text
stringlengths 14
5.22M
| meta
dict | __index_level_0__
int64 0
9.97k
| input_ids
listlengths 128
128
| attention_mask
listlengths 128
128
| labels
listlengths 128
128
|
---|---|---|---|---|---|
Knowing how to design a medical device and how to manage its supply chain are two entirely different areas of expertise. With the cost of quality components, the number of vendors and the complexities involved with handling supply-side challenges, it pays to seek the assistance of someone with experience in supply chain management. Our goal at Keystone Solutions is to provide you with all of the tools that you need to develop and manage your device. Not just a medical device contract manufacturer, we are a full-service company offering packaging, supply chain and distribution services. In this post, we're going to look at how we can help you with your device's supply chain management.
Calling upon our experience in the industry, we can help you source the best components available, from a diverse range of suppliers.
We are constantly looking for ways to drive costs down. From implementing more efficient processes to centralizing shipping, we can work with you to improve your bottom line.
With the rigorous standards associated with medical device contract manufacturing, it's essential to work with a partner that will help you meet those standards. Keystone's experience and expertise will help to guide your product towards continuous, reliable compliancy.
With our warehousing, distribution and fulfillment services, we will constantly monitor your device's availability to ensure that your supply meets the global demand.
At Keystone Solutions Group, we pride ourselves on our ability to handle all of the complexities involved with medical device manufacturing. Staffed by a dedicated team with expertise in a wide range of applications, we are able to provide an unparalleled number of turnkey solutions. If you've been looking for a trusted partner to help manage the logistics of your medical device's distribution, contact us today to learn more about how we can help.
|
{
"redpajama_set_name": "RedPajamaC4"
}
| 8,556 |
[
128000,
96621,
1268,
311,
2955,
264,
6593,
3756,
323,
1268,
311,
10299,
1202,
8312,
8957,
527,
1403,
11622,
2204,
5789,
315,
19248,
13,
3161,
279,
2853,
315,
4367,
6956,
11,
279,
1396,
315,
29629,
323,
279,
84140,
6532,
449,
11850,
8312,
25034,
11774,
11,
433,
21935,
311,
6056,
279,
13291,
315,
4423,
449,
3217,
304,
8312,
8957,
6373,
13,
5751,
5915,
520,
71673,
23508,
374,
311,
3493,
499,
449,
682,
315,
279,
7526,
430,
499,
1205,
311,
2274,
323,
10299,
701,
3756,
13,
2876,
1120,
264,
6593,
3756,
5226,
14290,
11,
584,
527,
264,
2539,
24358,
2883,
10209,
24066,
11,
8312,
8957,
323,
8141,
3600,
13,
763,
420,
1772,
11,
584,
2351,
2133,
311,
1427,
520,
1268,
584,
649,
1520,
499,
449,
701,
3756,
596,
8312,
8957,
6373
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
96621,
1268,
311,
2955,
264,
6593,
3756,
323,
1268,
311,
10299,
1202,
8312,
8957,
527,
1403,
11622,
2204,
5789,
315,
19248,
13,
3161,
279,
2853,
315,
4367,
6956,
11,
279,
1396,
315,
29629,
323,
279,
84140,
6532,
449,
11850,
8312,
25034,
11774,
11,
433,
21935,
311,
6056,
279,
13291,
315,
4423,
449,
3217,
304,
8312,
8957,
6373,
13,
5751,
5915,
520,
71673,
23508,
374,
311,
3493,
499,
449,
682,
315,
279,
7526,
430,
499,
1205,
311,
2274,
323,
10299,
701,
3756,
13,
2876,
1120,
264,
6593,
3756,
5226,
14290,
11,
584,
527,
264,
2539,
24358,
2883,
10209,
24066,
11,
8312,
8957,
323,
8141,
3600,
13,
763,
420,
1772,
11,
584,
2351,
2133,
311,
1427,
520,
1268,
584,
649,
1520,
499,
449,
701,
3756,
596,
8312,
8957,
6373,
-100
] |
Copyright © 2004 - 2013 David V Connell.
Theoretical Considerations.
Curvilinear motion may be described as the curved path of a moving particle which is not part of or attached to another body, often in a circular path. The latter is of interest here.
The possible effects of rotation on the mass of a particle at a radius r from the center of rotation are considered to be from three sources :-
( i ) the tangential speed of the particle,
( ii ) the centripetal force causing the path of the particle to be circular, and
(iii ) the centrifugal force caused by the rotation.
We now consider a charged particle of mass M moving at speed V in a particular direction, in a chosen FoR, free from any significant effects of gravity. A constant external force is then applied to the particle by a uniform magnetic or electric field perpendicular to the direction of motion, causing it to take a circular path in a plane perpendicular to the magnetic or electric field.
In experiments of this type, a magnetic field H causes a curvature of the path of electrons to a radius r, where the transverse force generated by the motion in the magnetic field is equal and opposite to the centrifugal force, according to the relation HeV = MV²/r, where e is the charge on the electron and M is its effective mass,
giving Hre = MV = p (1)
A radial electrostatic field X has a similar effect according to the relation
Xre = MV² (2)
Equations (1) and (2) were expected to be used as simultaneous equations to solve for mass and speed, to confirm the SR equation, hence the following were derived from the above,
the mass ratio M/Mo = (e/Mo)(Hr)² /Xr (3)
and the speed V = Xr / Hr (4)
It is considered that the deviation from a straight line caused by the magnetic field is analagous to a fast moving body in gravitational free fall - a reduction in mass and a gain in speed (since a magnetic field cannot supply any energy), resulting in a reduction of the gradient of the line on a chart of M/M0 versus V²/c² (The Chart).
An electric field is an energy field and does transfer energy to charged particles, but since motion in the direction of the electric potential is blocked by the centrifugal force it is postulated that an energy transfer is in the form of an increase in mass, and conservation of momentum could cause a reduction in speed. These effects are opposite to those from the application of a magnetic field, causing different values for the resulting mass and speed. Any differences in the values of M or V from applying the two types of field invalidates the use of eqs. 3 and 4, which would then produce strange results.
Using both fields simultaneously would not avoid this problem as the two forces are additive and combine to oppose the centrifugal force,
hence HeV + Xe = MV²/r (5)
and eq.5 has the same two unknowns.
Two published experiments accurate enough to detect the difference between NR and SR predictions were investigated and their underlying theories were discovered to be faulty.
1. The Geller and Kollarits Experiment (1972).
This experiment [1] used only a magnetic field, on Beta particles, but measured the final KE, and used a radius of curvature of 2 inches (0.0508m). It was used by students at Drexel University, Philadelphia and demonstrates relativistic mass changes with KE, without attempting to solve for the speed. Only the gradient of the line on a chart of mass -v- kinetic energy and the intercept on the mass axis were of interest.
The kinetic energies T were obtained by a relative calibration method and also by an absolute method. Not all experimental values were given in their text for T (MeV) and H (Gauss), some were obtained from their chart (having axes (Hre)² , and T ).
( i ) From M = p²/2T, where 2T = MV², the masses are calculated and a chart of p²/2T vs T plotted.
Examination of the experiment theory reveals that an SR equation, E2 = c²p² + Eo2 (which is another form of the Lorentz/Einstein mass-ratio equation) was combined with their eq.(3) M = Mo + T/c² where each equation predicts the mass ratio to be different for the same speed! Therefore their resulting eq.(4), p²/2T = Mo + T/2c² cannot be valid.
Avoiding their invalid eq.(4) and using their eq.(3) instead, results in an increase by a factor of 2 on the theoretical gradient, from 1/2c² to 1/c², on the chart.
As the experimental points fitted the original theoretical line quite well, the gradient of the line must have been reduced to half its new theoretical value by the reduced mass and the increased speed.
(ii ) This experiment confirms a relativistic change of mass with KE, but not the SR version, producing in this case a reduction from the corrected theoretical gradient of the line by a factor of two (within experimental limits), probably due to the small radius of curvature, and possibly encouraging the experimenters to match this with a strange piece of mathematical manipulation to produce agreement with the value of c.
From 2T= MV², which is valid for unrestricted and restricted motion, the values of V² are obtained from the values of T and M, and are independent of the 'adjustment' to the expected gradient of the line on the chart. The experiment values of T, M, and M/Mo are shown in columns 1, 2, 3, 4, and the resulting values of V²/c² in column 5 of Table I.
Table I. Experimental Data and Calculated Results
T T(10-14) M(10-30) M / Mo (V/c)²
(MeV) (Joules) (Kg) (4) (5)
.690 11.04 1.526 1.673 1.607
.612 9.79 1.452 1.592 1.498
Values of V/c greater than 1.0 are quite normal for Beta particles in Natural Relativity, but are declared to be impossible in SR.
SR is proved to be wrong at relativistic speeds by these experimental results
2. The Rogers' et al Experiment (1940).
In this other modern-type particle experiment [2], possibly useful for investigating the Curve Effect (found in the Geller & Kollarits experiment), both magnetic and electric fields were applied separately to obtain data for analysis. This experiment was very similar to the Geller and Kollerits experiment, but produced very different results, which could be due to the use of an electric field (see eq.2 above), instead of measuring the KE. The calculated results lie near the SR curve on the above chart, whereas those from [1] lie well away from it.
From the above theory, the use of an electric field would cause different values for mass and speed, invalidating the use of the simultaneous equations. In fact they were used to calculate the resulting three pairs of values, which, by coincidence, agreed with the predictions of SR (within experimental uncertainty). Strange results were to be expected!
Questions arise. Would particles in a different range of energies, or data obtained using a different radius, (or both) have agreed with SR? Would Rogers'-type experiments have been published if they produced strange results? Does no one check the physics theory and mathematics of papers before publication ?
Future Investigation.
The effects of magnetic and electric fields on charged particles needs to be investigated further. It is hoped that these experiment can be repeated using, as appropriate, magnetic and electric fields separately, a KE detector, a wider range of known source speeds, and hopefully some different radii. Pulses of accelerated electrons fed into, or through, a magnetic field containing a time of flight measuring system and a KE detector could produce very useful data, if practicable.
Knowledge of the initial and final velocities are necessary to properly analyze the above experiments, but the author has been unable to obtain that information, but hopes that investigation into these effect will be made not too long in the future. No other modern experiments of this type have been found for investigation and/or to supply better data. There appears to be extremely few published experiments in this field. The answers to the above questions could explain that. Could there be some unpublished ones filed away that could be useful in this endeavor? The data the author was unable to obtain could be useful too.
1. K.N. Geller and R. Kollarits, "Experiment to Measure the Increase in Electron Mass
with Velocity", Am. J. Phys 40, 1125-30 (1972).
2. M.M.Rogers, A.W.McReynolds and F.T.Rogers,Jnr, "A Determination of the Masses
and Velocities of three Radium B Beta-Particles", Phys.Rev. 57, 379-83 (1940).
Click here to return to Home page, or
here to return to CONTENTS.
|
{
"redpajama_set_name": "RedPajamaCommonCrawl"
}
| 1,833 |
[
128000,
13857,
7388,
220,
1049,
19,
482,
220,
679,
18,
6941,
650,
18714,
616,
627,
791,
91867,
21829,
811,
627,
17119,
85,
72033,
11633,
1253,
387,
7633,
439,
279,
50264,
1853,
315,
264,
7366,
19320,
902,
374,
539,
961,
315,
477,
12673,
311,
2500,
2547,
11,
3629,
304,
264,
28029,
1853,
13,
578,
15629,
374,
315,
2802,
1618,
627,
791,
3284,
6372,
315,
12984,
389,
279,
3148,
315,
264,
19320,
520,
264,
10801,
436,
505,
279,
4219,
315,
12984,
527,
6646,
311,
387,
505,
2380,
8336,
63444,
7,
602,
883,
279,
22636,
2335,
4732,
315,
279,
19320,
345,
7,
14799,
883,
279,
2960,
4664,
22029,
5457,
14718,
279,
1853,
315,
279,
19320,
311,
387,
28029,
11,
323,
198,
1998,
3893,
883,
279,
74182,
45284,
5457,
9057,
555,
279
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
13857,
7388,
220,
1049,
19,
482,
220,
679,
18,
6941,
650,
18714,
616,
627,
791,
91867,
21829,
811,
627,
17119,
85,
72033,
11633,
1253,
387,
7633,
439,
279,
50264,
1853,
315,
264,
7366,
19320,
902,
374,
539,
961,
315,
477,
12673,
311,
2500,
2547,
11,
3629,
304,
264,
28029,
1853,
13,
578,
15629,
374,
315,
2802,
1618,
627,
791,
3284,
6372,
315,
12984,
389,
279,
3148,
315,
264,
19320,
520,
264,
10801,
436,
505,
279,
4219,
315,
12984,
527,
6646,
311,
387,
505,
2380,
8336,
63444,
7,
602,
883,
279,
22636,
2335,
4732,
315,
279,
19320,
345,
7,
14799,
883,
279,
2960,
4664,
22029,
5457,
14718,
279,
1853,
315,
279,
19320,
311,
387,
28029,
11,
323,
198,
1998,
3893,
883,
279,
74182,
45284,
5457,
9057,
555,
279,
-100
] |
One Last-Minute Trade the Guardians Need to Make to Win the World Series
One last-minute trade that the Cleveland Guardians need to make to win the 2022 World Series. / AP Photos/Ron Schwane
Teams across the MLB are scrambling to complete deals now that the trade deadline is just over 24 hours away. The Cleveland Guardians are one club expected to pursue some outside help to improve their +7500 odds to win the 2022 World Series (T-No. 15) on FanDuel Sportsbook.
If the Guardians hope to establish themselves as legitimate contenders, it makes sense for them to go all-in on Washington Nationals superstar Juan Soto. It'll be a tough last-minute deal to pull off, but the Guardians have been in the thick of the sweepstakes this long and may as well ride it out.
Guardians Trade Rumors
Between injuries and inconsistent play, the Guardians need a difference-maker like Soto in the outfield. The two-time All-Star finished was the NL MVP runner-up just last year and consistently shows why he has all the tools to be a future Hall of Famer.
As far as this season goes, Soto has 20 home runs and 45 RBIs through 100 games. While his .243 batting average is down compared to last year (.313), his .878 on-base plus slugging percentage is still solid and he's also on pace to lead the Majors in walks for the second consecutive year.
The Athletic's Zack Meizel is more than confident that the Guardians have the necessary pieces to land Soto. The club owns eight of the MLB's top-100 prospects to help entice the Nationals while fielding enough Major-League talent to ensure that Cleveland is competitive upon Soto's arrival.
You all want to talk Juan Soto, so, fine, let's talk Juan Sotohttps://t.co/ZlbPVOJBGC
— Zack Meisel (@ZackMeisel) July 20, 2022
Any time a player of Soto's caliber is available, there's going to be a war to acquire him. The Guardians know this and must put their best offer forward. Considering that he's under team control for two more years after this season and wants a long-term deal, giving up multiple top prospects is well worth the asking price.
The good news is that baseball fans will, hopefully, see the Soto sweepstakes come to an end at the trade deadline, which takes place on Tuesday, Aug. 2 at 6 p.m. ET.
SIGN UP NOW. Up to $1,000 in Free Bets if you don't win your first bet!. dark
|
{
"redpajama_set_name": "RedPajamaCommonCrawl"
}
| 1,803 |
[
128000,
4054,
8155,
5364,
258,
1088,
17657,
279,
62831,
14998,
311,
7557,
311,
12468,
279,
4435,
11378,
198,
4054,
1566,
24401,
6696,
430,
279,
24372,
62831,
1205,
311,
1304,
311,
3243,
279,
220,
2366,
17,
4435,
11378,
13,
611,
10314,
16912,
19945,
263,
30605,
2194,
198,
61769,
4028,
279,
41217,
527,
85327,
311,
4686,
12789,
1457,
430,
279,
6696,
22143,
374,
1120,
927,
220,
1187,
4207,
3201,
13,
578,
24372,
62831,
527,
832,
6469,
3685,
311,
23564,
1063,
4994,
1520,
311,
7417,
872,
489,
11711,
15,
21448,
311,
3243,
279,
220,
2366,
17,
4435,
11378,
320,
51,
99076,
13,
220,
868,
8,
389,
25744,
35,
4088,
13482,
2239,
627,
2746,
279,
62831,
3987,
311,
5813,
5694,
439,
23583,
68739,
11,
433,
3727,
5647,
369,
1124,
311,
733,
682
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
4054,
8155,
5364,
258,
1088,
17657,
279,
62831,
14998,
311,
7557,
311,
12468,
279,
4435,
11378,
198,
4054,
1566,
24401,
6696,
430,
279,
24372,
62831,
1205,
311,
1304,
311,
3243,
279,
220,
2366,
17,
4435,
11378,
13,
611,
10314,
16912,
19945,
263,
30605,
2194,
198,
61769,
4028,
279,
41217,
527,
85327,
311,
4686,
12789,
1457,
430,
279,
6696,
22143,
374,
1120,
927,
220,
1187,
4207,
3201,
13,
578,
24372,
62831,
527,
832,
6469,
3685,
311,
23564,
1063,
4994,
1520,
311,
7417,
872,
489,
11711,
15,
21448,
311,
3243,
279,
220,
2366,
17,
4435,
11378,
320,
51,
99076,
13,
220,
868,
8,
389,
25744,
35,
4088,
13482,
2239,
627,
2746,
279,
62831,
3987,
311,
5813,
5694,
439,
23583,
68739,
11,
433,
3727,
5647,
369,
1124,
311,
733,
682,
-100
] |
WASHINGTON: Several US Gulf War Veterans expressed their honor to take part in the liberation of Kuwait, reiterating that they would do it again 'in a heartbeat.' Exactly twenty-five years ago today, the United States Army, backed by an international coalition of 34 countries, began the Desert Storm mission, an operation that lasted 41 days, resulting in the liberation of Kuwait from Saddam Hussein's occupying troops.
