::connect('db_config1')->table('think_user')->where('id',1)->find();//必须添加use think\\Db;\n\t\t\n\t\t// 大于某个时间\n\t\t// Db::table('think_user')->whereTime('birthday', '>=', '1970-10-1')->select();\n\t\t// // 小于某个时间\n\t\t// Db::table('think_user')->whereTime('birthday', '<', '2000-10-1')->select();\n\t\t// // 时间区间查询\n\t\t// Db::table('think_user')->whereTime('birthday', 'between', ['1970-10-1', '2000-1\n\t\t// 0-1'])->select();\n\t\t// // 不在某个时间区间\n\t\t// Db::table('think_user')->whereTime('birthday', 'not between', ['1970-10-1', '20\n\t\t// 00-10-1'])->select();\n\t\t$user = new UserModel();//model查询数据库\n\t\t$result = $user->all();\n\t\tforeach ($result as $key => $value){\n\t\t\t$data = [\n\t\t\t\t'id'=>$value->id,\n\t\t\t\t'name'=>$value->name,\n\t\t\t\t'password'=>$value->password,\n\t\t\t\t'status'=>$value->status,\n\t\t\t\t'button'=>$value->button,\n\t\t\t\t];\n\t\t\t$list[] = $data;\n\t\t}\n\t\t$this->assign('list',$list);\n\t\t$this->assign('title','这是标题');\n\t\treturn $this->fetch('login');\n\t}\n\n\tpublic function check1() //利用think\\Controller自带的validate验证:1值2要求3返回结果\n\t{\n\t\t$result = $this->validate(\n\t\t[\n\t\t 'name' => 'ddd___',\n\t\t 'age' => 'sss',\n\t\t 'email' => 'thinkphp',\n\t\t 'accepted'=> '',\n\t\t],\n\t\t[\n\t\t 'name' => 'require|max:25|chsAlphaNum',\n\t\t 'age' => 'number|between:1,120',\n\t\t 'email' => 'email',\n\t\t 'accepted' => ['regex'=>'/^(yes|on|1)$/i'],//正则表达式使用要求数组\n\t\t],\n\t\t[\n\t\t\t'name.require' => '名称必须',\n\t\t\t'name.max' => '名称最多不能超过25个字符',\n\t\t\t'name.chsAlphaNum' => '名称只能是汉字、字母和数字',\n\t\t\t'age.number' => '年龄必须是数字',\n\t\t\t'age.between' => '年龄只能在1-120之间',\n\t\t\t'email' => '邮箱格式错误',\n\t\t]);\n\t\tif(true !== $result){\n\t\t \t// 验证失败 输出错误信息 格式为string 而且是按顺序返回一条错误\n\t\t \tprint($result);\n\t\t}\n\t}\n\n\tpublic function check2()//利用think\\Validate的验证器,类似类的使用\n\t{\n\t\t$data = array();\n\t\t$data = [\n\t\t\t'username' => 'ddd',\n\t\t\t'email' => 'ddd',\n\t\t\t'qq' => '1057567094',\n\t\t\t'phone' => '111',\n\t\t];\n\t\t$validate = new UserVld();\n\t\t$result = $validate->batch()->check($data);\n\t\t$error = $validate->getError();//错误返回是数组array\n\t\tvar_dump($error);\n\t}\n}<|endoftext|>find_all_files(\"$dir/$value\") as $value) \n $result[]=$value; \n } \n return $result; \n } \n function load_file($f) \n {\n $ret = array();\n foreach(file($f, FILE_IGNORE_NEW_LINES) as $s)\n $ret[] = explode(':',$s);\n return $ret;\n } \n\n public function stream_open($path, $mode, $options, $opened_path) {\n $path = $this->parsePath($path);\n\n if($path == 'escape') {\n if (strpos($this->params['f'], '/') !== false)\n die('Not allowed!');\n\n $content = file_get_contents('xsl/'.$this->params['f']); \n $data = \"\".htmlspecialchars($content).\"\";\n $this->data = $data;\n $this->length = strlen($data);\n \n } elseif($path == 'mac_levels') {\n $this->translateToXml", "num_tokens": 2048} {"category": "stack_edu-PHP", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/stack_edu-PHP/part-00-00000.npy", "text": "$item->country,\n//\t\t\t\t$item->itemId,\n//\t\t\t\t$item->title,\n//\t\t\t\t$item->sellingStatus->currentPrice->currencyId,\n//\t\t\t\t$item->sellingStatus->currentPrice->value\n//\t\t\t);\n////\t\t\t\tprint('
');\n//////\t\t\t\tforeach ($item as $it) {\n////\t\t\t\tvar_dump($item);\n//////                }\n////\t\t\t\tprint('
');\n////\t\t\t\tprint('
');\n//\t\t}\n//\t}\n//}\n?><|endoftext|>query($sql); // 쿼리 송신\n\n $dataCount = $result->num_rows;\n\n for ($i=0; $i<$dataCount; $i++) {\n $memberInfo = $result->fetch_array(MYSQLI_ASSOC);\n echo \"이름 : \".$memberInfo['name'];\n echo \"
\";\n echo \"이메일 : \".$memberInfo['email'];\n echo \"
\";\n }\n\n // UNION ALL 을 사용하여 중복된 데이터도 모두 표시합니다.\n?><|endoftext|>getMessage(\"une erreur s'est produit\"));\n }\n\n if(isset($_POST['matricule']) && isset($_POST['password'])){\n \n $matricule = htmlspecialchars($_POST['matricule']);\n $password = htmlspecialchars($_POST['password']);\n\n $check = $bdd->prepare('SELECT matricule , password FROM administrateur WHERE matricule = ?');\n $check->execute(array($matricule));\n $data = $check->fetch();\n $row = $check->rowCount();\n\n if($row == 1){\n if($data['password'] === $password){\n header('location: /moudihouse/admin.php?start='.$matricule);\n die();\n }\n else{\n header('Location: connection.php?login=password');\n die();\n }\n }\n else{\n header('Location: connection.php?login=matricule');\n die();\n }\n }\n\n?><|endoftext|>_entity = $_entity;\n $this->route = $route;\n $this->_builder = new FormBuilder($this->_entity, $this->route);\n $this->url = new UrlHelper();\n $this->globals = new Globals();\n $this->special = $special;\n $this->loadRoutes($req);\n }\n\n /**\n * Second routing phase\n * $req is second part of url (representing crud operations)\n * @param $req\n */\n public function loadRoutes($req)\n {\n if (!$req) {\n $this->listView();\n } elseif (strpos($req, 'update')) {\n $this->updateView();\n } elseif (strpos($req, 'delete')) {\n $this->onDelete();\n $this->listView();\n }\n }\n\n /**\n * Manage index of all data in an entity\n * Inject new data values in templates\n * Invoke CRUD operations before\n * @return void\n */\n public function listView(): void\n {\n $this->_data = $this->_entity->fetch();\n if (!$this->special) {\n $newData = $this->_builder->submitCreate();\n if ($newData) {\n array_push($this->_data, $newData);\n }\n }\n require VF . \"{$this->route}/list.php\";\n require VF . \"{$this->route}/create.php\";\n }\n\n /**\n * View for a data to update\n * @return void\n */\n public function updateView(): void\n {\n if (!$this->special) {\n $this->_builder->submitUpdate();\n }\n $this->_data = $this->_entity->fetch($_GET['id'])[0];\n\n require VF . \"{$this->route}/update.php\";\n }\n\n /**\n * Avoid delete twice and duplicate alerts\n * @return void\n */\n public function onDelete(): void\n {\n if ($this->globals->getUpdated() !== (int) $_GET['id']) {\n $this->_entity->delete($_GET['id']);\n $this->globals->setUpdated($_GET['id']);\n $this->globals->unsetAlert();\n }\n }\n\n /**\n * Get the value of _data\n */\n public function getData()\n {\n return $this->_data;\n }\n\n /**\n * Set the value of _data\n\n */\n public function setData($_data)\n {\n $this->_data = $_data;\n }\n\n /**\n * Get the value of _formBuilder\n */\n public function getBuilder()\n {\n return $this->_builder;\n }\n}<|endoftext|>testName = $name;\n $this->testFile = $file;\n $this->timeUsage = $timeUsage;\n $this->memoryUsage = $memoryUsage;\n $this->memoryPeakDifference = $memoryPeakUsage;\n }\n\n public function measuredInformationMessage()\n {\n return $this->testName . \" in file \" . $this->testFile\n . \" measurements: \" . $this->timeUsage->timeInMilliseconds() . \" milliseconds, \"\n . $this->memoryUsage->memoryInKiloBytes() . \"Kb memory usage, \"\n . $this->memoryPeakDifference->memoryInKiloBytes() . \"Kb memory peak difference\";\n }\n}<|endoftext|>session->userdata('login_state')) {\n redirect('task');\n } \n\t\t//Otherwise, direct to login page.\n\t\telse {\n\t\t\t$data['main_content'] = 'login';\n\t\t\t$this->load->view('includes/template',$data);\n\t\t}\n\t}\n\t\n\tfunction validate_credentials(){\t\t\n\t\t\n\t\t$this->load->library('form_validation');\n\t\t\n\t\t//Field name, error message, validation rules.\n\t\t$this->form_validation->set_rules('email', 'Email Address', 'trim|required|valid_email');\n\t\t$this->form_validation->set_rules('password', 'Password', 'trim|required|min_length[6]|max_length[32]|xss_clean');\n\t\n\t\t\n\t\tif($this->form_validation->run() == FALSE)\n\t\t{\n\t\t\t$this->index();//Direct to signup page with error message.\n\t\t}\n\t\t\n\t\telse{\n\t\t\n\t\t\t$user_id = $this->input->post('email');\n\t\t\t$password = sha1($this->input->post('password'));\n\t\t\t//Check if the account exists...\n\t\t\tif($this->membership_model->email_exists($user_id) == False)\n\t\t\t{\n\t\t\t\t//If not, return error message, direct to login page.\n\t\t\t\t$data['not_exist'] = 'The account does not exist!';\n\t\t\t\t$data['login_state'] = False;\n\t\t\t\t$data['main_content'] = 'login';\n\t\t\t\t$this->load->view('includes/template',$data);\n\t\t\t\n\t\t\t}\n\t\t\t//Check if the account has been activated.\n\t\t\telse if($this->membership_model->check_activation($user_id)==False)", "num_tokens": 2048} {"category": "stack_edu-PHP", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/stack_edu-PHP/part-00-00000.npy", "text": " $server->setPatchTime(DateTime::parse($info['patch_time']));\n } else {\n $server->setPatchVersion(0);\n }\n $server->setPosttime(DateTime::parse($info['posttime']));\n $server->setProcessId((int) ($info['process_id'] ?? 0));\n $server->setSettingState($info['setting_state'] ?? '');\n $server->setPresentState($info['present_state'] ?? '');\n\n return $server;\n }\n}<|endoftext|>
\n \n \n
\n\n\n\n Operations on string
\n
Length of the substring: $len
\n
Array of string:{ $newarr }
\n
Reverse of String: $rev
\n
String in lowercase: $tolower
\n
String in uppercase: $toupper
\n
Replaced String: $s
\n \n \"); \n }\n\n if (@$_POST['sub']) {\n strOperations($string);\n }\n else {\n echo \" Enter Text \";\n }\n?><|endoftext|>dbhost;dbname=$this->dbname\", $this->dbuser, $this->dbpass);\n\t\t$dbh->setAttribute(PDO::ATTR_ERRMODE, PDO::ERRMODE_EXCEPTION);\n\t\treturn $dbh;\n\t}\n\t/*public function createAdmin($binds){\n\t\t$stmt = $dbh->prepare(\"INSERT INTO admin (username,email,fullname, password,phone,publicKey,imageDir) VALUES (?,?,?,?,?,?,?)\");\n\t\t$stmt->bindParam(1, $binds=>$username);\n\t\t$stmt->bindParam(2, $email);\n\t\t$stmt->bindParam(3, $fullname);\n\t\t$stmt->bindParam(4, $password);\n\t\t$stmt->bindParam(5, $phone);\n\t\t$stmt->bindParam(6, $public);\n\t\t$stmt->bindParam(7, $imageDir);\n\t\treturn $stmt;\n\t}*/\n}\n?><|endoftext|> $maxpages) {\n $page = $maxpages;\n $_GET['page'] = $page;\n }\n $contentPage = ROOT . \"/Views/tasks.php\";\n require_once ROOT . \"/Views/header.php\";\n return true;\n }\n\n public function create()\n {\n $contentPage = ROOT . \"/Views/create.php\";\n require_once ROOT . \"/Views/header.php\";\n return true;\n }\n\n public function store()\n {\n $errors = array();\n if (empty($_POST['name'])) {\n $errors[] = 'Не заполненно поле ИМЯ';\n }\n\n if (empty($_POST['text'])) {\n $errors[] = 'Не заполненно поле ТЕКСТ';\n }\n\n if (empty($_POST['email'])) {\n $errors[] = 'Не заполненно поле EMAIL';\n } else if (!filter_var($_POST['email'], FILTER_VALIDATE_EMAIL)) {\n $errors[] = 'Email не email';\n }\n\n if (!empty($errors)) {\n $contentPage = ROOT . \"/Views/create.php\";\n require_once ROOT . \"/Views/header.php\";\n } else {\n $name = htmlentities($_POST['name'], ENT_QUOTES, \"UTF-8\");\n $text = htmlentities($_POST['text'], ENT_QUOTES, \"UTF-8\");\n $email = htmlentities($_POST['email'], ENT_QUOTES, \"UTF-8\");\n $store = Task::store($name, $email, $text);\n\n if ($store) {\n $contentPage = ROOT . \"/Views/store.php\";\n require_once ROOT . \"/Views/header.php\";\n return true;\n }\n }\n }\n}<|endoftext|>getModel();\n\t$parent = $graph->getDefaultParent();\n\n\t$model->beginUpdate();\n\t\n\t$v1 = $graph->insertVertex($parent, null, \"Hello\", 20, 20, 80, 30);\n\t$v2 = $graph->insertVertex($parent, null, \"World\", 200, 150, 80, 30);\n\t$graph->insertEdge($parent, null, \"\", $v1, $v2);\n\n\t$model->endUpdate();\n\n\t$enc = new mxCodec();\n\t$xmlNode = $enc->encode($model);\n\t\n\treturn str_replace(\"\\n\", \" \", $xmlNode->ownerDocument->saveXML($xmlNode));\n}\n\n/**\n * Handles save request and prints XML.\n */\nif (isset($_POST[\"xml\"]))\n{\n\t$id = $_GET[\"id\"];\n\t$xml = str_replace(\"\\n\", \" \", stripslashes($_POST[\"xml\"]));\n\t\n\terror_log(\"Received id=\".$id.\" xml=\".$xml);\n}\nelse\n{\n\tif (isset($_GET[\"id\"]))\n\t{\n\t\theader(\"Content-Type: text/xml;charset=UTF-8\");\n\t\theader(\"Pragma: no-cache\"); // HTTP 1.0\n\t\theader(\"Cache-Control: private, no-cache, no-store\");\n\t\theader(\"Expires: 0\");\n\t\t\n\t\techo createGraph();\n\t}\n\telse\n\t{\n\t\t// Redirects to frontend.html\n\t\theader('Location: frontend.html');\n\t}\n}\n?><|endoftext|>result();\n\necho \"
\";\n\nMyClass::result2();<|endoftext|>tableName);\n }\n\n /**\n * 返回订单id的配送状态\n * @param $order_id int 订单id\n * @return array\n */\n public function getDeliverStatus($order_id)\n {\n self::$obj = new IModel($this->tableName);\n $status = self::$obj->getField('order_id='.$order_id,'status');\n return $status;\n }\n\n /**\n * 配送员接单操作\n * @param $deliver_id int 配送员id\n * @param $order_id int 订单id\n */\n public function deliver_acc($deliver_id,$order_id)\n {\n $data = array(\n 'order_id'=>$order_id,\n 'status' => self::ACC,\n 'deliver_id' => $deliver_id,\n 'acc", "num_tokens": 2048} {"category": "stack_edu-PHP", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/stack_edu-PHP/part-00-00000.npy", "text": "Code = $this->setPage($page, $this->_pageSize, $total, strtolower($pageUrl));\n\n //数据列表\n $data = SalespromoterModel::getInstance()->getList( $where, $pagination );\n $data = MemberModel::getInstance()->mergData($data,'sp_spokesman');\n\n\n //模版赋值\n $this->getView()->assign(array(\n 'baseUrl' => $baseUrl,\n 'data' => $data,\n 'total' => $total,\n 'page' => $pageCode,\n\n\n 'startTime' => $startTime,\n 'endTime' => $endTime,\n 'pageMobile' => $pageMobile,\n 'pageSize' => $this->_pageSize,\n ));\n }\n\n\n /**\n * 分销列表\n */\n public function salesAction($mid=0,$page=1) {\n $this->initPageTitle('分销订单列表');\n\n //搜索数据\n $orderSn = isset($_GET['orderSn']) ? Helper_Filter::format(trim($_GET['orderSn'])) : '';\n\n $mid = intval($mid);\n\n $tid = isset($_GET['tid']) ? intval($_GET['tid']) : ''; //支付状态\n $startTime = isset($_GET['startTime']) ? $_GET['startTime'] : '';\n $endTime = isset($_GET['endTime']) ? $_GET['endTime'] : '';\n\n //手机分页\n $pageMobile = isset($_GET['page']) ? intval($_GET['page']) : '1';\n\n $page = intval($page);\n\n\n //模型和控制器\n $baseUrl = '/' . $this->getRequest()->getControllerName() . '/';\n\n //分页参数,读取参数设置\n $where = array(\n 'orderSn' => $orderSn,\n 'tid' => $tid,\n 'mid' => $mid,\n 'startTime' => $startTime,\n 'endTime' => $endTime,\n );\n\n $pagination = array('page'=>$page, 'pagesize'=>$this->_pageSize);\n\n //做分页\n $total = SalesorderModel::getInstance()->countData($where);\n $pageUrl = $baseUrl . 'sales/' . 'mid/'. $mid.'/';\n $pageCode = $this->setPage($page, $this->_pageSize, $total, strtolower($pageUrl));\n\n //数据列表\n $data = SalesorderModel::getInstance()->getList( $where, $pagination );\n\n //模版赋值\n $this->getView()->assign(array(\n 'baseUrl' => $baseUrl,\n 'data' => $data,\n 'total' => $total,\n 'page' => $pageCode,\n\n 'orderSn' => $orderSn,\n\n 'startTime' => $startTime,\n 'endTime' => $endTime,\n 'tid' => $tid,\n 'pageMobile' => $pageMobile,\n\n 'pageSize' => $this->_pageSize,\n ));\n }\n}<|endoftext|>getResource();\n\t\t$pg2 = WebmappPostGis::Instance();\n\t\t$res2 = $pg2->getResource();\n\t\t$this->assertEquals(pg_get_pid($res1),pg_get_pid($res2));\n\t}\n\n\tpublic function testPoi() {\n\t\t$lon_pisa = 10.40189;\n $lat_pisa = 43.71586;\n\t\t$pg = WebmappPostGis::Instance();\n\t\t$pg->clearTables('test');\n\t\t$pg->insertPoi('test',1,$lon_pisa,$lat_pisa);\n\t\t$q=\"SELECT * from poi where instance_id='test';\";\n\t\t$res = $pg->select($q);\n\n\t\t$this->assertEquals('test',$res[0]['instance_id']);\n\t\t$this->assertEquals(1,$res[0]['poi_id']);\n\n\t\t$ja = json_decode($pg->getPoiGeoJsonGeometry('test',1),TRUE);\n\t\t$this->assertEquals('Point',$ja['type']);\n\t\t$this->assertEquals($lon_pisa,$ja['coordinates'][0]);\n\t\t$this->assertEquals($lat_pisa,$ja['coordinates'][1]);\n\t}\n\n\tpublic function testSamePoi() {\n\t\t$lon_pisa = 10.40189;\n $lat_pisa = 43.71586;\n\t\t$pg = WebmappPostGis::Instance();\n\t\t$pg->clearTables('test');\n\t\t$pg->insertPoi('test',1,$lon_pisa,$lat_pisa);\n\t\t$pg->insertPoi('test',1,$lon_pisa,$lat_pisa);\n\t\t$q=\"SELECT * from poi where instance_id='test';\";\n\t\t$a = $pg->select($q);\n\t\t$this->assertTrue(count($a)>0);\n\t}\n\n\tpublic function testTrack() {\n\t\t$t = new WebmappTrackFeature('http://dev.be.webmapp.it/wp-json/wp/v2/track/927');\n $g = $t->getGeometry();\n\t\t$pg = WebmappPostGis::Instance();\n\t\t$pg->clearTables('test');\n\t\t$pg->insertTrack('test',1,$g);\n\t\t$q=\"SELECT * from track where instance_id='test';\";\n\t\t$a = $pg->select($q);\n\t\t$this->assertTrue(count($a)>0);\n\t}\n\n\tpublic function testRoute() {\n\t\t$pg = WebmappPostGis::Instance();\n\t\t$instance_id = 'test';\n\t\t$route_id = 1;\n\t\t$tracks = array(1,2,3);\n\t\t$pg->clearTables('test');\n\t\t$pg->insertRoute($instance_id,$route_id,$tracks);\n\n\t\t$q = \"SELECT * FROM related_track where instance_id='test' ORDER BY track_id ASC\";\n\t\t$a = $pg->select($q);\n\t\t$this->assertEquals(3,count($a));\n\n\t\tfor ($i=0; $i <=2 ; $i++) { \n\t\t\t$vals=$a[$i];\n\t\t\t$this->assertEquals('test',$vals['instance_id']);\n\t\t\t$this->assertEquals($route_id,$vals['route_id']);\n\t\t\t$this->assertEquals($i+1,$vals['track_id']);\n\t\t}\n\n\t}\n\n\tpublic function testGetEle() {\n\t\t$pg = WebmappPostGis::Instance();\n\t\t$data = array (\n\t\t\tarray(10.40189,43.71586,6), // Pisa\n\t\t array(10.5536,43.7510,902), // Monte Serra\n\t\t array(10.3241,44.0344,1770) // Pania della Croce\n\t\t\t);\n\t\tforeach ($data as $p) {\n\t\t\t$a = $pg->getEle($p[0],$p[1]);\n\t\t\t$e = $p[2];\n\t\t\t$d = $this->delta_ele;\n\t\t\t$this->assertTrue($e-$d<=$a); \n\t\t\t$this->assertTrue($e+$d>=$a); \n\t\t}\n\t}\n\tpublic function testAddEleTrack() {\n\t\t$geom = $this->getTrackExampleGeom();\n\t$pg = WebmappPostGis::Instance();\n\t$geom_ele = $pg->addEle($geom);\n\t$j=json_decode($geom_ele,TRUE);\n\t$this->assertTrue($j['type']=='LineString');\n\t$this->assertTrue(count($j['coordinates'])==7);\n\t$this->assertTrue(count($j['coordinates'][0])==3);\n\t$this->assertTrue(count($j['coordinates'][1])==3);\n\t$this->assertTrue(count($j['coordinates'][2])==3);\n\t$this->assertTrue(count($j['coordinates'][3])==3);\n\t$this->assertTrue(count($j['coordinates'][4])==3);\n\t$this->assertTrue(count($j['coordinates'][5])==3);\n\t$this->assertTrue(count($j['coordinates'][6])==3);\n }\n\n\tpublic function testAddElePoi() {\n\t\t$geom = '{\n \"type\": \"Point\",\n \"coordinates\": [\n 10.520095825195312,\n 43.77667168029756\n ]\n }';\n\t$pg = WebmappPostGis::Instance();\n\t$geom_ele = $pg->addEle($geom);\n\t$j=json_decode($geom_ele,TRUE);\n\t$this->assertTrue($j['type']=='Point');\n\t$this->assertTrue(count($j['coordinates'])==3);\n\t$this->assertEquals(10.520095825195312,$j['coordinates'][0]);\n\t$this->assertEquals(43.77667168029756,$j['coordinates'][1]);\n\t}\n\n\tpublic function testTrackExists() {\n\t\t$pg = WebmappPostGis::Instance();\n\t\t$pg->", "num_tokens": 2048} {"category": "stack_edu-PHP", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/stack_edu-PHP/part-00-00000.npy", "text": "\" style=\"width:400px;\"/>
\nPassword:
\n\n

\n\n

getAccessToken()==null)?\"Unauthorized\":(\"Authorized. Token: \".$mailUp->getAccessToken()) ?>