In several interviews with Kuwait News Agency (KUNA), the Army veterans said that they are proud to have partaken in 'something very significant,' liberating and returning a forcefully occupied land to its rightful owner.
Scott Stump, a Gulf War Veteran and the President and CEO of the National Desert Storm War Memorial (NDSWM) committee, said that "I am honored to be a part of this momentous war, we did the right thing, I am proud to make a difference in Kuwaiti people's lives, giving them a future." Stump added that knowing what the Kuwaiti people have endured during the seven-month invasion urged the half a million US troop to combat the "terrorism" that was inflicted upon them.
Gulf War veteran Cee Freeman's brigade in 1991.
The NDSWM is designing and lobbying to place a Gulf War memorial on the National Mall in the heart of the US capital Washington DC to highlight the 292 US servicemen who gave their lives for the two operations in the war, Desert Storm and Desert Shield.
They are in the process of choosing the ground and designing in a way that highlights the efforts of all the coalition and educates in one of the most important and most swiftly won wars that the US have partook in the 20th century.
It was an ultimate success, "what it was supposed to be and what it ended up being were so different," Stump noted about the offensive operation, Desert Storm, that began its aerial and naval bombardment of occupying Iraqi forces for five weeks and a ground assault on the February 24th, only two days before the official liberation of the State of Kuwait.
"I knew i wanted to go as soon as we heard about the Iraqi invasion," Venneman reiterated "I felt that the invasion was wrong, unjustified, and deserved a swift and decisive response from the international community," which it did.
I'm glad to hear that the Desert Storm Memorial is moving forward. I hope it not only memorializes those who lost their lives during battle but those who suffer 25 years later.
I certainly appreciate the patriotism and selflessness behind the sentiment that there are those that would "do it again in a heartbeat." Perhaps if I was still blind to the life I would face after the war I would join them quite willingly.
Knowing what I know today about how the DOD and VA willingly abandoned Gulf War Veterans and how much I would have to endure, from physical pain to being treated like a pariah by my caregivers, I would rather go AWOL than go through all this again.
I'm proud of my service. We did what we had to do. I certainly did my fair share during Desert Storm and, if my body and mind were able, I would serve again. The truth of the matter is that my body is now fragile and wracked with pain and I'm far from happy about it. If the government that promised to care for those of us bear the burden of battle would have treated me with respect and dignity from the get-go I would be more forgiving. Yet, today I fight not only the daily battle against this unforgiving disease, I fight my doctors and hospital administrators to get something at least closely approximating appropriate care for an ill Gulf War Veteran.
I have a letter from the director of my local VA hospital addressed to myself and to Senator Wyden's (D-OR) office assuring us that she would implement a clinic or PACT for exposure hazards such as Gulf War Illness, burn pits, Agent Orange, etc. Almost 18 months after this letter was written, nothing has been done and I am still ridiculed by doctors if I bring up Gulf War Illness.
25 years ago I took pictures, got medals and all sorts of memorabilia. Today I am boxing that all up to give to my son. I don't want to see it anymore. I had my glory. All I want now is to get up one morning and not feel like I was hit by a truck while I was sleeping.
Happy 25th Anniversary Desert Storm! You are the gift that just keeps on giving!!!
|
{
"redpajama_set_name": "RedPajamaC4"
}
| 7,262 |
[
128000,
51577,
25,
26778,
2326,
27945,
5111,
40432,
13605,
872,
16044,
311,
1935,
961,
304,
279,
55633,
315,
57111,
11,
312,
2058,
1113,
430,
814,
1053,
656,
433,
1578,
364,
258,
264,
53205,
3238,
69590,
17510,
36399,
1667,
4227,
3432,
11,
279,
3723,
4273,
13309,
11,
22126,
555,
459,
6625,
26283,
315,
220,
1958,
5961,
11,
6137,
279,
43286,
22620,
9131,
11,
459,
5784,
430,
36513,
220,
3174,
2919,
11,
13239,
304,
279,
55633,
315,
57111,
505,
67447,
61628,
596,
72280,
17312,
627,
644,
3892,
19905,
449,
57111,
5513,
16784,
320,
42,
1899,
32,
705,
279,
13309,
26905,
1071,
430,
814,
527,
12691,
311,
617,
961,
3448,
304,
364,
34431,
1633,
5199,
2965,
34929,
1113,
323,
13758,
264,
87078,
25366,
4363,
311,
1202,
99044,
6506,
627,
39320,
800
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
51577,
25,
26778,
2326,
27945,
5111,
40432,
13605,
872,
16044,
311,
1935,
961,
304,
279,
55633,
315,
57111,
11,
312,
2058,
1113,
430,
814,
1053,
656,
433,
1578,
364,
258,
264,
53205,
3238,
69590,
17510,
36399,
1667,
4227,
3432,
11,
279,
3723,
4273,
13309,
11,
22126,
555,
459,
6625,
26283,
315,
220,
1958,
5961,
11,
6137,
279,
43286,
22620,
9131,
11,
459,
5784,
430,
36513,
220,
3174,
2919,
11,
13239,
304,
279,
55633,
315,
57111,
505,
67447,
61628,
596,
72280,
17312,
627,
644,
3892,
19905,
449,
57111,
5513,
16784,
320,
42,
1899,
32,
705,
279,
13309,
26905,
1071,
430,
814,
527,
12691,
311,
617,
961,
3448,
304,
364,
34431,
1633,
5199,
2965,
34929,
1113,
323,
13758,
264,
87078,
25366,
4363,
311,
1202,
99044,
6506,
627,
39320,
800,
-100
] |
Heading west to Kingman, AZ!
Got tired of looking out of the window here at home at all the snow piled up here in NJ and decided to head west to Kingman, Arizona, at least in spirit, by way of these two images. Ahhh... to be there now where the temperature on February 23, 2014 is seventy degrees and lots of sunshine. The first image has Santa Fe 608 leading BNSF 6896, BNSF 6815 and an unidentified fourth unit leading an intermodal through Kingman Canyon back in May, 2001.
Taken from a higher elevation, still another intermodal with a power consist of BNSF 5313, BNSF 4313, BNSF 8211 and BNSF 4354 in October, 2001. The two-lane road seen off to the left is the historical Route 66.
We would like to suggest you check the following web page for a variety of links to other web sites about trains. Although the title of the page is History of Train Travel, it only has a few brief comments on that topic. The real value is the treasure trove of links to other web sites.
We would like to thank Kelsey, a high school volunteer at the Charlotte Library, for finding this web page. Good job of researching for an educational project at the library.
JACKSONVILLE, Fla. - February 21, 2014 - CSX Transportation was on hand this week in Orlando, Fla., to support the Renewable Fuels Association's 19th annual National Ethanol Conference and to keep shipper awareness high of the company's transportation capabilities in this important market.
"Even before The Energy Independence and Security Act of 2007, CSX has been actively supporting the ethanol industry and working with our customers and their receivers to ensure safe, efficient delivery of ethanol," said Clarence Gooden, executive vice president and chief commercial officer. "We look forward to continuing to work toward those objectives with both unit-train deliveries and single-car shipments."
One of CSX's services is called EthX, an express ethanol delivery that is safe, efficient and cost effective. Through EthX, CSX moves 80-car unit trains to a network of 18 eastern terminals. But the company also handles smaller shipments with the same level of efficiency, said Kyle Hancock, vice president-industrial and agricultural.
"The ethanol network has potential to grow, especially if gasoline blends include a higher percentage of ethanol," Hancock said. "Meeting our shippers and receivers face to face at the National Ethanol Conference is a great way to sustain and grow our business."
Following article is from the Star-Ledger.
Raritan Valley Line commuters next month will be able to get a trip into New York without having to transfer to another train in Newark, but for now the "one-seat rides" will only be offered on weekdays during off-peak travel hours, NJ Transit officials said today.
The one-seat rides are scheduled to begin Monday, March 3, when the first of five daily roundtrips into and out of New York Penn Station is offered, beginning with train No. 5126, expected to arrive in New York at 10:09 a.m.
For now, the one-seat rides will be for trains arriving at New York Penn Station between 10 a.m. and 2 p.m. on weekdays, or trains leaving the station between 11 a.m. and 3 p.m.
The way Raritan Valley Rail Coalition Chairman Peter Palmer sees it, the first step in a four-step process has been accomplished with the off-peak service on weekdays.
Step two would be having any Raritan Valley Line train that leaves New York after 8 p.m. be a one-seat ride. Steps three and four — weekend service and full weekday rush-hour service — will not be as easy to accomplish, Palmer acknowledged.
He noted that due to Amtrak train tunnel maintenance on weekends, only one tunnel is available for Jersey trains.
But, Palmer said, "We achieved step one and we'll keep working. We've only been doing this for 15 years."
Commuters on the Raritan Valley Line make up nearly one-tenth of NJ Transit's weekday train ridership of about 302,000. However, they haven't been able to get a train to New York City without stepping off their diesel-powered train in Newark and transferring to an electric-powered one.
Diesels don't operate in the train tunnel under the Hudson River.
For commuters, it was often aggravating to have to leave one train at Newark Penn Station and go down and up stairs to get to another one on a different platform.
But NJ Transit now has dual-powered locomotives that can switch between diesel and electric power, allowing the long-awaited one-seat rides to happen.
The Raritan Valley Line runs from High Bridge, in Hunterdon County, to Newark Penn Station, with stops in Annandale, Lebanon, White House, North Branch, Raritan, Somerville, Bridgewater, Bound Brook, Dunellen, Plainfield, Netherwood, Fanwood, Westfield, Garwood, Cranford, Roselle Park and Union.
The transfer-free rides will originate from High Bridge as well as Raritan.
In addition to the one-seat rides, there will be more capacity on the Raritan Valley trains.
The train sets now have six double-decker cars plus a locomotive, but an extra multilevel train car will be added beginning March 3. The additional capacity for Raritan Valley Line customers is tied to the upcoming Pulaski Skyway rehabilitation project, which will limit lanes and close the Pulaski in the direction toward New York for about two years.
One-seat rides cannot be offered at this time on weekends due to capacity restrictions at New York Penn Station that would require additional coordination with station owner Amtrak, officials said.
...will keep NJ Transit's trains from running close to their scheduled times on the Raritan Valley Line (RVL). NJT Train 5725 is running a few minutes late of its scheduled departure time of 1:59 from Raritan on February 13. It is seen here passing CP BOYD, just east of MP 37, on the RVL. Its next stop will be the North Branch station at MP 39.4. It should also be noted that off to the engine's right is where the tracks take returning trains directly into the Raritan yards. They are completely covered over by the snow.
Here is another view of the same location dated 4-4-09.
Received the following via email from one of our regular correspondents.
What a clever and crazy conglomeration of coordinated carrying capacity (84 years ago, or even now)! A silent film clip, but it must have created quite a cacophony and echo of clatter as its flanges clicked and clacked whilst cleaving through curving track crossovers. A derailment would create a massive crisis and conundrum and require a call for several big cranes. Transport with this cantankerous caravan had to thus be continuously conducted calmly, coolly and with considerable care for the consigned cargo until terms of carriage were concluded.
Film, less than 90 seconds.
JACKSONVILLE, Fla. - February 12, 2014 - Earlier today, the board of directors of CSX Corporation (NYSE: CSX) approved a $0.15 per share quarterly dividend on the company's common stock. The dividend is payable on March 14, 2014, to shareholders of record at the close of business on February 28, 2014.
Doors will open at 8:00 AM for coffee and doughnuts. The presenters will begin at 9:00 AM.
The show will be presented at Christy Joy Catering Service, located on 141 Bulls Head Road, Pottsville, PA.
The master of ceremonies for this event will be Mr. Al Barnes.
9:00 AM to 9:45 AM: Allen Keller, PRR in the Early 1960's, My Experiences as a Locomotive Inspector for Remote Control Locomotives.
10:00 AM to 10:45 AM: Bob Warner, 1950s Steam Around Reading.
11:00 AM to 11:45 AM: Don Young, South African Steam.
11:45 AM to 1:00 PM: Break for lunch.
Slides from the John Pritz Collection of Jersey Central and Reading Steam.
1:45 PM to 2:30 PM: Kermit Geary, Lehigh New England Railroad in General.
2:45 PM to 3:30 PM: Craig Werley, Kantner Slide Collection, The Conrail Era.
There will be door prizes, raffles, and a limited number of vendors selling memorabilia .
Lunch will be provided by Christy Joy Catering Service. The menu will be served buffet style and consist of the following: City chicken, ham, stuffed shells, mashed potatoes, stuffing, green beans and mixed homemade desserts.
The cost is $30.00 per person. Seating is limited, tickets will be sold on a first come, first serve basis. Checks can be made payable to Project 113 and sent to Project 113, 113 East Sunbury Street, Minersville, PA 17954. For information phone: 570-544-8300 or email: [email protected].
Starting at Minersville Station, proceed east on Seltzer Road 1 3/10 miles to Bulls Head Road, turn right onto Bulls Head Road, travel approximately 7/10 mile. Christy Joy's Catering Service is on the right. There is plenty of off road parking on the grounds of the facility.
JACKSONVILLE, Fla. - February 12, 2014 - Fredrik Eliasson, CSX Corporation (NYSE: CSX) executive vice president and chief financial officer, will address the Barclays Industrial Select Conference in Miami, Florida on Wednesday, February 19, at 8:05 a.m. Eastern Time.
Access to the audio webcast will be available on CSX's website at http://investors.csx.com. A replay and accompanying audio will be available following the conclusion of this event.
Due to extreme weather conditions shipments moving across the Midwest and Northeast have been experiencing delays of 24 to 48 hours. In addition, Winter Storm Pax is expected to contribute to snow and ice conditions across the Southeast and it is anticipated that traffic moving via these routes may also experience delay. In locations where extreme temperatures are combined with snow or ice conditions, some local service may be curtailed. Operations and Service Support are working with customers to coordinate local operations that may be affected.
This email was lost for 2 months, sorry.
Decided to see what progress has been made with the Royce Runner on what was a rather brisk Saturday morning (December 7th). The cantilever signal for westbound trains is up but not operational. All those WB signals are still covered with black plastic. For eastbound trains that signal can be seen to the right of the red COFC back in NS 22V's train. Motive power on this intermodal was NS 9491 and NS 7710 as it passed over the Roycefield Road grade crossing at 9:43. Within that same area and off to the left can be seen the new relay shed. Where the name will appear (CP ROYCE?) on the shed is still covered over. No idea as to when this project will become fully operational.
Later on Saturday afternoon, decided to head out to Flemington to check out a new location to photograph BR&W's "North Pole Express". Saturday afternoon's run marked the first of seven runs to be made on December 7, 8 and 14. All of the excursions were noted to be sold out. Seen here, BR&W # 60 leads its consist west towards Ringoes over the First Neshanic River Bridge.
NORFOLK, VA. – Communities around Norfolk and the Elizabeth River, a tributary of the ecologically important Chesapeake Bay, have benefitted from Norfolk Southern's innovative stormwater management system at the railroad's Lamberts Point coal transload facility.
When it rains, the multimillion-dollar recycling system collects, filters, and treats stormwater from the 425-acre export coal facility. The water is reused to suppress dust and clean equipment at Pier 6, where oceangoing colliers are loaded with metallurgical and steam coal used to produce steel and electricity worldwide. In addition to enhancing the health of the river's ecosystem by reducing stormwater runoff, the project conserves water and lowers the company's water bill. Since the recycling system began operating in March 2013, the coal pier has reduced its use of municipal water by approximately 1.5 million gallons a month, annually saving about 18 million gallons.
The railroad's efforts have earned recognition from the Elizabeth River Project, a nonprofit conservation organization whose goal is to restore the river's water quality. The ERP in January presented Norfolk Southern with a 2013 "Sustained Distinguished Performance" award for the stormwater project, the second consecutive year the railroad has achieved the award. The railroad is a "Model Level" partner in the ERP's River Star Business program, the highest level for businesses.