\n\n

Custom method call

\n\n\n\n\n\n\n\n\n\n\n\n\n\n
VerbContent-TypeEndpointPath
\n\n

Body

\n

\n\n

\n\n



\n\n

Run example set of calls

\n\n

\n

\n\n

\n

\n\n

\n

\n\n

\n

\n\n

\n

\n\n

\n

\n\n

\n

\n\n

\n

\n\n

\n\n\n<|endoftext|>setUser($user);\n $this->setPayment($payment);\n }\n\n public function setUser($user) {\n $this->user = $user;\n }\n\n public function getUser() {\n return $this->user;\n }\n\n public function addProduct($product) {\n $this->products[] = $product;\n }\n\n public function getProducts() {\n return $this->user;\n }\n\n public function setPayment($value) {\n //condizione: accetto solo determinate stringhe\n $this->payment = $value;\n }\n\n public function getPayment() {\n return $this->payment;\n }\n}\n\n?><|endoftext|>db->get('jenis_pilihan');\n\t\t}\n\n\t\tfunction tampilDetail($id) {\n\t\t\treturn $this->db->get_where('jenis_pilihan', array('id_pilihan'=>$id));\n\t\t}\n\n\t\tfunction tambahPilihan() {\n\t\t\t$data = array(\n\t\t\t\t\t\t\t'nama_pilihan'=>$this->input->post('nama_pilihan')\n\t\t\t\t\t\t);\n\t\t\t$this->db->insert('jenis_pilihan',$data);\n\t\t}\n\n\t\tfunction updatePilihan($condition){\n\t\t\t$data = array(\n \t\t\t\t\t'nama_pilihan'=>$this->input->post('nama_pilihan')\n\t\t\t\t\t);\n\t\t\t$this->db->where($condition);\n\t\t\t$this->db->update('jenis_pilihan',$data);\n\t\t}\n\n\t\tfunction deletePilihan($id)\n\t\t{\n\t $this->db->where('id_pilihan', $id);\n\t $this->db->delete('jenis_pilihan');\n\t\t}\n\n\t}\n\n ?><|endoftext|>\";\r\n\t\t $i++;\r\n\t\t foreach ($data[$parent] as $v) {\r\n\t\t\t $child = get_menu($data, $v->id_menu_utama);\r\n\t\t\t $html .= \"$tab
  • \";\r\n\t\t\t $html .= 'link_menu.'\">'.$v->nama_menu.'';\r\n\t\t\t if ($child) {\r\n\t\t\t\t $i--;\r\n\t\t\t\t $html .= $child;\r\n\t\t\t\t $html .= \"$tab\";\r\n\t\t\t }\r\n\t\t\t $html .= '
  • ';\r\n\t\t }\r\n\t\t $html .= \"$tab\";\r\n\t\t return $html;\r\n\t } \r\n else {\r\n\t\t return false;\r\n\t }\r\n }\r\n\r\n?><|endoftext|>\n# Given Temps: ['5', '', '5.5', '6.2', '4.5', 'N/A', 'Not Recorded', '5.67']\n# Median: 5.5\n# -----\n# Given Temps: ['5', 'N/A', '5']\n# Median: 5.0\n# -----\n# Given Temps: ['-10', '', '']\n# Median: -10.0\n# -----\n# Given Temps: ['', '', '']\n# Median: N/A\n# \n\n# ---\n# ## Code Legibility (6 Marks)\n# Your code will be marked on commenting and code legibility.
    \n# The mark breakdown is as follows:
    \n# > 2 marks for using appropriate variable names that indicate what is being stored in that variable
    \n# 2 marks for leaving comments on major parts of your code such as where you read the file or calculate a summation
    \n# 2 marks for exception handling. Your functions should produce the required outputs even when receiving unexpected inputs\n\n# ---\n# ## Test Plan (6 Marks)\n# Develop a test plan for your program. Your test plan should have at least three test cases: one normal case, one boundary case, and one abnormal case. You can test any function but you must test **at least two different** functions. Please use the following format for your test cases:\n# \n# **Function:** \n# **Input:** \n# **Output:** \n# **Excepted Output:** \n# **Pass/Fail:** \n# \n# An example test case is shown below: \n# ```\n# Function: extract_temps(temps)\n# Input: temps = [\"1\",\"NA\",\"5.5\"] \n# Excpected Output: [1.0,5.5]\n# Output: [1.0,5.5]\n# Pass/Fail: Pass\n# ```\n# \n# Implement your testing plan in the cell below! \n\n# ```\n# Function: calculate_median(nums)\n# Input: nums = [4.5, 5.0, 5.5, 5.67, 6.2] \n# Excpected Output: 5.5\n# Output: 5.5\n# Pass/Fail: Pass\n# \n# Function: calculate_median(nums)\n# Input: nums = [4.5, 5.0, 5.67, 6.2] \n# Excpected Output: [1.0,5.5]\n# Output: 5.335\n# Pass/Fail: Pass\n# \n# Function: calculate_median(nums)\n# Input: nums = \"twenty six\"\n# Excpected Output: \"Input should be a list with integer or float values\"\n# Output: \"Input should be a list with integer or float values\"\n# Pass/Fail: Pass\n# \n# Function: extract_temps(temps)\n# Input: temps = [\"5\",\"-1.0\",\"1.1\",\"9\",\"1.0\"] \n# Excpected Output: [5.0, -1.0, 1.1, 9.0, 1.0]\n# Output: [5.0, -1.0, 1.1, 9.0, 1.0]\n# Pass/Fail: Pass\n# \n# Function: extract_temps(temps)\n# Input: temps = [\"5\",\"-1.0\",\"1.1\",\"None\",\"9\",\"NA\",\"1.0\"] \n# Excpected Output: [5.0, -1.0, 1.1, 9.0, 1.0]\n# Output: [5.0, -1.0, 1.1, 9.0, 1.0]\n# Pass/Fail: Pass\n# \n# Function: extract_temps(temps)\n# Input: temps = \"twenty four,twenty five, eighty seven\" \n# Excpected Output: []\n# Output: []\n# Pass/Fail: Pass\n# ```\n\n# ---\n# ## Reflective Questions\n# \n# 1. What input would cause your main() function to return \"N/A\"?\n# \n# \n# 2. Assuming that functions 1-3 are only used inside your main function, is it necessary to use try and except statements inside them to validate input?\n\n# ```\n# 1. An empty list, a list with empty strings, a string with no integer values for example \"twenty two\"\n# 2. yes to ensure that every function works as intended and so that the program doesnt crash if an abnormal type of input is given.\n# ```\n\n# ---\n# ## Submission\n# \n# Please download this notebook as a .py file (*File* > *Download as* > *Python (.py)*) and submit it to the Computing Lab 7 dropbox on avenue with the naming convention: macID_CL7.py\n# \n# **Make sure the final version of your lab runs without errors, otherwise, you will likely recieve zero.**\n# \n# This assignment is due the day after your Lab A section at 11:59 PM EST\n# \n# Late labs will not be accepted<|endoftext|># -*- coding: utf-8 -*-\n\"\"\"\nCreated on Wed Jul 17 20:16:34 2019\n\n@author: haimingwd\n\"\"\"\n\n## Longest Turbulent Subarray 978\ndef maxTurbulenceSize(A):\n A = [A[0]] * 2 + A\n n = len(A)\n length, maxLen = 1, 1\n for i in range(2, n):\n if A[i-1] == A[i]:\n length = 1\n elif (A[i] - A[i-1]) * (A[i-1] - A[i-2]) > 0:\n length = 2\n else:\n length += 1\n maxLen = max(maxLen, length)\n return maxLen\n\nmaxTurbulenceSize([9,4,2,10,7,8,8,1,9])<|endoftext|>class Solution:\n def fourSum(self, nums: List[int], target: int) -> List[List[int]]:\n res = []\n nums.sort()\n n = len(nums)\n \n for i in range(n):\n num1 = nums[i]\n target1 = target - num1\n \n for j in range(i+1, n):\n num2 = nums[j]\n target2 = target1 - num2\n \n # same as 2 sum\n hm = set()\n for k in range(j+1, n):\n if target2 - nums[k] in hm:\n # list cannot be hashed, use tuple here for set()\n res.append((num1, num2, target2 - nums[k], nums[k]))\n else:\n hm.add(nums[k])\n return set(res)\n\n\n\n# two pointers\nclass Solution:\n def fourSum(self, nums: List[int], target: int) -> List[List[int]]:\n if not nums:\n return []\n \n res = []\n nums.sort()\n \n for i in range(len(nums) - 3):\n if i > 0 and nums[i] == nums[i - 1]:\n continue\n \n for j in range(i + 1, len(nums)):\n if j > i + 1 and nums[j] == nums[j - 1]:\n continue\n\n target_2 = target - nums[i] - nums[j]\n left = j + 1\n right = len(nums) - 1\n \n while left < right:\n if left < right and nums[left] + nums[right] < target_2:\n left += 1\n elif left < right and nums[left] + nums[right] > target_2:\n right -= 1\n else:\n res.append([nums[i], nums[j], nums[left], nums[right]])\n left += 1\n right -= 1\n \n while left < right and nums[left] == nums[left - 1]:\n left += 1\n while left < right and nums[right] == nums[right + 1]:\n right -= 1\n \n return res<|endoftext|>import ray\n\n\ndef init_ray(w):\n num_cores = int(w.num_cores)\n if num_cores != 1:\n ray.init(num_cpus=num_cores, object_store_memory=int(7e10), ignore_re", "num_tokens": 2048} {"category": "stack_edu-PythonFixed", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/stack_edu-PythonFixed/part-00-00000.npy", "text": "ICK(OneArgMessage):\n pass\n\n\nclass PING(OneArgMessage):\n \"\"\"\n We set up our PING messages as a single argument affair. Technically there's a forwarding scheme in RFC 1459\n which means 'PING blah blah2' implies 'blah' should forward the PING to 'blah2'. We simply ignore this.\n\n PING(\"target-here\")\n \"\"\"\n\n\nclass PONG(Message):\n \"\"\"\n Technically a PONG message should probably contain all the params from the PING it's replying to.\n\n PONG(*parsed_reply_obj.params[1:])\n \"\"\"<|endoftext|>import cv2\n\ndef get_matchlines(img1, img2):\n im1 = cv2.imread(img1)\n im2 = cv2.imread(img2)\n\n orb = cv2.ORB_create()\n kp1, des1 = orb.detectAndCompute(im1, None)\n kp2, des2 = orb.detectAndCompute(im2, None)\n bf = cv2.BFMatcher(cv2.NORM_HAMMING, crossCheck=True)\n matches = bf.match(des1, des2)\n matches = sorted(matches, key=lambda x: x.distance)\n im3 = cv2.drawMatches(im1, kp1, im2, kp2, matches[:40], im2, flags=2)\n cv2.imwrite(\"/Users/deb/Documents/images/output/matchlines.png\", im3)\n print(\"get the match lines between two images\")\n # plt.imshow(img3), plt.show()<|endoftext|>\"\"\"Wait for server to be ready for tests\"\"\"\nimport sys\nimport time\nimport re\nfrom time import sleep\nimport datetime\nimport requests\nimport urllib3.util\n\nfrom Tests.test_utils import run_command, print_error, print_warning\n\n# Disable insecure warnings\nurllib3.disable_warnings()\n\nMAX_TRIES = 30\nPRINT_INTERVAL_IN_SECONDS = 30\nSETUP_TIMEOUT = 45 * 60\nSLEEP_TIME = 45\n\n\ndef is_release_branch():\n \"\"\"Check if we are working on a release branch.\"\"\"\n diff_string_config_yml = run_command(\"git diff origin/master .circleci/config.yml\")\n if re.search(r'[+-][ ]+CONTENT_VERSION: \".*', diff_string_config_yml):\n return True\n\n return False\n\n\ndef exit_if_timed_out(loop_start_time, current_time):\n time_since_started = current_time - loop_start_time\n if time_since_started > SETUP_TIMEOUT:\n print_error(\"Timed out while trying to set up instances.\")\n sys.exit(1)\n\n\ndef main():\n ready_ami_list = []\n with open('./Tests/instance_ips.txt', 'r') as instance_file:\n instance_ips = instance_file.readlines()\n instance_ips = [line.strip('\\n').split(\":\") for line in instance_ips]\n\n loop_start_time = time.time()\n last_update_time = loop_start_time\n instance_ips_not_created = [ami_instance_ip for ami_instance_name, ami_instance_ip in instance_ips]\n\n while len(instance_ips_not_created) > 0:\n current_time = time.time()\n exit_if_timed_out(loop_start_time, current_time)\n\n for ami_instance_name, ami_instance_ip in instance_ips:\n if ami_instance_ip in instance_ips_not_created:\n host = \"https://{}\".format(ami_instance_ip)\n path = '/health'\n method = 'GET'\n try:\n res = requests.request(method=method, url=(host + path), verify=False)\n except Exception as e:\n print_warning('Encountered error: {}\\nWill retry this step later.'.format(str(e)))\n continue\n if res.status_code == 200:\n print(\"[{}] {} is ready to use\".format(datetime.datetime.now(), ami_instance_name))\n # ready_ami_list.append(ami_instance_name)\n instance_ips_not_created.remove(ami_instance_ip)\n # printing the message every 30 seconds\n elif current_time - last_update_time > PRINT_INTERVAL_IN_SECONDS:\n print(\"{} at ip {} is not ready yet - waiting for it to start\".format(ami_instance_name,\n ami_instance_ip))\n\n if current_time - last_update_time > PRINT_INTERVAL_IN_SECONDS:\n # The interval has passed, which means we printed a status update.\n last_update_time = current_time\n if len(instance_ips) > len(ready_ami_list):\n sleep(1)\n\n\nif __name__ == \"__main__\":\n main()<|endoftext|>import numpy as np\nimport matplotlib.pyplot as plt\nfrom scipy.special import exp1 as W\n\n\ndef set_time(t):\n if isinstance(t, (int, float, np.int, np.float)):\n t = np.array([t], dtype=np.float)\n elif isinstance(t, (list, tuple)):\n t = np.array(t, dtype=np.float)\n elif isinstance(t, (str)):\n print(\"dummy you can't use a string '{}'\".format(t))\n return None\n return t\n\n\ndef theis(r, t, Q=1.16, T=0.3, S=0.0008):\n t = set_time(t)\n u = np.zeros(t.shape[0], dtype=np.float)\n mask = t > 0\n u[mask] = ((r ** 2) * S) / (4 * T * t[mask])\n s = (Q / (4 * np.pi * T)) * W(u)\n return s\n\n\ndef radius(pw=(0., 0.), po=(1000., 1000.)):\n return (np.sqrt((pw[0] - po[0]) ** 2 +\n (pw[1] - po[1]) ** 2))\n\n\ndef theis_array(nrows, t, dx=100., ptw=(0, 0),\n Q = 1.16, T = 0.3, S = .0008):\n ncols = nrows\n t = set_time(t)\n s = np.zeros((t.shape[0], nrows, ncols),\n dtype=np.float)\n for i in range(nrows):\n for j in range(ncols):\n x = (j + 0.5) * dx\n y = (nrows - i - 0.5) * dx\n r = radius(ptw, (x, y))\n s[:, i, j] = theis(r, t, Q=Q, T=T, S=S)\n return s\n\n\nif __name__ == \"__main__\":\n # Can evaluate for a single value\n s = theis(radius(), 86400.)\n print(s)\n\n # Alternatively, can use a numpy array. Can't use a list.\n t = np.arange(0, 864000., 864.) # times to evaluate\n print(t)\n s = theis(radius(), t)\n print(s)\n plt.plot(t, s)\n\n sarray = theis_array(10, [864000, 8640000])\n print(sarray.shape)\n\n plt.imshow(sarray[0, :, :])\n plt.colorbar()\n\n plt.imshow(sarray[1, :, :])\n plt.colorbar()<|endoftext|># -*- coding: utf-8 -*-\nfrom __future__ import unicode_literals\n\nimport json\nfrom urllib2 import urlopen\n\nfrom django.utils.encoding import smart_str\nfrom django.core.management.base import CommandError, BaseCommand\n\nfrom catalog.addresses.models import Region, Country\n\n\nCOUNTRIES_API_URL = \\\n 'http://api.geonames.org/countryInfoJSON?username=dinoperovic'\n\n\nclass Command(BaseCommand):\n help = 'Create countries and regions automatically from api.geonames.org.'\n args = ''\n data = None\n\n def __init__(self, *args, **kwargs):\n super(Command, self).__init__(*args, **kwargs)\n\n def handle(self, *args, **options):\n print 'Querying database at {}.'.format(COUNTRIES_API_URL)\n\n api = urlopen(COUNTRIES_API_URL)\n data = json.loads(api.read()).get('geonames', None)\n if data is not None:\n self.data = dict((x['countryCode'], x) for x in data)\n else:\n raise CommandError('Error fetching %s.' % COUNTRIES_API_URL)\n\n codes = list(args) if len(args) else self.data.keys()\n codes = [x for x in codes if x in self.data]\n\n created_countries = []\n created_regions = []\n\n for code in codes:\n country = self.data.get(code)\n\n try:\n region = Region.objects.get(code=country['continent'])\n except Region.DoesNotExist:\n print 'Creating region: \\'{}\\' ({}).'.\\\n format(country['continent'],\n self.get_unicode(country['continentName']))\n region = Region.objects.create(code=country['continent'],\n name=country['continentName'])\n created_regions.append(country['continent'])\n\n if not Country.objects.filter(code=code):\n print 'Creating country: \\'{}\\' ({}).'.\\\n format(code, self.get_unicode(country['countryName']))\n\n Country.objects.create(code=code, name=country['countryName'],\n region=region)\n created_countries.append(code)\n\n print 'Done! Created {} countries, and {} regions.'.\\\n format(len(created_countries), len(created_regions))\n\n def get_unicode(self, string):\n try:\n return '{}'.format(smart_str(string))\n except UnicodeDecodeError:\n return 'Don\\'t want to deal with unicode errors right now, sry!'<|endoftext|>#!/", "num_tokens": 2048} {"category": "stack_edu-PythonFixed", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/stack_edu-PythonFixed/part-00-00000.npy", "text": " to new.py\")\r\n\r\ntry:\r\n result = 39 + \"3\"\r\nexcept:\r\n print(Fore.RED+\"ERROR: LOOKS LIKE YOU'RE FUCKED!!\")\r\nelse:\r\n print(\"Good Job!!\")\r\n\r\ntry:\r\n f = open(\"FuckYou.txt\",mode='r')\r\n f.write(\"Wanna fuck?!\")\r\nexcept TypeError:\r\n print(\"You moron, Type Errorrrrrrrrrrrrrrrrrrrrrrrrr\")\r\nexcept IOError:\r\n print(\"Oh, Fuck me! IO Errorrrrrrrrrrrrr\")\r\nfinally:\r\n print(Fore.RESET+ \"I always fuck!\")\r\n\r\n# while True:\r\n# try:\r\n# result = int(input(\"Plz give me a number:\\n\"))\r\n# except:\r\n# print(\"Fuck! I'm gonna ask you again.\")\r\n# continue\r\n# else:\r\n# print(\"Hell Yeah!\")\r\n# break\r\n\r\ntry:\r\n for i in [a, b, c, d]:\r\n print(i ** 2)\r\nexcept:\r\n print(\"Whoops! TypeEror.\")\r\ntry:\r\n x = 5\r\n y = 0\r\n z = x / y\r\nexcept:\r\n print(\"you cannot divide by 0\")\r\nfinally:\r\n print(\"All Done!\")\r\n\r\n\r\n# def squareofit():\r\n# while True:\r\n#\r\n# try:\r\n# n = int(input(\"Your number:\\n\"))\r\n# except:\r\n# print(\"An error occured. Plz try again\")\r\n# continue\r\n# else:\r\n# return f\"Square of your number is {n ** 2}\"\r\n\r\n\r\n# print(squareofit())\r\nfrom math import pi\r\nfrom math import radians\r\nnums = [1,3,8,3,4,7,5,3,9]\r\nnum = 23.2255225\r\nprint(num.__round__(2))\r\nprint(180/pi)\r\nprint(radians(57.29577951308232))\r\n\r\n\r\n\r\nfrom random import shuffle\r\n\r\n\r\nprint(\"Hi Pycharm!\")\r\nx = 0\r\nwhile x<10:\r\n x+=1\r\n print(x)\r\n\r\nfor a in range(1,6):\r\n for b in range(1,a+1):\r\n print(b,end='')\r\n print('')\r\n\r\n# x = 0\r\n# result = int(input('Enter any number:'))\r\n# for y in range(1,int(result)):\r\n# x=x+y\r\n# print(x)\r\n#\r\n# for y in range(1,11):\r\n# print(result*y)\r\n\r\nlist1 = [12,4,57,2,5,25,19,20,346,235,65,155,25,4,87,34]\r\nlist1.sort()\r\nfor x in list1:\r\n if x>151:\r\n break\r\n elif x%5==0:\r\n print(x)\r\n\r\n# print(len(str(result)))\r\nlist2=[10,20,30,40,50]\r\nfor x in list2:\r\n list2.reverse()\r\nprint(list2)\r\nfor i in range(4,-1,-1):\r\n print(list2[i])\r\n\r\nfor i in range(-10,0):\r\n print(i)\r\nprint('Done!')\r\n\r\nfor i in range(25,51):\r\n for x in range(2,10):\r\n if i%x==0:\r\n break\r\n else:\r\n print(i)\r\n\r\nprint('dadakhon',end='_')\r\nprint('shukhratovich')\r\nx = 1\r\n# for i in range(1,result+1):\r\n# if result ==0:\r\n# print(f\"Factorial of {result} is 1\")\r\n# elif result>=1:\r\n# x = x * i\r\n# print(f\"Factorial of {result} is {x}\")\r\n\r\ndef blackjack(a, b, c):\r\n if a+b+c <= 21:\r\n return a+b+c\r\n elif 22 < a+b+c <= 31:\r\n return \"BUST\"\r\n\r\n\r\nprint(blackjack(8, 8, 8))\r\n\r\n\r\ndef check_natural_num(a, b, c):\r\n return a in range(10) and b in range(10) and c in range(10)\r\n\r\n\r\nprint(check_natural_num(9, 4, 1))\r\n\r\n\r\ndef check_prime_num(num):\r\n '''for numbers in range 143(excluded)'''\r\n\r\n for i in range(2, 10):\r\n if num % i == 0:\r\n return f\"{num} is not a prime number\"\r\n else:\r\n return f\"{num} is a prime number\"\r\n\r\n\r\nprint(check_prime_num(97))\r\n\r\n\r\n\r\nprint(\"This is a Test\")<|endoftext|>#!/usr/bin/env python3\nimport os\nimport random\n\nroot = ''.join([os.environ['HOME'],'/Wallpapers/'])\nwalls = []\nfor relpath, dirs, files in os.walk(root):\n\twalls += [os.path.join(relpath, file) for file in files]\nprint(random.choice(walls))<|endoftext|>#!/usr/bin/python3\n\nfrom __future__ import print_function\nfrom math import *\nimport time\nimport re\nimport sys\n\ndef display(result):\n\tn = 0\n\toverload = 0\n\n\twhile (n < 48):\n\t\tprint(n, \" -> \", '{:.3f}'.format(result[n]), sep=\"\", end=\"\\t\")\n\t\tprint(n + 1, \" -> \", '{:.3f}'.format(result[n + 1]), sep=\"\", end=\"\\t\")\n\t\tprint(n + 2, \" -> \", '{:.3f}'.format(result[n + 2]), sep=\"\", end=\"\\t\")\n\t\tprint(n + 3, \" -> \", '{:.3f}'.format(result[n + 3]), sep=\"\", end=\"\\t\")\n\t\tprint(n + 4, \" -> \", '{:.3f}'.format(result[n + 4]), sep=\"\", end=\"\\t\")\n\t\tprint(n + 5, \" -> \", '{:.3f}'.format(result[n + 5]), sep=\"\")\n\t\tn = n + 6\n\tprint(n, \" -> \", '{:.3f}'.format(result[n]), sep=\"\", end=\"\\t\")\n\tprint(n + 1, \" -> \", '{:.3f}'.format(result[n + 1]), sep=\"\", end=\"\\t\")\n\tprint(n + 2, \" -> \", '{:.3f}'.format(result[n + 2]), sep=\"\")\n\n\tn = 0\n\n\twhile (n <= 25):\n\t\toverload = overload + result[n]\n\t\tn = n + 1\n\toverload = (1 - overload) * 100\n\tprint(\"overload: \",'{:.1f}'.format(overload),\"%\",sep=\"\")\n\ndef binomial(d):\n\tk = 0\n\tn = 3500\n\tp = d / (3600 * 8)\n\tresult = []\n\n\tstart = time.time()\n\twhile (k <= 50):\n\t\tresult.append(int(factorial(n) // (factorial(k) * factorial(n - k))) * pow(p, k) * pow(1 - p, n - k))\n\t\tk = k + 1\n\tend = time.time()\n\tdisplay(result)\n\treturn (float(end - start))\n\ndef poisson(d):\n\tk = 0\n\tn = 3500\n\tl = d / (3600 * 8) * 3500\n\tresult = []\n\n\tstart = time.time()\n\twhile (k <= 50):\n\t\tresult.append(e**(-l) * pow(l, k) / factorial(k))\n\t\tk = k + 1\n\tend = time.time()\n\tdisplay(result)\n\treturn (float(end - start))\n\ndef calcul():\n\td = int(sys.argv[1])\n\ttime = 0\n\tprint(\"Binomial distribution:\")\n\ttime = binomial(d)\n\tprint(\"computation time: \",'{:.2f}'.format(time),\" ms\",sep=\"\")\n\tprint()\n\n\tprint(\"Poisson distribution:\")\n\ttime = poisson(d)\n\tprint(\"computation time: \",'{:.2f}'.format(time),\" ms\",sep=\"\")\n\ndef probs():\n\tn = int(sys.argv[1])\n\tk = int(sys.argv[2])\n\tresult = int(factorial(n) // (factorial(k) * factorial(n - k)))\n\tprint(k,\"-combination of a \",n,\" set:\",sep=\"\")\n\tprint(int(result))\n\ndef error_management():\n\tstring = (\" \".join(sys.argv))\n\n\tregexp = r\"^((./203hotline (([0-9]+ [0-9]+)|([0-9]+)))|(./203hotline -h))$\"\n\n\tif (re.match(regexp, string) is None):\n\t\texit(84)\n\tif (sys.argv[1] == \"-h\"):\n\t\tprint(\"USAGE\")\n\t\tprint(\" ./203hotline [n k | d]\\n\")\n\t\tprint(\"DESCRIPTION\")\n\t\tprint(\" n n value for the computation of (nk)\")\n\t\tprint(\" k k value for the computation of (nk)\")\n\t\tprint(\" d average duration of calls (in seconds)\")\n\t\texit(0)\n\n\tif (int(sys.argv[1]) and len(sys.argv) == 2):\n\t\tcalcul()\n\telif (int(sys.argv[1]) and int(sys.argv[2]) and int(sys.argv[1]) > int(sys.argv[2])):\n\t\tprobs()\n\telse:\n\t\texit(84)\n\ndef main():\n\terror_management()\n\texit(0)\n\nmain()<|endoftext|>def zone(age, rate):\n description = \"\";\n\n maximum_heart_rate = 220 - age\n training_heart_rate =", "num_tokens": 2048} {"category": "stack_edu-PythonFixed", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/stack_edu-PythonFixed/part-00-00000.npy", "text": "one()\n db.commit()\n if user==None:\n return '3'\n else:\n return user\n\n#====================================================================================================================================\n\ndef list_books():\n ''' Gives a full list of the books in a database '''\n books=db.execute(\"SELECT * FROM books\").fetchall()\n db.commit()\n return books\n\n#====================================================================================================================================\n\ndef post(var):\n return request.form.get(var)\n\n#====================================================================================================================================\n\ndef get_book(isbn):\n pass<|endoftext|>from alayatodo import db\nfrom alayatodo.models import Users, Todos\n\n\nclass FillData(object):\n def __init__(self):\n \"\"\" in case the tables haven't been created already\"\"\"\n db.drop_all()\n db.create_all()\n\n def insert_data(self):\n \"\"\"insert data in db\"\"\"\n self.insert_users()\n self.insert_todos()\n\n def insert_todos(self):\n \"\"\" insert todos sample data\"\"\"\n data_todos = [(1, 'Vivamus tempus', False),\n (1, 'lorem ac odio', False),\n (1, 'Ut congue odio', False),\n (1, 'Sodales finibus', False),\n (1, 'Accumsan nunc vitae', False),\n (2, 'Lorem ipsum', False),\n (2, 'In lacinia est', False),\n (2, 'Odio varius gravida', False)]\n for x in data_todos:\n row = Todos(user_id=x[0], description=x[1], is_completed=x[2])\n db.session.add(row)\n db.session.commit()\n\n def insert_users(self):\n \"\"\" insert users sample data\"\"\"\n data_users = [('user1', 'user1'),\n ('user2', 'user2'),\n ('user3', 'user3')]\n for y in data_users:\n row = Users(username=y[0], password=y[1])\n db.session.add(row)\n db.session.commit()<|endoftext|>class ListNode(object):\n def __init__(self, x):\n self.val = x\n self.next = None\n\n\nclass Solution(object):\n def removeNthFromEnd(self, head, n):\n \"\"\"\n :type head: ListNode\n :type n: int\n :rtype: ListNode\n \"\"\"\n pre_node = None\n first_node = head\n n_step_node = head\n\n for i in range(n):\n n_step_node = n_step_node.next\n\n while n_step_node is not None:\n pre_node = first_node\n first_node = first_node.next\n n_step_node = n_step_node.next\n\n if pre_node is None:\n head = head.next\n else:\n pre_node.next = first_node.next\n\n return head<|endoftext|>import torch.nn as nn\nimport torch\nimport torch.nn.functional as F\nfrom torch.utils import data\n\n\nclass Dataset(data.Dataset):\n def __init__(self, x, y, name):\n self.x = x\n self.y = y\n self.name = name\n\n def __getitem__(self, index):\n return self.x[index], self.y[index], self.name[index]\n\n def __len__(self):\n return len(self.x)\n\n\ndef model_summary(model):\n print(\"=\" * 50)\n print('model_summary')\n table = []\n total_params = 0\n i = 0\n print(\"Index\\tModules\\tParameters\\tCumsum\")\n for name, parameter in model.named_parameters():\n i += 1\n if not parameter.requires_grad: continue\n param = parameter.numel()\n table.append([name, param])\n total_params+=param\n print(\"{}\\t{}\\t{}\\t{}\".format(i, name, param,total_params))\n pytorch_total_params = sum(p.numel() for p in model.parameters())\n pytorch_total_trainable_params = sum(p.numel() for p in model.parameters() if p.requires_grad)\n print('Total parameters: ', pytorch_total_params)\n print('Total trainable parameters: ', pytorch_total_trainable_params)\n print(\"=\" * 50)\n return table, total_params\n\n\nclass TimeDistributed(nn.Module):\n \"\"\"\n This wrapper applies a layer to every temporal slice of an input.\n The input should be at least 3D, and the dimension of index one\n will be considered to be the temporal dimension when batch_first = True:\n (batch_samples, timesteps, output_size)\n Else when batch_first = False, the dimension of index 0 is the temporal one:\n (timesteps, batch_samples, output_size)\n \"\"\"\n def __init__(self, module, batch_first=False):\n super(TimeDistributed, self).__init__()\n self.module = module\n self.batch_first = batch_first\n\n def forward(self, x):\n\n if len(x.size()) <= 2:\n print('x.size()', x.size())\n return self.module(x)\n\n # Squash samples and timesteps into a single axis\n x_reshape = x.contiguous().view(-1, x.size(-1)) # (samples * timesteps, input_size)\n\n y = self.module(x_reshape)\n\n # We have to reshape Y\n if self.batch_first:\n y = y.contiguous().view(x.size(0), -1, y.size(-1)) # (samples, timesteps, output_size)\n else:\n y = y.view(-1, x.size(1), y.size(-1)) # (timesteps, samples, output_size)\n\n return y\n\n\ndef shuffle_within_labels(x, y):\n unique_class = y.unique()\n id_list = []\n shuffle_list = []\n sfx = x.clone() # .detach().clone()\n for v in unique_class:\n vid = torch.nonzero(y==v, as_tuple=True)[0]\n id_list.append(vid)\n vs = torch.randperm(vid.size()[0])\n shuffle_list.append(vid[vs])\n id_list = torch.cat(id_list)\n shuffle_list = torch.cat(shuffle_list)\n sfx[id_list] = sfx[shuffle_list]\n return sfx\n\n\ndef shuffle_time_dim(x):\n # x has shape (bs, T, dim)\n # shuffle T dimension for each data in this batch\n T = x.shape[1]\n ridx = torch.randperm(T)\n return x[:,ridx, :]\n\n\ndef optimizer_to(optim, device):\n for param in optim.state.values():\n # Not sure there are any global tensors in the state dict\n if isinstance(param, torch.Tensor):\n param.data = param.data.to(device)\n if param._grad is not None:\n param._grad.data = param._grad.data.to(device)\n elif isinstance(param, dict):\n for subparam in param.values():\n if isinstance(subparam, torch.Tensor):\n subparam.data = subparam.data.to(device)\n if subparam._grad is not None:\n subparam._grad.data = subparam._grad.data.to(device)<|endoftext|>import tensorflow as tf\nslim = tf.contrib.slim\ntfgan = tf.contrib.gan\nlayers = tf.contrib.layers\nds = tf.contrib.distributions\nimport numpy as np\n\n\nleaky_relu = lambda net: tf.nn.leaky_relu(net, alpha=0.01)\n\ndef generator(inputs, categorical_dim, weight_decay=2.5e-5):\n \"\"\"InfoGAN discriminator network on MNIST digits.\n \n Based on a paper https://arxiv.org/abs/1606.03657 and their code\n https://github.com/openai/InfoGAN.\n \n Args:\n inputs: A 3-tuple of Tensors (unstructured_noise, categorical structured\n noise, continuous structured noise). `inputs[0]` and `inputs[2]` must be\n 2D, and `inputs[1]` must be 1D. All must have the same first dimension.\n categorical_dim: Dimensions of the incompressible categorical noise.\n weight_decay: The value of the l2 weight decay.\n \n Returns:\n A generated image in the range [-1, 1].\n \"\"\"\n unstructured_noise, cat_noise, cont_noise = inputs\n cat_noise_onehot = tf.one_hot(cat_noise, categorical_dim)\n all_noise = tf.concat([unstructured_noise, cat_noise_onehot, cont_noise], axis=1)\n \n with slim.arg_scope(\n [layers.fully_connected, layers.conv2d_transpose],\n activation_fn=tf.nn.relu, normalizer_fn=layers.batch_norm,\n weights_regularizer=layers.l2_regularizer(weight_decay)):\n net = layers.fully_connected(all_noise, 1024)\n net = layers.fully_connected(net, 7 * 7 * 128)\n net = tf.reshape(net, [-1, 7, 7, 128])\n net = layers.conv2d_transpose(net, 64, [4, 4], stride=2)\n net = layers.conv2d_transpose(net, 32, [4, 4], stride=2)\n # Make sure that generator output is in the same range as `inputs`\n # ie [-1, 1].\n net = layers.conv2d(net, 1, 4, normalizer_fn=None, activation_fn=tf.tanh)\n \n return net\n\n \n\ndef discriminator(img, unused_conditioning, weight_decay=2.5e-5,\n categorical_dim=10, continuous_dim=2):\n\n \"\"\"InfoGAN discriminator network on MNIST digits.\n \n Based on a paper https://arxiv.org/abs/1606.03657 and their", "num_tokens": 2048} {"category": "stack_edu-PythonFixed", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/stack_edu-PythonFixed/part-00-00000.npy", "text": " data saved to database!')\n \n else:\n print('Please provide the filepaths of the messages and categories '\\\n 'datasets as the first and second argument respectively, as '\\\n 'well as the filepath of the database to save the cleaned data '\\\n 'to as the third argument. \\n\\nExample: python process_data.py '\\\n 'disaster_messages.csv disaster_categories.csv '\\\n 'DisasterResponse.db')\n\n\nif __name__ == '__main__':\n main()<|endoftext|>import random\n\ncharacter_list = [\n \"a\",\n \"b\",\n \"c\",\n \"v\",\n \"f\",\n \"r\",\n \"t\",\n \"y\",\n \"u\",\n \"i\",\n \"o\",\n \"p\",\n \"q\",\n \"s\",\n \"d\",\n \"k\",\n \"l\",\n]\n\nnumber_list = [1, 2, 3, 4, 5, 6, 7, 8, 9, 0]\n\n\ndef generator(char, number):\n result = []\n for i in range(5):\n result.append(f\"test:{random.choice(char)}*{random.choice(number)}\")\n\n yield result\n\n\nresult = generator(character_list, number_list)\n\nfor item in result:\n print(item)<|endoftext|>grade1=int(input('Enter grade 1(0-4) : '))\r\ngrade2=int(input('Enter grade 2(0-4) : '))\r\ngrade3=int(input('Enter grade 3(0-4) : '))\r\ngrade4=int(input('Enter grade 4(0-4) : '))\r\ntotal=grade1+grade2+grade3+grade4\r\ncredit=4\r\ngpa=total/credit\r\nprint()\r\nprint(\"You have %d subject\"%credit)\r\nprint(\"you have total point = %.2f, %d credit\"%(total,credit))\r\nprint(\"Your get gpa = %5.2f\"%gpa)<|endoftext|>from collections import OrderedDict\nfrom itertools import count\n\n\ndef groupby(function, xs):\n keys = list(map(function, xs))\n dictonary = {}\n for key in keys:\n values_of_the_key = [x for x in xs if function(x) == key]\n dictonary[key] = values_of_the_key\n return dictonary\n\n\ndef iterate(func):\n current = lambda x: x\n while True:\n yield current\n current = comp(func, current)\n\n\ndef comp(first, second):\n return lambda x: first(second(x))\n\n\ndef zip_with(func, *iterables):\n return (func(*args) for args in zip(*iterables))\n\n\ndef cache(func, cache_size):\n cached_arguments = OrderedDict()\n\n def func_cached(*args):\n if args not in cached_arguments:\n if len(cached_arguments) == cache_size:\n cached_arguments.popitem(last=False)\n cached_arguments[args] = func(*args)\n return cached_arguments[args]\n return func_cached<|endoftext|>\"\"\"\nA univariate quadratic function has the form f (x) = ax2 + bx + c, where a, b and\nc are constants, and a is non-zero. The roots of a quadratic function can be found\nby finding the values of x that satisfy the quadratic equation ax2 + bx + c = 0. A\nquadratic function may have 0, 1 or 2 real roots. These roots can be computed using\nthe quadratic formula, shown below:\nroot = (−b ± √b2 − 4ac) / 2a\nThe portion of the expression under the square root sign is called the discriminant.\nIf the discriminant is negative then the quadratic equation does not have any real roots.\nIf the discriminant is 0, then the equation has one real root. Otherwise the equation\nhas two real roots, and the expression must be evaluated twice, once using a plus\nsign, and once using a minus sign, when computing the numerator.\nWrite a program that computes the real roots of a quadratic function. Your program\nshould begin by prompting the user for the values of a, b and c. Then it should display\na message indicating the number of real roots, along with the values of the real roots\n(if any).\n\"\"\"\nfrom math import sqrt\n\ndef main(a, b, c):\n root = 0\n discriminant = (sqrt((b**2) - (4 * a * c) * -1))\n print(discriminant)\n\n root = ((-1 * b) + (sqrt((b**2) - (4 * a * c)))) / (2 * a)\n return\n\n\nif __name__ == \"__main__\":\n print(\"This program reads the 3 constants of a quadratic function to prompts it's roots.\")\n a = float(input(\"Enter the value of 'a': \"))\n b = float(input(\"Enter the value of 'b': \"))\n c = float(input(\"Enter the value of 'c': \"))\n\n main(a, b, c)<|endoftext|>import urllib.request as ur\nimport urllib.parse as up\nimport ssl\nimport hashlib\nimport socket\n\nurl = \"https://echange.asp-public.fr/osiris_lfi/Actualisation_Financeurs.txt\"\n# url = \"http://perso.numericable.com/cjacques/ASP/Actualisation_Financeurs.txt\"\n\n\ndef exemple1():\n controle = \"SSL\"\n handler = ur.BaseHandler()\n\n if controle == \"IGNORE_SSL\":\n # Ignore SSL certificate errors\n ctx = ssl.create_default_context()\n ctx.check_hostname = False\n ctx.verify_mode = ssl.CERT_NONE\n handler = ur.HTTPSHandler(context=ctx)\n\n elif controle == \"SSL\":\n # Active le controle de certificat SSL\n handler = ur.HTTPSHandler(context=ssl.SSLContext(ssl.PROTOCOL_TLS))\n\n opener = ur.build_opener(handler)\n # opener = ur.build_opener()\n print(\"openurl =\", url)\n try:\n # f = ur.urlopen(url, timeout=2)\n f = opener.open(url, timeout=10)\n except Exception as e:\n print(\"Error:\", e)\n if hasattr(e, \"code\"):\n print(\"code:\", e.code)\n print(\"args:\", e.args)\n if e.args:\n print(\"args:\", e.args[0])\n if hasattr(e, \"reason\"):\n print(\"reason:\", e.reason)\n exit(1)\n\n opener.close()\n\n financeurs = {}\n for ligne in f: \n code, *libs = ligne[:-1].decode().split(\"|\")\n if code.isnumeric():\n financeurs[code] = libs\n else:\n financeurs[\"00000\"] = libs[0].strip(), libs[1].strip()\n f.close()\n\n for fin in sorted(financeurs)[:5]:\n print(fin, \": {1:20s} , {0}\".format(*financeurs[fin]))\n\n\ndef fprint(*args, **kwargs):\n print(*args, **kwargs, flush=True)\n\n\ndef exemple2():\n fprint(url)\n urlp = up.urlparse(url)\n\n scheme = urlp.scheme\n host = urlp.hostname\n port = urlp.port or 443\n\n serveur = (host, port)\n fprint(serveur)\n print(\"scheme:\", scheme)\n fprint(\"Récupération du certificat\", end=\" \")\n certificat = ssl.get_server_certificate(serveur)\n fprint(\" Ok\")\n fprint(\"Validation du certificat\", end=\" : \")\n\n try:\n print()\n trusted_cert = ssl.PEM_cert_to_DER_cert(certificat)\n\n conn = socket.create_connection((host, port))\n sock = ssl.wrap_socket(conn)\n current_cert = sock.getpeercert(True)\n\n pem_cert = ssl.DER_cert_to_PEM_cert(current_cert) \n if certificat == pem_cert:\n print(\"- certificat == PEM cert\")\n else:\n print(\"- certificat != PEM cert\")\n\n except Exception:\n fprint(\"- Certificat invalide !\")\n import traceback\n traceback.print_exc()\n else:\n if hashlib.sha1(trusted_cert).digest() == hashlib.sha1(current_cert).digest():\n fprint(\"- digest : Certificat validé\")\n else:\n fprint(\"- digest : Certificat non valide !\")\n\n\nexemple1()\n# exemple2()<|endoftext|>import numpy as np\nimport time\nimport cv2\nimport copy\nfrom datetime import datetime\nfrom shapely.geometry import Point\nfrom shapely.geometry.polygon import Polygon\n\nfrom Detection import Detectors\nfrom Track import Tracker\n\nfrom multiprocessing import Process, Queue\n\n\ndef rescale_frame(input_frame):\n \"\"\"\n Args:\n input_frame: Frames to be resized\n Returns: resized frames\n \"\"\"\n width = 1280\n height = 720\n dim = (width, height)\n return cv2.resize(input_frame, dim, interpolation=cv2.INTER_AREA)\n\n\ndef videoCapture(captureQueue):\n # Open the input file for processing\n cap = cv2.VideoCapture('config/video/MVI_1991.MP4')\n cap.set(3, 1920)\n cap.set(4, 1080)\n # Condition if file not opened\n if not cap.isOpened():\n print(\"Error opening video stream or file\")\n\n while cap.isOpened():\n captureQueue.put(cap.read())\n\n cap.release()\n return True\n\n\ndef main():\n\n # Fixed width and height for the video frame\n width = 1280\n height = 720\n miles_in_pixel = 0.00", "num_tokens": 2048} {"category": "stack_edu-PythonFixed", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/stack_edu-PythonFixed/part-00-00000.npy", "text": " option to load the binarized version of the dataset.\n_FILE_PATTERN = 'binarized_True_replication_1_retrieval_at_1.tf_record'\n\n# TODO(vrama): Update\n_DATASET_DIR = (\n '${PWD}/data/mnist_with_attributes/'\n)\n\n_SPLIT_TYPE = 'retrieval'\n\n_SPLITS_TO_SIZES = {'retrieval': 70000}\n\n_ITEMS_TO_DESCRIPTIONS = {\n 'image': 'A [64 x 64 x 1] grayscale image.',\n 'labels': 'Labels induced on latent states used to generate the image.',\n 'latents': 'Latents used to generate the image.'\n}\n\n# There are four labels in the dataset corresponding to\n# shape, size, orientation, and location of the object.\n# 10 classes for digits (0-9),\n# 2 classes for size (big, small)\n# 3 classes for orientation (clockwise, center, counterclockwise)\n# 4 classes for location (top-left, top-right, bottom-left, bottom-right)\n_NUM_CLASSES_PER_ATTRIBUTE = (10, 2, 3, 4)\n\n_NUM_LATENTS = 5\n\n\ndef get_split(split_name='retrieval',\n dataset_dir=None,\n num_classes_per_attribute=None):\n \"\"\"Gets a dataset tuple with instructions for reading 2D shapes data.\n\n Args:\n split_name: A train/test split name.\n dataset_dir: The base directory of the dataset sources.\n num_classes_per_attribute: The number of labels for the classfication\n problem corresponding to each attribute. For example, if the first\n attribute is \"shape\" and there are three possible shapes, then\n then provide a value 3 in the first index, and so on.\n\n Returns:\n A `Dataset` namedtuple.\n metadata: A dictionary with some metadata about the dataset we just\n constructed.\n\n Raises:\n ValueError: if `split_name` is not a valid train/test split.\n \"\"\"\n if split_name not in _SPLITS_TO_SIZES:\n raise ValueError('split name %s was not recognized.' % split_name)\n\n if num_classes_per_attribute is None:\n num_classes_per_attribute = _NUM_CLASSES_PER_ATTRIBUTE\n\n if dataset_dir is None:\n dataset_dir = _DATASET_DIR\n\n file_pattern = os.path.join(dataset_dir, _FILE_PATTERN)\n\n keys_to_features = {\n 'image/encoded': tf.FixedLenFeature((), tf.string, default_value=''),\n 'image/format': tf.FixedLenFeature((), tf.string, default_value='raw'),\n 'labels': tf.FixedLenFeature([len(num_classes_per_attribute)], tf.int64),\n 'latents': tf.FixedLenFeature([_NUM_LATENTS], tf.float32),\n }\n\n items_to_handlers = {\n 'image': tfexample_decoder.Image(shape=[64, 64, 3]),\n 'labels': tfexample_decoder.Tensor('labels'),\n 'latents': tfexample_decoder.Tensor('latents'),\n }\n\n decoder = tfexample_decoder.TFExampleDecoder(keys_to_features,\n items_to_handlers)\n\n metadata = {\n 'num_classes_per_attribute': num_classes_per_attribute,\n 'split_type': _SPLIT_TYPE\n }\n\n return dataset.Dataset(\n data_sources=file_pattern,\n reader=tf.TFRecordReader,\n decoder=decoder,\n num_samples=_SPLITS_TO_SIZES[split_name],\n items_to_descriptions=_ITEMS_TO_DESCRIPTIONS), metadata<|endoftext|>import face_recognition\nimport cv2\nimport os\nimport re\nfrom PIL import Image\n\n\n\n#-----------------------------------------------------------------------\n\n\n#função para encontrar todas as faces em uma pasta\ndef scan_known_people(known_people_folder):\n known_names = []\n known_face_encodings = []\n\n for file in image_files_in_folder(known_people_folder):\n basename = os.path.splitext(os.path.basename(file))[0]\n img = face_recognition.load_image_file(file)\n encodings = face_recognition.face_encodings(img)\n\n if len(encodings) > 1:\n click.echo(\"ATENÇÃO: Mais de uma face encontrada em {}. Será considerada somente a primeira face.\".format(file))\n\n if len(encodings) == 0:\n click.echo(\"ATENÇÃO: Nenhma face encontrada em {}. Arquivo ignorado.\".format(file))\n else:\n known_names.append(basename)\n known_face_encodings.append(encodings[0])\n\n return known_names, known_face_encodings\n\n\n\n#-----------------------------------------------------------------------\n\n\n\ndef image_files_in_folder(folder):\n return [os.path.join(folder, f) for f in os.listdir(folder) if re.match(r'.*\\.(jpg|jpeg|png)', f, flags=re.I)]\n\n\n\n#-----------------------------------------------------------------------\n\n\n\n\n# carrega as faces conhecidas em uma base de imagens conhecidas\nknown_names, known_face_encodings = scan_known_people(\"./conhecidos\")\n\n# Initialize some variables\nface_locations = []\nface_encodings = []\nface_names = []\n\n# carrega as faces desconhecidas em uma imagem\nimage = cv2.imread(\"./desconhecidos/algar.jpg\")\n\nface_locations = face_recognition.face_locations(image)\nface_encodings = face_recognition.face_encodings(image, face_locations)\n\nx = True\n\nwhile x:\n\n face_names = []\n for face_encoding in face_encodings:\n # See if the face is a match for the known face(s)\n #quanto menor a tolerancia, maior será a precisao\n match = face_recognition.compare_faces(known_face_encodings, face_encoding, tolerance=0.50)\n name = \"N/C\"\n flag = 0\n \n #associa o(s) rosto(s) encontrados ao(s) seu(s) respectivo(s) nome(s).\n for i in range(0,len(known_names)):\n if match[i]:\n name = known_names[i]\n face_names.append(name)\n flag = 1\n i = len(known_names)\n\n #se nao encontrou nenhuma face conhecida, entao marca ela com 'N/C' = nao conhecido\n if flag == 0:\n face_names.append(name)\n\n\n\n # Mostra os resultados\n for (top, right, bottom, left), name in zip(face_locations, face_names):\n \n\n # desenha um quadrado em volta da face\n cv2.rectangle(image, (left-10, top-10), (right+10, bottom+10), (0, 0, 255), 2)\n\n # escreve o nome embaixo da face \n cv2.rectangle(image, (left-10, bottom - 5), (right+10, bottom+10), (0, 0, 255), cv2.FILLED)\n font = cv2.FONT_HERSHEY_DUPLEX\n cv2.putText(image, name, (left, bottom + 6), font, 0.5, (255, 255, 255), 1)\n\n # mostra a imagem resultante\n cv2.imshow('Image', image)\n cv2.imwrite('saida_img.png',image)\n\n x = False\n\ncv2.waitKey(0)\ncv2.destroyAllWindows()<|endoftext|>class Person(object):\n def __init__(self, name, yearofbirth, address):\n self.name = name\n self.yearofbirth = yearofbirth\n self.address = address\n\n def age(self):\n return 2021 - self.yearofbirth + 1\n\n @staticmethod\n def main():\n p = Person(input('이름: '), int(input('출생년도: ')), input('주소: '))\n print(f'{\"회원가입을 축하합니다.\":*^20}')\n print(f'{p.name}님의 나이: {p.age()}')\n print(f'{p.name}님의 주소: {p.address}')\n print('*' * 26)\n\n\nPerson.main()<|endoftext|>''' This program is used to determine the wind chill using temperature, wind speed, and the National Weather Service formula\nCreated September 29, 2016\nLab 04 Exercise 4.1 (a, b, c)\n@author: Ian Christensen (igc2)\n@author: Griffin Sparling (grs4)\n'''\n\n# assign variables\ntemp_fah = float(input('Please enter a temperature in degrees Fahrenheit: '))\nwind_mph = float(input('Please enter a wind speed in mph: '))\n\n# solve for wind_chill\nwind_chill = 35.74 + (0.6215 * temp_fah) - (35.75 * (wind_mph**0.16)) + (0.4275 * temp_fah * (wind_mph**0.16))\n\n# determine number of layers necessary\nif wind_mph < 2 or temp_fah < -58 or temp_fah > 41:\n print('Error: the user input was invalid')\nelse:\n print(wind_chill)\n\nif wind_chill < -40:\n print('Stay home')\nelif -40 <= wind_chill < -10:\n print('Wear 4 layers')\nelif -10 <= wind_chill < 20:\n print('Wear 3 layers')\nelif 20 <= wind_chill < 40:\n print('Wear 2 layers')\nelse:\n print('Wear 1 layer')<|endoftext|>def get_pixel_position(level, point):\n return [level.TILE_SIZE * point[0], level.TILE_SIZE * point[1]]\n\n\ndef get", "num_tokens": 2048} {"category": "stack_edu-PythonFixed", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/stack_edu-PythonFixed/part-00-00000.npy", "text": "4 = tf.keras.layers.Conv2D(\n filters=256,\n kernel_size=(3, 3),\n strides=2,\n padding=\"same\"\n )\n\n # Batchnorm 4\n self.batchnorm4 = tf.keras.layers.BatchNormalization()\n\n # Leaky 4\n self.leaky4 = tf.keras.layers.LeakyReLU(alpha=LEAKY_ALPHA)\n\n # Flatten\n self.flatten = tf.keras.layers.Flatten()\n\n # Dropout\n\n # Dense\n self.fc = tf.keras.layers.Dense(\n units=1,\n activation=tf.keras.activations.sigmoid\n )\n\n # forward call\n def call(self, x):\n # Layer 1: Conv 1\n x = self.conv1(x)\n x = self.batchnorm1(x)\n x = self.leaky1(x)\n\n # Layer 2: Conv 2\n x = self.conv2(x)\n x = self.batchnorm2(x)\n x = self.leaky2(x)\n\n # Layer 3: Conv 3\n x = self.conv3(x)\n x = self.batchnorm3(x)\n x = self.leaky3(x)\n\n # Layer 4: Conv 4\n x = self.conv4(x)\n x = self.batchnorm4(x)\n x = self.leaky4(x)\n\n # Layer 5: Flatten\n x = self.flatten(x)\n\n # Layer 6: Output\n x = self.fc(x)\n\n return x\n\n\n# Generator\ndef build_generator():\n m = tf.keras.Sequential()\n\n # Layer 1: Fully connected\n m.add(tf.keras.layers.Dense(\n units=4*4*256,\n use_bias=False,\n input_shape=(100, )\n ))\n m.add(tf.keras.layers.BatchNormalization())\n m.add(tf.keras.layers.LeakyReLU(alpha=LEAKY_ALPHA))\n\n # Layer 2: Reshape\n m.add(tf.keras.layers.Reshape(\n target_shape=(4, 4, 256)\n ))\n\n # Layer 3: Conv: 8x8x128\n m.add(tf.keras.layers.Conv2DTranspose(\n filters=128,\n kernel_size=(5, 5),\n strides=2,\n padding=\"same\"\n ))\n m.add(tf.keras.layers.BatchNormalization())\n m.add(tf.keras.layers.LeakyReLU(alpha=LEAKY_ALPHA))\n\n # Layer 4: Conv: 16x16x128\n m.add(tf.keras.layers.Conv2DTranspose(\n filters=128,\n kernel_size=(5, 5),\n strides=2,\n padding=\"same\"\n ))\n m.add(tf.keras.layers.BatchNormalization())\n m.add(tf.keras.layers.LeakyReLU(alpha=LEAKY_ALPHA))\n\n # Layer 5: Conv: 32x32x128\n m.add(tf.keras.layers.Conv2DTranspose(\n filters=128,\n kernel_size=(5, 5),\n strides=2,\n padding=\"same\"\n ))\n m.add(tf.keras.layers.BatchNormalization())\n m.add(tf.keras.layers.LeakyReLU(alpha=LEAKY_ALPHA))\n\n # Layer 6: Conv: 32x32x3\n m.add(tf.keras.layers.Conv2DTranspose(\n filters=3, # RGB\n kernel_size=(5, 5),\n strides=1,\n padding=\"same\",\n activation=tf.keras.activations.tanh\n ))\n\n return m\n\n\n# Generator\nclass Generator(tf.keras.Model):\n def __init__(self):\n super(Generator, self).__init__()\n\n # Fully connected\n self.fc = tf.keras.layers.Dense(\n units=4*4*256\n )\n\n # Batchnorm 1\n self.batchnorm1 = tf.keras.layers.BatchNormalization()\n\n # Leaky 1\n self.leaky1 = tf.keras.layers.LeakyReLU(alpha=LEAKY_ALPHA)\n\n # Reshape\n self.reshape = tf.keras.layers.Reshape(\n target_shape=(4, 4, 256)\n )\n\n # Conv 1: 8x8x128\n self.conv1 = tf.keras.layers.Conv2DTranspose(\n filters=128,\n kernel_size=(4, 4),\n strides=2,\n padding=\"same\"\n )\n\n # Batchnorm 2\n self.batchnorm2 = tf.keras.layers.BatchNormalization()\n\n # Leaky 2\n self.leaky2 = tf.keras.layers.LeakyReLU(alpha=LEAKY_ALPHA)\n\n # Conv 2: 16x16x128\n self.conv2 = tf.keras.layers.Conv2DTranspose(\n filters=128,\n kernel_size=(4, 4),\n strides=2,\n padding=\"same\"\n )\n\n # Batchnorm 3\n self.batchnorm3 = tf.keras.layers.BatchNormalization()\n\n # Leaky 3\n self.leaky3 = tf.keras.layers.LeakyReLU(alpha=LEAKY_ALPHA)\n\n # Conv 3: 32x32x128\n self.conv3 = tf.keras.layers.Conv2DTranspose(\n filters=128,\n kernel_size=(4, 4),\n strides=2,\n padding=\"same\"\n )\n\n # Batchnorm 4\n self.batchnorm4 = tf.keras.layers.BatchNormalization()\n\n # Leaky 4\n self.leaky4 = tf.keras.layers.LeakyReLU(alpha=LEAKY_ALPHA)\n\n # Conv 4: 32x32x3\n self.conv4 = tf.keras.layers.Conv2DTranspose(\n filters=3, # RGB\n kernel_size=(3, 3),\n padding=\"same\",\n activation=tf.keras.activations.tanh\n )\n\n # forward call\n def call(self, x, training=True):\n # Layer 1: Fully connected\n x = self.fc(x)\n x = self.batchnorm1(x, training=training)\n x = self.leaky1(x)\n\n # Layer 2: Reshape\n x = self.reshape(x)\n\n # Layer 3: Conv 1\n x = self.conv1(x)\n x = self.batchnorm2(x, training=training)\n x = self.leaky2(x)\n\n # Layer 4: Conv 2\n x = self.conv2(x)\n x = self.batchnorm3(x, training=training)\n x = self.leaky3(x)\n\n # Layer 5: Conv 3\n x = self.conv3(x)\n x = self.batchnorm4(x, training=training)\n x = self.leaky4(x)\n\n # Layer 6: Conv 4\n x = self.conv4(x)\n\n return x<|endoftext|># ~ https://catalog.data.gov/dataset/lottery-powerball-winning-numbers-beginning-2010\n ### https://data.ny.gov/api/views/d6yy-54nr/rows.csv?accessType=DOWNLOAD\n# ~ https://catalog.data.gov/dataset/lottery-mega-millions-winning-numbers-beginning-2002\n ### https://data.ny.gov/api/views/5xaw-6ayf/rows.csv?accessType=DOWNLOAD\n\nimport pandas as pd\nimport requests\nimport json\nimport argparse\n\nimport date_helpers\n\nPOWERBALL_FILE = 'src/helpers/powerball_dataset.csv'\nMEGAMILLIONS_FILE = 'src/helpers/megamillions_dataset.csv'\n\nPOWERBALL_URL = 'http://127.0.0.1:5000/powerball'\nMEGAMILLIONS_URL = 'http://127.0.0.1:5000/megamillions'\n\n\ndef fix_date(dt):\n\n dt = date_helpers.str_to_dto(dt)\n dt = date_helpers.dto_to_str(dt)\n return dt\n\n\ndef get_and_load_powerball_data():\n try: # Load dataframe from csv\n df = pd.read_csv(POWERBALL_FILE)\n except IOError:\n raise # TODO look for and download file, then load dataframe\n\n ### Get most recent date in exiting API data\n last_draw_date = get_most_recent_date('powerball')\n\n ### Fix date columns\n df['Draw Date'] = df['Draw Date'].apply(fix_date)\n\n ### Filter new data to only include newer drawings\n df = df[df['Draw Date'] > last_draw_date]\n\n for index, row in df.iterrows():\n\n # Parse out cell data\n draw_date = row['Draw Date']\n numbers_list = row['Winning Numbers']\n multiplier = row['Multiplier']\n\n # Get numbers from string\n n1, n2, n3, n4, n5, pb = numbers_list.split(' ')\n\n # Fix date format # XXX Uncessecary now\n # draw_date = date_helpers.str_to_dto(draw_date)\n # draw_date = date_helpers.dto_to_str(draw_date)\n\n # Create json data object\n data = {\n \"draw_date\": draw_date,\n \"number_1\": n1,\n \"number_2\": n2,\n \"number_3\": n3,\n \"number_4\": n4,\n \"number_5\": n5,\n \"powerball_number\": pb,\n \"multiplier\": multiplier\n }\n\n # Send API post request\n requests.post(POWERBALL_URL, json=data)\n print \"Powerball drawing data sent: {0}\".format(data) # TODO convert to logging\n\n\ndef get_and", "num_tokens": 2048} {"category": "stack_edu-PythonFixed", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/stack_edu-PythonFixed/part-00-00000.npy", "text": " driver, host,login_data):\n \"\"\"用例描述:测试用户名和密码输入正确,登录成功\\n\n 预置条件: 打开登录页面\\n\n 步骤1: 输入用户名和密码正确\\n\n 步骤2: 点登录按钮\\n\n 断言: 登录成功\n \"\"\"\n\n _login(driver, host, login_data[\"user\"], login_data[\"psw\"])\n result2 = _login_result(driver, login_data[\"expect\"])\n print(\"测试结果:%s\" % result2)\n assert result2\n\n\n\nif __name__ == \"__main__\":\n pytest.main([\"-s\",\"test_login.py\"])<|endoftext|>## Logistic as Neural Network ##\n\n# Binary Classification #\n\n#Input: x (R)\n#Output: y ({0, 1})\n\n# Logistic Regression #\n\n#Parameter: w, b\n# y = ∂(w*x + b)\n#w is a dimensional vector, b is a real number \n\n# Sigmoid function \n\n#Logistic Regression Cost Function \n#Loss function \n#L(yl, y) = 1/2* (yl- y)^2 \n\n#L(yl,y) = -(y*log(yl)+ (1-y)log(1-yl))\n\n#Note: cost function is for the averge\n#Loss function is for the entire set\n\n# Gradient Descent #\n\n\n# Computation Graph #\n#One step of backward propagation on a computation graph yields derivative of final output variable.\n\n# Logistic Regression Gradient Descent #\n#The value of dw in the function is cumulative \n\n\n## Python and Vectorization ##\n#Vectorization \n\n#Vectorization demo \nimport numpy as np \na = np.array([1,2,3,4])\nprint(a)\n\nimport time \na = np.random.rand(1000000)\nb = np.random.rand(1000000)\ntic = time.time()\nc = np.dot(a,b)\ntoc = time.time()\nprint(c)\n\nprint(\"Vectorized Version \"+ str(1000*(toc - tic)) + \"ms\")\n\nc = 0 \ntic = time.time()\nfor i in range(1000000):\n c += a[i]* b[i]\ntoc = time.time()\nprint(c)\n\nprint(\"For loop:\" + str(1000* (toc - tic))+ \"ms\")\n\n# The result is no-vectorized version takes much longer than vectorized version \n\n# Vectorizing Logistic Regression \n# Vectorizing peration without a for loop \n# z = np.dot(w.T, x)\n#The dimension of the vectorized function should be (nx, m)\n\n#Quiz \n#How do you compute the derivative of b in one line of code in Python numpy?\n#Answer: 1 / m*(np.sum(dz))\n\n# 12/17/2019 #\n# Lucid Dream #\n#import numpy as np \n#Sum of a column in a matrix \n#In the sample denoted by the cal (calories)\n#cal = A.sum(axis = X) (X is the index of the column)\n#percentage = 100 * A/(cal.reshape(1,4))\n\n## A note on python and Jupyter Notebook ##\nimport numpy as np\na = np.random.randn(5,1)\n#Transpose pf a \nprint(a.T)<|endoftext|># Import Dependencies \nfrom flask import Flask, render_template, redirect \nfrom flask_pymongo import PyMongo\nimport scrape_mars\nimport os\n# Create an instance of Flask app\napp = Flask(__name__)\n\n\n\n# Use PyMongo to establish Mongo connection\nmongo = PyMongo(app, uri=\"mongodb://localhost:27017/weather_app\")\n\n# Create route that renders index.html template and finds documents from mongo\n\n@app.route(\"/\")\ndef home():\n#Find data\n mars_dict = mongo.db.mars_dict.find_one()\n\n#Return template and Data\n return render_template(\"index.html\",mars_dict=mars_dict)\n\n# Route that will trigger scrape function\n@app.route(\"/scrape\")\ndef scrape(): \n#run Scrapped function\n mars_dict = mongo.db.mars_dict\n mars_data = scrape_mars.scrape_mars_news() \n mars_data = scrape_mars.scrape_mars_image()\n mars_data = scrape_mars.scrap_mars_weather()\n mars_data = scrape_mars.scrape_mars_fact()\n mars_data = scrape_mars.scrape_mars_hemisphere()\n\n mars_dict.update({}, mars_data, upsert=True)\n\n return redirect(\"/\",code=302)\n\nif __name__ == \"__main__\":\n app.run(debug=True)<|endoftext|>#!#/usr/bin/python3\n#Calculator\nwhile 2:\n first_num=float(input(\"Enter The First Number: \"))\n operator =input (\"Enter the operator: \")\n second_num=float(input(\"Enter the Second Number: \"))\n if operator==\"+\":\n result=first_num+second_num\n elif operator==\"-\":\n result=first_num-second_num\n elif operator == \"*\":\n result = first_num *second_num\n elif operator == \"/\":\n result = first_num / second_num\n else:\n print(\"wrong operator\")\n\n print(\"Result is: \", result)<|endoftext|>\"\"\"In this file, I create a python lambda handler to extract metrics\nfrom titles and descriptions\"\"\"\n\nimport data_preprocessing as dp\nimport filters\nimport metric_extraction\nimport json\n\n\ndef lambda_handler(event, context):\n title = event['title']\n description = event['description']\n\n # Eliminate date time expressions from text\n title, description = dp.clean_date_time(title), dp.clean_date_time(description)\n title_metrics = metric_extraction.extract_metrics(title)\n description_metrics = metric_extraction.extract_metrics(description)\n\n # Filter lengths lesser than 100m\n title_metrics = filters.entity_floor(title_metrics)\n description_metrics = filters.entity_floor(description_metrics)\n \n return {'title_metrics': list(map(lambda m: m.to_official().to_dict(),\n title_metrics)),\n 'description_metrics': list(map(lambda m: m.to_official().to_dict(),\n description_metrics))}<|endoftext|>import numpy as np\nimport pandas as pd\n\nfrom trichotracking.dfmanip import columnsToListColumns, combineNanCols, listToColumns\nfrom trichotracking.iofiles import extractValuesFromListOfString\nfrom .metakeeper import Metakeeper\n\n\nclass Aggkeeper(Metakeeper):\n \"\"\" \n Class storing and providing information about aggregate tracks.\n\n Dataframe with columns:\n trackNr -- track number of aggregate track\n t0 -- start frame\n t1 -- end frame\n tracks0 -- trackNr before merged\n stracks0 trackNrs of single filaments before merge\n tracks1 -- trackNrs after split\n stracks1 -- tracksNrs of single filaments after split\n mTrack1 -- trackNr of one track merged or split\n mTrack2 -- trackNr of other track merged or split\n n -- number of single filaments\n breakup breakup reason\n 1: aggregates\n 2: splits up\n 3: movie finished\n 4: unknown\n\"\"\"\n\n def __init__(self, dfagg):\n self.df = dfagg\n\n @classmethod\n def fromScratch(cls, df_merge, df_split, trackkeeper):\n \"\"\" Creates meta dataframe of aggregates.\n\n Positional parameters:\n df_merge -- Dataframe of merges\n df_split -- Dataframe of splits\n df_tracks -- Dataframe of all tracks\n\n \"\"\"\n\n endExp = trackkeeper.endExp\n\n # Join df_merge and df_split, create dfagg\n df_merge = columnsToListColumns(df_merge, 'tracks0', ['Track1', 'Track2'])\n df_merge.rename(columns={'Frame': 't0'}, inplace=True)\n df_merge.set_index('trackNr', inplace=True)\n df_split = columnsToListColumns(df_split, 'tracks1', ['Track1', 'Track2'])\n df_split.rename(columns={'Frame': 't1'}, inplace=True)\n df_split.set_index('trackNr', inplace=True)\n dfagg = df_merge.join(df_split, how='outer')\n dfagg.reset_index(inplace=True)\n\n # Get single filaments starting\n aggTracks = dfagg.trackNr.values\n dfagg.sort_values(by='t0', inplace=True)\n dfagg['stracks0'] = dfagg.apply(lambda row:\n _getTracks(row, 'tracks0', aggTracks, dfagg), axis=1)\n dfagg.sort_values(by='t1', inplace=True)\n dfagg['stracks1'] = dfagg.apply(lambda row:\n _getTracks(row, 'tracks1', aggTracks, dfagg), axis=1)\n dfagg = countFrames(dfagg)\n\n # Get greater aggregates\n df = dfagg[(dfagg.n0 - dfagg.ns0).abs() > 0].copy()\n df.apply(lambda row: fillAggregation(row, dfagg, aggTracks),\n axis=1)\n\n dfTracksMeta = trackkeeper.getDfTracksMeta()\n dfagg['t0'] = dfagg.apply(lambda row:\n fillTimes(row, 't0', dfTracksMeta, 'startTime'), axis=1)\n dfagg['t1'] = dfagg.apply(lambda row:\n fillTimes(row, 't1', dfTracksMeta, 'endTime'), axis=1)\n\n dfagg = countFrames(dfagg)\n\n dfagg['breakup'] = 0\n dfagg.loc[dfagg.n1 == 1, 'breakup'] = 1\n dfagg.loc", "num_tokens": 2048} {"category": "stack_edu-PythonFixed", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/stack_edu-PythonFixed/part-00-00000.npy", "text": "(msg)\n if fail:\n msg = f\"Exception raised on rank {comm.rank}: {exc[1]}\"\n raise exc[0](msg).with_traceback(exc[2])\n raise exc[0](msg).with_traceback(exc[2])\n else:\n for m in allmsgs:\n if m is not None:\n raise RuntimeError(f\"Exception raised on other rank: {m}.\")<|endoftext|>L1=[1,10,0,5]\n\ntry:\n L=int(input(\"Enter the location\"))\n no1=int(input(\"Enter any number\"))\n no2=int(input(\"Enter any number\"))\n result=(L1[L]+no1)/no2\n print(\"The result is\",result)\nexcept ZeroDivisionError:\n print(\"Do not divide any number by zero\")\nexcept ValueError:\n print(\"only use numbers\")\nexcept IndexError:\n print(\"list index out of range\")<|endoftext|>from django.shortcuts import render\nfrom django.http import request\nfrom django.views.generic.edit import FormView\nfrom .models import UseSubType, Residential\nfrom .forms import ServiceAreaCalculatorForm\nfrom django.contrib.messages.views import SuccessMessageMixin \n\n\nclass CalculatorView(SuccessMessageMixin, FormView):\n form_class = ServiceAreaCalculatorForm\n template_name = 'impactfee/home.html'\n success_url = \"\"\n\n def get(self, request, *args, **kwargs):\n #form = self.form_class\n form = self.form_class(initial={'service_area': '1', 'use_type': '1'})\n return render(request, self.template_name, {'form': form})\n\n def post(self, request):\n form = ServiceAreaCalculatorForm(data=request.POST)\n \n\n # Store Form Variables:\n # Only used in Fee Display for Service Area\n areas = form.data['service_area'] \n if areas == '1':\n area = 'Area A'\n elif areas == '2':\n area = 'Area B'\n elif areas == '3':\n area = 'Area C'\n\n # Used for Select fields - Use Type, Use Sub Type, Units, and Square Feet\n usetype = form.data['use_type']\n subtype = form.data['use_sub_type']\n units = form.data['units']\n squarefeet = form.data['square_feet']\n\n # Calculates fee based on provided data calculated with database values\n fees = calculateFees(self.request, usetype, subtype, units, squarefeet)\n # Returns fees for display results, area for display results, \n # form for Select dropdowns, and usetype for changing squarefeet text in fee results on calc.html \n context = {'fees': fees, 'area': area, 'form': form, 'usetype': usetype}\n\n if form.is_valid():\n # Renders Fee Display Page\n return render(self.request, 'impactfee/calc.html', context)\n\n# subtype is used to query database values for correct fees\n# usetype is used to determine if residential or non-residential\n# units used by Hotel and Residential for fees\n# squarefeet is used to multiply by fees\ndef calculateFees(request, usetype, subtype, units, squarefeet):\n #template_name = 'impactfee/fees.html'\n # Used for fee calculation (fee * /per 1000 feet)\n if squarefeet > '0':\n square = (int(squarefeet) / 1000)\n\n # Residential Fees Calculated\n if usetype == '1':\n if int(squarefeet) < 751:\n id = 1\n elif int(squarefeet) > 751 and int(squarefeet) < 1251:\n id = 2\n elif int(squarefeet) > 1251 and int(squarefeet) < 1751:\n id = 3\n elif int(squarefeet) > 1751 and int(squarefeet) < 2251:\n id = 4\n elif int(squarefeet) > 2251 and int(squarefeet) < 2751:\n id = 5\n elif int(squarefeet) > 2751 and int(squarefeet) < 3251:\n id = 6\n elif int(squarefeet) > 3251 and int(squarefeet) < 3751:\n id = 7\n else:\n id = 8\n \n res = Residential.objects.get(pk=id)\n # Base Fees Used for Fee Display\n parkfee = int(res.parksandrecfee)\n policefee = int(res.police)\n firefee = int(res.fire)\n streetsfee = int(res.streets)\n # Fees Calculated by Units Refering to residential squarefeet table\n parks = round((parkfee * int(units)), 2)\n police = round((policefee * int(units)), 2)\n fire = round((firefee * int(units)), 2)\n streets = round((streetsfee * int(units)), 2)\n admin = 50\n total = round((parks + police + fire + streets + admin), 2)\n subtype = None\n else: \n # Non-Residential Fees Calculated\n sub = UseSubType.objects.get(pk=subtype)\n parkfee = int(sub.parksandrecfee)\n policefee = int(sub.police)\n firefee = int(sub.fire)\n streetsfee = int(sub.streets)\n # Hotel subtype == '7' uses unit quantity instead of square feet\n if subtype == '7':\n parks = (parkfee * int(units))\n police = (policefee * int(units))\n fire = (firefee * int(units))\n streets = (streetsfee * int(units))\n admin = 50\n total = (parks + police + fire + streets + admin)\n else:\n parks = round((parkfee * square), 2)\n police = round((policefee * square), 2)\n fire = round((firefee * square), 2)\n streets = round((streetsfee * square), 2)\n admin = 50\n total = (parks + police + fire + streets + admin)\n\n context = {'parks': parks, 'police': police, 'fire': fire, 'streets': streets, 'admin': admin, \n 'total': total, 'parkfee': parkfee, 'policefee': policefee, 'firefee': firefee, \n 'streetsfee': streetsfee}\n return context\n\n# Used to created dropdown dependencies for use_type and use_sub_type\ndef load_types(request):\n template_name = 'impactfee/subs.html'\n type_id = request.GET.get('use_type')\n use_sub_types = UseSubType.objects.filter(usetypeid=type_id).order_by('id')\n return render(request, template_name, {'use_sub_types': use_sub_types})\n\n# About Application Page\ndef contact(request):\n return render(request, 'impactfee/contact.html')\n\n# About Application Page\ndef about(request):\n return render(request, 'impactfee/about.html')<|endoftext|>import numpy as np\nimport main\n\nr1 = np.linspace(0, 1)\nr2 = np.linspace(0, 20, num=100)\nx1 = (np.e ** r1) * np.cos(r1)\ny1 = (np.e ** r1) * np.sin(r1)\nx2 = (np.e ** r2) * np.cos(r2)\ny2 = (np.e * r2) * np.sin(r2)\n\nmain.parallel_plot(x1, y1, x2, y2, 'x1', 'y1', 'x2', 'y2', 'subplot', '|')\nmain.parallel_plot(x1, y1, x2, y2, 'x1', 'y1', 'x2', 'y2', 'subplot', '-')<|endoftext|>\"\"\"Generate Markov text from text files.\"\"\"\n\nfrom random import choice\nimport sys\nimport string\n\n\ndef open_and_read_file(file_path):\n \"\"\"Take file path as string; return text as string.\n\n Takes a string that is a file path, opens the file, and turns\n the file's contents as one string of text.\n \"\"\"\n\n # your code goes here\n with open(file_path) as f:\n return f.read()\n #return \"Contents of your file as one long string\"\n\n\ndef make_chains(text_string):\n \"\"\"Take input text as string; return dictionary of Markov chains.\n\n A chain will be a key that consists of a tuple of (word1, word2)\n and the value would be a list of the word(s) that follow those two\n words in the input text.\n\n For example:\n\n >>> chains = make_chains(\"hi there mary hi there juanita\")\n\n Each bigram (except the last) will be a key in chains:\n\n >>> sorted(chains.keys())\n [('hi', 'there'), ('mary', 'hi'), ('there', 'mary')]\n\n Each item in chains is a list of all possible following words:\n\n >>> chains[('hi', 'there')]\n ['mary', 'juanita']\n\n >>> chains[('there','juanita')]\n [None]\n \"\"\"\n # code for bi-gram\n # chains = {}\n\n # words = text_string.split()\n # words.append(None)\n\n # for i in range(len(words)-2):\n # ", "num_tokens": 2048} {"category": "stack_edu-PythonFixed", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/stack_edu-PythonFixed/part-00-00000.npy", "text": "gAN_FQ8Bu=?*neIu7dy?yv3|o8hOG;M$V\nbzs%PwIO8)J^)9T)x={y<@HUB;FsL=#2Movfmbuc6W~7*2q`y+G56c$(LeAGbBaw3Wk}#UPttx|0z@!mMOP?huxAmlVCl\nhZ1I5&TBr{hJW22)YvVCKyaGiXiL{+6!0mdTg*od^yA-mL*!m2X9+M!2K4NU*WqJ(YUwe%1HFg=yGX1Of1916TE(g;APBl3im{<@1akwt%mKaECb5=^2$3MNL2QDU&@CPEDMo}#Z9CSo|h(PFrW6;a|&5zQ\n`l(CA\nW8#FKKEkEZ?3Hq!@0sQm;SO`G1L^hlTR#Dsir!WT=V%IA@8MhRop=ru*>6|?Bt3\ntIYhac)63%UDrKphv(Be(OdEKaL1CD0?yFYjKi^3J9hHkOZU=GJ7Q)l50$Qrt;e`KqaBk*QLvmz3%=)xgoZ`Skn)xw^8vtp;Y~s2t8=uAyH4JLIA+9YHQSbewd))ki^Eo%p?|ZPDY~xkM*wT)Y|=zysiSWqs`>`u)Z7o52)by\n`I&VU*ErwAEY$xFXq?Bm0vEG6w;ke;qxe#oztkV=IC{?CPh8H-hToA6i(GDW-{hIG>KB*P;z=HUWtEC\n5qj0~&Y|3_8pdjU&e8nQ3QlKftUuk_as+IU(j>+#%^)*ZZ|{2=Hig\nZshv|A^E*{bT~D{B9)hPiEDv3|9i75`4r;p9#amSxuB?wihVr>~{18HwL6q54ez(=aFUU|n*Pd=F{Z6\nJ3dW!j1$ZwFLy-w#cP-~CcwDGMNb6qa<_!8BsFh9a9AaEG;ucOjp;l`BndYJN*Pq_-p3mAR>CW2U?W{Mbe`c4\nXA#u5CTBrv)iO#TyDPpRQ~9QWQeE-Jn{jyhgCJ~|G1-g>@jKC@hT>-p+=>iHm@RPHhIxIIyE7|\nht#yhD3HhFMd{@v*zE|J14d^I163=(*h-P\nmdXvS@ekb_#SC#J!Wwx2~_Nn1ku(>)~OS%T)4w?rn~HSPO{~|nrO|n>5h^1$@Y93ra!YdjW~NY7i45^\nUIv$8YThI+KkLLidupBHJx=0ggAswVa@n#_n#7A7j5s9fbdtO>9r!hD$gKeXx*z@u=w`6N\ntwpDu>Wmj$SIoa%xXxGeC8{#4!!Xq5Qz+bqzdw6sqwD{)QV{wQke4-Ay;QH{a\n5sV?d|QUAo?STj1^8y7vg`*(k>4;UC>i5wIa9W!{y(Ac;;hQ$xRGhxKY#8IP@lE;j_Yu\nxw=cc8yYg=+^)OfaE2`(Oc\n8Ga~KeucAGsd59_;bI;KRvGbf13UO3!W>>bjp9X1i01wUF%az0^Dl;+^_MkMgsn;e}6%zBeh{AdE9Yw_tELd2w$ho+5$#!/bin/ruby\n\ndef largestDecentNumber n\n a = 0\n b = 0\n for i in (n/3).downto(0)\n if (n - 3 * i) % 5 == 0\n b = i\n a = (n - 3 * i) / 5\n break\n end\n end\n\n if a == 0 and b == 0\n return -1\n else\n return \"5\" * 3 * b + \"3\" * 5 * a\n end\nend\n\nt = gets.strip.to_i\nfor a0 in (0..t-1)\n n = gets.strip.to_i\n puts largestDecentNumber n\nend<|endoftext|>module MetaText\n module Link\n LINK_REGEX = /(^|\\s)(http:\\/\\/(\\w|\\.|\\/)+)/\n\n def populate_links(text)\n text.gsub(MetaText::Link::LINK_REGEX, '\\1\"\\2\":\\2')\n end\n \n def populate_links!(text)\n text.gsub!(MetaText::Link::LINK_REGEX, '\\1\"\\2\":\\2')\n end\n end\nend<|endoftext|>require 'utilrb/test'\nrequire 'flexmock/minitest'\nrequire 'tempfile'\n\nrequire 'utilrb/kernel'\n\nclass TC_Kernel < Minitest::Test\n # Do NOT move this block. Some tests are checking the error lines in the\n # backtraces\n DSL_EXEC_BLOCK = Proc.new do\n real_method\n if KnownConstant != 10\n raise ArgumentError, \"invalid constant value\"\n end\n class Submod::Klass\n def my_method\n end\n end\n name('test')\n unknown_method()\n end\n\n def test_validate_options_passes_options_unmodified_if_they_are_valid_and_there_is_no_additional_defaults\n options = { :a => 1, :c => 2 }\n assert_equal options, validate_options(options, :a, :b, :c)\n end\n\n def test_validate_options_accepts_a_list_of_valid_options_as_array\n options = { :a => 1, :c => 2 }\n assert_equal options, validate_options(options, [:a, :b, :c])\n end\n\n def test_validate_options_raises_ArgumentError_if_given_an_unknown_option\n assert_raises(ArgumentError) { validate_options(Hash[c: 10], :b) }\n end\n\n def test_validate_options_does_not_add_options_without_default_to_the_returned_value\n assert_equal Hash.new, validate_options(Hash.new, :a, :b, :c)\n end\n\n def test_validate_options_sets_defaults\n assert_equal Hash[c: 10], validate_options(Hash.new, c: 10)\n end\n\n def test_validate_options_does_not_override_nil_by_the_default_value\n assert_equal Hash[c: nil], validate_options(Hash[c: nil], c: 10)\n end\n\n def test_validate_options_does_take_false_as_default_value\n assert_equal Hash[c: false], validate_options(Hash.new, c: false)\n end\n\n def test_validate_options_does_not_take_nil_as_a_default_value\n assert_equal Hash.new, validate_options(Hash.new, c: nil)\n end\n\n def test_validate_options_can_handle_string_keys\n assert_equal Hash[a: 10, c: nil], validate_options(Hash['c' => nil], 'a' => 10, :c => 10)\n end\n\n def test_filter_options_filters_keys_that_have_a_nil_value\n assert_equal [Hash[c: 10], Hash.new], filter_options(Hash[c: 10], c: nil)\n end\n\n def test_with_module\n obj = Object.new\n c0, c1 = nil\n mod0 = Module.new do\n const_set(:Const, c0 = Object.new)\n end\n mod1 = Module.new do\n const_set(:Const, c1 = Object.new)\n end\n\n eval_string = \"Const\"\n const_val = obj.with_module(mod0, mod1, eval_string)\n assert_equal(c0, const_val)\n const_val = obj.with_module(mod1, mod0, eval_string)\n assert_equal(c1, const_val)\n\n const_val = obj.with_module(mod0, mod1) { Const }\n assert_equal(c0, const_val)\n const_val = obj.with_module(mod1, mod0) { Const }\n assert_equal(c1, const_val)\n\n assert_raises(NameError) { Const }\n end\n\n module Mod\n module Submod\n class Klass\n end\n end\n\n const_set(:KnownConstant, 10)\n end\n\n def test_eval_dsl_file\n obj = Class.new do\n def real_method_called?; !!@real_method_called end\n def name(value)\n end\n def real_method\n @real_method_called = true\n end\n end.new\n\n Tempfile.open('test_eval_dsl_file') do |io|\n io.puts <<-EOD\n real_method\n if KnownConstant != 10\n raise ArgumentError, \"invalid constant value\"\n end\n class Submod::Klass\n def my_method\n end\n end\n name('test')\n unknown_method()\n EOD\n io.flush\n\n begin\n eval_dsl_file(io.path, obj, [], false)\n assert(obj.real_method_called?, \"the block has not been evaluated\")\n flunk(\"did not raise NameError for KnownConstant\")\n rescue NameError => e\n assert e.message =~ /KnownConstant/, e.message\n assert e.backtrace.first =~ /#{io.path}:2/, \"wrong backtrace when checking constant resolution: #{e.backtrace.join(\"\\n\")}\"\n end\n\n begin\n eval_dsl_file(io.path, obj, [Mod], false)\n flunk(\"did not raise NoMethodError for unknown_method\")\n rescue NoMethodError => e\n assert e.message =~ /unknown_method/\n assert e.backtrace.first =~ /#{io.path}:10/, \"wrong backtrace when checking method resolution: #{e.backtrace.join(\"\\n\")}\"\n end\n\n # instance_methods returns strings on 1.8 and symbols on 1.9. Conver\n # to strings to have the right assertion on both\n methods = Mod::Submod::Klass.instance_methods(false).map(&:to_s)\n assert(methods.include?('my_method'), \"the 'class K' statement did not refer to the already defined class\")\n end\n end\n\n def test_dsl_exec\n obj = Class.new do\n def real_method_called?; !!@real_method_called end\n def name(value)\n end\n def real_method\n @real_method_called = true\n end\n end.new\n\n begin\n dsl_exec(obj, [], false, &DSL_EXEC_BLOCK)\n assert(obj.real_method_called?, \"the block has not been evaluated\")\n flunk(\"did not raise NameError for KnownConstant\")\n rescue NameError => e\n assert e.message =~ /KnownConstant/, e.message\n expected = \"test_kernel.rb:12\"\n assert e.backtrace.first =~ /#{expected}/, \"wrong backtrace when checking constant resolution: #{e.backtrace.join(\"\\n\")}, expected #{expected}\"\n end\n\n begin\n dsl_exec(obj, [Mod], false, &DSL_EXEC_BLOCK)\n flunk(\"did not raise NoMethodError for unknown_method\")\n rescue NoMethodError => e\n assert e.message =~ /unknown_method/\n expected = \"test_kernel.rb:20\"\n assert e.backtrace.first =~ /#{expected}/, \"wrong backtrace when checking method resolution: #{e.backtrace[0]}, expected #{expected}\"\n end\n\n # instance_methods returns strings on 1.8 and symbols on 1.9. Conver\n # to strings to have the right assertion on both\n methods = Mod::Submod::Klass.instance_methods(false).map(&:to_s)\n assert(methods.include?('my_method'), \"the 'class K' statement did not refer to the already defined class\")\n end\n\n def test_load_dsl_file_loaded_features_beh", "num_tokens": 2048} {"category": "stack_edu-Ruby", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/stack_edu-Ruby/part-00-00000.npy", "text": " do |i|\n return_arr[i] = yield(self[i])\n end\n return_arr\n end\n\n def my_select\n return_arr = []\n length.times do |i|\n return_arr << self[i] if yield(self[i])\n end\n return_arr\n end\n\n def my_each\n length.times do |i|\n yield(self[i])\n end\n end\n\n end\nend<|endoftext|># require 'mechanize'\n\n# mechanize = Mechanize.new\n\n# page = mechanize.get('http://stackoverflow.com')\n\n# puts page.title\n\n# --------------------------\n\nrequire 'mechanize'\n\nmechanize = Mechanize.new\n\n# page = mechanize.get('http://bbc.co.uk/news')\n\n# puts page.title\n\n# puts page.at('.buzzard h3').text.strip\n\n# The #at method takes a CSS selector string and returns the first matching \n# node, in this case an h2 element. The #text method returns the textual \n# content inside the element, in this case the title of the top story. Try \n# changing the selector to see what other elements you can pick out of the \n# page. (The preceding was lifted from the website I found this tutorial \n# http://readysteadycode.com/howto-scrape-websites-with-ruby-and-mechanize as # is most of this.)\n\n# page = mechanize.get('http://en.wikipedia.org/wiki/Main_Page')\n\n# link = page.link_with(text: 'Random article')\n\n# page = link.click\n\n# puts page.uri\n\n# The #link_with method is provided by mechanize, and makes it easy to pull out\n# the random article link. The #click method instructs mechanize to follow the # link, and the #uri method returns the address of the page. Notice that \n# mechanize follows redirects automatically, so this example makes three HTTP # requests in total.\n\npage = mechanize.get('http://www.gov.uk')\n\nform = page.forms.first\n\nform['q'] = 'passport'\n\npage = form.submit\n\npage.search('#results h3').each do |h3|\n puts h3.text.strip\nend\n\n# Instead of searching by CSS selector we pick the first form on the page, and # set the value of the search field, just as if we had been using a web \n# browser directly. Then we submit the form and list out the top results.\n\n\n\n# Here's a list of suggested exercises from the tutorial about how to \n# proceed. \n\n# Write a script to count the number of links in a web page\n# Write a script to calculate the most popular keywords on a web page\n# Write a script to simulate a user logging in to your local Rails app\n# Use the microformats2 gem to parse the microformats2 examples\n# Adapt the search form example to search Wikipedia or Amazon<|endoftext|>require \"correios_slack_bot/version\"\nrequire \"correios_slack_bot/correios\"\nrequire \"slack-ruby-bot\"\n\nmodule CorreiosSlackBot\n class Bot < SlackRubyBot::Bot\n match /^exibe o pacote (?\\w*)$/ do |client, data, match|\n package_log = CorreiosSlackBot::Correios.new(match[:package_code]).package_log\n result = package_log.map do |log|\n {\n title: \"#{log[:date]} - #{log[:origin]}\",\n text: \"#{log[:description]} (#{log[:status]})\"\n }\n end\n client.web_client.chat_postMessage(\n channel: data.channel,\n as_user: true,\n attachments: result\n )\n end\n\n match /^rastreia o pacote (?\\w*)$/ do |client, data, match|\n package_log = CorreiosSlackBot::Correios.new(match[:package_code]).package_log\n known_package_log = package_log\n client.say(text: 'Blz, vou começar a rastrar, qualquer coisa te falo',\n channel: data.channel)\n loop do\n new_package_log = CorreiosSlackBot::Correios.new(match[:package_code]).package_log\n if (new_package_log - known_package_log).size > 0\n log = new_package_log[0]\n client.web_client.chat_postMessage(\n channel: data.channel,\n as_user: true,\n attachments: [\n {\n title: \"#{log[:date]} - #{log[:origin]}\",\n text: \"#{log[:description]} (#{log[:status]})\"\n }\n ]\n )\n known_package_log = new_package_log\n end\n sleep 30\n end\n end\n end\nend<|endoftext|>require 'spec_helper'\nrequire 'rspec/config_helper'\n\nBUCS = BroomUtil::Config::Simple\n\ncontext BroomUtil::Config::Simple do\n def get_simple_config\n BUCS.create do\n Option(:config, nil, ['-c', '--config=FILE', 'Configuration file to use'])\n Option(:time, 10, ['-t', '--time=TIME', Integer, 'Time int'])\n end\n end\n\n describe '.create' do\n it 'raises without a block' do\n expect {\n config = BUCS.create\n }.to raise_error(BroomUtil::ExpectationFailedError)\n end\n\n it 'creates a config with options' do\n sc = get_simple_config\n expect(sc.config).to have_key(:config)\n expect(sc.config[:config]).to be_nil\n expect(sc.config).to have_key(:time)\n expect(sc.config[:time]).to eq(10)\n end\n\n it 'accepts custom parsers' do\n parser_invoked = false\n outer = self\n sc = BUCS.create do\n Option :time, 10, ['-t', '--time=TIME', 'Time int'] do |cur,last|\n parser_invoked = true\n outer.expect(last).to outer.eq(10)\n outer.expect(cur).to outer.eq('15')\n cur.to_i\n end\n end # BUCS.create\n options = sc.parse! ['--time=15']\n expect(parser_invoked).to be true\n expect(options).to have_key(:time)\n expect(options[:time]).to eq(15)\n end\n\n it 'handles verbosity' do\n sc = BUCS.create do\n Option(:verbose, Logger::INFO, ['-v', '--[no-]verbose', 'Increase/Decrease verbosity'], :verbose)\n end\n options = sc.parse! ['-vvvvv']\n expect(options).to have_key(:verbose)\n expect(options[:verbose]).to eq(::Logging::LEVELS.values.min)\n\n options = sc.parse! ('--no-verbose '*5).strip.split\n expect(options).to have_key(:verbose)\n expect(options[:verbose]).to eq(::Logging::LEVELS.values.max)\n end\n end # describe '.create'\n\n describe '#parse!' do\n it 'parses short switches' do\n sc = get_simple_config\n options = sc.parse! ['-c', 'fizz', '-t', '20']\n expect(options).to have_key(:config)\n expect(options[:config]).to eq('fizz')\n expect(options).to have_key(:time)\n expect(options[:time]).to eq(20)\n end\n\n it 'parses long switches' do\n sc = get_simple_config\n options = sc.parse! ['--config=fuzz']\n expect(options).to have_key(:config)\n expect(options[:config]).to eq('fuzz')\n expect(options).to have_key(:time)\n expect(options[:time]).to eq(10)\n end\n\n it 'reuses defaults' do\n sc = get_simple_config\n options = sc.parse! ['--config=fizz', '--time=20']\n expect(options[:config]).to eq('fizz')\n expect(options[:time]).to eq(20)\n\n options = sc.parse! ['--config=fuzz']\n expect(options[:config]).to eq('fuzz')\n expect(options[:time]).to eq(10)\n end\n end # describe '#parse!'\nend<|endoftext|>#!/usr/bin/env ruby\n\nrequire 'rubygems'\nrequire 'commander/import'\nrequire 'json'\nrequire 'uri'\n\nprogram :name, 'wtm'\nprogram :version, '0.0.1'\nprogram :description, 'A commandline utility that provides tools for the conversion of web applications to their mobile counterparts'\n\ncommand :build do |c|\n c.syntax = 'wtm build [options]'\n c.summary = 'This command builds the mobile application'\n c.description = 'This command builds the mobile application from the URL provided'\n c.example 'description', 'command example'\n c.option '--name NAME',String,'This option specifies the app name'\n c.option '--platform NAME',String,'This option specifies the platform to build to'\n c.option '--url URL',String,'This option specifies the URL of the web app'\n c.action do |args, options|\n if options.url =~ /\\A#{URI::regexp(['http', 'https'])}\\z/ and options.platform =~ /android/i \n write_json options.name, options.url\n cmd = 'cd ' + File.expand_path('..') << '/Android/Web-to-mobile' << \"&& ./gradlew assembleDebug && cp #{File.expand_path('..')}/Android/Web-to-mobile/app/build/outputs/apk/app-debug.apk ~/Desktop\"\n puts", "num_tokens": 2048} {"category": "stack_edu-Ruby", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/stack_edu-Ruby/part-00-00000.npy", "text": " {title: \"List of tributes to Hank Williams\", listoflist_id: 3375, p_id: nil, game: false},\n {title: \"List of tributes to Marvin Gaye\", listoflist_id: 3375, p_id: nil, game: false},\n {title: \"List of UK hit singles by footballers\", listoflist_id: 3375, p_id: nil, game: false},\n {title: \"List of Hannah Montana songs\", listoflist_id: 3375, p_id: nil, game: false},\n {title: \"List of songs from Negima\", listoflist_id: 3375, p_id: nil, game: false},\n {title: \"List of Don Omar collaborations\", listoflist_id: 3375, p_id: nil, game: false},\n {title: \"List of songs in On the Record\", listoflist_id: 3375, p_id: nil, game: false},\n {title: \"List of Phineas and Ferb songs\", listoflist_id: 3375, p_id: nil, game: false},\n {title: \"List of political party songs\", listoflist_id: 3375, p_id: nil, game: false},\n {title: \"List of Runrig's Gaelic Songs\", listoflist_id: 3375, p_id: nil, game: false},\n {title: \"List of silent musical compositions\", listoflist_id: 3375, p_id: nil, game: false},\n {title: \"List of original Westlife songs\", listoflist_id: 3375, p_id: nil, game: false},\n {title: \"List of Wisin & Yandel collaborations\", listoflist_id: 3375, p_id: nil, game: false},\n {title: \"List of contemporary worship songs\", listoflist_id: 3375, p_id: nil, game: false},\n {title: \"List of Wow! Wow! Wubbzy! songs\", listoflist_id: 3375, p_id: nil, game: false},\n {title: \"List of Zecchino d'Oro songs\", listoflist_id: 3375, p_id: nil, game: false},\n {title: \"List of lists\", listoflist_id: 3375, p_id: nil, game: false},\n {title: \"List of Estonian television channels\", listoflist_id: 3379, p_id: nil, game: false},\n {title: \"List of Hungarian television channels\", listoflist_id: 3379, p_id: nil, game: false},\n {title: \"List of Icelandic television channels\", listoflist_id: 3379, p_id: nil, game: false},\n {title: \"List of Israeli television channels\", listoflist_id: 3379, p_id: nil, game: false},\n {title: \"List of Norwegian television channels\", listoflist_id: 3379, p_id: nil, game: false},\n {title: \"List of Turkish television channels\", listoflist_id: 3379, p_id: nil, game: false},\n {title: \"List of Singaporean television channels\", listoflist_id: 3379, p_id: nil, game: false},\n {title: \"List of fictional television stations\", listoflist_id: 3379, p_id: nil, game: false},\n {title: \"List of Appalachian dulcimer players\", listoflist_id: 3368, p_id: 22064, game: true},\n {title: \"List of adult television channels\", listoflist_id: 3388, p_id: nil, game: false},\n {title: \"List of television programs by name\", listoflist_id: 3388, p_id: nil, game: false},\n {title: \"List of television shows set in Chicago\", listoflist_id: 3388, p_id: nil, game: false},\n {title: \"List of television shows set in Miami\", listoflist_id: 3388, p_id: nil, game: false},\n {title: \"List of British television programmes\", listoflist_id: 3388, p_id: nil, game: false},\n {title: \"List of television shows set in London\", listoflist_id: 3388, p_id: nil, game: false},\n {title: \"List of British Invasion artists\", listoflist_id: 3368, p_id: 22148, game: true},\n {title: \"List of game shows\", listoflist_id: 3388, p_id: nil, game: false},\n {title: \"List of TV Westerns\", listoflist_id: 3388, p_id: nil, game: false},\n {title: \"List of animated television series\", listoflist_id: 3388, p_id: nil, game: false},\n {title: \"List of police shows\", listoflist_id: 3388, p_id: nil, game: false},\n {title: \"List of reality television programs\", listoflist_id: 3388, p_id: nil, game: false},\n {title: \"List of science fiction sitcoms\", listoflist_id: 3388, p_id: nil, game: false},\n {title: \"List of sketch comedy shows\", listoflist_id: 3388, p_id: nil, game: false},\n {title: \"List of soap operas\", listoflist_id: 3388, p_id: nil, game: false},\n {title: \"List of teen dramas\", listoflist_id: 3388, p_id: nil, game: false},\n {title: \"List of telenovelas\", listoflist_id: 3388, p_id: nil, game: false},\n {title: \"List of American television series\", listoflist_id: 3388, p_id: nil, game: false},\n {title: \"List of Australian television series\", listoflist_id: 3388, p_id: nil, game: false},\n {title: \"List of Austrian television series\", listoflist_id: 3388, p_id: nil, game: false},\n {title: \"List of Brazilian television series\", listoflist_id: 3388, p_id: nil, game: false},\n {title: \"List of Bulgarian television series\", listoflist_id: 3388, p_id: nil, game: false},\n {title: \"List of Canadian television series\", listoflist_id: 3388, p_id: nil, game: false},\n {title: \"List of Chinese television series\", listoflist_id: 3388, p_id: nil, game: false},\n {title: \"List of Colombian television series\", listoflist_id: 3388, p_id: nil, game: false},\n {title: \"List of Danish television series\", listoflist_id: 3388, p_id: nil, game: false},\n {title: \"List of Finnish television series\", listoflist_id: 3388, p_id: nil, game: false},\n {title: \"List of French television series\", listoflist_id: 3388, p_id: nil, game: false},\n {title: \"List of German television series\", listoflist_id: 3388, p_id: nil, game: false},\n {title: \"List of Hong Kong television series\", listoflist_id: 3388, p_id: nil, game: false},\n {title: \"List of Hungarian television series\", listoflist_id: 3388, p_id: nil, game: false},\n {title: \"List of Icelandic television series\", listoflist_id: 3388, p_id: nil, game: false},\n {title: \"List of Italian television series\", listoflist_id: 3388, p_id: nil, game: false},\n {title: \"List of Japanese television series\", listoflist_id: 3388, p_id: nil, game: false},\n {title: \"List of Lebanese television series\", listoflist_id: 3388, p_id: nil, game: false},\n {title: \"List of New Zealand television series\", listoflist_id: 3388, p_id: nil, game: false},\n {title: \"List of Norwegian television series\", listoflist_id: 3388, p_id: nil, game: false},\n {title: \"List of Philippine television shows\", listoflist_id: 3388, p_id: nil, game: false},\n {title: \"List of Polish television series\",", "num_tokens": 2048} {"category": "stack_edu-Ruby", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/stack_edu-Ruby/part-00-00000.npy", "text": " downloads file to current directory in /rr-downloads/\n arr = path.split('/')\n shortname = arr.pop\n puts \"Initiating Download of: #{shortname}\"\n File.open(shortname, 'wb') do |saved_file|\n open(path) do |read_file|\n saved_file.write(read_file.read)\n end\n end\n puts ' SUCCESS: Download Complete'\n end\n\n def autodownload\n # go through the fetched file URL collection and download each one.\n puts HR\n puts '### Initiating Autodownload...'\n puts HR\n puts \"#{@result.count} - #{@file_ext}'s Located\"\n puts HR\n move_to_download_dir\n iterate_thru_collection_and_download\n Dir.chdir('..')\n end\n\n private\n\n def iterate_thru_collection_and_download\n lenn = @result.count\n @result.each_with_index do |entry, i|\n begin\n download_file(entry)\n rescue StandardError\n puts \"ERROR: failed to download - #{entry}\"\n end\n lg(\" File [#{i + 1} of #{lenn}]\\n\")\n end\n end\n\n def move_to_download_dir(dir_name = 'rr-downloads')\n if File.directory?(dir_name)\n Dir.chdir(dir_name)\n else\n puts \"creating #{dir_name} Directory\"\n Dir.mkdir(dir_name)\n Dir.chdir(dir_name)\n end\n puts \"Downloading files to local directory: '/#{dir_name}/'\"\n end\n end\nend<|endoftext|># frozen_string_literal: true\n\nmodule Gitlab\n module Page\n module Main\n module SignUp\n # @note Defined as +text_field :first_name+\n # @return [String] The text content or value of +first_name+\n def first_name\n # This is a stub, used for indexing. The method is dynamically generated.\n end\n\n # Set the value of first_name\n # @example\n # Gitlab::Page::Main::SignUp.perform do |sign_up|\n # sign_up.first_name = 'value'\n # end\n # @param value [String] The value to set.\n def first_name=(value)\n # This is a stub, used for indexing. The method is dynamically generated.\n end\n\n # @example\n # Gitlab::Page::Main::SignUp.perform do |sign_up|\n # expect(sign_up.first_name_element).to exist\n # end\n # @return [Watir::TextField] The raw +TextField+ element\n def first_name_element\n # This is a stub, used for indexing. The method is dynamically generated.\n end\n\n # @example\n # Gitlab::Page::Main::SignUp.perform do |sign_up|\n # expect(sign_up).to be_first_name\n # end\n # @return [Boolean] true if the +first_name+ element is present on the page\n def first_name?\n # This is a stub, used for indexing. The method is dynamically generated.\n end\n\n # @note Defined as +text_field :last_name+\n # @return [String] The text content or value of +last_name+\n def last_name\n # This is a stub, used for indexing. The method is dynamically generated.\n end\n\n # Set the value of last_name\n # @example\n # Gitlab::Page::Main::SignUp.perform do |sign_up|\n # sign_up.last_name = 'value'\n # end\n # @param value [String] The value to set.\n def last_name=(value)\n # This is a stub, used for indexing. The method is dynamically generated.\n end\n\n # @example\n # Gitlab::Page::Main::SignUp.perform do |sign_up|\n # expect(sign_up.last_name_element).to exist\n # end\n # @return [Watir::TextField] The raw +TextField+ element\n def last_name_element\n # This is a stub, used for indexing. The method is dynamically generated.\n end\n\n # @example\n # Gitlab::Page::Main::SignUp.perform do |sign_up|\n # expect(sign_up).to be_last_name\n # end\n # @return [Boolean] true if the +last_name+ element is present on the page\n def last_name?\n # This is a stub, used for indexing. The method is dynamically generated.\n end\n\n # @note Defined as +text_field :username+\n # @return [String] The text content or value of +username+\n def username\n # This is a stub, used for indexing. The method is dynamically generated.\n end\n\n # Set the value of username\n # @example\n # Gitlab::Page::Main::SignUp.perform do |sign_up|\n # sign_up.username = 'value'\n # end\n # @param value [String] The value to set.\n def username=(value)\n # This is a stub, used for indexing. The method is dynamically generated.\n end\n\n # @example\n # Gitlab::Page::Main::SignUp.perform do |sign_up|\n # expect(sign_up.username_element).to exist\n # end\n # @return [Watir::TextField] The raw +TextField+ element\n def username_element\n # This is a stub, used for indexing. The method is dynamically generated.\n end\n\n # @example\n # Gitlab::Page::Main::SignUp.perform do |sign_up|\n # expect(sign_up).to be_username\n # end\n # @return [Boolean] true if the +username+ element is present on the page\n def username?\n # This is a stub, used for indexing. The method is dynamically generated.\n end\n\n # @note Defined as +text_field :email+\n # @return [String] The text content or value of +email+\n def email\n # This is a stub, used for indexing. The method is dynamically generated.\n end\n\n # Set the value of email\n # @example\n # Gitlab::Page::Main::SignUp.perform do |sign_up|\n # sign_up.email = 'value'\n # end\n # @param value [String] The value to set.\n def email=(value)\n # This is a stub, used for indexing. The method is dynamically generated.\n end\n\n # @example\n # Gitlab::Page::Main::SignUp.perform do |sign_up|\n # expect(sign_up.email_element).to exist\n # end\n # @return [Watir::TextField] The raw +TextField+ element\n def email_element\n # This is a stub, used for indexing. The method is dynamically generated.\n end\n\n # @example\n # Gitlab::Page::Main::SignUp.perform do |sign_up|\n # expect(sign_up).to be_email\n # end\n # @return [Boolean] true if the +email+ element is present on the page\n def email?\n # This is a stub, used for indexing. The method is dynamically generated.\n end\n\n # @note Defined as +text_field :password+\n # @return [String] The text content or value of +password+\n def password\n # This is a stub, used for indexing. The method is dynamically generated.\n end\n\n # Set the value of password\n # @example\n # Gitlab::Page::Main::SignUp.perform do |sign_up|\n # sign_up.password = 'value'\n # end\n # @param value [String] The value to set.\n def password=(value)\n # This is a stub, used for indexing. The method is dynamically generated.\n end\n\n # @example\n # Gitlab::Page::Main::SignUp.perform do |sign_up|\n # expect(sign_up.password_element).to exist\n # end\n # @return [Watir::TextField] The raw +TextField+ element\n def password_element\n # This is a stub, used for indexing. The method is dynamically generated.\n end\n\n # @example\n # Gitlab::Page::Main::SignUp.perform do |sign_up|\n # expect(sign_up).to be_password\n # end\n # @return [Boolean] true if the +password+ element is present on the page\n def password?\n # This is a stub, used for indexing. The method is dynamically generated.\n end\n\n # @note Defined as +button :register+\n # Clicks +register+\n def register\n # This is a stub, used for indexing. The method is dynamically generated.\n end\n\n # @example\n # Gitlab::Page::Main::SignUp.perform do |sign_up|\n # expect(sign_up.register_element).to exist\n # end\n # @return [Watir::Button] The raw +Button+ element\n def register_element\n # This is a stub, used for indexing. The method is dynamically generated.\n end\n\n # @example\n # Gitlab::Page::Main::SignUp.perform do |sign_up|\n # expect(sign_up).to be_register\n # end\n # @return [Boolean] true if the +register+ element is present on", "num_tokens": 2048} {"category": "stack_edu-Ruby", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/stack_edu-Ruby/part-00-00000.npy", "text": " |item| errors = Line.check_all_errors(errors, item) }\n else\n puts file_exist?(path)\n end\n end\n\n def self.start_lint_dir(path, errors)\n if dir_exist?(path) == true\n files = find_files(path)\n if files.is_a?(String)\n puts files\n else\n files.each { |item| start_lint(item, errors) }\n end\n else\n puts dir_exist?(path)\n end\n end\n\n def self.start_root_lint(files, errors)\n files.each { |item| start_lint(item, errors) }\n end\nend<|endoftext|># encoding: utf-8\nrequire './models/product.rb'\nrequire './models/customer_information.rb'\nProduct.delete_all\n\nitems = []\n\nitems.push :name => '可口可乐', :unit => '瓶', :price => 3.00,:number => 1, :information => '这是好喝的饮料',:promoted => 'true'\nitems.push :name => '雪碧', :unit => '瓶', :price => 3.00,:number => 1, :information => '这是好喝的饮料',:promoted => 'true'\nitems.push :name => '苹果', :unit => '斤', :price => 5.50, :number => 1,:information => '这是酸甜的水果',:promoted => 'false'\nitems.push :name => '荔枝', :unit => '斤', :price => 15.00,:number => 1, :information => '这个水果不能久放',:promoted => 'false'\nitems.push :name => '电池', :unit => '个', :price => 2.00, :number => 1,:information => '旧电池要谨慎回收',:promoted => 'false'\nitems.push :name => '方便面', :unit => '袋', :price => 4.50, :number => 1,:information => '上火车必备',:promoted => 'false'\n\nitems.each do |item|\n puts Product.create item\nend\n\n\n\nCustomer_information.delete_all\n\ncustomItems = []\n\ncustomItems.push :countname => \"xxj@qq.com\",:password => \"111111\",:name => \"xxj\",:address => \"fuck\",:phone => \"123445678\"\n\ncustomItems.each do |customItems|\n puts Customer_information.create customItems\nend<|endoftext|>require_relative \"spec_helper\"\n\ndescribe Sherlock::Lexer do\n def token(*args)\n Sherlock::Lexer::Token.new(*args)\n end\n\n it \"finds opening parens\" do\n lexer = Sherlock::Lexer.new(\"(\")\n expect(lexer.next).to eq(token(:paren, \"(\"))\n end\n\n it \"finds lambdas\" do\n lexer = Sherlock::Lexer.new(\"lambda\")\n expect(lexer.next).to eq(token(:keyword, \"lambda\"))\n end\n\n it \"finds closing parens\" do\n lexer = Sherlock::Lexer.new(\")\")\n expect(lexer.next).to eq(token(:paren, \")\"))\n end\n\n it \"finds constant 0\" do\n lexer = Sherlock::Lexer.new(\"0\")\n expect(lexer.next).to eq(token(:constant, \"0\"))\n end\n\n it \"finds constant 1\" do\n lexer = Sherlock::Lexer.new(\"1\")\n expect(lexer.next).to eq(token(:constant, \"1\"))\n end\n\n it \"finds if0s\" do\n lexer = Sherlock::Lexer.new(\"if0\")\n expect(lexer.next).to eq(token(:keyword, \"if0\"))\n end\n\n it \"finds folds\" do\n lexer = Sherlock::Lexer.new(\"fold\")\n expect(lexer.next).to eq(token(:keyword, \"fold\"))\n end\n\n it \"finds not\" do\n lexer = Sherlock::Lexer.new(\"not\")\n expect(lexer.next).to eq(token(:unary, \"not\"))\n end\n\n it \"finds shl1\" do\n lexer = Sherlock::Lexer.new(\"shl1\")\n expect(lexer.next).to eq(token(:unary, \"shl1\"))\n end\n\n it \"finds shr1\" do\n lexer = Sherlock::Lexer.new(\"shr1\")\n expect(lexer.next).to eq(token(:unary, \"shr1\"))\n end\n\n it \"finds shr4\" do\n lexer = Sherlock::Lexer.new(\"shr4\")\n expect(lexer.next).to eq(token(:unary, \"shr4\"))\n end\n\n it \"finds shr16\" do\n lexer = Sherlock::Lexer.new(\"shr16\")\n expect(lexer.next).to eq(token(:unary, \"shr16\"))\n end\n\n it \"finds and\" do\n lexer = Sherlock::Lexer.new(\"and\")\n expect(lexer.next).to eq(token(:binary, \"and\"))\n end\n\n it \"finds or\" do\n lexer = Sherlock::Lexer.new(\"or\")\n expect(lexer.next).to eq(token(:binary, \"or\"))\n end\n\n it \"finds xor\" do\n lexer = Sherlock::Lexer.new(\"xor\")\n expect(lexer.next).to eq(token(:binary, \"xor\"))\n end\n\n it \"finds plus\" do\n lexer = Sherlock::Lexer.new(\"plus\")\n expect(lexer.next).to eq(token(:binary, \"plus\"))\n end\n\n it \"finds variables\" do\n lexer = Sherlock::Lexer.new(\"apples34\")\n expect(lexer.next).to eq(token(:variable, \"apples34\"))\n end\n\n it \"discards whitespace\" do\n lexer = Sherlock::Lexer.new(\"( and )\")\n lexer.next\n expect(lexer.next).to eq(token(:binary, \"and\"))\n end\n\n it \"allows you to peek ahead at tokens\" do\n lexer = Sherlock::Lexer.new(\"(not x)\")\n paren = lexer.peek\n expect(lexer.next).to eq(paren)\n end\n\n it \"lexes a program\" do\n lexer = Sherlock::Lexer.new(<<-END_SEXP)\n (lambda (x_10327)\n (fold x_10327 0 (lambda (x_10327 x_10328)\n (xor (plus (shl1 x_10327) x_10328) 1))))\n END_SEXP\n [ token(:paren, \"(\"),\n token(:keyword, \"lambda\"),\n token(:paren, \"(\"),\n token(:variable, \"x_10327\"),\n token(:paren, \")\"),\n token(:paren, \"(\"),\n token(:keyword, \"fold\"),\n token(:variable, \"x_10327\"),\n token(:constant, \"0\"),\n token(:paren, \"(\"),\n token(:keyword, \"lambda\"),\n token(:paren, \"(\"),\n token(:variable, \"x_10327\"),\n token(:variable, \"x_10328\"),\n token(:paren, \")\"),\n token(:paren, \"(\"),\n token(:binary, \"xor\"),\n token(:paren, \"(\"),\n token(:binary, \"plus\"),\n token(:paren, \"(\"),\n token(:unary, \"shl1\"),\n token(:variable, \"x_10327\"),\n token(:paren, \")\"),\n token(:variable, \"x_10328\"),\n token(:paren, \")\"),\n token(:constant, \"1\"),\n token(:paren, \")\"),\n token(:paren, \")\"),\n token(:paren, \")\"),\n token(:paren, \")\"),\n nil\n ].each do |token|\n expect(lexer.next).to eq(token)\n end\n end\nend<|endoftext|>class Epoch < Struct::new(:fromdate,:thrudate)\n def self.default_epochs_array\n [ Epoch.new( Date.parse('2000-01-01') ,Date.parse('2012-12-31') ),\n Epoch.new( Date.parse('1990-01-01') ,Date.parse('1999-12-31') ),\n Epoch.new( Date.parse('1980-01-01') ,Date.parse('1989-12-31') ),\n Epoch.new( Date.parse('1970-01-01') ,Date.parse('1979-12-31') ) ]\n end\nend<|endoftext|>filename = ARGV.first\n\nopenfile = open(filename, 'w')\n\nputs \"Add your new text: \"\nnewtext = $stdin.gets.chomp\n\nopenfile.write(newtext)\n\nopenfile.close<|endoftext|>class EmailValidator < ActiveModel::EachValidator\n def validate_each(record, attribute, value)\n unless value =~ /\\A([^@\\s]+)@((?:[-a-z0-9]+\\.)+[a-z]{2,})\\z/i\n record.errors.add attribute, (options[:message] || \"is not an email\")\n end\n end\nend\n\n\nclass Employee < ApplicationRecord\n validates :nombres, :apellidos, :telefono, :email, :cargo, :salario, :departamento, presence: true\n ", "num_tokens": 2048} {"category": "stack_edu-Ruby", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/stack_edu-Ruby/part-00-00000.npy", "text": "row to the Vendor as well as review data.\n #\n # @param complete_order [Hash]\n # @return [Hash] containing: \"success\" => true or false\n # @see https://gist.github.com/drwasho/bd4b28a5a07c5a952e2f#post-complete_order\n def complete_order(complete_order = {}); JSON[Api::post_complete_order(complete_order, self)]; end\n \n # Changes the settings of the node and pushes them to the database.\n #\n # @param settings [Hash]\n # @return [Hash] containing: \"success\" => true or false\n # @see https://gist.github.com/drwasho/bd4b28a5a07c5a952e2f#post-settings\n def update_settings(settings = {}); JSON[Api::post_settings(settings, self)]; end\n \n # Returns the settings of your node.\n #\n # @return [Hash]\n # @see https://gist.github.com/drwasho/742505589f62f6aa98b4#get-settings\n def settings; JSON[Api::get_settings(self)]; end\n \n # Undocumented\n #\n # @return [Hash]\n def connected_peers; JSON[Api::get_connected_peers(self)]; end\n \n # Retreive a history of all notifications your node has received. Notifications can be sent due to:\n # * A node following you\n # * Events related to a purchase or sale\n #\n # @param FIXME not yet supported, future: limit-[number of most recent notifications]\n # * Default is unlimited\n # * Counts from most recent\n # @return [Hash]\n # @see https://gist.github.com/drwasho/742505589f62f6aa98b4#get-notifications\n def notifications; JSON[Api::get_notifications(self)]; end\n \n # Retrieves all chat message received from other nodes.\n #\n # @param chat_messages [Hash] containing:\n # * guid [String] target node, required\n # * limit [Integer] max number of chat messages to return (ignored)\n # * start [FIXME] the starting point in the message list\n # @return [Hash]\n # @see https://gist.github.com/drwasho/742505589f62f6aa98b4#get-get_chat_messages\n def chat_messages(chat_messages = {}); JSON[Api::get_chat_messages(chat_messages, self)]; end\n \n # Retreives a list of outstandng conversations.\n #\n # @return [Hash]\n # @see https://gist.github.com/drwasho/742505589f62f6aa98b4#get-get_chat_conversations\n def chat_conversations; JSON[Api::get_chat_conversations(self)]; end\n \n # Undocumented\n #\n # @return [Hash]\n def delete_chat_conversation(delete_chat_conversation); JSON[Api::delete_chat_conversation(delete_chat_conversation, self)]; end\n \n # Retrieves any sales made by the node.\n #\n # @return [Hash]\n # @see https://gist.github.com/drwasho/742505589f62f6aa98b4#get-get_sales\n def sales; JSON[Api::get_sales(self)]; end\n \n # Retrieves any purchases made by the node.\n #\n # @return [Hash]\n # @see https://gist.github.com/drwasho/742505589f62f6aa98b4#get-get_purchases\n def purchases; JSON[Api::get_purchases(self)]; end\n \n # Undocumented\n #\n # @return [Hash]\n def order(order); JSON[Api::get_order(order, self)]; end\n \n # Undocumented\n #\n # @return [Hash]\n def cases; JSON[Api::get_cases(self)]; end\n \n # Undocumented\n #\n # @return [Hash]\n def order_messages(order_messages); JSON[Api::get_order_messages(order_messages, self)]; end\n \n # Undocumented\n #\n # @return [Hash]\n def ratings(ratings); JSON[Api::get_ratings(ratings, self)]; end\n \n # Marks a notification as read in the database.\n #\n # @param notification [Hash] containing id:\n # * 40 character hex string\n # * Every notification has an ID that must be referenced in order to mark as read\n # @return [Hash] containing: \"success\" => true or false\n # @see https://gist.github.com/drwasho/bd4b28a5a07c5a952e2f#post-mark_notification_as_read\n def mark_notification_as_read(notification = nil); JSON[Api::post_mark_notification_as_read(notification, self)]; end\n \n # Sends some kind of \"Twitter-like\" message to all nodes that are following\n # you. This call can take a while to complete.\n #\n # @return [Hash] containing:\n # * \"success\" => true or false\n # * \"peers_reached\" => [number reached]\n # @see https://gist.github.com/drwasho/bd4b28a5a07c5a952e2f#post-broadcast\n def broadcast(message = {}); JSON[Api::post_broadcast(message, self)]; end\n \n # Undocumented\n #\n # @return [Hash]\n def btc_price; JSON[Api::get_btc_price(self)]; end\n \n # Undocumented\n #\n # @return [Hash]\n def routing_table; JSON[Api::get_routing_table(self)]; end\n \n # Marks all chat messages with a specific node as read in the database.\n #\n # @param chat_message_as_read [Hash] containing:\n # * guid [String] GUID of the party you are chatting with\n # @return [Hash] containing:\n # * \"success\" => true or false\n # @see https://gist.github.com/drwasho/bd4b28a5a07c5a952e2f#post-mark_chat_message_as_read\n def mark_chat_message_as_read(mark_chat_message_as_read = nil); JSON[Api::post_mark_chat_message_as_read(mark_chat_message_as_read, self)]; end\n \n # Sends a Twitter-like message to all nodes that are following you.\n #\n # @param check_for_payment [Hash] containing:\n # * order_id [Integer]\n # @return [Hash] containing:\n # * \"success\" => true or false\n # @see https://gist.github.com/drwasho/bd4b28a5a07c5a952e2f#post-check_for_payment\n def check_for_payment(check_for_payment); JSON[Api::post_check_for_payment(check_for_payment, self)]; end\n \n # Undocumented\n #\n # @param dispute_contract [Hash] containing:\n # * order_id [Integer]\n # @return [Hash] \n def dispute_contract(dispute_contract = nil); JSON[Api::post_dispute_contract(dispute_contract, self)]; end\n \n # Undocumented\n #\n # @param dispute_contract [Hash] containing:\n # * order_id [Integer]\n # * resolution [String]\n # * buyer_percentage [Float]\n # * vendor_percentage [Float]\n # * moderator_percentage [Float]\n # * moderator_address [String]\n # @return [Hash] \n def close_dispute(close_dispute = nil); JSON[Api::post_close_dispute(close_dispute, self)]; end\n \n # Undocumented\n #\n # @return [Hash] \n def release_funds(release_funds = nil); JSON[Api::post_release_funds(release_funds, self)]; end\n \n # Undocumented\n #\n # @return [Hash] \n def refund(refund = nil); JSON[Api::post_refund(refund, self)]; end\n \n # Undocumented\n #\n # @return [Hash] \n def mark_discussion_as_read(mark_discussion_as_read = nil); JSON[Api::post_mark_discussion_as_read(mark_discussion_as_read, self)]; end\n \n # API call to cleanly disconnect from connected nodes and shutsdown the OpenBazaar server component.\n #\n # @return nil\n # @see https://gist.github.com/drwasho/742505589f62f6aa98b4#get-shutdown\n def shutdown!\n Api::get_shutdown(self)\n end\n end\nend<|endoftext|>DOUBLE_DIGITS = [0, 2, 4, 6, 8, 1, 3, 5, 7, 9]\n\n\nclass Luhn\n\n def test_it a, start_at, max_len\n total = 0\n double_digit = false\n i = start_at + max_len - 1\n while i >= start_at\n total += double_digit ? DOUBLE_DIGITS[a[i]] : a[i]\n double_digit = !double_digit\n i", "num_tokens": 2048} {"category": "stack_edu-Ruby", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/stack_edu-Ruby/part-00-00000.npy", "text": " 4 5'\n\n puts header\n arr.each do |num|\n puts line\n puts \"#{num} | #{b_hash[[1, num]]} | #{b_hash[[2, num]]} | #{b_hash[[3, num]]} | #{b_hash[[4, num]]} | #{b_hash[[5, num]]} |\"\n end\n\n puts line\n puts ''\n puts \"#{ships.destroyer[:name]}: #{ships.destroyer[:status]} #{ships.cruiser[:name]}: #{ships.cruiser[:status]} #{ships.battleship[:name]}: #{ships.battleship[:status]} \"\n puts ''\n end\n\n def check_hit(loc)\n ship_locations.each do |x|\n x.each do |y|\n if loc == y\n b_hash[loc] = 'X'\n check_ship_status\n return nil\n end\n end\n b_hash[loc] = '/'\n end\n end\n\n def check_ship_status\n ships.battleship[:status] = 'Dead' if b_hash[ships.battleship_loc[0]] == 'X' && b_hash[ships.battleship_loc[1]] == 'X' && b_hash[ships.battleship_loc[1]] == 'X'\n ships.cruiser[:status] = 'Dead' if b_hash[ships.cruiser_loc[0]] == 'X' && b_hash[ships.cruiser_loc[1]] == 'X'\n ships.destroyer[:status] = 'Dead' if b_hash[ships.destroyer_loc[0]] == 'X'\n end\n\n def check_lost\n if ships.cruiser[:status] == 'Dead' && ships.destroyer[:status] == 'Dead' && ships.battleship[:status] == 'Dead'\n return true\n end\n false\n end\nend\n\n# creates ships and places in locations\nclass Ship\n attr_accessor :battleship_loc, :cruiser_loc, :destroyer_loc, :battleship, :destroyer, :cruiser\n\n def initialize\n place_ships\n @battleship = { status: 'Alive', name: 'Battleship' }\n @cruiser = { status: 'Alive', name: 'Cruiser' }\n @destroyer = { status: 'Alive', name: 'Destroyer' }\n end\n\n def place_ships\n possibles = []\n self.cruiser_loc = []\n (1..5).each do |x|\n (1..5).each_cons(3) { |y| possibles << [x].product(y) }\n end\n self.battleship_loc = possibles.delete(possibles.sample)\n self.cruiser_loc = possibles.delete(possibles.sample)\n self.cruiser_loc = cruiser_loc.each_cons(2).to_a.sample\n self.destroyer_loc = possibles.delete(possibles.sample)\n self.destroyer_loc = destroyer_loc.each_cons(1).to_a.sample\n end\nend\n\n# implements game engine\nclass Game\n attr_reader :player, :computer, :computer_play\n attr_accessor :current_player\n\n def initialize\n @player = Player.new('Johnny Arcade')\n @computer = Player.new('R2D2')\n @computer_play = (1..5).to_a.product((1..5).to_a)\n @current_player = player\n end\n\n def show_boards\n system 'clear'\n player.board.draw_board\n computer.board.draw_board\n end\n\n def player_moves(c_board)\n puts 'Please select a square (such as 3, 5) to open fire!'\n loop do\n selection = gets.chomp\n if selection[0].to_i == 0 || selection[1] != ',' || selection[2] != ' ' || selection[3] .to_i == 0 || selection.size > 4\n puts 'INVALID FORMAT, TRY AGAIN'\n elsif selection[0].to_i > 5 || selection[0].to_i < 1 || selection[3].to_i > 5 || selection[3].to_i < 1\n puts 'OUT OF RANGE, TRY AGAIN'\n elsif c_board.b_hash[[selection[0].to_i, selection[3].to_i]] != ' '\n puts 'NOT AN EMPTY SQUARE, TRY AGAIN'\n else\n c_board.check_hit([selection[0].to_i, selection[3].to_i])\n break\n end\n end\n end\n\n def computer_moves(p_board)\n move = computer_play.delete(computer_play.sample)\n p_board.check_hit(move)\n end\n\n def someone_won?(p_board, c_board)\n if c_board.check_lost\n puts \"Congratulations #{player.name} has won game!\"\n return true\n elsif p_board.check_lost\n puts \"#{computer.name} has won the game!\"\n return true\n else\n return false\n end\n end\n\n def play\n show_boards\n loop do\n player_moves(computer.board)\n show_boards\n computer_moves(player.board)\n show_boards\n break if someone_won?(player.board, computer.board)\n end\n end\nend\n\ngame = Game.new\ngame.play<|endoftext|># Class for the videos. Contains the methods for adding and getting the videos.\nclass Video < ActiveRecord::Base\n self.primary_key = :video_id\n validates :title, presence: true, length: { maximum: 255 }, uniqueness: { case_sensitive: false }\n\n # Creates/Adds a new video\n #\n # @param id [Decimal] id of the video to be added\n # @param title [String] title of the video to be added\n # @return [true, false] true if the video was added, false otherwise\n def self.create_new(id, title)\n video = new(title: title, video_id: id)\n return true if video.save\n return false\n end\n\n # Gets the video id given its title\n #\n # @param video_title [String] the title of the video\n # @return [Decimal] video.video_id if the video exist\n # @return [Null] if the video does not exist\n def self.get_video_id video_title\n \tvideo = where(\"lower(title) = ?\", video_title.downcase).first\n return video.video_id unless video.nil? # video not yet in database\n return nil\n end\n\nend<|endoftext|>require \"interface\"\n\nmodule Interface\n module DSL\n def defsettings(configuration_class)\n if !configuration_class.is_a?(Class) || !configuration_class.is_a?(Module)\n fail(::Interface::Errors::UnexpectedInstanceError.new('Only classes and modules are supported'))\n end\n\n @settings ||= configuration_class\n end\n\n def returns(result_adapter)\n @result_adapter = result_adapter\n end\n\n def interface(name, &block)\n if interfaces.key?(name)\n fail(::Interface::Errors::ImmutableInterfaceError.new(\"Interface can't be redefined or reopened! Use .extend_api method\"))\n end\n\n interfaces.merge!(name => ::Interface::PortGroup.new(name, self).tap do |group|\n group.instance_eval(&block)\n end)\n end\n\n def defpoint(_name, &block)\n check_top_level_enpoint_policy\n\n points.merge!(_name => define_entity(_name, &block))\n end\n\n def method_missing(meth, *args, &block)\n super unless respond_to?(:interfaces) || respond_to?(:points)\n\n if interfaces.respond_to?(meth)\n interfaces.send(meth)\n elsif points.respond_to?(meth)\n points.send(meth)\n else\n super\n end\n end\n\n # extend_api(as: 'northbound.operations.truck_load', with_class: TruckLoadAPI)\n def extend_api(as: , with_class: )\n # Maybe Define just a nested interface???\n _merge_point = respond_to?(:points) ? points : self\n\n _merge_point.merge!(as => with_class)\n end\n\n def doc\n _name = self.respond_to?(:name) ? self.name : self.class.name\n puts _name\n doc_all_endpoints\n interfaces.each_pair { |_, i| i.doc }\n end\n\n def interfaces\n @interfaces ||= Hashie::Mash.new\n end\n\n def points\n @points ||= Hashie::Mash.new\n end\n\n def _interface_adapter\n @result_adapter || _settings.config.response_adapter\n end\n\n def _settings\n @settings || ::Interface::DefaultSettings\n end\n\n private\n\n def check_top_level_enpoint_policy\n return if _settings.config.allow_top_level_api_endpoints? || !top_level?\n\n fail(::Interface::Errors::OrphanPortError.new(\"Can not be defined as a top level Interface\"))\n end\n\n def top_level?\n if respond_to?(:parent)\n parent.nil? && interfaces.empty?\n else\n interfaces.empty?\n end\n end\n\n def doc_all_endpoints\n traverse_all(points, print_doc)\n end\n\n def traverse_all(collection, execute_block)\n collection.each_pair { |name, i| execute_block.call(i) }\n end\n\n def print_doc\n @print_doc ||= ->(i) { i.doc }\n end\n\n def define_entity(_name, &block)\n ::Interface::PortEntity.new", "num_tokens": 2048} {"category": "stack_edu-Ruby", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/stack_edu-Ruby/part-00-00000.npy", "text": " truncate(model_klass, table_name)\n end\n end\n\n def populate_hotels_data\n Rails.logger.info \"--- Populating Hotels data\"\n load_seeds_data(\"hotels\").values.each do |data|\n hotel = Hotel.new(name: data[\"name\"], minimum_stay: data[\"minimum_stay\"])\n hotel.build_picture(image_url: data[\"cover_picture\"])\n hotel.save!\n\n data[\"room_types\"].each do |rt_data|\n room_type = hotel.room_types.create(name: rt_data[\"name\"],\n occupancy_limit: rt_data[\"occupancy_limit\"],\n quantity: rt_data[\"quantity\"],\n base_rate: rt_data[\"base_rate\"])\n\n if rt_data[\"rates_schedule\"].present?\n room_type.room_type_rate_schedules.create(rt_data[\"rates_schedule\"])\n end\n end\n \n \n \n\n\n # Update status of Hotels that are ready to accept bookings\n hotel.active!\n end\n end\n\n\n # Load seeds data of a given entity/ model\n def load_seeds_data(table_name)\n seed_file = Rails.root.join('db','seeds_data',\"#{table_name}.yml\")\n YAML::load_file(seed_file)\n end\n\n # Truncate table of a given entity/ model\n def truncate(model_klass, table_name)\n model_klass.connection.truncate(model_klass.table_name)\n end\n end\n\nend\n\n\nDataSeed.populate_seeds_data<|endoftext|>require File.dirname(__FILE__) + '/spec_helper.rb'\n\ndef successed? code\n 200 <= code and code < 400\nend\n\n# This spec quotes from the LWP::Simple documents.\ndescribe LWR::Simple do\n\n describe \"get()\" do\n it \"should be going to fetch the document identified by the given URL and return it.\" do\n doc = LWR::Simple.get(\"http://www.google.com/\")\n doc.should_not be_nil\n doc.should_not be_empty\n doc.should be_an_instance_of(String)\n doc.should match(/google/)\n end\n it \"should nil if this method fails.\" do\n LWR::Simple.get(\"http://www.notexists.com/\").should be_nil\n end\n it \"should URL argument can be either a String's instance.\" do\n LWR::Simple.get(nil).should be_nil\n LWR::Simple.get(URI(\"http://www.google.com/\")).should be_nil\n end\n end\n\n describe \"head()\" do\n it \"should get document headers. Returns the following 5 values if successful: ($content_type, $document_length, $modified_time, $expires, $server)\" do\n h = LWR::Simple.head(\"http://www.google.com/\")\n h.should_not be_nil\n h.should_not be_empty\n h.should be_an_instance_of(Array)\n h.should have(5).items\n end\n it \"should returns an empty list if this method fails.\" do\n LWR::Simple.head(\"http://www.notexists.com/\").should have(0).items\n end\n end\n\n describe \"getprint()\" do\n before do\n @stdout = $>\n @stderr = $stderr\n end\n after do\n $> = @stdout\n $stderr = @stderr\n end\n it \"should get and print a document identified by a URL. The document is printed to the selected default filehandle for output (normally STDOUT) as data is received from the network.\" do\n m = mock(\"out\")\n m.should_receive(:write) do |arg|\n # +arg+ is printed a document as String instance.\n arg.should be_an_instance_of(String)\n arg.should_not be_empty\n end\n $> = m\n code = LWR::Simple.getprint(\"http://www.google.com/\")\n successed?(code).should be_true\n end\n it \"should if the request fails, then the status code and message are printed on STDERR. The return value is the HTTP response code.\" do\n m = mock(\"err\")\n m.should_receive(:write).any_number_of_times # $stderr object requires #write method. (In fact, it is not called.)\n m.should_receive(:puts) do |arg|\n # +arg+ is printed a document as String instance.\n arg.should be_an_instance_of(String)\n arg.should_not be_empty\n end\n $stderr = m\n LWR::Simple.getprint(\"http://www.notexists.com/\").should == 404\n end\n end\n\n describe \"getstore()\" do\n after do\n File.delete(\"g.html\") if FileTest.exist?(\"g.html\")\n end\n it \"should gets a document identified by a URL and stores it in the file. The return value is the HTTP response code.\" do\n code = LWR::Simple.getstore(\"http://www.google.com/\", \"g.html\")\n File.open(\"g.html\") {|f| f.read.should match(/google/) }\n successed?(code).should be_true\n end\n end\n\n describe \"mirror()\" do\n after do\n File.delete(\"logo.gif\") if FileTest.exist?(\"logo.gif\")\n end\n it \"should get and store a document identified by a URL, using If-modified-since, and checking the Content-Length. Returns the HTTP response code.\" do\n code = LWR::Simple.mirror(\"http://www.ruby-lang.org/images/logo.gif\", \"logo.gif\")\n FileTest.exist?(\"logo.gif\").should be_true\n successed?(code).should be_true\n code = LWR::Simple.mirror(\"http://www.ruby-lang.org/images/logo.gif\", \"logo.gif\")\n FileTest.exist?(\"logo.gif\").should be_true\n successed?(code).should be_true\n end\n end\n\nend<|endoftext|>class Robot\n FACING = {north: 0, east: 1, south: 2, west: 3}\n TABLE_SIZE = 4\n\n def initialize\n @x = 0\n @y = 0\n @f = :north\n @placed = false\n end\n\n def place(in_x, in_y, in_f)\n in_x = in_x.to_i\n in_y = in_y.to_i\n in_f = in_f.downcase.to_sym\n\n if (0..TABLE_SIZE).include?(in_x) &&\n (0..TABLE_SIZE).include?(in_y) &&\n FACING[in_f]\n @x = in_x.to_i\n @y = in_y.to_i\n @f = in_f\n @placed = true\n end\n end\n\n def left\n if @placed\n @f == :north ? @f = :west : @f = FACING.key(FACING[@f] - 1)\n end\n end\n\n def right\n if @placed\n @f == :west ? @f = :north : @f = FACING.key(FACING[@f] + 1)\n end\n end\n\n def move\n if @placed\n if @f == :north && @y != TABLE_SIZE\n @y += 1\n elsif @f == :east && @x != TABLE_SIZE\n @x += 1\n elsif @f == :south && @y != 0\n @y -= 1\n elsif @f == :west && @x != 0\n @x -= 1\n end\n end\n end\n\n def report\n \"#{@x},#{@y},#{@f.to_s.upcase}\" if @placed\n end\nend<|endoftext|>###########################################################################\n# Copyright (C) 2010 by Paul Betts #\n# paul.betts@gmail.com #\n# #\n# This program is free software; you can redistribute it and/or modify #\n# it under the terms of the GNU General Public License as published by #\n# the Free Software Foundation; either version 2 of the License, or #\n# (at your option) any later version. #\n# #\n# This program is distributed in the hope that it will be useful, #\n# but WITHOUT ANY WARRANTY; without even the implied warranty of #\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the #\n# GNU General Public License for more details. #\n# #\n# You should have received a copy of the GNU General Public License #\n# along with this program; if not, write to the #\n# Free Software Foundation, Inc., #\n# 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. #\n###########################################################################\n\nrequire 'lib/boot'\n\nrequire 'lib/types'\nrequire 'lib/importers'\n\nclass MintEvent < Event\n include TextSupport\n key :text, String\n key :format, Integer\n\n key :mint_description, String\n key :mint_orig_description, String\n key :mint_amount, Float\n key :mint_transactiontype, Integer\n key :mint_category, Integer\n\n # Transaction constants\n DebitTransaction = 1\n CreditTransaction = 2\n MaximumTransactionValue = 3\n\n def mint_transactiontype_sym\n return :debit if self.mint_transactiontype == DebitTransaction\n return :credit if self.mint_transactiontype == CreditTransaction\n :unknown\n end\n\n def content_hash\n Digest::", "num_tokens": 2048} {"category": "stack_edu-Ruby", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/stack_edu-Ruby/part-00-00000.npy", "text": "name, value)\n @data[name] = value\n end\n\n protected :stopped, :continue\n\nend<|endoftext|>module Kredentials\n\n def self.extended(cls)\n cls.cattr_accessor(:config_env)\n cls.config_env = nil\n end\n\n %W[production development test staging].each do |environment|\n self.send(:define_method, \"#{environment}\") do\n self.class_variable_defined?(\"@@#{environment}\") ? class_eval(\"@@#{environment}\") : {} \n end\n end\n\n self.send(:define_method, :to_hash) do\n hash = self.class_variable_defined?('@@defaults') ? self.class_eval(\"@@defaults\").clone : {}\n env = self.config_env || Rails.env\n hash.merge!(self.class_eval(\"@@#{env}\")) if self.class_variable_defined?(\"@@#{env}\")\n HashWithIndifferentAccess.new(hash)\n end\n\n def method_missing(method)\n value =\n case self.config_env || Rails.env\n when 'production'\n self.production[method.to_sym]\n when 'staging'\n self.staging[method.to_sym] || self.development[method.to_sym]\n when 'test'\n self.test[method.to_sym]\n else\n self.development[method.to_sym]\n end\n return value || (self.class_variable_defined?('@@defaults') ?\n self.class_eval(\"@@defaults\")[method.to_sym] : nil)\n end\n\nend<|endoftext|>class UrlParser\n \n ParsedText = Struct.new(:title, :book_id)\n\n def self.parse(url)\n url = url.split(\"_\")\n title = url.first\n if subtitle = title.index(\"--\")\n url = [title[0..(subtitle - 1)], url.last]\n end\n return ParsedText.new(url.first.strip, url.last.to_i)\n end\nend<|endoftext|># @author grekz\nclass E973_KClosestPointstoOrigin\n # @param {Integer[][]} points\n # @param {Integer} k\n # @return {Integer[][]}\n def k_closest(points, k)\n points.sort { |a,b| a[0]**2 + a[1]**2 - (b[0]**2 + b[1]**2)}[0, k]\n end\nend<|endoftext|>class GoogleUserFacade\n def self.find_user(id)\n user_attributes = GoogleUsersService.find_user(id)\n formatted = user_attributes[:data][:attributes]\n GoogleUser.new(formatted)\n end\n\n def self.user(user_info)\n\n id = user_info[:roommate][:google_id]\n response = GoogleUsersService.find_by_guid(id)\n\n if response[:status] == 404 #eventually other errors\n user_attributes = GoogleUsersService.create_or_find_user(user_info)\n formatted = user_attributes[:data][:attributes]\n GoogleUser.new(formatted)\n else\n formatted = response[:body][:data][:attributes]\n GoogleUser.new(formatted)\n end\n end\n\n def self.update_user(user_info)\n # binding.pry\n user_attributes = GoogleUsersService.update_user(user_info)[:data][:attributes]\n GoogleUser.new(user_attributes)\n end\nend<|endoftext|>require 'set'\nrequire 'pry-byebug'\nIMPACT_FACTORS = {\n A: 1,\n C: 2,\n G: 3,\n T: 4\n}\nP = [2, 5, 0]\nQ = [4, 5, 6]\nS = 'CAGCCTA'\n\n\n\ndef solution(sequence, queries_p, queries_q)\n idxs_by_impact = {\n }\n min_loads = []\n queries_p.zip(queries_q).each do |qp, qq|\n subsequence = sequence[qp..qq]\n min_loads << find_minimum_load(subsequence)\n end\n return min_loads\nend\n\ndef find_minimum_load(sequence)\n min_impact = 5\n sequence.chars.each do |char|\n impact = IMPACT_FACTORS[char.to_sym]\n min_impact = impact if impact < min_impact\n return min_impact if min_impact == 1\n end\n min_impact\nend\n\n\n# Cant remember where I found this below solution\ndef faster_solution(s, p, q)\n nucleotides_to_impact_factors = { 'A' => 1, 'C' => 2, 'G' => 3, 'T' => 4 }\n sequence_of_impact_factors = s.each_char.map { |n| nucleotides_to_impact_factors[n] }\n idx = -1\n prefix_max_a_idxs = sequence_of_impact_factors.map.with_index { |f, i| idx = i if f == 1; idx }\n idx = -1\n prefix_max_c_idxs = sequence_of_impact_factors.map.with_index { |f, i| idx = i if f == 2; idx }\n idx = -1\n prefix_max_g_idxs = sequence_of_impact_factors.map.with_index { |f, i| idx = i if f == 3; idx }\n\n p sequence_of_impact_factors\n p prefix_max_a_idxs\n p prefix_max_c_idxs\n p prefix_max_g_idxs\n\n p.zip(q).map do |(i, j)|\n binding.pry\n if prefix_max_a_idxs[j] >= i\n 1\n elsif prefix_max_c_idxs[j] >= i\n 2\n elsif prefix_max_g_idxs[j] >= i\n 3\n else\n 4\n end\n end\nend\n\nfaster_solution('CAGCCTA', [2, 5, 0], [4, 5, 6])<|endoftext|>require 'net/http'\nrequire 'uri'\n\nrequire 'oauth_lib'\n\n\nclass OAuthClient\n def initialize(conf)\n @conf = conf\n end\n\n def make_oauth_request(uri, method, auth_header, client_secret, request_secret)\n\n # get header signature\n oauth_signature = OAuthLib::create_signature(client_secret, request_secret, \"HMAC-SHA1\", uri, method, auth_header)\n auth_header[:oauth_signature] = oauth_signature\n puts oauth_signature\n\n\n uri = URI.parse(uri)\n http = Net::HTTP.new(uri.host, uri.port)\n\n req = case method.upcase\n when 'GET' then Net::HTTP::Get.new(uri.path + \"?#{uri.query}\")\n when 'POST' then Net::HTTP::Post.new(uri.path + \"?#{uri.query}\")\n end\n\n # set header\n header = OAuthLib::auth_header auth_header\n puts header\n req[\"Authorization\"] = header\n\n http.request(req)\n end\n\n def get_request_token()\n auth_header = {\n :oauth_consumer_key => @conf[:client_token][:key],\n :oauth_nonce => OAuthLib::new_nonce(),\n :oauth_signature_method => \"HMAC-SHA1\",\n :oauth_timestamp => OAuthLib::new_timestamp(),\n :oauth_callback => \"oob\",\n :oauth_version => \"1.0\",\n }\n make_oauth_request(@conf[:request_uri], \"POST\", auth_header, @conf[:client_token][:secret], \"\")\n end\n\n def get_access_token(request_token)\n auth_header = {\n :oauth_consumer_key => @conf[:client_token][:key],\n :oauth_nonce => OAuthLib::new_nonce(),\n :oauth_signature_method => \"HMAC-SHA1\",\n :oauth_timestamp => OAuthLib::new_timestamp(),\n :oauth_callback => \"oob\",\n :oauth_version => \"1.0\",\n :oauth_token => request_token[:key],\n }\n make_oauth_request(@conf[:access_uri], \"POST\", auth_header, @conf[:client_token][:secret], request_token[:secret])\n end\n\n def authenticated_call(access_token, call_endpoint)\n auth_header = {\n :oauth_consumer_key => @conf[:client_token][:key],\n :oauth_nonce => OAuthLib::new_nonce(),\n :oauth_signature_method => \"HMAC-SHA1\",\n :oauth_timestamp => OAuthLib::new_timestamp(),\n :oauth_callback => \"oob\",\n :oauth_version => \"1.0\",\n :oauth_token => access_token[:key],\n }\n make_oauth_request(call_endpoint, \"POST\", auth_header, @conf[:client_token][:secret], access_token[:secret])\n end\n\n\nend\n\nexample_conf = {\n :request_uri => \"http://term.ie/oauth/example/request_token.php\",\n :authorize_uri => \"\",\n :access_uri => \"http://term.ie/oauth/example/access_token.php\",\n :client_token => {\n :key => \"key\",\n :secret => \"secret\"\n }\n}\n\ngoogle_conf = {\n :request_uri => \"https://www.google.com/accounts/OAuthGetRequestToken\",\n :authorize_uri => \"https://www.google.com/accounts/OAuthAuthorizeToken\",\n :access_uri => \"https://www.google.com/accounts/OAuthGetAccessToken\",\n :client_token => {\n :key => \"\",\n :secret => \"\"\n }\n}\n\n# puts OAuthClient.new.make_oauth_request \"http://www.google.com/cos\", \"GET\", \"\"\n\noauth = OAuthClient.new(example_conf)\n\nresp_str = oauth.get_request_token\nresp = Hash[ resp_str.body.split(\"&\").map { |s| ps = s.split(\"=\"); [ps[0].to_sym, ps[1]] } ]\nputs resp\n\nreq_token = { :key => resp[:oauth_token], :secret => resp[:oauth_token_secret] }\nputs req_token\nresp_str = oauth.get_access_token req_token\n\nresp = Hash[ resp_str", "num_tokens": 2048} {"category": "stack_edu-Ruby", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/stack_edu-Ruby/part-00-00000.npy", "text": " => \"Clarendon Place\",\n \"telephone\" => 12345,\n \"email\" => \"morty@email.com\",\n \"age\" => 45\n })\nmember5.save()\n\nmember6 = Member.new({\n \"name\" => \"Jamie\",\n \"address\" => \"High Street\",\n \"telephone\" => 01234,\n \"email\" => \"jamie@email.com\",\n \"age\" => 40\n })\nmember6.save()\n\nbooking1 = Booking.new({\n \"member_id\" => member1.id,\n \"gymclass_id\" => gymclass1.id\n})\nbooking1.save()\n\nbooking2 = Booking.new({\n \"member_id\" => member2.id,\n \"gymclass_id\" => gymclass2.id\n})\n\nbooking2.save()\n\nbooking3 = Booking.new({\n \"member_id\" => member3.id,\n \"gymclass_id\" => gymclass3.id\n})\nbooking3.save()\n\nbooking4 = Booking.new({\n \"member_id\" => member4.id,\n \"gymclass_id\" => gymclass4.id\n})\n\nbooking4.save()\n\n\nbooking5 = Booking.new({\n # \"member_id\" => member1.id,\n \"member_id\" => member5.id,\n\"gymclass_id\" => gymclass1.id\n})\nbooking5.save()\n\n\nbooking6 = Booking.new({\n \"member_id\" => member6.id,\n \"gymclass_id\" => gymclass4.id\n})\n\nbooking6.save()\n\nbooking7 = Booking.new({\n \"member_id\" => member5.id,\n \"gymclass_id\" => gymclass4.id\n})\n\nbooking7.save()\n\n\nbooking8 = Booking.new({\n \"member_id\" => member6.id,\n \"gymclass_id\" => gymclass2.id\n})\n\nbooking8.save()\n\nbinding.pry\nnil<|endoftext|>##\n# Copyright (c) The Nambu Network Inc.\n#\n# Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation\n# files (the \"Software\"), to deal in the Software without restriction, including without limitation the rights to use, copy,\n# modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software\n# is furnished to do so, subject to the following conditions:\n#\n# The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.\n# \n# THE SOFTWARE IS PROVIDED \"AS IS\", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES\n# OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE\n# LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR\n# IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.\n##\n\n##\n# Trimmer() will tr.im the destination url you feed it, and do all the necessary database work as well. This function resides\n# here to support the user website, marklet, and API creation options.\n#\n# This was the first class written for the tr.im project. It seems now, a year later (as I write this) this is a bit ugly,\n# although I can't quite point to why. It works, anyway. The sequence: it seems there must be a more elegant way to track\n# that peristent integer value.\n#\n# Trimmer() will raise the following exceptions, or return the trim_url object for you. It may be a new tr.im URK or a repeat\n# for the same URL and same user account. You don't need to think about that here.\n# DomainErrorTooShort \n# DomainErrorBadSyntax\n# DomainErrorShortener\n# DomainErrorSpam\n# DomainErrorCustomInuse\n##\n\nrequire 'uri'\nrequire 'resolv'\n\nrequire 'trim_object'\nrequire 'top_level_domain'\nrequire 'url_shortener'\n \nclass Trimmer\n attr_reader :dest_url, :surl, :trim_url, :trim_url_existed\n attr_accessor :urls, :token, :url_return_id, :url_origin_id, :custom, :privacy, :searchtags, :user_id, :force_new\n\n def initialize(hash = Hash.new)\n hash.each do |key, value|\n self.instance_variable_set(\"@#{key}\", value)\n self.class.send(:define_method, key, proc{ self.instance_variable_get(\"@#{key}\") })\n self.class.send(:define_method, \"#{key}=\", proc{|value| self.instance_variable_set(\"@#{key}\", value) })\n end\n @urls ||= String.new\n @token ||= String.new\n @url_return_id ||= UrlReturn::REDIRECT\n @url_origin_id ||= UrlOrigin::TRIM\n @custom ||= String.new\n @privacy ||= String.new\n @searchtags ||= String.new \n @user_id ||= nil\n @force_new ||= false\n \n @dest_url ||= nil ## Ends up as UrlDestination()\n @surl ||= nil ## Ends up as UrlShortening()\n @trim_url ||= nil ## Ends up as TrimUrl()\n @trim_url_existed ||= false\n \n self.prepare_url\n end\n \n def Trimmer.prepare_destination_url(urls)\n urls.strip!\n urls.sub!(\"ftp://ftp://\", \"ftp://\")\n urls.sub!(\"http://http://\", \"http://\")\n urls.sub!(\"https://https://\", \"https://\")\n urls = \"http://#{urls}\" if (not urls.include?(\"://\")) && (not urls.start_with?(\"mailto\"))\n urls << \"/\" if (urls.index(\"/\", 10) == nil) && (not urls.include?(\"?\"))\n return urls\n end\n\n def valid_url?\n UrlDestination.new(:url => self.urls).valid_url?\n end\n def shortener_url?\n begin\n uri = URI.parse(self.get_url_qs_encoded(self.urls))\n rescue Exception => e then\n RAILS_DEFAULT_LOGGER.info e.inspect\n RAILS_DEFAULT_LOGGER.info \"URL Validation Failed ON SHORTENERS: Bad URL [#{self.urls}]\"\n return true\n end\n if uri\n for url_shortener in Rails.cache.fetch(\"url_shorteners\", :expires_in => 7200) { UrlShortener.find(:all, :order => \"domain\") }\n if uri.host == url_shortener.domain || uri.host.include?(\".#{url_shortener.domain}\")\n RAILS_DEFAULT_LOGGER.info \"SHORTENER MATCH on URI HOST: [#{uri.host} vs. #{url_shortener.domain}] ...\"\n return true if (urls.count(\"/\") < 4) && (urls.count(\"?\") == 0) && (urls.count(\"=\") == 0) && (urls.count(\"&\") == 0)\n end\n end\n end\n return false\n end\n def spam_url?\n begin\n uri = URI.parse(self.get_url_qs_encoded(self.urls))\n domain = self.get_domainname(uri.host)\n RAILS_DEFAULT_LOGGER.info \"SPAM Check DOMAIN [#{domain}]\"\n if UrlSpamDomain.exists?({ :domain => domain })\n RAILS_DEFAULT_LOGGER.info \"PRESENT in tr.im Spam Domains. SPAM!\"\n return true\n end\n rescue Exception => e then\n RAILS_DEFAULT_LOGGER.info e.inspect\n RAILS_DEFAULT_LOGGER.info \"URL Validation Failed: Bad URL ON SPAM [#{self.urls}]\"\n return false\n end\n return false\n end\n def custom_url_claimed?\n reserved = [\"account\", \"api\", \"application\", \"login\", \"redirect\", \"signup\", \"welcome\", \"photos\", \"browse\", \"events\", \"conversations\",\n \"comments\", \"review\", \"preview\", \"faqs\", \"reviews\", \"rss\", \"downloads\", \"logout\", \"nambu\", \"extras\", \"help\", \"picim\" ]\n reserved.each {|res| return true if res == self.custom.downcase }\n if self.custom.length\n return true if TrimUrl.exists?([\"custom = ?\", self.custom.downcase])\n return true if UrlShortening.exists?({ :shortener_id => UrlShortener::ID_TRIM, :surl => self.custom.downcase })\n end\n return false\n end\n \n def force_new?\n self.force_new\n end\n def trim_url_was_new?\n (not self.trim_url_existed)\n end\n \n def create_trim_url\n raise DomainErrorTooShort if self.urls.length < UrlDestination::MINIMUM_URL_LENGTH\n raise DomainErrorBadSyntax if not valid_url?\n raise DomainErrorShortener if shortener_url?\n raise DomainErrorSpam if spam_url?\n raise DomainErrorCustomInuse if (not self.custom.blank?) && custom_url_claimed?\n \n RAILS_DEFAULT_LOGGER.info \"Request to SHORTEN: [#{urls}]\"\n UrlDestination.transaction do\n if UrlDestination.exists?({ :url => urls })\n RAILS_DEFAULT_LOGGER.info \"Destination URL EXISTS [#{urls}]\"\n @dest_url = UrlDestination.first(:conditions => { :url => self.urls })\n else\n RAILS_DEFAULT_LOGGER.info \"Destination URL DOES NOT EXIST? [#{urls}]\"\n @dest_url = UrlDestination.create!(:url => self.urls)\n if Rails.production?\n RAILS_DEFAULT_LOGGER.info \"STARLING DESTINATION Q UPDATED [#{@dest_url.id}]\"\n end\n end\n end\n\n if self.dest_url && self.dest_url.trim_shortened_count == 0\n self.insert_trimmed_url\n\n ", "num_tokens": 2048} {"category": "stack_edu-Rust", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/stack_edu-Rust/part-00-00000.npy", "text": " {\n let map = TreeMap::new(input)?;\n let mut num_trees: usize = 0;\n\n for i in 0..map.height {\n let j = (3 * i) % map.width;\n\n if map.trees.contains(&(i, j)) {\n num_trees += 1;\n }\n }\n\n return Ok(num_trees);\n}\n\nfn part2(input: &Vec) -> Result> {\n let map = TreeMap::new(input)?;\n let slopes = vec![(1, 1), (1, 3), (1, 5), (1, 7), (2, 1)];\n let mut product = 1;\n\n for slope in slopes {\n product *= map.get_tree_collisions(slope);\n }\n\n Ok(product)\n}\n\n#[cfg(test)]\nmod tests {\n use super::*;\n\n #[test]\n fn new_tree_map() {\n let input = vec![\".##.\", \"....\", \"#.#.\"]\n .iter()\n .map(|&s| String::from(s))\n .collect();\n\n let map = TreeMap::new(&input).unwrap();\n\n assert_eq!(map.height, 3);\n assert_eq!(map.width, 4);\n assert!(map.trees.contains(&(0, 1)));\n assert!(map.trees.contains(&(0, 2)));\n assert!(map.trees.contains(&(2, 0)));\n assert!(map.trees.contains(&(2, 2)));\n }\n\n #[test]\n fn tree_map_collisions() {\n let input = vec![\n \"..##.......\",\n \"#...#...#..\",\n \".#....#..#.\",\n \"..#.#...#.#\",\n \".#...##..#.\",\n \"..#.##.....\",\n \".#.#.#....#\",\n \".#........#\",\n \"#.##...#...\",\n \"#...##....#\",\n \".#..#...#.#\",\n ]\n .iter()\n .map(|&s| String::from(s))\n .collect();\n\n let map = TreeMap::new(&input).unwrap();\n\n let collisions = map.get_tree_collisions((1, 3));\n assert_eq!