Blair Wimbush, NS vice president real estate and corporate sustainability officer, said the stormwater project demonstrates the railroad's commitment to corporate responsibility.
Norfolk Southern constructed stormwater retention ponds at the Lamberts Point facility in 2000. The latest upgrade, an approximately $5-million investment, added a 10,000-gallon holding tank, a "Hydroclone" filtration system to remove fine coal particles, and a carbon and ultraviolet light treatment system that neutralizes microorganisms and other potential pollutants. The water then is ready for use in the coal pier's operating processes.
To learn more about how Norfolk Southern contributes to a cleaner environment, a healthy economy, and safer communities, visit www.nssustainability.com.
The GSD will be carefully tracking the forecast for a weekend winter storm and will announce via email and on our website by late Friday night if the meet is being postponed. We will be considering round-trip traveling conditions, parking considerations and access to our layout owners' homes. Please check throughout Friday evening for any change in Saturday's meet status. If necessary our new date will be in two weeks, Saturday, February 22nd @ 9 am in Scotch Plains.
"Bring 'n Brag" AP Judging Door Prizes "White Elephant Table"
See eight 'work-in-progress' clinics and visit FIVE great area layouts. Dining and layout tour maps will be provided at the meet.
Centrally located with easy access from Routes 22, 78 and the Garden State Parkway, plus ample off-street free parking.
Due to extreme weather conditions shipments moving across the Midwest and Northeast may see delays of 24 to 48 hours. In addition, Winter Storm Nika is expected to contribute to snow and ice conditions. In locations where extreme temperatures are combined with snow or ice conditions, some local service may be curtailed. Operations and Service Support are working with customers to coordinate local operations that may be affected.
The weekend's "balmy" temperatures and sun provided definite relief after having to deal with a stretch of cold weather, snow and gray skies that has been prevalent here in central NJ. Waiting in Manville (NJ) to photograph NS 24K being re-routed down CSX's Trenton Line and soaking up the sun's rays, I didn't mind the wait for the CSX crew to start their trip down to Morrisville (PA). NS 2584 and NS 7516 served as the power when 24K came down the LEHL. For the reverse move at Port Reading Jct, NS 8383 (ex-CR 6170) would serve as the leader with NS 9053 following as it went through Manville yard.
On Sunday NKP 8100 was the leader on 67J, a empty trash train, as it made a return trip down the LEHL. One week earlier on January 25th NKP 8100 was the leader on NS 22V. It is seen here at Bloomsbury (NJ LEHL MP 68.8) preparing to cross NJ's Musconetcong Mountain range as it heads east to Oak Island. With February 2nd also being Groundhog Day, Punxsutawney Phil the Groundhog has seen his shadow! The means we are in for another six weeks of winter! On Monday, central NJ is forecasted to once again have wintery conditions with three to five inches of snow and sleet predicted. Oh well, so much for the end of winter.
The TRI-STATE RAILWAY HISTORICAL SOCIETY, INC.
Tri-State continues its 50th Anniversary year by featuring long-time members as presenters. For Thursday, February 13th, we'll feature some classic movies from avid railroad film collector Mitch Dakelman. First will be film called "GG1: An American Classic." During the final weeks of GG1 operation in 1983, Mike and Marianne Autorino, of Avanti Productions, documented GG1 4877. It was the pride of the fleet as the only one remaining still in a heritage paint scheme, the attractive Tuscan red that was developed in 1952 to run with Pennsy's new and luxurious Congressional. Mike, who passed away in November 2013, mounted cameras on the "motor," to provide dramatic angles rarely seen by a traveler. Cliff Underwood, a veteran PRR engineer, wrote a song called "Big Red," which is heard throughout the film by a local musical group. Expertly narrated by well-known NRHS member and professional voice-over artist Tom Moran, this is a great story about a legendary engine, filmed in color and with on-location sound. The GG1 4877 in this film is in the URHS collection in Boonton, and has recently be restored to its original Brunswick Green and gold stripes. This film is one of the best-done efforts from anyone in the railroad field, and it's worth a look.
Next we'll see "Raymond Loewy, Industrial Designer." Loewy's design work was everywhere in the 1930s and '40s, and he's the man who improved the look and design of the GG1s. He designed everything from automobiles to the Princess Phone to Spacelab (in 1979). Loewy was interviewed on a 60 Minutes program, and the segment was sold by CBS to school and public libraries for additional screenings. Mitch was able to acquire a 16mm copy on eBay and will be pleased to run the film for the audience. We'll be watching vintage films on a vintage project projector, as these films were meant to be seen. This is a program not to miss.
CHESAPEAKE, VA. – Norfolk Southern has opened a new Thoroughbred Bulk Transfer terminal in Chesapeake.
Thoroughbred Bulk Transfer (TBT) terminals are specialized facilities that allow customers to transfer a large array of commodities between rail cars and trucks. TBT terminals are owned by Norfolk Southern and operated by independent contractors that are industry experts in facilitating safe and efficient bulk transfer and distribution. The facilities allow customers without rail sidings to receive the benefits of rail economics and service quality.
Less than three miles from downtown Norfolk, Va., with convenient access to Interstates I-264 and I-464 at 1305 Atlantic Blvd., the Chesapeake TBT also enjoys close proximity to rail-serving yards on Norfolk Southern's high-density main line. The terminal can handle dry and liquid bulk food-grade commodities such as flour, sugar, grains, and plastic pellets, as well as aggregates, sand, and cement. It is located on 40 acres with seven acres of laydown area, with expansion capability to handle lumber, dimensional products and accommodate container stuffing. The facility features 104 car spots, a certified truck scale, and is fully paved, fenced, and lighted. The Chesapeake TBT is strategically positioned to serve Hampton Roads-served markets as well as markets overseas with its close proximity to nearby container terminals.
Norfolk Southern has a network of 32 TBT facilities in 17 states. The new Chesapeake terminal is operated under license by RSI Leasing Inc. More information on Norfolk Southern's transload network is available at www.nscorp.com/distributionservices.
|
{
"redpajama_set_name": "RedPajamaC4"
}
| 2,184 |
[
128000,
32572,
9909,
311,
6342,
1543,
11,
31976,
4999,
33562,
19781,
315,
3411,
704,
315,
279,
3321,
1618,
520,
2162,
520,
682,
279,
12056,
77431,
709,
1618,
304,
27816,
323,
6773,
311,
2010,
9909,
311,
6342,
1543,
11,
17368,
11,
520,
3325,
304,
9090,
11,
555,
1648,
315,
1521,
1403,
5448,
13,
16770,
20990,
1131,
311,
387,
1070,
1457,
1405,
279,
9499,
389,
7552,
220,
1419,
11,
220,
679,
19,
374,
71049,
12628,
323,
10283,
315,
52495,
13,
578,
1176,
2217,
706,
16376,
3926,
220,
19944,
6522,
426,
2507,
37,
220,
25458,
21,
11,
426,
2507,
37,
220,
25091,
20,
323,
459,
65578,
11999,
5089,
6522,
459,
958,
5785,
1555,
6342,
1543,
41560,
1203,
304,
3297,
11,
220,
1049,
16,
627,
66769,
505,
264,
5190,
27255,
11,
2103
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
32572,
9909,
311,
6342,
1543,
11,
31976,
4999,
33562,
19781,
315,
3411,
704,
315,
279,
3321,
1618,
520,
2162,
520,
682,
279,
12056,
77431,
709,
1618,
304,
27816,
323,
6773,
311,
2010,
9909,
311,
6342,
1543,
11,
17368,
11,
520,
3325,
304,
9090,
11,
555,
1648,
315,
1521,
1403,
5448,
13,
16770,
20990,
1131,
311,
387,
1070,
1457,
1405,
279,
9499,
389,
7552,
220,
1419,
11,
220,
679,
19,
374,
71049,
12628,
323,
10283,
315,
52495,
13,
578,
1176,
2217,
706,
16376,
3926,
220,
19944,
6522,
426,
2507,
37,
220,
25458,
21,
11,
426,
2507,
37,
220,
25091,
20,
323,
459,
65578,
11999,
5089,
6522,
459,
958,
5785,
1555,
6342,
1543,
41560,
1203,
304,
3297,
11,
220,
1049,
16,
627,
66769,
505,
264,
5190,
27255,
11,
2103,
-100
] |
import { NgModule } from '@angular/core';
import { RouterModule } from '@angular/router';
import { ButtonExamplePage } from './button/example';
import { InputExamplePage } from './input/example';
import { ListExamplePage } from './list/example';
import { SliderExamplePage } from './slider/example';
import { UploaderExamplePage } from './uploader/example';
import { GalleryExamplePage } from './gallery/example';
import { BadgeExamplePage } from './badge/example';
import { FooterExamplePage } from './footer/example';
import { LoadmoreExamplePage } from './loadmore/example';
import { ProgressExamplePage } from './progress/example';
import { ActionsheetExamplePage } from './actionsheet/example';
import { DialogExamplePage } from './dialog/example';
import { ToastExamplePage } from './toast/example';
import { PickerExamplePage } from './picker/example';
import { SearchBarExamplePage } from './searchbar/example';
import { NavBarExamplePage } from './navbar/example';
import { TabBarExamplePage } from './tabbar/example';
import { ArticleExamplePage } from './article/example';
import { FlexExamplePage } from './flex/example';
import { GridExamplePage } from './grid/example';
import { IconsExamplePage } from './icons/example';
import { PanelExamplePage } from './panel/example';
import { PreviewExamplePage } from './preview/example';
import { MsgExamplePage, MsgSuccExamplePage, MsgWarnExamplePage } from './msg/example';
@NgModule({
imports: [
RouterModule.forChild([
{ path: 'button', component: ButtonExamplePage },
{ path: 'input', component: InputExamplePage },
{ path: 'list', component: ListExamplePage },
{ path: 'slider', component: SliderExamplePage },
{ path: 'uploader', component: UploaderExamplePage },
{ path: 'gallery', component: GalleryExamplePage },
{ path: 'badge', component: BadgeExamplePage },
{ path: 'footer', component: FooterExamplePage },
{ path: 'loadmore', component: LoadmoreExamplePage },
{ path: 'progress', component: ProgressExamplePage },
{ path: 'actionsheet', component: ActionsheetExamplePage },
{ path: 'dialog', component: DialogExamplePage },
{ path: 'toast', component: ToastExamplePage },
{ path: 'picker', component: PickerExamplePage },
{ path: 'searchbar', component: SearchBarExamplePage },
{ path: 'navbar', component: NavBarExamplePage },
{ path: 'tabbar', component: TabBarExamplePage },
{ path: 'article', component: ArticleExamplePage },
{ path: 'flex', component: FlexExamplePage },
{ path: 'grid', component: GridExamplePage },
{ path: 'icons', component: IconsExamplePage },
{ path: 'panel', component: PanelExamplePage },
{ path: 'preview', component: PreviewExamplePage },
{ path: 'msg', component: MsgExamplePage },
{ path: 'msg/success', component: MsgSuccExamplePage },
{ path: 'msg/warn', component: MsgWarnExamplePage }
])
],
exports: [
RouterModule
]
})
export class WeUIExampleRoutingModule { }
|
{
"redpajama_set_name": "RedPajamaGithub"
}
| 1,737 |
[
128000,
271,
475,
314,
28923,
335,
505,
3542,
4328,
5433,
1025,
475,
314,
35887,
335,
505,
3542,
4328,
19055,
2412,
475,
314,
6739,
13617,
2732,
335,
505,
2825,
2208,
66282,
1025,
475,
314,
5688,
13617,
2732,
335,
505,
2825,
1379,
66282,
1025,
475,
314,
1796,
13617,
2732,
335,
505,
2825,
1638,
66282,
1025,
475,
314,
39229,
13617,
2732,
335,
505,
2825,
20971,
66282,
1025,
475,
314,
3216,
8520,
13617,
2732,
335,
505,
2825,
87890,
66282,
1025,
475,
314,
19853,
13617,
2732,
335,
505,
2825,
27297,
66282,
1025,
475,
314,
60183,
13617,
2732,
335,
505,
2825,
32624,
66282,
1025,
475,
314,
27575,
13617,
2732,
335,
505,
2825,
7101,
66282,
1025,
475,
314,
9069,
6518,
13617,
2732,
335,
505,
2825,
1096,
6518,
66282,
1025,
475,
314,
16418,
13617,
2732,
335
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
271,
475,
314,
28923,
335,
505,
3542,
4328,
5433,
1025,
475,
314,
35887,
335,
505,
3542,
4328,
19055,
2412,
475,
314,
6739,
13617,
2732,
335,
505,
2825,
2208,
66282,
1025,
475,
314,
5688,
13617,
2732,
335,
505,
2825,
1379,
66282,
1025,
475,
314,
1796,
13617,
2732,
335,
505,
2825,
1638,
66282,
1025,
475,
314,
39229,
13617,
2732,
335,
505,
2825,
20971,
66282,
1025,
475,
314,
3216,
8520,
13617,
2732,
335,
505,
2825,
87890,
66282,
1025,
475,
314,
19853,
13617,
2732,
335,
505,
2825,
27297,
66282,
1025,
475,
314,
60183,
13617,
2732,
335,
505,
2825,
32624,
66282,
1025,
475,
314,
27575,
13617,
2732,
335,
505,
2825,
7101,
66282,
1025,
475,
314,
9069,
6518,
13617,
2732,
335,
505,
2825,
1096,
6518,
66282,
1025,
475,
314,
16418,
13617,
2732,
335,
-100
] |
An appeal has been launched to find a missing man who is believed to be in the Easington and Peterlee area.
Police officers are trying to find Adam White after his family has raised concern for his welfare.
Durham Constabulary has shared the appeal on social media as officers attempt to locate him.
A spokesman for the force said: "Police are requesting any information in relation to Adam White, as concern for his welfare has been raised by his family and officers are attempting to locate him as soon as possible.
"Adam is believed to be in the Easington/Peterlee area."
Anyone with information should call 101 and quote incident number DHM-24122018-0130.
|
{
"redpajama_set_name": "RedPajamaC4"
}
| 5,763 |
[
128000,
2127,
14638,
706,
1027,
11887,
311,
1505,
264,
7554,
893,
889,
374,
11846,
311,
387,
304,
279,
469,
4522,
783,
323,
11291,
8669,
3158,
627,
22993,
9808,
527,
4560,
311,
1505,
15387,
5929,
1306,
813,
3070,
706,
9408,
4747,
369,
813,
23460,
627,
54133,
5721,
25538,
370,
24094,
706,
6222,
279,
14638,
389,
3674,
3772,
439,
9808,
4879,
311,
25539,
1461,
627,
32,
18367,
369,
279,
5457,
1071,
25,
330,
22993,
527,
35792,
904,
2038,
304,
12976,
311,
15387,
5929,
11,
439,
4747,
369,
813,
23460,
706,
1027,
9408,
555,
813,
3070,
323,
9808,
527,
19969,
311,
25539,
1461,
439,
5246,
439,
3284,
627,
1,
38675,
374,
11846,
311,
387,
304,
279,
469,
4522,
783,
16744,
1430,
8669,
3158,
10246,
41795,
449,
2038,
1288,
1650,
220,
4645
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
2127,
14638,
706,
1027,
11887,
311,
1505,
264,
7554,
893,
889,
374,
11846,
311,
387,
304,
279,
469,
4522,
783,
323,
11291,
8669,
3158,
627,
22993,
9808,
527,
4560,
311,
1505,
15387,
5929,
1306,
813,
3070,
706,
9408,
4747,
369,
813,
23460,
627,
54133,
5721,
25538,
370,
24094,
706,
6222,
279,
14638,
389,
3674,
3772,
439,
9808,
4879,
311,
25539,
1461,
627,
32,
18367,
369,
279,
5457,
1071,
25,
330,
22993,
527,
35792,
904,
2038,
304,
12976,
311,
15387,
5929,
11,
439,
4747,
369,
813,
23460,
706,
1027,
9408,
555,
813,
3070,
323,
9808,
527,
19969,
311,
25539,
1461,
439,
5246,
439,
3284,
627,
1,
38675,
374,
11846,
311,
387,
304,
279,
469,
4522,
783,
16744,
1430,
8669,
3158,
10246,
41795,
449,
2038,
1288,
1650,
220,
4645,
-100
] |
Spring is here. The flowers are blooming all around and there is plenty of photo fodder, especially when armed with my 60mm macro lens.
All photos were taken with my Olympus 60mm macro lens, hand-held. Many of the images cover areas as small as an eighth of an inch.
This post contains a few recent Ashland Reservoir photos. Local scenes taken with the attempt to make the ordinary seem a bit extra-ordinary. I titled it local texture, as opposed to local color. That's weak photography humor.
After returning from Zion, and capturing a few silky water shots of the Virgin River, I thought I'd try to duplicate the concept using an extremely tiny stream which feeds the Ashland Res. It is only a minor trickle, perhaps a foot across.