(collisions, 7);\n }\n\n #[test]\n fn part1_tree_path() {\n let input = vec![\n \"..##.......\",\n \"#...#...#..\",\n \".#....#..#.\",\n \"..#.#...#.#\",\n \".#...##..#.\",\n \"..#.##.....\",\n \".#.#.#....#\",\n \".#........#\",\n \"#.##...#...\",\n \"#...##....#\",\n \".#..#...#.#\",\n ]\n .iter()\n .map(|&s| String::from(s))\n .collect();\n\n let num_trees = part1(&input).unwrap();\n\n assert_eq!(num_trees, 7);\n }\n\n #[test]\n fn part2_product() {\n let input = vec![\n \"..##.......\",\n \"#...#...#..\",\n \".#....#..#.\",\n \"..#.#...#.#\",\n \".#...##..#.\",\n \"..#.##.....\",\n \".#.#.#....#\",\n \".#........#\",\n \"#.##...#...\",\n \"#...##....#\",\n \".#..#...#.#\",\n ]\n .iter()\n .map(|&s| String::from(s))\n .collect();\n\n let product = part2(&input).unwrap();\n\n assert_eq!(product, 336);\n }\n}<|endoftext|>use std::collections::HashMap;\nuse std::hash::Hash;\n\nuse crate::core::election::*;\n\n#[derive(Hash, Eq, Clone, Copy, PartialEq, Debug)]\npub enum FakePresidentialElection {\n Donald,\n Alberto,\n Emmanuel,\n CoronaBoris,\n}\n\n#[test]\n#[should_panic(expected = \"No electors in this election!\")]\nfn test_election_no_election_without_electors() {\n let electors = [];\n let _election = Election::::new(&electors);\n}\n\n#[test]\n#[should_panic(expected = \"Elector doesn't exist!\")]\nfn test_election_elector_must_be_resgistered() {\n let electors = [String::from(\"jimi\")];\n let mut election = Election::::new(&electors);\n let fake_elector = String::from(\"jimbo\");\n election.vote(&fake_elector, FakePresidentialElection::Emmanuel);\n}\n\n#[test]\nfn test_election_elector_cannot_change_vote() {\n let electors = [String::from(\"jimi\")];\n let mut election = Election::::new(&electors);\n election.vote(&electors[0], FakePresidentialElection::CoronaBoris);\n election.vote(&electors[0], FakePresidentialElection::Emmanuel);\n assert_eq!(\n election.electors_votes[&electors[0]],\n Some(FakePresidentialElection::CoronaBoris)\n );\n}\n\n#[test]\nfn test_election_no_vote_counting_allowed_before_everyone_have_voted() {\n let electors = [\n String::from(\"jimi\"),\n String::from(\"pato\"),\n String::from(\"volan\"),\n ];\n let mut election = Election::::new(&electors);\n election.vote(&electors[0], FakePresidentialElection::Emmanuel);\n let election_vote_count = election.count_votes();\n assert!(election_vote_count.is_err());\n\n let mut election = election_vote_count.err().unwrap();\n election.vote(&electors[1], FakePresidentialElection::Donald);\n election.vote(&electors[2], FakePresidentialElection::Alberto);\n assert!(election.count_votes().is_ok());\n}\n\n#[test]\nfn test_election_nominal_case() {\n let electors = [\n String::from(\"jimi\"),\n String::from(\"pato\"),\n String::from(\"volan\"),\n ];\n let votes = [\n FakePresidentialElection::Donald,\n FakePresidentialElection::Alberto,\n FakePresidentialElection::CoronaBoris,\n ];\n let expected_election = votes.iter().clone().map(|v| (Some(*v), 1)).collect();\n\n let mut election = Election::::new(&electors);\n for (index, voter) in electors.iter().enumerate() {\n election.vote(&voter, votes[index]);\n }\n let election_result = election.count_votes().ok().unwrap();\n assert_eq!(*election_result.result(), expected_election);\n}<|endoftext|>use std::fmt::Debug;\n\nuse crate::ast::VerilogLiteral;\nuse crate::bits::{Bit, Bits};\nuse crate::clock::Clock;\n\n#[derive(Clone, PartialEq, Debug)]\npub enum VCDValue {\n Single(vcd::Value),\n Vector(Vec),\n String(String),\n}\n\nimpl From for VCDValue {\n fn from(x: bool) -> Self {\n if x {\n VCDValue::Single(vcd::Value::V1)\n } else {\n VCDValue::Single(vcd::Value::V0)\n }\n }\n}\n\npub trait Synth: Default + Copy + PartialEq + Debug {\n const BITS: usize;\n const ENUM_TYPE: bool = false;\n const TYPE_NAME: &'static str = \"Bits\";\n fn name(_ndx: usize) -> &'static str {\n \"\"\n }\n fn vcd(self) -> VCDValue;\n fn verilog(self) -> VerilogLiteral;\n}\n\nimpl Synth for Bits {\n const BITS: usize = N;\n\n fn vcd(self) -> VCDValue {\n self.into()\n }\n\n fn verilog(self) -> VerilogLiteral {\n self.into()\n }\n}\n\nimpl Synth for Bit {\n const BITS: usize = 1;\n\n fn vcd(self) -> VCDValue {\n if self {\n VCDValue::Single(vcd::Value::V1)\n } else {\n VCDValue::Single(vcd::Value::V0)\n }\n }\n\n fn verilog(self) -> VerilogLiteral {\n self.into()\n }\n}\n\nimpl Synth for Clock {\n const BITS: usize = 1;\n\n fn vcd(self) -> VCDValue {\n self.0.into()\n }\n\n fn verilog(self) -> VerilogLiteral {\n self.0.into()\n }\n}<|endoftext|>use sdl2::render::Renderer;\nuse sdl2::pixels::Color;\nuse sdl2::rect::Point;\n\npub struct GPU {\n pub vram: [u8; 0x2000], // Video RAM\n pub oam: [u8; 0x100], // Sprite Attrib Memory\n //pub lcd_control: u8,\n pub switchbg: bool,\n pub bg_map: bool,\n pub bg_tile: bool,\n pub lcd_on: bool,\n pub scanline: u8,\n pub scroll_x: u8,\n pub scroll_y: u8,\n pub win_x: u8,\n pub win_y: u8,\n gpu_mode: u8,\n gpu_ticks: u32,\n prev_ticks: u32,\n palette_b: [u8; 4],\n s_palette0: [u8; 4],\n s_palette1: [u8; 4],\n pixel_buffer:", "num_tokens": 2048} {"category": "stack_edu-Rust", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/stack_edu-Rust/part-00-00000.npy", "text": "error!(\n operator_gt,\n \"a {color: 5 - >;}\", \"Error: Expected expression.\"\n);\nerror!(\n operator_lt,\n \"a {color: 5 - <;}\", \"Error: Expected expression.\"\n);\nerror!(\n operator_ge,\n \"a {color: 5 - >=;}\", \"Error: Expected expression.\"\n);\nerror!(\n operator_le,\n \"a {color: 5 - <=;}\", \"Error: Expected expression.\"\n);\nerror!(\n operator_mul,\n \"a {color: 5 - *;}\", \"Error: Expected expression.\"\n);\nerror!(\n ends_with_single_eq,\n \"a {color: 1 =\", \"Error: expected \\\"=\\\".\"\n);\nerror!(\n nothing_after_gt,\n \"a {color: 1 >\", \"Error: Expected expression.\"\n);\nerror!(toplevel_eq_alone, \"=\", \"Error: expected \\\"{\\\".\");\nerror!(toplevel_gt_alone, \">\", \"Error: expected \\\"{\\\".\");\nerror!(toplevel_lt_alone, \"<\", \"Error: expected \\\"{\\\".\");\nerror!(toplevel_question_alone, \"?\", \"Error: expected \\\"{\\\".\");\nerror!(toplevel_caret_alone, \"^\", \"Error: expected \\\"{\\\".\");\ntest!(toplevel_gt_as_selector, \"> {}\", \"\");\ntest!(toplevel_tilde_as_selector, \"~ {}\", \"\");\nerror!(toplevel_lt_as_selector, \"< {}\", \"Error: expected selector.\");\nerror!(toplevel_pipe, \"| {}\", \"Error: Expected identifier.\");\nerror!(\n toplevel_question_as_selector,\n \"? {}\", \"Error: expected selector.\"\n);\nerror!(\n toplevel_caret_as_selector,\n \"^ {}\", \"Error: expected selector.\"\n);\nerror!(toplevel_eq, \"= {}\", \"Error: expected selector.\");\nerror!(value_after_style, \"a {}a\", \"Error: expected \\\"{\\\".\");\ntest!(whitespace_after_style, \"a {}\\t\\n \", \"\");\ntest!(toplevel_semicolon, \";\", \"\");\ntest!(toplevel_semicolon_after_style, \"a {};\", \"\");\nerror!(\n nothing_after_hash_in_interpolated_ident_body,\n \"a {color: foo#\", \"Error: Expected identifier.\"\n);\nerror!(\n at_else_alone,\n \"@else {}\", \"Error: This at-rule is not allowed here.\"\n);\nerror!(\n no_expression_for_variable,\n \"a {$color: {ed;}\", \"Error: Expected expression.\"\n);\nerror!(\n empty_style_value_no_semicolon,\n \"a {color:}\", \"Error: Expected expression.\"\n);\nerror!(\n empty_style_value_semicolon,\n \"a {color:;}\", \"Error: Expected expression.\"\n);\nerror!(ident_colon_closing_brace, \"r:}\", \"Error: expected \\\"{\\\".\");\nerror!(dollar_sign_alone, \"$\", \"Error: Expected identifier.\");\nerror!(\n nothing_after_dbl_quote,\n \"a {color: \\\"\", \"Error: Expected \\\".\"\n);\nerror!(nothing_after_sgl_quote, \"a {color: '\", \"Error: Expected '.\");\nerror!(\n invalid_binop_in_list,\n \"a {color: foo % bar, baz;}\", \"Error: Undefined operation \\\"foo % bar\\\".\"\n);\n// note: dart-sass has error \"Expected identifier.\"\nerror!(\n improperly_terminated_nested_style,\n \"a {foo: {bar: red\", \"Error: expected \\\"}\\\".\"\n);\nerror!(toplevel_nullbyte, \"\\u{0}\", \"Error: expected \\\"{\\\".\");\nerror!(\n toplevel_nullbyte_with_braces,\n \"\\u{0} {}\", \"Error: expected selector.\"\n);\nerror!(\n double_escaped_bang_at_toplevel,\n \"\\\\!\\\\!\", \"Error: expected \\\"{\\\".\"\n);\nerror!(\n nothing_after_escape_inside_brackets,\n \"a { color: [\\\\\", \"Error: Expected expression.\"\n);\nerror!(\n unclosed_bracketed_list,\n \"a { color: [a\", \"Error: expected \\\"]\\\".\"\n);\nerror!(\n nothing_after_backslash_in_possible_style,\n \"a {a \\\\\", \"Error: expected more input.\"\n);\nerror!(\n nothing_after_bang_in_variable_decl,\n \"$foo: !\", \"Error: Expected \\\"important\\\".\"\n);\nerror!(\n nothing_after_dot_in_value,\n \"a { color: .\", \"Error: Expected digit.\"\n);\nerror!(\n nothing_after_dot_in_value_preceded_by_plus_sign,\n \"a { color: +.\", \"Error: Expected digit.\"\n);\nerror!(\n nothing_after_dot_in_value_preceded_by_minus_sign,\n \"a { color: -.\", \"Error: Expected digit.\"\n);\nerror!(\n nothing_after_bang_in_space_separated_list,\n \"a { color: a !\", r#\"Error: Expected \"important\".\"#\n);<|endoftext|>use std::fmt;\nuse super::FileLocation;\n\n/// Token Object (data and FileLocation)\n#[derive(Debug, Clone)]\npub struct Token\n{\n pub location: FileLocation,\n pub data: String\n}\n\nimpl Token\n{\n /// Generate a new token object\n pub fn new(location: FileLocation, data: String) -> Self\n {\n Self\n {\n location,\n data\n }\n }\n}\n\nimpl fmt::Display for Token\n{\n fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result\n {\n write!(f, \"{:?}{}\\t{}\", self.data, if format!(\"{:?}\", self.data).len() >= 8 {\"\"} else {\"\\t\"}, self.location)\n }\n}<|endoftext|>use std::io;\n\n#[derive(Debug)]\nenum Direction {\n N,\n NE,\n SE,\n S,\n SW,\n NW,\n}\n\n#[derive(Debug, Default)]\nstruct State {\n x: i32,\n y: i32,\n z: i32,\n maximum_distance: i32,\n}\n\nimpl State {\n fn new() -> State {\n State::default()\n }\n\n fn go(&mut self, direction: Direction) {\n match direction {\n Direction::N => {\n self.x += 1;\n self.z -= 1;\n }\n Direction::NE => {\n self.x += 1;\n self.y -= 1;\n }\n Direction::SE => {\n self.z += 1;\n self.y -= 1;\n }\n Direction::S => {\n self.z += 1;\n self.x -= 1;\n }\n Direction::SW => {\n self.y += 1;\n self.x -= 1;\n }\n Direction::NW => {\n self.y += 1;\n self.z -= 1;\n }\n }\n self.update_maximum_distance();\n }\n\n fn update_maximum_distance(&mut self) {\n for distance in [self.x.abs(), self.y.abs(), self.z.abs()].iter() {\n if *distance > self.maximum_distance {\n self.maximum_distance = *distance;\n }\n }\n }\n\n fn fewest_steps(&self) -> i32 {\n *[self.x.abs(), self.y.abs(), self.z.abs()]\n .iter()\n .max()\n .unwrap()\n }\n}\n\nfn parse_line(input: &str) -> Vec {\n let mut steps = Vec::new();\n\n let directions: Vec<&str> = input.split(',').collect();\n for direction in directions {\n match direction {\n \"n\" => {\n steps.push(Direction::N);\n }\n \"ne\" => {\n steps.push(Direction::NE);\n }\n \"se\" => {\n steps.push(Direction::SE);\n }\n \"s\" => {\n steps.push(Direction::S);\n }\n \"sw\" => {\n steps.push(Direction::SW);\n }\n \"nw\" => {\n steps.push(Direction::NW);\n }\n _ => {}\n }\n }\n\n steps\n}\n\nfn main() {\n let mut input = String::new();\n\n io::stdin().read_line(&mut input).unwrap();\n //println!(\"input = {:?}\", input);\n\n let directions = parse_line(input.trim());\n //println!(\"directions = {:?}\", directions);\n\n let mut state = State::new();\n\n for direction in directions {\n state.go(direction);\n }\n //println!(\"state = {:?}\", state);\n\n println!(\"fewest steps = {}\", state.fewest_steps());\n println!(\"maximum distance = {}\", state.maximum_distance);\n}<|endoftext|>use crate::Terminal;\nuse crate::Document;\nuse crate::Row;\nuse termion::event::Key;\nuse termion::color;\nuse std::env;\nuse std::time::Duration;\nuse std::time::Instant;\n\nconst STATUS_BACK_COLOR: color::Rgb = color::Rgb(239, 239, 239);\nconst STATUS_FRONT_COLOR: color::Rgb = color::Rgb(63, 63, 63);\n\npub struct Editor{\n should_quit: bool,\n terminal: Terminal,\n cursor_position: Position,\n offset: Position,\n document: Document,\n status: Status,\n}\n\n#[derive(Default)]\npub struct Position {\n pub x: usize,\n pub y: usize,\n}\n\nstruct Status {\n text: String,\n time: Instant,\n}\nimpl Status {\n fn from(message: String) -> Self {\n Self {\n time: Instant::now(),\n text: message,\n }\n }\n}\n\nimpl Editor {\n pub fn run(&mut self) {\n loop {\n if let Err(error) = self.refresh_screen() {\n die(error);\n }\n if self.should_quit {\n break;\n }\n if let Err(err) = self.process_keypress() {\n die(err);\n }\n }\n }\n\n pub fn default() -> Self {\n let args: Vec (Complex64, usize) {\n\n\t\tlet mut count: usize = 0;\n\t\tlet mut sum = Complex64::new(0.0, 0.0);\n\t\tlet mut xPower = Complex64::new(1.0, 0.0);\n\n\t\tfor coeff in self {\n\n\t\t\tsum = sum + (coeff * xPower);\n\t\t\txPower = xPower * x;\n\t\t\tcount += 2;\n\n\t\t}\n\n\t\treturn (sum, count);\n\n\t}\n\n\tfn evaluateAtFFT(&self) -> (Vec, usize) {\n\n\t\tlet mut count: usize = 0;\n\t\tlet n = self.len();\n\n\t\t//base case\n\t\tif n == 1 {\n\n\t\t\treturn (vec![self[0]], count);\n\n\t\t} else if n == 0 {\n\n\t\t\treturn (vec![], count);\n\n\t\t}\n\n\t\t//split the list into even and odd pairs\n\t\tlet mut even = Polynomial::new();\n\t\tlet mut odd = Polynomial::new();\n\n\t\tfor (i, coeff) in self.iter().enumerate() {\n\n\t\t\tif (i % 2) == 0 {\n\n\t\t\t\teven.push(*coeff);\n\n\t\t\t} else {\n\n\t\t\t\todd.push(*coeff);\n\n\t\t\t}\n\n\t\t}\n\n\t\t//evaluate the evens and odds\n\t\tlet (e, eCount) = even.evaluateAtFFT();\n\t\tlet (d, dCount) = odd.evaluateAtFFT();\n\n\t\tcount += eCount + dCount;\n\n\t\t//calculate the new answers\n\t\tlet mut answer = Vec::with_capacity(n);\n\t\tunsafe {answer.set_len(n);}\n\n\t\tfor k in 0..n / 2 {\n\n\t\t\tlet root = rootOfUnity(n as i32, k as i32);\n\t\t\tlet right = root * d[k];\n\t\t\tcount += 1;\n\n\t\t\tlet y0 = e[k] + right;\n\t\t\tlet y1 = e[k] - right;\n\n\t\t\tanswer[k] = y0;\n\t\t\tanswer[k + (n / 2)] = y1;\n\n\t\t}\n\n\t\treturn (answer, count);\n\n\t}\n\n}\n\n#[cfg(test)]\nmod tests {\n\n\tuse super::*;\n\tuse num_complex::Complex64;\n\n\tconst TOLERANCE: f64 = 0.0001;\n\n\tfn compare_within_tolerance(left: &Polynomial, right: &Polynomial){\n\n\t\tif left.len() != right.len() {\n\n\t\t\tpanic!(\"Lengths are not equal. Left: {:?}, Right: {:?}\", left, right);\n\n\t\t}\n\n\t\tfor i in 0..left.len() {\n\n\t\t\tlet diff = left[i] - right[i];\n\n\t\t\tlet diffReal = diff.re.abs();\n\t\t\tlet diffImag = diff.im.abs();\n\n\t\t\tif diffReal > TOLERANCE {\n\n\t\t\t\tpanic!(\"Difference on real part {} is greater than tolerance {}. Index: {}, Left: {:?}, Right: {:?}\", diffReal, TOLERANCE, i, left, right);\n\n\t\t\t} else if diffImag > TOLERANCE {\n\n\t\t\t\tpanic!(\"Difference on imag part {} is greater than tolerance {}. Index: {}, Left: {:?}, Right: {:?}\", diffImag, TOLERANCE, i, left, right);\n\n\t\t\t}\n\n\t\t}\n\n\t}\n\n\t#[test]\n\tfn test_roots_of_unity(){\n\n\t\tlet roots = rootsOfUnity(1);\n\t\tcompare_within_tolerance(&roots, &vec![Complex64::new(1.0, 0.0)]);\n\n\t\tlet roots = rootsOfUnity(2);\n\t\tcompare_within_tolerance(&roots, &vec![Complex64::new(1.0, 0.0), Complex64::new(-1.0, 0.0)]);\n\n\t\tlet roots = rootsOfUnity(4);\n\t\tcompare_within_tolerance(&roots, &vec![Complex64::new(1.0, 0.0), Complex64::new(0.0, 1.0), Complex64::new(-1.0, 0.0), Complex64::new(0.0, -1.0)]);\n\n\t}\n\n\t#[test]\n\tfn test_read_file(){\n\n\t\tlet result = Polynomial::readFromFile(&\"./data/file_valid.txt\".to_string()).unwrap();\n\t\tassert_eq!(result, vec![Complex64::new(1.0,0.0), Complex64::new(2.0,3.25), Complex64::new(3.25,1.0)]);\n\n\t}\n\n\t#[test]\n\tfn test_read_file_nonexistant(){\n\n\t\tlet result = Polynomial::readFromFile(&\"./data/file_nonexistant.txt\".to_string());\n\t\tassert_eq!(result, Err(\"Failed to open file.\".to_string()));\n\n\t}\n\n\t#[test]\n\tfn test_read_file_zero_degree(){\n\n\t\tlet result = Polynomial::readFromFile(&\"./data/file_valid_zero_degree.txt\".to_string()).unwrap();\n\t\tassert_eq!(result, Vec::new());\n\n\t}\n\n\t#[test]\n\tfn test_read_file_invalid_has_junk_degree(){\n\n\t\tlet result = Polynomial::readFromFile(&\"./data/file_invalid_has_junk_degree.txt\".to_string());\n\t\tassert_eq!(result, Err(\"Parsing failed. Invalid syntax \\'junk\\' in file.\".to_string()));\n\n\t}\n\n\t#[test]\n\tfn test_read_file_invalid_has_junk_coeffs(){\n\n\t\tlet result = Polynomial::readFromFile(&\"./data/file_invalid_has_junk.txt\".to_string());\n\t\tassert_eq!(result, Err(\"Parsing failed. Invalid syntax \\'junk\\' in file.\".to_string()));\n\n\t}\n\n\t#[test]\n\tfn test_read_file_invalid_has_more_coeffs(){\n\n\t\tlet result = Polynomial::readFromFile(&\"./data/file_invalid_more_coeffs.txt\".to_string());\n\t\tassert_eq!(result, Err(\"Incorrect number of coefficients, 4 instead of 3.\".to_string()));\n\n\t}\n\n\t#[test]\n\tfn test_random_poly(){\n\n\t\tlet result = Polynomial::random(3, 5.0).unwrap();\n\t\tassert_eq!(result.len(), 3);\n\n\t}\n\n\t#[test]\n\tfn test_random_poly_zero_degree(){\n\n\t\tlet result = Polynomial::random(-1, 5.0);\n\t\tassert_eq!(result, Err(\"You can't have a polynomial of degree less than zero.\".to_string()));\n\n\t}\n\n\t#[test]\n\tfn test_random_poly_zero_range(){\n\n\t\tlet result = Polynomial::random(3, -5.0);\n\t\tassert_eq!(result, Err(\"Range is negative or zero.\".to_string()));\n\n\t}\n\n\t#[test]\n\tfn test_evaluate_naive(){\n\n\t\tlet poly \t= Polynomial::readFromFile(&\"data/test.txt\".to_string()).unwrap();\n\t\tlet answer \t= Polynomial::readFromFile(&\"data/test_answers.txt\".to_string()).unwrap();\n\t\tlet roots = rootsOfUnity(poly.len() as i32);\n\n\t\tlet mut attempt = Vec::with_capacity(poly.len());\n\t\tlet mut counts = 0;\n\n\t\tfor root in roots {\n\n\t\t\tlet (value, count) = poly.evaluateAtNaive(root);\n\t\t\tattempt.push(value);\n\t\t\tcounts += count;\n\n\t\t}\n\n\t\tcompare_within_tolerance(&attempt, &answer);\n\t\tassert_eq!(counts, 40);\n\n\t}\n\n\t#[test]\n\tfn test_evaluate_horner(){\n\n\t\tlet poly \t= Polynomial::readFromFile(&\"data/test.txt\".to_string()).unwrap();\n\t\tlet answer \t= Polynomial::readFromFile(&\"data/test_answers.txt\".to_string()).unwrap();\n\t\tlet roots = rootsOfUnity(poly.len() as i32);\n\n\t\tlet mut attempt = Vec::with_capacity(poly.len());\n\t\tlet mut counts = 0;\n\n\t\tfor root in roots {\n\n\t\t\tlet (value, count) = poly.evaluateAtHorner(root);\n\t\t\tattempt.push(value);\n\t\t\tcounts += count;\n\n\t\t}\n\n\t\tcompare_within_tolerance(&attempt, &answer);\n\t\tassert_eq!(counts, 16);\n\n\t}\n\n\t#[test]\n\tfn test_evaluate_naive_improved(){\n\n\t\tlet poly \t= Polynomial::readFromFile(&\"data/test.txt\".to_string()).unwrap();\n\t\tlet answer \t= Polynomial::readFromFile(&\"data/test_answers.txt\".to_string()).unwrap();\n\t\tlet roots = rootsOfUnity(poly.len() as i32);\n\n\t\tlet mut attempt = Vec::with_capacity(poly.len());\n\t\tlet mut counts = 0;\n\n\t\tfor root in roots {\n\n\t\t\tlet(value, count) = poly.evaluateAtNaiveImproved(root);\n\t\t\tattempt.push(value);\n\t\t\tcounts += count;\n\n\t\t}\n\n\t\tcompare_within_tolerance(&attempt, &answer);\n\t\tassert_eq!(counts, 32);\n\n\t}\n\n\t#[test]\n\tfn test_evaluate_fft(){\n\n\t\tlet poly \t= Polynomial::readFromFile(&\"data/test.txt\".to_string()).unwrap();\n\t\tlet answer \t= Polynomial::readFromFile(&\"data/test_answers.txt\".to_string()).unwrap();\n\t\tlet (attempt, count) = poly.evaluateAtFFT();\n\n\t\tcompare_within_tolerance(&attempt, &answer);\n\t\tassert_eq!(count, 4);\n\n\t}\n\n\t#[test]\n\tfn test_check_2048_answers(){\n\n\t\tlet poly \t= Polynomial::readFromFile(&\"data/poly_2048.txt\".to_string()).unwrap();\n\t\tlet n \t\t= poly.len();\n\t\tlet roots \t= rootsOfUnity(n as i32);\n\n\t\tlet mut naiveAnswers \t= Vec::with_capacity(n);\n\t\tlet mut hornerAnswers \t= Vec::with_capacity(n);\n\t\tlet mut", "num_tokens": 2048} {"category": "stack_edu-Rust", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/stack_edu-Rust/part-00-00000.npy", "text": " Op::Less,\n TokenType::Greater => Op::Greater,\n TokenType::BangEqual => Op::NotEqual,\n TokenType::Percent => Op::Mod,\n TokenType::And => Op::And,\n TokenType::Or => Op::Or,\n TokenType::LBracket => Op::Indexing,\n TokenType::Dot => Op::Access,\n TokenType::RParen | TokenType::RBrace => {\n // if paren_depth < 1 {\n // panic!(\"Unbalanced right parenthesis\");\n // }\n break;\n }\n t => unimplemented!(\"Operator: {:?}, lhs: {:?}\", t, lhs), // could be panic\n };\n\n if let Some((l_bp, ())) = postfix_binding_power(&op) {\n if l_bp < bp {\n break;\n }\n lexer.next();\n\n lhs = if op == Op::Indexing {\n let rhs = parse_expr(lexer);\n assert_eq!(lexer.next().ty, TokenType::RBracket);\n S::Cons(op, vec![lhs, rhs])\n } else {\n S::Cons(op, vec![lhs])\n };\n\n continue;\n }\n\n let (l_bp, r_bp) = infix_binding_power(&op);\n if l_bp < bp {\n break;\n }\n\n lexer.next();\n let rhs = expr_bp(lexer, r_bp, paren_depth);\n\n lhs = S::Cons(op, vec![lhs, rhs]);\n }\n\n lhs\n}\n\nfn postfix_binding_power(op: &Op) -> Option<(u8, ())> {\n let res = match op {\n Op::Indexing => (9, ()),\n _ => return None,\n };\n Some(res)\n}\n\nfn infix_binding_power(op: &Op) -> (u8, u8) {\n match op {\n Op::Access => (8, 9),\n Op::Plus | Op::Minus => (4, 5),\n Op::Multiply | Op::Divide => (6, 7),\n Op::Mod => (2, 3),\n Op::And | Op::Or => (1, 2),\n Op::Equal | Op::NotEqual | Op::Less | Op::Greater => (0, 1),\n _ => panic!(\"bad op {:?}\", op),\n }\n}\n\nfn prefix_binding_power(op: &Op) -> ((), u8) {\n match op {\n Op::Minus => ((), 9),\n Op::Negate => ((), 10),\n _ => panic!(\"bad op: {:?}\", op),\n }\n}\n\n#[cfg(test)]\nmod parser_tests {\n use super::*;\n use crate::scan_tokens;\n use crate::Lexer;\n\n fn str_to_expr(s: &str) -> S {\n let tokens = scan_tokens(s);\n let mut lexer = Lexer::new(tokens);\n parse_expr(&mut lexer)\n }\n\n macro_rules! test_expr {\n ( $( $input:expr => $expected:expr ),* ) => {\n $(\n assert_eq!(str_to_expr($input).to_string(), $expected);\n )*\n }\n }\n\n #[test]\n fn test_parser() {\n test_expr!(\n \"1\" => \"1\",\n \"5 + 5\" => \"(+ 5 5)\",\n \"1 + 2 * 3\" => \"(+ 1 (* 2 3))\",\n \"5 + 4 * 3 / 4 + 5\" => \"(+ (+ 5 (/ (* 4 3) 4)) 5)\",\n \"3 * (4 + 4)\" => \"(* 3 (+ 4 4))\",\n \"(5 + 5) * 4\" => \"(* (+ 5 5) 4)\"\n );\n }\n}<|endoftext|>use std::fs::File;\nuse std::io::prelude::*;\n\nconst MH_CIGAM: u32 = 0xcdfaedfe;\nconst MH_CIGAM_64: u32 = 0xcffaedfe;\nconst MH_MAGIC: u32 = 0xfeedface;\nconst MH_MAGIC_64: u32 = 0xfeedfacf;\n\nfn u8_to_u32(x: [u8; 4]) -> u32 {\n let mut y: u32 = 0;\n y = y | ((0 | x[0] as u32) << 24);\n y = y | ((0 | (x[1] as u32)) << 16);\n y = y | ((0 | (x[2] as u32)) << 8);\n y = y | ((0 | (x[3] as u32)));\n y\n}\n\nfn should_swap(magic: u32) -> bool {\n return magic == MH_CIGAM || magic == MH_CIGAM_64;\n}\n\nfn is_64(magic: u32) -> bool {\n return magic == MH_CIGAM_64 || magic == MH_MAGIC_64;\n}\n\nfn read_magic(file: &mut File) -> u32 {\n let mut magic_bytes = [0u8; 4];\n file.read(&mut magic_bytes)\n .expect(\"something went wrong reading the file\");\n u8_to_u32(magic_bytes)\n}\n\nfn main() {\n let filename = \"hello-world\";\n let f = File::open(filename).expect(\"file not found\");\n dump_segments(f);\n}\n\nfn dump_mach_header(f: &mut File, is_64: bool, should_swap: bool) {\n // TODO: dump header\n\n}\n\nfn dump_segments(mut f: File) {\n let magic = read_magic(&mut f);\n let is_64 = is_64(magic);\n let should_swap = should_swap(magic);\n dump_mach_header(&mut f, is_64, should_swap);\n}<|endoftext|>//! # Unique Assets Implementation: Commodities\n//!\n//! This pallet exposes capabilities for managing unique assets, also known as\n//! non-fungible tokens (NFTs).\n//!\n//! - [`pallet_commodities::Trait`](./trait.Trait.html)\n//! - [`Calls`](./enum.Call.html)\n//! - [`Errors`](./enum.Error.html)\n//! - [`Events`](./enum.RawEvent.html)\n//!\n//! ## Overview\n//!\n//! Assets that share a common metadata structure may be created and distributed\n//! by an asset admin. Asset owners may burn assets or transfer their\n//! ownership. Configuration parameters are used to limit the total number of a\n//! type of asset that may exist as well as the number that any one account may\n//! own. Assets are uniquely identified by the hash of the info that defines\n//! them, as calculated by the runtime system's hashing algorithm.\n//!\n//! This pallet implements the [`UniqueAssets`](./nft/trait.UniqueAssets.html)\n//! trait in a way that is optimized for assets that are expected to be traded\n//! frequently.\n//!\n//! This pallet also implements the [`LockableUniqueAssets`](./nft/trait.LockableUniqueAssets)\n//! trait\n//!\n//! ### Dispatchable Functions\n//!\n//! * [`mint`](./enum.Call.html#variant.mint) - Use the provided commodity info\n//! to create a new commodity for the specified user. May only be called by\n//! the commodity admin.\n//!\n//! * [`burn`](./enum.Call.html#variant.burn) - Destroy a commodity. May only be\n//! called by commodity owner.\n//!\n//! * [`transfer`](./enum.Call.html#variant.transfer) - Transfer ownership of\n//! a commodity to another account. May only be called by current commodity\n//! owner.\n\n#![cfg_attr(not(feature = \"std\"), no_std)]\n\nuse codec::{FullCodec, Encode};\nuse frame_support::{\n dispatch, ensure,\n traits::{EnsureOrigin, Get},\n Hashable,\n};\nuse frame_system::ensure_signed;\nuse sp_runtime::traits::{Hash, Member};\nuse sp_std::{fmt::Debug, vec::Vec, collections::btree_map::BTreeMap};\n\npub mod nft;\npub use crate::nft::{UniqueAssets, LockableUniqueAssets};\n\npub use pallet::*;\n\n#[cfg(test)]\nmod mock;\n\n#[cfg(test)]\nmod tests;\n\n/// The runtime system's hashing algorithm is used to uniquely identify commodities.\npub type CommodityId = ::Hash;\n\n/// Associates a commodity with its ID.\npub type Commodity = (CommodityId, ::CommodityInfo);\n\n#[frame_support::pallet]\npub mod pallet {\n use super::*;\n use frame_support::pallet_prelude::*;\n use frame_system::pallet_prelude::*;\n\n #[pallet::config]\n pub trait Config: frame_system::Config {\n /// The dispatch origin that is able to mint new instances of this type of commodity.\n type CommodityAdmin: EnsureOrigin;\n /// The data type that is used to describe this type of commodity.\n type CommodityInfo: MaybeSerializeDeserialize + Hashable + Member + Debug + Default + FullCodec + Ord;\n /// The maximum number of this type of commodity that may exist (minted - burned).\n type CommodityLimit: Get;\n /// The maximum number of this type of commodity that any single account may own.\n type UserCommodityLimit: Get;\n type Event: From> + IsType<::Event>;\n }\n\n #[pallet::pallet]\n #[pallet::generate_store(pub(super) trait Store)]\n pub struct Pallet(_);\n\n /// The total number of this type of commodity", "num_tokens": 2048} {"category": "stack_edu-Rust", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/stack_edu-Rust/part-00-00000.npy", "text": "reg]);\n tickv.continue_operation().0.unwrap();\n }\n Ok(_) => {}\n _ => unreachable!(),\n }\n\n println!(\"Get key ONE\");\n let ret = unsafe { tickv.get_key(get_hashed_key(b\"ONE\"), &mut BUF) };\n match ret {\n Err((_, ErrorCode::ReadNotReady(reg))) => {\n // There is no actual delay in the test, just continue now\n tickv.set_read_buffer(&tickv.tickv.controller.buf.borrow()[reg]);\n tickv.continue_operation().0.unwrap();\n }\n Ok(_) => {}\n _ => unreachable!(),\n }\n\n println!(\"Get key TWO\");\n let ret = unsafe { tickv.get_key(get_hashed_key(b\"TWO\"), &mut BUF) };\n match ret {\n Err((_, ErrorCode::ReadNotReady(reg))) => {\n // There is no actual delay in the test, just continue now\n tickv.set_read_buffer(&tickv.tickv.controller.buf.borrow()[reg]);\n tickv.continue_operation().0.unwrap();\n }\n Ok(_) => {}\n _ => unreachable!(),\n }\n\n println!(\"Get non-existant key THREE\");\n let ret = unsafe { tickv.get_key(get_hashed_key(b\"THREE\"), &mut BUF) };\n match ret {\n Err((_, ErrorCode::ReadNotReady(reg))) => {\n // There is no actual delay in the test, just continue now\n tickv.set_read_buffer(&tickv.tickv.controller.buf.borrow()[reg]);\n assert_eq!(tickv.continue_operation().0, Err(ErrorCode::KeyNotFound));\n }\n _ => unreachable!(),\n }\n\n unsafe {\n match tickv.get_key(get_hashed_key(b\"THREE\"), &mut BUF) {\n Err((_, ErrorCode::KeyNotFound)) => {}\n _ => {\n panic!(\"Expected ErrorCode::KeyNotFound\");\n }\n }\n }\n }\n\n #[test]\n fn test_append_and_delete() {\n let mut read_buf: [u8; 1024] = [0; 1024];\n let mut hash_function = DefaultHasher::new();\n MAIN_KEY.hash(&mut hash_function);\n\n let tickv =\n AsyncTicKV::::new(FlashCtrl::new(), &mut read_buf, 0x10000);\n\n let mut ret = tickv.initialise(hash_function.finish());\n while ret.is_err() {\n // There is no actual delay in the test, just continue now\n let (r, _buf, _len) = tickv.continue_operation();\n ret = r;\n }\n\n static mut VALUE: [u8; 32] = [0x23; 32];\n static mut BUF: [u8; 32] = [0; 32];\n\n println!(\"Add key ONE\");\n let ret = unsafe { tickv.append_key(get_hashed_key(b\"ONE\"), &mut VALUE, 32) };\n match ret {\n Err((_buf, ErrorCode::ReadNotReady(reg))) => {\n // There is no actual delay in the test, just continue now\n tickv.set_read_buffer(&tickv.tickv.controller.buf.borrow()[reg]);\n tickv.continue_operation().0.unwrap();\n }\n Ok(_) => {}\n _ => unreachable!(),\n }\n\n println!(\"Get key ONE\");\n unsafe {\n tickv.get_key(get_hashed_key(b\"ONE\"), &mut BUF).unwrap();\n }\n\n println!(\"Delete Key ONE\");\n tickv.invalidate_key(get_hashed_key(b\"ONE\")).unwrap();\n\n println!(\"Get non-existant key ONE\");\n unsafe {\n match tickv.get_key(get_hashed_key(b\"ONE\"), &mut BUF) {\n Err((_, ErrorCode::KeyNotFound)) => {}\n _ => {\n panic!(\"Expected ErrorCode::KeyNotFound\");\n }\n }\n }\n\n println!(\"Try to delete Key ONE Again\");\n assert_eq!(\n tickv.invalidate_key(get_hashed_key(b\"ONE\")),\n Err(ErrorCode::KeyNotFound)\n );\n }\n\n #[test]\n fn test_garbage_collect() {\n let mut read_buf: [u8; 1024] = [0; 1024];\n let mut hash_function = DefaultHasher::new();\n MAIN_KEY.hash(&mut hash_function);\n\n let tickv =\n AsyncTicKV::::new(FlashCtrl::new(), &mut read_buf, 0x10000);\n\n let mut ret = tickv.initialise(hash_function.finish());\n while ret.is_err() {\n // There is no actual delay in the test, just continue now\n let (r, _buf, _len) = tickv.continue_operation();\n ret = r;\n }\n\n static mut VALUE: [u8; 32] = [0x23; 32];\n static mut BUF: [u8; 32] = [0; 32];\n\n println!(\"Garbage collect empty flash\");\n let mut ret = tickv.garbage_collect();\n while ret.is_err() {\n // There is no actual delay in the test, just continue now\n ret = match tickv.continue_operation().0 {\n Ok(_) => Ok(0),\n Err(e) => Err(e),\n };\n }\n\n println!(\"Add key ONE\");\n let ret = unsafe { tickv.append_key(get_hashed_key(b\"ONE\"), &mut VALUE, 32) };\n match ret {\n Err((_buf, ErrorCode::ReadNotReady(reg))) => {\n // There is no actual delay in the test, just continue now\n tickv.set_read_buffer(&tickv.tickv.controller.buf.borrow()[reg]);\n tickv.continue_operation().0.unwrap();\n }\n Ok(_) => {}\n _ => unreachable!(),\n }\n\n println!(\"Garbage collect flash with valid key\");\n let mut ret = tickv.garbage_collect();\n while ret.is_err() {\n match ret {\n Err(ErrorCode::ReadNotReady(reg)) => {\n // There is no actual delay in the test, just continue now\n tickv.set_read_buffer(&tickv.tickv.controller.buf.borrow()[reg]);\n ret = match tickv.continue_operation().0 {\n Ok(_) => Ok(0),\n Err(e) => Err(e),\n };\n }\n Ok(num) => {\n assert_eq!(num, 0);\n }\n _ => unreachable!(),\n }\n }\n\n println!(\"Delete Key ONE\");\n let ret = tickv.invalidate_key(get_hashed_key(b\"ONE\"));\n match ret {\n Err(ErrorCode::ReadNotReady(reg)) => {\n // There is no actual delay in the test, just continue now\n tickv.set_read_buffer(&tickv.tickv.controller.buf.borrow()[reg]);\n tickv.continue_operation().0.unwrap();\n }\n Ok(_) => {}\n _ => unreachable!(\"ret: {:?}\", ret),\n }\n\n println!(\"Garbage collect flash with deleted key\");\n let mut ret = tickv.garbage_collect();\n while ret.is_err() {\n match ret {\n Err(ErrorCode::ReadNotReady(reg)) => {\n // There is no actual delay in the test, just continue now\n tickv.set_read_buffer(&tickv.tickv.controller.buf.borrow()[reg]);\n ret = match tickv.continue_operation().0 {\n Ok(_) => Ok(0),\n Err(e) => Err(e),\n };\n }\n Err(ErrorCode::EraseNotReady(_reg)) => {\n // There is no actual delay in the test, just continue now\n ret = match tickv.continue_operation().0 {\n Ok(_) => Ok(0),\n Err(e) => Err(e),\n };\n }\n Ok(num) => {\n assert_eq!(num, 1024);\n }\n _ => unreachable!(\"ret: {:?}\", ret),\n }\n }\n\n println!(\"Get non-existant key ONE\");\n let ret = unsafe { tickv.get_key(get_hashed_key(b\"ONE\"), &mut BUF) };\n match ret {\n Err((_, ErrorCode::ReadNotReady(reg))) => {\n // There is no actual delay in the test, just continue now\n tickv.set_read_buffer(&tickv.tickv.controller.buf.borrow()[reg]);\n assert_eq!(tickv.continue_operation().0, Err(ErrorCode::KeyNotFound));\n }\n Err((_, ErrorCode::KeyNotFound)) => {}\n _ => unreachable!(\"ret: {:?}\", ret),\n }\n\n println!(\"Add Key ONE\");\n unsafe {\n tickv\n .append_key(get_hashed_key(b\"ONE\"), &mut VALUE, 32)\n .unwrap();\n }\n }\n }\n}<|endoftext|>use super::io::read_stdin;\nuse crate::algorithm::meta::Meta;\nuse crate::board::generator::Generator;\nuse crate::board::position::Position;\nuse crate::engine::{Engine, EngineResult};\n\npub struct User {\n position: Option,\n generator: Generator,\n}\n\nimpl User {\n pub fn create() -> User {\n User {\n position: None,\n generator: Generator::create(),\n }\n }\n}\n\nimpl Iterator for User {\n type Item = EngineResult;\n fn next(&mut self) -> Option {\n let result = if let Some(ref position) = self.position {\n let temp;\n loop {\n let move_string = read_stdin();\n match self\n .generator\n .legal_moves(position)\n .into_iter()\n .find(|m", "num_tokens": 2048} {"category": "stack_edu-Rust", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/stack_edu-Rust/part-00-00000.npy", "text": "bar\"), true);\n assert_eq!(local_scope.is_function(\"foo\") && !local_scope.is_function(\"bar\"), true);\n\n local_scope.add_function(\"bar\");\n\n assert_eq!(global_scope.is_function(\"foo\") && !global_scope.is_function(\"bar\"), true);\n assert_eq!(local_scope.is_function(\"foo\") && local_scope.is_function(\"bar\"), true);\n\n assert_eq!(global_scope.is_function(\"baz\") || local_scope.is_function(\"baz\"), false);\n }\n\n #[test]\n fn test_global_variables() {\n let global_scope = Scope::new();\n let local_scope = global_scope.create_child();\n\n assert_eq!(global_scope.is_variable(\"foo\") || local_scope.is_variable(\"foo\"), false);\n\n global_scope.add_variable(\"foo\");\n\n assert_eq!(global_scope.is_variable(\"foo\") && !global_scope.is_variable(\"bar\"), true);\n assert_eq!(local_scope.is_variable(\"foo\") && !local_scope.is_variable(\"bar\"), true);\n\n local_scope.add_variable(\"bar\");\n\n assert_eq!(global_scope.is_variable(\"foo\") && !global_scope.is_variable(\"bar\"), true);\n assert_eq!(local_scope.is_variable(\"foo\") && local_scope.is_variable(\"bar\"), true);\n\n assert_eq!(global_scope.is_variable(\"baz\") || local_scope.is_variable(\"baz\"), false);\n }\n}<|endoftext|>use serde::{Deserialize, Serialize};\n\n#[derive(Serialize, Deserialize, Clone, Debug, Default)]\npub struct Args {\n pub string: String,\n}\n\n#[derive(Serialize, Deserialize, Clone, Debug, Default)]\npub struct Result {\n pub length: usize,\n}<|endoftext|>fn generate_the_string(n: i32) -> String {\n let mut s = String::new();\n if n % 2 == 1 {\n for _ in 0..n { s.push('a'); }\n } else {\n for _ in 0..n-1 { s.push('a'); }\n s.push('b');\n }\n s\n}\n\n\n#[test]\nfn generate_the_string_test() {\n println!(\"{}\", generate_the_string(1));\n println!(\"{}\", generate_the_string(2));\n}<|endoftext|>//Convert strings to pig latin. The first consonant of each word is moved to the end of\n//the word and “ay” is added, so “first” becomes “irst-fay.” Words that start with a vowel\n//have “hay” added to the end instead (“apple” becomes “apple-hay”). Keep in mind the\n//details about UTF-8 encoding!\n\nuse std::io;\n\nfn main() {\n println!(\"Input your string\");\n let mut entry = String::new();\n\n io::stdin()\n .read_line(&mut entry)\n .expect(\"Failed to read line\");\n\n println!(\n \"You entered: {}\\nPig latin equivalent: {}\",\n entry.trim(),\n convert_to_pig_latin(&entry)\n );\n}\n\nfn convert_to_pig_latin(entry: &String) -> String {\n let words: Vec<&str> = entry.split(' ').collect();\n let mut converted = String::from(\"\");\n let vowels = [\"a\", \"e\", \"i\", \"o\", \"u\"];\n\n for w in &words {\n //let first_char = w.chars().next().unwrap();\n let (first_char, last_chars) = w.split_at(1);\n let mut converted_word;\n if vowels.contains(&first_char) {\n converted_word = format!(\"{}-hay\", w);\n } else {\n converted_word = format!(\"{}-{}ay\", last_chars, first_char);\n }\n converted = format!(\"{} {}\", converted, converted_word);\n }\n converted\n}<|endoftext|>extern crate retrosheet;\n\nuse std::fs::File;\nuse std::io::Read;\n\nuse retrosheet::{Parser, ParserError};\n\nfn test_single_game(file: &str) {\n let mut parser = Parser::new();\n\n let file_name = format!(\"{}/test_resources/{}\", env!(\"CARGO_MANIFEST_DIR\"), file);\n let mut file = File::open(file_name).unwrap();\n\n let mut buf: String = String::new();\n file.read_to_string(&mut buf).expect(\"could not read\");\n\n if let Err(e) = parser.parse(&buf) {\n match e {\n ParserError::StringRemaining(s) => {\n let first_bytes: Vec = s\n .bytes()\n .take_while(|&byte| byte != b'\\r' && byte != b'\\n')\n .collect();\n let first_line = std::str::from_utf8(&first_bytes).expect(\"valid utf8\");\n assert!(false, \"Failed on line: {}\", first_line);\n }\n e => assert!(false, \"{}\", e),\n }\n }\n}\n\n#[test]\nfn test_chn201604110() {\n test_single_game(\"CHN201604110.EVN\");\n}\n\n#[test]\nfn test_bos201504270() {\n test_single_game(\"BOS201504270.EVA\");\n}<|endoftext|>use newton::prelude::*;\nuse newton::{Ball, DynamicBody, Newton, Sphere};\n\nuse newton::testbed::{run, Testbed};\n\nstruct Joints;\nimpl Testbed for Joints {\n fn newton() -> Newton {\n Newton::config().threads(4).build()\n }\n\n fn reset(newton: &Newton) -> Self {\n let sphere = Sphere::create(newton, 0.5, None);\n\n let last_body = DynamicBody::create(newton, &sphere, pos(0.0, 0.0, 0.0), Some(\"ground\"));\n last_body.set_destroy_callback(|_| println!(\"Destroy ball\"));\n last_body.set_transform_callback(|b, _, _| eprintln!(\"Transform update\"));\n\n let mut last_body = last_body.into_handle(newton);\n\n for (offset, pivot) in (1..8).map(|i| (0.5 * i as f32, 0.5 * (i - 1) as f32)) {\n let parent = newton.storage().body(last_body).unwrap();\n\n let ball = DynamicBody::create(newton, &sphere, pos(offset, offset, 0.0), Some(\"ball\"));\n let joint = Ball::create(newton, [pivot, pivot, 0.0], &ball, Some(&parent), None);\n\n joint.set_cone_limits([-1.0, 0.0, 0.0], 0.0, 0.0);\n joint.set_destroy_callback(|| println!(\"Destroy joint\"));\n joint.release();\n\n ball.set_mass(1.0, &sphere);\n ball.set_force_and_torque_callback(|b, _, _| b.set_force([0.0, -9.8, 0.0]));\n last_body = ball.into_handle(newton);\n }\n\n Self\n }\n}\n\nfn main() {\n run::(Some(file!()));\n}\n\nconst fn pos(x: f32, y: f32, z: f32) -> [[f32; 4]; 4] {\n [[1.0, 0.0, 0.0, 0.0], [0.0, 1.0, 0.0, 0.0], [0.0, 0.0, 1.0, 0.0], [x, y, z, 1.0]]\n}<|endoftext|>extern crate investments;\n\nuse std::path::PathBuf;\nuse std::process;\n\nuse clap::{Arg, ArgAction, Command, value_parser};\n\nuse investments::core::EmptyResult;\nuse investments::tax_statement::TaxStatement;\n\npub fn run() -> EmptyResult {\n let matches = Command::new(\"Tax statement parser\")\n .about(\"Parses *.dcX file and prints its contents to stdout\")\n .help_expected(true)\n .disable_help_subcommand(true)\n .args([\n Arg::new(\"TAX_STATEMENT\")\n .help(\"Path to tax statement *.dcX file\")\n .value_parser(value_parser!(PathBuf))\n .required(true),\n\n Arg::new(\"verbose\").short('v').long(\"verbose\")\n .help(\"Verbose logging\")\n .action(ArgAction::SetTrue),\n ])\n .get_matches();\n\n if matches.get_flag(\"verbose\") {\n easy_logging::init(\"investments\", log::Level::Trace).map_err(|e| format!(\n \"Failed to initialize the logging: {}.\", e))?;\n }\n\n let path = matches.get_one::(\"TAX_STATEMENT\").unwrap();\n let statement = TaxStatement::read(path)?;\n println!(\"{:#?}\", statement);\n\n Ok(())\n}\n\nfn main() {\n if let Err(e) = run() {\n eprintln!(\"Error: {}.\", e);\n process::exit(1);\n }\n}<|endoftext|>/*!\nLocalized names and other metadata.\n*/\n\nuse std::fmt::Write;\n\nuse super::internal::*;\nuse super::FontRef;\n\nconst NAME: RawTag = raw_tag(b\"name\");\n\n/// Identifier for well-known localized strings in a font.\n#[derive(Copy, Clone, PartialEq, Eq, Debug)]\npub enum StringId {\n Copyright,\n Family,\n SubFamily,\n UniqueId,\n Full,\n Version,\n PostScript,\n Trademark,\n Manufacturer,\n Designer,\n Description,\n VendorUrl,\n DesignerUrl,\n License,\n LicenseUrl,\n TypographicFamily,\n TypographicSubFamily,\n CompatibleFull,\n SampleText,\n PostScriptCid,\n WwsFamily,\n WwsSubFamily,\n ", "num_tokens": 2048} {"category": "stack_edu-Rust", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/stack_edu-Rust/part-00-00000.npy", "text": "é\", p);\n//! } else {\n//! println!(\"Match nul\");\n//! }\n//! } else {\n//! break;\n//! }\n//!\n//! println!(\"Rejouer? [y/n]\");\n//!\n//! let com : String;\n//!\n//! scan!(\"{}\", com);\n//!\n//! if com == \"n\" {\n//! break;\n//! }\n//!\n//! game.reset();\n//! }\n//! }\n//! ```\n\nmod connect_four;\nmod random_bot;<|endoftext|>use super::*;\nuse crate::diags;\nuse crate::lang::{LangContext, LangMode};\nuse crate::lex::Lexer;\nuse crate::token::LexMode;\nuse std::fmt;\nuse vfront_basics::diag::{DiagRegistry, DiagStore, DiagSystem, DiagType};\nuse vfront_basics::source::SourceManager;\n\n#[test]\nfn test_make_string_literal() {\n assert_eq!(make_string_literal(b\"abc\"), r#\"\"abc\"\"#);\n assert_eq!(make_string_literal(b\"\\\"\"), r#\"\"\\\"\"\"#);\n assert_eq!(make_string_literal(b\"\\\\\"), r#\"\"\\\\\"\"#);\n assert_eq!(make_string_literal(b\"\\t\"), r#\"\"\\t\"\"#);\n assert_eq!(make_string_literal(b\"\\n\"), r#\"\"\\n\"\"#);\n assert_eq!(make_string_literal(b\"\\r\"), r#\"\"\\015\"\"#);\n assert_eq!(make_string_literal(b\"\\xff\"), r#\"\"\\377\"\"#);\n assert_eq!(make_string_literal(b\"\"), r#\"\"\"\"#);\n}\n\nfn test_parser(\n lang: LangMode,\n text: &str,\n f: F,\n exp: T,\n exp_diags: &[(&'static DiagType, &str)],\n) where\n F: FnOnce(LangContext, Token<'_>) -> T,\n T: PartialEq + Eq + fmt::Debug,\n{\n let sm = SourceManager::new();\n let mut registry = DiagRegistry::new();\n diags::register_diags(&mut registry);\n let sink = DiagStore::new();\n let diag = DiagSystem::new(®istry, &sink);\n let ctx = LangContext {\n source: &sm,\n diags: &diag,\n lang,\n };\n let chunk = sm.add_file(\"test.v\", text);\n let mut lexer = Lexer::new(chunk);\n let res = f(ctx, lexer.lex(LexMode::Default));\n assert_eq!(res, exp);\n let diags: Vec<_> = sink\n .into_vec()\n .into_iter()\n .map(|diag| (diag.typ, sm.expand_range(diag.spans[0].range).str()))\n .collect();\n assert_eq!(diags, exp_diags);\n}\n\n#[test]\nfn test_parse_string() {\n fn test(s: &str, exp: Option<&[u8]>, exp_diags: &[(&'static DiagType, &str)]) {\n test_parser(\n LangMode::Verilog1995,\n s,\n parse_string,\n exp.map(|x| Box::<[u8]>::from(x)),\n exp_diags,\n );\n }\n fn test_sv(s: &str, exp: Option<&[u8]>, exp_diags: &[(&'static DiagType, &str)]) {\n test_parser(\n LangMode::SystemVerilog2005,\n s,\n parse_string,\n exp.map(|x| Box::<[u8]>::from(x)),\n exp_diags,\n );\n }\n test(r#\"\"abcdef\"\"#, Some(b\"abcdef\"), &[]);\n test(r#\"\"\\\"\"\"#, Some(b\"\\\"\"), &[]);\n test(r#\"\"\\\\\"\"#, Some(b\"\\\\\"), &[]);\n test(r#\"\"\\n\"\"#, Some(b\"\\n\"), &[]);\n test(r#\"\"\\t\"\"#, Some(b\"\\t\"), &[]);\n test(\n r#\"\"\\a\"\"#,\n Some(b\"\\x07\"),\n &[(diags::systemverilog_string_escape, \"\\\\a\")],\n );\n test(\n r#\"\"\\f\"\"#,\n Some(b\"\\x0c\"),\n &[(diags::systemverilog_string_escape, \"\\\\f\")],\n );\n test(\n r#\"\"\\v\"\"#,\n Some(b\"\\x0b\"),\n &[(diags::systemverilog_string_escape, \"\\\\v\")],\n );\n test_sv(r#\"\"\\a\"\"#, Some(b\"\\x07\"), &[]);\n test_sv(r#\"\"\\f\"\"#, Some(b\"\\x0c\"), &[]);\n test_sv(r#\"\"\\v\"\"#, Some(b\"\\x0b\"), &[]);\n test(r#\"\"\\015\"\"#, Some(b\"\\r\"), &[]);\n test(r#\"\"\\377\"\"#, Some(b\"\\xff\"), &[]);\n test(\n r#\"\"\\400\"\"#,\n None,\n &[(diags::err_octal_escape_overflow, \"\\\\400\")],\n );\n test(r#\"\"\\158\"\"#, Some(b\"\\r8\"), &[]);\n test(r#\"\"\\78\"\"#, Some(b\"\\x078\"), &[]);\n test(\n r#\"\"abc\\x20def\"\"#,\n Some(b\"abc def\"),\n &[(diags::systemverilog_string_escape, \"\\\\x20\")],\n );\n test(\n r#\"\"abc\\x2ghi\"\"#,\n Some(b\"abc\\x02ghi\"),\n &[(diags::systemverilog_string_escape, \"\\\\x2\")],\n );\n test(\n r#\"\"abc\\xdef\"\"#,\n Some(b\"abc\\xdef\"),\n &[(diags::systemverilog_string_escape, \"\\\\xde\")],\n );\n test(\n r#\"\"abc\\xghi\"\"#,\n None,\n &[(diags::err_hex_escape_missing_digits, \"\\\\x\")],\n );\n test(\n r#\"\"abc\\\ndef\"\"#,\n Some(b\"abcdef\"),\n &[],\n );\n test(\"\\\"abc\\\\\\r\\ndef\\\"\", Some(b\"abcdef\"), &[]);\n test(\"\\\"abc\\\\\\rdef\\\"\", Some(b\"abcdef\"), &[]);\n test(\"\\\"abc\", None, &[(diags::err_unclosed_string, \"\\\"abc\")]);\n test(\"\\\"abc\\\\\", None, &[(diags::err_unclosed_string, \"\\\"abc\\\\\")]);\n}<|endoftext|>#![allow(unused_imports)]\n#![allow(dead_code)]\nuse sp_std::{vec::Vec, result::Result};\nuse frame_support::{Parameter, StorageMap, StorageValue, ensure};\nuse sp_runtime::traits::{SimpleArithmetic, Bounded};\nuse sp_std::marker::PhantomData;\n\n/*\n### binary heap\n* runtime/src/binary_heap.rs\n* 实现了最小堆, 参考了Rust标准库中的堆实现.\n* 如果有10000只猫, 树高14层.\n* 通过测试\n*/\n\npub struct MinHeap (PhantomData<(Index, Value, Count, Map)>);\n\nimpl MinHeap\n\twhere Index: Parameter + SimpleArithmetic + Bounded + Default + Copy + PartialEq,\n\t\t Value: Parameter + PartialOrd,\n\t\t Count: StorageValue,\n\t\t Map: StorageMap> {\n\tpub fn len() -> Index { Count::get() }\n\n\tpub fn is_empty() -> bool { Self::len() == Index::zero() }\n\n\tpub fn peek() -> Option { Map::get(Index::zero()) }\n\n\tpub fn push(item: Value) -> Result<(), &'static str> {\n\t\tlet old_len = Count::get();\n\t\tif old_len == Index::max_value() {\n\t\t\treturn Err(\"heap items len overflow\");\n\t\t}\n\t\tCount::put(old_len + Index::one());\n\t\tSelf::sift_up(Index::zero(), old_len, item);\n\t\tOk(())\n\t}\n\n\tfn sift_up(start: Index, pos: Index, item: Value) {\n\t\tlet mut hole: Hole = Hole::new(pos, &item);\n\t\twhile hole.pos() > start {\n\t\t\tlet parent = (hole.pos() - Index::one()) / 2u8.into();\n\t\t\tlet parent_item = hole.get(parent).unwrap();\n\t\t\tif *hole.element() >= parent_item {\n\t\t\t\tbreak;\n\t\t\t}\n\t\t\thole.move_to(parent, &parent_item);\n\t\t}\n\t}\n\n\tpub fn pop() -> Option {\n\t\tlet mut len = Self::len();\n\t\tif len == Index::zero() {\n\t\t\treturn None;\n\t\t}\n\t\tlen = len - Index::one();\n\t\tCount::put(len);\n\t\tif len == Index::zero() {\n\t\t\tMap::take(Index::zero())\n\t\t} else {\n\t\t\tlet top_one = Map::get(Index::zero());\n\t\t\tlet last = Map::take(len).unwrap();\n\t\t\tSelf::sift_down_range(last, Index::zero(), len);\n\t\t\ttop_one\n\t\t}\n\t}\n\n\tfn sift_down_range(last_item: Value, pos: Index, end: Index) {\n\t\tlet mut hole: Hole = Hole::new(pos, &last_item);\n\t\tlet mut child = pos * 2u8.into() + Index::one();\n\t\twhile child < end {\n\t\t\tlet mut child_item = hole.get(child).unwrap();\n\t\t\tlet right = child +", "num_tokens": 2048} {"category": "stack_edu-Rust", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/stack_edu-Rust/part-00-00000.npy", "text": ", source)))\n }\n\n fn weights_f32<'s, S: Source>(&self, set: u32, source: &'s S) -> Option> {\n self.get(&gltf::Semantic::Weights(set))\n .map(|accessor| WeightsF32(Weights::new(accessor, source)))\n }\n}\n\n/// Extra methods for working with `gltf::Skin`.\npub trait SkinIterators<'a> {\n /// Visits the `inverseBindMatrices` of the skin.\n fn ibms(&'a self, source: &'a S) -> Option>;\n}\n\nimpl<'a> SkinIterators<'a> for gltf::Skin<'a> {\n fn ibms(&'a self, source: &'a S) -> Option> {\n self.inverse_bind_matrices().map(|accessor| InverseBindMatrices(AccessorIter::new(accessor, source)))\n }\n}\n\n/// Extra methods for working with `gltf::animation::Channel`.\npub trait ChannelIterators<'a> {\n /// Visits the input samples of a channel.\n fn inputs(&'a self, source: &'a S) -> Inputs<'a>;\n\n /// Visits the output samples of a channel.\n fn outputs(&'a self, source: &'a S) -> Outputs<'a>;\n}\n\nimpl<'a> ChannelIterators<'a> for gltf::animation::Channel<'a> {\n fn inputs(&'a self, source: &'a S) -> Inputs<'a> {\n Inputs(AccessorIter::new(self.sampler().input(), source))\n }\n\n fn outputs(&'a self, source: &'a S) -> Outputs<'a> {\n match self.target().path() {\n gltf::animation::TrsProperty::Translation => {\n Outputs::Translations(AccessorIter::new(self.sampler().output(), source))\n },\n gltf::animation::TrsProperty::Scale => {\n Outputs::Scales(AccessorIter::new(self.sampler().output(), source))\n },\n gltf::animation::TrsProperty::Rotation => {\n Outputs::Rotations(RotationsF32(Rotations::new(self.sampler().output(), source)))\n },\n gltf::animation::TrsProperty::Weights => {\n Outputs::Weights(MorphWeightsF32(MorphWeights::new(self.sampler().output(), source)))\n }\n }\n }\n}\n\n/// Visits the items in an `Accessor`.\n#[derive(Clone, Debug)]\npub struct AccessorIter<'a, T> {\n /// The number of bytes between each item.\n stride: usize,\n\n /// The data we're iterating over.\n data: &'a [u8],\n \n /// Consumes the data type we're returning at each iteration.\n _phantom: marker::PhantomData,\n}\n\nimpl<'a, T> AccessorIter<'a, T> {\n pub fn new(accessor: gltf::Accessor, source: &'a S) -> AccessorIter<'a, T>\n where S: Source\n {\n debug_assert_eq!(size_of::(), accessor.size());\n debug_assert!(size_of::() > 0);\n let view = accessor.view();\n let stride = view.stride().unwrap_or(size_of::());\n debug_assert!(stride >= size_of::());\n let start = view.offset() + accessor.offset();\n let end = start + stride * (accessor.count() - 1) + size_of::();\n let data = &source.source_buffer(&view.buffer())[start .. end];\n AccessorIter { stride, data, _phantom: marker::PhantomData }\n }\n}\n\nimpl<'a, T: AccessorItem> Iterator for AccessorIter<'a, T> {\n type Item = T;\n\n fn next(&mut self) -> Option {\n let stride = if self.data.len() >= self.stride {\n Some(self.stride)\n } else if self.data.len() >= size_of::() {\n Some(size_of::())\n } else {\n None\n };\n if let Some(stride) = stride {\n let (val, data) = self.data.split_at(stride);\n let val = T::from_slice(val);\n self.data = data;\n Some(val)\n } else {\n None\n }\n }\n\n fn nth(&mut self, nth: usize) -> Option {\n if self.data.len() > 0 {\n let val_data = &self.data[nth * self.stride ..];\n let val = T::from_slice(val_data);\n self.data = &val_data[self.stride.min(val_data.len()) ..];\n Some(val)\n } else {\n None\n }\n }\n\n fn last(self) -> Option {\n if self.data.len() > 0 {\n self.data\n .get((self.data.len() - 1) / self.stride * self.stride ..)\n .map(T::from_slice)\n } else {\n None\n }\n }\n\n fn count(self) -> usize {\n self.size_hint().0\n }\n\n fn size_hint(&self) -> (usize, Option) {\n let hint = self.data.len() / self.stride\n + (self.data.len() % self.stride > 0) as usize;\n (hint, Some(hint))\n }\n}\n\nimpl<'a, T: AccessorItem> ExactSizeIterator for AccessorIter<'a, T> {}\n\n/// Any type that can appear in an Accessor.\npub trait AccessorItem: Sized {\n fn from_slice(buf: &[u8]) -> Self;\n}\n\nimpl AccessorItem for i8 {\n fn from_slice(buf: &[u8]) -> Self {\n buf[0] as i8\n }\n}\n\nimpl AccessorItem for i16 {\n fn from_slice(buf: &[u8]) -> Self {\n LE::read_i16(buf)\n }\n}\n\nimpl AccessorItem for u8 {\n fn from_slice(buf: &[u8]) -> Self {\n buf[0]\n }\n}\n\nimpl AccessorItem for u16 {\n fn from_slice(buf: &[u8]) -> Self {\n LE::read_u16(buf)\n }\n}\n\nimpl AccessorItem for u32 {\n fn from_slice(buf: &[u8]) -> Self {\n LE::read_u32(buf)\n }\n}\n\nimpl AccessorItem for f32 {\n fn from_slice(buf: &[u8]) -> Self {\n LE::read_f32(buf)\n }\n}\n\nimpl AccessorItem for [T; 2] {\n fn from_slice(buf: &[u8]) -> Self {\n assert!(buf.len() >= 2 * size_of::());\n [T::from_slice(buf),\n T::from_slice(&buf[size_of::() ..])]\n }\n}\n\nimpl AccessorItem for [T; 3] {\n fn from_slice(buf: &[u8]) -> Self {\n assert!(buf.len() >= 3 * size_of::());\n [T::from_slice(buf),\n T::from_slice(&buf[1 * size_of::() ..]),\n T::from_slice(&buf[2 * size_of::() ..])]\n }\n}\n\nimpl AccessorItem for [T; 4] {\n fn from_slice(buf: &[u8]) -> Self {\n assert!(buf.len() >= 4 * size_of::());\n [T::from_slice(buf),\n T::from_slice(&buf[1 * size_of::() ..]),\n T::from_slice(&buf[2 * size_of::() ..]),\n T::from_slice(&buf[3 * size_of::() ..])]\n }\n}\n\n/// XYZ vertex normals of type `[f32; 3]`.\n#[derive(Clone, Debug)]\npub struct Normals<'a>(AccessorIter<'a, [f32; 3]>);\n\n/// XYZ vertex positions of type `[f32; 3]`.\n#[derive(Clone, Debug)]\npub struct Positions<'a>(AccessorIter<'a, [f32; 3]>);\n\n/// XYZW vertex tangents of type `[f32; 4]` where the `w` component is a\n/// sign value (-1 or +1) indicating the handedness of the tangent basis.\n#[derive(Clone, Debug)]\npub struct Tangents<'a>(AccessorIter<'a, [f32; 4]>);\n\n/// Inverse Bind Matrices of type [[f32; 4]; 4].\n#[derive(Clone, Debug)]\npub struct InverseBindMatrices<'a>(AccessorIter<'a, [[f32; 4]; 4]>);\n\n/// Animation input sampler values of type `f32`.\n#[derive(Clone, Debug)]\npub struct Inputs<'a>(AccessorIter<'a, f32>);\n\n/// Animation output sampler values.\npub enum Outputs<'a> {\n /// XYZ translations of type `[f32; 3]`.\n Translations(AccessorIter<'a, [f32; 3]>),\n\n /// Rotation animations.\n Rotations(RotationsF32<'a>),\n\n /// XYZ scales of type `[f32; 3]`.\n Scales(AccessorIter<'a", "num_tokens": 2048} {"category": "stack_edu-Rust", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/stack_edu-Rust/part-00-00000.npy", "text": ">) {\n //nothing to do\n //let mut app_borrow = app_b.borrow_mut();\n //let app: &mut EchoApplication = app_borrow.as_any_mut().downcast_mut::().unwrap();\n //println!(\"Time {} Process {} received echo_reply from {} which got {} echoes\", process.borrow().get_time(), app.id, self.sender, self.nb_echoes);\n }\n}\n\n\n//simulation finished, compute stats\npub fn stats(apps: &Vec>>>) {\n println!(\"Gathering stats...\");\n let mut echos_sent = Vec::with_capacity(apps.len());\n let mut echos_received = Vec::with_capacity(apps.len());\n let mut max_echos_received = 0;\n let mut min_echos_received = i32::max_value();\n let mut total_echos_received = 0;\n\n //traverse all the application instances and gather stats\n for app in apps {\n let app_borrow = app.borrow();\n let a = match app_borrow.as_any().downcast_ref::() {\n Some(b) => b,\n None => panic!(\"not an Application\"),\n };\n echos_sent.push(a.nb_echos_sent);\n echos_received.push(a.nb_echos_received);\n if max_echos_received < a.nb_echos_received {\n max_echos_received = a.nb_echos_received;\n }\n\n if min_echos_received > a.nb_echos_received {\n min_echos_received = a.nb_echos_received;\n }\n\n total_echos_received = total_echos_received + a.nb_echos_received;\n }\n println!(\"Echos sent: {:?}\", echos_sent);\n println!(\"Echos received: {:?}\", echos_received);\n println!(\"Echos received: min {} max {} total {}\", min_echos_received, max_echos_received, total_echos_received);\n println!(\"DONE\");\n\n //(echos_sent, echos_received, max_echos_received)\n}\n\n\n//Reads the configuration file and starts the simulation\nfn main() {\n //simulation configuration\n let conf_filename = \"config/conf-echo.yaml\";\n //initialize app configuration\n let app_conf: Rc = Rc::new(utils::yaml_from_file_to_object(&conf_filename));\n\n //initialize all nodes\n let mut apps = Vec::new();\n for i in 0..app_conf.n {\n apps.push(Rc::new(RefCell::new(Box::new(\n EchoApplication::new(i, 0, 0, 0,\n app_conf.clone())) as Box)));\n }\n //run the simulation\n let kernel = SimulationKernel::init(&apps, conf_filename);\n\n //simulation finished, compute stats\n stats(&kernel.get_applications());\n}<|endoftext|>//! Helper for incoming segment header requests.\n//!\n//! Handle (i.e. answer) incoming segment headers requests from a remote peer received via\n//! `RequestResponsesBehaviour` with generic [`GenericRequestHandler`].\n\nuse crate::request_handlers::generic_request_handler::{GenericRequest, GenericRequestHandler};\nuse parity_scale_codec::{Decode, Encode};\nuse subspace_core_primitives::{SegmentHeader, SegmentIndex};\n\n/// Segment header by segment indexes protocol request.\n#[derive(Debug, Clone, Eq, PartialEq, Encode, Decode)]\npub enum SegmentHeaderRequest {\n /// Segment headers by segment indexes.\n SegmentIndexes {\n /// Segment indexes to get.\n segment_indexes: Vec,\n },\n /// Defines how many segment headers to return.\n LastSegmentHeaders {\n /// Number of segment headers to return.\n segment_header_number: u64,\n },\n}\n\nimpl GenericRequest for SegmentHeaderRequest {\n const PROTOCOL_NAME: &'static str = \"/subspace/segment-headers-by-indexes/0.1.0\";\n const LOG_TARGET: &'static str = \"segment-headers-by-indexes-request-response-handler\";\n type Response = SegmentHeaderResponse;\n}\n\n/// Segment header by segment indexes protocol response.\n#[derive(Debug, PartialEq, Eq, Clone, Encode, Decode)]\npub struct SegmentHeaderResponse {\n /// Returned data.\n pub segment_headers: Vec,\n}\n\n/// Create a new segment-header-by-segment-indexes request handler.\npub type SegmentHeaderBySegmentIndexesRequestHandler = GenericRequestHandler;<|endoftext|>extern crate json_pointer;\n#[macro_use]\nextern crate serde_json;\n\nuse json_pointer::JsonPointer;\n\nfn main() {\n let ptr = JsonPointer::new([\n \"foo\",\n \"bar\",\n ]);\n\n assert_eq!(&ptr.to_string(), \"/foo/bar\");\n\n let document = json!({\n \"foo\": {\n \"bar\": 0,\n \"baz\": 1,\n },\n \"quux\": \"xyzzy\"\n });\n\n let indexed = ptr.get(&document).unwrap();\n\n assert_eq!(indexed, &json!(0));\n}<|endoftext|>use std::io;\n//use crate::array_and_vector::dy_vector;\n//use crate::fun_test::funny;\npub mod fun_test;\npub mod array_and_vector;\n//#[path = \"modules_package/fun_test.rs\"] mod fun_test;\n//#[path = \"modules_package/array_and_vector.rs\"] mod array_and_vector;\n\n/*let mut input = String::new();\n io::stdin::().read_line(&mut input).expect(“error: unable to read user input”);\n println!(\"{}\",input);*/\n\npub fn calculate_marks(){\n \n println!(\"Enter Your total subjects of classs 12th \"); \n\n let mut total_subjects = String::new();\n io::stdin().read_line(&mut total_subjects).expect(\"failed to read input.\");\n let total_subjects: i32 = total_subjects.trim().parse().expect(\"invalid input\");\n \n //array_and_vector::dy_Vector(total_subjects);\n array_and_vector::dy_vector(total_subjects);\n println!(\"total subjects {:?}\", total_subjects);\n\n println!(\"noe check\");\n println!(\"{:?}\",total_subjects);\n\n}\npub fn scholoarship_check(){\n println!(\"ENTER YOUR MARKS FOR SCHOLORSHIP\");\n let mut scholorship_marks = String::new();\n io::stdin().read_line(&mut scholorship_marks).expect(\"failed to read input.\");\n let scholorship_marks: i32 = scholorship_marks.trim().parse().expect(\"invalid input\");\n fun_test::funny(scholorship_marks);\n\n\n}<|endoftext|>extern crate versleutelvriendjes;\n\nuse std::fs::File;\nuse std::io::BufRead;\nuse std::io::BufReader;\nuse std::u32;\n\nuse versleutelvriendjes::base64;\nuse versleutelvriendjes::charfreq;\nuse versleutelvriendjes::hex;\nuse versleutelvriendjes::xor;\n\n#[test]\nfn challenge1() {\n let hex = \"49276d206b696c6c696e6720796f757220627261696e206c696b65206120706f69736f6e6f7573206d757368726f6f6d\";\n let bytes = hex::from_hex(&hex).unwrap();\n\n let base64 = base64::to_base64(&bytes);\n let expected = \"SSdtIGtpbGxpbmcgeW91ciBicmFpbiBsaWtlIGEgcG9pc29ub3VzIG11c2hyb29t\";\n assert_eq!(expected, base64);\n}\n\n#[test]\nfn challenge2() {\n let input = hex::from_hex(\"1c0111001f010100061a024b53535009181c\").unwrap();\n let key = hex::from_hex(\"686974207468652062756c6c277320657965\").unwrap();\n let xor = xor::xor(&input, &key);\n\n let output = hex::to_hex(&xor);\n\n let expected = \"746865206b696420646f6e277420706c6179\";\n assert_eq!(expected, output);\n}\n\n#[test]\nfn challenge3() {\n let input = hex::from_hex(\"1b37373331363f78151b7f2b783431333d78397828372d363c78373e783a393b3736\").unwrap();\n let (decoded,_) = xor::decrypt_xor_single_byte_text(&input, charfreq::score_english_text).unwrap();\n\n let expected = \"Cooking MC's like a pound of bacon\";\n\n assert_eq!( decoded, expected );\n}\n\n#[test]\nfn challenge4() {\n let f = File::open(\"tests/set1challenge4.txt\").unwrap();\n let reader = BufReader::new(f);\n\n let mut results = Vec::new();\n\n for line in reader.lines() {\n let hex = line.unwrap();\n let input = hex::from_hex(&hex).unwrap();\n match xor::decrypt_xor_single_byte_text", "num_tokens": 2048} {"category": "stack_edu-Rust", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/stack_edu-Rust/part-00-00000.npy", "text": "Unknown => {\n eprintln!(\"Unknown NetInterfaceType\");\n return Err(NetDeviceError::new(NetDeviceErrorKind::UnknownType));\n }\n }\n }\n self.interfaces.push(Box::new(interface));\n Ok(())\n }\n\n pub fn get_interface(&self, family: NetInterfaceFamily) -> Option {\n for entry in &self.interfaces {\n let entry = entry.as_ref();\n match entry {\n NetInterfaceType::Ip(entry) => {\n if entry.net_interface.family == family {\n let entry = (*entry).clone();\n return Some(NetInterfaceType::Ip(entry));\n }\n }\n _ => (),\n }\n }\n None\n }\n}\n\nimpl Default for NetDevice {\n fn default() -> Self {\n Self {\n name: String::from(\"\"),\n device_type: 0,\n mtu: 0,\n flags: 0,\n header_length: 0,\n address_length: 0,\n hwaddr: [0; HARDWARE_ADDRESS_LENGTH],\n pb: NetDeviceAddress::Peer([0; HARDWARE_ADDRESS_LENGTH]),\n ops: NetDeviceOps {\n open: None,\n close: None,\n transmit: None,\n poll: None,\n },\n interfaces: Vec::new(),\n }\n }\n}\n\n#[derive(Clone)]\npub struct NetInterface {\n pub dev: Option<&'static NetDevice>,\n pub family: NetInterfaceFamily,\n}\n\nimpl Default for NetInterface {\n fn default() -> Self {\n Self {\n dev: None,\n family: NetInterfaceFamily::Unknown,\n }\n }\n}\n\n#[derive(Clone)]\npub enum NetInterfaceType {\n Ip(ipv4::IpInterface),\n Unknown,\n}\n\n#[derive(Eq, PartialEq, Clone)]\n#[repr(usize)]\npub enum NetInterfaceFamily {\n Ip = 1,\n Ipv6 = 2,\n Unknown,\n}\n\nimpl NetInterfaceFamily {\n pub fn from_usize(u: usize) -> NetInterfaceFamily {\n match u {\n 1 => NetInterfaceFamily::Ip,\n 2 => NetInterfaceFamily::Ipv6,\n _ => NetInterfaceFamily::Unknown,\n }\n }\n}\n\nimpl fmt::Display for NetInterfaceFamily {\n fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {\n match self {\n NetInterfaceFamily::Ip => write!(f, \"IP\"),\n NetInterfaceFamily::Ipv6 => write!(f, \"IPv6\"),\n NetInterfaceFamily::Unknown => write!(f, \"Unknown\"),\n }\n }\n}\n\npub struct LockableNetDevices {\n pub items: Arc>>>,\n}\n\nimpl LockableNetDevices {\n pub fn new() -> Self {\n LockableNetDevices {\n items: Arc::new(Mutex::new(Vec::new())),\n }\n }\n\n pub fn lock(&self) -> LockedNetDevices<'_> {\n LockedNetDevices {\n items: self.items.lock().unwrap(),\n }\n }\n}\n\npub struct LockedNetDevices<'a> {\n pub items: MutexGuard<'a, Vec<&'static Box>>,\n}\n\nimpl<'a> LockedNetDevices<'a> {\n fn iter_mut(&mut self) -> impl Iterator> {\n self.items.iter_mut()\n }\n}\n\nlazy_static! {\n pub static ref NET_DEVICES: LockableNetDevices = LockableNetDevices::new();\n}\n\npub struct LockableThreadHandle {\n pub item: Arc>>>,\n}\n\nimpl LockableThreadHandle {\n pub fn new() -> Self {\n LockableThreadHandle {\n item: Arc::new(Mutex::new(Option::from(thread::spawn(|| {})))),\n }\n }\n\n pub fn lock(&self) -> LockedThreadHandle<'_> {\n LockedThreadHandle {\n item: self.item.lock().unwrap(),\n }\n }\n}\n\npub struct LockedThreadHandle<'a> {\n pub item: MutexGuard<'a, Option>>,\n}\n\nimpl<'a> LockedThreadHandle<'a> {\n fn join(&mut self) -> thread::Result<()> {\n self.item.take().unwrap().join()\n }\n}\n\nlazy_static! {\n pub static ref THREAD: LockableThreadHandle = LockableThreadHandle::new();\n}\n\nstatic TERMINATE: AtomicBool = AtomicBool::new(false);\n\npub fn net_thread() {\n while !TERMINATE.load(Ordering::Acquire) {\n let mut count = 0;\n {\n let mut devices = NET_DEVICES.lock();\n for dev in devices.iter_mut() {\n if dev.is_up() {\n if let Some(poll) = dev.ops.poll {\n if poll(dev) != -1 {\n count += 1;\n }\n }\n }\n }\n }\n {\n let mut protocols = PROTOCOLS.lock();\n for protocol in protocols.iter_mut() {\n {\n let mut queue = protocol.queue.lock().unwrap();\n let entry_option = queue.pop_front();\n if let Some(entry) = entry_option {\n let _ = (protocol.handler)(&entry.data, entry.dev);\n count += 1;\n }\n }\n }\n }\n if count == 0 {\n thread::sleep(Duration::new(0, 1000_0000));\n }\n }\n}\n\npub fn net_run() -> Result<(), NetDeviceError> {\n let mut net_devices = NET_DEVICES.lock();\n for dev in net_devices.iter_mut() {\n dev.open()?;\n }\n\n let handle = thread::spawn(|| {\n net_thread();\n });\n\n {\n let mut thread_handle = THREAD.lock();\n *(thread_handle.item) = Option::from(handle);\n }\n\n Ok(())\n}\n\npub fn net_shutdown() -> Result<(), NetDeviceError> {\n let mut net_devices = NET_DEVICES.lock();\n for dev in net_devices.iter_mut() {\n dev.close()?;\n }\n\n let _ = TERMINATE.compare_exchange(false, true, Ordering::Release, Ordering::Relaxed);\n\n {\n let mut handle = THREAD.lock();\n handle.join().unwrap();\n }\n\n Ok(())\n}\n\npub fn net_init() {\n ipv4::init();\n}<|endoftext|>use super::ObjectType;\nuse super::TileType;\nuse crate::components::prelude::{Size, Transform};\nuse serde_json::Value as JsonValue;\nuse std::collections::HashMap;\n\n#[derive(Clone, Deserialize)]\npub struct PosData {\n pub x: f32,\n pub y: f32,\n}\n\nimpl Into for &PosData {\n fn into(self) -> Transform {\n let mut transform = Transform::default();\n transform.set_translation_x(self.x);\n transform.set_translation_y(self.y);\n transform\n }\n}\n\n#[derive(Clone, Deserialize)]\npub struct SizeData {\n pub w: f32,\n pub h: f32,\n}\n\nimpl Into for &SizeData {\n fn into(self) -> Size {\n Size::new(self.w, self.h)\n }\n}\n\n#[derive(Clone, Deserialize)]\npub struct Props {\n pub z: Option,\n #[serde(flatten)]\n pub other: HashMap,\n}\n\n#[derive(Clone, Deserialize)]\npub struct Level {\n pub level: LevelData,\n pub tiles: Vec,\n pub objects: Vec,\n}\n\n#[derive(Clone, Deserialize)]\npub struct LevelData {\n pub size: SizeData,\n pub tile_size: SizeData,\n}\n\n#[derive(Clone, Deserialize)]\npub struct TileData {\n pub id: usize,\n #[serde(rename = \"type\")]\n pub tile_type: TileType,\n pub ts: String,\n pub pos: PosData,\n pub props: Props,\n}\n\n#[derive(Clone, Deserialize)]\npub struct ObjectData {\n #[serde(rename = \"type\")]\n pub object_type: ObjectType,\n pub pos: PosData,\n pub size: SizeData,\n pub props: Props,\n}\n\nimpl Into for &TileData {\n fn into(self) -> Transform {\n let mut transform: Transform = (&self.pos).into();\n if let Some(z) = self.props.z {\n transform.set_translation_z(z);\n }\n transform\n }\n}\n\nimpl Into for &ObjectData {\n fn into(self) -> Transform {\n let mut transform: Transform = (&self.pos).into();\n if let Some(z) = self.props.z {\n transform.set_translation_z(z);\n }\n transform\n }\n}<|endoftext|>impl Solution {\n pub fn min_subsequence(nums: Vec) -> Vec {\n let mut sum = 0;\n let mut tmp_sum = 0;\n let mut copy_nums = nums.clone();\n\n for i in &nums{\n sum += *i;\n }\n\n for i in 0..copy_nums.len()-1{\n for j in 0..copy_nums.len()-1-i{\n if copy_nums[j] > copy_nums[j+1]{\n let tmp = copy_nums[j];\n copy_nums[j] = copy_nums[j+1];\n copy_nums[j+1] = tmp;\n }\n }\n }\n\n //println!(\"{:?