Even though it was a 1/10 second exposure, the nature of a tiny waterfall is different from a large river. I've no doubt a much longer exposure and perhaps less camera movement would have yielded a different result. The "dance" you see is from the reflections of some of the surface water. The sun was illuminating the falls quite strongly but only on the uppermost surface spray.
Alas we come to our fourth and last day at Zion post. We needed to head back to Las Vegas to catch a show (David Copperfield!, very entertaining) then to the airport for our red eye flight home.
Before we left Zion, while we had some thoughts of climbing yet more trails with crazy drop offs and views, in the end we decided to take it easy. We strolled along the Pa'rus Trail which meanders along the Virgin River in the valley of Zion Canyon. This gave us a different perspective on the awesome Zion scenery.
I thought I'd try a panorama shot, which in this case was a combination of six separate photos covering at least 180 degrees.
Since the Virgin River was the star of this Pa'rus Trail, I thought it only appropriate to take a few more "silky river" shots. These next three pictures are all 1/15 second exposures, which is not particularly slow, but slow enough to cause the water to look this way.
The above photo didn't turn out quite the way I wanted. You weren't supposed to see my "lens filter". After cropping the photo a bit in post-processing, I obtained the next photo. Perhaps it isn't the most spectacular photo, but it's more or less what I originally had in mind.
This turned out to be the last picture of note. We left Zion to head home via Las Vegas.
We left feeling incredibly moved by the beauty and majesty of Zion National Park. We have had the pleasure of visiting many of our nation's National Parks, and, while they all have something to offer, our Zion visit was truly special. It will remain a fond memory for us always.
|
{
"redpajama_set_name": "RedPajamaC4"
}
| 6,883 |
[
128000,
26208,
374,
1618,
13,
578,
19837,
527,
14545,
18238,
682,
2212,
323,
1070,
374,
11510,
315,
6685,
98895,
11,
5423,
994,
17903,
449,
856,
220,
1399,
3906,
18563,
18848,
627,
2460,
7397,
1051,
4529,
449,
856,
97891,
220,
1399,
3906,
18563,
18848,
11,
1450,
58606,
13,
9176,
315,
279,
5448,
3504,
5789,
439,
2678,
439,
459,
37477,
315,
459,
17560,
627,
2028,
1772,
5727,
264,
2478,
3293,
14937,
1974,
1838,
76950,
7397,
13,
8949,
16451,
4529,
449,
279,
4879,
311,
1304,
279,
19664,
2873,
264,
2766,
5066,
12,
21707,
13,
358,
25891,
433,
2254,
10651,
11,
439,
16475,
311,
2254,
1933,
13,
3011,
596,
7621,
24685,
28485,
627,
6153,
13758,
505,
41435,
11,
323,
40880,
264,
2478,
87418,
3090,
15300,
315,
279,
11463,
11188,
11,
358,
3463
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
26208,
374,
1618,
13,
578,
19837,
527,
14545,
18238,
682,
2212,
323,
1070,
374,
11510,
315,
6685,
98895,
11,
5423,
994,
17903,
449,
856,
220,
1399,
3906,
18563,
18848,
627,
2460,
7397,
1051,
4529,
449,
856,
97891,
220,
1399,
3906,
18563,
18848,
11,
1450,
58606,
13,
9176,
315,
279,
5448,
3504,
5789,
439,
2678,
439,
459,
37477,
315,
459,
17560,
627,
2028,
1772,
5727,
264,
2478,
3293,
14937,
1974,
1838,
76950,
7397,
13,
8949,
16451,
4529,
449,
279,
4879,
311,
1304,
279,
19664,
2873,
264,
2766,
5066,
12,
21707,
13,
358,
25891,
433,
2254,
10651,
11,
439,
16475,
311,
2254,
1933,
13,
3011,
596,
7621,
24685,
28485,
627,
6153,
13758,
505,
41435,
11,
323,
40880,
264,
2478,
87418,
3090,
15300,
315,
279,
11463,
11188,
11,
358,
3463,
-100
] |
PMQs Review: The one with the empty benches
Matt Withers
Published: 2:22 PM May 1, 2019 Updated: 8:45 AM September 18, 2020
Theresa May at PMQs. Photograph: House of Commons/PA. - Credit: PA
Another PMQs where Brexit barely warranted a mention. Little wonder most MPs seemed to stay away.
Theresa May speaking at prime minister's questions in the House of Commons (Pic: Parliament) - Credit: Parliament
The extension of Article 50 seems to have lifted a cloud over British politics, the media and public. With a parliamentary recess scheduled to be cancelled going ahead, the nation seemed to be able to focus on other things. Climate change. Notre Dame. Line of Duty. Percy Pigs.
At Westminster, though, things should now be things as usual. The extension is only for another five months. It's a real opportunity for MPs to get forensic on the government's plans and hold their feet to the fire.
Except it seems that MPs have got the taste for thinking about literally anything other than Brexit. And thus, with politics in its most serious peacetime crisis in a century, we got through an entire session of PMQs with just ONE question on it.
And why, come late October when we'll be exactly as we were, in an existential zugzwang, people will ask: what were they doing all that time? And the answer will come: well, the prime minister was answering buffet-ball questions as to whether she will 'continue to focus relentlessly' on schools in rural areas from Ed Vaizey.
It's little wonder the benches were so empty.
May started the session with one of those moments where she pretends to have a sense of humour, noting that her PPS Andrew Bowie (West Aberdeenshire and Kincardine) completed the London Marathon in three hours 40 minutes at the weekend. 'And no, I wasn't chasing him at the time,' she said. You could imagine her being presented with this zinger by her advisor. 'Why would I have been chasing him?,' she would have asked, flummoxed.
She also noted it was the 312th anniversary - an iconic anniversary if ever there was one - of the 'precious' Act of Union between England and Scotland. This was her opportunity to have another pop at the SNP over independence. This is becoming an increasingly occurring theme, as if she is much more comfortable discussing the referendum the UK government actually won.
The main action? Well, after last week's performance from supply teachers David Lidington and Emily Thornberry, we were back to the old routine: Jeremy Corbyn doing his clip for Facebook and May hers for the News At Ten.
'Poverty is up, waiting times are up, violent crime is up, all under a government that seems to care more about pushing its very damaging austerity agenda than tackling the burning social injustices,' said Corbyn.
'Ahead of tomorrow's elections in England, can the prime minister explain that from social care to crime, from life expectancy to poverty, things are getting worse under her government?' Facebook clip: tick.
May: 'The biggest cash boost to the NHS in its history under this Conservative government, more people in work than ever before, more children in good and outstanding schools getting the opportunities for their futures.
'And what do we see from Conservative councils up and down the country? Conservative councils give better services; they recycle more; they fix more potholes and they charge lower taxes.' New At Ten clip? Tick.
And that one Brexit question? It was from SNP Westminster leader Ian Blackford, who noted that the UK government is to cut EU student visas to three years, and that this would have a negative effect on people studying in Scotland as Scottish university courses often run for four years.
He called on May to commit to extending visas to cover this, saying: 'Scottish university courses are generally for four years. The Scottish Government and Scottish universities have asked repeatedly for this simple change to be made to reflect our circumstances.'
May said the SNP should spend more time 'improving the quality of education in Scotland, and less time obsessing about independence'.
And on and on we go to October, fingers in ears, eyes closed and the clock ticking.
|
{
"redpajama_set_name": "RedPajamaCommonCrawl"
}
| 8,532 |
[
128000,
8971,
48,
82,
10506,
25,
578,
832,
449,
279,
4384,
79509,
198,
40917,
3161,
388,
198,
29986,
25,
220,
17,
25,
1313,
5975,
3297,
220,
16,
11,
220,
679,
24,
16459,
25,
220,
23,
25,
1774,
6912,
6250,
220,
972,
11,
220,
2366,
15,
198,
1016,
38686,
3297,
520,
5975,
48,
82,
13,
33255,
25,
4783,
315,
26667,
14,
8201,
13,
482,
16666,
25,
13174,
198,
14364,
5975,
48,
82,
1405,
24854,
20025,
74280,
264,
6420,
13,
15013,
5895,
1455,
37761,
9508,
311,
4822,
3201,
627,
1016,
38686,
3297,
12365,
520,
10461,
13015,
596,
4860,
304,
279,
4783,
315,
26667,
320,
34905,
25,
20302,
8,
482,
16666,
25,
20302,
198,
791,
9070,
315,
13659,
220,
1135,
5084,
311,
617,
30831,
264,
9624,
927,
8013,
11759,
11,
279
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
8971,
48,
82,
10506,
25,
578,
832,
449,
279,
4384,
79509,
198,
40917,
3161,
388,
198,
29986,
25,
220,
17,
25,
1313,
5975,
3297,
220,
16,
11,
220,
679,
24,
16459,
25,
220,
23,
25,
1774,
6912,
6250,
220,
972,
11,
220,
2366,
15,
198,
1016,
38686,
3297,
520,
5975,
48,
82,
13,
33255,
25,
4783,
315,
26667,
14,
8201,
13,
482,
16666,
25,
13174,
198,
14364,
5975,
48,
82,
1405,
24854,
20025,
74280,
264,
6420,
13,
15013,
5895,
1455,
37761,
9508,
311,
4822,
3201,
627,
1016,
38686,
3297,
12365,
520,
10461,
13015,
596,
4860,
304,
279,
4783,
315,
26667,
320,
34905,
25,
20302,
8,
482,
16666,
25,
20302,
198,
791,
9070,
315,
13659,
220,
1135,
5084,
311,
617,
30831,
264,
9624,
927,
8013,
11759,
11,
279,
-100
] |
A 'Change' Is Coming For Bionic
by Remeka Washington-Wint
Bionic is a British producer, singer, and songwriter whose latest single 'Change' was released in the summer. With a little help from Matt Martino who who lends his distinctive vocals on the track, this single is unlike any pop song you've heard before. The London born artist has created a song with punchiness and repetition in the verses that immediately capture an audience, whilst the contrasting and chilled melodic chorus holds your attention as you wait to hear what more the song has to offer.
A notably perfect blend of pop and R&B with a hint of hip-hop influences makes 'Change' a song you want to dance to. After listening more closely to the lyrics, however, you can see how much depth there is to the song. With the potential to comfort you during a heartbreak it could help you through a sad time which is not surprising as it was written about the "personal experiences" and "evolution of a relationship".
Whilst this Bionic track is not the norm for pop music the vibe is comparable to some better-known artists. After hearing 'Change' for the first time it was reminiscent of Bryson Tiller and his first album 'Trapsoul' as well as popular songs from Khalid. To compare all three artists would be unfair but it is possible that they were inspired and heavily influenced by similar musicians during the production of their projects. The soulful vocals over a more complex beat is a welcome change to what is often played on the radio but are just as enjoyable to sing along to.
It will be interesting to hear what Bionic has in store for the future as he is currently working on his upcoming EP. If he continues to go down this path of sonic experimentation things can only get better.
Stream 'Change'.
|
{
"redpajama_set_name": "RedPajamaCommonCrawl"
}
| 1,247 |
[
128000,
32,
364,
4164,
6,
2209,
40991,
1789,
426,
21427,
198,
1729,
5031,
53413,
6652,
13299,
396,
198,
33,
21427,
374,
264,
8013,
17276,
11,
23597,
11,
323,
85757,
6832,
5652,
3254,
364,
4164,
6,
574,
6004,
304,
279,
7474,
13,
3161,
264,
2697,
1520,
505,
13678,
8290,
3394,
889,
889,
79018,
813,
35947,
47196,
389,
279,
3839,
11,
420,
3254,
374,
20426,
904,
2477,
5609,
499,
3077,
6755,
1603,
13,
578,
7295,
9405,
10255,
706,
3549,
264,
5609,
449,
21004,
1918,
323,
54515,
304,
279,
50399,
430,
7214,
12602,
459,
10877,
11,
24797,
279,
75055,
323,
85042,
10804,
53860,
56910,
10187,
701,
6666,
439,
499,
3868,
311,
6865,
1148,
810,
279,
5609,
706,
311,
3085,
627,
32,
35146,
4832,
20955,
315,
2477,
323,
432,
49339,
449,
264
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
32,
364,
4164,
6,
2209,
40991,
1789,
426,
21427,
198,
1729,
5031,
53413,
6652,
13299,
396,
198,
33,
21427,
374,
264,
8013,
17276,
11,
23597,
11,
323,
85757,
6832,
5652,
3254,
364,
4164,
6,
574,
6004,
304,
279,
7474,
13,
3161,
264,
2697,
1520,
505,
13678,
8290,
3394,
889,
889,
79018,
813,
35947,
47196,
389,
279,
3839,
11,
420,
3254,
374,
20426,
904,
2477,
5609,
499,
3077,
6755,
1603,
13,
578,
7295,
9405,
10255,
706,
3549,
264,
5609,
449,
21004,
1918,
323,
54515,
304,
279,
50399,
430,
7214,
12602,
459,
10877,
11,
24797,
279,
75055,
323,
85042,
10804,
53860,
56910,
10187,
701,
6666,
439,
499,
3868,
311,
6865,
1148,
810,
279,
5609,
706,
311,
3085,
627,
32,
35146,
4832,
20955,
315,
2477,
323,
432,
49339,
449,
264,
-100
] |
The Great Parchment Book
Explore the book
Ulster plantation
Book history
Hillhouse of Freehall in Haberdashers' Proportion
Next » « Previous
It would appear that the younger, ambitious sons of English landed gentry and Scottish lairds, who were not going to inherit the family manor, took prominent roles in the various military campaigns and plantations of Ireland, and of North America, in the 17th century. Brian Mitchell looks at one such story concerning the Hillhouse family of Freehall, Limavady, County Londonderry in the Haberdashers' proportion.
Family tradition in the United States records that Samuel Hillhouse, born c.1707, was from Limavady, County Londonderry and came to America as a young man. His parents were John and Rachel and they had a house/estate called Free Hall or Freehall, and his grandfather Abraham came from Failford, Ayrshire, Scotland.
Identifying the location of Freehall
Thomas Raven's map of the county of Londonderry, 1622 (copyright Trustees of Lambeth Palace Library)
During the 17th century Plantation of Ulster, the townland of 'Free Hall or Moneyvennon' in the civil parish of Aghanloo, located three miles northeast of the town of Limavady, County Londonderry, was granted to the Haberdashers' Company of the city of London. Most of the Haberdashers' proportion was located in Aghanloo parish. The castle and bawn of the Habersdashers stood on the River Roe at a place known as Ballycastle which was probably the site of a Norman castle. The Haberdashers built a linear village at Artikelly, one mile from their castle, consisting of one street with two rows of thatched single-storey cottages set in rectangular plots. Freehall was located one mile to the east of the castle at Ballycastle and one mile to the northeast of the village of Artikelly.
Church registers
Church registers of baptisms, marriages, and burials, with their ability to build and confirm family links, are the building blocks of family history. However, to the family historian seeking 17th and 18th century ancestors in Ulster, with a few notable exceptions, church registers are frequently irrelevant, owing to their nonexistence, Unfortunately, there are no surviving 17th or 18th century church registers for Aghanloo Parish.
It is always worth checking the registers of the Church of Ireland (Protestant) Cathedral as it was in effect the parish church of the Diocese, and in the case of the Diocese of Derry that is St. Columb's Cathedral in the city of Londonderry, 16 miles west of Limavady, the registers of which date back to 1642. An examination of its registers of baptisms, marriages and burials (which have been transcribed, indexed and published in three books from 1642 to 1775) reveal seven Hillhouse burial entries (including potential spelling variations of the surname):
Died: 17 November 1700, Mary, daughter of James and Lettis Hillis
Died: 28 August 1702, Henry, son of William and Lettis Hillis
Died: 6 November 1705, Jane, daughter of William and Lettis Hilhous
Died: 4 September 1714, Ann wife of William Hillows
Died: 12 June 1730, Ann, wife of Abraham Hillhouse
Died: 2 June 1730, Forgison, son of Abraham and Ann Hillhouse
Died: 27 May 1732, John Hillhouse
Beyond church registers
A wide range of sources are available, however, and an examination of them confirms that the Hillhouse family were a significant family in the Limavady area throughout the 17th and 18th centuries. Indeed, an examination of these sources reveals that two Hillhouse families were settled in County Londonderry from the early years of the Plantation prior to the1641 Rebellion, one in Freehall, Limavady and the other in Dunboe parish, Coleraine.
Although there is no guarantee that an ancestor made a will or, indeed, that a will has survived, as the bulk of Ireland's pre-1922 testamentary records (wills, administrations, probates, etc.) were lost in the destruction of the Public Record Office of Ireland during the Civil War in 1922, I would always recommend a search of any indexes that exist.
An examination of the Indexes to Irish Wills: Volume V, Derry and Raphoe, 1612-1858 (edited by Gertrude Thrift, Phillimore & Co, London, 1920) identified the following 17th century Hillhouse entries in County Londonderry: Abraham Hillhous, Ardikelly, parish Aghanloo, proved 1676; Adam Hillhous, Dunboe proved 1635.
Hence, it would appear that Abraham Hillhouse died c. 1676 at Ardikelly (spelt as Artikelly today) in the parish of Aghanloo and that an Adam Hillhouse died c. 1635 in Dunboe parish (just to the west of the town of Coleraine). Of course, what this source can't do is tell us the nature of the link, if any, between Abraham of Artikelly and Adam of Dunboe.
Abraham Hillhouse (gentleman) was settled in Limavady by 1639 as the Great Parchment Book for the Haberdashers' Proportion reveals:
On 17 August 1639, the Commissioners concluded and agreed that Robert McLeland, Gavin Kelsoe, Hugh Boyle, Alexander [?], Abraham Hilhouse and John McLeland shall have and hold all those six townlands called Artikelly, [?], Gortamoney, Maheraskeagh, Tullaherrenmore and Tullaherrenbegg in Aghanloo and have one weekly market on Wednesday in the town of Artikelly and three yearly fairs in town of Artikelly.
The minute books of Borough of Limavady
By 1665 Abraham Hillhouse was a serving Burgess of Limavady Corporation and in that same year John Hillhouse and William Hillhouse were 'admitted and sworn Freemen' of Limavady.
Sir Thomas Phillips described as "a pushing soldier of fortune" first arrived in Ireland as a military commander in 1599 and in 1610 he was granted 13,100 acres of land at Limavady which included O'Cahan's castle, on a cliff overhanging the River Roe. One mile from the castle he commenced the building of the "Newtown of Limavady" which was laid out in a cruciform road pattern. By 1622, 18 one-storey houses and an inn had been built centred on the crossroads which contained a flagpole, a cross and stocks.
Newtown-Limavady (known as Limavady from 1870) was incorporated as a town on 31 March 1613 with a charter granted by King James I. According to this Charter the town was to appoint a Provost and 12 Burgesses who were to form the common council or Corporation, and to return two Members of Parliament (which ceased with the Act of Union which created, in 1801, the United Kingdom of Great Britain and Ireland).
Corporation records, the minute books of the Common Council of Limavady Corporation, date from 1659. Each set of minutes begins with date of the meeting of the Common Council and list of members in attendance. Edited abstracts from these minute books have been transcribed and published in Records of the Town of Limavady, 1609 to 1808 by E. M. F-G Boyle (published 1912, republished as Boyle's Records of Limavady, 1609 to 1808 by North-West Books, Limavady, 1989). The following Hillhouse references are recorded:
Corporation Meeting of 24 June 1665: In attendance, Abraham Hillhouse, Burgess of the Corporation of Newtown-Limavady; John Hillhouse and William Hillhouse were 'admitted and sworn Freemen'.
Corporation Meeting of 24 June 1696: William Hillhouse sworn Freeman.
Corporation Meeting of 29 September 1708: William Hillhouse sworn Freeman.
Corporation Meeting of 14 October 1718: In attendance, William Hillhouse, Constable.
The Registry of Deeds
An examination of the records of the Registry of Deeds confirm that the Hillhouse family were still residing at Freehall, near Limavady in the middle years of the 18th century. In 1745 the estate of Freehall passed from Abraham Hillhouse to his son Abraham James Hillhouse, who was a merchant in London, and a marriage settlement, dated 1717, shows that Abraham Hillhouse of Freehall married Ann Ferguson, daughter of Reverend Andrew Ferguson of Burt, County Donegal.
Thomas Raven's plan of Londonderry ca. 1622 (copyright Trustees of Lambeth Palace Library)
In 1641 the Plantation of Ulster faced its first serious crisis. On 22 October 1641 the native Irish, under Sir Phelim O'Neill, rose in rebellion in the counties of Londonderry and Tyrone, and the walled city of Londonderry became a refuge for Protestant settlers. A "League of the Captains of Londonderry" was set up to guard the city, with the raising of nine companies of foot soldiers, each assigned with a particular section of the walls of Derry to repair and to defend. By April 1642 the city was close to starvation, with the rebel forces led by Sir Phelim O'Neill camped at Strabane. However, the threatened siege of Derry was lifted on 17 May 1642 by the defeat of the Irish army, led by the O'Cahans (O'Kanes), near Dungiven, County Derry by an army consisting of east Donegal settlers and four companies of soldiers from Derry city.
A fully searchable digital edition of the 1641 Depositions at Trinity College Dublin Library can be searched at http://1641.tcd.ie. The 1641 Depositions consist of transcripts and images of all 8,000 depositions, examinations and associated materials in which Protestant men and women of all classes told of their experiences following the outbreak of the rebellion by the Catholic Irish in October 1641.
A surname search of 'Hilhouse' records four depositions relating to the death of John Hilhouse of Gortycavan in Dunboe Parish, County Derry, three miles west of the town of Coleraine.
Seemingly, after defeating and killing a party of English and Scottish men garrisoned at Garvagh, County Londonderry about 20 December 1641, Rory Duffe McCormacke and his brothers Art and Edmund McCormacke and about 30 to 40 men armed with long pikes set upon the British at 'Gortecavan in the parish of Dunboe' and killed John Hilhouse.
It is possible, but not proven, that John Hilhouse of Gortycavan, Dunboe parish, who died during the 1641 Rebellion, was the son of Adam Hilhous of Dunboe whose will was proved in 1635.
Fighters of Derry
Nearly fifty years later the Plantation of Ulster faced another potential reversal to its fortunes in the events surrounding the 1689 Siege of Derry, and a Captain Abraham Hillhouse of Coleraine is recorded as a 'defender' of Derry.
William R. Young's Fighters of Derry Their Deeds and Descendants: Being a Chronicle of Events in Ireland during the Revolutionary Period 1688-1691 (published by Eyre and Spottiswoode, London, 1932) is a unique and unrivalled source for tracing 17th century Plantation of Ulster ancestors. This book names and, in many cases, provides biographical detail of 1660 "Defenders" and 352 officers of the "Jacobite Army".
'Defenders' refers to all those people who were named in contemporary sources and accounts as playing an active or supportive role in the successful Williamite campaign of 1689 to 1691, which included the Siege of Derry of 1689.
The Williamite War in Ireland, 1689-1691, was, in effect, the struggle for the English throne between the deposed James II, the last Catholic monarch of the three Kingdoms of England, Scotland and Ireland who had the support of Louis XIV of France, and William of Orange with the backing of the English Parliament.
Young's book names the prominent supporters of Protestant interests throughout Ireland at this time, including those named on list of attainted in James's Dublin parliament. James II's Parliament, which met in Dublin on 7 May 1689 and sat for three weeks, passed 'The Bill of Attainder' which confiscated estates and condemned without trial over 2,500 persons, of whom 921 were from Ulster, of high treason. This book lists:
Defender 739: 'Captain Abraham Hillhouse, of Coleraine, defender, so described, is among the attainted in James' Dublin Parliament, and his signature is on the address to King William after the relief' [after the lifting of the Siege of Derry of 1689].
Condemnation of assassination attempt on William III in 1696
In the Corporation of Londonderry minute book of 16 April 1696 (pp132-133, Volume 2, January 1688 to 20 July 1704) are tabulated in three columns, the names of 226 citizens of the city of Londonderry who signed a resolution expressing condemnation of the plot to assassinate King William. A James Hillhouse was recorded as one of these signatories.
William III ruled jointly, from 1689, with his wife, Mary II, until her death on 28 December 1694. There was a considerable surge in support for William, who reigned as King of England, Scotland and Ireland until his death on 8 March 1702, following the exposure of a Jacobite plan to assassinate him in 1696.
The Corporation of Londonderry minute books, which date from 1673, can be browsed online at https://www.nidirect.gov.uk/information-and-services/search-archives-online/londonderry-corporation-records.
Local history publications
Local history publications can provide a wealth of material on the history of families and of place. Charles Knowles Bolton in Scotch Irish Pioneers in Ulster and America (first published in 1910), on page 113, writes:
"The Rev. James Hillhouse was born about 1688, the son of John and Rachel Hillhouse, owners of a large estate called Freehall, in County Londonderry. He studied at Glasgow under the famous Professor Simson and was ordained by Derry presbytery October 15, 1718. Coming to America in 1720, he was called to a church in the second parish of New London in 1722, where he died December 15, 1740. His son William was a member of the Continental Congress, and William's son James was a Senator of the United States."
With all this information the following family tree linking the Hillhouse family in Scotland, Ireland and America can be constructed:
It is well known that many people from Scotland migrated to Ulster throughout the 17th century and that many of their descendants settled for a few years or a few generations in Ireland before emigrating to North America in the 18th century.
It is claimed that 56% of Americans with Irish roots are of Protestant stock, whose roots in many cases can be traced back to the Scots-Irish (also known as Ulster-Scots) who settled on the frontier of colonial America in the 18th century – Pennsylvania, Virginia and the Carolinas. Potentially some 20 million Americans today have Scots-Irish origins.
Compiled by Brian Mitchell, Derry Genealogy, www.derry.rootsireland.ie
Design by Headscape
The Great Parchment Book project is led by London Metropolitan Archives which is managed by the City of London Corporation as part of its contribution to the heritage and cultural life of London and the nation. © 2012 London Metropolitan Archives
|
{
"redpajama_set_name": "RedPajamaCommonCrawl"
}
| 2,232 |
[
128000,
791,
8681,
393,
1132,
479,
6017,
198,
52361,
279,
2363,
198,
92159,
3751,
83052,
198,
7280,
3925,
198,
39,
484,
7830,
315,
3658,
43341,
304,
29976,
14685,
1003,
388,
6,
1322,
15750,
198,
5971,
8345,
12769,
30013,
198,
2181,
1053,
5101,
430,
279,
14992,
11,
32855,
26419,
315,
6498,
27212,
342,
4177,
323,
27188,
1208,
2668,
82,
11,
889,
1051,
539,
2133,
311,
24683,
279,
3070,
893,
269,
11,
3952,
21102,
13073,
304,
279,
5370,
6411,
21343,
323,
6136,
811,
315,
14990,
11,
323,
315,
4892,
5270,
11,
304,
279,
220,
1114,
339,
9478,
13,
17520,
31038,
5992,
520,
832,
1778,
3446,
18815,
279,
8270,
7830,
3070,
315,
3658,
43341,
11,
13903,
402,
7759,
11,
6406,
80693,
2159,
5515,
304,
279,
29976,
14685,
1003,
388,
6,
21801
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
791,
8681,
393,
1132,
479,
6017,
198,
52361,
279,
2363,
198,
92159,
3751,
83052,
198,
7280,
3925,
198,
39,
484,
7830,
315,
3658,
43341,
304,
29976,
14685,
1003,
388,
6,
1322,
15750,
198,
5971,
8345,
12769,
30013,
198,
2181,
1053,
5101,
430,
279,
14992,
11,
32855,
26419,
315,
6498,
27212,
342,
4177,
323,
27188,
1208,
2668,
82,
11,
889,
1051,
539,
2133,
311,
24683,
279,
3070,
893,
269,
11,
3952,
21102,
13073,
304,
279,
5370,
6411,
21343,
323,
6136,
811,
315,
14990,
11,
323,
315,
4892,
5270,
11,
304,
279,
220,
1114,
339,
9478,
13,
17520,
31038,
5992,
520,
832,
1778,
3446,
18815,
279,
8270,
7830,
3070,
315,
3658,
43341,
11,
13903,
402,
7759,
11,
6406,
80693,
2159,
5515,
304,
279,
29976,
14685,
1003,
388,
6,
21801,
-100
] |
The Super Visa is a multiple entry visa valid for up to 10 years, which will allow family members to remain in Canada for up to 24 months at a time. The visa is conditional on a number of requirements, one of which is a proof of private medical insurance coverage.
Immigration for Parents and Grandparents is now easier than ever !!
Are you aware of the recently launched Canadian Super Visa intended to speedily unite families of Immigrants?
Learn how we can help with your Super Visa requirements.
24 Feb- 2012- New Legislation on immigration reforms proposed.
|
{
"redpajama_set_name": "RedPajamaC4"
}
| 6,410 |
[
128000,
791,
7445,
44434,
374,
264,
5361,
4441,
27753,
2764,
369,
709,
311,
220,
605,
1667,
11,
902,
690,
2187,
3070,
3697,
311,
7293,
304,
7008,
369,
709,
311,
220,
1187,
4038,
520,
264,
892,
13,
578,
27753,
374,
35787,
389,
264,
1396,
315,
8670,
11,
832,
315,
902,
374,
264,
11311,
315,
879,
6593,
8276,
10401,
627,
51839,
5141,
369,
44026,
323,
10517,
26534,
374,
1457,
8831,
1109,
3596,
758,
4999,
11787,
499,
8010,
315,
279,
6051,
11887,
12152,
7445,
44434,
10825,
311,
4732,
1570,
52696,
8689,
315,
15695,
71336,
5380,
24762,
1268,
584,
649,
1520,
449,
701,
7445,
44434,
8670,
627,
1187,
13806,
12,
220,
679,
17,
12,
1561,
73067,
389,
15443,
31343,
11223,
13,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0
] |
[
791,
7445,
44434,
374,
264,
5361,
4441,
27753,
2764,
369,
709,
311,
220,
605,
1667,
11,
902,
690,
2187,
3070,
3697,
311,
7293,
304,
7008,
369,
709,
311,
220,
1187,
4038,
520,
264,
892,
13,
578,
27753,
374,
35787,
389,
264,
1396,
315,
8670,
11,
832,
315,
902,
374,
264,
11311,
315,
879,
6593,
8276,
10401,
627,
51839,
5141,
369,
44026,
323,
10517,
26534,
374,
1457,
8831,
1109,
3596,
758,
4999,
11787,
499,
8010,
315,
279,
6051,
11887,
12152,
7445,
44434,
10825,
311,
4732,
1570,
52696,
8689,
315,
15695,
71336,
5380,
24762,
1268,
584,
649,
1520,
449,
701,
7445,
44434,
8670,
627,
1187,
13806,
12,
220,
679,
17,
12,
1561,
73067,
389,
15443,
31343,
11223,
13,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100
] |
Price is not the only factor to consider when buying Harpix Hand Ball Klister, the fast delivery from Sportaid is a crowd pleaser!
If you considering serious racing, you have got to get Harpix Hand Ball Klister. Real racers apply Harpix Hand Ball Klister to handrims and gloves in order to help avoid slipping when wheeling in wet conditions. Available 100ml Tub.
|
{
"redpajama_set_name": "RedPajamaC4"
}
| 4,333 |
[
128000,
7117,
374,
539,
279,
1193,
8331,
311,
2980,
994,
12096,
5340,
36584,
8704,
13131,
29041,
1601,
11,
279,
5043,
9889,
505,
18707,
3864,
374,
264,
13734,
7245,
12351,
4999,
2746,
499,
13126,
6129,
22019,
11,
499,
617,
2751,
311,
636,
5340,
36584,
8704,
13131,
29041,
1601,
13,
8976,
9148,
388,
3881,
5340,
36584,
8704,
13131,
29041,
1601,
311,
1450,
81,
5861,
323,
36516,
304,
2015,
311,
1520,
5766,
64802,
994,
13587,
287,
304,
14739,
4787,
13,
16528,
220,
1041,
1029,
40640,
13,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0
] |
[
7117,
374,
539,
279,
1193,
8331,
311,
2980,
994,
12096,
5340,
36584,
8704,
13131,
29041,
1601,
11,
279,
5043,
9889,
505,
18707,
3864,
374,
264,
13734,
7245,
12351,
4999,
2746,
499,
13126,
6129,
22019,
11,
499,
617,
2751,
311,
636,
5340,
36584,
8704,
13131,
29041,
1601,
13,
8976,
9148,
388,
3881,
5340,
36584,
8704,
13131,
29041,
1601,
311,
1450,
81,
5861,
323,
36516,
304,
2015,
311,
1520,
5766,
64802,
994,
13587,
287,
304,
14739,
4787,
13,
16528,
220,
1041,
1029,
40640,
13,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100
] |
Q: Evaluate $\lim\limits_{n \to \infty}\sum\limits_{k=0}^n \dfrac{\sqrt{n}}{n+k^2}(n=1,2,\cdots)$ I tried to change it into a Riemann sum but failed, since
\begin{align*}
\lim_{n \to \infty}\sum_{k=0}^n \frac{\sqrt{n}}{n+k^2}=\lim_{n \to \infty}\frac{1}{n}\sum_{k=0}^n \frac{\sqrt{n}}{1+(k/\sqrt{n})^2}
,\end{align*}
which is not a standard form. Maybe, it need apply the squeeze theorem, but how to evaluate the bound.
By the way, WA gives its result
\begin{align*}
\lim_{n \to \infty}\sum_{k=0}^n \frac{\sqrt{n}}{n+k^2}=\frac{\pi}{2}.