}\", copy_nums);\n\n let mut res: Vec = Vec::new();\n while tmp_sum <= sum{\n if let Some(tmp) = copy_nums.pop(){\n sum -= tmp;\n tmp_sum += tmp;\n res.push(tmp);\n }\n \n }\n \n res\n }\n}<|endoftext|>use std::rc::Rc;\n\n#[derive(PartialEq, Debug", "num_tokens": 2048} {"category": "stack_edu-SQL", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/stack_edu-SQL/part-00-00000.npy", "text": " 1476094350, 0.01, '开始充值', 68, NULL, NULL),\n(163, '充值', 1478849446, 0.01, '开始充值', 68, NULL, NULL),\n(164, '充值', 1478853027, 0.01, '开始充值', 68, NULL, NULL),\n(165, '充值', 1479178328, 0.01, '开始充值', 68, NULL, NULL);\n\n-- --------------------------------------------------------\n\n--\n-- 表的结构 `wp_bankinfo`\n--\n\nCREATE TABLE `wp_bankinfo` (\n `bid` int(20) NOT NULL,\n `uid` int(11) NOT NULL COMMENT '绑定',\n `bankname` varchar(20) NOT NULL COMMENT '所属银行',\n `province` varchar(20) NOT NULL COMMENT '省份',\n `city` varchar(20) NOT NULL COMMENT '城市',\n `branch` varchar(20) NOT NULL COMMENT '支行名',\n `banknumber` varchar(20) NOT NULL COMMENT '银行卡号',\n `busername` varchar(20) NOT NULL COMMENT '姓名'\n) ENGINE=MyISAM DEFAULT CHARSET=utf8;\n\n--\n-- 转存表中的数据 `wp_bankinfo`\n--\n\nINSERT INTO `wp_bankinfo` (`bid`, `uid`, `bankname`, `province`, `city`, `branch`, `banknumber`, `busername`) VALUES\n(20, 338, '', '', '', '', '', ''),\n(21, 339, '', '', '', '', '', ''),\n(22, 340, '', '', '', '', '', ''),\n(23, 341, '', '', '', '', '', ''),\n(24, 342, '', '', '', '', '', ''),\n(25, 343, '', '', '', '', '', ''),\n(26, 67, '', '', '', '', '', ''),\n(27, 350, '', '', '', '', '', ''),\n(28, 68, '', '', '', '', '', ''),\n(29, 372, '', '', '', '', '', ''),\n(30, 348, '', '', '', '', '', ''),\n(31, 376, '', '', '', '', '', ''),\n(32, 379, '', '', '', '', '', '');\n\n-- --------------------------------------------------------\n\n--\n-- 表的结构 `wp_bankrournal`\n--\n\nCREATE TABLE `wp_bankrournal` (\n `bankno` varchar(255) NOT NULL COMMENT '日志编号',\n `bankname` varchar(255) DEFAULT NULL COMMENT '银行名称',\n `address` varchar(255) DEFAULT NULL COMMENT '地址',\n `\r\n\r\ncardnumber` int(20) DEFAULT NULL COMMENT '银行卡号',\n `cardholder` varchar(255) DEFAULT NULL COMMENT '持卡人名称'\n) ENGINE=MyISAM DEFAULT CHARSET=gbk;\n\n-- --------------------------------------------------------\n\n--\n-- 表的结构 `wp_bournal`\n--\n\nCREATE TABLE `wp_bournal` (\n `bno` varchar(100) NOT NULL COMMENT '提现/充值编号',\n `btype` varchar(20) DEFAULT NULL COMMENT '银行名称',\n `btime` int(20) DEFAULT NULL COMMENT '操作时间',\n `bprice` double(20,2) DEFAULT NULL COMMENT '提现/充值金额',\n `uid` int(20) DEFAULT NULL COMMENT '持卡人名称',\n `username` varchar(20) DEFAULT NULL COMMENT '用户名',\n `isverified` int(10) DEFAULT NULL,\n `balance` double(20,2) DEFAULT '0.00' COMMENT '账户余额'\n) ENGINE=MyISAM DEFAULT CHARSET=utf8;\n\n-- --------------------------------------------------------\n\n--\n-- 表的结构 `wp_bt`\n--\n\nCREATE TABLE `wp_bt` (\n `id` int(11) NOT NULL,\n `name` varchar(255) NOT NULL,\n `kaipan` varchar(255) NOT NULL,\n `shoupan` varchar(255) NOT NULL,\n `diffRate` varchar(255) NOT NULL,\n `jinkai` varchar(255) NOT NULL,\n `date` varchar(255) NOT NULL,\n `zuidi` varchar(255) NOT NULL,\n `zuigao` varchar(255) NOT NULL,\n `time` datetime NOT NULL\n) ENGINE=MyISAM DEFAULT CHARSET=utf8 ROW_FORMAT=DYNAMIC;\n\n-- --------------------------------------------------------\n\n--\n-- 表的结构 `wp_catproduct`\n--\n\nCREATE TABLE `wp_catproduct` (\n `cid` int(11) NOT NULL,\n `cname` varchar(255) DEFAULT NULL,\n `myat` double(11,1) DEFAULT '10.0' COMMENT '点差*',\n `myatjia` double(11,2) DEFAULT '0.00' COMMENT '点差+',\n `ask` double(11,2) DEFAULT '0.00' COMMENT '现在的价格',\n `high` double(11,2) DEFAULT '0.00' COMMENT '最高',\n `low` double(11,2) DEFAULT '0.00' COMMENT '最低',\n `open` double(11,2) DEFAULT '0.00' COMMENT '今开',\n `close` double(11,2) DEFAULT '0.00' COMMENT '昨收',\n `eidtime` int(20) DEFAULT NULL COMMENT '更新时间'\n) ENGINE=MyISAM DEFAULT CHARSET=utf8;\n\n--\n-- 转存表中的数据 `wp_catproduct`\n--\n\nINSERT INTO `wp_catproduct` (`cid`, `cname`, `myat`, `myatjia`, `ask`, `high`, `low`, `open`, `close`, `eidtime`) VALUES\n(1, '原油', 100.0, 1500.00, 239.24, 241.78, 238.13, 240.03, 238.91, 1451993790),\n(2, '白银', 1.0, 1000.00, 2928.00, 2942.00, 2899.00, 2901.00, 2902.00, 1451993791),\n(3, '铜', 1.0, 1500.00, 30375.00, 30499.00, 29939.00, 30057.00, 29965.00, 1451993792),\n(4, '比特币', 10.0, 0.00, 0.00, 0.00, 0.00, 0.00, 0.00, NULL),\n(5, '欧元/美元', 10.0, 0.00, 0.00, 0.00, 0.00, 0.00, 0.00, NULL);\n\n-- --------------------------------------------------------\n\n--\n-- 表的结构 `wp_cl`\n--\n\nCREATE TABLE `wp_cl` (\n `id` int(11) NOT NULL,\n `name` varchar(255) NOT NULL,\n `price` varchar(255) NOT NULL,\n `diff` varchar(255) NOT NULL,\n `diffRate` varchar(255) NOT NULL,\n `jinkai` varchar(255) NOT NULL,\n `zuoshou` varchar(255) NOT NULL,\n `zuidi` varchar(255) NOT NULL,\n `zuigao` varchar(255) NOT NULL,\n `time` datetime NOT NULL\n) ENGINE=MyISAM DEFAULT CHARSET=utf8;\n\n-- --------------------------------------------------------\n\n--\n-- 表的结构 `wp_commission`\n--\n\nCREATE TABLE `wp_commission` (\n `comid` int(11) NOT NULL,\n `ustyle` int(11) DEFAULT '0' COMMENT '状态,0显示,1是不显示',\n `rebate` double(11,2) DEFAULT NULL COMMENT '佣金',\n `cotime` int(20) DEFAULT NULL COMMENT '提现时间',\n `uid` int(11) DEFAULT NULL COMMENT '提线人id'\n) ENGINE=MyISAM DEFAULT CHARSET=utf8;\n\n--\n-- 转存表中的数据 `wp_commission`\n--\n\nINSERT INTO `wp_commission` (`comid`, `ustyle`, `rebate`, `cotime`, `uid`) VALUES\n(1, 0, 20.00, 1450538571, 64),\n(2, 1, 100.00, 1450538571, 6", "num_tokens": 2048} {"category": "stack_edu-SQL", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/stack_edu-SQL/part-00-00000.npy", "text": "3, 1844, '29 Ekim Mah.', 'gaziantep-sehitkamil-29-ekim-mahallesi', 'town'),\n(30734, 1844, '8 Şubat Mah.', 'gaziantep-sehitkamil-8-subat-mahallesi', 'town'),\n(30735, 1844, 'Aktoprak Mah.', 'gaziantep-sehitkamil-aktoprak-mahallesi', 'town'),\n(30736, 1844, 'Aşağı Arıl Mah.', 'gaziantep-sehitkamil-asagi-aril-mahallesi', 'town'),\n(30737, 1844, 'Atabek Mah.', 'gaziantep-sehitkamil-atabek-mahallesi', 'town'),\n(30738, 1844, 'Atakent Mah.', 'gaziantep-sehitkamil-atakent-mahallesi', 'town'),\n(30739, 1844, 'Atatürk Mah.', 'gaziantep-sehitkamil-ataturk-mahallesi', 'town'),\n(30740, 1844, 'Aydınlar Mah.', 'gaziantep-sehitkamil-aydinlar-mahallesi', 'town'),\n(30741, 1844, 'Aydıntepe Mah.', 'gaziantep-sehitkamil-aydintepe-mahallesi', 'town'),\n(30742, 1844, 'Başpınar OSB', 'gaziantep-sehitkamil-baspinar-osb', 'town'),\n(30743, 1844, 'Batıkent Mah.', 'gaziantep-sehitkamil-batikent-mahallesi', 'town'),\n(30744, 1844, 'Bedirköy Mah.', 'gaziantep-sehitkamil-bedirkoy-mahallesi', 'town'),\n(30745, 1844, 'Belkız Mah.', 'gaziantep-sehitkamil-belkiz-mahallesi', 'town'),\n(30746, 1844, 'Beykent Mah.', 'gaziantep-sehitkamil-beykent-mahallesi', 'town'),\n(30747, 1844, 'Bilek Mah.', 'gaziantep-sehitkamil-bilek-mahallesi', 'town'),\n(30748, 1844, 'Boyno Mah.', 'gaziantep-sehitkamil-boyno-mahallesi', 'town'),\n(30749, 1844, 'Budak Mah.', 'gaziantep-sehitkamil-budak-mahallesi', 'town'),\n(30750, 1844, 'Burak Mah.', 'gaziantep-sehitkamil-burak-mahallesi', 'town'),\n(30751, 1844, 'Çağlayan Mah.', 'gaziantep-sehitkamil-caglayan-mahallesi', 'town'),\n(30752, 1844, 'Çakmak Mah.', 'gaziantep-sehitkamil-cakmak-mahallesi', 'town'),\n(30753, 1844, 'Çıksorut Mah.', 'gaziantep-sehitkamil-ciksorut-mahallesi', 'town'),\n(30754, 1844, 'Değirmiçem Mah.', 'gaziantep-sehitkamil-degirmicem-mahallesi', 'town'),\n(30755, 1844, 'Dımışkılı Mah.', 'gaziantep-sehitkamil-dimiskili-mahallesi', 'town'),\n(30756, 1844, 'Dülükbaba Mah.', 'gaziantep-sehitkamil-dulukbaba-mahallesi', 'town'),\n(30757, 1844, 'Emek Mah.', 'gaziantep-sehitkamil-emek-mahallesi', 'town'),\n(30758, 1844, 'Erikli Mah.', 'gaziantep-sehitkamil-erikli-mahallesi', 'town'),\n(30759, 1844, 'Eydibaba Mah.', 'gaziantep-sehitkamil-eydibaba-mahallesi', 'town'),\n(30760, 1844, 'Eyüpsultan Mah.', 'gaziantep-sehitkamil-eyupsultan-mahallesi', 'town'),\n(30761, 1844, 'Fatih Mah.', 'gaziantep-sehitkamil-fatih-mahallesi', 'town'),\n(30762, 1844, 'Fevzi Paşa Mah.', 'gaziantep-sehitkamil-fevzi-pasa-mahallesi', 'town'),\n(30763, 1844, 'Gazi Mah.', 'gaziantep-sehitkamil-gazi-mahallesi', 'town'),\n(30764, 1844, 'Gazikent Mah.', 'gaziantep-sehitkamil-gazikent-mahallesi', 'town'),\n(30765, 1844, 'Girne Mah.', 'gaziantep-sehitkamil-girne-mahallesi', 'town'),\n(30766, 1844, 'Göksüncük Mah.', 'gaziantep-sehitkamil-goksuncuk-mahallesi', 'town'),\n(30767, 1844, 'Göllüce Mah.', 'gaziantep-sehitkamil-golluce-mahallesi', 'town'),\n(30768, 1844, 'Göztepe Mah.', 'gaziantep-sehitkamil-goztepe-mahallesi', 'town'),\n(30769, 1844, 'Güvenevler Mah.', 'gaziantep-sehitkamil-guvenevler-mahallesi', 'town'),\n(30770, 1844, 'Güzelyurt Mah.', 'gaziantep-sehitkamil-guzelyurt-mahallesi', 'town'),\n(30771, 1844, 'Hacıbaba Mah.', 'gaziantep-sehitkamil-hacibaba-mahallesi', 'town'),\n(30772, 1844, 'Hasırcıoğlu Mah.', 'gaziantep-sehitkamil-hasircioglu-mahallesi', 'town'),\n(30773, 1844, 'Hürriyet Mah.', 'gaziantep-sehitkamil-hurriyet-mahallesi', 'town'),\n(30774, 1844, 'İbrahimli Mah.', 'gaziantep-sehitkamil-ibrahimli-mahallesi', 'town'),\n(30775, 1844, 'İbrahimşehir Mah.', 'gaziantep-sehitkamil-ibrahimsehir-mahallesi', 'town'),\n(30776, 1844, 'İncilikaya Mah.', 'gaziantep-sehitkamil-incilikaya-mahallesi', 'town'),\n(30777, 1844, 'İncili Pınar Mah.', 'gaziantep-sehitkamil-incili-pinar-mahallesi', 'town'),\n(30778, 1844, 'Işıklı Mah.', 'gaziantep-sehitkamil-isikli-mahallesi', 'town'),\n(30779, 1844, 'Karacaburç Mah.', 'gaziantep-sehitkamil-karacaburc-mahallesi', 'town'),\n(30780, 1844, 'Karacaoğlan Mah.', 'gaziantep-sehitkamil-karacaoglan-mahallesi', 'town'),\n(30781, 1844, 'Karadede Mah.', 'gaziantep-sehitkamil-karadede-mahallesi', 'town'),\n(30782, 1844, 'Karahüyük Mah.', 'gaziantep-sehitkamil-karahuyuk-mahallesi', 'town'),\n(30783, 1844, 'Karaoğlan Mah.', 'g", "num_tokens": 2048} {"category": "stack_edu-SQL", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/stack_edu-SQL/part-00-00000.npy", "text": "', '123', '{utype}'),\n(4, 'as', '', 'as', '', '', '{utype}'),\n(5, 'assd', '', 'assd', '', '', ''),\n(6, 'as', '', 'as', '', '', ''),\n(7, 'as', '', 'as', '', '', ''),\n(8, 'sd', 'sd', 'sd', '', '', 'sd'),\n(9, 'il', 'il', 'il', 'il', 'il', ' User'),\n(10, 'ilas', 'ilas', 'ilas', 'as', 'as', ' Admin'),\n(11, 'as', 'as', 'as', 'as', 'as', ' Admin');\n\n--\n-- Indexes for dumped tables\n--\n\n--\n-- Indexes for table `users`\n--\nALTER TABLE `users`\n ADD PRIMARY KEY (`uid`);\n\n--\n-- AUTO_INCREMENT for dumped tables\n--\n\n--\n-- AUTO_INCREMENT for table `users`\n--\nALTER TABLE `users`\n MODIFY `uid` int(20) NOT NULL AUTO_INCREMENT, AUTO_INCREMENT=12;\n/*!40101 SET CHARACTER_SET_CLIENT=@OLD_CHARACTER_SET_CLIENT */;\n/*!40101 SET CHARACTER_SET_RESULTS=@OLD_CHARACTER_SET_RESULTS */;\n/*!40101 SET COLLATION_CONNECTION=@OLD_COLLATION_CONNECTION */;<|endoftext|>-- phpMyAdmin SQL Dump\n-- version 4.7.4\n-- https://www.phpmyadmin.net/\n--\n-- Host: 127.0.0.1\n-- Generation Time: Nov 28, 2017 at 04:13 AM\n-- Server version: 10.1.28-MariaDB\n-- PHP Version: 7.1.10\n\nSET SQL_MODE = \"NO_AUTO_VALUE_ON_ZERO\";\nSET AUTOCOMMIT = 0;\nSTART TRANSACTION;\nSET time_zone = \"+00:00\";\n\n\n/*!40101 SET @OLD_CHARACTER_SET_CLIENT=@@CHARACTER_SET_CLIENT */;\n/*!40101 SET @OLD_CHARACTER_SET_RESULTS=@@CHARACTER_SET_RESULTS */;\n/*!40101 SET @OLD_COLLATION_CONNECTION=@@COLLATION_CONNECTION */;\n/*!40101 SET NAMES utf8mb4 */;\n\n--\n-- Database: `item`\n--\n\n-- --------------------------------------------------------\n\n--\n-- Table structure for table `contact`\n--\n\nCREATE TABLE `contact` (\n `id` int(11) NOT NULL,\n `surname` varchar(1000) NOT NULL,\n `name` varchar(1000) NOT NULL,\n `email` varchar(1000) NOT NULL,\n `pnumber` varchar(1000) NOT NULL,\n `address` varchar(1000) NOT NULL,\n `postcode` varchar(1000) NOT NULL,\n `state` varchar(1000) NOT NULL,\n `message` varchar(1000) NOT NULL\n) ENGINE=InnoDB DEFAULT CHARSET=latin1;\n\n--\n-- Dumping data for table `contact`\n--\n\nINSERT INTO `contact` (`id`, `surname`, `name`, `email`, `pnumber`, `address`, `postcode`, `state`, `message`) VALUES\n(1, 'boo', 'bernard', 'bernard@hotmail.com', '017-5555555', 'lorong impian 4', '14000', 'penang', 'good services');\n\n-- --------------------------------------------------------\n\n--\n-- Table structure for table `myorder`\n--\n\nCREATE TABLE `myorder` (\n `id` int(11) NOT NULL,\n `name` varchar(1000) NOT NULL,\n `user_id` int(255) NOT NULL,\n `contact` varchar(1000) NOT NULL,\n `address` varchar(1000) NOT NULL,\n `item_id` int(255) NOT NULL,\n `email` varchar(1000) NOT NULL,\n `quantity` int(255) NOT NULL\n) ENGINE=InnoDB DEFAULT CHARSET=latin1;\n\n--\n-- Dumping data for table `myorder`\n--\n\nINSERT INTO `myorder` (`id`, `name`, `user_id`, `contact`, `address`, `item_id`, `email`, `quantity`) VALUES\n(1, 'bernard', 2, '017-5555555', 'lorong impian 4', 1, 'bbb2@hotmail.com', 1);\n\n-- --------------------------------------------------------\n\n--\n-- Table structure for table `product`\n--\n\nCREATE TABLE `product` (\n `id` int(11) NOT NULL,\n `item_name` varchar(100) NOT NULL,\n `price` decimal(10,2) NOT NULL,\n `quantity` int(255) NOT NULL,\n `image` varchar(1000) NOT NULL,\n `categories` varchar(1000) NOT NULL,\n `gender` varchar(100) NOT NULL\n) ENGINE=InnoDB DEFAULT CHARSET=latin1;\n\n--\n-- Dumping data for table `product`\n--\n\nINSERT INTO `product` (`id`, `item_name`, `price`, `quantity`, `image`, `categories`, `gender`) VALUES\n(1, 'Cargo trousers', '129.00', 49, 'Cargo_trousers.jpg', 'newArrival', 'men'),\n(2, 'Merino wool blend jumper', '129.00', 39, 'Merino_wool-blend_jumper.jpg', 'newArrival', 'men'),\n(3, 'Oversized hooded top', '169.00', 0, 'Oversized_hooded_top.jpg', 'newArrival', 'men'),\n(4, 'Suit trousers slim fit', '149.00', 0, 'Suit_trousers_slim_fit.jpg', 'newArrival', 'men'),\n(5, 'Sweatshirt with embroidery', '149.00', 0, 'Sweatshirt_with_embroidery.jpg', 'newArrival', 'men'),\n(6, 'Twill pea coat', '149.00', 0, 'Twill_pea_coat.jpg', 'newArrival', 'men'),\n(7, 'Skinny Low Jeans', '89.00', 0, 'Skinny_Low_Jeans.jpg', 'jeans', 'men'),\n(8, 'Skinny Low Trashed Jeans', '199.00', 0, 'Skinny_Low_Trashed_Jeans.jpg', 'jeans', 'men'),\n(9, 'Skinny2 Low Jeans', '89.00', 0, 'Skinny2_Low_Jeans.jpg', 'jeans', 'men'),\n(10, 'Skinny2 Low Trashed Jeans', '199.00', 0, 'Skinny2_Low_Trashed_Jeans.jpg', 'jeans', 'men'),\n(11, 'Skinny3 Low Jeans', '89.00', 0, 'Skinny3_Low_Jeans.jpg', 'jeans', 'men'),\n(12, 'Skinny4 Low Jeans', '89.00', 0, 'Skinny4_Low_Jeans.jpg', 'jeans', 'men'),\n(13, 'Cotton shirt Regular fit', '69.00', 0, 'Cotton_shirt_Regular_fit.jpg', 'shirt', 'men'),\n(14, 'Easy2 iron shirt slim fit', '59.00', -1, 'Easy2-iron_shirt_slim_fit.jpg', 'shirt', 'men'),\n(15, 'Easy3 iron shirt slim fit', '59.00', 0, 'Easy3-iron_shirt_slim_fit.jpg', 'shirt', 'men'),\n(16, 'Easy iron shirt slim fit', '59.00', 0, 'Easy-iron_shirt_slim_fit.jpg', 'shirt', 'men'),\n(17, 'Flannel shirt regular fit', '129.00', 0, 'Flannel_shirt_regular_fit.jpg', 'shirt', 'men'),\n(18, 'Flannel2 shirt regular fit', '129.00', 0, 'Flannel2_shirt_regular_fit.jpg', 'shirt', 'men'),\n(19, 'Short chino shorts', '69.00', -1, 'Short_chino_shorts.jpg', 'short', 'men'),\n(20, 'Sweatshirt shorts', '69.00', 0, 'Sweatshirt_shorts.jpg', 'short', 'men'),\n(21, 'Sweatshirt2 shorts', '99.00', 0, 'Sweatshirt2_shorts.jpg', 'short', 'men'),\n(22, 'Sweatshirt3 shorts', '69.00', 0, 'Sweatshirt3_shorts.jpg', 'short', 'men'),\n(23, 'Twill shorts', '99.00', 0, 'Twill_shorts.jpg', 'short', 'men'),\n(24, 'Twill2 shorts', '99.00', 0, 'Twill2_shorts.jpg', 'short', 'men'),\n(25, 'C", "num_tokens": 2048} {"category": "stack_edu-SQL", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/stack_edu-SQL/part-00-00000.npy", "text": "2\",\"-08:00\",881,\"RIGG\");\nINSERT INTO CITY VALUES (36206,254,134,\"Ririe\",\"43.5857\",\"-111.675\",\"-07:00\",758,\"RIRI\");\nINSERT INTO CITY VALUES (36281,254,134,\"Roberts\",\"43.7284\",\"-112.176\",\"-07:00\",758,\"ROBE\");\nINSERT INTO CITY VALUES (36356,254,134,\"Rockland\",\"42.4797\",\"-112.863\",\"-07:00\",758,\"ROCK\");\nINSERT INTO CITY VALUES (36412,254,134,\"Rogerson\",\"42.227\",\"-114.617\",\"-07:00\",760,\"ROGE\");\nINSERT INTO CITY VALUES (36646,254,134,\"Rupert\",\"42.6416\",\"-113.637\",\"-07:00\",760,\"RUPE\");\nINSERT INTO CITY VALUES (36759,254,134,\"Sagle\",\"48.1927\",\"-116.54\",\"-08:00\",881,\"SAGL\");\nINSERT INTO CITY VALUES (14834,254,134,\"Saint Anthony\",\"44.2887\",\"-111.508\",\"-07:00\",758,\"SANT\");\nINSERT INTO CITY VALUES (36788,254,134,\"Saint Charles\",\"42.0896\",\"-111.418\",\"-07:00\",770,\"SCHA\");\nINSERT INTO CITY VALUES (16632,254,134,\"Saint Maries\",\"47.1781\",\"-116.547\",\"-08:00\",881,\"SMAR\");\nINSERT INTO CITY VALUES (8159,254,134,\"Salmon\",\"45.092\",\"-113.704\",\"-07:00\",758,\"SALM\");\nINSERT INTO CITY VALUES (36976,254,134,\"Samuels\",\"48.4794\",\"-116.462\",\"-08:00\",881,\"SAMU\");\nINSERT INTO CITY VALUES (12020,254,134,\"Sandpoint\",\"48.4219\",\"-116.506\",\"-08:00\",881,\"SAND\");\nINSERT INTO CITY VALUES (16312,254,134,\"Santa\",\"47.1502\",\"-116.449\",\"-08:00\",881,\"SANA\");\nINSERT INTO CITY VALUES (37543,254,134,\"Shelley\",\"43.2015\",\"-111.522\",\"-07:00\",758,\"SHEL\");\nINSERT INTO CITY VALUES (37635,254,134,\"Shoshone\",\"42.9609\",\"-114.302\",\"-07:00\",760,\"SHOS\");\nINSERT INTO CITY VALUES (37637,254,134,\"Shoup\",\"45.1101\",\"-114.436\",\"-07:00\",758,\"SHOU\");\nINSERT INTO CITY VALUES (37723,254,134,\"Silverton\",\"47.4961\",\"-115.953\",\"-08:00\",881,\"SILV\");\nINSERT INTO CITY VALUES (37819,254,134,\"Smelterville\",\"47.5436\",\"-116.243\",\"-08:00\",881,\"SMEL\");\nINSERT INTO CITY VALUES (37898,254,134,\"Soda Springs\",\"42.7567\",\"-111.47\",\"-07:00\",758,\"SSPR\");\nINSERT INTO CITY VALUES (38114,254,134,\"Spalding\",\"46.4459\",\"-116.817\",\"-08:00\",881,\"SPAL\");\nINSERT INTO CITY VALUES (14573,254,134,\"Spencer\",\"44.3539\",\"-111.993\",\"-07:00\",758,\"SPEN\");\nINSERT INTO CITY VALUES (16018,254,134,\"Spirit Lake\",\"47.955\",\"-116.835\",\"-08:00\",881,\"SLAK\");\nINSERT INTO CITY VALUES (38229,254,134,\"Springfield\",\"43.1908\",\"-112.345\",\"-07:00\",758,\"SPRI\");\nINSERT INTO CITY VALUES (38266,254,134,\"Squirrel\",\"44.0287\",\"-111.298\",\"-07:00\",758,\"SQUI\");\nINSERT INTO CITY VALUES (8161,254,134,\"Stanley\",\"44.3379\",\"-114.824\",\"-07:00\",758,\"STAN\");\nINSERT INTO CITY VALUES (38330,254,134,\"Star\",\"43.7114\",\"-116.496\",\"-07:00\",757,\"STAR\");\nINSERT INTO CITY VALUES (38461,254,134,\"Stites\",\"46.0925\",\"-115.976\",\"-08:00\",881,\"STIT\");\nINSERT INTO CITY VALUES (11868,254,134,\"Sugar City\",\"43.863\",\"-111.915\",\"-07:00\",758,\"SCIT\");\nINSERT INTO CITY VALUES (8162,254,134,\"Sun Valley\",\"43.6934\",\"-114.34\",\"-07:00\",760,\"SVAL\");\nINSERT INTO CITY VALUES (38779,254,134,\"Swan Valley\",\"43.3541\",\"-111.255\",\"-07:00\",758,\"SVAE\");\nINSERT INTO CITY VALUES (38780,254,134,\"Swanlake\",\"42.3092\",\"-112.013\",\"-07:00\",758,\"SWAN\");\nINSERT INTO CITY VALUES (38801,254,134,\"Sweet\",\"44.023\",\"-116.378\",\"-07:00\",757,\"SWEE\");\nINSERT INTO CITY VALUES (39005,254,134,\"Tendoy\",\"44.9596\",\"-113.644\",\"-07:00\",758,\"TEND\");\nINSERT INTO CITY VALUES (39017,254,134,\"Tensed\",\"47.1849\",\"-116.871\",\"-08:00\",881,\"TENS\");\nINSERT INTO CITY VALUES (39031,254,134,\"Terreton\",\"43.8119\",\"-112.46\",\"-07:00\",758,\"TERR\");\nINSERT INTO CITY VALUES (39039,254,134,\"Teton\",\"43.8985\",\"-111.652\",\"-07:00\",758,\"TETN\");\nINSERT INTO CITY VALUES (39041,254,134,\"Tetonia\",\"43.824\",\"-111.204\",\"-07:00\",758,\"TETO\");\nINSERT INTO CITY VALUES (39051,254,134,\"Thatcher\",\"42.3797\",\"-111.658\",\"-07:00\",770,\"THAT\");\nINSERT INTO CITY VALUES (39425,254,13", "num_tokens": 2048} {"category": "stack_edu-SQL", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/stack_edu-SQL/part-00-00000.npy", "text": "16-06-15', 'HEROMOTOCO.NS', 45.65);\nINSERT INTO historical VALUES ('2016-06-16', 'HEROMOTOCO.NS', 44.88);\nINSERT INTO historical VALUES ('2016-06-17', 'HEROMOTOCO.NS', 45.17);\nINSERT INTO historical VALUES ('2016-06-20', 'HEROMOTOCO.NS', 45.22);\nINSERT INTO historical VALUES ('2016-06-21', 'HEROMOTOCO.NS', 45.18);\nINSERT INTO historical VALUES ('2016-06-22', 'HEROMOTOCO.NS', 45.55);\nINSERT INTO historical VALUES ('2016-06-23', 'HEROMOTOCO.NS', 45.52);\nINSERT INTO historical VALUES ('2016-06-24', 'HEROMOTOCO.NS', 44.98);\nINSERT INTO historical VALUES ('2016-06-27', 'HEROMOTOCO.NS', 44.91);\nINSERT INTO historical VALUES ('2016-06-28', 'HEROMOTOCO.NS', 44.47);\nINSERT INTO historical VALUES ('2016-06-29', 'HEROMOTOCO.NS', 46.69);\nINSERT INTO historical VALUES ('2016-06-30', 'HEROMOTOCO.NS', 47.07);\nINSERT INTO historical VALUES ('2016-07-01', 'HEROMOTOCO.NS', 47.32);\nINSERT INTO historical VALUES ('2016-07-04', 'HEROMOTOCO.NS', 46.98);\nINSERT INTO historical VALUES ('2016-07-05', 'HEROMOTOCO.NS', 46.11);\nINSERT INTO historical VALUES ('2016-07-07', 'HEROMOTOCO.NS', 46.02);\nINSERT INTO historical VALUES ('2016-07-08', 'HEROMOTOCO.NS', 47.06);\nINSERT INTO historical VALUES ('2016-07-11', 'HEROMOTOCO.NS', 48.32);\nINSERT INTO historical VALUES ('2016-07-12', 'HEROMOTOCO.NS', 48.41);\nINSERT INTO historical VALUES ('2016-07-13', 'HEROMOTOCO.NS', 48.42);\nINSERT INTO historical VALUES ('2016-07-14', 'HEROMOTOCO.NS', 48.77);\nINSERT INTO historical VALUES ('2016-07-15', 'HEROMOTOCO.NS', 48.4);\nINSERT INTO historical VALUES ('2016-07-18', 'HEROMOTOCO.NS', 48.36);\nINSERT INTO historical VALUES ('2016-07-19', 'HEROMOTOCO.NS', 48.13);\nINSERT INTO historical VALUES ('2016-07-20', 'HEROMOTOCO.NS', 48.74);\nINSERT INTO historical VALUES ('2016-07-21', 'HEROMOTOCO.NS', 48.59);\nINSERT INTO historical VALUES ('2016-07-22', 'HEROMOTOCO.NS', 48.61);\nINSERT INTO historical VALUES ('2016-07-25', 'HEROMOTOCO.NS', 48.7);\nINSERT INTO historical VALUES ('2016-07-26', 'HEROMOTOCO.NS', 47.68);\nINSERT INTO historical VALUES ('2016-07-27', 'HEROMOTOCO.NS', 47.68);\nINSERT INTO historical VALUES ('2016-07-28', 'HEROMOTOCO.NS', 47.69);\nINSERT INTO historical VALUES ('2016-07-29', 'HEROMOTOCO.NS', 47.84);\nINSERT INTO historical VALUES ('2016-08-01', 'HEROMOTOCO.NS', 48.2);\nINSERT INTO historical VALUES ('2016-08-02', 'HEROMOTOCO.NS', 48.89);\nINSERT INTO historical VALUES ('2016-08-03', 'HEROMOTOCO.NS', 48.3);\nINSERT INTO historical VALUES ('2016-08-04', 'HEROMOTOCO.NS', 48.99);\nINSERT INTO historical VALUES ('2016-08-05', 'HEROMOTOCO.NS', 51.58);\nINSERT INTO historical VALUES ('2016-08-08', 'HEROMOTOCO.NS', 51.73);\nINSERT INTO historical VALUES ('2016-08-09', 'HEROMOTOCO.NS', 51.01);\nINSERT INTO historical VALUES ('2016-08-10', 'HEROMOTOCO.NS', 49.78);\nINSERT INTO historical VALUES ('2016-08-11', 'HEROMOTOCO.NS', 49.44);\nINSERT INTO historical VALUES ('2016-08-12', 'HEROMOTOCO.NS', 49.52);\nINSERT INTO historical VALUES ('2016-08-16', 'HEROMOTOCO.NS', 49.3);\nINSERT INTO historical VALUES ('2016-08-17', 'HEROMOTOCO.NS', 50.23);\nINSERT INTO historical VALUES ('2016-08-18', 'HEROMOTOCO.NS', 50.42);\nINSERT INTO historical VALUES ('2016-08-19', 'HEROMOTOCO.NS', 49.98);\nINSERT INTO historical VALUES ('2016-08-22', 'HEROMOTOCO.NS', 49.64);\nINSERT INTO historical VALUES ('2016-08-23', 'HEROMOTOCO.NS', 49.32);\nINSERT INTO historical VALUES ('2016-08-24', 'HEROMOTOCO.NS', 49.33);\nINSERT INTO historical VALUES ('2016-08-25', 'HEROMOTOCO.NS', 49.29);\nINSERT INTO historical VALUES ('2016-08-26', 'HEROMOTOCO.NS', 49.32);\nINSERT INTO historical VALUES ('2016-08-29', 'HEROMOTOCO.NS', 50.79);\nINSERT INTO historical VALUES ('2016-08-30', 'HEROMOTOCO.NS', 51.87);\nINSERT INTO historical VALUES ('2016-08-31', 'HEROMOTOCO.NS', 52.88);\nINSERT INTO historical VALUES ('2016-09-01', 'HEROMOTOCO.NS', 52.98);\nINSERT INTO historical VALUES ('2016-09-02', 'HEROMOTOCO.NS', 53.56);\nINSERT INTO historical VALUES ('2016-09-06', 'HEROMOTOCO.NS', 54.36);\nINSERT INTO historical VALUES ('2016-09-07', 'HEROMOTOCO.NS', 54.36);\nINSERT INTO historical VALUES ('2016-09-08', 'HEROMOTOCO.NS', 55.8);\nINSERT INTO historical VALUES ('2016-09-09', 'HEROMOTOCO.NS', 54.26);\nINSERT INTO historical VALUES ('2016-09-12', 'HEROMOTOCO.NS', 52.8);\nINSERT INTO historical VALUES ('2016-09-14', 'HEROMOTOCO.NS', 53.65);\nINSERT INTO historical VALUES ('2016-09-15', 'HEROMOTOCO.NS', 52.65);\nINSERT INTO historical VALUES ('2016-09-16', 'HEROMOTOCO.NS', 53.55);\nINSERT INTO historical VALUES ('2016-09-1", "num_tokens": 2048} {"category": "stack_edu-SQL", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/stack_edu-SQL/part-00-00000.npy", "text": "-',7),\n\t(9835,2147483647,'GO','ADILSON BORGES DE JESUS','NEGAO DO FRANGO',50122,'Deferido','PSOL','GOIAS PRA VOCÊ, NÃO PRA ELES',7),\n\t(9836,2147483647,'GO','ADONIAS PEREIRA BARROS','ADONIAS',50222,'Deferido','PSOL','GOIAS PRA VOCÊ, NÃO PRA ELES',7),\n\t(9837,2147483647,'GO','ADRIANA MARIA DA SILVA','ADRIANA',12250,'Com impugnação','PDT','Goiás no rumo certo 3',7),\n\t(9838,2147483647,'GO','ADRIANO DE PAULA','ADRIANO DE PAULA',44445,'Com impugnação','PRP','Goiás no rumo certo 3',7),\n\t(9839,2147483647,'GO','ADRIANO IARENKO','ADRIANO IARENKO',50500,'Deferido','PSOL','GOIAS PRA VOCÊ, NÃO PRA ELES',7),\n\t(9840,2147483647,'GO','ADRIETE CORRADI FONSECA FAYAO ELIAS','ADRIETE ELIAS',15111,'Deferido','PMDB','-',7),\n\t(9841,2147483647,'GO','AFRENI GONCALVES LEITE','AFRENI GONCALVES',45456,'Deferido','PSDB','AVANÇA MAIS GOIÁS',7),\n\t(9842,2147483647,'GO','ÁGABO SOUSA MAGALHAES','ÁGABO DA PAZ',17045,'Deferido','PSL','-',7),\n\t(9843,2147483647,'GO','AGENERIO DA SILVEIRA MACHADO','AGENÉRIO SILVEIRA',65013,'Deferido','PC do B','-',7),\n\t(9844,2147483647,'GO','AGENOR DE CASTRO CURADO','AGENOR CURADO',17111,'Deferido','PSL','-',7),\n\t(9845,2147483647,'GO','AGMAR RIBEIRO DOS SANTOS','AGMAR RIBEIRO',33133,'Com impugnação','PMN','GOIÁS PRA VALER',7),\n\t(9846,2147483647,'GO','AGUINALDO GONÇALVES MESQUITA','DR. AGUINALDO',11800,'Deferido','PP','Goiás no rumo certo 2',7),\n\t(9847,2147483647,'GO','ALADELSO DUTRA VIEIRA','ALADELSO',43123,'Deferido','PV','Goiás no rumo certo 4',7),\n\t(9848,2147483647,'GO','ALADIM BATISTA NEPOMUCENO','ALADIM',11110,'Deferido','PP','Goiás no rumo certo 2',7),\n\t(9849,2147483647,'GO','ALADIO MARTINS DA COSTA','ALADIO MARTINS',28007,'Deferido','PRTB','PARA GOIÁS CRESCER',7),\n\t(9850,2147483647,'GO','ALBERTO ASSUNÇÃO DOS SANTOS','ALBERTO ASSUNÇÃO - GENTE BOA',65490,'Deferido','PC do B','-',7),\n\t(9851,2147483647,'GO','ALBRECHT PEDRO DIETZ','PEDRO DIETZ',50321,'Deferido','PSOL','GOIAS PRA VOCÊ, NÃO PRA ELES',7),\n\t(9852,2147483647,'GO','ALCEMI RODRIGUES DE LIMA','ALCEMI LIMA',23500,'Deferido','PPS','ÉTICA E TRABALHO',7),\n\t(9853,2147483647,'GO','ALCIDES PEREIRA DA SILVA NETO','ALCIDES',50567,'Deferido','PSOL','GOIAS PRA VOCÊ, NÃO PRA ELES',7),\n\t(9854,2147483647,'GO','ALDEMIR ANTONIO CAMARGO DE LIMA','MIRO CAMARGO',50103,'Aguardando julgamento','PSOL','GOIAS PRA VOCÊ, NÃO PRA ELES',7),\n\t(9855,2147483647,'GO','ALESSANDRA XAVIER DA SILVA','ALESSANDRA',33900,'Deferido','PMN','GOIÁS PRA VALER',7),\n\t(9856,2147483647,'GO','ALEXANDRE COTTA PACHECO','DR. ALEXANDRE PACHECO',43043,'Deferido','PV','Goiás no rumo certo 4',7),\n\t(9857,2147483647,'GO','ALEXANDRE DA COSTA SOUZA','ALEXANDRE COSTA',11000,'Deferido','PP','Goiás no rumo certo 2',7),\n\t(9858,2147483647,'GO','ALINE REIS DOMINGUES','ALINE REIS',17017,'Deferido','PSL','-',7),\n\t(9859,2147483647,'GO','ALISON COELHO ARAGAO','ALISSON ARAGAO',43102,'Deferido','PV','Goiás no rumo certo 4',7),\n\t(9860,2147483647,'GO','ALOISIO MOREIRA DOS SANTOS','ISO MOREIRA',45780,'Deferido','PSDB','AVANÇA MAIS GOIÁS',7),\n\t(9861,2147483647,'GO','ALSUERES MARIANO CORREIA JUNIOR','DR ALSUERES',40140,'Deferido','PSB','Goiás no rumo certo 4',7),\n\t(9862,2147483647,'GO','ÁLVARO SOARES GUIMARÃES','ÁLVARO GUIMARÃES',22122,'Deferido','PR','Goiás no rumo certo 2',7),\n\t(9863,2147483647,'GO','ALYEFFERSON ANDRADE SILVA','KINCA MARADONA',17888,'Deferido','PSL','-',7),\n\t(9864,2147483647,'GO','ALZER GOMES ESTEVES DE SOUZA','ALZER',65110,'Com impugnação','PC do B','-',7),\n\t(9865,2147483647,'GO','ALZIRA RODRIGUES BORGES CANUTO','ALZIRA',16100,'Deferido','PSTU','GOIAS PRA VOCÊ, NÃO PRA ELES',7),\n\t(9866,2147483647,'GO','AMARILDO PEREIRA','AMARILDO PEREIRA',44100,'Aguardando julgamento','PRP','Goiás no rumo certo 3',7),\n\t(", "num_tokens": 2048} {"category": "stack_edu-SQL", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/stack_edu-SQL/part-00-00000.npy", "text": "(1279|5596)=\") or obs regexp \"!!8351=(1065|1484)!!\"then @is_pregnant := true\n when @is_pregnant and (t1.encounter_type in (11,47,34) or timestampdiff(week,@is_pregnant,encounter_datetime) > 40 or timestampdiff(week,@edd,encounter_datetime) > 40 or obs regexp \"!!5599=|!!1156=1065!!\") then @is_pregnant := null\n else @is_pregnant\n end as is_pregnant,\n\n\n \n \n \n \n \n\n case\n when @prev_id != @cur_id then\n case\n when @is_pregnant and obs regexp \"!!1836=\" then @edd :=\n date_add(replace(replace((substring_index(substring(obs,locate(\"!!1836=\",obs)),@sep,1)),\"!!1836=\",\"\"),\"!!\",\"\"),interval 280 day)\n when obs regexp \"!!1279=\" then @edd :=\n date_add(encounter_datetime,interval (40-replace(replace((substring_index(substring(obs,locate(\"!!1279=\",obs)),@sep,1)),\"!!1279=\",\"\"),\"!!\",\"\")) week)\n when obs regexp \"!!5596=\" then @edd :=\n replace(replace((substring_index(substring(obs,locate(\"!!5596=\",obs)),@sep,1)),\"!!5596=\",\"\"),\"!!\",\"\")\n else @edd := null\n end\n when @edd is null then\n case\n when @is_pregnant and obs regexp \"!!1836=\" then @edd :=\n date_add(replace(replace((substring_index(substring(obs,locate(\"!!1836=\",obs)),@sep,1)),\"!!1836=\",\"\"),\"!!\",\"\"),interval 280 day)\n when obs regexp \"!!1279=\" then @edd :=\n date_add(encounter_datetime,interval (40-replace(replace((substring_index(substring(obs,locate(\"!!1279=\",obs)),@sep,1)),\"!!1279=\",\"\"),\"!!\",\"\")) week)\n when obs regexp \"!!5596=\" then @edd :=\n replace(replace((substring_index(substring(obs,locate(\"!!5596=\",obs)),@sep,1)),\"!!5596=\",\"\"),\"!!\",\"\")\n else @edd\n end\n when @edd and (t1.encounter_type in (11,47,34) or timestampdiff(week,@edd,encounter_datetime) > 4 or obs regexp \"!!5599|!!1145=1065!!\") then @edd := null\n else @edd\n end as edd,\n\n\t\t\t\t\t\t\n \n case\n when obs regexp \"!!6174=\" then @tb_screen := true \n when obs regexp \"!!2022=1065!!\" then @tb_screen := true \n when obs regexp \"!!307=\" then @tb_screen := true \n when obs regexp \"!!12=\" then @tb_screen := true \n when obs regexp \"!!1271=(12|307|8064|2311|2323)!!\" then @tb_screen := true \n when orders regexp \"(12|307|8064|2311|2323)\" then @tb_screen := true \n when obs regexp \"!!1866=(12|307|8064|2311|2323)!!\" then @tb_screen := true \n when obs regexp \"!!5958=1077!!\" then @tb_screen := true \n when obs regexp \"!!2020=1065!!\" then @tb_screen := true \n when obs regexp \"!!2021=1065!!\" then @tb_screen := true \n when obs regexp \"!!2028=\" then @tb_screen := true \n when obs regexp \"!!1268=(1256|1850)!!\" then @tb_screen := true\n when obs regexp \"!!5959=(1073|1074)!!\" then @tb_screen := true \n when obs regexp \"!!5971=(1073|1074)!!\" then @tb_screen := true \n when obs regexp \"!!1492=107!!\" then @tb_screen := true \n when obs regexp \"!!1270=\" and obs not regexp \"!!1268=1257!!\" then @tb_screen := true\n end as tb_screen,\n \n case\n when obs regexp \"!!8292=\" then @tb_screening_result := \n replace(replace((substring_index(substring(obs,locate(\"!!8292=\",obs)),@sep,1)),\"!!8292=\",\"\"),\"!!\",\"\")\n when @prev_id != @cur_id then @tb_screening_result := null\n else @tb_screening_result \n end as tb_screening_result,\n\n case\n when obs regexp \"!!6174=\" then @tb_screening_datetime := encounter_datetime \n when obs regexp \"!!2022=1065!!\" then @tb_screening_datetime := encounter_datetime \n when obs regexp \"!!307=\" then @tb_screening_datetime := encounter_datetime \n when obs regexp \"!!12=\" then @tb_screening_datetime := encounter_datetime \n when obs regexp \"!!1271=(12|307|8064|2311|2323)!!\" then @tb_screening_datetime := encounter_datetime \n when orders regexp \"(12|307|8064|2311|2323)\" then @tb_screening_datetime := encounter_datetime \n when obs regexp \"!!1866=(12|307|8064|2311|2323)!!\" then @tb_screening_datetime := encounter_datetime \n when obs regexp \"!!5958=1077!!\" then @tb_screening_datetime := encounter_datetime \n when obs regexp \"!!2020=1065!!\" then @tb_screening_datetime := encounter_datetime \n when obs regexp \"!!2021=1065!!\" then @tb_screening_datetime := encounter_datetime \n when obs regexp \"!!2028=\" then @tb_screening_datetime := encounter_datetime \n when obs regexp \"!!1268=(1256|1850)!!\" then @tb_screening_datetime := encounter_datetime\n when obs regexp \"!!5959=(1073|1074)!!\" then @tb_screening_datetime := encounter_datetime \n when obs regexp \"!!5971=(1073|1074)!!\" then @tb_screening_datetime := encounter_datetime \n when obs regexp \"!!1492=107!!\" then @tb_screening_datetime := encounter_datetime \n when obs regexp \"!!1270=\" and obs not regexp \"!!1268=1257!!\" then @tb_screening_datetime := encounter_datetime\n when @cur_id = @prev_id then @tb_screening_datetime\n else @tb_screening_datetime := null\n end as tb_screening_datetime,\n\n\n case\n when obs regexp \"!!1265=(1107|1260)!!\" then @on_ipt := 0\n when obs regexp \"!!1265=!!\" then @on_ipt := 1\n when obs regexp \"!!1110=656!!\" then @on_ipt := 1\n\t\t\t\t\t\t\t\twhen @cur_id != @prev_id then @on_ipt := null\n else @on_ipt\n end as on_ipt,\n\n \n \n case\n when obs regexp \"!!1265=(1256|1850)!!\" then @ipt_start_date := encounter_datetime\n when obs regexp \"!!1265=(1257|981|1406|1849)!!\" and @ipt_start_date is null then @ipt_start_date := encounter_datetime\n\t\t\t\t\t\t\t\twhen obs regexp \"!!10591=1065\" and obs regexp \"!!1190=\" then @ipt_start_date := replace(replace((substring_index(substring(obs,locate(\"!!1190=\",obs)),@sep,1)),\"!!1190=\",\"\"),\"!!\",\"\")\n when @cur_id != @prev_id then @ipt_start_date := null\n else @ipt_start_date\n end as ipt_start_date,\n \n \n \n case\n when obs regexp \"!!1266=\" then @ipt_stop_date := encounter_datetime\n when obs regexp \"!!10591=", "num_tokens": 2048} {"category": "stack_edu-SQL", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/stack_edu-SQL/part-00-00000.npy", "text": "');\nend;\n/\nbegin\nwwv_flow_api.create_query_column (\n p_id=> 5130714854523535 + wwv_flow_api.g_id_offset,\n p_query_id=> 5130505306523467 + wwv_flow_api.g_id_offset,\n p_query_object_id=> 5130601126523471 + wwv_flow_api.g_id_offset,\n p_column_number=> 1,\n p_column_alias=> 'TOUR_ANNEE',\n p_column_sql_expression=> 'TOUR_ANNEE',\n p_column_group_by_sequence=> '');\nend;\n/\nbegin\nwwv_flow_api.create_query_column (\n p_id=> 5130900835523546 + wwv_flow_api.g_id_offset,\n p_query_id=> 5130505306523467 + wwv_flow_api.g_id_offset,\n p_query_object_id=> 5130601126523471 + wwv_flow_api.g_id_offset,\n p_column_number=> 2,\n p_column_alias=> 'TOUR_EDITION',\n p_column_sql_expression=> 'TOUR_EDITION',\n p_column_group_by_sequence=> '');\nend;\n/\nbegin\nwwv_flow_api.create_query_column (\n p_id=> 5131126360523546 + wwv_flow_api.g_id_offset,\n p_query_id=> 5130505306523467 + wwv_flow_api.g_id_offset,\n p_query_object_id=> 5130601126523471 + wwv_flow_api.g_id_offset,\n p_column_number=> 3,\n p_column_alias=> 'TOUR_DATED',\n p_column_sql_expression=> 'TOUR_DATED',\n p_column_group_by_sequence=> '');\nend;\n/\nbegin\nwwv_flow_api.create_query_column (\n p_id=> 5131325595523546 + wwv_flow_api.g_id_offset,\n p_query_id=> 5130505306523467 + wwv_flow_api.g_id_offset,\n p_query_object_id=> 5130601126523471 + wwv_flow_api.g_id_offset,\n p_column_number=> 4,\n p_column_alias=> 'TOUR_DATEF',\n p_column_sql_expression=> 'TOUR_DATEF',\n p_column_group_by_sequence=> '');\nend;\n/\nbegin\nwwv_flow_api.create_query_column (\n p_id=> 5131525177523547 + wwv_flow_api.g_id_offset,\n p_query_id=> 5130505306523467 + wwv_flow_api.g_id_offset,\n p_query_object_id=> 5130601126523471 + wwv_flow_api.g_id_offset,\n p_column_number=> 5,\n p_column_alias=> 'TOUR_NOM',\n p_column_sql_expression=> 'TOUR_NOM',\n p_column_group_by_sequence=> '');\nend;\n/\n \nbegin\n \nwwv_flow_api.create_page_button(\n p_id => 5131919531523572 + wwv_flow_api.g_id_offset,\n p_flow_id => wwv_flow.g_flow_id,\n p_flow_step_id => 48,\n p_button_sequence=> 10,\n p_button_plug_id => 5129804311523072+wwv_flow_api.g_id_offset,\n p_button_name => 'CREATE',\n p_button_action => 'REDIRECT_PAGE',\n p_button_image => 'template:'||to_char(5079530616944012+wwv_flow_api.g_id_offset),\n p_button_is_hot=>'N',\n p_button_image_alt=> 'Create',\n p_button_position=> 'REGION_TEMPLATE_CREATE',\n p_button_alignment=> 'RIGHT',\n p_button_redirect_url=> 'f?p=&APP_ID.:49:&SESSION.::&DEBUG.:49',\n p_required_patch => null + wwv_flow_api.g_id_offset);\n \n \nend;\n/\n\n \nbegin\n \nnull;\n \nend;\n/\n\n \nbegin\n \nwwv_flow_api.create_page_computation(\n p_id=> 5132103334523579 + wwv_flow_api.g_id_offset,\n p_flow_id=> wwv_flow.g_flow_id,\n p_flow_step_id=> 48,\n p_computation_sequence => 1,\n p_computation_item=> 'P49_TOUR_ANNEE',\n p_computation_point=> 'AFTER_SUBMIT',\n p_computation_type=> 'STATIC_ASSIGNMENT',\n p_computation_processed=> 'REPLACE_EXISTING',\n p_computation=> '',\n p_compute_when => 'CREATE',\n p_compute_when_type=>'REQUEST_EQUALS_CONDITION');\n \nnull;\n \nend;\n/\n\n \nbegin\n \n---------------------------------------\n-- ...updatable report columns for page 48\n--\n \nbegin\n \nnull;\nend;\nnull;\n \nend;\n/\n\n \n--application/pages/page_00049\nprompt ...PAGE 49: Master Detail\n--\n \nbegin\n \nwwv_flow_api.create_page (\n p_flow_id => wwv_flow.g_flow_id\n ,p_id => 49\n ,p_user_interface_id => 9661538989678584 + wwv_flow_api.g_id_offset\n ,p_tab_set => 'TS1'\n ,p_name => 'Master Detail'\n ,p_step_title => 'Master Detail'\n ,p_step_sub_title_type => 'TEXT_WITH_SUBSTITUTIONS'\n ,p_include_apex_css_js_yn => 'Y'\n ,p_autocomplete_on_off => 'ON'\n ,p_javascript_code => \n'var htmldb_delete_message=''\"DELETE_CONFIRM_MSG\"'';'||unistr('\\000a')||\n'var htmldb_ch_message=''\"OK_TO_GET_NEXT_PREV_PK_VALUE\"'';'\n ,p_page_is_public_y_n => 'N'\n ,p_cache_page_yn => 'N'\n ,p_help_text => \n'No help is available for this page.'\n ,p_last_updated_by => 'G11_FLIGHT'\n ,p_last_upd_yyyymmddhh24miss => '20140618014929'\n );\nnull;\n \nend;\n/\n\ndeclare\n s varchar2(32767) := null;\n l_clob clob;\n l_length number := 1;\nbegin\ns := null;\nwwv_flow_api.create_page_plug (\n p_id=> 5132704152523586 + wwv_flow_api.g_id_offset,\n p_flow_id=> wwv_flow.g_flow_id,\n p_page_id=> 49,\n p_plug_name=> 'Tour',\n p_region_name=>'',\n p_escape_on_http_output=>'N',\n p_plug_template=> 5069528942943951+ wwv_flow_api.g_id_offset,\n p_plug_display_sequence=> 0,\n p_plug_new_grid => false,\n p_plug_new_grid_row => true,\n p_plug_new_grid_column => true,\n p_plug_display_column=> null,\n p_plug_display_point=> 'BODY_3',\n p_plug_item_display_point=> 'ABOVE',\n p_plug_source=> s,\n p_plug_source_type=> 'STATIC_TEXT',\n p_plug_query_row_template=> 1,\n p_plug_query_headings_type=> 'COLON_DELMITED_LIST',\n p_plug_query_row_count_max => 500,\n p_plug_display_condition_type => '',\n p_plug_caching=> 'NOT_CACHED',\n p_plug_comment=> '');\nend;\n/\ndeclare\n s varchar2(32767) := null;\n l_clob clob;\n l_length number := 1;\nbegin\ns:=s||'select '||unistr('\\000a')||\n'\"TOUR_ANNEE\",'||unistr('\\000a')||\n'\"PART_NUM\",'||unistr('\\000a')||\n'\"CYCLISTE_DATEN\",'||unistr('\\000a')||\n'\"CYCLISTE_PAYS\",'||unistr('\\000a')||\n'\"PART_POIDS\",'||unistr('\\000a')||\n'\"PART_TAILLE\",'||unistr('\\000a')||\n'\"PART_TPS_GENE\",'||unistr('\\000a')||\n'\"PART_CLASS_GENE\",'||unistr('\\000a')||\n'\"PART_PTS_MONT\",'||unistr('\\000a')||\n'\"PART_CLASS_MONT\",'||unistr('\\000a')||\n'\"PART_PTS_SPRINT\",'||unistr('\\000a')||\n'\"PART_CLASS_SPRINT\",'||unistr('\\000a')||\n'\"PART_TPS_ECART\",'||unistr('\\000a')||\n'\"EQUIPE_NUM", "num_tokens": 2048} {"category": "stack_edu-SQL", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/stack_edu-SQL/part-00-00000.npy", "text": "\",\"40.637\",\"-73.6912\",\"-05:00\",501,\"HEWL\");\nINSERT INTO CITY VALUES (10150,254,154,\"Hicksville\",\"40.7655\",\"-73.525\",\"-05:00\",501,\"HICK\");\nINSERT INTO CITY VALUES (14390,254,154,\"High Falls\",\"41.7927\",\"-74.1473\",\"-05:00\",501,\"HFAY\");\nINSERT INTO CITY VALUES (28209,254,154,\"Highland\",\"41.711\",\"-74.0082\",\"-05:00\",501,\"HIGH\");\nINSERT INTO CITY VALUES (15728,254,154,\"Highland Falls\",\"41.3282\",\"-74.0421\",\"-05:00\",501,\"HFAS\");\nINSERT INTO CITY VALUES (28214,254,154,\"Highland Lake\",\"41.5404\",\"-74.8476\",\"-05:00\",501,\"HLAK\");\nINSERT INTO CITY VALUES (12505,254,154,\"Highland Mills\",\"41.3601\",\"-74.109\",\"-05:00\",501,\"HMIL\");\nINSERT INTO CITY VALUES (28222,254,154,\"Highmount\",\"42.1442\",\"-74.4903\",\"-05:00\",501,\"HIGM\");\nINSERT INTO CITY VALUES (28239,254,154,\"Hillburn\",\"41.1268\",\"-74.1705\",\"-05:00\",501,\"HILB\");\nINSERT INTO CITY VALUES (28264,254,154,\"Hillsdale\",\"42.2122\",\"-73.5326\",\"-05:00\",532,\"HILL\");\nINSERT INTO CITY VALUES (28278,254,154,\"Hilton\",\"43.2857\",\"-77.8028\",\"-05:00\",538,\"HILT\");\nINSERT INTO CITY VALUES (28282,254,154,\"Himrod\",\"42.5924\",\"-76.9639\",\"-05:00\",538,\"HIMR\");\nINSERT INTO CITY VALUES (28285,254,154,\"Hinckley\",\"43.3123\",\"-75.1223\",\"-05:00\",526,\"HINC\");\nINSERT INTO CITY VALUES (28302,254,154,\"Hinsdale\",\"42.1993\",\"-78.412\",\"-05:00\",514,\"HINS\");\nINSERT INTO CITY VALUES (28320,254,154,\"Hobart\",\"42.3464\",\"-74.6634\",\"-05:00\",502,\"HOBA\");\nINSERT INTO CITY VALUES (28340,254,154,\"Hoffmeister\",\"43.4715\",\"-74.7272\",\"-05:00\",532,\"HOFF\");\nINSERT INTO CITY VALUES (28341,254,154,\"Hogansburg\",\"44.9835\",\"-74.6107\",\"-05:00\",523,\"HOGA\");\nINSERT INTO CITY VALUES (10151,254,154,\"Holbrook\",\"40.7951\",\"-73.0765\",\"-05:00\",501,\"HOLB\");\nINSERT INTO CITY VALUES (28373,254,154,\"Holland\",\"42.6404\",\"-78.5496\",\"-05:00\",514,\"HOLA\");\nINSERT INTO CITY VALUES (28376,254,154,\"Holland Patent\",\"43.2584\",\"-75.2671\",\"-05:00\",555,\"HPAT\");\nINSERT INTO CITY VALUES (28382,254,154,\"Holley\",\"43.2139\",\"-78.0559\",\"-05:00\",514,\"HOLE\");\nINSERT INTO CITY VALUES (28388,254,154,\"Hollis\",\"40.7171\",\"-73.7686\",\"-05:00\",501,\"HOLL\");\nINSERT INTO CITY VALUES (12308,254,154,\"Hollis Hills\",\"40.713\",\"-73.768\",\"-05:00\",501,\"HHIL\");\nINSERT INTO CITY VALUES (28397,254,154,\"Hollowville\",\"42.2314\",\"-73.668\",\"-05:00\",532,\"HOLO\");\nINSERT INTO CITY VALUES (28413,254,154,\"Holmes\",\"41.5306\",\"-73.6674\",\"-05:00\",501,\"HOLM\");\nINSERT INTO CITY VALUES (13846,254,154,\"Holtsville\",\"40.8102\",\"-73.04\",\"-05:00\",501,\"HOLT\");\nINSERT INTO CITY VALUES (12952,254,154,\"Homer\",\"42.715\",\"-76.1949\",\"-05:00\",555,\"HOME\");\nINSERT INTO CITY VALUES (28460,254,154,\"Honeoye\",\"42.7476\",\"-77.4831\",\"-05:00\",538,\"HONE\");\nINSERT INTO CITY VALUES (28461,254,154,\"Honeoye Falls\",\"42.9635\",\"-77.5871\",\"-05:00\",538,\"HFAZ\");\nINSERT INTO CITY VALUES (28493,254,154,\"Hoosick\",\"42.8627\",\"-73.3286\",\"-05:00\",532,\"HOOS\");\nINSERT INTO CITY VALUES (28494,254,154,\"Hoosick Falls\",\"42.8782\",\"-73.3625\",\"-05:00\",532,\"HFAX\");\nINSERT INTO CITY VALUES (28519,254,154,\"Hopewell Junction\",\"41.562\",\"-73.7865\",\"-05:00\",501,\"HJUN\");\nINSERT INTO CITY VALUES (12072,254,154,\"Hornell\",\"42.3231\",\"-77.6478\",\"-05:00\",565,\"HORN\");\nINSERT INTO CITY VALUES (15081,254,154,\"Horseheads\",\"42.1867\",\"-76.8216\",\"-05:00\",565,\"HORS\");\nINSERT INTO CITY VALUES (28555,254,154,\"Hortonville\",\"41.7851\",\"-75.0265\",\"-05:00\",501,\"HORT\");\nINSERT INTO CITY VALUES (15042,254,154,\"Houghton\",\"42.4112\",\"-78.1136\",\"-05:00\",514,\"HOUG\");\nINSERT INTO CITY VALUES (28592,254,154,\"Howard Beach\",\"40.6579\",\"-73.8447\",\"-05:00\",501,\"HBEA\");\nINSERT INTO CITY VALUES (28604,254,154,\"Howells\",\"41.4797\",\"-74.4659\",\"-05:00\",501,\"HOWE\");\nINSERT INTO CITY VALUES (28606,254,154,\"Howes Cave\",\"42.7", "num_tokens": 2048} {"category": "stack_edu-SQL", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/stack_edu-SQL/part-00-00000.npy", "text": "4:MI:SS'),0,0,0,TO_DATE('2013-12-12 17:26:45','YYYY-MM-DD HH24:MI:SS'),0,'3201605')\n;\n\n-- Dec 12, 2013 5:26:46 PM BRST\nINSERT INTO C_City (C_Country_ID,C_City_ID,C_Region_ID,C_City_UU,Name,IsActive,Created,AD_Org_ID,UpdatedBy,CreatedBy,Updated,AD_Client_ID,LBR_CityCode) VALUES (139,1001310,453,'c81f3a78-43c2-40f9-a237-3a2a458f21ca','Conceição da Barra de Minas','Y',TO_DATE('2013-12-12 17:26:46','YYYY-MM-DD HH24:MI:SS'),0,0,0,TO_DATE('2013-12-12 17:26:46','YYYY-MM-DD HH24:MI:SS'),0,'3115201')\n;\n\n-- Dec 12, 2013 5:26:46 PM BRST\nINSERT INTO C_City (C_Country_ID,C_City_ID,C_Region_ID,C_City_UU,Name,IsActive,Created,AD_Org_ID,UpdatedBy,CreatedBy,Updated,AD_Client_ID,LBR_CityCode) VALUES (139,1001311,445,'e197206e-82f0-43d1-abe5-991fbc64eefe','Conceição da Feira','Y',TO_DATE('2013-12-12 17:26:46','YYYY-MM-DD HH24:MI:SS'),0,0,0,TO_DATE('2013-12-12 17:26:46','YYYY-MM-DD HH24:MI:SS'),0,'2908200')\n;\n\n-- Dec 12, 2013 5:26:46 PM BRST\nINSERT INTO C_City (C_Country_ID,C_City_ID,C_Region_ID,C_City_UU,Name,IsActive,Created,AD_Org_ID,UpdatedBy,CreatedBy,Updated,AD_Client_ID,LBR_CityCode) VALUES (139,1001312,453,'cae76ce9-799b-4d95-8cd9-36756b47511d','Conceição das Alagoas','Y',TO_DATE('2013-12-12 17:26:46','YYYY-MM-DD HH24:MI:SS'),0,0,0,TO_DATE('2013-12-12 17:26:46','YYYY-MM-DD HH24:MI:SS'),0,'3117306')\n;\n\n-- Dec 12, 2013 5:26:46 PM BRST\nINSERT INTO C_City (C_Country_ID,C_City_ID,C_Region_ID,C_City_UU,Name,IsActive,Created,AD_Org_ID,UpdatedBy,CreatedBy,Updated,AD_Client_ID,LBR_CityCode) VALUES (139,1001313,453,'2efffcb0-e8c7-4405-ad28-9304db3a42c7','Conceição das Pedras','Y',TO_DATE('2013-12-12 17:26:46','YYYY-MM-DD HH24:MI:SS'),0,0,0,TO_DATE('2013-12-12 17:26:46','YYYY-MM-DD HH24:MI:SS'),0,'3117207')\n;\n\n-- Dec 12, 2013 5:26:46 PM BRST\nINSERT INTO C_City (C_Country_ID,C_City_ID,C_Region_ID,C_City_UU,Name,IsActive,Created,AD_Org_ID,UpdatedBy,CreatedBy,Updated,AD_Client_ID,LBR_CityCode) VALUES (139,1001314,453,'737553e1-3554-4504-96f9-a069e22424cc','Conceição de Ipanema','Y',TO_DATE('2013-12-12 17:26:46','YYYY-MM-DD HH24:MI:SS'),0,0,0,TO_DATE('2013-12-12 17:26:46','YYYY-MM-DD HH24:MI:SS'),0,'3117405')\n;\n\n-- Dec 12, 2013 5:26:46 PM BRST\nINSERT INTO C_City (C_Country_ID,C_City_ID,C_Region_ID,C_City_UU,Name,IsActive,Created,AD_Org_ID,UpdatedBy,CreatedBy,Updated,AD_Client_ID,LBR_CityCode) VALUES (139,1001315,459,'b614164f-5cbf-4362-a83c-5300495d10bb','Conceição de Macabu','Y',TO_DATE('2013-12-12 17:26:46','YYYY-MM-DD HH24:MI:SS'),0,0,0,TO_DATE('2013-12-12 17:26:46','YYYY-MM-DD HH24:MI:SS'),0,'3301405')\n;\n\n-- Dec 12, 2013 5:26:46 PM BRST\nINSERT INTO C_City (C_Country_ID,C_City_ID,C_Region_ID,C_City_UU,Name,IsActive,Created,AD_Org_ID,UpdatedBy,CreatedBy,Updated,AD_Client_ID,LBR_CityCode) VALUES (139,1001316,445,'d693ec35-b7e1-4812-a38e-6632e9c10622','Conceição do Almeida','Y',TO_DATE('2013-12-12 17:26:46','YYYY-MM-DD HH24:MI:SS'),0,0,0,TO_DATE('2013-12-12 17:26:46','YYYY-MM-DD HH24:MI:SS'),0,'2908309')\n;\n\n-- Dec 12, 2013 5:26:46 PM BRST\nINSERT INTO C_City (C_Country_ID,C_City_ID,C_Region_ID,C_City_UU,Name,IsActive,Created,AD_Org_ID,UpdatedBy,CreatedBy,Updated,AD_Client_ID,LBR_CityCode) VALUES (139,1001317,110,'e011f60c-eebc-44c7-812b-5a151688bd75','Conceição do Araguaia','Y',TO_DATE('2013-12-12 17:26:46','YYYY-MM-DD HH24:MI:SS'),0,0,0,TO_DATE('2013-12-12 17:26:46','YYYY-MM-DD HH24:MI:SS'),0,'1502707')\n;\n\n-- Dec 12, 2013 5:26:46 PM BRST\nINSERT INTO C_City (C_Country_ID,C_City_ID,C_Region_ID,C_City_UU,Name,IsActive,Created,AD_Org_ID,UpdatedBy,CreatedBy,Updated,AD_Client_ID,LBR_CityCode) VALUES (139,1001318,458,'ee40e28e-e5f4-4beb-82df-380f51257be7','Conceição do Canindé','Y',TO_DATE('2013-12-12 17:26:46','YYYY-MM-DD HH24:MI:SS'),0,0,0,TO_DATE('2013-12-12 17:26:46','YYYY-MM-DD HH24:MI:SS'),0,'2202802')\n;\n\n--", "num_tokens": 2048} {"category": "stack_edu-Shell", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/stack_edu-Shell/part-00-00000.npy", "text": "4'\n '78b8013c47e29526d75463e18002c995'\n '6d63a38f2120fc154700317914514278'\n '52dab84e0f4e9d99b9ef92c09b3b8bb4')\n\nbuild() {\n cp -f resources.cfg sumwars-0.5.5-src/resources.cfg\n cd ${srcdir}/sumwars-0.5.5-src\n# rm CMakeCache.txt\n cmake -DCMAKE_INSTALL_PREFIX=/usr\n make ||return 1\n# make install is broken\n# make DESTDIR=$pkgdir install ||return 1\n mkdir -p $pkgdir/usr/share/games/\n mkdir -p $pkgdir/usr/share/games/sumwars\n mkdir -p $pkgdir/usr/share/games/sumwars/save\n chmod 777 $pkgdir/usr/share/games/sumwars/save\n mkdir -p $pkgdir/usr/{bin,share/{applications,pixmaps}}\n install -m755 sumwars $pkgdir/usr/share/games/sumwars/sumwars||return 1\n install -m644 plugins.cfg $pkgdir/usr/share/games/sumwars/plugins.cfg ||return 1\n install -m644 ogre.cfg $pkgdir/usr/share/games/sumwars/ogre.cfg||return 1\n install -m644 resources.cfg $pkgdir/usr/share/games/sumwars/resources.cfg||return 1\n install -m644 authors.txt $pkgdir/usr/share/games/sumwars/authors.txt||return 1\n install -m644 resources/itempictures/shield.png $pkgdir/usr/share/pixmaps/sumwars.png||return 1\n install -m644 $srcdir/../sumwars.desktop $pkgdir/usr/share/applications/sumwars.desktop||return 1\n install -m755 $srcdir/../sumwars.sh $pkgdir/usr/bin/sumwars||return 1\n cp -r data $pkgdir/usr/share/games/sumwars/\n cp -r resources $pkgdir/usr/share/games/sumwars\n touch $pkgdir/usr/share/games/sumwars/CEGUI.log\n touch $pkgdir/usr/share/games/sumwars/Ogre.log\n touch $pkgdir/usr/share/games/sumwars/sumwars.log\n chmod 777 $pkgdir/usr/share/games/sumwars/*.log\n}<|endoftext|>#!/bin/bash\n\ncd /tmp\nwget http://debian.neo4j.org/neotechnology.gpg.key\nrpm --import neotechnology.gpg.key\nwget http://example-data.neo4j.org/3.0-datasets/cineasts.tgz\ntar xzf cineasts.tgz\n\ncat < /etc/yum.repos.d/neo4j.repo\n[neo4j]\nname=Neo4j Yum Repo\nbaseurl=http://yum.neo4j.org/stable\nenabled=1\ngpgcheck=1\nEOF\n\nyum install -y neo4j\n\nsed -i -r 's/#dbms\\.security\\.auth_enabled=false/dbms\\.security\\.auth_enabled=false/' /etc/neo4j/neo4j.conf\nsed -i -r 's/#dbms\\.allow_upgrade=true/dbms\\.allow_upgrade=true/' /etc/neo4j/neo4j.conf\nsed -i -r 's/#dbms\\.shell\\.enabled=true/dbms\\.shell\\.enabled=true/' /etc/neo4j/neo4j.conf\nsed -i -r 's/#dbms\\.security\\.allow_csv_import_from_file_urls=true/dbms\\.security\\.allow_csv_import_from_file_urls=true/' /etc/neo4j/neo4j.conf\n\nservice neo4j restart\n\nsleep 20\n\nservice neo4j stop\n\nmv /tmp/graph.db/* /var/lib/neo4j/data/databases/graph.db/ -f\nchown neo4j:neo4j /var/lib/neo4j/data/databases/graph.db/ -R\n\nservice neo4j start<|endoftext|>#!/bin/bash\n\nset -e # exit immediately if a simple command exits with a non-zero status\nset -u # report the usage of uninitialized variables\n\n# Setup env vars and folders for the webapp_ctl script\n# source /var/vcap/jobs/mesos/helpers/ctl_setup.sh 'mesos'\n\nJOB_NAME=mesos\nLOG_DIR=/var/vcap/sys/log/$JOB_NAME\nRUN_DIR=/var/vcap/sys/run/$JOB_NAME\nPIDFILE=$RUN_DIR/$JOB_NAME.pid\n\nexport MESOS_HOME=/var/vcap/packages/mesos/\nexport JAVA_HOME=/var/vcap/packages/jre/bin/\nexport PATH=$JAVA_HOME:$PATH\n\nmkdir -p $LOG_DIR\nmkdir -p $RUN_DIR\n\ncase $1 in\n\n start)\n\n chown --recursive vcap:vcap $MESOS_HOME\n \n exec chpst -u vcap:vcap $MESOS_HOME/bin/mesos-master.sh \\\n --log_dir=$LOG_DIR \\\n --port=5050 \\\n --cluster=\"bosh-lite\" \\\n >>$LOG_DIR/$JOB_NAME.stdout.log \\\n 2>>$LOG_DIR/$JOB_NAME.stderr.log &\n\n # store pid in $PIDFILE\n echo $! > $PIDFILE\n ;;\n\n stop)\n kill `cat $PIDFILE`\n\n ;;\n *)\n echo \"Usage: mesos_ctl {start|stop}\"\n\n ;;\n\nesac\nexit 0<|endoftext|>#!/bin/bash\n#$ -N ts2Feature_arr\n#$ -S /bin/bash\n#$ -cwd\n#$ -o $JOB_ID_$TASK_ID.o\n#$ -e $JOB_ID_$TASK_ID.e\n#$ -l m_mem_free=3G\n\n## Specify at submission\n# -t 1-200\n# -tc 100\n\necho \"_START_$(date)\"\n\nmodule purge\nmodule load GCC/7.3.0-2.30\nmodule load OpenMPI/3.1.1\nmodule load Python/3.6.6\n\nGITPATH=\"/sonas-hs/siepel/hpc_norepl/home/mo/arg-selection\"\n\nMODE=$1 # <`n`/`s`>\nMETA=$2 # \n\nINPREF=$3\nTTYPE=$4 # example: `tru.trees`, `inf.trees` or `inf.trees.tsz`\nOUTPREF=$5\n\nTHR=$SGE_TASK_ID\nTOTTHR=$6\n\n### FOR PATCHING PURPOSES ###\n\n# ## ARRAY TASKS RUNNING ##\n# PR_JOB_ID=64817910\n# RUNNING=( $(qstat | grep $PR_JOB_ID | awk '{print $10}') )\n\n# ## SUCCESSFULLY FINISHED ##\n# PR_OUTPREF=Trial_fea/trial_swp\n# RAN=( $(ls ${PR_OUTPREF}_meta_*.npy | awk -F'[_.]' '{print $(NF-1)}') )\n\n# EXCLUDE=( \"${RUNNING[@]}\" \"${RAN[@]}\" )\n\n# echo \"EXCLUDE: ${EXCLUDE[@]}\"\n# echo \"Total excluded: ${#EXCLUDE[@]}\"\n\n# if echo ${EXCLUDE[@]} | grep -q -w $THR; then \n# echo $THR \"SKIPPED\"\n# else\n# if [ -f ${PR_OUTPREF}_fea_${THR}.npy ]; then\n# echo \"REMOVING:\"\n# ls -lh ${PR_OUTPREF}_fea_${THR}.npy\n# rm ${PR_OUTPREF}_fea_${THR}.npy\n# fi\n# echo $THR \"EXECUTED\"\n# ${GITPATH}/sim2args/SLiMsim2arg/ts2feature.py $MODE $META $THR $TOTTHR $INPREF $TTYPE $OUTPREF\n# echo \"_EXITSTAT_$?\"\n# fi\n\n#############################\n\n## NORMAL RUN ###\n${GITPATH}/sim2args/SLiMsim2arg/ts2feature.py $MODE $META $THR $TOTTHR $INPREF $TTYPE $OUTPREF\necho \"_EXITSTAT_$?\"\n#################\n\necho \"_END_$(date)\"\nexit<|endoftext|>#!/bin/sh\n\nCONTENTS=\"$(dirname \"$(dirname \"$(dirname \"$(dirname \"$(realpath \"$0\")\")\")\")\")\"\nELECTRON=\"$CONTENTS/GitHubDesktop.exe\"\nCLI=\"$CONTENTS/Resources/app/cli.js\"\n\nELECTRON_RUN_AS_NODE=1 \"$ELECTRON\" \"$CLI\" \"$@\"\n\nexit $?<|endoftext|>#!/bin/sh\nyum update -y\nyum install java -y\nyum install docker -y\nservice docker start\nyum install wget -y\nwget -O /etc/yum.repos.d/jenkins.repo http://pkg.jenkins.io/redhat/jenkins.repo\nrpm --import https://pkg.jenkins.io/redhat/jenkins.io.key\nyum install jenkins -y\nservice jenkins start\ngroupadd docker\nusermod -aG docker ec2-user\nusermod -aG docker jenkins\ncurl -L \"https://github.com/docker/compose/releases/download/1.23.2/docker-compose-$(uname -s)-$(uname -m)\" -o /", "num_tokens": 2048} {"category": "stack_edu-Shell", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/stack_edu-Shell/part-00-00000.npy", "text": "# THUMB_HEIGHT - Thumbnail height\n# QUALITY - JPEG image quality\n\nINDEX_FILE=$PEPPER_DIR/pepper.json\nTAGS_FILE=$PEPPER_DIR/tags.txt\n\nIMAGE_DIR=$PEPPER_DIR/images\nTHUMB_DIR=$PEPPER_DIR/thumbs\n\nTAGS=\n\ninit() {\n local ARG_COUNT=$1\n local PROG=\n\n if [ \"$ARG_COUNT\" == \"0\" ]; then\n echo \"Nothing to do\"\n return 1\n fi\n\n if [ -z \"$PEPPER_DIR\" ]; then\n echo \"Env PEPPER_DIR not set\"\n return 1\n fi\n\n [ -z \"$THUMB_WIDTH\" ] && THUMB_WIDTH=200\n [ -z \"$THUMB_HEIGHT\" ] && THUMB_HEIGHT=200\n [ -z \"$QUALITY\" ] && QUALITY=90\n [ -z \"$EDITOR\" ] && EDITOR=vim\n\n for PROG in djpeg cjpeg pamscale pamcut exiv2 jq; do\n if ! which \"$PROG\" > /dev/null 2>&1; then\n echo \"Program $PROG is required\"\n return 1\n fi\n done\n\n [ ! -d \"$IMAGE_DIR\" ] && mkdir \"$IMAGE_DIR\"\n [ ! -d \"$THUMB_DIR\" ] && mkdir \"$THUMB_DIR\"\n\n return 0\n}\n\nask_tags() {\n if [ ! -e \"$TAGS_FILE\" ]; then\n cat <<< \"#\n# Enter a list of image tags here.\n# They should be separated by a new line.\n#\" > \"$TAGS_FILE\"\n fi\n\n \"$EDITOR\" \"$TAGS_FILE\" || return 1\n\n if egrep '^!' \"$TAGS_FILE\" > /dev/null; then\n echo \"Aborting (found a tag starting with !)\"\n return 1\n fi\n\n if [ -e \"$TAGS_FILE\" ]; then\n TAGS=$(egrep -v '^#' \"$TAGS_FILE\")\n fi\n}\n\nprocess_image() {\n local FILE_PATH=$1\n local FILE_NAME=$2\n local IMAGE_PATH=$3\n local THUMB_PATH=$4\n\n write_thumb \"$FILE_PATH\" \"$THUMB_PATH\" || return 1\n write_image \"$FILE_PATH\" \"$IMAGE_PATH\" || return 1\n update_index \"$FILE_PATH\" \"$FILE_NAME\" || return 1\n}\n\nwrite_thumb() {\n local FILE_PATH=$1\n local THUMB_PATH=$2\n\n echo \"[$FILE_NAME] Thumbnail: $THUMB_PATH (${THUMB_WIDTH}x${THUMB_HEIGHT})\"\n\n djpeg \"$FILE_PATH\" | \\\n pamscale -xyfill \"$THUMB_WIDTH\" \"$THUMB_WIDTH\" | \\\n pamcut -width \"$THUMB_WIDTH\" -height \"$THUMB_HEIGHT\" | \\\n cjpeg -optimize -progressive -quality \"$QUALITY\" > \"$THUMB_PATH\"\n}\n\nwrite_image() {\n local FILE_PATH=$1\n local IMAGE_PATH=$2\n\n echo \"[$FILE_NAME] Image: $IMAGE_PATH\"\n\n djpeg \"$FILE_PATH\" | \\\n cjpeg -optimize -progressive -quality \"$QUALITY\" > \"$IMAGE_PATH\"\n}\n\n\nupdate_index() {\n local FILE_PATH=$1\n local FILE_NAME=$2\n\n local IMAGE_DATE=$(exiv2 -K 'Exif.Image.DateTime' -Pv \"$FILE_PATH\" 2>/dev/null)\n #exiv2 DateTime format is YYYY:mm:dd HH:MM:SS\n IMAGE_DATE=${IMAGE_DATE/:/-}\n IMAGE_DATE=${IMAGE_DATE/:/-}\n\n if [ \"$IMAGE_DATE\" == '0000-00-00 00:00:00' ]; then\n echo \"Invalid date: $IMAGE_DATE\"\n return 1\n fi\n\n local JSON=\"{\n \\\"fileName\\\": $(echo \"$FILE_NAME\" | jq -R .),\n \\\"imageDate\\\": $(echo \"$IMAGE_DATE\" | jq -R .),\n \\\"addedDate\\\": $(date '+%Y-%m-%d %H:%M:%S' | jq -R .),\n \\\"tags\\\": $(echo \"$TAGS\" | jq -Rs 'split(\"\\n\") | [ .[] | select(length > 0) ]')\n }\"\n\n [ ! -e \"$INDEX_FILE\" ] && echo '[]' > \"$INDEX_FILE\"\n\n cat \"$INDEX_FILE\" | \\\n jq \". += [$JSON]\" > \"$INDEX_FILE.new\" || return 1\n rm \"$INDEX_FILE\" > /dev/null 2>&1 || return 1\n mv \"$INDEX_FILE.new\" \"$INDEX_FILE\"\n}\n\nprep_images() {\n while true; do\n [ -z \"$1\" ] && break\n local FILE_PATH=$1\n local FILE_NAME=$(basename \"$FILE_PATH\")\n local THUMB_PATH=$THUMB_DIR/$FILE_NAME\n local IMAGE_PATH=$IMAGE_DIR/$FILE_NAME\n shift\n\n process_image \"$FILE_PATH\" \"$FILE_NAME\" \"$IMAGE_PATH\" \"$THUMB_PATH\"\n done\n}\n\nfail() {\n end_message\n exit 1\n}\n\nend_message() {\n local EMPTY=\n [ -z \"$PUSH_TO_EXIT\" ] && return 0\n read -p 'Push ENTER to continue' EMPTY\n}\n\ninit \"$#\" || fail\nask_tags || fail\nprep_images \"$@\"\nend_message<|endoftext|>#!/bin/bash\n#using Random to get Dice Number Between 1 to 6\nrand_number=$((RANDOM%6+1))\necho \"random number between 1 to 6 is $rand_number\"<|endoftext|>#!/bin/bash\n\nPLATFORM=http://us-east.manta.joyent.com/nahamu/public/smartos/platform-hourly.tgz\nSNAPSHOT=zones/smartos@pre-upgrade\n\n#so that we can fail on either curl or gtar\nset -o pipefail \n\nfunction already_latest\n{\n\techo \"Already have the latest version.\"\n\texit 0\n}\n\nfunction fail\n{\n\tzfs rollback $SNAPSHOT\n\techo \"Upgrade failed. Rolled back to working state.\"\n\texit 1\n}\n\ncd /zones/smartos\ncurl -I $PLATFORM 2>/dev/null | grep Etag > etag.latest\ndiff etag.current etag.latest && already_latest\n\nzfs destroy $SNAPSHOT &>/dev/null #If it exists, destroy it\nzfs snapshot $SNAPSHOT\n\n(cd platform && curl $PLATFORM | gtar xz --strip-components=1) || fail\nmv etag.latest etag.current\n\necho \"Upgrade complete. Reboot when ready.\"\nexit 0<|endoftext|>#!/usr/bin/sh\n#######################\n# author: yangshengcheng\n# name: istock build script\n########################\n\necho \necho \"istock Build System!\"\necho \"----------------------------------------\"\n\necho \"check env for the JAVA_HOME enviroment variable\"\nJAVA_HOME=`env|grep -i \"^JAVA_HOME\"|awk -F \"=\" '{print $NF}'`\nif [ $JAVA_HOME = \"\" ]; then\n\techo \"please set the proper JAVA_HOME enviroment variable\"\n\texit\nfi\n\n#make package dir\nmkdir -p com/gf/istock\nchmod -R 777 com/gf/istock\n\npackageDir=\"com/gf/istock\"\n\n# set istock classpath\nPWD=`pwd`\nexport CLASSPATH=.:${PWD}/lib/commons-cli-1.2.jar:${PWD}/lib/log4j-1.2.8.jar\n\n# compile the java files\n\"${JAVA_HOME}/bin/javac\" -d $packageDir ${PWD}/src/*.java\n\n#make a jar package\n\"${JAVA_HOME}/bin/jar\" cvfm istock.jar manifest.mf -C com/gf/istock/ .\n\n\nclean()\n{\n\tif [ -d \"${PWD}/com/gf/istock\" ];then\n\t\trm -rf com/\n\tfi\n}\n\n\nif [ -f \"${PWD}/istock.jar\" ];then\n\tchmod 755 istock.jar\n\techo \"build itock success !\"\n\tclean\nelse\n\techo \"build itock fail,please investigate!!\"\n\tclean\nfi<|endoftext|>#!/bin/bash\n\nchosen=$(echo -e \"fullscreen\\narea\\narea [clipboard]\\nactive window\\n[cancel]\" | rofi -dmenu -lines 5 -width 10 -p \"screenshot\" -i)\n\nif [[ $chosen = \"fullscreen\" ]]; then\n\tsleep 1; maim ~/screenshots/$(date \"+%F-%H-%M-%S\").png; notify-send '\tscreenshot saved!'\nelif [[ $chosen = \"area\" ]]; then\n\tmaim -s ~/screenshots/$(date \"+%F-%H-%M-%S\").png; notify-send '\tselected area screenshot saved!'\nelif [[ $chosen = \"area [clipboard]\" ]]; then\n\tmaim -s | xclip -selection clipboard -t image/png; notify-send '\tscreenshot copied to clipboard'\nelif [[ $chosen = \"active window\" ]]; then\n\tsleep 1; maim -i $(xdotool getactivewindow) ~/screenshots/$(date \"+%F-%H-%M-%S\").png; notify-send '\tactive window screenshot saved!'\nfi\n\n# with shadow\n#maim -st 9999999 | convert - \\( +clone -background black -shadow 80x8+5+5 \\) +swap -background none -layers merge +repage ~/screenshots/$(date \"+", "num_tokens": 2048} {"category": "stack_edu-Shell", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/stack_edu-Shell/part-00-00000.npy", "text": "if [ -e /etc/init.d/fail2ban ]; then\n /etc/init.d/fail2ban restart\nfi<|endoftext|>#!/bin/bash\n\nset -euo pipefail\n\nCURRENT_DIR=\"$(pwd)\"\necho ${CURRENT_DIR}\n\nsource \"external/bazel_1/toto.txt\"\n\nfunction test_toto_content {\n\n if [ $TOTO != \"gah\" ]; then\n # This would be a failure case.\n echo expected TOTO to be toto1 but was $TOTO\n exit 1\n fi\n}\n\ntest_toto_content<|endoftext|>#!/bin/bash\n\n# The pre_start_cartridge and pre_stop_cartridge hooks are *SOURCED*\n# immediately before (re)starting or stopping the specified cartridge.\n# They are able to make any desired environment variable changes as\n# well as other adjustments to the application environment.\n\n# The post_start_cartridge and post_stop_cartridge hooks are executed\n# immediately after (re)starting or stopping the specified cartridge.\n\n# Exercise caution when adding commands to these hooks. They can\n# prevent your application from stopping cleanly or starting at all.\n# Application start and stop is subject to different timeouts\n# throughout the system.\n\n#\n# This is probably a terrible idea, but we'll leave this here just in case\n# we need to remember it later\n#\n#RAILS_ENV=production bundle exec rails runner bin/twitter_stream.rb &> $OPENSHIFT_REPO_DIR/log/twitter_stream.log\n#RAILS_ENV=production bundle exec rails runner bin/schedule.rb &> $OPENSHIFT_REPO_DIR/log/schedule.log<|endoftext|>#!/bin/sh\n\n## Author: George Zhao\n## GetLog\n#!/bin/sh\n\n# e.g \"sh check-chatbot.sh kill\" it shall kill the process\n\n\nhosts=(\"107.182.235.108\")\ntarget=/home/root/public_html\n\n\n\nfor ix in ${!hosts[*]}\ndo\n\techo \"testing...${hosts[$ix]}\"\n\tif [ \"$1\" = \"kill\" ] \n\tthen\n \techo \"kill processes\"\n \tssh root@${hosts[$ix]} \"pkill -f \\\"flask\\\"\"\n\tfi\n\ndone\n\necho \"check is done!\"<|endoftext|>#!/bin/bash\n\nset -euxo pipefail\n\n# Install HCO\nbash deploy.sh\n\n# Explicitly wait for kubevirt to be deployed\nkubectl wait -n kubevirt-hyperconverged kv kubevirt --for condition=Ready --timeout 360s || (echo \"KubeVirt not ready in time\" && exit 1)\n\n# Wait at least for one pod\nwhile [ -z \"$(kubectl get pods -n kubevirt-hyperconverged)\" ]; do\n echo \"Waiting for at least one pod ...\"\n kubectl get pods -n kubevirt-hyperconverged\n sleep 10\ndone\n\n# Wait until k8s pods are running\nwhile [ -n \"$(kubectl get pods -n kubevirt-hyperconverged --no-headers | grep -v Running)\" ]; do\n echo \"Waiting for HCO pods to enter the Running state ...\"\n kubectl get pods -n kubevirt-hyperconverged --no-headers | >&2 grep -v Running || true\n sleep 10\ndone\n\n# Make sure all containers are ready\nwhile [ -n \"$(kubectl get pods -n kubevirt-hyperconverged -o'custom-columns=status:status.containerStatuses[*].ready,metadata:metadata.name' --no-headers | grep false)\" ]; do\n echo \"Waiting for all containers to become ready ...\"\n kubectl get pods -n kubevirt-hyperconverged -o'custom-columns=status:status.containerStatuses[*].ready,metadata:metadata.name' --no-headers\n sleep 10\ndone<|endoftext|>#!/usr/bin/env bash\n\n# NOTE: fuse-utils before Ubuntu 13.10, fuse after. Script tries both, depends\n# on what is in the repositories. Error messages are unimportant.\n\necho \"Install autofs, fuse, and sshfs file systems\"\n\n# if [[ $EUID -ne 0 ]] ; then echo 'try again using sudo' ; exit 1 ; fi\n# Clear and reestablish sudo privileges to run this program as root\nsudo -k\necho -e \"\\e[1;31m Authentication required \\e[0m\"\nsudo bash << SCRIPT\n\n apt-get --no-upgrade install sshfs fuse fuse-utils autofs\n modprobe --first-time fuse\n if [[ -z \"$(grep 'fuse' /etc/modules)\" ]] ; then \n echo \"fuse\" >> /etc/modules\n fi \n\nSCRIPT<|endoftext|>#!/bin/bash\n\nPROGRAM_NAME=`basename $0`\n\nif [[ (-z $path) || (-z $instanceType) || (-z $VHOST_HOME) ]]; then\n echo \"ERROR: usage: $PROGRAM_NAME The following environment variables need to be set\"\n echo \" path (you have \\\"${path}\\\")\"\n echo \" instanceType (you have \\\"${instanceType}\\\")\"\n echo \" VHOST_HOME (you have \\\"${VHOST_HOME}\\\")\"\n exit 1;\nfi\n\npath=`basename $path`\ninstanceType=`basename $instanceType`\n\nif [[ `expr \"${path}\" : \"[a-zA-Z0-9_-]\\+$\"` -eq 0 ]]; then\n echo \"ERROR: path variable invalid\"\n exit 1;\nfi\nif [[ \"STAGING\" != \"${instanceType}\" && \"PROD\" != \"${instanceType}\" && \"TEST\" != \"${instanceType}\" ]]; then\n echo \"ERROR: instanceType variable invalid\"\n exit 1;\nfi\nif [[ `expr \"${VHOST_HOME}\" : \"[a-zA-Z0-9\\/_-]\\+$\"` -eq 0 ]]; then\n echo \"ERROR: VHOST_HOME variable invalid\"\n exit 1;\nfi\n\nif [[ ! -e ${VHOST_HOME} || ! -d ${VHOST_HOME} ]]; then\n echo \"ERROR: ${VHOST_HOME} does not exist\"\n exit 1;\nfi\n\nvhostFile=${instanceType}.${path}.vhost\n\necho \"Nuking ${VHOST_HOME}/${vhostFile}\"\n\nrm ${VHOST_HOME}/${vhostFile}\n\nif [[ $? -ne 0 ]]; then\n echo \"ERROR: rm ${VHOST_HOME}/${vhostFile} failed\"\n exit 1;\nfi<|endoftext|>#!/bin/sh\n\nset -e\n\n>&2 echo \"Make Database migrations\"\npython manage.py makemigrations v1\necho \"-------------------------------------------------------------------------------------------\\n\"\n\n\n>&2 echo \"Run Database migrations\"\npython manage.py migrate\necho \"-------------------------------------------------------------------------------------------\\n\"\n\n\n\n>&2 echo \"Start Django Q task Scheduler\"\npython manage.py qcluster &\necho \"-------------------------------------------------------------------------------------------\\n\"\n\n>&2 echo \"create task\"\necho \"from django_q.tasks import schedule; import arrow; schedule('v1.tasks.get_all_ylyl_threads',\n schedule_type=Schedule.MINUTES,\n minutes=5,\n repeats=-1,\n next_run=arrow.utcnow())\"\n\n>&2 echo \"Create temporary superuser\"\necho \"from django.contrib.auth.models import User; User.objects.filter(username='admin').exists() or User.objects.create_superuser('admin', 'admin@example.com','admin')\" | python manage.py shell\n\necho \"-------------------------------------------------------------------------------------------\\n\"\n\n# Start Django dev server\n>&2 echo \"Starting Django runserver...\"\n# while true; do sleep 12 ; echo \"foreground\"; done\nexec \"$@\"<|endoftext|>#!/bin/bash -ex\n# This script is meant to be run in the User Data of each EC2 Instance while it's booting. The script uses the\n# run-consul script to configure and start Consul in client mode and then the run-vault script to configure and start\n# consul in server mode.\n\n# Send the log output from this script to user-data.log, syslog, and the console\n# From: https://alestic.com/2010/12/ec2-user-data-output/\nexec > >(tee /var/log/user-data.log|logger -t user-data -s 2>/dev/console) 2>&1\n\n# set up http health check\necho \"Hello, World\" > index.html\nnohup busybox httpd -f -p 8080 &\n\nsu ec2-user -c 'source ~/.bash_profile; python /tmp/install-consul/conf_consul.py'\n\n# The cluster_tag variables below are filled in via Terraform interpolation\nsu ec2-user -c 'source ~/.bash_profile; export AWS_SDK_LOAD_CONFIG=1; export AWS_PROFILE=terraform; /opt/consul/bin/run-consul --server --cluster-tag-key ${consul_cluster_tag_key} --cluster-tag-value ${consul_cluster_tag_value}'<|endoftext|>#!/bin/bash\n\nfileDate=\"/usr/local/bin/owping/outDate.txt\"\nfileTime=\"/usr/local/bin/owping/outTime.txt\"\nfileOpt=\"/usr/local/bin/owping/outOpt.txt\"\ndate=$(cat \"$fileDate\")\ntime=$(cat \"$fileTime\")\nopt=$(cat \"$fileOpt\")\nfileList=\"/usr/local/bin/owping/pies.txt\"\nls \"/var/log/owlogs/\" > $fileList\nwhile read line \ndo\n echo \"$(/bin/sh /usr/local/bin/owping/owplot.sh $line -t $time -d $date -x $opt)\"\ndone<$fileList\nrm $fileList<|endoftext|>#!/usr/bin/env bash\n\n# Default settings for Raspberry Pi's (beginning from RPI3)\n\n# root is always user_id 0\nSUDO=''\n[ \"$(id -u)\" -ne 0 ] && { SUDO='sudo'; echo \"Your not", "num_tokens": 2048} {"category": "stack_edu-Shell", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/stack_edu-Shell/part-00-00000.npy", "text": "}:latest -q\n echo \"**** Tagged image gcr.io/$PROJECT/$NAMESPACE/prebuilt/debian8/otp-${version}:$IMAGE_TAG as latest\"\ndone<|endoftext|>#!/bin/bash\n#by ming\n\ncheck_user () {\nlogin_user=`who am i|awk '{print $1}'`\nif [ $login_user != \"root\" ];then\n echo \"必须用root用户运行\"\n exit 1\nfi\n}\n\nyum_nginx (){\necho -------------------------开始安装nginx-------------------------------\nrpm -Uvh http://nginx.org/packages/centos/7/noarch/RPMS/nginx-release-centos-7-0.el7.ngx.noarch.rpm >/dev/null 2>&1\necho \"nginx yum源安装成功\"\necho \"开始安装nginx\"\nyum install -y nginx >/dev/null 2>&1\nsystemctl start nginx &&echo \"nginx启动成功\"\nsystemctl enable nginx >/dev/null 2>&1\n}\n\nyum_php(){\necho \"-------------------------开始安装php5.6 -----------------------------\"\necho \"安装php yum源\"\nyum install -y epel-release >/dev/null 2>&1 \nrpm -Uvh https://mirror.webtatic.com/yum/el7/webtatic-release.rpm >/dev/null 2>&1\necho \"开始安装php56\"\nyum install php56w-fpm php56w-opcache php56w-mysql php56w-devel -y >/dev/null 2>&1\nsystemctl enable php-fpm >/dev/null 2>&1\nsystemctl start php-fpm \necho \"开始集成nginx\"\nfor i in {30..36};do\n\tif [ $i -eq 34 ];then\n\t\tsed -i 34d /etc/nginx/conf.d/default.conf \n\t\tsed -i 'N;34a\\fastcgi_param SCRIPT_FILENAME $document_root$fastcgi_script_name;' /etc/nginx/conf.d/default.conf \n\telse\n\t\tsed -i ${i}s/\"#\"//g /etc/nginx/conf.d/default.conf \n\tfi\ndone\nsed -i 10d /etc/nginx/conf.d/default.conf \nsed -i 'N;9a\\index index.php index.html index.htm' /etc/nginx/conf.d/default.conf \necho \"