\end{align*}
A: Integral bounds do the job: $$\int_k^{k+1} \frac{1}{n+t^2} dt \leq \frac{1}{n+k^2}\leq \int_{k-1}^{k} \frac{1}{n+t^2} dt$$
Summing the left-hand side inequalities for $k\in \{0,\ldots,n\}$ and the right-hand side inequalities for $k\in \{1,\ldots,n\}$ yields
$$\int_0^{n+1}\frac{1}{n+t^2} dt \leq \sum_{k=0}^n \frac{1}{n+k^2} \leq \frac 1n + \int_{0}^{n} \frac{1}{n+t^2}$$
that is
$$\frac{1}{\sqrt{n}}\arctan\left(\frac{n+1}{\sqrt n}\right)\leq \sum_{k=0}^n \frac{1}{n+k^2} \leq \frac 1n + \frac{1}{\sqrt{n}}\arctan\left(\frac{n}{\sqrt n}\right)$$
Multiplying by $\sqrt n$ and squeezing yields
$$\lim_n \sqrt n \sum_{k=0}^n \frac{1}{n+k^2} = \lim_n \arctan\left(\frac{n}{\sqrt n}\right) = \frac \pi 2$$
A: $$\lim_{n\to\infty} \sum_{k=0}^n \frac{\sqrt{n}}{n+k^2}=\lim_{n\to\infty} \frac{1}{n}\sum_{k=0}^n\frac{\sqrt{n}}{1+(k/\sqrt{n})^2}$$
Now make the substitution $n=m^2$, so that we have
$$\lim_{n\to\infty} \frac{1}{m}\sum_{k=0}^n\frac{1}{1+(k/m)^2} $$
which is equal to
$$\lim_{x\to\infty }\lim_{m\to\infty} \sum_{k=0}^{mx}\frac{x}{mx}\frac{1}{1+(kx/mx)^2} =\lim_{x\to\infty }\int_0^x \frac{dk}{1+k^2}=\int_0^\infty \frac{dk}{1+k^2}$$
which is, of course, equal to $\frac{\pi}{2}$.
A: you could let: $n\rightarrow n^2$ then we get:
$$L=\lim_{n\to\infty}\sum_{k=1}^\infty\frac{n}{n^2+k^2}$$
and we know that:
$$\frac{1}{n^2+k^2}\le\frac{n}{n^2+k^2}\le\frac{n^2}{n^2+k^2}$$
Now from here we can see that:
$$\sum_{k=-\infty}^\infty\frac{1}{k^2+a^2}=\frac\pi a\coth(\pi a)$$
and notice that:
$$\sum_{k=-\infty}^\infty=\sum_{k=-\infty}^{-1}+f(0)+\sum_{k=1}^\infty,\,\,\sum_{k=-\infty}^{-1}=\sum_{k=1}^\infty$$
and so:
$$\sum_{k=1}^\infty\frac{1}{k^2+a^2}=\frac12\left[\frac\pi a\coth(\pi a)-\frac1{a^2+1}\right]$$
This gives us:
$$\frac12\left[\frac\pi n\coth(\pi n)-\frac1{n^2+1}\right]\le\sum_{k=1}^\infty\frac{n}{n^2+k^2}\le\frac12\left[\pi n\coth(\pi n)-\frac{n^2}{n^2+1}\right]$$
Hope this is correct!, Although I don't think the bounds are particularly tight
A: We make a substitution $t^2=k $,
$$\lim_{n \to \infty}\sum_{t=0}^\sqrt {n} \frac{\sqrt{n}}{n+t}=\lim_{n \to \infty}\sum_{t=0}^\sqrt {n} \frac{1}{1+\frac{t}{\sqrt{n}}} \frac {1} {\sqrt{n}} $$
In a normal Riemann Transformation I would replace $\frac {1}{n}$ with $dx $ (where $x= \frac {t}{n}$) but since we have $\frac {1}{\sqrt {n}}$ we would replace it with $2dx $ (where $x= \frac {t}{\sqrt {n}}$)
Hence the limit becomes
$$2 \int_ 0^1 \frac {1}{1+x^2}\,dx = \frac {\pi}{2}$$
|
{
"redpajama_set_name": "RedPajamaStackExchange"
}
| 9,035 |
[
128000,
48,
25,
55215,
59060,
4763,
59,
42178,
15511,
77,
1144,
998,
1144,
258,
38058,
11281,
1264,
59,
42178,
15511,
74,
28,
15,
92,
61,
77,
1144,
67,
38118,
36802,
27986,
92462,
3500,
90,
77,
46555,
61,
17,
26628,
77,
28,
16,
11,
17,
27362,
4484,
2469,
15437,
358,
6818,
311,
2349,
433,
1139,
264,
432,
27960,
1036,
2694,
719,
4745,
11,
2533,
720,
59,
7413,
90,
6750,
9,
534,
59,
4763,
15511,
77,
1144,
998,
1144,
258,
38058,
11281,
1264,
15511,
74,
28,
15,
92,
61,
77,
1144,
38118,
36802,
27986,
92462,
3500,
90,
77,
46555,
61,
17,
92,
35533,
4763,
15511,
77,
1144,
998,
1144,
258,
38058,
11281,
38118,
90,
16,
15523,
77,
11281,
1264,
15511,
74,
28,
15,
92,
61,
77,
1144,
38118,
36802,
27986
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
48,
25,
55215,
59060,
4763,
59,
42178,
15511,
77,
1144,
998,
1144,
258,
38058,
11281,
1264,
59,
42178,
15511,
74,
28,
15,
92,
61,
77,
1144,
67,
38118,
36802,
27986,
92462,
3500,
90,
77,
46555,
61,
17,
26628,
77,
28,
16,
11,
17,
27362,
4484,
2469,
15437,
358,
6818,
311,
2349,
433,
1139,
264,
432,
27960,
1036,
2694,
719,
4745,
11,
2533,
720,
59,
7413,
90,
6750,
9,
534,
59,
4763,
15511,
77,
1144,
998,
1144,
258,
38058,
11281,
1264,
15511,
74,
28,
15,
92,
61,
77,
1144,
38118,
36802,
27986,
92462,
3500,
90,
77,
46555,
61,
17,
92,
35533,
4763,
15511,
77,
1144,
998,
1144,
258,
38058,
11281,
38118,
90,
16,
15523,
77,
11281,
1264,
15511,
74,
28,
15,
92,
61,
77,
1144,
38118,
36802,
27986,
-100
] |
Built in 2008, with a variety of one-, two- and three-bedroom apartments.
Occupancy limited to one person per bedroom.
Internet included. Please note that this not wireless – there are wall hook-ups. If you want wireless connectivity in your apartment, you will need to purchase a wireless router and an Ethernet cord.
Total electric apartments. Resident is responsible for electric, water, cable and phone.
Combination of ceramic tile, carpet and Konecto flooring.
Covered, reserved parking in an underground garage available to residents for $700 per year per space. Residents of two- and three-bedroom apartments may be assigned to stacked parking.
Street parking is available. Residents must obtain a parking permit from the City of Bloomington.
Lawn care and snow removal.
Video security system in common areas.
Two blocks south of IU campus and three blocks south of Kirkwood Avenue.
320 S Dunn: 1 Bedroom - 1 Bath 650-755 sq. ft.
320 S Dunn: 1 Bedroom - 1 Bath w/porch 684 sq. ft.
320 S Dunn: 1 Bedroom - 1 Bath w/patio 750 sq. ft.
320 S Dunn: 2 Bedrooms - 2 Baths 1,116 sq. ft.
320 S Dunn: 3 Bedrooms - 3 Baths Flat 1,423 sq. ft.
320 S Dunn: 3 Bedrooms - 3 Baths Flat 1,585 sq. ft.
320 S Dunn: 3 Bedrooms - 3 Baths Townhouse 1,630-1,650 sq. ft.
|
{
"redpajama_set_name": "RedPajamaC4"
}
| 8,724 |
[
128000,
55400,
304,
220,
1049,
23,
11,
449,
264,
8205,
315,
832,
37619,
1403,
12,
323,
2380,
67967,
32729,
627,
65068,
6709,
7347,
311,
832,
1732,
824,
14150,
627,
36779,
5343,
13,
5321,
5296,
430,
420,
539,
21401,
1389,
1070,
527,
7147,
9903,
27859,
13,
1442,
499,
1390,
21401,
31357,
304,
701,
13455,
11,
499,
690,
1205,
311,
7782,
264,
21401,
9457,
323,
459,
46508,
23125,
627,
7749,
9249,
32729,
13,
60776,
374,
8647,
369,
9249,
11,
3090,
11,
14994,
323,
4641,
627,
37292,
2617,
315,
43124,
10228,
11,
28954,
323,
24277,
440,
78,
37248,
627,
31996,
291,
11,
4694,
13217,
304,
459,
26326,
19833,
2561,
311,
11062,
369,
400,
7007,
824,
1060,
824,
3634,
13,
64348,
315,
1403,
12,
323,
2380,
67967,
32729,
1253,
387,
12893,
311
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
55400,
304,
220,
1049,
23,
11,
449,
264,
8205,
315,
832,
37619,
1403,
12,
323,
2380,
67967,
32729,
627,
65068,
6709,
7347,
311,
832,
1732,
824,
14150,
627,
36779,
5343,
13,
5321,
5296,
430,
420,
539,
21401,
1389,
1070,
527,
7147,
9903,
27859,
13,
1442,
499,
1390,
21401,
31357,
304,
701,
13455,
11,
499,
690,
1205,
311,
7782,
264,
21401,
9457,
323,
459,
46508,
23125,
627,
7749,
9249,
32729,
13,
60776,
374,
8647,
369,
9249,
11,
3090,
11,
14994,
323,
4641,
627,
37292,
2617,
315,
43124,
10228,
11,
28954,
323,
24277,
440,
78,
37248,
627,
31996,
291,
11,
4694,
13217,
304,
459,
26326,
19833,
2561,
311,
11062,
369,
400,
7007,
824,
1060,
824,
3634,
13,
64348,
315,
1403,
12,
323,
2380,
67967,
32729,
1253,
387,
12893,
311,
-100
] |
Our top priority at Mayfair is to provide homeowners in the Greater Toronto Area with top-quality service and window coverings. Whether you're ordering stylish drapes for your house or a set of shades for your downtown condo to help keep the sun out, our experts will work with you from start-to-finish to ensure you are satisfied with our service. On this page, you'll find testimonials from some of our customers about their experience with Mayfair.
Send us an email with your own review today to let us know how we did!
I recently had shades installed in two of my condo rooms and am thrilled with the final look. Mark gave professional, no pressure advice and was courteous and listened to my wishes. Jim's installation and instructions regarding the use of shades was second to none. I recommend Mayfair to anyone who wants quality products and courteous service!
"My parents have used Mayfair Drapery for many years so I decided to have our Living Room window treatments completed. As I expected, the final result is not only practical, but it put the finishing touches on the room."
"We have just had Mayfair Drapery finish wall-to-wall broadloom for our living room, hall and stairs, plus new living room window treatments. The job looks fantastic and the service was excellent. We have already recommended Mayfair to neighbours and friends."
"Mark Teskey rocks. Of course he knows me by a different last name, but I've just got to say, bishops sleeves on my mirrored dining room wall...so fabulous. I love what he did in my living room. The best ideas and outstanding workmanship."
"Installation and service was excellent. Extremely pleased with the "clean" look of the shutters. Received excellent advice deciding on the right material with a knowledgeable staff, making it much easier to decide what was right for my home."
"My wife and I retained Mayfair to install custom blinds for a portion of my home. Great workmanship, fabric and service (execution). The final product was excellent."
|
{
"redpajama_set_name": "RedPajamaC4"
}
| 5,945 |
[
128000,
8140,
1948,
10844,
520,
3297,
42000,
374,
311,
3493,
40962,
304,
279,
33381,
14974,
12299,
449,
1948,
22867,
2532,
323,
3321,
3504,
826,
13,
13440,
499,
2351,
22106,
32461,
1377,
9521,
369,
701,
3838,
477,
264,
743,
315,
37199,
369,
701,
19441,
44200,
311,
1520,
2567,
279,
7160,
704,
11,
1057,
11909,
690,
990,
449,
499,
505,
1212,
4791,
2269,
18675,
311,
6106,
499,
527,
20097,
449,
1057,
2532,
13,
1952,
420,
2199,
11,
499,
3358,
1505,
84610,
505,
1063,
315,
1057,
6444,
922,
872,
3217,
449,
3297,
42000,
627,
11764,
603,
459,
2613,
449,
701,
1866,
3477,
3432,
311,
1095,
603,
1440,
1268,
584,
1550,
4999,
40,
6051,
1047,
37199,
10487,
304,
1403,
315,
856,
44200,
12295,
323,
1097,
38564,
449,
279,
1620,
1427,
13,
4488
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
8140,
1948,
10844,
520,
3297,
42000,
374,
311,
3493,
40962,
304,
279,
33381,
14974,
12299,
449,
1948,
22867,
2532,
323,
3321,
3504,
826,
13,
13440,
499,
2351,
22106,
32461,
1377,
9521,
369,
701,
3838,
477,
264,
743,
315,
37199,
369,
701,
19441,
44200,
311,
1520,
2567,
279,
7160,
704,
11,
1057,
11909,
690,
990,
449,
499,
505,
1212,
4791,
2269,
18675,
311,
6106,
499,
527,
20097,
449,
1057,
2532,
13,
1952,
420,
2199,
11,
499,
3358,
1505,
84610,
505,
1063,
315,
1057,
6444,
922,
872,
3217,
449,
3297,
42000,
627,
11764,
603,
459,
2613,
449,
701,
1866,
3477,
3432,
311,
1095,
603,
1440,
1268,
584,
1550,
4999,
40,
6051,
1047,
37199,
10487,
304,
1403,
315,
856,
44200,
12295,
323,
1097,
38564,
449,
279,
1620,
1427,
13,
4488,
-100
] |
Posted inPolitics and Movements: US, Real News Daily Reports
Chuck D and DMC on hip hop and America Pt1
by Chuck D June 6, 2009 September 23, 2020
In a series of groundbreaking interviews produced by TRNN, Chuck D interviews fellow rap artists DMC and Joost about politics, the economy and their music while bringing African American history and music into context. Together we explore the current state of rap music and its societal impact.
CHUCK D, RAPTAVIST, MEMBER OF PUBLIC ENEMY: Chuck D for The Real News Network. This is On The Real Off The Record. Hey, I really—you know, I could be speechless because there's so much to say about this brother who's an icon, you know, my idol. He's just, like, one of the greatest MCs to ever touch the microphone. And since we're in a time and a day where people kind of look at hip hop icons or they look at the hip hop art form as being the art form around the whole entire planet, you would be remiss to not even think that Run-D.M.C. is the reason that we're all here. It's the reason I'm here. And I'd like to, you know, just tell you that D.M.C. is in the house, my brother.
D.M.C.: Yeah, it's the only place to be, Chuck D.
CHUCK D: D.M.C. in the place to be. In this time and day, you know, President Barack Obama asking for accountability and responsibility, and people looking at hip hop and rap music as being this great communicator—.
Music Clip: Public Enemy, "Black is Back"
So what they got you think is hot
But the real things in life your soul forgot
Don't hear it on the radio or MTV
And I damn don't know about B.E.T.
We got to get them straight
CHUCK D: I've never heard MCs or rappers actually talking about real things that real people want to hear to real people.
D.M.C.: [inaudible] Well, first of all, you've got a lot of people in the business, those certain MCs who are probably 25 and up, but they're acting and dressing like children. So when Chuck D shows up and speaks on the issues of life, you know, politics, economics, family, education, or when D.M.C. does it, or when KRS-One does it, or, you know, even when somebody like Nas does it, or, you know, especially when Afrika Bambaataa or you hear Flash and them do it, when I go and speak to kids—I go to colleges and I go to high schools, and recently I started going to the middle schools, which is crazy, speaking to the, you know, sixth graders and—.
CHUCK D: And seventh and eighth.
D.M.C.: Yeah, that's really big there. But a lot of the kids—and, also, a lot of them are so-called "younger peers" of this new generation of hip hop—they look at me and go, "D.M.C., you're just saying that because, you know, you're 40 years old now, you've been in hip hop for 25 years, and, you know, you're more educated and more mature." And I've got to look at these young brothers and sisters and say, you know, "That may be true, but I've been saying this since I was 12 years old."
CHUCK D: Right.
D.M.C.: They don't know that most of the great rappers who, when you say "hip hop", the first names and ideas in music and images come in your head, they don't know that most of those rappers have been writing like this since they were probably 12 to no older than, let's say, 23 years old. You know. And what's bad about this situation with this hip hop music is when you have the executives or the music business people go, "Hip hop is a young person's music," and, you know, you've got people in the game who is doing hip hop going, you know, "When I hit 30, 35 years old, I won't even be doing hip hop anymore." I think what happened over the years is that they took the value of what hip hop meant to the audience and they threw it in the gutter. I mean, even before hip hop records was made, when you stepped to that microphone, you knew you had a responsibility. You know, you look at Rakim, he could have made a record that said, "I'm Rakim Allah, stick-up kid, and I do all of this," and he could have probably sold 16 million records, you know, the way some of these artists who talk about those certain issues and conditions in our society. But he said, "I used to roll up, 'This is a hold up.'" So all the stick-up kids and the drug dealers, that was even more inspiring to them, because here is a guy that is rocking the mic, who is like a god to them, who's talking about the things that we do or we had to do just to get by. There's a guy that did it, but hes' talking about it in a positive way. So these guys were inspired. They say, "Yo, that's real cool." But it's different, because the corporations or the companies or the media don't realize that hip hop has a sacredness to it, and it was always about responsibility.
CHUCK D: On all parts, because, you know, we were talking, you know, earlier off-camera, and we said what the difference is is that when somebody like Jay-Z says he used to sell crack, in the media, and everybody looking to do their particular job, for whatever it might be, will up-play that; instead of, you know, up-playing the positive aspect, they'll go back. And whereas somebody like Rakim might have said this is what he used to do, there was always a surrounding care and concern around hip hop that says, yeah, we know that, but we won't up-play that.
D.M.C.: Exactly. That exactly. If Rakim said that now, they would only focus on "He's the stick-up kid," and they would only go at him for more stick-up kid business and the dirt and crime. Like, when I said, "I'm D.M.C. in the place to be. I go to St. John's University," they don't focus on that.
Music clip: Sucker Mc's, Graffiti Rock, 1984
CHUCK D: It sent so many people to college. It sent so many people to St. John's.
D.M.C.: Right. I was just—but I was just going to say that, because if there's an instance I'm on the radio and they do the call-in and say, "Yo, man, I'm from LA. And just for you and Run saying it—you didn't preach it—just for you and Run saying that, man, I dropped out the gang, I stopped selling drugs. I went and got a GED. I went and got a GED, and I got into community college, and I realized there was a whole world of opportunity that existed for me." And he said, "That was because of hip hop. Man, I'm in a million-dollar house with [inaudible] outside. That's just for you saying that." But when I look at Time Magazines and Forbes, they'll write about a rapper, "a former crack dealer turned CEO of his own company," and they'll play up this crack, and they'll talk about how many bricks he cooked. And then the rapper's still rapping about the bricks that he cooked and stuff like that. They don't realize, like you said, this guy gots a million people looking at him. And for me it's not a personal attack on these artists, or it's not against—I don't even know them personally. But when they write, "former crack dealer who is now CEO," it makes these kids in the hood saying, "It's okay to sell crack, 'cause I could be famous," which is contrary—that's not true.
CHUCK D: And it's the bread crumbs that leave that, and anybody that thinks that they want to be an MC, which used to be, like, "Okay, I'll tell the truth. I have these dreams ever since, you know, rap was alive, if you wanted to go back to records, you know, like, "Hotel, motel, Holiday Inn."
D.M.C.: But he wanted a Lincoln Continental and a pool.
CHUCK D: Right, he wanted those things, and he didn't try to figure it out, you know, but dealt with the truth.
D.M.C.: But you knew there was a standard.
CHUCK D: Right. Right.
D.M.C.: You knew, okay, for me to be a rapper, I've got to clean up my act. I've got to say something positive. You know what I'm saying?
CHUCK D: Can't use the same word over and over again.
D.M.C.: Over and over. It's like this. If you make a record about a gun with hip hop—I don't care about any other music—if you make a record about a gun, you have to, because it's hip hop—and the record companies, they need to hear this, and the artists today need to—if you make a record about a gun, you have to make a record about not using a gun. If you make a record about a bitch and a ho, you have to make a record about Ms. McGillicutty, because a lot of these rappers, they'll use the excuse, "Man, we only rap about what we see." I don't care if it's a dirt-poor ghetto in Little Rock, Arkansas, growing up, you knew there was that one lady who got up every morning, went to the bus stop, rode two hours to clean a house, and came back. She sent all her kids to college. Rapper man, your responsibility is to rap about that.
CHUCK D: 'Cause you see that—not only do you see that, but you know that. And so you're saying that, you know, these elements surrounding over the last 25 years has led [to] a lot of rappers who basically might believe one thing but feel like they're forced to say another.
D.M.C.: Exactly. That's what's happening. And we didn't want, really, public approval. It's like, you know, a lot of rappers say, "Man, I just do that 'cause that's what the people want. You know, I've got to get people to like me." We didn't want you to like me. For instance, there's something you said earlier. When we used to walk the line to go to the MTV Music Awards, like, I was sitting—a couple of years ago, I was sitting there downstairs with a young white kid. He knows Dr. Dre, he knows Jay-Z, he knows Run-D.M.C., but he also knows Led Zeppelin and he loves Rick Rubin. So we're sitting there watching the VMAs when it first went to Miami. So I'm sitting there, 'cause I was talking about him producing some music for me. And he goes, "D.M.C, what do you think about this? Is this what hip cop came to? And what do you think about this?" And, you know, I don't pay attention to MTV, 'cause there's nothing there for me. And I'm looking, and I'm looking, and I'm like, wow, this is crazy, because I'm watching the VJ go—you've got the superstars coming up—Game, and 50, and Ludacris, [inaudible] Diddy, and everybody. And they're coming up the ramp, the red carpet, and they've got their cars to do the hopping and rims and stuff like that. And the VJ runs up to them and goes, "Hey, man, what kind of rims is that on your car?" and he does like this. And then a rapper answers him! And then he goes, "Hey, man, what kind of jewels is them?" "Man, this is my Jacob now." If you look at hip hop, even when they try to tease us, when they [inaudible] do a comedy, they'll have the three-striped Adidas suits, Adidas, the Gazelles, the whole Run-D.M.C. look. But they're doing that, even though they're teasing, there's a respect there, because this is good. It's the standard. This is the standard. And I'm looking at them, I'm going, oh my God. Then I thought about Jay, because we used to walk the MTV line, and if a guy was to say, "Jay, is that a Dookie rope on you?" Jay would be like, "Man, you ask me that stupid question again, I'm going to smack you in your face," because what they used to ask us was this: "Yo, Run-D.M.C., why did you say what you said?" And we was able to relay why we said that. "And why did you make that music? What made you make that album?" Those are the kind of questions we used to get on the red carpet. And just for our audience hearing that, there was always change in the community. See, I try to tell people the reason why rap did what it did, it changed the world: because it was good. Even if it wasn't NWA or Just-Ice or KRS-One or Run-D.M.C. or Public Enemy, all those different ideas and concepts was put on a record, but it was presented to you in a responsible manner.
CHUCK D: And in respect to the standard.
D.M.C.: And in respect to the standard.
CHUCK D: We're going to go to another segment. This is Chuck D On The Real Off The Record with the king of rock himself, Mr. Darryl McDaniels, Mr. D.M.C., when we return to burn. Keep it locked, because this is going to be a long, good one. Alright?
Carlton Douglas Ridenhour (born August 1, 1960 in Roosevelt, New York), better known by his stage name, Chuck D, is an American rapper, author, and producer. He helped create politically and socially conscious rap music in the late 1980s as the leader of the rap group, Public Enemy.
More by Chuck D
|
{
"redpajama_set_name": "RedPajamaCommonCrawl"
}
| 3,540 |
[
128000,
17827,
304,
97036,
323,
54385,
3808,
25,
2326,
11,
8976,
5513,
13690,
29140,
198,
94626,
423,
323,
423,
11865,
389,
18638,
7598,
323,
5270,
52170,
16,
198,
1729,
34349,
423,
5651,
220,
21,
11,
220,
1049,
24,
6250,
220,
1419,
11,
220,
2366,
15,
198,
644,
264,
4101,
315,
64955,
19905,
9124,
555,
5091,
9944,
11,
34349,
423,
19905,
12637,
7477,
13820,
423,
11865,
323,
11186,
537,
922,
11759,
11,
279,
8752,
323,
872,
4731,
1418,
12967,
11904,
3778,
3925,
323,
4731,
1139,
2317,
13,
32255,
584,
13488,
279,
1510,
1614,
315,
7477,
4731,
323,
1202,
59529,
5536,
627,
2198,
28643,
423,
11,
432,
67062,
8253,
3931,
11,
82924,
3083,
32516,
5301,
64542,
25,
34349,
423,
369,
578,
8976,
5513,
8304,
13,
1115,
374,
1952,
578,
8976
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
17827,
304,
97036,
323,
54385,
3808,
25,
2326,
11,
8976,
5513,
13690,
29140,
198,
94626,
423,
323,
423,
11865,
389,
18638,
7598,
323,
5270,
52170,
16,
198,
1729,
34349,
423,
5651,
220,
21,
11,
220,
1049,
24,
6250,
220,
1419,
11,
220,
2366,
15,
198,
644,
264,
4101,
315,
64955,
19905,
9124,
555,
5091,
9944,
11,
34349,
423,
19905,
12637,
7477,
13820,
423,
11865,
323,
11186,
537,
922,
11759,
11,
279,
8752,
323,
872,
4731,
1418,
12967,
11904,
3778,
3925,
323,
4731,
1139,
2317,
13,
32255,
584,
13488,
279,
1510,
1614,
315,
7477,
4731,
323,
1202,
59529,
5536,
627,
2198,
28643,
423,
11,
432,
67062,
8253,
3931,
11,
82924,
3083,
32516,
5301,
64542,
25,
34349,
423,
369,
578,
8976,
5513,
8304,
13,
1115,
374,
1952,
578,
8976,
-100
] |
When choosing , don't focus on price, but the truth is have to make certain that the you obtained works for a room not only the structure but also the size. Then, the next matter is highly recommended concerns quality. Buy it inside big and renowned furnishing store in the towns of course, if it may not be assembled yet, make there will be a worker from related store who would like to assist you delivery it and assemble it so perfectly with your home. If required, ask for a guarantee of the goods you could have bought. Really it is important, when your was cracked, damaged or even currently have a physical defective, it is possible to claim it as your guarantee. Can be all those ideas could motivate you all.
Find the size of your living space primary, then you definitely knows the correct style and design and ways in which you can decorate it. Tend not to select massive materials if the place is little or even you will make it more narrow or tend not to pick out too small fixtures should your home is just too large or your family will enjoy it and so bare.
Think you're having a plan to modify your old ? Many things you need to ready for instance the newest model that suits you, the fabric, colour, and how much your budget is. imagine the idea cautiously before deciding it. It is one thing important until you can not come to a decision them on your own. Sometimes, you need to ask your loved ones first if you stay with him or her, or even ask your friend who knows it a lot better than you. Whereas, you even can employing a good gurus to direct you towards redesign or simply just repair your so you simply will not repent whatever.
It's correct that anyone desire a as extraordinary as they can. However, if you aren't happy with it, will probably be useless. Thus, it's important to think it with care to make wonderful for family and friends member.
It is important when you wish to decor a in your home is with regards to the funds. You may want to choose best material, best color, best design and model if your funds are low, it is advisable to maximum it. Please know that expensive material, color, model or anything will not be sure that the comfortableness than it.
The 1st idea to substitute our with the most recent and amazing plan is we can do it by ourselves. We presume that we causes it to become better with just read some references and ignore to inquire about other people view or help. In the long run, what will occur? We absence of experience than it and just every thing worst. As a result, at times asking or employing an experienced or perhaps internal director is necessary. There are some benefits you may get if you request some helps to create your more attractive.
Very first thing you must know is about the materials you want. Most people certainly not know something undesirable collision from the future. Thus, choose best value of fabric is extremely important. In some cases, we forget about the material because we don't have much budget to make becoming awesome as we can. We forget to pick out very best quality simply target the appearance. It's true if the look will get people to who view it feeling happy. We can't overlook the material as well, can we?
Your next way is about the position. Be sure to place your in appropriate spaces where furniture is safe and ensure that it stays out of reach of children. Use a wood bearing when asked to tighten it. Then, make sure that your room comes with a empty space to use to put it. Be sure you remove useless furniture which perhaps is seldom used. Again, make use of the practically possible and keep durable. Clean if the dust covers it or once the oil spills about it etc. At last, purchase the which isn't only good while in the design but additionally you will need to consider what resources utilised to generate it.
|
{
"redpajama_set_name": "RedPajamaC4"
}
| 4,265 |
[
128000,
4599,
19301,
1174,
1541,
956,
5357,
389,
3430,
11,
719,
279,
8206,
374,
617,
311,
1304,
3738,
430,
279,
499,
12457,
4375,
369,
264,
3130,
539,
1193,
279,
6070,
719,
1101,
279,
1404,
13,
5112,
11,
279,
1828,
5030,
374,
7701,
11349,
10742,
4367,
13,
11544,
433,
4871,
2466,
323,
37048,
9626,
11218,
3637,
304,
279,
25861,
315,
3388,
11,
422,
433,
1253,
539,
387,
35105,
3686,
11,
1304,
1070,
690,
387,
264,
12128,
505,
5552,
3637,
889,
1053,
1093,
311,
7945,
499,
9889,
433,
323,
42840,
433,
779,
14268,
449,
701,
2162,
13,
1442,
2631,
11,
2610,
369,
264,
15803,
315,
279,
11822,
499,
1436,
617,
11021,
13,
29308,
433,
374,
3062,
11,
994,
701,
574,
43939,
11,
20727,
477,
1524,
5131,
617,
264,
7106,
64903
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
4599,
19301,
1174,
1541,
956,
5357,
389,
3430,
11,
719,
279,
8206,
374,
617,
311,
1304,
3738,
430,
279,
499,
12457,
4375,
369,
264,
3130,
539,
1193,
279,
6070,
719,
1101,
279,
1404,
13,
5112,
11,
279,
1828,
5030,
374,
7701,
11349,
10742,
4367,
13,
11544,
433,
4871,
2466,
323,
37048,
9626,
11218,
3637,
304,
279,
25861,
315,
3388,
11,
422,
433,
1253,
539,
387,
35105,
3686,
11,
1304,
1070,
690,
387,
264,
12128,
505,
5552,
3637,
889,
1053,
1093,
311,
7945,
499,
9889,
433,
323,
42840,
433,
779,
14268,
449,
701,
2162,
13,
1442,
2631,
11,
2610,
369,
264,
15803,
315,
279,
11822,
499,
1436,
617,
11021,
13,
29308,
433,
374,
3062,
11,
994,
701,
574,
43939,
11,
20727,
477,
1524,
5131,
617,
264,
7106,
64903,
-100
] |
These Sprightly Little Amphibians Will Add Charm To Your Garden. One Frog Is Leaping, One Is Landing And One Is Just Poised To Hop. Akthough They Look Ready For Action, They Will Each Stay Firmly Anchored To The Ground With A Footed Risk. Just Push The Stakes Into The Ground Adds Interest To The Garden—especially Good Near Water Made Of Weatherproof Resin Wity An Antiqued-brass Finish "sitting" Frog: 6" X 5" X 4" "leaping" Frog: 12" X 8" X 3" "landing" Frog: 15" X 6" X 3"
|
{
"redpajama_set_name": "RedPajamaC4"
}
| 9,351 |
[
128000,
9673,
15883,
73048,
15013,
93261,
581,
5493,
4946,
2758,
58600,
2057,
4718,
19558,
13,
3861,
72519,
2209,
2009,
14550,
11,
3861,
2209,
47524,
1628,
3861,
2209,
4702,
14128,
4147,
2057,
26634,
13,
16762,
4636,
2435,
9372,
32082,
1789,
5703,
11,
2435,
4946,
9062,
29837,
38725,
398,
72584,
3093,
2057,
578,
26486,
3161,
362,
15819,
291,
32388,
13,
4702,
23804,
578,
800,
2094,
32745,
578,
26486,
25483,
25074,
2057,
578,
19558,
2345,
36046,
7839,
31494,
10164,
19332,
5046,
23454,
16157,
1838,
258,
468,
488,
1556,
6898,
5118,
291,
31217,
395,
36633,
330,
82,
15154,
1,
72519,
25,
220,
21,
1,
1630,
220,
20,
1,
1630,
220,
19,
1,
330,
273,
14550,
1,
72519,
25,
220,
717,
1,
1630,
220,
23,
1,
1630,
220,
18,
1,
330,
49441,
1
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
9673,
15883,
73048,
15013,
93261,
581,
5493,
4946,
2758,
58600,
2057,
4718,
19558,
13,
3861,
72519,
2209,
2009,
14550,
11,
3861,
2209,
47524,
1628,
3861,
2209,
4702,
14128,
4147,
2057,
26634,
13,
16762,
4636,
2435,
9372,
32082,
1789,
5703,
11,
2435,
4946,
9062,
29837,
38725,
398,
72584,
3093,
2057,
578,
26486,
3161,
362,
15819,
291,
32388,
13,
4702,
23804,
578,
800,
2094,
32745,
578,
26486,
25483,
25074,
2057,
578,
19558,
2345,
36046,
7839,
31494,
10164,
19332,
5046,
23454,
16157,
1838,
258,
468,
488,
1556,
6898,
5118,
291,
31217,
395,
36633,
330,
82,
15154,
1,
72519,
25,
220,
21,
1,
1630,
220,
20,
1,
1630,
220,
19,
1,
330,
273,
14550,
1,
72519,
25,
220,
717,
1,
1630,
220,
23,
1,
1630,
220,
18,
1,
330,
49441,
1,
-100
] |
Emmy-winning TV comedy and film writer, Leslie Caveny (Mad About You, Everybody Loves Raymond, Penelope), writes and headlines an unpredictable, irreverent, sometimes disquieting parody of a one-woman show playing at Theatre West in Noho.