    hpinfo(); ?>\" > /usr/share/nginx/html/index.php\n\n}\n\nyum_mysql (){\necho -------------------------开始安装mysql-------------------------------\nrpm -Uvh https://dev.mysql.com/get/mysql80-community-release-el7-1.noarch.rpm >/dev/null 2>&1\necho \"mysql yum 源安装成功\"\necho \"设置yum源版本:mysql 5.7\"\nsed -i 28s/\"enabled=1\"/\"enabled=0\"/g /etc/yum.repos.d/mysql-community.repo\nsed -i 21s/\"enabled=0\"/\"enabled=1\"/g /etc/yum.repos.d/mysql-community.repo\necho \"开始安装mysql\"\nyum install -y mysql mysql-server mysql-devel >/dev/null 2>&1\necho \"启动mysql\"\nsystemctl start mysqld \nsystemctl enable mysqld >/dev/null 2>&1\necho \"修改mysql root密码\"\nold_passwd=`grep \"temporary password\" /var/log/mysqld.log |awk '{print $NF}'`\nmysql -uroot -p$old_passwd -e \"ALTER USER 'root'@'localhost' IDENTIFIED BY '$new_password';\" >/dev/null 2>&1\n} \n\nfirewall(){\necho '----------------------开始配置防火墙------------------------------' \nports='80 3306' \nfor port in $ports;do\necho \"开始添加$port\"\nfirewall-cmd --add-port=$port/tcp --permanent\ndone\necho '重新加载防火墙配置'\nfirewall-cmd --reload\n}\n\nmain () {\nclear\nnew_password=\"Mysql_test1\"\ncheck_user\nyum_nginx\nyum_php\nyum_mysql\nfirewall\nsleep 2\nclear\necho -------------------------安装完毕-------------------------------\nipaddr=`ip a |grep inet|grep -v inet6|grep -v 127.0.0.1|awk '{print $2}'|awk -F / '{print \"http://\"$1}'` \necho \"安装完毕,nginx访问地址:\\\\n $ipaddr \"\necho \"mysql root 密码:$new_password\"\t\n}\n\nmain<|endoftext|>#!/bin/sh\nif [ -d $1 ]; then\n\techo \"yes\"\nelse\n\techo \"no\"\nfi<|endoftext|>#!/bin/bash\n\n# Checks if a new commit's message contains \"Signed-off-by:\" line.\n# If not, outputs a warning but does not abort the commit.\n\n[ -n \"${CHAIN_HOOKS_DEBUG_HELPERS}\" ] && . \"${CHAIN_HOOKS_DEBUG_HELPERS}\"\n\n_hooks_debug \"check Signed-off-by in $1\"\n\nif ! grep -q -E '^Signed-off-by: ' \"$1\"; then\n RED=\"$(tput setaf 1)\"\n RESET=\"$(tput sgr0)\"\n\n echo >&2 \"${RED}WARNING: Missing Signed-off-by line.${RESET}\"\nfi<|endoftext|>#!/bin/bash\n\n# Set the desired width and quality for the WebP images\nTARGET_WIDTH=325\nTARGET_QUALITY=85\n\n# Exit script if any command fails\nset -e\n\n# Check if the source and destination directories exist\nif [ ! -d \"$1\" ] || [ ! -d \"$2\" ]; then\n echo \"Usage: $0 \"\n exit 1\nfi\n\n# Get the absolute path of the directories\nSOURCE_DIR=$(readlink -f \"$1\")\nDEST_DIR=$(readlink -f \"$2\")\n\n# Print info\necho \"Converting PNG files to WebP in ${SOURCE_DIR} and saving to ${DEST_DIR}\"\necho \"with width ${TARGET_WIDTH} px and quality ${TARGET_QUALITY}%\"\n\n# Iterate through each PNG file in the source directory\nfor file in \"${SOURCE_DIR}\"/*.png; do\n # Get the file name without extension\n filename=$(basename -- \"${file%.*}\")\n\n # Convert and resize the PNG file to WebP\n convert \"${file}\" -resize \"${TARGET_WIDTH}\"x -quality \"${TARGET_QUALITY}\" \"${DEST_DIR}/${filename}.webp\"\ndone\n\necho \"Conversion and optimization completed successfully.\"<|endoftext|>#!/bin/bash\n# -*- sh -*-\n\n# DigitalOcean doroplet counter\n\n#%# family=contrib\n#%# capabilities=autoconf\n\n\nif [ \"$1\" = \"autoconf\" ]; then\n echo yes\n command -v doctl 2>/dev/null >/dev/null || result=1\n if [ \"$result\" != \"yes\" ]; then\n echo \"no (need doctl)\"\n exit 0\n fi\n if ! doctl /dev/null $target; then\n echo \"no (Cannot run doctl)\"\n exit 0\n fi\n echo yes\n exit 0\nfi\n\nif [ \"$1\" = \"config\" ] ; then\n echo \"graph_args -r --lower-limit 0 \";\n echo \"graph_title DigitalOcean Dloplets Counter\";\n echo \"graph_category DigitalOcean\";\n echo \"graph_info How many droplets am I using?\";\n echo 'graph_vlabel droplets'\n\n echo \"droplet.label droplets\"\n echo \"droplet.draw AREA\"\n echo \"droplet.type GAUGE\"\n exit\nfi\n\necho -n \"droplet.value \"\ndoctl compute droplet list --no-header | wc -l<|endoftext|>#!/bin/sh\nif [ $# -eq 0 ]; then\n echo \"Usage: mergepdf file [file file ...]\"\n exit 1\nfi\npdftk \"$@\" cat output mergepdf-combined.pdf<|endoftext|>#!/usr/bin/env bash\nset -eu\n\nifconfig wlan${1:-0} | perl -ne 'print $1 if m{HWaddr ([\\w\\:]+)}'<|endoftext|>#!/usr/bin/env bash\n\nSATIS_BUILD=\"${SATIS_BUILD:-/tmp/satis-build/app}\"\n\n# First argument can be \"master\" or \"develop\"\nif [ ! -n \"${1+set}\" ] ; then\n dir=\"app\"\n config=\"govcms-stable.json\"\nelse\n dir=\"${SATIS_BUILD}/${1}\"\n config=\"govcms-${1}.json\"\nfi\necho -e \"\\033[1;35m--> Checking duplicate packages for ${config} \\033[0m\"\n\nfor file in \"${dir}\"/include/*.json\ndo\n # Get a list of projects that returned multiple packages.\n problems=$(cat \"${file}\" | jq -r '.packages | [.[] ] | .[] | [.[]] | .[] | .name' | sort -V | uniq -c | awk '{if($1>1)print$2}' | grep 'drupal\\|govcms')\n\n if [ -n \"$problems\" ]; then\n echo -e \"\\033[1;35m\"\n echo \"Template blacklist for ${config}\"\n echo \"You need to blacklist the undesirable version, usually the newer version,\"\n echo \"and then update the ./satis-config/${config} config file.\"\n echo \"Re-run ahoy build and verify.sh after modifying satis config.\"\n echo -e \"\\033[0m\"\n\n echo '\"blacklist\": {'\n for project in $problems\n do\n cat $file | jq -r '.packages | .[\"'\"${project}\"'\"] | to_entries[] | \" \\\"\\(.value.name)\\\": \\\"\\(.key)\\\",\"'\n ", "num_tokens": 2048} {"category": "stack_edu-Shell", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/stack_edu-Shell/part-00-00000.npy", "text": "p \"workDir/analyseStat\"\n\n###\n### Traitement des fichiers\n###\n\n### QC report sur les fichiers brut (raw)\n\n## QC report par fastQC\nparallel -X fastqc ${cheminRaw}/{} -o ${workDir}/rawReport/ -t $tFastQC ::: ${fichiers[@]} #voir si le -X marche\n\n## QC global report par multiQC\nmultiqc -i 108_RNAseq_Samples \\\n\t-n allSamplesAnalysis \\\n\t-o ${workDir}/rawReport/globalAnalysis \\\n\t-p ${workDir}/rawReport #obtenir les graphiques figés en png et svg\nmultiqc -i 108_RNAseq_Samples \\\n\t-n allSamplesInteractive \\\n\t-o ${workDir}/rawReport/globalAnalysis \\\n\t--interactive ${workDir}/rawReport #version graphique interactive\n\n### Trimming par Cutadapt\n\n#OPTIONS CHOISIES :\n# -a \t: \tR1_3end ANCHORED et Illumina ScriptSeq adapter \n# -A \t: \tR2_3end ANCHORED et Illumina SriptSeq adapter\n# --times : nombre de fois où adapter peut être retire (1x en 3' + si jamais accroché une 2e fois)\n# -q\t: \tqualité min des fin en 5' et 3' // FOLLOWING OPTIONS APPLIED AFTER TRIMMING\n# --trim-n :trimme les N terminaux\n# --max-n : abandonne les reads ayant plus de 10% de N dans leur séquence\n# -m\t:\tlongueur minimale post-traitement = 20 (R1 et R2)\n\n# -k : la parallelisation conserve l'ordre de liste arguments\nparallel -k \"cutadapt --cores=$coreCut \\ \n\t-a 64nt=AGATCGGAAGAGCACACGTCTGAACTCCAGTCACNNNNNNATCTCGTATGCCGTCTTCTGCTTG$ \\\n\t-a R1-IAC=AGATCGGAAGAGCACACGTCTGAAC \\\n\t-A 58nt=AGATCGGAAGAGCGTCGTGTAGGGAAAGAGTGTAGATCTCGGTGGTCGCCGTATCATT$ \\\n\t-A R2-IAC=AGATCGGAAGAGCGTCGTGTAGGGA \\\n\t--times=2 \\\n\t-q 20,20 \\\n\t--trim-n \\\n\t--max-n=0.1 \\\n\t-m 20:20 \\\n\t-o $workDir/trimmed/${nomBase}_R1_trimmed.fastq.gz \\\n\t--paired-output=$workDir/trimmed/${nomBase}_R2_trimmed.fastq.gz \\\n\t$cheminRaw/${nomBase}_R1.fastq.gz \\\n\t$cheminRaw/${nomBase}_R2.fastq.gz > $workDir/trimmedReport/${nomBase}.txt\" ::: ${nomBase[@]}\n\n\n#constitution de la liste des fichiers trimmés\ncd $workDir/trimmed\ntrimFile=(`ls -S *_R*_trimmed.fastq.gz | uniq`)\n#actualisation des nomBase au cas où ordre change\nnomBase=(`ls -S *_R*_trimmed.fastq.gz | cut -d _ -f 1 | uniq`)\ncd $workDir\n\n### QC report sur les fichiers trimmés\n\n## QC report par fastQC\nparallel -X fastqc ${workDir}/trimmed/{} -o ${workDir}/trimmedReport/ -t $tFastQC ::: ${trimFile[@]} #voir si le -X marche #peut etre oter le -t\n\n## QC global report par multiQC\nmultiqc -i 108_trimmed-RNAseq_Samples \\\n\t-n allSamplesAnalysis \\\n\t-o ${workDir}/trimmedReport/globalAnalysis \\\n\t-p ${workDir}/trimmedReport\nmultiqc -i 108_trimmed-RNAseq_Samples \\\n\t-n allSamplesInteractive \\\n\t-o ${workDir}/trimmedReport/globalAnalysis \\\n\t--interactive ${workDir}/trimmedReport\n\n\n### Alignement des données\ncd $workDir/mapping\n\n## Construction de l'index \n#NB : on a au préalable concaténé BX571965.fna et BX571966.fna dans un fichier K96243.fna\nbowtie2-build $workDir/ref_K96243/K96243.fna ref-K96243 \\\n\t--threads $threadIndexBowtie \\\n\t--seed $seed\n\n## Alignement\nparallel -k \"bowtie2 --time \\\n\t--very-sensitive \\\n\t--threads $threadAlignBowtie \\\n\t--seed $seed \\\n\t--fr \\\n\t-x ref-K96243 \\\n\t-1 $workDir/trimmed/{}_R1_trimmed.fastq.gz \\\n\t-2 $workDir/trimmed/{}_R2_trimmed.fastq.gz \\\n\t-S {}.sam &> $workDir/mapReport/{}_time.txt\" ::: ${nomBase[@]}\n\ncd $workDir\n\n#normalement inutile\n#conda deactivate #on retombe sur (genomic_bact)\n\n## QC alignement Bowtie2 par multiQC\nmultiqc -i 54PE_RNAseq_Samples \\\n\t-b \"108 fichiers de reads ont été trimmés avec cutadapt. Ce sont donc 54 couples de reads (PE) qui sont alignés avec Bowtie2.\" \\\n\t-n allAligned \\\n\t-o ${workDir}/mapReport \\\n\t--interactive ${workDir}/mapReport\n\n#newList\ncd $workDir/mapping\nnomBase=(`ls -S *.sam | cut -d . -f 1`) #actualisation\n#cd $workDir\n\n## Conversion SAM en BAM\nparallel -k \"samtools view {}.sam -o {}.bam\" ::: ${nomBase[@]}\n\n## Sorting des reads alignés dans les bam\nparallel -k \"samtools sort {}.bam -o {}.bam\" ::: ${nomBase[@]}\n\n## Indexage des BAM ordonnés\nparallel -k \"samtools index {}.bam\" ::: ${nomBase[@]}\n\n## Statistiques sur les BAM\nparallel -k \"samtools flagstat {}.bam > $workDir/mapReport/{}.flagstat.txt && \\\n\tsamtools idxstat {}.bam > $workDir/mapReport/{}.idxstat.txt && \\\n\tsamtools stats {}.bam > $workDir/mapReport/${}.stats.txt\" ::: ${nomBase[@]}\n\n## multiQC sur les stats\nmultiqc -i BAM_54*PE_RNAseq_Samples \\\n\t-b \"108 fichiers de reads ont été trimmés avec cutadapt. Ce sont donc 54 couples de reads (PE) qui sont alignés avec Bowtie2. Ils sont ensuite convertis, triés et analysés avec SAMtools\" \\\n\t-n sortedBAM \\\n\t-o ${workDir}/mapReport \\\n\t--interactive ${workDir}/mapReport\n\n\ncd $workDir\nparallel -k \"picard MarkDuplicates I=./mapping/{}.bam \\\n\tO=./markedDup/{}.dupAllmarked.bam \\\n\tM=./markedDup/{}.dupAllmarkedMetrics.txt \\\n\tMAX_FILE_HANDLES_FOR_READ_ENDS_MAP=1004 \\\n\tTAGGING_POLICY=All \\\n\tASSUME_SORT_ORDER=coordinate\" ::: ${nomBase[@]}\n\n## Statistiques pour markedDup\ncd $workDir/markedDup\nparallel -k \"samtools flagstat {}.dupAllmarked.bam > {}.dupMarked.flagstat.txt && \\\n\tsamtools stats {}.dupAllmarked.bam > {}.dupMarked.stats.txt\" ::: ${nomBase[@]}\n\n# MultiQC pour markedDup flagstat\nmultiqc -i BAM_54*PE_RNAseq_Samples \\\n\t-b \"108 fichiers de reads ont été trimmés avec cutadapt. Ce sont donc 54 couples de reads (PE) qui sont alignés avec Bowtie2. Ils sont ensuite convertis, triés et analysés avec SAMtools. Enfin les duplicats sont taggués par MarkDuplicates\" \\\n\t-n markedBAM \\\n\t-o ${workDir}/markedDup \\\n\t--interactive ${workDir}/markedDup\n\n\n### Observation du taux de duplication avec script R \n# i.e. : Faut-il faire une deduplication ?\ncd $workDir\nRscript $workDir/dupRadar.R $workDir/markedDup $coreR #nombre de CPU\n#NOTA : taux de duplication tolerable (modelisation controle OK)\n# Donc on n'effectue pas de deduplication.\n\n\n### Comptage des reads\n\ncd $workDir/count\nparallel -k -j27 \"htseq-count -f bam \\\n\t--order pos \\\n\t--stranded reverse \\\n\t--type gene \\\n\t--idattr locus_tag \\\n\t-m intersection-nonempty \\\n\t{}.bam \\\n\t${workDir}/BP_corr_nomChr.gff > {}.txt\" ::: ${nomBase[@]}\n\n# Fin du script<|endoftext|>#!/bin/bash\n\nfunction get_quantity_label {\n LABEL=\"${1}\"\n SKU=\"${2}\"\n UNFORMATTED=\"${3}\"\n JSON=\"${4}\"\n\n RESULT=\"\"\n ICON=\"%{F#555}%{F-}\"\n\n if [[ \"${SKU}\" != \"\" ]]; then\n QUANTITY=$(echo ${JSON} | jq --arg sku \"${SKU}\" -r '.product.variants[] | select(.sku == $sku", "num_tokens": 2048} {"category": "stack_edu-Shell", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/stack_edu-Shell/part-00-00000.npy", "text": "bin/bash\n\n# exportierte / uebergebene parameter\n#BUILD_BUILD_ENV=\n\n# konfiguration einlesen\n. ./build.conf\n. ${INCLUDE_PATH}/functions.sh\n\nexport LBUILD_FILE=$1\nexport LBUILD_INFO=./parser.pl\nexport CURRENT_PATH=$(pwd)\n\nmkdir -p ${BUILD_PATH}\n\n\n####\n# Meta Informationen\nGROUP=$(${LBUILD_INFO} -f ${LBUILD_FILE} -g Meta/Group)\nNAME=$(${LBUILD_INFO} -f ${LBUILD_FILE} -g Meta/Name)\nVERSION=$(${LBUILD_INFO} -f ${LBUILD_FILE} -g Meta/Version)\nLANGUAGES=-1\nfor lang in $(${LBUILD_INFO} -f ${LBUILD_FILE} -g Meta/Languages); do # de en fr ...\n\tLANGUAGES=$(( ${LANGUAGES} + 1 ))\n\tLANGUAGE[${LANGUAGES}]=${lang}\ndone\nHOMEPAGE=$(${LBUILD_INFO} -f ${LBUILD_FILE} -g Meta/Homepage)\nLICENSE=$(${LBUILD_INFO} -f ${LBUILD_FILE} -g Meta/License)\n\n####\n# Maintainer Informationen\nMAINTAINERS=$(${LBUILD_INFO} -f ${LBUILD_FILE} -g Maintainer/Maintainers)\nMAINTAINERS=$(( ${MAINTAINERS} - 1 ))\nBUGREPORTMAIL=$(${LBUILD_INFO} -f ${LBUILD_FILE} -g Maintainer/BugreportMail)\nfor ((maintainer=0; maintainer <= ${MAINTAINERS} ; maintainer++ )); do # z.b.: 3\n\tNAME[${maintainer}]=$(${LBUILD_INFO} -f ${LBUILD_FILE} -g Maintainer/${maintainer}/Name)\n\tSURNAME[${maintainer}]=$(${LBUILD_INFO} -f ${LBUILD_FILE} -g Maintainer/${maintainer}/Surame)\n\tEMAIL[${maintainer}]=$(${LBUILD_INFO} -f ${LBUILD_FILE} -g Maintainer/${maintainer}/EMail)\n\tHOMEPAGE[${maintainer}]=$(${LBUILD_INFO} -f ${LBUILD_FILE} -g Maintainer/${maintainer}/Homepage)\n\tNICK[${maintainer}]=$(${LBUILD_INFO} -f ${LBUILD_FILE} -g Maintainer/${maintainer}/Nick)\ndone\n\n####\n# Beschreibung\nDESCRIPTIONS=$(${LBUILD_INFO} -f ${LBUILD_FILE} -g Meta/Languages) # de en fr ...\nfor description in ${DESCRIPTIONS}; do\n\tDESCRIPTION[${description}]=$(${LBUILD_INFO} -f ${LBUILD_FILE} -g Description/${description})\ndone\n\n####\n# Abhaengigkeiten\n# die abhaengikeitenliste erzeugen\n\n[ -d ${BUILD_PATH}/linoratix ] || mkdir -p ${BUILD_PATH}/linoratix/build\n${LBUILD_INFO} -f ${LBUILD_FILE} -s Dependencies > ${BUILD_PATH}/linoratix/dependencies.inc.sh\n\n# und einbinden\n. ${BUILD_PATH}/linoratix/dependencies.inc.sh\n\nif [ ! \"${BUILD_BUILD_ENV}\" ]; then\n\t# nur pruefen wenn nicht das build env gebaut wird\n\techo\nfi\n\n\n####\n# Bauabhaengigkeiten\n${LBUILD_INFO} -f ${LBUILD_FILE} -s BuildDependencies > ${BUILD_PATH}/linoratix/build_dependencies.inc.sh\n. ${BUILD_PATH}/linoratix/build_dependencies.inc.sh\n\nif [ ! \"${BUILD_BUILD_ENV}\" ]; then\n\t# nur pruefen wenn nicht das build env gebaut wird\n\techo\nfi\n\n\n\n####\n# vorschlaege\n${LBUILD_INFO} -f ${LBUILD_FILE} -s Recommendations > ${BUILD_PATH}/linoratix/recommendations.inc.sh\n. ${BUILD_PATH}/linoratix/recommendations.inc.sh\n\nif [ ! \"${BUILD_BUILD_ENV}\" ]; then\n\t# nur pruefen wenn nicht das build env gebaut wird\n\techo\nfi\n\n\n####\n# konfilkte\n${LBUILD_INFO} -f ${LBUILD_FILE} -s Conflicts > ${BUILD_PATH}/linoratix/conflicts.inc.sh\n. ${BUILD_PATH}/linoratix/conflicts.inc.sh\n\nif [ ! \"${BUILD_BUILD_ENV}\" ]; then\n\t# nur pruefen wenn nicht das build env gebaut wird\n\techo\nfi\n\n# das quellcode packet besorgen\n\nfor sourcefile in $(${LBUILD_INFO} -f ${LBUILD_FILE} -g SourceFiles/SourceFile); do\n\tserver=$(${LBUILD_INFO} -f ${LBUILD_FILE} -g DownloadServer/Main)\n\tcd ${BUILD_PATH}/linoratix/build\n\twget -c --passive-ftp ${server}/${sourcefile}\n\tif [ \"$?\" != \"0\" ]; then\n\t\tget_from_mirror ${sourcefile}\n\tfi\n\tcd ${CURRENT_PATH}\ndone\n\n#ANZAHL_PATCHES=$(${LBUILD_INFO} -f ${LBUILD_FILE} -g Patches/Patches)\n\n#if [ \"${ANZAHL_PATCHES}\" ]; then\n#\tcd ${BUILD_PATH}\n#\tmkdir ../../patches\n#\tfor ((patches=0; patches <= ${ANZAHL_PATCHES} ; patches++ )); do\n#\t\techo \"patching ... \"\n#\t\techo ${INSTALL_PATCH} \"`${LBUILD_INFO} -f ${LBUILD_FILE} -g Patches/${patches}/PatchCommand}`\" \"`${LBUILD_INFO} -f ${LBUILD_FILE} -g Patches/${patches}/Patch}`\"\n#\t\tsleep 10\n#\t\t${INSTALL_PATCH} \"`${LBUILD_INFO} -f ${LBUILD_FILE} -g Patches/${patches}/PatchCommand}`\" \"`${LBUILD_INFO} -f ${LBUILD_FILE} -g Patches/${patches}/Patch}`\"\n#\tdone\n#fi\n\ncd ${CURRENT_PATH}\necho \"#!/bin/bash\" > ${BUILD_PATH}/l_configure.sh\necho \"\" >> ${BUILD_PATH}/l_configure.sh\n${LBUILD_INFO} -f ${LBUILD_FILE} -g PrepareBuild >> ${BUILD_PATH}/l_configure.sh\nchmod 755 ${BUILD_PATH}/l_configure.sh\ncd ${BUILD_PATH}/linoratix/build\n. ${BUILD_PATH}/l_configure.sh\n\ncd ${CURRENT_PATH}\necho \"#!/bin/bash\" > ${BUILD_PATH}/l_make.sh\necho \"\" >> ${BUILD_PATH}/l_make.sh\n${LBUILD_INFO} -f ${LBUILD_FILE} -g Build >> ${BUILD_PATH}/l_make.sh\nchmod 755 ${BUILD_PATH}/l_make.sh\ncd ${BUILD_PATH}/linoratix/build\n. ${BUILD_PATH}/l_make.sh\n\ncd ${CURRENT_PATH}\necho \"#!/bin/bash\" > ${BUILD_PATH}/l_preinstall.sh\necho \"\" >> ${BUILD_PATH}/l_preinstall.sh\n${LBUILD_INFO} -f ${LBUILD_FILE} -g PreInstall >> ${BUILD_PATH}/l_preinstall.sh\nchmod 755 ${BUILD_PATH}/l_preinstall.sh\ncd ${BUILD_PATH}/linoratix/build\n. ${BUILD_PATH}/l_preinstall.sh\n\ncd ${CURRENT_PATH}\necho \"#!/bin/bash\" > ${BUILD_PATH}/l_install.sh\necho \"\" >> ${BUILD_PATH}/l_install.sh\n${LBUILD_INFO} -f ${LBUILD_FILE} -g Install >> ${BUILD_PATH}/l_install.sh\nchmod 755 ${BUILD_PATH}/l_install.sh\ncd ${BUILD_PATH}/linoratix/build\n. ${BUILD_PATH}/l_install.sh\n\ncd ${CURRENT_PATH}\necho \"#!/bin/bash\" > ${BUILD_PATH}/l_postinstall.sh\necho \"\" >> ${BUILD_PATH}/l_postinstall.sh\n${LBUILD_INFO} -f ${LBUILD_FILE} -g PostInstall >> ${BUILD_PATH}/l_postinstall.sh\nchmod 755 ${BUILD_PATH}/l_postinstall.sh\ncd ${BUILD_PATH}/linoratix/build\n. ${BUILD_PATH}/l_postinstall.sh<|endoftext|>#!/bin/sh\n\n# Displays all configuration profiles installed\n\nprofiles=`/usr/bin/profiles -C -v | awk -F: '/attribute: name/' | sed -n -e 's/^.*attribute: name: //p' | sort | sed -e 's/^[ \\t]*//'`\n\nif [[ ! -z \"$profiles\" ]]; then\n\techo \"$profiles\"\nelse\n\techo \"Not Installed\"\nfi\n\nexit 0<|endoftext|>#!/bin/bash\n\nfor rundir in \"$@\"; do\n\tif [[ $rundir =~ (.*)\\.tar\\.gz$ ]]; then\n\t\trundir=\"${BASH_REMATCH[1]}\"\n\tfi\n\tRUN_PATH=\"$rundir\" /vagrant/code/run_dir.sh /vagrant/code/post_run.d\n\techo\ndone<|endoftext|>#!/bin/bash\n\nred=''\ngreen=''\nyellow=''\noff=''\n\nnow=`cat /sys/class/power_supply/BAT0/energy_now`\nfull=`cat /sys/class/power_supply/BAT0/energy_full`\nperc=`echo \"$now * 100 / $full\" | bc`\n\ncolor=$green\nif [[ $perc -lt 25 ]]; then\n color=$red\nelif [[ $perc -lt 50 ]]; then\n color=$yellow\nfi\necho \"Batt: $color$perc%$off\"<|endoftext|>#Facilitati ale interpretoarelor de comenzi\n#A. Expandarea numelor de cale\ncp test1/* test2\ncp test1/?1* test3\nls te[sm]*\n#B", "num_tokens": 2048} {"category": "stack_edu-Shell", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/stack_edu-Shell/part-00-00000.npy", "text": " if [[ ! $drive ]]; \n then\n echo \"What is the drive parttion of the USB?\"\n read drive_letter\n else\n drive_letter=$drive\n fi\n drive=$(findmnt /dev/$drive_letter | grep / | cut -d ' ' -f1)\n if [[ ! -d $drive ]];\n then\n echo -e \"\\e[31mERROR: The drive letter \\\"$drive_letter\\\" was not found.\\e[0m\"\n else\n break\n fi\n\n if [[ i = 4 ]]\n then\n exit 0\n fi\n done\n}\n\nfunction eject_drive() {\n if [[ ! $eject ]];\n then\n echo \"Would you like to unmount the drive? (y/n)\"\n read eject\n fi\n eject=$(echo $eject | tr '[:upper:]' '[:lower:]')\n\n if [[ $eject == \"y\" ]] || [[ $eject == \"yes\" ]];\n then\n sudo umount /dev/$drive_letter\n echo \"Drive \\\"$drive_letter\\\" has been unmounted.\"\n fi\n}\n\nif [[ $deploy ]];\nthen\n if ! [[ -d \"./payloads/$deploy\" ]];\n then\n echo -e \"\\e[31mERROR: Folder not found.\\e[0m\"\n exit\n fi\n if ! [[ -f \"./payloads/$deploy/inject.bin\" ]];\n then\n echo -e \"\\e[31mERROR: Inject.bin not found in $deploy folder.\\e[0m\"\n exit\n fi\n get_drive\n cp ./payloads/$deploy/inject.bin $drive/inject.bin\n echo \"Payload $deploy has been deployed to drive \\\"$drive\\\"\"\n sleep 1\n eject_drive\n echo \"DONE\"\n exit\nfi\n\nif ! [[ $script ]]; \nthen\n echo \"Ducky Script File:\"\n read script\nfi\nscript_name=$(echo $script | sed 's/.txt//g')\n\nif [[ ! -d \"./payloads\" ]];\nthen\n mkdir \"./payloads\"\n echo \"Payloads directory created\"\nfi\n\nif [[ ! -f \"./$script\" ]];\nthen\n echo -e \"\\e[31mERROR: The file \\\"$script\\\" was not found. Please try again.\\e[0m\"\n exit 0yes\n echo \"Using script from payloads folder.\"\n no_move=$true\nfi\n\nif [[ ! $no_move ]];\nthen\n mkdir -p \"./payloads/$script_name\"\n mv $script ./payloads/$script_name\n echo \"Script moved to payloads folder (./payloads/$script_name)\"\nfi\n\nsleep 0.5\n\njava -jar duckencoder.jar -i ./payloads/$script_name/$script -o ./payloads/$script_name/inject.bin\n\n\npayload=\"./payloads/$script_name/inject.bin\"\necho \"Payload: $payload\"; echo \n\nget_drive\ncp $payload $drive\necho \"Deployed payload to $drive/inject.bin\"\nsleep 1\neject_drive\necho \"DONE\"\nexit 0<|endoftext|>#!/bin/bash\n\ncp ../*.erl ./tmp/\ncp ../*.hrl ./tmp/\n\n#sudo sh ../../setup_jiffy.sh\ncd ./tmp \n\nfor filename in *.erl; do\n erlc \"$filename\"\ndone\n\nfor filename in *test.erl; do\n fn=${filename%.*}\n erl -noshell -eval \"\"$fn\":test()\" -eval 'init:stop()'\ndone\ncd ..\nrm -rf ./tmp<|endoftext|>#!/bin/bash\n\n# import everything form .env\nexport $(cat .env | grep -v ^# | xargs)\n\necho \"e2e tests...\"\necho \"starting frontend server...\"\n\nif [ -z \"$1\" ] || [ $1 != '-c' ];\nthen\n REACT_APP_SHOW_DEV_UI=true REACT_APP_SERVER_URL=http://localhost:9091 PORT=3001 npm run build\nfi\n\necho \"frontend started\"\n./node_modules/.bin/serve -p 5001 -s build & NODE_SERVE=$!\n\n# making sure the server has started\necho \"------start sleeping------\"\nsleep 5\necho \"------end sleeping------\"\n\nnpm run selenium-setup\necho \"------starting selenium server------\"\nnpm run selenium-start &\necho \"------starting tests------\"\nnpm run e2e-tests\n\necho \"------stopping selenium & server------\"\n# pkill -f selenium-standalone\n# kill $NODE_SERVE<|endoftext|>#!/bin/bash\nset -e\n\nsed -i -e \"s@OPSMGR_SERVER_HOSTNAME@${OPSMGR_SERVER_HOSTNAME}@g\" opsmgr-pipeline/ci/azure/tasks/ansible/opsmgr-host\nsed -i -e \"s@AZURE_RESOURCE_LOCATION@${AZURE_RESOURCE_LOCATION}@g\" opsmgr-pipeline/ci/azure/tasks/ansible/opsmgr-host\n\naz login --service-principal -u \"$AZURE_CLIENT_ID\" -p \"$AZURE_SECRET\" --tenant \"$AZURE_TENANT\" &> /dev/null\naz account set --subscription \"$AZURE_SUBSCRIPTION_ID\" &> /dev/null\n\nCOMMAND=\"az storage account keys list --resource-group AZURE_RESOURCE_GROUP --account-name STORAGE_ACCOUNT_NAME\"\n\nNEW_COMMAND=$(sed \"s@AZURE_RESOURCE_GROUP@${AZURE_RESOURCE_GROUP}@g\" <<< $COMMAND)\nNEW_COMMAND=$(sed \"s@STORAGE_ACCOUNT_NAME@${STORAGE_ACCOUNT_NAME}@g\" <<< $NEW_COMMAND)\n\n#Check if we got a 200 back\nresult=$(eval $NEW_COMMAND)\nif [[ $result == *\"error\"* ]]; then\n echo $result\n exit 1\nelse\n #Get the state\n key=$(jq .[0].value <<< $result)\n TRIMMED_RESULT=\"${key%\\\"}\"\n TRIMMED_RESULT=\"${TRIMMED_RESULT#\\\"}\"\n echo $TRIMMED_RESULT\n sed -i -e \"s@STORAGEACCOUNT_SECRET_KEY@${TRIMMED_RESULT}@g\" opsmgr-pipeline/ci/azure/tasks/ansible/playbook-install-minio.yml\n sed -i -e \"s@AZURE_SERVER_ADMIN@${AZURE_SERVER_ADMIN}@g\" opsmgr-pipeline/ci/azure/tasks/ansible/playbook-install-minio.yml\n sed -i -e \"s@STORAGE_ACCOUNT_NAME@${STORAGE_ACCOUNT_NAME}@g\" opsmgr-pipeline/ci/azure/tasks/ansible/playbook-install-minio.yml\n\n mkdir ~/.ssh\n cp keys-out/* ~/.ssh/\n cd opsmgr-pipeline/ci/azure/tasks/ansible/\n ansible-playbook -i opsmgr-host playbook-install-minio.yml --private-key ~/.ssh/id_rsa\n cd ..\nfi<|endoftext|>#!/usr/bin/bash\n\n#Tools installation\n#install the vim-enhancement\n\n#Tools configuration\n#bash first, get the config entries from the resource/*.bash_profile file\n\n#System configuration\n#fonts:\nsudo yum install levien-inconsolata-fonts adobe-source-code-pro-fonts mozilla-fira-mono-fonts google-droid-sans-mono-fonts dejavu-sans-mono-fonts\n#git config\ngit config --global user.name \"Yeling Shi\"\ngit config --global user.email yeling.shi@outlook.com\ngit config --global push.default upstream\ngit config --global i18n.commitencoding utf-8\ngit config --global i18n.logoutputencoding utf-8\n\ngit config --global core.quotepath false \ngit config --global color.diff auto # git diff 要显示颜色\ngit config --global color.status auto # git status 要显示颜色\ngit config --global color.branch auto\ngit config --global color.ui true\ngit config --global core.editor vim\n\ngit config --global alias.co checkout\ngit config --global alias.br branch\ngit config --global alias.ci commit\ngit config --global alias.st status\ngit config --global alias.df diff\n\n#follow github help page to generate private key and add public key to github account\n\n\n#ramdisk setup for windows and linux to boost IE/Chrome performance.\n# Windows full turtorial \nhttp://www.sevenforums.com/tutorials/312031-ram-disk-install-browser-cache-file-storage.html\n# for eclipse on windows.\nhttp://stackoverflow.com/questions/1838018/optimize-use-of-ramdisk-for-eclipse-development\n\n# linux ramdisk setup\n# http://www.observium.org/wiki/Persistent_RAM_disk_RRD_storage\nsudo mkdir /mnt/ramdisk\nsudo vim /etc/fstab\n# add the below line to the end of /etc/fstab\n# tmpfs /mnt/ramdisk tmpfs defaults,size=1024M 0 0\nsudo mount /mnt/ramdisk\n# then you can check the mount info with mount/df\n# make backup storage for ramdisk\nsudo mkdir /var/ramdisk\n# Create a script at /etc/init.d/ramdisk with the contents in script named ramdisk.sh in resource folder\n# follow the below article to create new fedora service.\n# https://kezhong.wordpress.com/2011/11/19/creating-my-own-systemd-service-files-on-fedora-16x86_64/\n# https://coreos.com/docs/launching-containers/launching/getting-started-with-systemd/\n", "num_tokens": 2048} {"category": "stack_edu-Shell", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/stack_edu-Shell/part-00-00000.npy", "text": "I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\n3", "num_tokens": 2048} {"category": "stack_edu-Shell", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/stack_edu-Shell/part-00-00000.npy", "text": "/plan.out'\n\n# PATHs and things\n## gettext is keg-only, which means it was not symlinked into /usr/local,\n## because macOS provides the BSD gettext library & some software gets confused if both are in the library path.\nif [[ $OSTYPE =~ \"darwin*\" ]]; then\n export PATH=\"/usr/local/opt/gettext/bin:$PATH\"\n ## For compilers to find gettext you may need to set:\n export LDFLAGS=\"-L/usr/local/opt/gettext/lib\"\n export CPPFLAGS=\"-I/usr/local/opt/gettext/include\"\nfi\n\n# Additional binaries that may exist in dotfiles repo\nexport PATH=$HOME/dotfiles/bin:$PATH\n\n## Summary of plan - shows affected resources\nalias -g splan='plan | landscape > ~/tmp/plan.out 2>&1; echo \"--------------\\nPlan Summary\\n--------------\\n\" >> ~/tmp/plan.out; cat ~/tmp/plan.out | egrep \"\\+ [a-z]|- [a-z]|~ [a-z]|Plan:\" >> ~/tmp/plan.out; cat ~/tmp/plan.out'\n\n# outputs target changes from plan\nfunction pgrep {\n egrep \"$1\" | cut -d \" \" -f2 ;\n}\n\n# Functions\n# MakeChangedir - takes in a dir to create and then cd into\nfunction mc {\n local dir=$1\n if [ -z \"$dir\" ]; then\n echo \"mc - No dir was provided\"\n return 1\n fi\n \n mkdir -p \"$dir\"\n cd \"$dir\"\n}\n\n# ConfigCommitPush - takes in a commit message for the config update and pushes to Bitbucket\n# - config is an alias defined above\nfunction confcp {\n local commitMsg=$1\n if [ -z \"$commitMsg\" ]; then\n echo \"confcp - No commit message was provided\"\n return 1\n fi\n \n config commit -m \"$commitMsg\"\n config push\n}\n\n# SearchDirectory - recursive search through the targeted dir for the text in any file\nfunction sd {\n local searchTerm=$1\n local searchDir=$2\n if [ -z \"$searchTerm\" ]; then\n echo \"sd - No search term provided\"\n return 1\n fi\n if [ -z \"$searchDir\" ]; then\n echo \"sd - No dir specified - defaulting to current dir\"\n searchDir=\".\"\n fi\n \n grep --ignore-case --files-with-matches --recursive --no-messages --exclude-dir=\".terraform\" $searchTerm $searchDir\n}\n\n# UnZip - unzip the archive into a dir at the same location with the archive name\nreadlinkCmd=\"readlink\"\nif [[ \"$OSTYPE\" == \"darwin\"* ]]; then\n readlinkCmd=\"greadlink\"\nfi\n\nfunction uz {\n local archive=$1\n if [ -z \"$archive\" ]; then\n echo \"uz - No archive specified\"\n return 1\n fi\n\n local archivePath=$($readlinkCmd -f $archive)\n if [ ! -f $archivePath ]; then\n echo \"uz - Archive not found: $archivePath\"\n return 1\n fi\n\n local extractDir=$(echo $archivePath | sed -e \"s/.zip$//\")\n if [ -e $extractDir ] && [ ! -d $extractDir ]; then\n echo \"uz - ExtractDir exists but not as a directory: $extractDir\"\n fi\n mkdir $extractDir\n unzip $archive -d $extractDir\n}\n\n# Third-party functions\n\n##### fzf #### (https://github.com/junegunn/fzf)\n\n# Use fd (https://github.com/sharkdp/fd) instead of the default find\n# command for listing path candidates.\n# - The first argument to the function ($1) is the base path to start traversal\n# - See the source code (completion.{bash,zsh}) for the details.\nfunction _fzf_compgen_path() {\n fd --hidden --follow --exclude \".git\" . \"$1\"\n}\n\n# Use fd to generate the list for directory completion\nfunction _fzf_compgen_dir() {\n fd --type d --hidden --follow --exclude \".git\" . \"$1\"\n}<|endoftext|>#!/bin/bash\nset -e\n\nif [ ! -d /var/lib/tiddlywiki/mywiki ]; then\n tiddlywiki mywiki --init server\nfi\n\nif [ -n \"$PREFIX\" ]; then\n mkdir -p /var/lib/tiddlywiki/mywiki/tiddlers\n cp /etc/tiddlywiki_host_config_template.tid /var/lib/tiddlywiki/mywiki/tiddlers/\\$__config_tiddlyweb_host.tid\n sed -i \"s/prefix/$PREFIX/g\" /var/lib/tiddlywiki/mywiki/tiddlers/\\$__config_tiddlyweb_host.tid\n exec tiddlywiki mywiki --server 8080 $:/core/save/all text/plain text/html \"$USER\" \"$PASSWORD\" 0.0.0.0 \"/$PREFIX\"\nelse\n exec tiddlywiki mywiki --server 8080 $:/core/save/all text/plain text/html \"$USER\" \"$PASSWORD\" 0.0.0.0\nfi<|endoftext|>#!/bin/bash\n\n#Wed Jul 27 14:46:15 2016\n\necho \"_____________________________________________________________\"\necho \" \"\necho \"Local Address: -- L.A. Port: -- Remote Address: -- R.A. Port:\"\necho \"_____________________________________________________________\"\n\nIFS=$'\\n'\ni=1\nfor j in `cat /proc/net/tcp`\ndo\ntest $i -eq 1 && ((i=i+1)) && continue\n\n### Local Address ###\na=$(echo $j | awk '{print $2}' | cut -c 1-2);\nb=$(echo $j | awk '{print $2}' | cut -c 3-4);\nc=$(echo $j | awk '{print $2}' | cut -c 5-6);\nd=$(echo $j | awk '{print $2}' | cut -c 7-8);\n\n### Remote Address ###\no=$(echo $j | awk '{print $3}' | cut -c 1-2);\np=$(echo $j | awk '{print $3}' | cut -c 3-4);\nq=$(echo $j | awk '{print $3}' | cut -c 5-6);\ns=$(echo $j | awk '{print $3}' | cut -c 7-8);\n\n### Local Address Port ###\nt=$(echo $j | awk -F':' '{print $3}' | cut -c 1-4);\n\n### Remote Address Port ###\nu=$(echo $j | awk -F':' '{print $4}' | cut -c 1-4);\n\n### L.A. Hex to Dec ###\ne=$(echo $((0x$a)));\nf=$(echo $((0x$b)));\ng=$(echo $((0x$c)));\nh=$(echo $((0x$d)));\n\n### R.A. Hex to Dec ###\nk=$(echo $((0x$o)));\nl=$(echo $((0x$p)));\nm=$(echo $((0x$q)));\nn=$(echo $((0x$s)));\n\n### L.A. Port Hex to Dec ###\ny=$(echo $((0x$t)));\n\n### R.A. Port Hex to Dec ###\nz=$(echo $((0x$u)));\n### Piecing together the octets ###\nLOCALADDRESS=$(echo $h.$g.$f.$e);\nLOCALADDRESSPORT=$(echo $y);\nREMOTEADDRESS=$(echo $n.$m.$l.$k);\nREMOTEADDRESSPORT=$(echo $z);\n\necho \" \"$LOCALADDRESS\" -- \"$LOCALADDRESSPORT\" -- \"$REMOTEADDRESS\" -- \"$REMOTEADDRESSPORT\n\ndone<|endoftext|>#!/bin/sh\n\n#LANGUAGE (filled by make_rescue_img)\n\n# Set the hostname.\naction \"Setting hostname rescue\" hostname rescue\n\n# Loads common modules ( no kerneld :( )\necho \"Loading additional modules...\"\nload() { modprobe $* 2>/dev/null; }\nload scsi_mod\nload sd_mod\nload floppy\nload af_packet\nload isofs\nload vfat\nload ext3\nload ext4\nload reiserfs\nload xfs\nload jfs\nload btrfs\nload fuse\nload loop\nload sr_mod\n\naction \"Bringing up local loop interface\" ifconfig lo up\n\npartimage_default_dir=/data/box\npartimage_dir=$(getarg BOX `cat /proc/cmdline`)\n[ -z \"$partimage_dir\" ] && partimage_dir=$partimage_default_dir\npartimage_server=$(getarg pserver `cat /proc/cmdline`)\n\nif grep -q save_all /proc/cmdline; then\n partimage_whole_disk -s $partimage_server save_all $partimage_default_dir\nelif grep -q rest_all /proc/cmdline; then\n if [ -d /tmp/image$partimage_dir ]; then\n partimage_whole_disk rest_all /tmp/image$partimage_dir\n else\n partimage_whole_disk -s $partimage_server rest_all $partimage_dir\n fi\nelif grep -q oem /proc/cmdline; then\n /tmp/image/oem-rescue.sh\nelif grep -q restore /proc/cmdline; then\n /usr/sbin/restore-image.sh\nfi<|endoftext|>#!/bin/bash\n\ncat < $temp_env/include\n#!/bin/bash\n\ntemp_env=\"$temp_env\"\necho \"temp_env: \\$temp_env\"\nfor setting in \\$(ls \\$temp_env/*sh)\ndo", "num_tokens": 2048} {"category": "stack_edu-Shell", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/stack_edu-Shell/part-00-00000.npy", "text": "EOF\n }\n\n teardown() {\n stacker destroy --force <(config1)\n }\n\n # Create the new stacks.\n stacker build <(config1)\n assert \"$status\" -eq 0\n\n stacker diff <(config2)\n assert \"$status\" -eq 0\n assert_has_line \"\\-InstanceType = m3.large\"\n assert_has_line \"+InstanceType = m3.xlarge\"\n assert_has_line \"LogicalResourceId: VPC1\"\n assert_has_line \"ResourceType: AWS::CloudFormation::WaitConditionHandle\"\n}<|endoftext|># m_matschiner Thu Nov 15 21:16:33 CET 2018\n\n# Load modules.\nmodule load python3/3.5.0 \n\n# Make results directories.\nmkdir -p ../res/trees/nuclear/strict\nmkdir -p ../res/trees/nuclear/permissive\nmkdir -p ../res/alignments/nuclear/strict\nmkdir -p ../res/alignments/nuclear/permissive\n\n# Set strict and permissive thresholds.\nmin_min_ess_strict=200\nmin_min_ess_permissive=100\nmax_mut_rate_strict=0.0015\nmax_mut_rate_permissive=0.0020\nmax_rate_var_strict=0.4\nmax_rate_var_permissive=0.6\n\n# Get the content of the stats table without the header line.\ntail -n +2 ../res/tables/gene_stats.txt | grep -v -f ../res/manual/tables/unreliable_gene_ids.txt > tmp.table.txt\n\n# Read the stats table.\nwhile read line\ndo\n # Get values from the line.\n align_id=`echo ${line} | tr -s \" \" | cut -d \" \" -f 1`\n mut_rate=`echo ${line} | tr -s \" \" | cut -d \" \" -f 6`\n rate_var=`echo ${line} | tr -s \" \" | cut -d \" \" -f 7`\n min_ess=`echo ${line} | tr -s \" \" | cut -d \" \" -f 8`\n\n if (( $(echo \"${min_ess} > ${min_min_ess_strict}\" | bc -l) ))\n then\n\tif (( $(echo \"${mut_rate} < ${max_mut_rate_strict}\" | bc -l) ))\n\tthen\n\t if (( $(echo \"${rate_var} < ${max_rate_var_strict}\" | bc -l) ))\n\t then\n\t\tif [ ! -f ../res/alignments/nuclear/strict/${align_id}.nex ]\n\t\tthen\n\t\t cp -f ../res/alignments/nuclear/09/${align_id}/${align_id}.nex ../res/alignments/nuclear/strict\n\t\tfi\n\t\tif [ ! -f ../res/trees/nuclear/strict/${align_id}.trees ]\n\t\tthen\n\t\t python3 logcombiner.py -b 10 -n 100 ../res/alignments/nuclear/09/${align_id}/${align_id}.trees ../res/trees/nuclear/strict/${align_id}.trees\n\t\tfi\n\t\tif [ ! -f ../res/trees/nuclear/strict/${align_id}.tre ]\n\t\tthen\n\t\t cp -f ../res/alignments/nuclear/09/${align_id}/${align_id}.tre ../res/trees/nuclear/strict\n\t\tfi\n\t fi\n\tfi\n fi\n if (( $(echo \"${min_ess} > ${min_min_ess_permissive}\" | bc -l) ))\n then\n if (( $(echo \"${mut_rate} < ${max_mut_rate_permissive}\" | bc -l) ))\n then\n if (( $(echo \"${rate_var} < ${max_rate_var_permissive}\" | bc -l) ))\n then\n\t\tif [ ! -f ../res/alignments/nuclear/permissive/${align_id}.nex ]\n\t\tthen\n cp -f ../res/alignments/nuclear/09/${align_id}/${align_id}.nex ../res/alignments/nuclear/permissive\n\t\tfi\n\t\tif [ ! -f ../res/trees/nuclear/permissive/${align_id}.trees ]\n\t\tthen\n\t\t python3 logcombiner.py -b 10 -n 100 ../res/alignments/nuclear/09/${align_id}/${align_id}.trees ../res/trees/nuclear/permissive/${align_id}.trees\n\t\tfi\n\t\tif [ ! -f ../res/trees/nuclear/permissive/${align_id}.tre ]\n\t\tthen\n cp -f ../res/alignments/nuclear/09/${align_id}/${align_id}.tre ../res/trees/nuclear/permissive\n\t\tfi\n fi\n fi\n fi\ndone < tmp.table.txt\n\n# Clean up.\nrm -f tmp.table.txt<|endoftext|>#!/bin/bash\n\necho $@ > /tmp/args.txt\n\nORION_VERSION=$1\nORION_DOWNLOAD_URL=$2\nORION_NODE_IP=$3\nORION_CLIENT_IP=$4\n# We arent using private IPs because the vpc arent peered. The public IPs act like real world use cases for us anyway\n#ORION_CLIENT_IP=`curl http://169.254.169.254/latest/meta-data/local-ipv4`\nSCRIPTS_DIR=\"/home/ubuntu/orion\"\n\nsed -i \"s/PARAM_ORION_VERSION/$ORION_VERSION/g\" $SCRIPTS_DIR/orion_bootnode.yml\nsed -i \"s/PARAM_ORION_NODE_IP/$ORION_NODE_IP/g\" $SCRIPTS_DIR/orion_bootnode.yml\nsed -i \"s/PARAM_ORION_CLIENT_IP/$ORION_CLIENT_IP/g\" $SCRIPTS_DIR/orion_bootnode.yml\nsed -i 's#PARAM_ORION_DOWNLOAD_URL#'\"$ORION_DOWNLOAD_URL\"'#g' $SCRIPTS_DIR/orion_bootnode.yml\n\nmv $SCRIPTS_DIR/log4j /opt/\nchown -R ubuntu:ubuntu /opt/log4j/\nmkdir /data\n\ncd $SCRIPTS_DIR\nvirtualenv --python=python3 $SCRIPTS_DIR/env\n. $SCRIPTS_DIR/env/bin/activate\npip install wheel\npip install -r requirements.txt\n\n# 2x becuase I keep seeing git timeouts when download the roles\nansible-galaxy install -r requirements.yml --force --ignore-errors\nansible-galaxy install -r requirements.yml --force --ignore-errors\n\n# start in stopped state so paths and config are created\nansible-playbook -v orion_bootnode.yml --extra-vars=\"orion_systemd_state=stopped\"\n\n# copy keys across & set anything else up\ncp -r /home/ubuntu/keys/* /etc/orion/\nchown -R orion:orion /etc/orion/\n\n# fire up the service\nsystemctl start orion.service<|endoftext|>#!/bin/bash\nset -x\n\nif [[ ! -f ${KAFKA_CONFIG_FILE} ]]; then\n echo \"Config file not found, exiting!!\"\n exit 1\nfi\n\n# configure ${KAFKA_CONFIG_FILE} broker.id -1\nconfigure () {\n if [[ ! -z \"$3\" ]]; then\n if egrep -q \"(^|^#)${2}=\" ${1}; then\n sed -r -i \"s@(^|^#)(${2})=(.*)@\\2=${3}@g\" ${1}\n else\n echo -e \"\\n${2}=${3}\" >> ${1}\n fi\n fi\n}\n\n# Setup kafka KAFKA_HEAP_OPTS with existing JAVA_TOOL_OPTIONS and sensible defaults\nexport KAFKA_HEAP_OPTS=\"${JAVA_TOOL_OPTIONS} ${KAFKA_HEAP_OPTS:-\"-Xmx1G -Xms1G\"}\"\n\n# Parse kafka options from environment variables.\n# Options must be specified as in server.properties, capitalizing, replacing \".\"\n# with \"_\" and prefixing each configuration option with \"KAFKA_\".\n# zookeeper.connect=localhost:2181 becomes KAFKA_ZOOKEEPER.CONNECT=zookeeper:2181\nblacklist=\"KAFKA_CONFIG_FILE KAFKA_VERSION KAFKA_RELEASE KAFKA_URL KAFKA_HEAP_OPTS KAFKA_JMX_PORT\"\nwhile IFS='=' read -r key value; do\n if [[ ${blacklist} =~ ${key} ]]; then\n continue\n fi\n\n key=$(echo $key|tr \"[:upper:]\" \"[:lower:]\"|tr \"_\" \".\")\n configure ${KAFKA_CONFIG_FILE} $key $value\ndone < <(env|grep ^KAFKA_*|cut -d_ -f2-)\n\n\n# Configure and start ZooKeeper if enabled\nif [[ \"$ZOOKEEPER_ENABLE\" == \"true\" ]]; then\n mkdir -p ${ZOOKEEPER_DATA_DIR}\n\n if [[ ! -f \"$ZOOKEEPER_DATA_DIR/myid\" ]]; then\n echo \"${ZOOKEEPER_NODE_ID}\" > \"$ZOOKEEPER_DATA_DIR/myid\"\n fi\n\n configure ${ZOOKEEPER_CONFIG_FILE} \"dataDir\" \"${ZOOKEEPER_DATA_DIR}\"\n configure ${ZOOKEEPER_CONFIG_FILE} \"dataLogDir\" \"${ZOOKEEPER_DATA_LOG_DIR}\"\n configure ${ZOOKEEPER_CONFIG_FILE} \"clientPort\" \"${ZOOKEEPER_CLIENT_PORT}\"\n configure ${ZOOKEEPER_CONFIG_FILE} \"tickTime\" \"${ZOOKEEPER_TICK_TIME}\"\n configure ${ZOOKEEPER_CONFIG_FILE} \"initLimit\" \"${ZOOKEEPER_INIT_LIMIT}\"\n configure ${ZOO", "num_tokens": 2048} {"category": "stack_edu-Swift", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/stack_edu-Swift/part-00-00000.npy", "text": "392, blue: 0.4039215686, alpha: 1)) : Color(#colorLiteral(red: 0.6768393517, green: 0.6769362688, blue: 0.6768088937, alpha: 1)))\n , alignment: .bottom\n )\n .padding(.horizontal, 5)\n .onTapGesture{\n if !self.showFantasty {\n self.showHistory = false\n self.showClassic = false\n self.showCrime = false\n self.showCsifi = false\n self.showFantasty = true\n }\n }\n }\n .padding()\n \n ScrollView{\n VStack{\n HStack{\n Text(\"Featured Books\")\n .font(.system(size: 18, weight: .bold))\n Spacer()\n }\n .padding(.horizontal)\n .padding(.top)\n \n HStack(spacing: 20){\n BookView()\n BookView()\n }\n .padding(.bottom)\n \n HStack(spacing: 20){\n BookView()\n BookView()\n }\n .padding(.bottom)\n \n HStack(spacing: 20){\n BookView()\n BookView()\n }\n .padding(.bottom)\n \n HStack(spacing: 20){\n BookView()\n BookView()\n }\n .padding(.bottom)\n }\n }\n \n }\n \n }\n}\n\nstruct ExploreView_Previews: PreviewProvider {\n static var previews: some View {\n ExploreView()\n }\n}<|endoftext|>//\n// Git.swift\n// Files\n//\n// Created by Shane Whitehead on 3/9/18.\n//\n\nimport Foundation\nimport Files\n\npublic class Git {\n\tprivate let path: Folder\n\t\n\tpublic init(path: Folder) {\n\t\tself.path = path\n\t}\n\t\n\tpublic func versions() -> [SemanticVersion] {\n\t\tvar versions: [SemanticVersion] = []\n//\t\tgit describe --tags\n\t\tlet command: [String] = [\"git\", \"tag\"]\n\t\tExecutor.execute(currentDirectory: path.path, arguments: command) { data in\n\t\t\tguard var line = String(data: data, encoding: String.Encoding.utf8) else {\n\t\t\t\tlog(\"***\".red, \"Error decoding data:\")\n\t\t\t\tlog(\"\\t\\(data)\".magenta)\n\t\t\t\treturn\n\t\t\t}\n\t\t\t\n\t\t\tline = line.trimmingCharacters(in: .whitespacesAndNewlines)\n\t\t\tguard line.count > 0 else {\n\t\t\t\treturn\n\t\t\t}\n\t\t\tfor part in line.split(separator: \"\\n\") {\n\t\t\t\tguard let version = SemanticVersion.parse(from: String(part)) else {\n log(\"***\".yellow, \"\\(part) is not a Semantic Version\".lightBlack)\n\t\t\t\t\tcontinue\n\t\t\t\t}\n log(\">>> Found Tag \\(version)\".lightBlack)\n\t\t\t\tversions.append(version)\n\t\t\t}\n\t\t}\n\t\treturn versions.sorted().reversed()\n\t}\n\t\n}\n\npublic struct SemanticVersion: Comparable, Equatable, CustomStringConvertible {\n\t\n\tpublic static func < (lhs: SemanticVersion, rhs: SemanticVersion) -> Bool {\n\t\tguard lhs.major == rhs.major else {\n\t\t\treturn lhs.major < rhs.major\n\t\t}\n\t\tguard lhs.minor == rhs.minor else {\n\t\t\treturn lhs.minor < rhs.minor\n\t\t}\n\t\tguard lhs.patch == rhs.patch else {\n\t\t\treturn lhs.patch < rhs.patch\n\t\t}\n\t\treturn false // is equal\n\t}\n\t\n\tpublic static func > (lhs: SemanticVersion, rhs: SemanticVersion) -> Bool {\n\t\tguard lhs.major == rhs.major else {\n\t\t\treturn lhs.major > rhs.major\n\t\t}\n\t\tguard lhs.minor == rhs.minor else {\n\t\t\treturn lhs.minor > rhs.minor\n\t\t}\n\t\tguard lhs.patch == rhs.patch else {\n\t\t\treturn lhs.patch > rhs.patch\n\t\t}\n\t\treturn false // is equal\n\t}\n\t\n\tpublic static func == (lhs: SemanticVersion, rhs: SemanticVersion) -> Bool {\n\t\tguard lhs.major == rhs.major, lhs.minor == rhs.minor, lhs.patch == rhs.patch else {\n\t\t\treturn false\n\t\t}\n\t\treturn true\n\t}\n\n\t\n\tpublic let major: Int\n\tpublic let minor: Int\n\tpublic let patch: Int\n\t\n\tpublic init(major: Int, minor: Int, patch: Int) {\n\t\tself.major = major\n\t\tself.minor = minor\n\t\tself.patch = patch\n\t}\n\t\n\tpublic static func parse(from: String) -> SemanticVersion? {\n\t\tvar raw = from.lowercased()\n\t\tif raw.hasPrefix(\"v\") {\n\t\t\traw = String(raw.dropFirst())\n\t\t}\n\t\tlet parts = raw.split(separator: \".\")\n\t\tguard parts.count == 3 else {\n\t\t\treturn nil\n\t\t}\n\t\t\n\t\tguard let major = Int(parts[0]), let minor = Int(parts[1]), let patch = Int(parts[2]) else {\n\t\t\treturn nil\n\t\t}\n\t\t\n\t\treturn SemanticVersion(major: major,\n\t\t\t\t\t\t\t\t\t\t\t\t\t minor: minor,\n\t\t\t\t\t\t\t\t\t\t\t\t\t patch: patch)\n\t}\n\t\n\tpublic var description: String {\n\t\treturn \"\\(major).\\(minor).\\(patch)\"\n\t}\n\n}<|endoftext|>//\n// HashiCentral.swift\n// Hashi\n//\n// Created by Keichi Takahashi on 12/6/14.\n// Copyright (c) 2014 Keichi Takahashi. All rights reserved.\n//\n\nimport Foundation\nimport CoreBluetooth\n\nclass HashiCentral : NSObject, CBCentralManagerDelegate, CBPeripheralDelegate {\n private let hashiServiceUUID = CBUUID(string: \"312599d0-6450-4d14-8c4f-eb89d66d6d8d\")\n private let accelCharUUID = CBUUID(string: \"e715d934-c6cf-4999-b82d-6262fadd0152\")\n private let gyroCharUUID = CBUUID(string: \"42de3770-40cb-4ff0-8e32-13f621fba635\")\n\n private var centralManager: CBCentralManager!\n private var peripheral: CBPeripheral!\n \n weak var delegate: HashiCentralDelegate!\n \n override init() {\n super.init()\n \n self.centralManager = CBCentralManager(delegate: self, queue: nil)\n }\n \n func centralManager(central: CBCentralManager!, didConnectPeripheral peripheral: CBPeripheral!) {\n println(\"Connected to peripheral \\(peripheral.name)\")\n \n peripheral.delegate = self\n peripheral.discoverServices(nil)\n }\n \n func centralManager(central: CBCentralManager!, didDisconnectPeripheral peripheral: CBPeripheral!, error: NSError!) {\n delegate?.didDisconnectFromPeripheral(peripheral, error: error)\n centralManager.scanForPeripheralsWithServices([hashiServiceUUID], options: nil)\n }\n \n func centralManager(central: CBCentralManager!, didDiscoverPeripheral peripheral: CBPeripheral!, advertisementData: [NSObject : AnyObject]!, RSSI: NSNumber!) {\n println(\"Discovered peripheral: \\(peripheral)\")\n println(\"Advertisement data: \\(advertisementData)\")\n println(\"RSSI: \\(RSSI)\")\n \n self.peripheral = peripheral\n central.stopScan()\n central.connectPeripheral(peripheral, options: nil)\n }\n \n func centralManagerDidUpdateState(central: CBCentralManager!) {\n switch central.state {\n case .PoweredOn:\n println(\"CBCentralManager is powered on\")\n centralManager.scanForPeripheralsWithServices([hashiServiceUUID], options: nil)\n break\n case .PoweredOff:\n println(\"CBCentralManager is powered off\")\n break\n case .Resetting:\n println(\"CBCentralManager is resetting\")\n break\n case .Unauthorized:\n println(\"This application is not allowed to use BLE\")\n break\n case .Unknown:\n println(\"CBCentralManager state is unknwon\")\n break\n case .Unsupported:\n println(\"This device does not support BLE\")\n break\n }\n }\n \n func peripheral(peripheral: CBPeripheral!, didDiscoverServices error: NSError!) {\n if error != nil {\n delegate?.didConnectToPeripheral(peripheral, error: error)\n return\n }\n if peripheral.services.count == 0 {\n let err = NSError(domain: \"net.keichi.HashiCentral.NoService\", code: -1, userInfo: [NSLocalizedDescriptionKey: \"No services are discovered\"])\n delegate?.didConnectToPeripheral(peripheral, error: err)\n return\n }\n \n for service in peripheral.services as [CBService] {\n println(\"Discovered service \\(service.UUID.description)\")\n \n peripheral.discoverCharacteristics([accelCharUUID, gyroCharUUID], forService: service)\n }\n }\n \n func peripheral(peripheral: CBPeripheral!, didDiscoverCharacteristicsForService service: CBService!, error: NSError!) {\n if error != nil {\n delegate?.didConnectToPeripheral(peripheral, error: error)\n return\n }\n if service.characteristics.count == 0 {\n let err = NSError(domain: \"net.keichi.HashiCentral.NoCharacteristic\", code: -1, userInfo: [NSLocalizedDescriptionKey: \"No characteristics are discovered\"])\n delegate?.didConnectToPeripheral(peripheral, error: err)\n return\n }\n \n for characteristic in service.characteristics as [CBCharacteristic] {\n println(\"Discovered characteristic \\(characteristic.UUID.description)\")\n \n if (character", "num_tokens": 2048} {"category": "stack_edu-Swift", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/stack_edu-Swift/part-00-00000.npy", "text": " let placeMark = MKPlacemark(coordinate: coordinates)\n let mapItem = MKMapItem(placemark: placeMark)\n mapItem.openInMaps(launchOptions: options)\n \n }\n\n}<|endoftext|>//\n// GlobalState.swift\n// IssuesApp\n//\n// Created by CHOI MIN KYU on 2017. 10. 28..\n// Copyright © 2017년 CHOI MIN KYU. All rights reserved.\n//\n\nimport Foundation\n\nfinal class GlobalState {\n\t\n\tprivate init() {\n\t\t\n\t}\n\t\n\tstatic let instance = GlobalState()\n\t\n\tenum Constants: String {\n\t\tcase tokenKey\n\t\tcase refreshTokenKey\n\t}\n\t\n\tvar token: String? {\n\t\tget {\n\t\t\tlet token = UserDefaults.standard.string(forKey: Constants.tokenKey.rawValue)\n\t\t\treturn token\n\t\t}\n\t\t\n\t\tset {\n\t\t\tUserDefaults.standard.setValue(newValue, forKey: Constants.tokenKey.rawValue)\n\t\t}\n\t}\n\t\n\tvar refreshToken: String? {\n\t\tget {\n\t\t\tlet token = UserDefaults.standard.string(forKey: Constants.refreshTokenKey.rawValue)\n\t\t\treturn token\n\t\t}\n\t\t\n\t\tset {\n\t\t\tUserDefaults.standard.setValue(newValue, forKey: Constants.refreshTokenKey.rawValue)\n\t\t}\n\t}\n}<|endoftext|>//\n// main.swift\n// Ex58\n//\n// Created by Lidiomar Fernando dos Santos Machado on 07/08/21.\n//\n\nimport Foundation\n\nidadeAlunos()\n\nfunc idadeAlunos() {\n\t\n\tlet idadeInt = 0\n\tvar somaIdade = 0\n\tvar mediaIdade = 0\n\tvar quantidadeAlunos = 0\n\t\n\twhile idadeInt != 999 {\n\t\tprint(\"Digite a idade do aluno: \")\n\t\tlet idade = readLine()\n\t\t\n\t\tlet idadeInt = Int(idade ?? \"0\") ?? 0\n\t\t\n\t\tquantidadeAlunos += 1\n\t\t\n\t\tif idadeInt == 999 {\n\t\t\tbreak\n\t\t}\n\t\t\n\t\tsomaIdade = somaIdade + idadeInt\n\t\t\n\t}\n\t\n\tmediaIdade = somaIdade / (quantidadeAlunos - 1)\n\tprint(\"A media de idade da turma e: \\(mediaIdade)\")\n}<|endoftext|>//\n// ErrorView.swift\n// SwiftyMovies\n//\n// Created by Ivan Ornes on 28/12/20.\n//\n\nimport UIKit\n\nclass ErrorView: UIViewController {\n \n lazy var errorLabel: UILabel = {\n let label: UILabel = .init(frame: .zero)\n label.textAlignment = .center\n label.backgroundColor = .label\n label.textColor = .systemBackground\n view.addSubview(label)\n return label\n }()\n \n var errorText: String? {\n get {\n return errorLabel.text\n }\n set {\n errorLabel.text = newValue\n }\n }\n \n override func viewDidLoad() {\n super.viewDidLoad()\n }\n \n override func viewWillLayoutSubviews() {\n super.viewWillLayoutSubviews()\n errorLabel.frame = view.bounds\n }\n}<|endoftext|>//\n// DetailViewController.swift\n// Eatstagram\n//\n// Created by hor kimleng on 4/20/19.\n// Copyright © 2019 hor kimleng. All rights reserved.\n//\n\nimport UIKit\nimport SDWebImage\n\nclass DetailViewController: UIViewController {\n\n //IBOutlets\n @IBOutlet weak var photoImageView: UIImageView!\n @IBOutlet weak var locationLabel: UILabel!\n @IBOutlet weak var detailLabel: UILabel!\n @IBOutlet weak var usernameLabel: UILabel!\n \n var post: Post!\n var imagePost: ImagePost!\n \n override func viewDidLoad() {\n super.viewDidLoad()\n \n //print(\"The location is \",post.location)\n \n if post != nil {\n if let url = URL(string: post.imageUrl) {\n photoImageView.sd_setImage(with: url)\n }\n locationLabel.text = post.location\n detailLabel.text = post.detail\n usernameLabel.text = \"\\(post.username ?? \"\"):\"\n } else {\n if let url = URL(string: imagePost.imageURL ?? \"\") {\n photoImageView.sd_setImage(with: url)\n }\n locationLabel.text = imagePost.location\n detailLabel.text = imagePost.detail\n usernameLabel.text = \"\\(imagePost.username ?? \"\"):\"\n }\n }\n \n @IBAction func goButtonPressed(_ sender: Any) {\n var locationQuery = \"\"\n if post != nil {\n locationQuery = post.location?.replacingOccurrences(of: \" \", with: \"+\") ?? \"\"\n } else {\n locationQuery = imagePost.location?.replacingOccurrences(of: \" \", with: \"+\") ?? \"\"\n }\n \n if (UIApplication.shared.canOpenURL(URL(string:\"comgooglemaps://\")!)) {\n UIApplication.shared.open(URL(string:\"comgooglemaps://?q=\\(locationQuery)\")!, options: [:], completionHandler: nil)\n } else {\n UIApplication.shared.open(URL(string:\"https://www.google.com/maps/search/?api=1&query=\\(locationQuery)\")!, options: [:], completionHandler: nil)\n }\n }\n}<|endoftext|>//\n// PullDownToRefresh.swift\n// Reign\n//\n// Created by Hans Fehrmann on 6/4/19.\n// Copyright © 2019 Hans Fehrmann. All rights reserved.\n//\n\nimport Foundation\nimport UIKit\n\nclass PullDownToRefreshMessage: UIView {\n\n override init(frame: CGRect) {\n super.init(frame: frame)\n commonInit()\n }\n\n required init?(coder aDecoder: NSCoder) {\n super.init(coder: aDecoder)\n commonInit()\n }\n\n private func commonInit() {\n let label = UILabel()\n label.textAlignment = .center\n label.text = \"Pull down to refresh\"\n label.textColor = .lightGray\n label.sizeToFit()\n label.frame = CGRect(x: 0, y: 0, width: bounds.width, height: label.bounds.height)\n addSubview(label)\n label.autoresizingMask = [.flexibleWidth, .flexibleBottomMargin, .flexibleTopMargin]\n }\n}<|endoftext|>//\n// WeatherData.swift\n// Weather\n//\n// Created by Joyce Echessa on 10/16/14.\n// Copyright (c) 2014 Appcoda. All rights reserved.\n//\n// Changes and features to be added by Son Phan on 04/27/15\n// Open-source on Github.com/sonphanusa\n\nimport Foundation\n\npublic class WeatherData: NSObject {\n \n let currentTime: String\n let temperature: Int\n //let temperatureMin: Int\n //let temperatureMinTimeStr: String\n //let temperatureMax: Int\n //let temperatureMaxTimeStr: String\n let humidity: Double\n let precipProbability: Double\n let summary: String\n let windspeed: Int\n let feelslike: Int\n \n public init(weatherDictionary: NSDictionary) {\n let weather = weatherDictionary[\"currently\"] as! NSDictionary\n //let weatherdaily = weatherDictionary[\"daily\"] as NSDictionary\n \n temperature = weather[\"temperature\"] as! Int\n //temperatureMin = weatherdaily[\"temperatureMin\"] as Int\n //temperatureMax = weatherdaily[\"temperatureMax\"] as Int\n feelslike = weather[\"apparentTemperature\"] as! Int\n humidity = weather[\"humidity\"] as! Double\n precipProbability = weather[\"precipProbability\"] as! Double\n summary = weather[\"summary\"] as! String\n windspeed = weather[\"windSpeed\"] as! Int\n \n let time = weather[\"time\"] as! Int\n let timeInterval = NSTimeInterval(time)\n let date = NSDate(timeIntervalSince1970: timeInterval)\n let dateFormatter = NSDateFormatter()\n dateFormatter.timeStyle = .ShortStyle\n \n //let temperatureMinTime = weatherdaily[\"temperatureMinTime\"] as Int\n //let timeIntervalTempMin = NSTimeInterval(temperatureMinTime)\n //let dateTempMin = NSDate(timeIntervalSince1970: timeIntervalTempMin)\n //let dateFormatterTempMin = NSDateFormatter()\n //dateFormatterTempMin.timeStyle = .ShortStyle\n \n //let temperatureMaxTime = weatherdaily[\"temperatureMaxTime\"] as Int\n //let timeIntervalTempMax = NSTimeInterval(temperatureMaxTime)\n //let dateTempMax = NSDate(timeIntervalSince1970: timeIntervalTempMax)\n //let dateFormatterTempMax = NSDateFormatter()\n //dateFormatterTempMax.timeStyle = .ShortStyle\n \n currentTime = dateFormatter.stringFromDate(date)\n //temperatureMinTimeStr = dateFormatterTempMin.stringFromDate(dateTempMin)\n //temperatureMaxTimeStr = dateFormatterTempMax.stringFromDate(dateTempMax)\n }\n \n}<|endoftext|>import UIKit\n//optional\n//var fuel: Int?\n//fuel = 20\n//fuel = nil\n//print(\"\\(fuel) fuel\")\n//if let available = fuel{\n// print(\"\\(available) available\")\n//} else{\n// print(\"unavailable\")\n//}\n//func checkFuel(){\n// guard let available = fuel else {\n// print(\"unavailable\")\n// return\n// }\n// print(\"\\(available) available\")\n//}\n//checkFuel()\n//end optional\n\n//classes\n//class Human{\n// var name: String\n// var age: Int? = 38\n// var hairs: Bool\n// init() {\n// name = \"Ivan\"\n// hairs = true\n// }\n// init(name: String, age: Int?, hair: Bool) {\n// self.name = name\n// self.age = age\n// self.hairs = true\n// }\n// func description", "num_tokens": 2048} {"category": "stack_edu-Swift", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/stack_edu-Swift/part-00-00000.npy", "text": "]) {\n \n }\n \n \n \n \n var addImageBtn:UIButton! //添加图片的按钮\n var cellWidth:CGFloat! //按钮宽度\n \n var imageArray:Array? = nil //显示的图片数组\n \n var maxCount:Int = 20 //允许添加图片的上限\n \n var rowCount:Int = 4 { //一行显示几个图标\n didSet{\n \n }\n }\n \n var marginOffset:CGFloat = 10 { //外边距\n didSet{\n \n }\n }\n \n var paddingOffset:CGFloat = 5 { //图片之间的边距\n didSet{\n \n }\n }\n \n //MARK: 初始化视图\n /**\n * param: maxCount 允许添加图片的上限\n * param: rowCount 一行显示几个图标\n * param: marginOffset 外边距\n * param: paddingOffset 图片之间的边距\n * param: imageArray 显示的图片数组\n *\n */\n init(maxCount:Int?, rowCount:Int?, marginOffset:CGFloat?, paddingOffset:CGFloat?, imageArray:Array?) {\n \n super.init(frame: CGRect.zero)\n \n if let maxCount = maxCount{\n self.maxCount = maxCount\n }\n if let rowCount = rowCount{\n self.rowCount = rowCount\n }\n if let marginOffset = marginOffset{\n self.marginOffset = marginOffset\n }\n if let paddingOffset = paddingOffset{\n self.paddingOffset = paddingOffset\n }\n self.imageArray = imageArray\n \n self.loadConfig()\n \n }\n \n required init?(coder aDecoder: NSCoder) {\n super.init(coder: aDecoder)\n self.loadConfig()\n }\n \n \n //MARK: 加载基本配置\n private func loadConfig(){\n \n self.backgroundColor = UIColor.white //设置背景色\n self.calculateCellWidth() //计算每个图片的宽度\n self.updateUI() //更新布局\n }\n \n //MARK: 计算每个图片的宽度\n private func calculateCellWidth(){\n self.cellWidth = (kScreenWidth - 10 * 2 - self.marginOffset * 2 - CGFloat((self.rowCount - 1)) * self.paddingOffset) / CGFloat(self.rowCount) //计算每一个图片方块的宽度\n }\n \n //MARK: 更新布局\n private func updateUI(){\n \n for view in self.subviews{ //先删除所有的子视图\n view.removeFromSuperview()\n }\n \n //////////////添加图片按钮/////////////\n self.addImageBtn = UIButton(type: .custom)\n self.addImageBtn.frame = CGRect.zero\n self.addImageBtn.setImage(UIImage(named:\"tianjiatupian\"), for: .normal)\n self.addImageBtn.addTarget(self, action: #selector(addImageClick), for: .touchUpInside)\n self.addSubview(self.addImageBtn)\n \n \n if let imageArray = self.imageArray, imageArray.count > 0 {\n \n var lastBtn:UIButton? = nil\n for i in 0..= self.maxCount{ //如果图片达到上限,则直接不显示添加图片的按钮\n make.bottom.equalTo(self).offset(-self.marginOffset)\n }\n \n })\n \n lastBtn = imageBtn\n }\n \n if imageArray.count < self.maxCount {\n self.addImageBtn.snp.makeConstraints({ (make) in\n \n make.width.height.equalTo(self.cellWidth)\n \n if imageArray.count % self.rowCount == 0 {\n make.top.equalTo(lastBtn!.snp.bottom).offset(self.paddingOffset)\n make.left.equalTo(self).offset(self.marginOffset)\n }else{\n make.top.equalTo(lastBtn!.snp.top)\n make.left.equalTo(lastBtn!.snp.right).offset(self.paddingOffset)\n }\n \n make.bottom.equalTo(self).offset(-self.marginOffset)\n })\n }\n \n }else{\n self.addImageBtn.snp.makeConstraints { (make) in\n make.top.equalTo(self).offset(self.marginOffset)\n make.left.equalTo(self).offset(self.marginOffset)\n make.bottom.equalTo(self).offset(-self.marginOffset)\n make.width.height.equalTo(self.cellWidth)\n }\n }\n }\n \n \n //MARK: 添加图片按钮点击事件\n func addImageClick(sender:UIButton){\n \n let gallery = GalleryController() //调用相机选择器\n gallery.delegate = self\n let vc = self.getViewController()\n vc?.present(gallery, animated: true, completion: nil)\n \n }\n \n //MARK: GalleryController-Delegate\n \n func galleryController(_ controller: GalleryController, didSelectImages images: [UIImage]){\n \n if self.imageArray == nil{\n self.imageArray = Array()\n }\n \n for image in images{\n \n let str = self.imageToBase64String(image:image , headerSign: false)\n if let str = str{\n self.imageArray!.append(str)\n }\n \n }\n \n self.updateUI() //更新布局\n \n controller.dismiss(animated: true, completion: nil)\n \n }\n func galleryController(_ controller: GalleryController, didSelectVideo video: Video){\n \n dPrint(item: video)\n \n }\n func galleryController(_ controller: GalleryController, requestLightbox images: [UIImage]){\n \n dPrint(item: images)\n \n }\n func galleryControllerDidCancel(_ controller: GalleryController){\n controller.dismiss(animated: true, completion: nil)\n }\n\n ///传入图片image回传对应的base64字符串,默认不带有data标识,\n func imageToBase64String(image:UIImage,headerSign:Bool = false)->String?{\n \n ///根据图片得到对应的二进制编码\n guard let imageData = UIImagePNGRepresentation(image) else {\n return nil\n }\n ///根据二进制编码得到对应的base64字符串\n var base64String = imageData.base64EncodedString(options: NSData.Base64EncodingOptions(rawValue:0))\n ///判断是否带有头部base64标识信息\n if headerSign {\n ///根据格式拼接数据头 添加header信息,扩展名信息\n base64String = \"data:image/png;base64,\" + base64String\n }\n return base64String\n }\n \n ///传入base64的字符串,可以是没有经过修改的转换成的以data开头的,也可以是base64的内容字符串,然后转换成UIImage\n func base64StringToUIImage(base64String:String)->UIImage? {\n var str = base64String\n \n // 1、判断用户传过来的base64的字符串是否是以data开口的,如果是以data开头的,那么就获取字符串中的base代码,然后在转换,如果不是以data开头的,那么就直接转换\n if str.hasPrefix(\"data:image\") {\n guard let newBase64String = str.components(separatedBy: \",\").last else {\n return nil\n }\n str = newBase64String\n }\n // 2、将处理好的base64String代码转换成NSData\n guard let imgNSData = NSData(base64Encoded: str, options: NSData.Base64DecodingOptions()) else {\n return nil\n }\n // 3、将NSData的图片,转换成UIImage\n guard let codeImage = UIImage(data: imgNSData as Data) else {\n return nil\n }\n return codeImage\n }\n\n}<|endoftext|>//\n// PostTableViewCell.swift\n// ProjectHunt\n//\n// Created by Eric Morales on 8/30/21.\n//\n\nimport UIKit\n\nclass PostTableViewCell: UITableViewCell {\n \n // MARK: Properties\n static var identifier: String = \"postCell\"\n var post: Post? {\n didSet {\n guard let post = post else { return }\n \n self.nameLabel.text = post.name\n self.taglineLabel.text = post.tagline\n self.commentsCountLabel.text = \"Comments: \\(post.commentsCount)\"\n self.votesCountLabel.text = \"Votes: \\(post.votesCount)\"\n \n updatePreviewImage()\n }\n }\n lazy var container: UIView = {\n let view = UIView()\n view.translatesAutoresizingMaskIntoConstraints = false\n \n return view\n }()\n lazy var nameLabel: UILabel = {\n let label = UILabel()\n label.translatesAutoresizingMaskIntoConstraints = false\n label.text = \"Name\"\n label.font = UIFont.systemFont(ofSize: 24)\n label.setContentHuggingPriority(.init(rawValue: 250), for: .horizontal)\n \n return label\n }()\n lazy var horizontalStackView: UIStackView = {\n let stackView = UIStackView()\n stackView.translatesAutoresizingMaskIntoConstraints = false\n stackView.axis = .horizontal\n stackView", "num_tokens": 2048} {"category": "stack_edu-Swift", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/stack_edu-Swift/part-00-00000.npy", "text": " Initialization code\n _lblContent.layer.cornerRadius = 3\n _lblContent.layer.masksToBounds = true\n }\n\n override func setSelected(_ selected: Bool, animated: Bool) {\n super.setSelected(selected, animated: animated)\n\n // Configure the view for the selected state\n }\n\n func setContent(content: String, bg_color: UIColor) {\n _lblContent.text = content\n _lblContent.backgroundColor = bg_color\n }\n\n}<|endoftext|>//\n// CategoryHeaderView.swift\n// FirstThing\n//\n// Created by Stephanie on 8/10/20.\n// Copyright © 2020 Stephanie Chiu. All rights reserved.\n//\n\nimport UIKit\n\nclass CategoryHeaderView: UITableViewHeaderFooterView {\n\n// MARK: - Properties\n \n let categoryHeader: UILabel = {\n let title = UILabel()\n title.textColor = .label\n return title\n }()\n \n// MARK: - Init\n \n override init(reuseIdentifier: String?) {\n super.init(reuseIdentifier: reuseIdentifier)\n setupLayout()\n }\n \n required init?(coder: NSCoder) {\n fatalError(\"init(coder:) has not been implemented\")\n }\n \n// MARK: - Properties\n \n func setupLayout() {\n addSubview(categoryHeader)\n categoryHeader.anchor(left: leftAnchor, paddingLeft: 10)\n categoryHeader.centerY(inView: self)\n }\n \n}<|endoftext|>import Foundation\nimport NCallback\n\npublic enum StopTheLineAction: Equatable {\n case stopTheLine\n case passOver\n case retry\n}\n\npublic enum StopTheLineResult {\n /// pass over new response\n case passOver(ResponseData)\n\n /// use original response\n case useOriginal\n\n /// ignore current response and retry request\n case retry\n}\n\n// sourcery: fakable\npublic protocol StopTheLine {\n associatedtype Error: AnyError\n\n func action(with manager: AnyRequestManager,\n originalParameters parameters: Parameters,\n response: ResponseData) -> Callback\n\n func verify(response: ResponseData,\n for parameters: Parameters) -> StopTheLineAction\n}\n\npublic extension StopTheLine {\n func toAny() -> AnyStopTheLine {\n if let self = self as? AnyStopTheLine {\n return self\n }\n\n return AnyStopTheLine(self)\n }\n}\n\npublic struct AnyStopTheLine: StopTheLine {\n private let _action: (_ manager: AnyRequestManager,\n _ originalParameters: Parameters,\n _ data: ResponseData) -> Callback\n private let _verify: (_ data: ResponseData,\n _ parameters: Parameters) -> StopTheLineAction\n\n public init(_ provider: K) where K.Error == Error {\n self._action = provider.action(with:originalParameters:response:)\n self._verify = provider.verify(response:for:)\n }\n\n public func action(with manager: AnyRequestManager,\n originalParameters parameters: Parameters,\n response: ResponseData) -> Callback {\n return _action(manager, parameters, response)\n }\n\n public func verify(response: ResponseData,\n for parameters: Parameters) -> StopTheLineAction {\n return _verify(response, parameters)\n }\n}<|endoftext|>//\n// GameView.swift\n// LSEngine\n//\n// Created by Lukas Sestic on 16.05.2021..\n//\n\nimport Cocoa\nimport MetalKit\nimport os.log\n\nclass GameView: MTKView {\n\n private let logger = Logger()\n\n private var renderer: Renderer!\n\n override var acceptsFirstResponder: Bool {\n true\n }\n\n required init(coder: NSCoder) {\n\n super.init(coder: coder)\n\n device = MTLCreateSystemDefaultDevice()\n\n Engine.shared.ignite(with: device!)\n\n clearColor = Preferences.shared.clearColor\n\n colorPixelFormat = Preferences.shared.mainPixelFormat\n\n renderer = Renderer(on: self)\n\n delegate = renderer\n }\n\n // MARK: - Keyboard\n\n override func keyDown(with event: NSEvent) {\n\n Keyboard.shared.didPress(key: event.keyCode, on: true)\n }\n\n override func keyUp(with event: NSEvent) {\n\n Keyboard.shared.didPress(key: event.keyCode, on: false)\n }\n\n // MARK: - Mouse\n\n override func mouseDown(with event: NSEvent) {\n Mouse.shared.didPress(.init(rawValue: event.buttonNumber)!, on: true)\n }\n\n override func mouseUp(with event: NSEvent) {\n Mouse.shared.didPress(.init(rawValue: event.buttonNumber)!, on: false)\n }\n\n override func rightMouseDown(with event: NSEvent) {\n Mouse.shared.didPress(.init(rawValue: event.buttonNumber)!, on: true)\n }\n\n override func rightMouseUp(with event: NSEvent) {\n Mouse.shared.didPress(.init(rawValue: event.buttonNumber)!, on: false)\n }\n\n override func otherMouseDown(with event: NSEvent) {\n Mouse.shared.didPress(.init(rawValue: event.buttonNumber)!, on: true)\n }\n\n override func otherMouseUp(with event: NSEvent) {\n Mouse.shared.didPress(.init(rawValue: event.buttonNumber)!, on: false)\n }\n\n override func mouseMoved(with event: NSEvent) {\n updateMousePosition(with: event)\n }\n\n override func scrollWheel(with event: NSEvent) {\n Mouse.shared.didScroll(by: Float(event.deltaY))\n }\n\n override func mouseDragged(with event: NSEvent) {\n updateMousePosition(with: event)\n }\n\n override func rightMouseDragged(with event: NSEvent) {\n updateMousePosition(with: event)\n }\n\n override func otherMouseDragged(with event: NSEvent) {\n updateMousePosition(with: event)\n }\n\n private func updateMousePosition(with event: NSEvent) {\n\n let location = SIMD2(Float(event.locationInWindow.x), Float(event.locationInWindow.y))\n let change = SIMD2(Float(event.deltaX), Float(event.deltaY))\n\n Mouse.shared.setMousePositionChange(overallPosition: location, delta: change)\n }\n\n override func updateTrackingAreas() {\n\n let area = NSTrackingArea(rect: bounds,\n options: [.activeAlways, .mouseMoved, .enabledDuringMouseDrag],\n owner: self,\n userInfo: nil)\n\n addTrackingArea(area)\n }\n}<|endoftext|>//\n// Credentials.swift\n// AtlasCore\n//\n// Created by Jared Cosulich on 2/14/18.\n//\n\nimport Foundation\n\npublic class Credentials {\n public static let filename = \"credentials.json\"\n\n public let username: String\n public let email: String\n public let password: String?\n public var token: String?\n public var remotePath: String?\n \n public var s3AccessKey: String?\n public var s3SecretAccessKey: String?\n \n public var directory: URL?\n \n public var authenticationError: String?\n\n public init(_ username: String,\n email: String,\n password: String?=nil,\n token: String?=nil,\n remotePath: String?=nil,\n s3AccessKey: String?=nil,\n s3SecretAccessKey: String?=nil,\n authenticationError: String?=nil,\n directory: URL?=nil\n ) {\n self.username = username\n self.email = email\n self.password = password\n self.token = token\n self.remotePath = remotePath\n self.directory = directory\n\n if s3AccessKey?.count ?? 0 > 0 {\n self.s3AccessKey = s3AccessKey\n }\n \n if s3SecretAccessKey?.count ?? 0 > 0 {\n self.s3SecretAccessKey = s3SecretAccessKey\n }\n\n self.authenticationError = authenticationError\n }\n \n public func sync(_ credentials: Credentials) {\n if self.username == credentials.username {\n if self.token == nil {\n self.token = credentials.token\n }\n if self.remotePath == nil {\n self.remotePath = credentials.remotePath\n }\n }\n }\n \n public func complete() -> Bool {\n guard s3AccessKey != nil else { return false }\n guard s3SecretAccessKey != nil else { return false }\n\n if password == nil && token == nil && remotePath == nil { return false }\n \n return true\n }\n\n public func save() {\n// guard token != nil || remotePath != nil else {\n// printCredentials(\"No token or remote path provided: \\(username)\")\n// return\n// }\n \n do {\n var credentialsHash: [String: String] = [\n \"username\": username,\n \"email\": email\n ]\n \n if token != nil {\n credentialsHash[\"token\"] = token\n }\n \n if remotePath != nil {\n credentialsHash[\"remotePath\"] = remotePath\n }\n \n if s3AccessKey != nil {\n credentialsHash[\"s3AccessKey\"] = s3AccessKey\n }\n\n if s3SecretAccessKey != nil {\n credentialsHash[\"s3SecretAccessKey\"] = s3SecretAccessKey\n }\n\n if authenticationError != nil {\n credentialsHash[\"authenticationError\"] = authenticationError\n }\n\n let jsonCredentials = try JSONSerialization.data(\n withJSONObject: credentialsHash,\n options: .prettyPrinted\n )\n \n do {\n if let directory = directory {\n let filename = directory.appendingPathComponent(Credentials.filename)\n \n let fileManager = FileManager.default\n if fileManager.fileExists", "num_tokens": 2048} {"category": "stack_edu-Swift", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/stack_edu-Swift/part-00-00000.npy", "text": " by Douglas Hewitt on 9/24/16.\n// Copyright © 2016 madebydouglas. All rights reserved.\n//\n\nimport UIKit\nimport Firebase\n\nclass Network: NSObject {\n static let sharedInstance = Network()\n \n enum Reference: String {\n case Households = \"Households\"\n case Roommates = \"Roommates\"\n case Competitions = \"Competitions\"\n case Teams = \"Teams\"\n case Chores = \"Chores\"\n }\n\n class func start() {\n FIRApp.configure()\n FIRDatabase.database().persistenceEnabled = true\n }\n \n class func logout() {\n \n }\n \n let rootRef = FIRDatabase.database().reference()\n let householdsRef = FIRDatabase.database().reference().child(Reference.Households.rawValue)\n let myHouseholdRef = \"currentUserHouseholdID\"\n \n func saveChore(chore: Chore) {\n let choreRef = householdsRef.child(myHouseholdRef).child(Reference.Chores.rawValue).child(chore.key)\n choreRef.setValue(chore.toDictionary())\n }\n}<|endoftext|>//\n// NSRegularExpression.swift\n//\n//\n// Created by Kyle Nazario on 5/20/21.\n//\n\nimport Foundation\n\nprivate let wholeString = try! NSRegularExpression(pattern: \"^.*$\", options: .dotMatchesLineSeparators)\n\npublic extension NSRegularExpression {\n static var all: NSRegularExpression {\n wholeString\n }\n}<|endoftext|>import UIKit\n\nextension UICollectionView {\n /**\n Registers a reusable \"cell\" using `CustomStringConvertible` as the reuese identifier.\n\n - Important: Call before `dequeueReusableCell(for:)` to avoid `NSInternalInconsistencyException`.\n */\n public func register(cell: T.Type, reusableCellSource: CellSource) {\n switch reusableCellSource {\n case .nib:\n register(UINib(nibName: String(describing: cell), bundle: nil), forCellWithReuseIdentifier: String(describing: cell.self))\n case .class, .storyboard:\n register(cell, forCellWithReuseIdentifier: String(describing: cell.self))\n }\n }\n\n /**\n Returns a \"cell\" of a given type using `CustomStringConvertible` as the reuese identifier.\n\n - Important: Force unwraps the \"cell\". Causes the app to crashes with `NSInternalInconsistencyException` if the cell type isn't previously registered.\n */\n public func dequeueReusableCell(for indexPath: IndexPath) -> T {\n return dequeueReusableCell(for: indexPath)!\n }\n\n /**\n Returns an optional \"cell\" of a given type using `CustomStringConvertible` as the reuese identifier.\n\n - Important: Causes the app to crashes with `NSInternalInconsistencyException` if the cell type isn't previously registered.\n */\n public func dequeueReusableCell(for indexPath: IndexPath) -> T? {\n return dequeueReusableCell(withReuseIdentifier: String(describing: T.self), for: indexPath) as? T\n }\n}<|endoftext|>//\n// ResultListMediator.swift\n// JumuNordost\n//\n// Created by Martin Richter on 14/01/2017.\n// Copyright © 2017 Martin Richter. All rights reserved.\n//\n\nimport ReactiveCocoa\nimport Result\n\nclass ResultListMediator: Mediator {\n\n typealias PerformanceChangeset = Changeset\n\n // MARK: - Outputs\n\n let contentChanges: Signal\n\n var hasError: Bool = false\n var hasEmptyResultList: Bool {\n return performances?.isEmpty ?? false\n }\n\n var title: String {\n return contestCategory.name\n }\n\n // MARK: - Private Properties\n\n private let contest: Contest\n private let contestCategory: ContestCategory\n private let contentChangesObserver: Observer\n\n private var performances: [Performance]? = nil // nil means nothing was fetched, [] no results\n\n // MARK: - Lifecycle\n\n init(store: StoreType, contest: Contest, contestCategory: ContestCategory) {\n self.contest = contest\n self.contestCategory = contestCategory\n\n (contentChanges, contentChangesObserver) = Signal.pipe()\n\n super.init(store: store)\n\n let isLoading = self.isLoading\n\n func displayedContentMatches(lhs: Performance, rhs: Performance) -> Bool {\n return false // TODO: Compare performance content\n }\n\n refreshTrigger\n .on(next: { _ in isLoading.value = true })\n .flatMap(.Latest) { (_) -> SignalProducer<[Performance]?, NoError> in\n return store.fetchPerformances(\n contest: contest,\n contestCategory: contestCategory,\n resultsPublic: true\n )\n .map { .Some($0) }\n .flatMapError { error in\n return SignalProducer(value: nil)\n }\n }\n .on(next: { [weak self] performances in\n isLoading.value = false\n self?.hasError = (performances == nil)\n })\n .combinePrevious(nil) // needed to calculate changeset\n .startWithNext { [weak self] (oldPerformances, newPerformances) in\n self?.performances = newPerformances\n if let observer = self?.contentChangesObserver {\n let changeset = Changeset(\n oldItems: oldPerformances ?? [],\n newItems: newPerformances ?? [],\n contentMatches: displayedContentMatches\n )\n observer.sendNext(changeset)\n }\n }\n }\n\n // MARK: - Performances\n\n func numberOfPerformances() -> Int {\n return performances?.count ?? 0\n }\n\n func numberOfAppearancesForPerformanceAtIndexPath(indexPath: NSIndexPath) -> Int {\n return performanceAtIndexPath(indexPath).appearances.count\n }\n\n func predecessorInfoPresentForPerformanceAtIndexPath(indexPath: NSIndexPath) -> Bool {\n return performanceAtIndexPath(indexPath).predecessorHostName != nil\n }\n\n func formattedResultPerformanceForIndexPath(indexPath: NSIndexPath) -> FormattedResultPerformance {\n let performance = performanceAtIndexPath(indexPath)\n return ResultPerformanceFormatter.formattedResultPerformance(performance, contest: contest)\n }\n\n // MARK: - Private Helpers\n\n private func performanceAtIndexPath(indexPath: NSIndexPath) -> Performance {\n return performances![indexPath.row]\n }\n}<|endoftext|>/**\n * Definition for singly-linked list.\n * public class ListNode {\n * public var val: Int\n * public var next: ListNode?\n * public init(_ val: Int) {\n * self.val = val\n * self.next = nil\n * }\n * }\n */\n\n\n/* Q: 21. Merge Two Sorted Lists\n *\n * Merge two sorted linked lists and return it as a new list. \n * The new list should be made by splicing together the nodes of the first two lists.\n */ \n\n\nclass Solution {\n func mergeTwoLists(_ l1: ListNode?, _ l2: ListNode?) -> ListNode? {\n \n var newl1 = l1\n var newl2 = l2\n let dummyList = ListNode(0)\n var currentList = dummyList\n \n while newl1 != nil || newl2 != nil\n {\n let l1Val = newl1 != nil ? newl1?.val : Int.max\n let l2Val = newl2 != nil ? newl2?.val : Int.max\n \n currentList.next = ListNode(min(l1Val!,l2Val!))\n currentList = currentList.next!\n \n if l1Val! < l2Val!\n {\n newl1 = newl1?.next \n \n }else\n {\n newl2 = newl2?.next\n }\n \n }\n \n \n return dummyList.next\n \n \n }\n}<|endoftext|>//\n// IKBlurView.swift\n// Alexo Chat\n//\n// Created by Emil Karimov on 22/09/2018\n// Copyright © 2018 Emil Karimov. All rights reserved.\n//\n\nimport UIKit\nimport SnapKit\n\npublic class IKBlurView {\n\n private let window: UIWindow?\n private var tag: Int\n private var style: UIBlurEffect.Style\n\n public init(_ window: UIWindow?, style: UIBlurEffect.Style = .light, customTag: Int = 123) {\n self.window = window\n self.tag = customTag\n self.style = style\n }\n\n public func showBlurView() {\n guard let window = window, (window.viewWithTag(self.tag) == nil) else { return }\n let blurEffect = UIBlurEffect(style: self.style)\n let blurEffectView = UIVisualEffectView(effect: blurEffect)\n blurEffectView.frame = window.frame\n blurEffectView.tag = self.tag\n window.addSubview(blurEffectView)\n }\n\n public func removeBlurView() {\n guard let view = self.window?.viewWithTag(self.tag) else { return }\n view.removeFromSuperview()\n }\n}<|endoftext|>//\n// ViewController.swift\n// myswift\n//\n// Created by 区振轩 on 16/2/23.\n// Copyright © 2016年 区振轩. All rights reserved.\n//\n\nimport UIKit\nimport AudioToolbox\n\nclass ViewController: UIViewController {\n\n//MARK: - 懒加载\n //密码Lable\n \n \n lazy var passwardText : UILabel = {\n let lable = UILabel()\n lable.text = \"pass\";\n lable.textColor = UIColor.blackColor()\n// lable.frame = CGRectMake(100,100,100 ,20)\n lable.translatesAutoresizingMaskIntoConstraints", "num_tokens": 2048} {"category": "stack_edu-Swift", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/stack_edu-Swift/part-00-00000.npy", "text": "IBOutlet weak var button5_3: UIButton!\n @IBOutlet weak var button5_4: UIButton!\n \n \n @IBAction func switchAC(_ sender: UIButton) {\n if sender.currentTitle! == \"C\"{\n sender.setTitle(\"AC\", for: [])\n }\n }\n \n \n @IBAction func Switch2nd(_ sender: UIButton) {\n \n let defaultColor = UIColor.secondaryLabel\n let selectedColor = UIColor.systemGray\n \n if sender.backgroundColor == defaultColor\n {\n sender.backgroundColor = selectedColor\n sender.setTitleColor(UIColor.black, for: [])\n button2_5.setTitle(\"y^x\", for: [])\n button2_6.setTitle(\"2^x\", for: [])\n button3_5.setTitle(\"logy\", for: [])\n button3_6.setTitle(\"log2\", for: [])\n button4_2.setTitle(\"sin-1\", for: [])\n button4_3.setTitle(\"cos-1\", for: [])\n button4_4.setTitle(\"tan-1\", for: [])\n button5_2.setTitle(\"sinh-1\", for: [])\n button5_3.setTitle(\"cosh-1\", for: [])\n button5_4.setTitle(\"tanh-1\", for: [])\n \n }\n else\n {\n sender.backgroundColor = defaultColor\n sender.setTitleColor(UIColor.white, for: [])\n button2_5.setTitle(\"e^x\", for: [])\n button2_6.setTitle(\"10^x\", for: [])\n button3_5.setTitle(\"ln\", for: [])\n button3_6.setTitle(\"log\", for: [])\n button4_2.setTitle(\"sin\", for: [])\n button4_3.setTitle(\"cos\", for: [])\n button4_4.setTitle(\"tan\", for: [])\n button5_2.setTitle(\"sinh\", for: [])\n button5_3.setTitle(\"cosh\", for: [])\n button5_4.setTitle(\"tanh\", for: [])\n \n }\n }\n \n @IBAction func operatorTouch(_ sender: UIButton) {\n var operand:Double\n\n if digitOnDisplay.contains(\"e\"){\n var substring = [String]()\n substring = digitOnDisplay.components(separatedBy: \" \")\n operand = Double(substring.last!)!\n }\n else if digitOnDisplay == \"Error!\"{\n digitOnDisplay = \"0\"\n operand = 0\n \n }\n else{\n operand = Double(digitOnDisplay)!\n }\n \n \n \n if let op = sender.currentTitle{\n \n if op == \"cos\" || op == \"sin\"||op == \"tan\"{\n operand = operand * RadCorrect\n }\n \n if op == \"EE\"{\n digitOnDisplay = digitOnDisplay + \" e 0\"\n }\n if var result = calculator.performOnOperation(operation: op, operand: operand)\n {\n if (op == \"cos-1\" || op == \"sin-1\"||op == \"tan-1\"){\n result = result / RadCorrect\n result = (result * 10000000000000).rounded() / 10000000000000\n \n }\n if result.isInfinite || result.isNaN || result == Double(\"-inf\")\n {\n digitOnDisplay = \"Error!\"\n }\n else if result == floor(result)//if the result is int,display without '.'\n {\n digitOnDisplay = String(Int(result))\n }\n else\n {\n digitOnDisplay = String(result)\n }\n \n }\n if digitOnDisplay != \"0\"{\n button_C.setTitle(\"C\", for: [])\n }\n inTypingMode = false;\n }\n \n \n }\n}<|endoftext|>//\n// WildcardView_DraggingProtocol.swift\n// The Wild Card App\n//\n// Created by Tolga Caner on 29/06/2017.\n// Copyright © 2017 Tolga Caner. All rights reserved.\n//\n\nimport UIKit\n\nextension WildcardView : DraggingProtocol {\n \n \n \n\n func dragging(_ gestureRecognizer : UIPanGestureRecognizer) {\n xFromCenter = gestureRecognizer.translation(in: self.superview).x\n yFromCenter = gestureRecognizer.translation(in: self.superview).y\n xVelocity = gestureRecognizer.velocity(in: self.superview).x\n \n //swiping state\n switch (gestureRecognizer.state) {\n //swiping began\n case .began:\n self.originalPoint = self.center\n /*\n * memorize the starting state,\n * facingBack might change, movingfromBack stays the same as \n * long as the finger is on the screen\n */\n self.movingFromBack = self.facingBack\n break\n //swiping continues\n case .changed:\n \n let percent = (xFromCenter) * self.layer.affineTransform().a / self.frame.size.width //percentage of the touch location over the total width of the card\n \n let x = abs(percent) //always positive\n let scaleX = 1 - (2*x) //arbitrary scale value\n var trans : CGAffineTransform\n \n if xFromCenter > 0 { //going right\n self.rotateCard(isBack: self.movingFromBack, scaleX: scaleX, gestureRecognizer: gestureRecognizer)\n if self.movingFromBack {// facing back, no overlay image will be shown\n overlayView.alpha = 0.0\n } else { //facing front, should update overlay image alpha\n self.updateOverlay(distance: xFromCenter)\n }\n } else { // going left\n self.updatePosition()\n trans = CGAffineTransform.identity\n if self.facingBack {\n trans = trans.concatenating(CGAffineTransform(scaleX: -1.0, y: 1.0))\n }\n self.transform = trans\n self.updateOverlay(distance: xFromCenter)\n }\n break\n case .ended:\n self.afterSwipeAction(gestureRecognizer)\n break\n default:\n break\n }\n }\n \n func rotateCard(isBack : Bool, scaleX: CGFloat,gestureRecognizer : UIPanGestureRecognizer) {\n self.layer.setAffineTransform(CGAffineTransform(scaleX: isBack ? -scaleX : scaleX, y: 1.0))\n \n if scaleX <= 0.0 && scaleX > -0.3 {\n self.facingBack = !isBack\n } else if scaleX < -0.3 {\n gestureRecognizer.isEnabled = false\n self.afterSwipeAction(gestureRecognizer)\n } else {\n if scaleX >= 0.0 {\n self.facingBack = isBack\n }\n self.updatePosition()\n }\n }\n \n func updatePosition() {\n self.center = CGPoint(x: self.originalPoint.x + xFromCenter, y: self.originalPoint.y + yFromCenter)\n }\n \n // updates with the correct overlay image\n func updateOverlay(distance : CGFloat) {\n if distance > 0 {\n overlayView.mode = .right\n } else {\n overlayView.mode = .left\n }\n overlayView.alpha = CGFloat(min(fabsf(Float(distance))/200,Float(0.5)))\n }\n}<|endoftext|>//\n// EventType.swift\n// Flow\n//\n// Created by Måns Bernhardt on 2017-02-15.\n// Copyright © 2017 PayPal Inc. All rights reserved.\n//\n\nimport Foundation\n\n/// A value indicating either a regular `event` or an `initial` event, optionally with a value.\nenum EventType {\n case initial(Value?)\n case event(Event)\n}\n\nextension EventType {\n func map(_ transform: (Value) throws -> O) rethrows -> EventType {\n switch self {\n case .initial(nil): return .initial(nil)\n case .initial(let val?): return try .initial(transform(val))\n case .event(.value(let val)): return try .event(.value(transform(val)))\n case .event(.end(let error)): return .event(.end(error))\n }\n }\n\n func flatMap(_ transform: (Value) throws -> O?) rethrows -> EventType? {\n switch self {\n case .initial(nil): return .initial(nil)\n case .initial(let val?): return try transform(val).map { .initial($0) }\n case .event(.value(let val)): return try transform(val).map { .event(.value(($0))) }\n case .event(.end(let error)): return .event(.end(error))\n }\n }\n\n var value: Value? {\n switch self {\n case .initial(let val?): return val\n case .event(.value(let val)): return val\n default: return nil\n }\n }\n}<|endoftext|>//\n// InfoViewController.swift\n// TicTacToe\n//\n// Created by Isabel Lee on 08/02/2017.\n// Copyright © 2017 Isabel Lee. All rights reserved.\n//\n\n\n// - Attribution: http://stackoverflow.com/questions/34854880/adding-blur-effect-to-background-of-a-log-in-view-controller-in-swift\n\nimport UIKit\n\nclass InfoViewController: UIViewController {\n \n @IBOutlet weak var titleLabel: UILabel!\n \n @IBOutlet weak var textLabel: UILabel!\n var passedData: String?\n override func viewDidLoad() {\n super.viewDidLoad()\n //Set up textLabel so that contens will appear in multiline mode\n self.textLabel.lineBreakMode = .byWordWrapping\n self.textLabel.numberOfLines = 0\n \n //This is just for fun. Pretty nice visual", "num_tokens": 2048} {"category": "stack_edu-Swift", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/stack_edu-Swift/part-00-00000.npy", "text": " Constants.Storyboard.HomeViewController) as? HomeViewController\n view.window?.rootViewController = homeViewController\n view.window?.makeKeyAndVisible()\n }\n}<|endoftext|>//\n// ContentView.swift\n// caculatorSwiftUI\n//\n// Created by 劉子瑜 on 2019/11/29.\n// Copyright © 2019 劉子瑜. All rights reserved.\n//\n\nimport SwiftUI\nimport Combine\n\nlet scale = UIScreen.main.bounds.width / 414\n\nstruct ContentView: View {\n var body: some View {\n //alignment用來做對齊\n VStack(spacing: 12) {\n //Spacer會將可佔據的空白空間填滿\n Spacer()//畫面中剩下的空白\n Text(\"012345\")\n .font(.system(size: 76))\n .minimumScaleFactor(0.5) //文字的縮小比例,最多能縮小多少\n .padding(.trailing,24 * scale) //與最後一行的間距\n .lineLimit(1) //行數限制在一行\n //frame中的maxWidth設定為inifity,表示不對最大寬度進行限制,text會盡可能佔據容器寬度\n .frame(minWidth: 0, maxWidth: .infinity, alignment: .trailing)\n CalculatorButtonPad().padding(.bottom)\n }\n }\n}\n\nstruct ContentView_Previews: PreviewProvider {\n static var previews: some View {\n //支援更多的螢幕尺寸\n Group{\n ContentView()\n ContentView().previewDevice(\"iPhone SE\")\n }\n }\n}\n\nstruct CalculatorButton: View {\n let fontSize:CGFloat = 38\n let title:String\n let size:CGSize\n let backgroundColorName:String\n let foregroundColorName:String\n let action:()->Void //內容是空,而且沒有回傳內容\n var body: some View {\n Button(action:action) { //當按下button後會執行action closure(在此沒執行東西),而要顯示的內容則是使用第二個\n Text(title)\n .font(.system(size:fontSize * scale)) //更變字型樣式\n .foregroundColor(Color(foregroundColorName)) //設定前景/字形顏色\n .frame(width: size.width * scale, height: size.height * scale)\n .background(Color(backgroundColorName)) //設定背景顏色\n .cornerRadius(size.width * scale/2) //設定角度\n }\n }\n}\n\nstruct CalculatorButtonRow: View{\n let row:[CalculatorButtonItem]\n var body: some View {\n //Horizontal Stack:水平堆疊,沒設定間距,就是預設為0\n HStack{\n //forEach init(_ data: Data, id: KeyPath, content: @escaping (Data.Element) -> Content)\n //forEach是利用Id來區分array裡面的裡面的成員,\n //當row傳入array,需要額外設定型別KeyPath的參數ID,\n //ID將設定array成員的ID,在此傳入\\.self,表示array成員自己就是ID\n //e.g .command(.clear)的ID就是.command(.clear)\n // \\.self寫法與Swift KeyPath有關,並非任何東西都能當ID\n //ForEach的定義為ID的型別必須遵守protocol Hashable(Int與String本身就有尊湊)\n //foreach原先是用來列舉同一型態的元素,若要列舉,要在array那邊加上hasable\n \n //列舉元素,並生成對應view collection類型\n ForEach(row,id:\\.self){item in\n CalculatorButton(\n title: item.title,\n size: item.size,\n backgroundColorName: item.backgroundColorName,\n foregroundColorName: item.foregroundColorName)\n {\n print(\"Button:\\(item.title)\")\n }\n }\n }\n }\n}\n\nstruct CalculatorButtonPad: View{\n let pad:[[CalculatorButtonItem]] = [\n [.command(.clear),.command(.flip),.command(.percent),.op(.divide)],\n [.digit(7),.digit(8),.digit(9),.op(.multyiply)],\n [.digit(4),.digit(5),.digit(6),.op(.minus)],\n [.digit(1),.digit(2),.digit(3),.op(.plus)],\n [.digit(0),.dot,.op(.equal)]\n ]\n var body: some View{\n //垂直堆疊,間距為8\n VStack(spacing:8){\n ForEach(pad,id: \\.self){ row in\n CalculatorButtonRow(row:row)\n }\n }\n }\n}<|endoftext|>//\n// UIKitVideoPlayerView.swift\n// StreamingApp\n//\n// Created by Marco Falanga on 11/11/21.\n//\n\nimport SwiftUI\nimport AVKit\n\nstruct UIKitVideoPlayerView: View {\n @StateObject private var videoPlayerVM = VideoPlayerViewModel.default\n \n var body: some View {\n UIVideoPlayer(player: videoPlayerVM.player)\n .onAppear {\n setAudioSessionCategory(to: .playback)\n videoPlayerVM.player.play()\n }\n .onDisappear {\n videoPlayerVM.player.pause()\n setAudioSessionCategory(to: .ambient)\n }\n }\n \n func setAudioSessionCategory(to value: AVAudioSession.Category) {\n let audioSession = AVAudioSession.sharedInstance()\n do {\n try audioSession.setCategory(value)\n } catch {\n print(\"Setting category to AVAudioSessionCategoryPlayback failed.\")\n }\n }\n}\n\nstruct UIKitVideoPlayerView_Previews: PreviewProvider {\n static var previews: some View {\n UIKitVideoPlayerView()\n }\n}\n\nstruct UIVideoPlayer: UIViewControllerRepresentable {\n \n let player: AVPlayer\n \n func makeUIViewController(context: Context) -> AVPlayerViewController {\n let vc = AVPlayerViewController()\n vc.player = player\n vc.canStartPictureInPictureAutomaticallyFromInline = true\n return vc\n }\n \n func updateUIViewController(_ uiViewController: AVPlayerViewController, context: Context) {\n uiViewController.player = player\n }\n}<|endoftext|>//\n// FirstViewController.swift\n// DemoNavigation\n//\n// Created by Le Phuong Tien on 11/11/19.\n// Copyright © 2019 Fx Studio. All rights reserved.\n//\n\nimport UIKit\n\nclass FirstViewController: UIViewController {\n\n override func viewDidLoad() {\n super.viewDidLoad()\n title = \"First VC\"\n \n let backButton = UIBarButtonItem(title: \"Back\", style: .plain, target: self, action: nil)\n navigationItem.backBarButtonItem = backButton\n \n let leftButton1 = UIBarButtonItem(title: \"Left 1\", style: .plain, target: self, action: #selector(leftAction))\n let leftButton2 = UIBarButtonItem(title: \"Left 2\", style: .plain, target: self, action: #selector(leftAction))\n navigationItem.leftBarButtonItems = [leftButton1, leftButton2]\n \n let rightButton1 = UIBarButtonItem(title: \"Right 1\", style: .plain, target: self, action: #selector(rightAction))\n let rightButton2 = UIBarButtonItem(title: \"Right 2\", style: .plain, target: self, action: #selector(rightAction))\n navigationItem.rightBarButtonItems = [rightButton1, rightButton2]\n }\n \n override func viewWillDisappear(_ animated: Bool) {\n print(\"view Will Disappear\")\n }\n \n override func viewDidDisappear(_ animated: Bool) {\n print(\"view Did Disappear\")\n }\n \n \n @IBAction func push(_ sender: Any) {\n let vc = SecondViewController()\n self.navigationController?.pushViewController(vc, animated: true)\n }\n \n @objc func leftAction() {\n print(\"taped\")\n }\n \n @objc func rightAction() {\n print(\"taped\")\n }\n \n}<|endoftext|>//\n// StopwatchViewController.swift\n// TrackEr\n//\n// Created by Ashwin Aggarwal on 3/6/17.\n// Copyright © 2017 Ashwin Aggarwal. All rights reserved.\n//\n\nimport UIKit\n\nclass StopwatchViewController: UIViewController, UITableViewDelegate, UITableViewDataSource {\n \n var isRunning : Bool = false\n \n \n let LAPS_KEY = \"laps_array\"\n let CURRENT_SW_KEY = \"current_stop_watch\"\n \n // duel functioning button\n @IBOutlet weak var startstopbutton: UIButton!\n \n // duel functioning button\n @IBOutlet weak var lapreset: UIButton!\n \n var laps : [String] = []\n \n var stopwatchstring : String = \"\"\n \n var startStopWatch: Bool = true\n \n var timer = Timer()\n var minutes = 0\n var seconds = 0\n var fraction = 0\n \n var addLap = false\n \n @IBOutlet weak var table: UITableView!\n \n @IBOutlet weak var timeLabel: UILabel!\n \n override func viewDidLoad() {\n super.viewDidLoad()\n self.table.delegate = self\n self.table.dataSource = self\n stopwatchstring = \"00:00:00\"\n timeLabel.text = stopwatchstring\n table.reloadData()\n // makes laps global\n UserDefaults.standard.setValue(laps, forKey: LAPS_KEY)\n UserDefaults.standard.setValue(stopwatchstring, forKey: CURRENT_SW_KEY)\n // makes the buttons circular\n startstopbutton.layer.cornerRadius = min(100, 100) / 2.0\n lapreset", "num_tokens": 2048} {"category": "stack_edu-Swift", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/stack_edu-Swift/part-00-00000.npy", "text": " {\n switch self {\n case .listbike:\n return nil\n case .payment:\n return nil\n }\n }\n \n // MARK: - URLRequestConvertible\n func asURLRequest() throws -> URLRequest {\n let url = try K.ProductionServer.baseURL.asURL()\n \n var urlRequest = URLRequest(url: url.appendingPathComponent(path))\n \n // HTTP Method\n urlRequest.httpMethod = method.rawValue\n \n // Common Headers\n urlRequest.setValue(ContentType.json.rawValue, forHTTPHeaderField: HTTPHeaderField.acceptType.rawValue)\n urlRequest.setValue(ContentType.json.rawValue, forHTTPHeaderField: HTTPHeaderField.contentType.rawValue)\n \n // Parameters\n if let parameters = parameters {\n do {\n urlRequest.httpBody = try JSONSerialization.data(withJSONObject: parameters, options: [])\n } catch {\n throw AFError.parameterEncodingFailed(reason: .jsonEncodingFailed(error: error))\n }\n }\n \n return urlRequest\n }\n}<|endoftext|>//\n// Copyright © 2019 Apparata AB. All rights reserved.\n//\n\nimport Foundation\n\npublic enum CommandLineError: LocalizedError {\n \n case unexpectedError\n case noExecutable\n case invalidFlagOrOption(String)\n case unexpectedArgument(String)\n case missingOptionValue(String)\n case missingInputArgument(String)\n case invalidArgumentValueFormat(String)\n case requiredInputArgumentMustNotFollowOptionalInputArgument(command: String, input: String)\n case requiredInputArgumentMustNotFollowVariadicInputArgument(command: String, input: String)\n case multipleVariadicInputArguments(command: String)\n case bothOptionalAndVariadicInputArguments(command: String)\n case usageRequested(command: Command)\n case noSuchSubcommand(command: String)\n \n /// A localized message describing what error occurred.\n public var errorDescription: String? {\n switch self {\n case .unexpectedError:\n return \"Error: There was an unexpected error while parsing the command line.\"\n case .noExecutable:\n return \"Error: There must be a first argument represenging the command.\"\n case .invalidFlagOrOption(let flagOrOption):\n return \"Error: Invalid flag or option \\\"\\(flagOrOption)\\\"\"\n case .unexpectedArgument(let argument):\n return \"Error: Unexpected argument \\\"\\(argument)\\\"\"\n case .missingOptionValue(let option):\n return \"Error: Missing value for option \\\"\\(option)\\\"\"\n case .missingInputArgument(let input):\n return \"Error: Missing value for input argument \\\"\\(input)\\\"\"\n case .invalidArgumentValueFormat(let value):\n return \"Error: Incorrect format for argument \\(value)\"\n case .requiredInputArgumentMustNotFollowOptionalInputArgument(let command, let input):\n return \"Error: The required input argument '\\(input)' must not follow an optional input argument in \\(command)'.\"\n case .requiredInputArgumentMustNotFollowVariadicInputArgument(let command, let input):\n return \"Error: The required input argument '\\(input)' must not follow a variadic input argument in \\(command)'.\"\n case .multipleVariadicInputArguments(let command):\n return \"Error: There must only be one variadic input argument in '\\(command)'.\"\n case .bothOptionalAndVariadicInputArguments(let command):\n return \"Error: The command '\\(command)' may not have both optional and variadic input arguments.\"\n case .usageRequested(let command):\n return CommandUsage.formatUsage(for: command)\n case .noSuchSubcommand(let name):\n return \"Error: There is no subcommand '\\(name)'\"\n }\n }\n \n /// A localized message describing the reason for the failure.\n public var failureReason: String? {\n return errorDescription\n }\n}<|endoftext|>//\n// Cat.swift\n// CatProject\n//\n// Created by johann on 21/01/2020.\n// Copyright © 2020 johann. All rights reserved.\n//\n\nimport Foundation\nimport UIKit\n\nclass Cat: Codable {\n \n var text: String\n var _id: String\n var image: String?\n \n init(text: String, _id: String, image: String?){\n self.text = text\n self._id = _id\n self.image = image\n }\n\n}<|endoftext|>//\n// RightMenu.swift\n// SideMenu\n//\n// Created by Vidhyadharan Mohanram on 23/06/19.\n// Copyright © 2019 Vid. All rights reserved.\n//\n\nimport SwiftUI\n\ninternal struct RightMenu: View {\n @Environment(\\.sideMenuRightPanelKey) var sideMenuRightPanel\n @Environment(\\.sideMenuCenterViewKey) var sideMenuCenterView\n \n var body: some View {\n GeometryReader { geometry in\n VStack(spacing: 10) {\n Text(\"Hello World!\")\n .foregroundColor(Color.black)\n Button(action: {\n withAnimation {\n self.sideMenuCenterView.wrappedValue = AnyView(PhotosView(orderBy: .oldest))\n self.sideMenuRightPanel.wrappedValue = false\n }\n }, label: {\n Text(\"Show Old Photos\")\n .foregroundColor(Color.black)\n })\n }\n .frame(width: geometry.size.width, height: geometry.size.height, alignment: .center)\n .background(Color.red)\n .background(Rectangle().shadow(radius: 4))\n }\n \n }\n}\n\n#if DEBUG\nstruct RightMenu_Previews : PreviewProvider {\n static var previews: some View {\n RightMenu()\n }\n}\n#endif<|endoftext|>//\n// ViewController.swift\n// Pizzazz\n//\n// Created by Zach Zeleznick on 9/29/16.\n// Copyright © 2016 zzeleznick. All rights reserved.\n//\n\nimport UIKit\n\nclass ViewController: UIViewController {\n var w: CGFloat!\n var h: CGFloat!\n \n override func viewDidLoad() {\n super.viewDidLoad()\n view = UIView(frame: UIScreen.main.bounds)\n view.backgroundColor = UIColor(white: 1.0, alpha: 1.0)\n w = view.bounds.size.width\n h = view.bounds.size.height\n }\n \n func addToolbar() {\n let toolbar = UIToolbar()\n toolbar.barTintColor = UIColor(white: 0.95, alpha: 1.0)\n\n let moreButton = UIButton()\n moreButton.setBackgroundImage(UIImage(named: \"MoreIcon\"), for: UIControlState())\n moreButton.frame = CGRect(x: 0, y: 0, width: 30, height: 10)\n \n let accountButton = UIButton()\n accountButton.setTitle(\"Account\", for: UIControlState())\n accountButton.titleLabel?.font = UIFont(name: \"Helvetica\", size: 11)\n accountButton.setTitleColor(UIColor(rgb: 0x3e7aab), for: UIControlState())\n accountButton.frame = CGRect(x: 0, y: 0, width: 50, height: 30)\n \n let item1 = UIBarButtonItem(customView: moreButton)\n let item2 = UIBarButtonItem(customView: accountButton)\n let spacer = UIBarButtonItem(barButtonSystemItem: .flexibleSpace,\n target: self, action: nil)\n \n toolbar.setItems([item1, spacer, item2], animated: true)\n view.addUIElement(toolbar, frame: CGRect(x: 0, y: h-40, width: w, height: 40))\n }\n\n}<|endoftext|>//\n// LoginViewController.swift\n// Fin24\n//\n// Created by Manenga Mungandi on 2019/06/30.\n// Copyright © 2019 Manenga Mungandi. All rights reserved.\n//\n\nimport UIKit\nimport CryptoSwift\nimport SwiftyOnboard\n\nclass LoginViewController: UIViewController {\n\n private let primaryColor = UIColor(red:66/255, green:23/255, blue:32/255, alpha:1.0)\n private var shownWalkthrough = UserDefaults.standard.bool(forKey: \"shownWalkthrough\")\n private var isLoggedIn = false\n private var isShowingWalkthrough = false\n private var swiftyOnboard: SwiftyOnboard!\n \n private let key = \"rosesR3dS0m3A3eBlu3Oth3S@R3N0Tee\"\n private let iv = \"ThisIsATestAaKno\"\n \n private var titleArray: [String] = [\"Welcome to Fin24!\", \"It’s a handy finance news app!\", \"Be the first to know\"]\n private var subTitleArray: [String] = [\"Get the latest finance news without lifting a finger\", \"Curated by our awesome content team to your specifications\", \"Be nice to your friends.\\n Share the news with them. \\n It might make them smile :)\"]\n private let colors:[UIColor] = [#colorLiteral(red: 0.9980840087, green: 0.3723873496, blue: 0.4952875376, alpha: 1),#colorLiteral(red: 0.2666860223, green: 0.5116362572, blue: 1, alpha: 1),#colorLiteral(red: 0.9686274529, green: 0.78039217, blue: 0.34509", "num_tokens": 2048} {"category": "stack_edu-Swift", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/stack_edu-Swift/part-00-00000.npy", "text": ".lobId = Decoders.decodeOptional(clazz: Int.self, source: sourceDictionary[\"lobId\"])\n instance.legacyPoNo = Decoders.decodeOptional(clazz: String.self, source: sourceDictionary[\"legacyPoNo\"])\n instance.warehouseId = Decoders.decodeOptional(clazz: Int.self, source: sourceDictionary[\"warehouseId\"])\n instance.orderDate = Decoders.decodeOptional(clazz: NSDate.self, source: sourceDictionary[\"orderDate\"])\n instance.factCost = Decoders.decodeOptional(clazz: Double.self, source: sourceDictionary[\"factCost\"])\n instance.mlCost = Decoders.decodeOptional(clazz: Double.self, source: sourceDictionary[\"mlCost\"])\n instance.sku = Decoders.decodeOptional(clazz: String.self, source: sourceDictionary[\"sku\"])\n instance.orderQuantity = Decoders.decodeOptional(clazz: Int.self, source: sourceDictionary[\"orderQuantity\"])\n instance.requestedDeliveryDate = Decoders.decodeOptional(clazz: NSDate.self, source: sourceDictionary[\"requestedDeliveryDate\"])\n instance.unitCode = Decoders.decodeOptional(clazz: String.self, source: sourceDictionary[\"unitCode\"])\n instance.wrapCode = Decoders.decodeOptional(clazz: String.self, source: sourceDictionary[\"wrapCode\"])\n instance.unitsPerWrap = Decoders.decodeOptional(clazz: Int.self, source: sourceDictionary[\"unitsPerWrap\"])\n instance.cost = Decoders.decodeOptional(clazz: Double.self, source: sourceDictionary[\"cost\"])\n instance.sell = Decoders.decodeOptional(clazz: Double.self, source: sourceDictionary[\"sell\"])\n instance.pricingPer = Decoders.decodeOptional(clazz: String.self, source: sourceDictionary[\"pricingPer\"])\n instance.maxFreight = Decoders.decodeOptional(clazz: Double.self, source: sourceDictionary[\"maxFreight\"])\n instance.chargeFreight = Decoders.decodeOptional(clazz: String.self, source: sourceDictionary[\"chargeFreight\"])\n instance.maxOther = Decoders.decodeOptional(clazz: Double.self, source: sourceDictionary[\"maxOther\"])\n instance.distDate = Decoders.decodeOptional(clazz: NSDate.self, source: sourceDictionary[\"distDate\"])\n instance.voidDate = Decoders.decodeOptional(clazz: NSDate.self, source: sourceDictionary[\"voidDate\"])\n instance.freezeAction = Decoders.decodeOptional(clazz: String.self, source: sourceDictionary[\"freezeAction\"])\n instance.revDate = Decoders.decodeOptional(clazz: String.self, source: sourceDictionary[\"revDate\"])\n instance.artBack = Decoders.decodeOptional(clazz: String.self, source: sourceDictionary[\"artBack\"])\n instance.origin = Decoders.decodeOptional(clazz: String.self, source: sourceDictionary[\"origin\"])\n instance.sample = Decoders.decodeOptional(clazz: Int.self, source: sourceDictionary[\"sample\"])\n instance.sampleTo = Decoders.decodeOptional(clazz: String.self, source: sourceDictionary[\"sampleTo\"])\n instance.maxOvers = Decoders.decodeOptional(clazz: Int.self, source: sourceDictionary[\"maxOvers\"])\n instance.maxUnders = Decoders.decodeOptional(clazz: Int.self, source: sourceDictionary[\"maxUnders\"])\n instance.receivedSfp = Decoders.decodeOptional(clazz: Int.self, source: sourceDictionary[\"receivedSfp\"])\n instance.budgetCode = Decoders.decodeOptional(clazz: String.self, source: sourceDictionary[\"budgetCode\"])\n instance.accountingCode = Decoders.decodeOptional(clazz: String.self, source: sourceDictionary[\"accountingCode\"])\n instance.taxExempt = Decoders.decodeOptional(clazz: String.self, source: sourceDictionary[\"taxExempt\"])\n instance.capitalize = Decoders.decodeOptional(clazz: String.self, source: sourceDictionary[\"capitalize\"])\n instance.accrual = Decoders.decodeOptional(clazz: String.self, source: sourceDictionary[\"accrual\"])\n instance.oddQuantity = Decoders.decodeOptional(clazz: Int.self, source: sourceDictionary[\"oddQuantity\"])\n instance.freightCost = Decoders.decodeOptional(clazz: Double.self, source: sourceDictionary[\"freightCost\"])\n instance.receivedDate = Decoders.decodeOptional(clazz: NSDate.self, source: sourceDictionary[\"receivedDate\"])\n instance.receivedQuantity = Decoders.decodeOptional(clazz: Int.self, source: sourceDictionary[\"receivedQuantity\"])\n instance.fromProd = Decoders.decodeOptional(clazz: Int.self, source: sourceDictionary[\"fromProd\"])\n instance.sfpComplete = Decoders.decodeOptional(clazz: String.self, source: sourceDictionary[\"sfpComplete\"])\n instance.endQuantity = Decoders.decodeOptional(clazz: Int.self, source: sourceDictionary[\"endQuantity\"])\n instance.endVal = Decoders.decodeOptional(clazz: Double.self, source: sourceDictionary[\"endVal\"])\n instance.endFact = Decoders.decodeOptional(clazz: Double.self, source: sourceDictionary[\"endFact\"])\n instance.interimQuantity = Decoders.decodeOptional(clazz: Int.self, source: sourceDictionary[\"interimQuantity\"])\n instance.interimVal = Decoders.decodeOptional(clazz: Double.self, source: sourceDictionary[\"interimVal\"])\n instance.interimFact = Decoders.decodeOptional(clazz: Double.self, source: sourceDictionary[\"interimFact\"])\n instance.lastAct = Decoders.decodeOptional(clazz: NSDate.self, source: sourceDictionary[\"lastAct\"])\n instance.weightPerWrap = Decoders.decodeOptional(clazz: Double.self, source: sourceDictionary[\"weightPerWrap\"])\n instance.norcs = Decoders.decodeOptional(clazz: String.self, source: sourceDictionary[\"norcs\"])\n instance.vendorId = Decoders.decodeOptional(clazz: Int.self, source: sourceDictionary[\"vendorId\"])\n instance.bsVendor = Decoders.decodeOptional(clazz: Int.self, source: sourceDictionary[\"bsVendor\"])\n instance.mlVendor = Decoders.decodeOptional(clazz: Int.self, source: sourceDictionary[\"mlVendor\"])\n instance.receiptNo = Decoders.decodeOptional(clazz: Int.self, source: sourceDictionary[\"receiptNo\"])\n instance.paidFull = Decoders.decodeOptional(clazz: String.self, source: sourceDictionary[\"paidFull\"])\n instance.enteredBy = Decoders.decodeOptional(clazz: String.self, source: sourceDictionary[\"enteredBy\"])\n instance.receivedBy = Decoders.decodeOptional(clazz: String.self, source: sourceDictionary[\"receivedBy\"])\n instance.lineNo = Decoders.decodeOptional(clazz: Int.self, source: sourceDictionary[\"lineNo\"])\n instance.prodLot = Decoders.decodeOptional(clazz: String.self, source: sourceDictionary[\"prodLot\"])\n instance.productIdTag = Decoders.decodeOptional(clazz: String.self, source: sourceDictionary[\"productIdTag\"])\n instance.unitsPerCase = Decoders.decodeOptional(clazz: Int.self, source: sourceDictionary[\"unitsPerCase\"])\n instance.caseWeight = Decoders.decodeOptional(clazz: Double.self, source: sourceDictionary[\"caseWeight\"])\n instance.height = Decoders.decodeOptional(clazz: Double.self, source: sourceDictionary[\"height\"])\n instance.width = Decoders.decodeOptional(clazz: Double.self, source: sourceDictionary[\"width\"])\n instance.length = Decoders.decodeOptional(clazz: Double.self, source: sourceDictionary[\"length\"])\n instance.dockDate = Decoders.decodeOptional(clazz: NSDate.self, source: sourceDictionary[\"dockDate\"])\n instance.modifyDate = Decoders.decodeOptional(clazz: NSDate.self, source: sourceDictionary[\"modifyDate\"])\n instance.impressions = Decoders.decodeOptional(clazz: Int.self, source: sourceDictionary[\"impressions\"])\n instance.asnLine = Decoders.decodeOptional(clazz: Int.self, source: sourceDictionary[\"asnLine\"])\n instance.customFields = Decoders.decodeOptional(clazz: Dictionary.self, source: sourceDictionary[\"customFields\"])\n return instance\n }\n\t\t\t\n\n\t\t\t// Decoder for [ItemReceiptActivity]\n Decoders.addDecoder(clazz: [ItemReceiptActivity].self) { (source: AnyObject) -> [ItemReceiptActivity] in\n return Decoders.decode(clazz: [ItemReceiptActivity].self, source: source)\n }\n\t\t\t// Decoder for ItemReceiptActivity\n Decoders.addDecoder(clazz: ItemReceiptActivity.self) { (source: AnyObject) -> ItemReceiptActivity in\n let sourceDictionary = source as! [NSObject:AnyObject]\n let instance = ItemReceiptActivity()\n instance.id = Decoders.decodeOptional(clazz: Int.self, source: sourceDictionary[\"id\"])\n instance.createDate = Decoders.decodeOptional(clazz: NSDate.self, source: sourceDictionary[\"createDate\"])\n instance.modifyDate = Decoders.decodeOptional(clazz: NSDate.self, source: sourceDictionary[\"modifyDate\"])\n instance.itemReceiptId = Decoders.decodeOptional(clazz: Int.self, source: sourceDictionary[\"itemReceiptId\"])\n instance.lobId = Decoders.decodeOptional(clazz: Int.self, source: sourceDictionary[\"lobId\"])\n instance.poNo = Decoders.decodeOptional(clazz: String.self, source: sourceDictionary[\"poNo\"])\n instance.receiptDistributionDate = Decoders.decodeOptional(clazz: NSDate.self, source: sourceDictionary[\"receiptDistributionDate\"])\n instance.receiptUnitsPerWrap = Decoders.decodeOptional(clazz: Int.self, source: sourceDictionary[\"receiptUnitsPerWrap\"])\n instance.receiptUnitsPerCase = Decoders.decodeOptional(clazz: Int.self, source: sourceDictionary[\"receiptUnitsPerCase\"])\n instance.receiptRevisionDate = Decoders.decodeOptional(clazz: String.self, source: sourceDictionary[\"receiptRevisionDate\"])\n instance.receiptProductionLot = Decoders.decodeOptional(clazz: String.self, source: sourceDictionary[\"receiptProductionLot\"])\n instance.receiptReceiveDate = Decoders.decodeOptional(clazz: NSDate.self, source: sourceDictionary[\"receiptReceiveDate\"])\n instance.receiptStatus = Decoders.decodeOptional(clazz: String.self, source: sourceDictionary[\"receiptStatus\"])\n instance.receiptStatusName = Decoders.decodeOptional(clazz: String.self, source: sourceDictionary[\"receiptStatusName\"])\n instance.receiptUnitCode = Decoders.decodeOptional(clazz: Int.self, source: sourceDictionary[\"receiptUnitCode\"])\n instance.receiptUnitCodeText = Decoders.decodeOptional(clazz: String", "num_tokens": 2048} {"category": "stack_edu-Swift", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/stack_edu-Swift/part-00-00000.npy", "text": ": [])\n \n public init(cardSetsData: CardSetsData) {\n self.cardSetsData = cardSetsData\n }\n \n public var body: some View {\n List {\n ForEach(cardSetsData.cardSets, id: \\.id) { cardSet in\n NavigationLink(destination: CardsPageView(cardSetsData: self.cardSetsData, cardSet: cardSet)) {\n Text(cardSet.title)\n }\n }\n .onDelete { indexSet in\n for index in indexSet {\n self.cardSetsData.deleteCardSet(at: index)\n }\n }\n }\n .navigationBarTitle(\"Card Sets\", displayMode: .inline)\n .navigationBarItems(\n leading: EditButton(),\n trailing: Button(\n action: {\n self.newCardSet = CardSet(title: \"\", cards: [])\n self.showingAddItemView.toggle()\n },\n label: {\n Image(systemName: \"plus\")\n .font(.custom(\"body\", size: 20))\n }\n )\n .sheet(isPresented: $showingAddItemView) {\n EditCardSetView(\n cardSet: self.$newCardSet,\n isNewCardSet: true,\n isCancelled: self.$addItemCancelled\n )\n .onDisappear() {\n if !self.addItemCancelled && !self.newCardSet.title.isEmpty {\n self.cardSetsData.addCardSet(self.newCardSet)\n }\n self.newCardSet = CardSet(title: \"\", cards: [])\n }\n }\n )\n }\n \n}\n\nstruct CardSetsView_Previews: PreviewProvider {\n static var previews: some View {\n ContentView()\n .environment(\\.colorScheme, .light)\n }\n}<|endoftext|>//\n// Game.swift\n// PhillySportsLeague\n//\n// Created by Tomer Shemesh on 4/29/18.\n// Copyright © 2018 Tomer Shemesh. All rights reserved.\n//\nimport Foundation\n\npublic class Game {\n \n //MARK: Properties\n init() {\n date = \"\"\n time = \"\"\n team1URL = \"\"\n team2URL = \"\"\n team1Name = \"\"\n team2Name = \"\"\n team1Score = \"\"\n team2Score = \"\"\n tag = \"\"\n location = GameLocation()\n }\n var date: String\n var time: String\n var team1Name: String\n var team1URL: String\n var team1Score: String\n var team2Name: String\n var team2URL: String\n var team2Score: String\n var location: GameLocation\n var tag: String\n func didTeam1Win() -> Bool {\n if team1Score == \"W\" {\n return true\n } else if team2Score == \"W\" {\n return false\n }\n \n if Int(team1Score) != nil && Int(team2Score) != nil {\n return Int(team1Score)! > Int(team2Score)!\n }\n \n return false\n }\n}<|endoftext|>import UIKit\n\n/*\n Async - управление возвращается вызывающему потоку.\n Sync - вызывающий поток ожидает выполнения вашей задачи.\n*/\n\nfinal class SerialQueue {\n \n private let serialQueue = DispatchQueue(label: \"serialQueue\")\n \n func test() {\n serialQueue.async {\n print(\"test one\")\n }\n serialQueue.async {\n sleep(1)\n print(\"test two\")\n }\n serialQueue.sync {\n print(\"test three\")\n }\n serialQueue.sync {\n print(\"test four\")\n }\n }\n}\n\nSerialQueue().test()<|endoftext|>//\n// Errors.swift\n// MyWeather\n//\n// Created by Pavel Yurkov on 10.06.2021.\n//\n\nimport Foundation\nimport UIKit\n\nenum ApiError: Error {\n case other\n case networkError\n case cityNotFound\n case locationNotFound\n}\n\nfunc handleApiError(error: ApiError, vc: UIViewController) {\n switch error {\n case .other:\n Alert.showAlertError(title: \"Oops!\", message: \"Произошла неизвестная ошибка\", on: vc)\n case .networkError:\n Alert.showAlertError(title: \"Oops!\", message: \"Произошла ошибка сетевого запроса\", on: vc)\n case .cityNotFound:\n Alert.showAlertError(title: \"Oops!\", message: \"Город не найден\", on: vc)\n case .locationNotFound:\n Alert.showAlertError(title: \"Oops!\", message: \"Невозможно получить данные о местонахождении\", on: vc)\n \n }\n \n}<|endoftext|>//\n// ViewController.swift\n// carousel\n//\n// Created by Sho Yasuda on 2021/09/28.\n//\n\nimport UIKit\n\nenum Section: Int, CaseIterable {\n case top\n case carousel\n case normal\n}\n\nclass ViewController: UIViewController {\n\n @IBOutlet weak var collectionView: UICollectionView!\n \n typealias Snapshot = NSDiffableDataSourceSnapshot\n typealias DataSource = UICollectionViewDiffableDataSource\n \n private var snapshot: Snapshot!\n private var dataSource: DataSource!\n \n private var carouselCount: Int = 0\n private var currentPage: Int = 0\n static let prevElementKind = \"prev-element-kind\"\n static let nextElementKind = \"next-element-kind\"\n \n private let top: [String] = [\"top1\", \"top2\", \"top3\", \"top4\", \"top5\"]\n private let carousels: [String] = [\"carousel1\", \"carousel2\", \"carousel3\", \"carousel4\", \"carousel5\"]\n private let items: [String] = [\"item1\", \"item2\", \"item3\", \"item4\", \"item5\"]\n private lazy var compositionalLayout: UICollectionViewCompositionalLayout = {\n let layout = UICollectionViewCompositionalLayout { [weak self] (sectionIndex, env) -> NSCollectionLayoutSection? in\n guard let self = self else { return nil }\n switch sectionIndex {\n case Section.top.rawValue:\n return self.createTopSection()\n case Section.carousel.rawValue:\n return self.createCarouselSection()\n case Section.normal.rawValue:\n return self.createNormalSection()\n default: return nil\n }\n }\n return layout\n }()\n \n override func viewDidLoad() {\n super.viewDidLoad()\n \n setupCollectionView()\n }\n \n private func setupCollectionView() {\n carouselCount = carousels.count\n collectionView.registerCustomCell(TopViewCell.self)\n collectionView.registerCustomCell(CarouselViewCell.self)\n collectionView.registerCustomCell(NormalViewCell.self)\n collectionView.registerCustomReusableFooterView(CarouselFooterView.self)\n collectionView.registerCustomReusableView(CarouselLeftButtonView.self, kind: ViewController.prevElementKind)\n collectionView.registerCustomReusableView(CarouselRightButtonView.self, kind: ViewController.nextElementKind)\n collectionView.collectionViewLayout = compositionalLayout\n \n dataSource = DataSource(collectionView: collectionView, cellProvider: { (collectionView: UICollectionView, indexPath: IndexPath, element: String) -> UICollectionViewCell? in\n switch indexPath.section {\n case Section.top.rawValue:\n let cell = collectionView.dequeueReusableCustomCell(with: TopViewCell.self, indexPath: indexPath)\n cell.set(title: element)\n return cell\n case Section.carousel.rawValue:\n let cell = collectionView.dequeueReusableCustomCell(with: CarouselViewCell.self, indexPath: indexPath)\n cell.set(title: element)\n return cell\n case Section.normal.rawValue:\n let cell = collectionView.dequeueReusableCustomCell(with: NormalViewCell.self, indexPath: indexPath)\n cell.set(title: element)\n return cell\n default:\n return nil\n }\n })\n dataSource.supplementaryViewProvider = { (collectionView: UICollectionView, kind: String, indexPath: IndexPath) -> UICollectionReusableView? in\n switch indexPath.section {\n case Section.carousel.rawValue:\n if kind == UICollectionView.elementKindSectionFooter {\n let footer = collectionView.dequeueReusableCustomFooterView(with: CarouselFooterView.self, indexPath: indexPath)\n footer.set(currentIndex: self.currentPage, count: self.carouselCount)\n return footer\n }\n if kind == ViewController.prevElementKind {\n let prev = collectionView.dequeueReusableCustomView(with: CarouselLeftButtonView.self, indexPath: indexPath, kind: kind)\n prev.tapPrev\n .subscribe(onNext: { [weak self] in\n guard let self = self else { return }\n let pos = self.currentPage - 1\n let position = (pos >= 0) ? pos : 0\n collectionView.scrollToItem(at: IndexPath(item: position, section: indexPath.section), at: .centeredHorizontally, animated: true)\n }).disposed(by: prev.disposeBag)\n return prev\n }\n if kind == ViewController.nextElementKind {\n let next = collectionView.dequeueReusableCustomView(with: CarouselRightButtonView.self, indexPath: indexPath, kind: kind)\n next.tapNext\n .subscribe(onNext: { [weak self] in\n guard let self = self else { return }\n let pos = self.currentPage + 1\n let position = (pos > self.carouselCount) ? self.carouselCount : pos\n collectionView.scrollToItem(at: IndexPath(item: position, section: indexPath.section), at: .centeredHorizontally, animated: true)\n }).disposed(by: next.disposeBag)\n return next\n }\n default:\n return nil\n }\n return nil\n }\n dataSource.apply(snapshot(top: top, carousels: carousels, items: items))\n }\n \n", "num_tokens": 2048} {"category": "stack_edu-TypeScript", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/stack_edu-TypeScript/part-00-00000.npy", "text": " temporaryValue = array[currentIndex];\n array[currentIndex] = array[randomIndex];\n array[randomIndex] = temporaryValue;\n }\n return array\n }\n\n private isPositionMatched(x: number, y: number, position: number): boolean {\n const {sideSize} = this.options;\n const coords = this.options.containers.result.getBoundingClientRect();\n const puzzle = this.puzzles[0];\n const puzzleWidth = puzzle.getPuzzleElement().offsetWidth;\n const puzzleHeight = puzzle.getPuzzleElement().offsetHeight;\n const posY = Math.floor(position / sideSize);\n const posX = position % sideSize;\n return x + coords.x + coords.width >= coords.x + posX * puzzleWidth - CELL_OFFSET\n && x + coords.x + coords.width <= coords.x + posX * puzzleWidth + puzzleWidth + CELL_OFFSET\n && y + coords.y >= coords.y + posY * puzzleHeight - CELL_OFFSET\n && y + coords.y <= coords.y + posY * puzzleHeight + puzzleHeight + CELL_OFFSET;\n }\n\n private removePuzzle(position: number): void {\n this.puzzles = this.puzzles.filter((item) => item.getPosition() !== position);\n }\n\n private subscribeMovementListeners() {\n const {playground, result} = this.options.containers;\n this.puzzles.forEach((puzzle) => {\n puzzle.getPuzzleElement().onmousedown = () => {\n if (puzzle.getPuzzleElement().draggable) {\n puzzle.getPuzzleElement().style.position = 'absolute';\n puzzle.getPuzzleElement().style.zIndex = '10';\n playground.onmousemove = (e) => {\n const x = e.pageX - (window.innerWidth - result.offsetWidth * 2) / 2\n - result.offsetWidth - puzzle.getPuzzleElement().offsetWidth / 2;\n const y = e.pageY - puzzle.getPuzzleElement().offsetHeight / 2 - TOP_OFFSET\n puzzle.move(x, y)\n this.isPositionMatched(x, y, puzzle.getPosition());\n playground.onmouseup = () => {\n if (this.isPositionMatched(x, y, puzzle.getPosition())) {\n puzzle.getPuzzleElement().style.position = 'static';\n this.resultPuzzles[puzzle.getPosition()].appendToCell(puzzle.getPuzzleElement());\n puzzle.disableDraggable();\n this.removePuzzle(puzzle.getPosition());\n if (this.puzzles.length === 0) {\n setTimeout(() => {\n if (window.confirm(\"Game over\")) {\n this.restart()\n }\n }, 500)\n }\n } else {\n puzzle.getPuzzleElement().style.position = 'static';\n }\n playground.onmousemove = null;\n puzzle.getPuzzleElement().onmouseup = null;\n }\n }\n puzzle.getPuzzleElement().ondragstart = () => {\n return false;\n }\n } else {\n return;\n }\n }\n }\n )\n }\n}<|endoftext|>import {Merchant} from './Merchant';\r\n\r\nexport class Product {\r\n\r\n productID: number;\r\n productName: string;\r\n merchant: Merchant;\r\n tag: string[];\r\n company: string;\r\n photo: string;\r\n description: string;\r\n quantity: number;\r\n category: string;\r\n subcategory: string;\r\n soldQuantities: number;\r\n price: number;\r\n releaseDate: Date;\r\n\r\n\r\n// tslint:disable-next-line: max-line-length\r\nconstructor( productID, productName, merchant, tag, company, photo, description, quantity, category, subcategory, soldQuantities, price, releaseDate ) {\r\n this.productID = productID;\r\n this.productName = productName;\r\n this.merchant = merchant;\r\n this.tag = tag;\r\n this.company = company;\r\n this.photo = photo;\r\n this.description = description;\r\n this.quantity = quantity;\r\n this.category = category;\r\n this.subcategory = subcategory;\r\n this.soldQuantities = soldQuantities;\r\n this.price = price;\r\n this.releaseDate = releaseDate;\r\n }\r\n\r\n}<|endoftext|>import '../../clipboard-copy/really-clipboard-copy.js';\n\nimport {\n assert,\n expect,\n fixture,\n fixtureCleanup,\n html,\n} from '@open-wc/testing';\nimport type { TemplateResult } from 'lit';\n\nimport type { ReallyClipboardCopy } from '../../clipboard-copy/really-clipboard-copy.js';\nimport { getAssignedNodes } from '../helpers/get-assigned-nodes.js';\n\ndescribe('initial render', () => {\n it(`renders with no nodes`, async () => {\n const content: TemplateResult = html`\n \n `;\n const el = await fixture(content);\n\n assert.strictEqual(el.innerHTML, '');\n assert.strictEqual(getAssignedNodes(el).length, 0);\n });\n\n it(`renders with nodes (div + button) in light DOM`, async () => {\n const copyKey = 'test';\n const copyText = 'Hello, World!';\n const content: TemplateResult = html`\n \n
    ${copyText}
    \n \n
    \n `;\n const el = await fixture(content);\n\n expect(el).lightDom.equal(\n [\n '
    Hello, World!
    ',\n '',\n ].join('')\n );\n assert.strictEqual(getAssignedNodes(el).length, 2);\n });\n\n it(`renders with nested nodes in light DOM`, async () => {\n const copyKey = 'test';\n const copyText = 'Hello, World!';\n const testCases: [() => TemplateResult, string, number][] = [\n [\n () => html`\n
    \n
    ${copyText}
    \n \n
    \n `,\n [\n '
    ',\n '
    Hello, World!
    ',\n '',\n '
    ',\n ].join(''),\n 1,\n ],\n [\n () => html`\n
    \n
    ${copyText}
    \n
    \n
    \n \n
    \n `,\n [\n '
    ',\n '
    Hello, World!
    ',\n '
    ',\n '
    ',\n '',\n '
    ',\n ].join(''),\n 2,\n ],\n [\n () => html`\n
    \n \n
    \n
    \n
    ${copyText}
    \n
    \n `,\n [\n '
    ',\n '',\n '
    ',\n '
    ',\n '
    Hello, World!
    ',\n '
    ',\n ].join(''),\n 2,\n ],\n ];\n\n for (const [contentFn, expectedDom, assignedNodesLength] of testCases) {\n const content: TemplateResult = html`\n ${contentFn()}\n `;\n const el = await fixture(content);\n\n expect(el).lightDom.equal(expectedDom);\n assert.strictEqual(getAssignedNodes(el).length, assignedNodesLength);\n\n fixtureCleanup();\n }\n });\n\n // FIXME(motss): This is disabled for now\n // it.skip(`renders with 'sync' attribute`, async () => {\n // const copyKey = 'test';\n // const copyText = 'Hello, World!';\n // const content: TemplateResult = html`\n // \n //
    ${copyText}
    \n // \n //
    \n // `;\n // const el = await fixture(content);\n\n // el.sync = true;\n\n // expect(el).lightDom.equal([\n // '
    Hello, World!
    ',\n // '',\n // ].join(''));\n // assert.isTrue(el.hasAttribute('sync'));\n // assert.strictEqual(getAssignedNodes(el).length, 2);\n // });\n});<|endoftext|>import axios from 'axios';\n\nimport { ITelegramService } from './ITelegramService.interface';\n\nconst TELEGRAM_API_URL = 'https://api.telegram.org/bot';\n\nexport class TelegramService implements ITelegramService {\n constructor(private readonly token: string) {\n this.token = token;\n }\n\n async sendMessage({ text, chatId }: { text: string; chatId: number }): Promise {\n const message = {\n text,\n // eslint-disable-next-line @typescript-eslint/camelcase\n chat_id: chatId,\n };\n\n console.log(`Sending telegram message: ${JSON.stringify(message)}...`);\n\n const { data } = await axios.post(`${TELEGRAM_API_URL}${this.token}/sendMessage`, message);\n\n console.log(`Telegram message was successfully sent: ${JSON.stringify(data)}`);\n }\n}<|endoftext|>/**\n * Created by Samuel Gratzl on 27.12.2016.\n */\n\nimport {Vector2D} from '../2D/Vector2D';\nimport {IIntersectionParam} from '../2D/I", "num_tokens": 2048} {"category": "stack_edu-TypeScript", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/stack_edu-TypeScript/part-00-00000.npy", "text": "122.3748009,\n name: 'Monster Fitness',\n draggable: false,\n },\n {\n lat: 40.5371596,\n lng: -122.3476851,\n name: 'Anytime Fitness',\n draggable: false,\n },\n {\n lat: 40.5672764,\n lng: -122.362331,\n name: 'CrossFit Redding',\n draggable: false,\n },\n {\n lat: 40.5769914,\n lng: -122.3749163,\n name: 'Everday Fitness and Training',\n draggable: false,\n },\n ];\n // initial position for map - Redding, California\n lat = 40.583333;\n lng = -122.366667;\n // google maps zoom level\n zoom = 13;\n\n\n\n clickedMarker(label: string, index: number) {\n console.log(`clicked the marker: ${label || index}`);\n }\n\n markerDragEnd(m: Marker, $event: MouseEvent) {\n console.log('dragEnd', m, $event);\n }\n}\n\n// an interface for type safety.\ninterface Marker {\n lat: number;\n lng: number;\n name: string;\n draggable: boolean;\n}\n\n\n\n/*onLocation(event) {\n this.latitude = event.coords.lat;\n this.longitude = event.coords.lng;\n }*/\n\n/*mapClicked($event: MouseEvent) {\n this.markers.push({\n lat: $event.coords.lat,\n lng: $event.coords.lng,\n draggable: false,\n });\n*/<|endoftext|>// Dependencies\nimport dot from 'dot-object'\n\n// Utils\nimport { isBrowser, isString, isEmptyObject, isObject, isDefined, isJson, isArray } from '../is'\nimport { chunk } from '../array'\n\nexport function cloneObject(o: any): any {\n return { ...o }\n}\n\nexport function getEmptyValues(values: any, required: any = []): any {\n const emptyValues: any = {}\n\n Object.keys(values).forEach((field: string) => {\n const v = isString(values[field]) ? values[field].trim() : values[field]\n\n if (required && required.length === 0 && v === '') {\n emptyValues[field] = true\n } else if (required && required.includes(field) && v === '') {\n emptyValues[field] = true\n }\n })\n\n return !isEmptyObject(emptyValues) ? emptyValues : false\n}\n\nexport function getDebug(data: any): any {\n if (data._DEBUG) {\n return JSON.parse(data._DEBUG)\n }\n\n return null\n}\n\nexport function getEntries(data: any, exclude = ['updatedAt']): any {\n if (!data) {\n return null\n }\n\n const { fields, values } = data\n const systemHead = []\n const systemBody = []\n const head = []\n const body = []\n let entries: any = {}\n\n if (fields) {\n for (const field of fields) {\n if (!exclude.includes(field.identifier) && field.type !== 'Reference') {\n if (field.isSystem && field.identifier !== 'id') {\n systemHead.push(field.fieldName)\n systemBody.push(field.identifier)\n } else {\n head.push(field.fieldName)\n body.push(field.identifier)\n }\n\n if (!values) {\n for (const value of field.values) {\n entries[value.entry] = entries[value.entry] || {}\n entries[value.entry][field.identifier] = value.value\n }\n } else {\n entries = values\n }\n }\n }\n }\n\n return {\n head,\n body,\n systemHead,\n systemBody,\n entries: Object.values(entries)\n }\n}\n\nexport function getValuesForTable(\n data: any,\n excludeMore?: any,\n orderBy?: any,\n direction?: any,\n chunks?: any\n): any {\n if (!data) {\n return null\n }\n\n direction = direction || 'asc'\n chunks = chunks || 10\n\n const exclude: any = excludeMore || ['updatedAt']\n const { head, body, entries: rows, systemHead, systemBody } = getEntries(data, exclude)\n\n if (orderBy) {\n if (direction === 'asc') {\n rows.sort((a: any, b: any) => (a[orderBy] > b[orderBy] ? 1 : -1))\n } else {\n rows.sort((a: any, b: any) => (a[orderBy] < b[orderBy] ? 1 : -1))\n }\n }\n\n return {\n head: head.concat(systemHead),\n body: body.concat(systemBody),\n rows: chunk(rows, chunks),\n raw: rows,\n total: rows.length\n }\n}\n\nexport function keys(obj: any): any[] {\n if (isObject(obj)) {\n return Object.keys(obj)\n }\n\n return []\n}\n\nexport function forEach(items: any, callback: any): any {\n if (!isDefined(items)) {\n return false\n }\n\n if ((isDefined(items) && isDefined(items[0])) || isArray(items)) {\n return items.forEach(callback)\n }\n\n return isObject(items) ? keys(items).forEach(callback) : false\n}\n\nexport function pick(key: string, obj: any): string {\n return dot.pick(key, obj) || key\n}\n\nexport function buildContentJson(nodes: any, raw?: boolean) {\n const rows: any = {}\n\n forEach(nodes, (node: any) => {\n rows[node.key] = node.value\n })\n\n if (!raw) {\n dot.object(rows)\n }\n\n return rows\n}\n\nexport function objectToDot(nodes: any): any {\n if (isObject(nodes)) {\n return dot.dot(nodes)\n }\n\n return null\n}\n\nexport function hasOwnProperty(obj: any, prop: string): boolean {\n return Object.prototype.hasOwnProperty.call(obj, prop)\n}\n\nexport function getStorageItem(key: string, returnJson = true): any {\n if (!isBrowser() || !localStorage) {\n return null\n }\n\n const item: any = localStorage.getItem(key)\n\n if (returnJson && isJson(item)) {\n return JSON.parse(item)\n }\n\n return item\n}\n\nexport function setStorageItem(key: string, value: any): any {\n if (isBrowser() && key && value && localStorage) {\n if (isObject(value)) {\n value = JSON.stringify(value)\n }\n\n localStorage.setItem(key, value)\n\n return true\n }\n\n return null\n}\n\nexport function removeStorageItem(key: string): any {\n if (isBrowser() && key && localStorage) {\n localStorage.removeItem(key)\n }\n}\n\nexport function clearStorage(): any {\n if (isBrowser() && localStorage) {\n localStorage.clear()\n }\n}<|endoftext|>import {AbstractControl} from '@angular/forms';\nexport class PasswordValidator {\n\n static matchPassword(AC: AbstractControl) {\n let inputPassword = AC.get('inputPassword').value; // to get value from input tag\n let confirmPassword = AC.get('confirmPassword').value; // to get value from input tag\n if(inputPassword != confirmPassword) {\n // console.log('false');\n // set the error-name and its boolean value which can be checked and used in html alert div\n AC.get('confirmPassword').setErrors( {matchPassword: true} );\n } else {\n // console.log('true');\n AC.get('confirmPassword').setErrors(null);\n return null;\n }\n }\n}<|endoftext|>import {\n registerDecorator,\n ValidationOptions,\n ValidatorConstraint,\n ValidatorConstraintInterface,\n ValidationArguments,\n} from 'class-validator';\n\n@ValidatorConstraint({ name: 'EqualsTo' })\nexport class IsEqualsToConstraint implements ValidatorConstraintInterface {\n validate(value: number, args: ValidationArguments) {\n const filter = args.constraints.find((val) => {\n return val === value\n });\n return filter === value;\n }\n}\n\nexport function IsEqualsTo(values: any[], validationOptions?: ValidationOptions) {\n return function (object: Object, propertyName: string) {\n registerDecorator({\n target: object.constructor,\n propertyName: propertyName,\n options: {...validationOptions,message:`${propertyName} value must be equal to one of the values from [${values}]`},\n constraints: values,\n validator: IsEqualsToConstraint,\n });\n };\n}<|endoftext|>import * as squill from \"@squill/squill\";\nimport {sqlfier} from \"./sqlfier\";\n\n/**\n * Returns an unprettified SQL string.\n * Is fast-ish.\n *\n * @param ast - The AST to convert to a SQL string\n * @see {toSqlPretty} for pretty output but slower performance.\n */\nexport function toSql (ast : squill.Ast) : string {\n return squill.AstUtil.toSql(ast, sqlfier);\n}\n\n/**\n * Returns a prettified SQL string.\n * Is slow-ish.\n *\n * @param ast - The AST to convert to a SQL string\n * @see {toSql} for ugly output but faster performance.\n */\nexport function toSqlPretty (ast : squill.Ast) : string {\n return squill.AstUtil.toSqlPretty(\n ast,\n sqlfier,\n {\n stringTypes : [/*`\"\"`,*/ \"N''\", /*\"''\",*/ \"``\", \"[]\", \"X''\", \"pascal-single\", \"pascal-double\"],\n /**\n * These `", "num_tokens": 2048} {"category": "stack_edu-TypeScript", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/stack_edu-TypeScript/part-00-00000.npy", "text": " _rebuildDataList(): void {\n const datalist = this._datalist;\n if (!datalist) return;\n while (datalist.firstChild) {\n datalist.removeChild(datalist.firstChild);\n }\n const datalistSelect = L.DomUtil.create(\"select\", \"\", this._datalist);\n datalistSelect.setAttribute(\"aria-label\", \"List of times\");\n this._getTimes().forEach((time) => {\n (L.DomUtil.create(\n \"option\",\n \"\",\n datalistSelect\n ) as HTMLOptionElement).value = time.toString();\n });\n },\n\n /**\n * Makes a button with the passed name as a class, which calls the\n * corresponding function when clicked. Attaches the button to container.\n *\n * @private\n * @param container The container to which to add the button\n * @param name The class to give the button and the function to call\n */\n _makeButton(container, name) {\n const button = L.DomUtil.create(\"button\", name, container);\n button.setAttribute(\"aria-label\", name);\n button.addEventListener(\"click\", () => this[name]());\n L.DomEvent.disableClickPropagation(button);\n },\n\n /**\n * Makes the prev, play, pause, and next buttons\n *\n * @private\n * @param container The container to which to add the buttons\n */\n _makeButtons(container) {\n this._makeButton(container, \"prev\");\n this._makeButton(container, \"play\");\n this._makeButton(container, \"pause\");\n this._makeButton(container, \"next\");\n },\n\n /**\n * DOM event handler to disable dragging on map\n *\n * @private\n */\n _disableMapDragging() {\n this.map.dragging.disable();\n },\n\n /**\n * DOM event handler to enable dragging on map\n *\n * @private\n */\n _enableMapDragging() {\n this.map.dragging.enable();\n },\n\n /**\n * Creates the range input\n *\n * @private\n * @param container The container to which to add the input\n */\n _makeSlider(container) {\n const slider = L.DomUtil.create(\n \"input\",\n \"time-slider\",\n container\n ) as HTMLInputElement;\n slider.setAttribute(\"aria-label\", \"Slider\");\n slider.type = \"range\";\n slider.min = (this.start || 0).toString();\n slider.max = (this.end || 0).toString();\n slider.value = (this.start || 0).toString();\n this._timeSlider = slider;\n // register events using leaflet for easy removal\n L.DomEvent.on(\n this._timeSlider,\n \"mousedown mouseup click touchstart\",\n L.DomEvent.stopPropagation\n );\n L.DomEvent.on(this._timeSlider, \"change input\", this._sliderChanged, this);\n L.DomEvent.on(\n this._timeSlider,\n \"mouseenter\",\n this._disableMapDragging,\n this\n );\n L.DomEvent.on(\n this._timeSlider,\n \"mouseleave\",\n this._enableMapDragging,\n this\n );\n },\n\n _makeOutput(container) {\n this._output = L.DomUtil.create(\n \"output\",\n \"time-text\",\n container\n ) as HTMLOutputElement;\n this._output.innerHTML = this.options.formatOutput(this.start);\n },\n\n _onKeydown(e) {\n let target = (e.target || e.srcElement) as HTMLElement;\n if (!/INPUT|TEXTAREA/.test(target.tagName)) {\n switch (e.keyCode || e.which) {\n case 37:\n this.prev();\n break;\n case 39:\n this.next();\n break;\n case 32:\n this.toggle();\n break;\n default:\n return;\n }\n e.preventDefault();\n }\n },\n\n _sliderChanged(e) {\n const { target } = e;\n const time = parseFloat(\n target instanceof HTMLInputElement ? target.value : \"0\"\n );\n this._setTime(time, e.type);\n },\n\n _setTime(time: number, type: string) {\n this.time = time;\n if (!this.options.waitToUpdateMap || type === \"change\") {\n this.timelines.forEach((timeline) => timeline.setTime(time));\n }\n if (this._output) {\n this._output.innerHTML = this.options.formatOutput(time);\n }\n },\n\n _resetIfTimelinesChanged(oldTimelineCount) {\n if (this.timelines.length !== oldTimelineCount) {\n this._recalculate();\n if (this.options.showTicks) {\n this._rebuildDataList();\n }\n this.setTime(this.start);\n }\n },\n\n _autoPlay() {\n if (document.readyState === \"loading\") {\n window.addEventListener(\"load\", () => this._autoPlay());\n } else {\n this.play();\n }\n },\n\n /* EXTERNAL API *************************************************************/\n\n /**\n * Register timeline layers with this control. This could change the start and\n * end points of the timeline (unless manually set). It will also reset the\n * playback.\n *\n * @param timelines The `L.Timeline`s to register\n */\n addTimelines(...timelines) {\n this.pause();\n const timelineCount = this.timelines.length;\n timelines.forEach((timeline) => {\n if (this.timelines.indexOf(timeline) === -1) {\n this.timelines.push(timeline);\n }\n });\n this._resetIfTimelinesChanged(timelineCount);\n },\n\n /**\n * Unregister timeline layers with this control. This could change the start\n * and end points of the timeline unless manually set. It will also reset the\n * playback.\n *\n * @param timelines The `L.Timeline`s to unregister\n */\n removeTimelines(...timelines) {\n this.pause();\n const timelineCount = this.timelines.length;\n timelines.forEach((timeline) => {\n const index = this.timelines.indexOf(timeline);\n if (index !== -1) {\n this.timelines.splice(index, 1);\n }\n });\n this._resetIfTimelinesChanged(timelineCount);\n },\n\n /**\n * Toggles play/pause state.\n */\n toggle() {\n if (this._playing) {\n this.pause();\n } else {\n this.play();\n }\n },\n\n /**\n * Pauses playback and goes to the previous event.\n */\n prev() {\n this.pause();\n const prevTime = this._nearestEventTime(this.time, -1);\n this._timeSlider.value = prevTime.toString();\n this.setTime(prevTime);\n },\n\n /**\n * Pauses playback.\n */\n pause(fromSynced) {\n window.clearTimeout(this._timer);\n this._playing = false;\n this.container?.classList.remove(\"playing\");\n\n if (this.syncedControl && !fromSynced) {\n this.syncedControl.map(function (control) {\n control.pause(true);\n });\n }\n },\n\n /**\n * Starts playback.\n */\n play(fromSynced) {\n window.clearTimeout(this._timer);\n if (parseFloat(this._timeSlider.value) === this.end) {\n this._timeSlider.value = this.start.toString();\n }\n this._timeSlider.value = (\n parseFloat(this._timeSlider.value) + this._stepSize\n ).toString();\n this.setTime(+this._timeSlider.value);\n if (parseFloat(this._timeSlider.value) === this.end) {\n this._playing = false;\n this.container?.classList.remove(\"playing\");\n } else {\n this._playing = true;\n this.container?.classList.add(\"playing\");\n this._timer = window.setTimeout(\n () => this.play(true),\n this._stepDuration\n );\n }\n\n if (this.syncedControl && !fromSynced) {\n this.syncedControl.map(function (control) {\n control.play(true);\n });\n }\n },\n\n /**\n * Pauses playback and goes to the next event.\n */\n next() {\n this.pause();\n const nextTime = this._nearestEventTime(this.time, 1);\n this._timeSlider.value = nextTime.toString();\n this.setTime(nextTime);\n },\n\n /**\n * Set the time displayed.\n *\n * @param time The time to set\n */\n setTime(time: number) {\n if (this._timeSlider) this._timeSlider.value = time.toString();\n this._setTime(time, \"change\");\n },\n\n onAdd(map: L.Map): HTMLElement {\n this.map = map;\n this._createDOM();\n this.setTime(this.start);\n return this.container;\n },\n\n onRemove() {\n /* istanbul ignore else */\n if (this.options.enableKeyboardControls) {\n this._removeKeyListeners();\n }\n // cleanup events registered in _makeSlider\n L.DomEvent.off(this._timeSlider, \"change input\", this._sliderChanged, this);\n L.DomEvent.off(\n this._timeSlider,\n \"pointerdown mousedown touchstart\",\n this._disableMapDragging,\n this\n );\n L.DomEvent.off(\n document.body,\n \"pointerup mouseup touchend\",\n this._enableMapDragging,\n this\n );\n // make sure that dragging is restored to enabled state\n this._enableMapDragging();\n },\n\n syncControl(controlToSync) {\n if (!this.syncedControl) {\n this.syncedControl = [];\n }\n this.syncedControl.push(controlToSync);\n },\n});\n\nL.timelineSliderControl = (options?: TimelineSliderControl", "num_tokens": 2048} {"category": "stack_edu-TypeScript", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/stack_edu-TypeScript/part-00-00000.npy", "text": " Promise.all(usersPromises)\n .then(users => {\n users.forEach(async (user, index) => {\n await group.addUser(user, { transaction: t });\n await user.addGroup(group, { transaction: t });\n if (users.length === index + 1) {\n await t.commit();\n }\n });\n });\n } catch (error) {\n await t.rollback();\n throw (error);\n }\n }\n\n}<|endoftext|>import * as FS from 'fs';\nimport * as Path from 'path';\n\nimport {\n window as Window,\n commands as Commands,\n extensions as Extensions,\n Range,\n TextEditor\n} from 'vscode';\n\nimport {\n parse,\n StringTarget,\n StringBodyTarget,\n StringGroupTarget,\n isStringGroupTarget,\n isStringBodyTarget\n} from './parser';\n\nimport {\n StringType,\n findActiveStringTargetInEditor,\n findActiveStringTargetsInEditor\n} from './es-quotes';\n\nimport {\n transform\n} from './transform';\n\nimport {\n RangeBuilder\n} from './range';\n\nconst DEFAULT_QUOTE = 'defaultQuote';\n\nexport function activate() {\n let configMemento = Extensions.getConfigurationMemento('esQuotes');\n \n Commands.registerTextEditorCommand('esQuotes.switchToTemplateString', (editor, edit) => {\n let activeTarget = findActiveStringTargetInEditor(editor);\n \n if (!activeTarget) {\n return;\n }\n \n if (activeTarget.type === StringType.template) {\n Window.showInformationMessage('The string at selected range is already a template string.');\n return;\n }\n \n let value = transform(activeTarget.body, activeTarget.type, StringType.template);\n \n edit.replace(activeTarget.range, value);\n });\n \n Commands.registerTextEditorCommand('esQuotes.switchToNormalString', (editor, edit) => {\n let activeTargets = findActiveStringTargetsInEditor(editor);\n \n if (!activeTargets) {\n return;\n }\n \n let firstTarget = activeTargets[0];\n \n if (isStringBodyTarget(firstTarget) && firstTarget.type !== StringType.template) {\n Window.showInformationMessage('The string at selected range is already a normal string.')\n return;\n }\n \n configMemento\n .getValue(DEFAULT_QUOTE)\n .then(quote => {\n if (!/^[\"']$/.test(quote)) {\n quote = \"'\";\n }\n \n let type = quote === '\"' ? StringType.doubleQuoted : StringType.singleQuoted;\n \n return editor.edit(edit => {\n for (let i = 0; i < activeTargets.length; i++) {\n let target = activeTargets[i];\n \n if (isStringBodyTarget(target)) {\n let value = transform(target.body, StringType.template, type);\n \n if (i > 0) {\n value = ' + ' + value;\n \n let previousTarget = activeTargets[i - 1];\n if (isStringGroupTarget(previousTarget) && previousTarget.hasLowPriorityOperator) {\n value = ')' + value;\n }\n }\n \n if (i < activeTargets.length - 1) {\n value += ' + ';\n \n let nextTarget = activeTargets[i + 1];\n if (isStringGroupTarget(nextTarget)) {\n if (nextTarget.hasLowPriorityOperator) {\n value += '(';\n }\n \n // if (nextTarget.whitespacesRangeAtBeginning && !nextTarget.whitespacesRangeAtBeginning.isEmpty()) {\n // edit.delete(nextTarget.whitespacesRangeAtBeginning);\n // }\n \n // if (nextTarget.whitespacesRangeAtEnd && !nextTarget.whitespacesRangeAtEnd.isEmpty()) {\n // edit.delete(nextTarget.whitespacesRangeAtEnd);\n // }\n }\n }\n \n edit.replace(target.range, value);\n }\n }\n });\n });\n });\n \n Commands.registerTextEditorCommand('esQuotes.switchBetweenSingleDoubleQuotes', (editor, edit) => {\n let activeTarget = findActiveStringTargetInEditor(editor);\n \n if (!activeTarget) {\n return;\n }\n \n if (activeTarget.type === StringType.template) {\n Window.showInformationMessage('The string at selected range is a template string.');\n return;\n }\n \n let type = activeTarget.type === StringType.doubleQuoted ? StringType.singleQuoted : StringType.doubleQuoted;\n \n let value = transform(activeTarget.body, activeTarget.type, type);\n \n edit.replace(activeTarget.range, value);\n });\n}<|endoftext|>\ninterface Frame {\n}\n\nclass Animations {\n}\n\nclass TextureAnimator {\n private currentDisplayTime = 0; // how long has the current image been displayed?\n private currentTile = 0; // which image is currently being displayed?\n constructor(\n private texture: THREE.Texture,\n private tilesHorizontal: number,\n private tilesVertical: number,\n private numberOfTiles: number,\n private tileDisplayDuration: number) {\n // note: texture passed by reference, will be updated by the update function.\n\n //this.tilesHorizontal = tilesHoriz;\n //this.tilesVertical = tilesVert;\n // how many images does this spritesheet contain?\n // usually equals tilesHoriz * tilesVert, but not necessarily,\n // if there at blank tiles at the bottom of the spritesheet.\n //this.numberOfTiles = numTiles;\n texture.wrapS = texture.wrapT = THREE.RepeatWrapping;\n texture.repeat.set(1 / this.tilesHorizontal, 1 / this.tilesVertical);\n\n // how long should each image be displayed?\n //this.tileDisplayDuration = tileDispDuration;\n\n }\n\n public update(milliSec: number) {\n let texture = this.texture;\n this.currentDisplayTime += milliSec;\n while (this.currentDisplayTime > this.tileDisplayDuration) {\n this.currentDisplayTime -= this.tileDisplayDuration;\n this.currentTile++;\n if (this.currentTile == this.numberOfTiles)\n this.currentTile = 0;\n var currentColumn = this.currentTile % this.tilesHorizontal;\n texture.offset.x = currentColumn / this.tilesHorizontal;\n var currentRow = Math.floor(this.currentTile / this.tilesHorizontal);\n texture.offset.y = currentRow / this.tilesVertical;\n }\n }\n}<|endoftext|>/*---------------------------------------------------------------------------------------------\n * Copyright (c) Microsoft Corporation. All rights reserved.\n * Licensed under the MIT License. See License.txt in the project root for license information.\n *--------------------------------------------------------------------------------------------*/\n\nimport * as arrays from 'vs/base/common/arrays';\nimport { LineTokens } from 'vs/editor/common/core/lineTokens';\nimport { Position } from 'vs/editor/common/core/position';\nimport { IRange } from 'vs/editor/common/core/range';\nimport { ColorId, FontStyle, LanguageId, MetadataConsts, StandardTokenType, TokenMetadata } from 'vs/editor/common/modes';\n\nfunction getDefaultMetadata(topLevelLanguageId: LanguageId): number {\n\treturn (\n\t\t(topLevelLanguageId << MetadataConsts.LANGUAGEID_OFFSET)\n\t\t| (StandardTokenType.Other << MetadataConsts.TOKEN_TYPE_OFFSET)\n\t\t| (FontStyle.None << MetadataConsts.FONT_STYLE_OFFSET)\n\t\t| (ColorId.DefaultForeground << MetadataConsts.FOREGROUND_OFFSET)\n\t\t| (ColorId.DefaultBackground << MetadataConsts.BACKGROUND_OFFSET)\n\t) >>> 0;\n}\n\nconst EMPTY_LINE_TOKENS = (new Uint32Array(0)).buffer;\n\nexport class MultilineTokensBuilder {\n\n\tpublic readonly tokens: MultilineTokens[];\n\n\tconstructor() {\n\t\tthis.tokens = [];\n\t}\n\n\tpublic add(lineNumber: number, lineTokens: Uint32Array): void {\n\t\tif (this.tokens.length > 0) {\n\t\t\tconst last = this.tokens[this.tokens.length - 1];\n\t\t\tconst lastLineNumber = last.startLineNumber + last.tokens.length - 1;\n\t\t\tif (lastLineNumber + 1 === lineNumber) {\n\t\t\t\t// append\n\t\t\t\tlast.tokens.push(lineTokens);\n\t\t\t\treturn;\n\t\t\t}\n\t\t}\n\t\tthis.tokens.push(new MultilineTokens(lineNumber, lineTokens));\n\t}\n}\n\nexport class MultilineTokens {\n\n\tpublic readonly startLineNumber: number;\n\tpublic readonly tokens: Uint32Array[];\n\n\tconstructor(lineNumber: number, tokens: Uint32Array) {\n\t\tthis.startLineNumber = lineNumber;\n\t\tthis.tokens = [tokens];\n\t}\n}\n\nexport class TokensStore {\n\tprivate _lineTokens: (ArrayBuffer | null)[];\n\tprivate _len: number;\n\n\tconstructor() {\n\t\tthis._lineTokens = [];\n\t\tthis._len = 0;\n\t}\n\n\tpublic flush(): void {\n\t\tthis._lineTokens = [];\n\t\tthis._len = 0;\n\t}\n\n\tpublic getTokens(topLevelLanguageId: LanguageId, lineIndex: number, lineText: string): LineTokens {\n\t\tlet rawLineTokens: ArrayBuffer | null = null;\n\t\tif (lineIndex < this._len) {\n\t\t\trawLineTokens = this._lineTokens[lineIndex];\n\t\t}\n\n\t\tif (rawLineTokens !== null && rawLineTokens !== EMPTY_LINE_TOKENS) {\n\t\t\treturn new LineTokens(new Uint32Array(rawLineTokens), lineText);\n\t\t}\n\n\t\tlet lineTokens = new Uint32Array(2);\n\t\tlineTokens[0] = lineText.length;\n\t\tlineTokens[1] = getDefaultMetadata(topLevelLanguageId);\n\t\treturn new LineTokens(lineTokens, lineText);\n\t}\n\n\tprivate static _massageTokens(topLevelLanguageId: LanguageId, lineTextLength: number, tokens: Uint32Array): ArrayBuffer {\n\t\tif (lineTextLength === 0) {\n\t\t\tlet hasDifferentLanguageId = false;\n\t\t\tif (tokens && tokens.length > 1) {\n\t\t\t\thasDifferentLanguageId = (TokenMetadata.getLanguageId(tokens[1]) !== topLevelLanguageId);\n\t\t\t}\n\n\t\t\tif (!", "num_tokens": 2048} {"category": "stack_edu-TypeScript", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/stack_edu-TypeScript/part-00-00000.npy", "text": "', 'index.js']);\n const state = {\n routes: [\n {\n params: {\n '404': ['test', 'bar', '42', 'whatever'],\n },\n name: '[...404]',\n path,\n },\n ],\n };\n\n testConversions(path, config, state);\n});\n\nit('matches wildcard patterns at nested level', () => {\n const path = '/bar/42/whatever/baz/initt';\n\n const config = configFromFs([\n '(foo)/_layout.tsx',\n '(foo)/bar/_layout.tsx',\n '(foo)/bar/[id].tsx',\n '(foo)/bar/[...rest].tsx',\n ]);\n\n const state = {\n routes: [\n {\n name: '(foo)',\n params: { rest: ['42', 'whatever', 'baz', 'initt'] },\n state: {\n routes: [\n {\n name: 'bar',\n params: { rest: ['42', 'whatever', 'baz', 'initt'] },\n state: {\n routes: [\n {\n name: '[...rest]',\n params: {\n rest: ['42', 'whatever', 'baz', 'initt'],\n },\n path: '/bar/42/whatever/baz/initt',\n },\n ],\n },\n },\n ],\n },\n },\n ],\n };\n\n testConversions(path, config, state);\n});\n\nxit('matches wildcard patterns at nested level with exact', () => {\n const path = '/whatever';\n const config = {\n screens: {\n Foo: {\n screens: {\n Bar: {\n path: '/bar/:id/',\n screens: {\n 404: {\n path: '*404',\n exact: true,\n },\n },\n },\n Baz: {},\n },\n },\n },\n };\n\n const state = {\n routes: [\n {\n name: 'Foo',\n params: {\n '404': ['whatever'],\n },\n state: {\n routes: [\n {\n name: 'Bar',\n params: {\n '404': ['whatever'],\n },\n state: {\n routes: [\n {\n name: '404',\n params: {\n '404': ['whatever'],\n },\n path,\n },\n ],\n },\n },\n ],\n },\n },\n ],\n };\n\n expect(getStateFromPath(path, config)).toEqual(state);\n expect(getStateFromPath(getPathFromState(state, config), config)).toEqual(\n changePath(state, path)\n );\n});\n\nit('tries to match wildcard patterns at the end', () => {\n const path = '/bar/42/test';\n const config = {\n screens: {\n bar: {\n path: 'bar',\n screens: {\n '[...404]': '*404',\n '[userSlug]': ':userSlug',\n ':id': {\n path: ':id',\n screens: {\n test: 'test',\n },\n },\n },\n },\n },\n };\n\n const state = {\n routes: [\n {\n name: 'bar',\n params: { id: '42' },\n state: {\n routes: [\n {\n name: ':id',\n params: { id: '42' },\n state: {\n routes: [\n {\n name: 'test',\n params: { id: '42' },\n path: '/bar/42/test',\n },\n ],\n },\n },\n ],\n },\n },\n ],\n };\n\n testConversions(path, config, state);\n});\n\nit('uses nearest parent wildcard match for unmatched paths', () => {\n const path = '/bar/42/baz/test';\n const config = {\n screens: {\n Foo: {\n screens: {\n Bar: {\n path: '/bar/:id/',\n screens: {\n Baz: 'baz',\n },\n },\n '[...404]': '*404',\n },\n },\n },\n };\n\n const state = {\n routes: [\n {\n name: 'Foo',\n params: {\n '404': ['bar', '42', 'baz', 'test'],\n },\n state: {\n routes: [\n {\n name: '[...404]',\n params: {\n '404': ['bar', '42', 'baz', 'test'],\n },\n path,\n },\n ],\n },\n },\n ],\n };\n\n testConversions(path, config, state);\n});\n\nit('throws if two screens map to the same pattern', () => {\n const path = '/bar/42/baz/test';\n\n expect(() =>\n getStateFromPath(path, {\n screens: {\n Foo: {\n screens: {\n Bar: {\n path: '/bar/:id/',\n screens: {\n Baz: 'baz',\n },\n },\n Bax: '/bar/:id/baz',\n },\n },\n },\n })\n ).toThrow(\n \"The route pattern 'bar/:id/baz' resolves to both 'Foo//bar/:id/baz' and 'Foo/Bar/baz'. Patterns must be unique and cannot resolve to more than one route.\"\n );\n\n expect(() =>\n getStateFromPath(path, {\n screens: {\n Foo: {\n screens: {\n Bar: {\n path: '/bar/:id/',\n screens: {\n Baz: '',\n },\n },\n },\n },\n },\n })\n ).not.toThrow();\n});\n\nit('correctly applies initialRouteName for config with similar route names', () => {\n const path = '/weekly-earnings';\n\n const config = {\n screens: {\n RootTabs: {\n screens: {\n HomeTab: {\n screens: {\n Home: '',\n WeeklyEarnings: 'weekly-earnings',\n EventDetails: 'event-details/:eventId',\n },\n },\n EarningsTab: {\n initialRouteName: 'Earnings',\n path: 'earnings',\n screens: {\n Earnings: '',\n WeeklyEarnings: 'weekly-earnings',\n },\n },\n },\n },\n },\n };\n\n const state = {\n routes: [\n {\n name: 'RootTabs',\n state: {\n routes: [\n {\n name: 'HomeTab',\n state: {\n routes: [\n {\n name: 'WeeklyEarnings',\n path,\n },\n ],\n },\n },\n ],\n },\n },\n ],\n };\n\n testConversions(path, config, state);\n});\n\nit('correctly applies initialRouteName for config with similar route names v2', () => {\n const path = '/earnings/weekly-earnings';\n\n const config = {\n screens: {\n RootTabs: {\n screens: {\n HomeTab: {\n initialRouteName: 'Home',\n screens: {\n Home: '',\n WeeklyEarnings: 'weekly-earnings',\n },\n },\n EarningsTab: {\n initialRouteName: 'Earnings',\n path: 'earnings',\n screens: {\n Earnings: '',\n WeeklyEarnings: 'weekly-earnings',\n },\n },\n },\n },\n },\n };\n\n const state = {\n routes: [\n {\n name: 'RootTabs',\n state: {\n routes: [\n {\n name: 'EarningsTab',\n state: {\n index: 1,\n routes: [\n {\n name: 'Earnings',\n },\n {\n name: 'WeeklyEarnings',\n path,\n },\n ],\n },\n },\n ],\n },\n },\n ],\n };\n\n testConversions(path, config, state);\n});\n\nit('throws when invalid properties are specified in the config', () => {\n expect(() =>\n getStateFromPath('', {\n Foo: 'foo',\n Bar: {\n path: 'bar',\n },\n } as any)\n ).toThrowErrorMatchingInlineSnapshot(`\n \"Found invalid properties in the configuration:\n - Foo\n - Bar\n\n Did you forget to specify them under a 'screens' property?\n\n You can only specify the following properties:\n - initialRouteName\n - screens\n - _route\n\n See https://reactnavigation.org/docs/configuring-links for more details on how to specify a linking configuration.\"\n `);\n\n expect(() =>\n getStateFromPath('', {\n screens: {\n Foo: 'foo',\n Bar: {\n path: 'bar',\n },\n Baz: {\n Qux: {\n path: 'qux',\n },\n },\n },\n } as any)\n ).toThrowErrorMatchingInlineSnapshot(`\n \"Found invalid properties in the configuration:\n - Qux\n\n Did you forget to specify them under a 'screens' property?\n\n You can only specify the following properties:\n - initialRouteName\n - screens\n - _route\n - path\n - exact\n - stringify\n - parse\n\n See https://reactnavigation.org/docs/configuring-links for more details on how to specify a linking configuration.\"\n `);\n});\n\nfunction testConversions(path: string, config: any, state: any) {\n expect(getStateFromPath(path, config)).toEqual(state);\n expect(getStateFromPath(getPathFromState(state, config), config)).toEqual(state);\n}<|endoftext|>import program from 'commander';\nimport { LilaBeautyPriceExtractor } from './LilaBeautyPrice", "num_tokens": 2048} {"category": "stack_edu-TypeScript", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/stack_edu-TypeScript/part-00-00000.npy", "text": "shCode('foo', 'http://foo.com');\n fixedValRule.fixedValue = fixedFshCode;\n observation.rules.push(fixedValRule); // * valueQuantity = foo.com#foo\n const cardRule = new CardRule('valueQuantity');\n cardRule.min = 1;\n observation.rules.push(cardRule); // * valueQuantity 1..1\n const observationInstance = new Instance('MyObservation');\n observationInstance.instanceOf = 'TestObservation';\n const fixedQuantityValue = new FixedValueRule('valueQuantity.value');\n fixedQuantityValue.fixedValue = 100;\n observationInstance.rules.push(fixedQuantityValue); // * valueQuantity.value = 100\n doc.instances.set(observationInstance.name, observationInstance);\n\n const exported = exportInstance(observationInstance);\n expect(exported.valueQuantity).toEqual({\n code: 'foo',\n system: 'http://foo.com',\n value: 100\n });\n });\n\n it('should fix a value onto slice elements that are fixed by a pattern on the Structure Definition', () => {\n const resprate = new Profile('TestResprate');\n resprate.parent = 'resprate';\n doc.profiles.set(resprate.name, resprate);\n const containsRule = new ContainsRule('category');\n containsRule.items = ['niceSlice'];\n resprate.rules.push(containsRule); // * identifier contains niceSlice\n const cardRule = new CardRule('category[niceSlice]');\n cardRule.min = 1;\n cardRule.max = '*';\n resprate.rules.push(cardRule); // * category[niceSlice] 1..*\n const fixedValRule = new FixedValueRule('category[niceSlice]');\n const fixedFshCode = new FshCode('rice', 'http://spice.com');\n fixedValRule.fixedValue = fixedFshCode;\n resprate.rules.push(fixedValRule); // * category[niceSlice] = http://spice.com#rice\n const resprateInstance = new Instance('myResprate');\n resprateInstance.instanceOf = 'TestResprate';\n doc.instances.set(resprateInstance.name, resprateInstance);\n const exported = exportInstance(resprateInstance);\n expect(exported.category).toEqual([\n {\n coding: [\n {\n code: 'rice',\n system: 'http://spice.com'\n }\n ]\n }\n ]);\n });\n\n it('should fix top level choice elements that are fixed on the Structure Definition', () => {\n const fixedValRule = new FixedValueRule('deceasedBoolean');\n fixedValRule.fixedValue = true;\n patient.rules.push(fixedValRule);\n const cardRule = new CardRule('deceasedBoolean');\n cardRule.min = 1;\n patient.rules.push(cardRule);\n const exported = exportInstance(patientInstance);\n expect(exported.deceasedBoolean).toBe(true);\n });\n\n it('should fix an element to a value the same as the fixed value on the Structure Definition', () => {\n const fixedValRule = new FixedValueRule('active');\n fixedValRule.fixedValue = true;\n patient.rules.push(fixedValRule);\n const instanceFixedValRule = new FixedValueRule('active');\n instanceFixedValRule.fixedValue = true;\n patientInstance.rules.push(instanceFixedValRule);\n const exported = exportInstance(patientInstance);\n expect(exported.active).toEqual(true);\n });\n\n it('should fix an element to a value the same as the fixed pattern on the Structure Definition', () => {\n const fixedValRule = new FixedValueRule('maritalStatus');\n const fixedFshCode = new FshCode('foo', 'http://foo.com');\n fixedValRule.fixedValue = fixedFshCode;\n patient.rules.push(fixedValRule);\n const instanceFixedValRule = new FixedValueRule('maritalStatus');\n const instanceFixedFshCode = new FshCode('foo', 'http://foo.com');\n instanceFixedValRule.fixedValue = instanceFixedFshCode;\n patientInstance.rules.push(instanceFixedValRule);\n const exported = exportInstance(patientInstance);\n expect(exported.maritalStatus).toEqual({\n coding: [{ code: 'foo', system: 'http://foo.com' }]\n });\n });\n\n it('should not fix an element to a value different than the fixed value on the Structure Definition', () => {\n const fixedValRule = new FixedValueRule('active');\n fixedValRule.fixedValue = true;\n patient.rules.push(fixedValRule);\n const cardRule = new CardRule('active');\n cardRule.min = 1;\n patient.rules.push(cardRule);\n const instanceFixedValRule = new FixedValueRule('active');\n instanceFixedValRule.fixedValue = false;\n patientInstance.rules.push(instanceFixedValRule);\n const exported = exportInstance(patientInstance);\n expect(exported.active).toBe(true);\n expect(loggerSpy.getLastMessage()).toMatch(\n 'Cannot fix false to this element; a different boolean is already fixed: true'\n );\n });\n\n it('should not fix an element to a value different than the pattern value on the Structure Definition', () => {\n const fixedValRule = new FixedValueRule('maritalStatus');\n const fixedFshCode = new FshCode('foo', 'http://foo.com');\n fixedValRule.fixedValue = fixedFshCode;\n patient.rules.push(fixedValRule);\n const cardRule = new CardRule('maritalStatus');\n cardRule.min = 1;\n patient.rules.push(cardRule);\n const instanceFixedValRule = new FixedValueRule('maritalStatus');\n const instanceFixedFshCode = new FshCode('bar', 'http://bar.com');\n instanceFixedValRule.fixedValue = instanceFixedFshCode;\n patientInstance.rules.push(instanceFixedValRule);\n const exported = exportInstance(patientInstance);\n expect(exported.maritalStatus.coding[0]).toEqual({\n code: 'foo',\n system: 'http://foo.com'\n });\n expect(loggerSpy.getLastMessage()).toMatch(\n 'Cannot fix http://bar.com#bar to this element; a different code is already fixed: http://foo.com#foo.'\n );\n });\n\n // Nested elements\n it('should fix a nested element that has parents defined in the instance and is fixed on the Structure Definition', () => {\n const cardRule = new CardRule('communication.preferred');\n cardRule.min = 1;\n patient.rules.push(cardRule);\n const fixedValRule = new FixedValueRule('communication.preferred');\n fixedValRule.fixedValue = true;\n patient.rules.push(fixedValRule);\n const instanceFixedValRule = new FixedValueRule('communication[0].language');\n instanceFixedValRule.fixedValue = new FshCode('foo');\n patientInstance.rules.push(instanceFixedValRule);\n const exported = exportInstance(patientInstance);\n expect(exported.communication[0]).toEqual({\n preferred: true,\n language: { coding: [{ code: 'foo' }] }\n });\n });\n\n it('should fix a nested element that has parents and children defined in the instance and is fixed on the Structure Definition', () => {\n const cardRule = new CardRule('communication.language.text');\n cardRule.min = 1;\n patient.rules.push(cardRule);\n const fixedValRule = new FixedValueRule('communication.language.text');\n fixedValRule.fixedValue = 'foo';\n patient.rules.push(fixedValRule);\n const instanceFixedValRule = new FixedValueRule(\n 'communication[0].language.coding[0].version'\n );\n instanceFixedValRule.fixedValue = 'bar';\n patientInstance.rules.push(instanceFixedValRule);\n const exported = exportInstance(patientInstance);\n expect(exported.communication[0]).toEqual({\n language: { text: 'foo', coding: [{ version: 'bar' }] }\n });\n });\n\n it('should not fix a nested element that does not have parents defined in the instance', () => {\n const fixedValRule = new FixedValueRule('communication.preferred');\n fixedValRule.fixedValue = true;\n patient.rules.push(fixedValRule);\n const exported = exportInstance(patientInstance);\n expect(exported.communication).toBeUndefined();\n });\n\n it('should fix a nested element that has parents defined in the instance and fixed on the SD to an array even if constrained', () => {\n const cardRule = new CardRule('contact');\n cardRule.min = 1;\n cardRule.max = '1';\n patient.rules.push(cardRule);\n const cardRuleRelationship = new CardRule('contact.relationship');\n cardRuleRelationship.min = 1;\n cardRuleRelationship.max = '*';\n patient.rules.push(cardRuleRelationship);\n const fixedValRule = new FixedValueRule('contact.relationship');\n fixedValRule.fixedValue = new FshCode('mother');\n patient.rules.push(fixedValRule);\n const instanceFixedValRule = new FixedValueRule('contact.gender');\n instanceFixedValRule.fixedValue = new FshCode('foo');\n patientInstance.rules.push(instanceFixedValRule);\n const exported = exportInstance(patientInstance);\n expect(exported.contact).toEqual([\n {\n gender: 'foo',\n relationship: [{ coding: [{ code: 'mother' }] }]\n }\n ]);\n });\n\n // Fixing with pattern[x]\n it('should fix a nested element that is fixed by pattern[x] from a parent on the SD', () => {\n const fixedValRule = new FixedValueRule", "num_tokens": 2048} {"category": "stack_edu-TypeScript", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/stack_edu-TypeScript/part-00-00000.npy", "text": " Order({\n products,\n paymentIntent,\n orderedBy: user?._id,\n }).save();\n\n // decrement quantity, increment sold\n const bulkOption = products.map((item: any) => {\n return {\n updateOne: {\n filter: { _id: item.product._id },\n update: { $inc: { quantity: -item.count, sold: +item.count } },\n },\n };\n });\n\n const updated = Product.bulkWrite(bulkOption, {});\n console.log('Product quantity-- and sold++', updated);\n\n console.log('New order saved', newOrder);\n\n res.json({ ok: true });\n};\n\nexport const orders = async (req: Request, res: Response) => {\n const user = await User.findOne({ email: req.user.email }).exec();\n\n const userOrders = await Order.find({ orderedBy: user?._id })\n .populate('products.product')\n .exec();\n\n res.json(userOrders);\n};\n\nexport const addToWishlist = async (req: Request, res: Response) => {\n const { productId } = req.body;\n\n const user = await User.findOneAndUpdate(\n { email: req.user.email },\n { $addToSet: { wishlist: productId } }\n ).exec();\n\n res.json({ ok: true });\n};\n\nexport const wishlist = async (req: Request, res: Response) => {\n const list = await User.findOne({ email: req.user.email })\n .select('wishlist')\n .populate('wishlist')\n .exec();\n\n res.json(list);\n};\n\nexport const reomveFromWishlist = async (req: Request, res: Response) => {\n const { productId } = req.params;\n const user = await User.findOneAndUpdate(\n { email: req.user.email },\n { $pull: { wishlist: productId } }\n ).exec();\n\n res.json({ ok: true });\n};\n\nexport const createCashOrder = async (req: Request, res: Response) => {\n const { COD, couponApplied } = req.body;\n\n if (!COD) return res.status(400).send('Create cash order failed');\n\n // if cod is true, create order with status of cash on delivery\n\n const user = await User.findOne({ email: req.user.email }).exec();\n\n const cart = await Cart.findOne({ orderedBy: user?._id }).exec();\n const { products, totalAfterDiscount, cartTotal } = cart!;\n\n let finalAmount = 0;\n\n if (couponApplied && totalAfterDiscount) {\n finalAmount = totalAfterDiscount * 100;\n } else {\n finalAmount = cartTotal * 100;\n }\n\n const newOrder = await new Order({\n products,\n paymentIntent: {\n id: uniqueid(),\n amount: finalAmount,\n currency: 'usd',\n status: 'Cash On Delivery',\n created: Date.now(),\n payment_method_types: ['Cash'],\n },\n orderedBy: user?._id,\n orderStatus: 'Cash On Delivery',\n }).save();\n\n // decrement quantity, increment sold\n const bulkOption = products.map((item: any) => {\n return {\n updateOne: {\n filter: { _id: item.product._id },\n update: { $inc: { quantity: -item.count, sold: +item.count } },\n },\n };\n });\n\n const updated = Product.bulkWrite(bulkOption, {});\n console.log('Product quantity-- and sold++', updated);\n\n console.log('New order saved', newOrder);\n\n res.json({ ok: true });\n};<|endoftext|>import Config from './Config';\n\ndescribe('Test Configuration Class', () => {\n it('It populates with defaults when no config is sent', () => {\n Config.load();\n let actualConfig = Config.values;\n expect(actualConfig['header']['top']['style']['backgroundColor']).toBe('#333333');\n });\n it('It populates with defaults when no config is sent', () => {\n let newvalues = { header: { top: { style: { backgroundColor: 'yellow' } } } };\n Config.load(newvalues);\n let actualConfig = Config.values;\n expect(actualConfig['header']['top']['style']['backgroundColor']).toBe('yellow');\n expect(actualConfig['header']['middle']['style']['backgroundColor']).toBe('chocolate');\n });\n});<|endoftext|>// TODO: ADD HONOR PLEDGE HERE\n/** \n * Author: Adam Alston \n * ONYEN: aalston9\n * UNC Honor Pledge: I certify that no unauthorized assistance has been received \n * or given in the completion of this work. I certify that I understand and \n * could now rewrite on my own, without assistance from course staff, \n * the problem set code I am submitting.\n */\n\n// TODO: Import the classes you need to work with your Emoji\nimport { Group, Color, Text, Circle, Rectangle, Path, Ellipse, Transform } from \"introcs/graphics\";\n\nexport class FaceShape {\n\n /**\n * The tone of the FaceShape class is a property so that you can\n * easily change the tone of an Emoji (i.e. red FaceShape tone is angry,\n * green sick, etc);\n */\n tone: Color;\n\n constructor(tone: Color) {\n this.tone = tone;\n }\n\n shapes(): Group {\n let shapes: Group = new Group();\n // TODO #1: Remove the four lines of code below adding the text \"Emoji\"\n // to the shapes group.\n // TODO #2: Import, construct, and add one or more Shape objects to the shapes\n // group to design your FaceShape.\n let r: Rectangle = new Rectangle(80, 80);\n shapes.add(r);\n // TODO #3: Ensure at least one shape is filled with the\n // FaceShape's tone Color property. (Requirement A2!)\n r.fill = this.tone;\n return shapes;\n }\n}\n\n// TODO: Eye class\nexport class Eye {\n irisColor: Color;\n shape: Circle;\n\n constructor(irisColor: Color) {\n this.irisColor = irisColor;\n }\n\n shapes(): Group {\n let shapes: Group = new Group;\n let c: Circle = new Circle(5);\n c.fill = this.irisColor;\n shapes.add(c);\n return shapes;\n }\n}\n\n// TODO: Mouth class\nexport class Mouth {\n shapes(): Group {\n let shapes: Group = new Group();\n let h: Rectangle = new Rectangle(60, 20);\n shapes.add(h);\n return shapes;\n }\n}\n\nexport class Nose {\n color: Color;\n\n constructor(color: Color) {\n this.color = color;\n }\n\n shapes(): Group {\n let shapes: Group = new Group;\n let n: Circle = new Circle(3);\n n.fill = this.color;\n shapes.add(n);\n return shapes;\n }\n}\n\nexport class Unibrow {\n shapes(): Group {\n let shapes: Group = new Group();\n let n: Path = new Path(-35, -35);\n n.quadraticCurveTo(-5, -20, 35, -35);\n shapes.add(n);\n return shapes;\n }\n}\n\nexport class Teeth {\n shapes(): Group {\n let shapes: Group = new Group();\n\n let t: Path = new Path(-30, 20);\n let u: Path = new Path(20, 10);\n let v: Path = new Path(10, 10);\n let w: Path = new Path(0, 10);\n let x: Path = new Path(-10, 10);\n let y: Path = new Path(-20, 10);\n let z: Path = new Path(-30, 10);\n\n t.lineTo(30, 20);\n u.lineTo(20, 30);\n v.lineTo(10, 30);\n w.lineTo(0, 30);\n x.lineTo(-10, 30);\n y.lineTo(-20, 30);\n z.lineTo(-30, 30);\n\n shapes.add(t);\n shapes.add(u);\n shapes.add(v);\n shapes.add(w);\n shapes.add(x);\n shapes.add(y);\n shapes.add(z);\n\n return shapes;\n }\n}\n\nexport class Hat {\n color: Color;\n\n constructor(color: Color) {\n this.color = color;\n }\n\n shapes(): Group {\n let shapes: Group = new Group;\n let cover: Rectangle = new Rectangle(90, 20);\n let bill: Rectangle = new Rectangle(110, 5);\n cover.fill = this.color;\n bill.fill = this.color;\n bill.transform = bill.transform.translate(-20, 15);\n shapes.add(cover);\n shapes.add(bill);\n return shapes;\n }\n}\n\nexport class Hair {\n color: Color;\n\n constructor(color: Color) {\n this.color = color;\n }\n\n shapes(): Group {\n let shapes: Group = new Group;\n let leftHair: Rectangle = new Rectangle(5, 15);\n let rightHair: Rectangle = new Rectangle(5, 15);\n leftHair.fill = this.color;\n rightHair.fill = this.color;\n shapes.add(leftHair);\n shapes.add(rightHair);\n return shapes;\n }\n}\n\n// TODO: Emoji class\nexport class Emoji {\n faceShape: FaceShape;\n mouth: Mouth;\n nose: Nose;\n leftEye: Eye;\n rightEye: Eye;\n", "num_tokens": 2048} {"category": "stack_edu-TypeScript", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/stack_edu-TypeScript/part-00-00000.npy", "text": " x.length;\n return y;\n}\n\n//Space Remove\nfunction spaceRemove(x:String): number {\n let y : number = 0;\n y = x.replace(/\\s+/,\"\").length;\n return y;\n}<|endoftext|>import { RawMap } from '@/store/types';\nimport { testMapViewState3 } from '../../../../resources/testMapViewState3';\nimport Map from '@/Map/Map.ts';\nimport Spot from '@/Spot/Spot.ts';\nimport { createMapInstance, createSpotInstance, initMap } from '@/store/modules/MapViewModule/MapViewState';\n\ndescribe('初期化に利用する関数のテスト', () => {\n it('createMapInstanceがMap型を返す', () => {\n const testRawMap = testMapViewState3.maps;\n const testRawMapData = testRawMap[1];\n const testMapInstance = createMapInstance(testRawMapData);\n const expectedMapProperties = {\n id: testRawMapData.id,\n name: testRawMapData.name,\n bounds: testRawMapData.bounds,\n floorName: testRawMapData.floorName,\n };\n const actualMapProperties = {\n id: (testMapInstance as any).id,\n name: (testMapInstance as any).name,\n bounds: (testMapInstance as any).bounds,\n floorName: (testMapInstance as any).floorName,\n };\n expect(actualMapProperties).toStrictEqual(expectedMapProperties);\n });\n it('createSpotInstanceがSpot型を返す', () => {\n const testRawMap = testMapViewState3.maps;\n const testRawMapData = testRawMap[0];\n const testSpotInstance = createSpotInstance(testRawMapData.spots[0]);\n const expectedSpotProperties = {\n id: testRawMapData.spots[0].id,\n name: testRawMapData.spots[0].name,\n coordinate: testRawMapData.spots[0].coordinate,\n };\n const actualSpotProperties = {\n id: (testSpotInstance as any).id,\n name: (testSpotInstance as any).name,\n coordinate: (testSpotInstance as any).coordinate,\n };\n expect(actualSpotProperties).toStrictEqual(expectedSpotProperties);\n });\n});\n\ndescribe('地図データ初期化のテスト', () => {\n /**\n * テストデータの構造は以下の通り。\n * rootMap(id:0) -> rootSpot(id:0) -> detailMap(id:1) -> detailSpot(id:0)\n * Mapインスタンス、Spotインスタンスそれぞれについてプロパティを検証する。\n */\n const testMapData: RawMap[] = testMapViewState3.maps;\n // rootMap\n const actualRootMap: Map = initMap(testMapData);\n const expectedRootMapData = testMapData[0];\n // rootSpot\n const actualRootSpot = (actualRootMap as any).spots[0];\n const expectedRootSpotData = expectedRootMapData.spots[0];\n // detailMap\n const actualDetailMap = (actualRootMap as any).spots[0].detailMaps[0];\n const expectedDetailMapData = testMapData[1];\n // detailSpot\n const actualDetailSpot = actualDetailMap.spots[0];\n const expectedDetailSpotData = expectedDetailMapData.spots[0];\n\n it('rootMapのプロパティ検証', () => {\n const actualRootMapProperties = {\n id: (actualRootMap as any).id,\n name: (actualRootMap as any).name,\n bounds: (actualRootMap as any).bounds,\n floorName: (actualRootMap as any).floorName,\n parentSpot: (actualRootMap as any).parentSpot,\n spotsNum: (actualRootMap as any).spots.length,\n };\n const expectedRootMapProperties = {\n id: expectedRootMapData.id,\n name: expectedRootMapData.name,\n bounds: expectedRootMapData.bounds,\n floorName: expectedRootMapData.floorName,\n parentSpot: undefined,\n spotsNum: 1,\n };\n expect(actualRootMapProperties).toStrictEqual(expectedRootMapProperties);\n });\n\n it('rootMapが持つSpotのプロパティ検証', () => {\n const actualRootSpotProperties = {\n id: actualRootSpot.id,\n name: actualRootSpot.name,\n coordinate: actualRootSpot.coordinate,\n floorName: actualRootSpot.floorName,\n parentMapName: actualRootSpot.parentMap.name,\n detailMapNum: actualRootSpot.detailMaps.length,\n };\n const expectedRootSpotDataProperties = {\n id: expectedRootSpotData.id,\n name: expectedRootSpotData.name,\n coordinate: expectedRootSpotData.coordinate,\n floorName: undefined,\n parentMapName: 'Kyudai',\n detailMapNum: 1,\n };\n expect(actualRootSpotProperties).toStrictEqual(expectedRootSpotDataProperties);\n });\n\n it('detailMapのプロパティ検証', () => {\n const actualDetailMapProperties = {\n id: actualDetailMap.id,\n name: actualDetailMap.name,\n bounds: actualDetailMap.bounds,\n floorName: actualDetailMap.floorName,\n parentSpotName: actualDetailMap.parentSpot.name,\n spotsNum: actualDetailMap.spots.length,\n };\n const expectedDetailMapProperties = {\n id: expectedDetailMapData.id,\n name: expectedDetailMapData.name,\n bounds: expectedDetailMapData.bounds,\n floorName: expectedDetailMapData.floorName,\n parentSpotName: 'SougouGakusyuPlaza',\n spotsNum: 1,\n };\n expect(actualDetailMapProperties).toStrictEqual(expectedDetailMapProperties);\n });\n\n it('detailMapが持つSpotのプロパティ検証', () => {\n const actualDetailSpotProperties = {\n id: actualDetailSpot.id,\n name: actualDetailSpot.name,\n coordinate: actualDetailSpot.coordinate,\n floorName: actualDetailSpot.floorName,\n parentMapName: actualDetailSpot.parentMap.name,\n detailMapNum: actualDetailSpot.detailMaps.length,\n };\n const expectedDetailSpotDataProperties = {\n id: expectedDetailSpotData.id,\n name: expectedDetailSpotData.name,\n coordinate: expectedDetailSpotData.coordinate,\n floorName: '1F',\n parentMapName: 'SougouGakusyuPlaza_1F',\n detailMapNum: 0,\n };\n expect(actualDetailSpotProperties).toStrictEqual(expectedDetailSpotDataProperties);\n });\n});<|endoftext|>import EventBus, { CanvasEvent } from '../eventBus';\nimport { CollisionRect } from './Collision';\n\nexport interface Point {\n x: number;\n y: number;\n}\n\nexport default abstract class ClickAble {\n\n abstract get rect(): CollisionRect;\n\n public addEventListener(type: string, handle: (evt: CanvasEvent) => void) {\n EventBus.addEventListener(type, (evt: CanvasEvent) => {\n if (!this.shouldDispatch(evt)) {\n return;\n }\n handle(evt);\n });\n }\n\n public removeEventListener(type: string, handle: (evt: CanvasEvent) => void) {\n EventBus.removeEventListener(type, handle);\n }\n\n public pointInRect(point: Point) {\n const { rect: { x, y, width, height } } = this;\n return point.x >= x && point.x <= x + width && point.y >= y && point.y <= y + height;\n }\n\n public shouldDispatch(e: CanvasEvent) {\n const { cx, cy } = e;\n return this.pointInRect({\n x: cx,\n y: cy\n });\n }\n\n}<|endoftext|>import type { Adapter } from 'oidc-provider';\nimport type { AdapterFactory } from '../../../../src/identity/storage/AdapterFactory';\nimport {\n PassthroughAdapter,\n PassthroughAdapterFactory,\n} from '../../../../src/identity/storage/PassthroughAdapterFactory';\n\ndescribe('A PassthroughAdapterFactory', (): void => {\n let sourceFactory: jest.Mocked;\n let factory: PassthroughAdapterFactory;\n\n beforeEach(async(): Promise => {\n sourceFactory = {\n createStorageAdapter: jest.fn(),\n };\n\n factory = new PassthroughAdapterFactory(sourceFactory);\n });\n\n it('calls the source createStorageAdapter function.', async(): Promise => {\n expect(factory.createStorageAdapter('Client')).toBeUndefined();\n expect(sourceFactory.createStorageAdapter).toHaveBeenCalledTimes(1);\n expect(sourceFactory.createStorageAdapter).toHaveBeenLastCalledWith('Client');\n });\n\n describe('A PassthroughAdapter', (): void => {\n let sourceAdapter: jest.Mocked;\n let adapter: PassthroughAdapter;\n\n beforeEach(async(): Promise => {\n sourceAdapter = {\n upsert: jest.fn(),\n find: jest.fn(),\n findByUserCode: jest.fn(),\n findByUid: jest.fn(),\n consume: jest.fn(),\n destroy: jest.fn(),\n revokeByGrantId: jest.fn(),\n };\n\n adapter = new PassthroughAdapter('Name', sourceAdapter);\n });\n\n it('passes the call to the source for upsert.', async(): Promise => {\n await expect(adapter.upsert('id', 'payload' as any, 5)).resolves.toBeUndefined();\n expect(sourceAdapter.upsert).toHaveBeenCalledTimes(1);\n expect(sourceAdapter.upsert).toHaveBeenLastCalledWith('id', 'payload' as any, 5);\n });\n\n it('passes the call to the source for find.', async(): Promise => {\n await expect(adapter.find('id')).", "num_tokens": 2048} {"category": "stack_edu-TypeScript", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/stack_edu-TypeScript/part-00-00000.npy", "text": "opts };\n\tconst delim = settings.format === cssFormat.css4 ? CSS4_DELIM : CSS2_DELIM;\n\n\tlet unit = '';\n\tlet digits = Math.min(Math.max(settings.decimals, 0), CSS_MAX_DECIMALS);\n\n\tprofile.compress(v, rgb64);\n\n\tif (settings.percent) {\n\t\tmultiplyAssignScalar(v, UNIT_TO_PCT);\n\n\t\tunit = CSS_PCT;\n\n\t\tif (settings.precision === cssPrecision.uint8 && digits > 0) {\n\t\t\talign(v, v, UINT8_TO_PCT, 0.5 - 1e-10);\n\n\t\t\tdigits = 1;\n\t\t}\n\n\t\tclampScalar(v, v, 0.0, UNIT_TO_PCT);\n\t}\n\telse {\n\t\tmultiplyAssignScalar(v, UNIT_TO_UINT8);\n\n\t\tif (settings.precision === cssPrecision.uint8) {\n\t\t\tround(v, v);\n\n\t\t\tdigits = 0;\n\t\t}\n\n\t\tclampScalar(v, v, 0.0, UNIT_TO_UINT8);\n\t}\n\n\treturn `rgb(${\n\t\ttoFixed(v.x, digits) }${ unit }${ delim }${\n\t\ttoFixed(v.y, digits) }${ unit }${ delim }${\n\t\ttoFixed(v.z, digits) }${ unit })`;\n}<|endoftext|>import { expensiveOperation } from \"./_utils\";\nconst cache = {};\n\n// #region 7... 🧛 Function Memoization\n\n// make a salad\n// -> EXPENSIVE to do\nconst makeSalad = async (food1, food2) => {\n console.time(\"👉 salad took \");\n\n await expensiveOperation();\n\n console.timeEnd(\"👉 salad took \");\n console.log(food1 + \" with \" + food2 + \" ...yummy yummy\");\n};\n\n// memoize makeSalad\nconst memoMakeSalad = async (food1, food2) => {\n console.time(\"👉 salad took \");\n\n if (cache[food1 + food2]) {\n // short circuit\n console.timeEnd(\"👉 salad took \");\n console.log(food1 + \" with \" + food2 + \" ...yummy yummy\");\n } else {\n // execute the actual operation\n await expensiveOperation();\n\n console.timeEnd(\"👉 salad took \");\n console.log(food1 + \" with \" + food2 + \" ...yummy yummy\");\n\n // store the result in cache\n cache[food1 + food2] = food1 + \" with \" + food2 + \" ...yummy yummy\";\n }\n};\n\n// #endregion\n\n// #region 8... 🦄 Selector Memoization_\n\n// composed selectors ('calculated data')\n// -> memoized\n// const getFood = createSelector(\n// getFruit,\n// getMeals,\n// (fruits, meals) => ({ ...fruits, ...meals })\n// );\n\n// #endregion\n\n// #region blerg\nexport { makeSalad, memoMakeSalad };\n// #endregion<|endoftext|>/** @module base/plugin */\n\nimport Events from '../events';\nimport Core from '../../components/core';\nimport Video from '../video';\n\n/**\n * UI를 가지지 않는 플러그인의 베이스 클래스\n *\n * @extends Events\n */\nexport default abstract class Plugin extends Events {\n /**\n * 비디오 플레이어 코어\n */\n private _core: Core;\n\n /**\n * 플러그인의 활성화 여부\n */\n private _enabled: boolean;\n\n /**\n * 모든 플러그인은 내부에서 core를 갖는다.\n */\n get core(): Core {\n return this._core;\n }\n\n /**\n * core를 통해서 video에 접근할 수 있다.\n */\n get video(): Video {\n return this._core.video;\n }\n\n /**\n * 비디오 플레이어 활성화 여부\n */\n get enabled(): boolean {\n return this._enabled;\n }\n\n /**\n * core를 설정하고 이벤트 리스너를 등록한다.\n */\n constructor(core: Core) {\n super();\n this._core = core;\n this._enabled = true;\n this.addEventListeners();\n }\n\n /**\n * Core에 이벤트 리스너를 등록한다.\n * NOTE: disable/enable을 제대로 작동시키기 위해서 반드시 this.listenTo 메소드를 이용해 이벤트 리스너를 등록해야한다.\n */\n protected abstract addEventListeners(): void;\n\n /**\n * 플러그인을 작동시킨다.\n * 이 함수는 disable 이후에 다시 플러그인을 작동시킬 때만 사용해야 한다.\n */\n public enable(): void {\n if (this._enabled) return;\n this.addEventListeners();\n this._enabled = true;\n }\n\n /**\n * 플러그인을 작동하지 않도록 한다.\n */\n public disable(): void {\n this.stopListening();\n this._enabled = false;\n }\n\n /**\n * 플러그인을 파괴하여 등록된 이벤트 리스너를 전부 제거한다.\n */\n public destroy(): Plugin {\n this.off();\n this.stopListening();\n return this;\n }\n}<|endoftext|>import Web3 from \"web3\";\n\nlet web3: Web3 | null = null;\nlet isEnabling = false;\nlet done = false;\n\nconst waitUntilEnabled = () => {\n const promize = async (res: any, rej: any) => {\n await waitFor(1000);\n if (!isEnabling && done) {\n return res(\"\");\n }\n if (isEnabling && !done) {\n promize(res, rej);\n // check again after few seconds\n }\n };\n\n return new Promise(promize);\n};\n\nexport const getWeb3 = async () => {\n console.log(\"called\");\n //@ts-ignore\n if (!window.ethereum) {\n window.alert(\"Please install MetaMask first.\");\n return;\n }\n\n if (!web3) {\n try {\n // Request account access if needed\n\n if (isEnabling) {\n await waitUntilEnabled();\n }\n\n if (!isEnabling && !done) {\n console.log(\"enabling\");\n isEnabling = true;\n //@ts-ignore\n\n await window.ethereum.enable();\n }\n\n // We don't know window.web3 version, so we use our own instance of Web3\n // with the injected provider given by MetaMask\n //@ts-ignore\n web3 = new Web3(window.ethereum);\n } catch (error) {\n window.alert(\"You need to allow MetaMask.\");\n return;\n }\n }\n return web3;\n};\n\nexport const waitFor = (time: number) => {\n return new Promise((res) => {\n setTimeout(res, time);\n });\n};\nexport function uuidv4() {\n return \"xxxxxxxx-xxxx-4xxx-yxxx-xxxxxxxxxxxx\".replace(\n /[xy]/g,\n function (c) {\n var r = (Math.random() * 16) | 0,\n v = c === \"x\" ? r : (r & 0x3) | 0x8;\n return v.toString(16);\n }\n );\n}\n\nexport const getQueryParam = (name: string) => {\n if (typeof window === \"undefined\") {\n return \"\";\n }\n const search = window.location.search;\n const queryString = decodeURIComponent(search.slice(1, search.length));\n const queryObj: any = {};\n queryString.split(\"&\").forEach((item) => {\n const items = item.split(\"=\");\n queryObj[items[0]] = items[1];\n });\n console.log(queryObj);\n return queryObj[name];\n};\n\nexport const tuplify = (...args: T) => {\n return args;\n};\n\nfunction roundRect(\n ctx: CanvasRenderingContext2D,\n x: number,\n y: number,\n width: number,\n height: number,\n radius: any,\n color1: string,\n color2: string\n) {\n if (typeof radius === \"undefined\") {\n radius = 5;\n }\n\n radius = { tl: radius, tr: radius, br: radius, bl: radius };\n\n ctx.beginPath();\n ctx.moveTo(x + radius.tl, y);\n ctx.lineTo(x + width - radius.tr, y);\n ctx.quadraticCurveTo(x + width, y, x + width, y + radius.tr);\n ctx.lineTo(x + width, y + height - radius.br);\n ctx.quadraticCurveTo(\n x + width,\n y + height,\n x + width - radius.br,\n y + height\n );\n ctx.lineTo(x + radius.bl, y + height);\n ctx.quadraticCurveTo(x, y + height, x, y + height - radius.bl);\n ctx.lineTo(x, y + radius.tl);\n ctx.quadraticCurveTo(x, y, x + radius.tl, y);\n ctx.closePath();\n const grd = ctx.createLinearGradient(0, 0, 80, 0);\n grd.addColorStop(0, color1);\n grd.addColorStop(1, color2);\n ctx.fillStyle = grd;\n\n ctx.fill();\n}\n\nexport const generateGradientImage = (color1: string, color2: string) => {\n if (typeof window === \"undefined\") {\n console.error(\"Only works in Client\");\n return \"\";\n }\n const canvas = document.createElement(\"canvas\");\n canvas.style.display = \"none\";\n canvas.width = 80;\n canvas.height = 48", "num_tokens": 2048} {"category": "stack_edu-TypeScript", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/stack_edu-TypeScript/part-00-00000.npy", "text": ".Map>();\n private _browserLocationPromise: Promise<{ latitude: number, longitude: number }>;\n\n constructor(private loader: LazyGoogleMapsApiLoader) {\n // check browser location\n this.getBrowserLocation()\n .then(noop);\n // preload map immediately\n this.loader\n .load()\n .then(noop);\n }\n\n onApiLoad(): Promise {\n return this\n .loader\n .load();\n }\n\n createMarker(options?: google.maps.MarkerOptions): Promise {\n return this\n .loader\n .load()\n .then(() => new google.maps.Marker(options));\n }\n\n createDirections(options?: google.maps.DirectionsRendererOptions): Promise {\n return this.loader\n .load()\n .then(() => {\n return new google.maps.DirectionsRenderer(options);\n });\n }\n\n getDirections(origin: LongLat,\n destination: LongLat): Promise {\n return this\n .loader\n .load()\n .then(() => {\n let svc = new google.maps.DirectionsService();\n return new Promise((resolve, reject) => {\n let request = {\n origin: new google.maps.LatLng(\n (origin).lat || (origin).latitude,\n (origin).lng || (origin).longitude\n ),\n destination: new google.maps.LatLng(\n (destination).lat || (destination).latitude,\n (destination).lng || (destination).longitude\n ),\n travelMode: google.maps.TravelMode.DRIVING\n };\n svc.route(request, (result: google.maps.DirectionsResult, status: google.maps.DirectionsStatus) => {\n if (status === google.maps.DirectionsStatus.OK) {\n resolve(result);\n } else {\n console.error({ message: 'fail to get directions', status, result });\n reject({ status, result });\n }\n });\n });\n });\n }\n\n createMap(el: HTMLElement, options?: google.maps.MapOptions): Promise {\n return this.loader\n .load()\n .then(() => {\n return this.getBrowserLocation()\n .then((coords: Coordinates) => {\n options = Object.assign({}, options, DEFAULT_MAP_OPTIONS, {\n center: new google.maps.LatLng(coords.latitude, coords.longitude),\n zoom: 8\n });\n return new google.maps.Map(el, options);\n });\n\n });\n }\n\n getMap(name: string): Promise {\n return this.loader\n .load()\n .then(() => this._maps.get(name));\n }\n\n addMap(name: string, map: google.maps.Map): void {\n this._maps.set(name, map);\n }\n\n removeMap(name: string): boolean {\n return this._maps.delete(name);\n }\n\n createAutocomplete(input: ElementRef,\n options: google.maps.places.AutocompleteOptions): Promise {\n return this.loader.load().then(() => {\n return new google.maps.places.Autocomplete(input.nativeElement, options);\n });\n }\n\n getBrowserLocation(): Promise {\n if (this._browserLocationPromise) {\n return (this._browserLocationPromise);\n }\n\n return this._browserLocationPromise = new Promise<{ latitude: number, longitude: number }>((resolve) => {\n if (location.protocol === 'https' && navigator.geolocation) {\n navigator.geolocation.getCurrentPosition(\n (success: { coords: Coordinates, timestamp: number }) => {\n resolve(success.coords);\n }, (error) => {\n console.error(error);\n if (error.code !== PositionError.PERMISSION_DENIED) {\n console.warn(`Permission is accepted but error encounter with message: ${error.message}`);\n }\n // if user didn't answer return default\n resolve(DefaultCoords);\n });\n } else {\n // if browser do not support location API return default (NYC)\n resolve(DefaultCoords);\n }\n });\n\n }\n\n calculateMapBounds(markers: Array = []) {\n return this.loader.load().then(() => {\n return new Promise((resolve, reject) => {\n\n\n if (markers && markers.length > 1) {\n let latLng = new google.maps.LatLng(markers[0].latitude, markers[0].longitude);\n let bounds: google.maps.LatLngBounds = new google.maps.LatLngBounds(latLng);\n for (let i = 1; i < markers.length; i++) {\n let marker = markers[i];\n bounds.extend(new google.maps.LatLng(marker.latitude, marker.longitude));\n }\n resolve(bounds);\n return;\n }\n reject({ error: 'There is no markers in markers array', centerTo: DefaultCoords });\n return;\n\n });\n });\n }\n}<|endoftext|>import { TileType } from '../../game/models/tile';\nimport Node from './node';\nimport Tokenizer from '../tokenizer';\n\nexport default class Type extends Node {\n private tileType: TileType;\n\n constructor(tokenizer: Tokenizer) {\n super();\n\n const type = tokenizer.pop();\n switch (type) {\n case 'SOLID':\n this.tileType = TileType.SOLID;\n break;\n case 'EMPTY':\n this.tileType = TileType.EMPTY;\n break;\n case 'SPIKE':\n this.tileType = TileType.SPIKE;\n break;\n default:\n throw new Error(`Unknown tile type \"${type}\".`);\n }\n }\n\n public validate(): void {\n // Do nothing.\n }\n\n public evaluate(): TileType {\n return this.tileType;\n }\n}<|endoftext|>/**\n * 判断value是否是array-like的长度\n * 参数\n * value\n * 返回\n * boolean 返回true是false不是\n */\nconst MAX_SAFE_INTEGER: number = 9007199254740991;\n function isLength(value: any): boolean {\n return typeof value == 'number' &&\n value > -1 && value % 1 == 0 && value <= MAX_SAFE_INTEGER\n } \n\n export default isLength;<|endoftext|>/**\n * @file\n * dumpObject.ts\n *\n * @author Josh Parkinson \n */\n\nimport * as util from 'util';\n\n/**\n * Dumps an object in it's entirety to a string.\n *\n * @param {object} object\n * The object to dump\n * @param {boolean} showHidden\n * Should hidden elements be shown\n *\n * @returns {string}\n * The dumped object\n */\nexport default function dumpObject(object: object, showHidden: boolean = false): string {\n return util.inspect(object, {\n showHidden,\n depth: null,\n colors: true\n });\n}<|endoftext|>import { StreamMessage } from '@streamr/protocol'\nimport { EthereumAddress, Logger, wait } from '@streamr/utils'\nimport sample from 'lodash/sample'\nimport { Gap, OrderedMessageChain } from './OrderedMessageChain'\n\nconst logger = new Logger(module)\n\nexport type GapFillStrategy = 'light' | 'full'\n\ninterface GapFillerOptions {\n chain: OrderedMessageChain\n resend: (gap: Gap, storageNodeAddress: EthereumAddress, abortSignal: AbortSignal) => AsyncGenerator\n getStorageNodeAddresses: () => Promise\n strategy: GapFillStrategy\n initialWaitTime: number\n retryWaitTime: number\n maxRequestsPerGap: number\n abortSignal: AbortSignal\n}\n\nconst runAbortableTask = async (\n run: () => Promise\n): Promise => {\n try {\n await run()\n } catch (e) {\n if (e.code !== 'AbortError') {\n throw e\n }\n }\n}\n\nexport class GapFiller {\n\n private currentTask: { gap: Gap, abortController: AbortController } | undefined = undefined\n private readonly chain: OrderedMessageChain\n private readonly resend: (gap: Gap, storageNodeAddress: EthereumAddress, abortSignal: AbortSignal) => AsyncGenerator\n private readonly getStorageNodeAddresses: () => Promise\n private readonly strategy: GapFillStrategy\n private readonly initialWaitTime: number\n private readonly retryWaitTime: number\n private readonly maxRequestsPerGap: number\n\n constructor(opts: GapFillerOptions) {\n this.chain = opts.chain\n this.resend = opts.resend\n this.getStorageNodeAddresses = opts.getStorageNodeAddresses\n this.strategy = opts.strategy\n this.initialWaitTime = opts.initialWaitTime\n this.retryWaitTime = opts.retryWaitTime\n this.maxRequestsPerGap = opts.maxRequestsPerGap\n opts.abortSignal.addEventListener('abort', () => {\n this.currentTask?.abortController.abort()\n })\n }\n\n start(): void {\n this.chain.on('gapFound', (gap: Gap) => this.onGapFound(gap))\n this.chain.on('gapResolved', () => this.onGapResolved())\n }\n\n private async onGapFound(gap: Gap) {\n const abortController = new AbortController()\n this.currentTask = {\n gap,\n abortController\n }\n try {\n await runAbortableTask(async () => {\n await wait(this.initialWaitTime, abortController.signal)\n if (this.maxRequestsPerGap > 0) {\n await this.fetchFromStorageNode(gap, abortController.signal)\n }\n /*\n * The \"", "num_tokens": 2048}
    \n\t\t\t
    \n\t\t\t\t

    History Chains

    \n\t\t\t\t\n\t\t\t\t
    \n\t\t\t\tLogged in as \n\t\t\t\t
    \n\t\t\t\t\t\n\t\t\t\t
    \n\t\t\t
    \n\n\t\t\t
    \n\n\t\t\t\n\n\n\n\t\t\t
    \n\t\t\t\t
    \n\t\t\t\t\t

    Published Chains

    \n handleProfileChains($userData['userName']); ?>\n\t\t\t\t
    \n\t\t\t
    \n\n\t\t\t
    \n\t\t\t\n\t\t