Caveny plays a fictionalized version of herself mounting a one-woman show, complete with somber monologs and slideshows. But minutes into the show, something unexpected happens: Caveny forgets her lines and so begins an epic 75-minute meltdown in which Caveny lampoons theater, film and television conventions and stereotypes, and tackles personal struggles associated with being a woman over 50 in a culture obsessed with youth.
One of the show's strengths is its unpredictability. The audience never knows if Caveny will ever remember her lines, if Caveny will burst into song, if an "audience member" will storm out of the theater, or if another "audience member" really is Caveny's mother. Throughout, Caveny's performance is raw and heartbreakingly real. She's funny, but she's also selfish, petty and deeply flawed. When she's not trying to remember her monolog, she's tormenting the stage manager and the lighting designer (ably played by Anne Leyden and Frank Gangarossa) or lobbing accusations at Sheila Shaw and Seemah Wilder, who may or may not be her mother. Maria Burton's spirited direction and the show's moving conclusion proves that farce and reality are deeply entwined.
One Woman Gone Wrong plays through November 27 at Theatre West 3333 Cahuenga Blvd. West, LA, CA 90068 Main Office: (323) 851-4839 Box Office: (323) 851-7977.
Posted in Entertainment and tagged drama, everybody loves raymond, leslie caveny, mad about you, north hollywood, one woman gone wrong, penelope, play, playbill, theater, theatre, theatre west. Bookmark the permalink.
|
{
"redpajama_set_name": "RedPajamaC4"
}
| 7,640 |
[
128000,
2321,
2465,
27875,
6007,
23160,
323,
4632,
7061,
11,
54783,
356,
5389,
88,
320,
38136,
10180,
1472,
11,
51898,
85123,
43670,
11,
13597,
82665,
705,
14238,
323,
31186,
459,
50235,
11,
25912,
424,
306,
11,
7170,
834,
44750,
287,
67265,
315,
264,
832,
2695,
7053,
1501,
5737,
520,
27315,
4410,
304,
452,
96386,
627,
34,
5389,
88,
11335,
264,
44682,
1534,
2373,
315,
11937,
34739,
264,
832,
2695,
7053,
1501,
11,
4686,
449,
1794,
655,
1647,
1640,
82,
323,
22245,
71,
4336,
13,
2030,
4520,
1139,
279,
1501,
11,
2555,
16907,
8741,
25,
356,
5389,
88,
10894,
82,
1077,
5238,
323,
779,
12302,
459,
25706,
220,
2075,
24401,
91140,
304,
902,
356,
5389,
88,
29062,
29639,
27803,
11,
4632,
323,
12707,
45593,
323,
54168,
11,
323,
43581
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
2321,
2465,
27875,
6007,
23160,
323,
4632,
7061,
11,
54783,
356,
5389,
88,
320,
38136,
10180,
1472,
11,
51898,
85123,
43670,
11,
13597,
82665,
705,
14238,
323,
31186,
459,
50235,
11,
25912,
424,
306,
11,
7170,
834,
44750,
287,
67265,
315,
264,
832,
2695,
7053,
1501,
5737,
520,
27315,
4410,
304,
452,
96386,
627,
34,
5389,
88,
11335,
264,
44682,
1534,
2373,
315,
11937,
34739,
264,
832,
2695,
7053,
1501,
11,
4686,
449,
1794,
655,
1647,
1640,
82,
323,
22245,
71,
4336,
13,
2030,
4520,
1139,
279,
1501,
11,
2555,
16907,
8741,
25,
356,
5389,
88,
10894,
82,
1077,
5238,
323,
779,
12302,
459,
25706,
220,
2075,
24401,
91140,
304,
902,
356,
5389,
88,
29062,
29639,
27803,
11,
4632,
323,
12707,
45593,
323,
54168,
11,
323,
43581,
-100
] |
Quickly try trustworthy Convert OST tool for flawlessly convert OST file into PST file with its all elements in few seconds. This tool also save OST file into PST, MSG, EML and HTML file format without any interruption.
Best way to convert OST file into PST file with the help of outlook OST Converter Tool. This tool gives you accurate facilities for convert OST file into PST file with all email properties.
You can without any fault repair corrupt OST file and eliminate all possible errors of corrupt OST file and convert repaired OST file into usable Outlook PST, MSG, EML and HTML file formats.
|
{
"redpajama_set_name": "RedPajamaC4"
}
| 742 |
[
128000,
25310,
398,
1456,
57042,
7316,
94401,
5507,
369,
26784,
16117,
5625,
94401,
1052,
1139,
42084,
1052,
449,
1202,
682,
5540,
304,
2478,
6622,
13,
1115,
5507,
1101,
3665,
94401,
1052,
1139,
42084,
11,
24200,
11,
469,
2735,
323,
9492,
1052,
3645,
2085,
904,
75103,
627,
14809,
1648,
311,
5625,
94401,
1052,
1139,
42084,
1052,
449,
279,
1520,
315,
36721,
94401,
40428,
13782,
13,
1115,
5507,
6835,
499,
13687,
13077,
369,
5625,
94401,
1052,
1139,
42084,
1052,
449,
682,
2613,
6012,
627,
2675,
649,
2085,
904,
14867,
13023,
22681,
94401,
1052,
323,
22472,
682,
3284,
6103,
315,
22681,
94401,
1052,
323,
5625,
52834,
94401,
1052,
1139,
41030,
42158,
42084,
11,
24200,
11,
469,
2735,
323,
9492,
1052,
20447,
13,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
0,
0,
0,
0,
0,
0,
0,
0
] |
[
25310,
398,
1456,
57042,
7316,
94401,
5507,
369,
26784,
16117,
5625,
94401,
1052,
1139,
42084,
1052,
449,
1202,
682,
5540,
304,
2478,
6622,
13,
1115,
5507,
1101,
3665,
94401,
1052,
1139,
42084,
11,
24200,
11,
469,
2735,
323,
9492,
1052,
3645,
2085,
904,
75103,
627,
14809,
1648,
311,
5625,
94401,
1052,
1139,
42084,
1052,
449,
279,
1520,
315,
36721,
94401,
40428,
13782,
13,
1115,
5507,
6835,
499,
13687,
13077,
369,
5625,
94401,
1052,
1139,
42084,
1052,
449,
682,
2613,
6012,
627,
2675,
649,
2085,
904,
14867,
13023,
22681,
94401,
1052,
323,
22472,
682,
3284,
6103,
315,
22681,
94401,
1052,
323,
5625,
52834,
94401,
1052,
1139,
41030,
42158,
42084,
11,
24200,
11,
469,
2735,
323,
9492,
1052,
20447,
13,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100
] |
Tag Archives: Steve Ditko
Writer: Chris McKenna, Erik Sommers (Screenplay) Steve Ditko, Stan Lee (Comic Book)
Starring: Tom Holland, Jake Gyllenhaal, Zendaya, Samuel L Jackson, Jon Favreau, Angourie Rice, Jacob Batalon, Tony Revolori
Plot: Following the events of Avengers: Endgame, Spider-Man must step up to take on new threats in a world that has changed forever.
Verdict: An Entertaining Jumble
Story: Spider-Man Far from Home starts when Peter Parker (Holland) and his classmates MJ (Zendaya), Ned (Batalon), Flash (Revolori) and others head off to Europe for a scientific school trip, Peter's plan is to finally tell MJ how he feels, but things don't go to plan.
Peter finds himself recruited by Nick Fury (Jackson) to help new superhero Quentin Beck known as Mysterio (Gyllenhaal) fight a new threat that is attacking cities in Europe, trying to decide if he is ready to tackle the added responsibility of being a superhero.
Thoughts on Spider-Man Far from Home
Characters – Peter Parker has two main storylines going on in this film, one side of him is the high school student that wants to tell the girl he likes his feeling, nervous and social awkward. The second one sees him facing the reality that he was hand picked to step up and help save the world, a decision which sees him wanting to just take a break from. Watching Peter balance the two is interesting because the high school one was the weaker side, the superhero side is very interesting to follow. Nick Fury is also adapting to life after the snap, where he isn't in the same level of control on everything going on in the world, he wants Peter to come and work for him and doesn't like being told no. They did try to recapture certain elements of the chemistry he had with Captain Marvel too. Quentin Beck is the new superhero dubbed Mysterio because of his powers and ability to defeat the elementals that have started attacking the major cities, he offers Peter a chance to discuss his position with having powers like nobody else has since Tony's death. MJ is the girl of Peter's dreams, she is very different to both versions of MJ we have seen before, being very distant to the rest of the class, but always manages to capture Peter watching her.
Performances – Tom Holland does do a very good job in the leading role, if it was just the high school side of the film, he does struggle at times, but it is the human effect of being a superhero that completely makes you believe what he is going through. Samuel L Jackson does what we expect from him in a supporting role, as does Zendaya who does everything without standing out. Jake Gyllenhaal though, he was a joy to watch especially in the second half of the film, he just takes his role and runs with it.
Story – The story here follows Peter Parker on his high school trip that gets interrupted to help try and save the world from a new threat, testing him to see if he is ready to replace Iron-Man. This like the character of Peter Parker can be broken down into two simple positives and negatives, the high school trip stuff, is there, most of it gets pretty boring quickly, it is here to help show a human life that he could have though. The superhero side of the story is the highlight because it does get to show how the once confident Peter is starting to question if he is ready to step up after seeing the consequences to what has happened to people in their lives. The villain is a surprise and while I won't get into details, it is very entertaining to watch and could be one of the best they have bought to a stand alone film.
Action/Sci-Fi – The action in this film is brilliant to watch, it blends with the special effects and doesn't turn into anything as ridiculous as it could be when you see the fights. The sci-fi element of the film does address the dangers of technology being in the wrong hands once again, but it all works for the story being shown here.
Settings – The film gives us the basic European settings, we have Venice, Prague, Berlin and London, you know well know locations that have large populations which could get destroyed.
Special Effects – The effects in the film did seem flawless, we do have large scale, dust, water and fire monsters used for battles which all look like they could be real along with certain twists in the story which only add to the effects.
Scene of the Movie – What is real?
That Moment That Annoyed Me – Most of the high school stuff.
Final Thoughts – This is a real mixed bag of a superhero movie, it could have been fantastic, only it gets too carried away dealing with the high school world which does drag things down.
Overall: Entertaining enough.
By Darren Lucas • Posted in 2019, Action, S, Sci-Fi, Superhero • Tagged Angourie Rice, Chris McKenna, Erik Sommers, Jacob Batalon, Jake Gyllenhaal, Jon Favreau, Jon Watts, Samuel L Jackson, Stan Lee, Steve Ditko, Tom Holland, Tony Revolori, Zendaya
Franchise Weekend – Spiderman 3 (2007)
Writer: Sam Raimi, Ivan Raimi, Alvin Sargent (Screenplay) Stan Lee, Steve Ditko (Comic Book)
Starring: Tobey Maguire, Kirsten Dunst, James Franco, Thomas Haden Church, Toper Grace, Bryce Dallas Holland
Plot: A strange black entity from another world bonds with Peter Parker and causes inner turmoil as he contends with new villains, temptations, and revenge.
There may be spoilers the rest of the review
Verdict: Good Ending to Trilogy
Story: Spider-Man 3 starts as Peter Parker (Maguire) now living with Mary Jane (Dunst) with the whole city loving the Spider-Man which leaves Peter on top of the world, but Mary Jane is struggling to fit in after a string of poor reviews on her performing. Meanwhile Flint Marko (Church) the man that killed Uncle Ben has escaped prison as he looks to make amends for his errors finds himself in the middle of an experiment that turns him into the sandman.
Peter has plenty of life questions to find answers in for through the film because he wants to ask Mary Jane to marry him, faces competition from Eddie Brock (Grace) trying to take his job at the newspaper and Harry (Franco) trying to get his revenge loses his memory leading to the friendship to become fresh.
What Peter doesn't know is there is a creature from space known as Venom starts attaching itself to Peter, giving Spiderman a darker side the Peter must learn how to fight off to remain the hero the city knows and loves, once this is done Eddie becomes Venom figure.
Thoughts on Spider-Man 3
Characters – Peter is in the happiest part of his life, he is with Mary Jane, Spiderman is loved by the city and Harry has forgotten the vengeance he holds towards Peter. When Peter starts seeing his life come tumbling down around him once he gets infected by Venom he will face is toughest battle yet. Mary Jane has finally made it to the big stage but is being critically panned and without Peter's support goes back to Harry, this is starting to become a one-dimensional character. Harry has been waiting for his chance to take out Peter but after it fails forgets his hate towards him until his memories return. Eddie Brock is a new rival photographer that wants to put Peter out of business but soon we learn the truth about him. Flint Marko is the man that really killed Uncle Ben and once he escapes from prison looks to make amends for his failures to his daughter but with new powers that make Peter need to fight him off. Gwen Stacy is a new love interest that could bring an end to Mary Jane and Peter.
Performances – Tobey Maguire doesn't give as strong of a performance after the first two films but when you look at the reactions to everything Peter goes through you can see it in how he is acting. Kirsten Dunst does continue to slide in quality too but that is because the character continues to be written weakly. James Franco does get to show a bigger range but also doesn't get enough time for his character development to show his full talent. Thomas Haden Church does a good job here showing the pain his character feels through the film. Topher Grace does feel out of place at times in this film, he starts strong but slowly fades by the end.
Story – The Peter Parker story arc is once again the most interesting part of the film as we see how he must face his own flaws to stop the problems in his life, he must learn the ups and downs of his actions. The new enemies tests Spiderman to the next level as Sandman gives him a moral compass he needs to face while Venom shows who he could have become if he takes the wrong path but the battles are standard for the genre.
Action/Adventure – The action set pieces are bigger but are also fewer in number which makes them feel rewarding when we see the showdown.
Settings – We do thankfully stay in New York for the setting which helps us show how the city has gotten used to the idea of Spiderman being there now.
Special Effects – The effects were the most ambitious of the franchise, the Sandman was always going to be CGI and it does look weak now. When things are practical they work otherwise the weakness are clear.
Scene of the Movie – Sandman creation.
That Moment That Annoyed Me – I wasn't a fan of the CGI
Final Thoughts – This is the most panned of the Spiderman films but I feel it is a fitting ending to the trilogy, yes, it is weaker but the truth is, that it is being ambitious with the villains Peter must take on and reflects the problems he would face if someone he loved knew the truth.
Overall: Good ending to the trilogy.
By Darren Lucas • Posted in 2007, Action, Adventure, S • Tagged Alvin Sargent, Bryce Dallas Holland, Ivan Raimi, James Franco, Kirsten Dunst, Sam Raimi, Stan Lee, Steve Ditko, Thomas Hayden Church, Tobey Maguire, Toper Grace
Writer: Alfred Gough, Miles Millar, Michael Chabon, Alvin Sargent (Screenplay) Stan Lee, Steve Ditko (Comic Book)
Starring: Tobey Maguire, Kirsten Dunst, James Franco, Alfred Molina, Rosemary Harris, J.K. Simmons
Plot: Peter Parker is beset with troubles in his failing personal life as he battles a brilliant scientist named Doctor Otto Octavius.
Verdict: Great Fun
Story: Spider-Man 2 starts with the beautiful opening credits that recap what happened in the first film, before we follow Peter Parker (Maguire) in his new roles as a pizza delivery boy. Peter is still struggling to be on time for the important moments of his life including college, times for being there for Mary Jane (Dunst) and Harry (Franco) who is still holding the grudge against Spiderman.
Harry now running Oscorp where he has Dr Otto Octavius (Molina) working on fusion energy technology but when an accident happens Otto becomes Doc Ock, who has 4 extra arms that control him as they take over the city.
Characters – Peter Parker still finds himself running late to his important matters but he still finds time to fight crime even though Spiderman has become hated by his best friend. He must deal with his life crashing down around him now, his best friend hates his loyalty to Spiderman, Mary Jane has moved on and his powers are draining. He must overcome the difficult moments in life to defeat his latest enemy. Mary Jane has moved on from Peter and Harry but deep down she does still love Peter. Dr Otto Octavius does believe he can help change the world for the better but when he loses his love and becomes controlled by Doc Ock he wreaks havoc on the city.
Performance – Tobey Maguire once again brings us a performance worthy of leading any movie showing us in the early 2000's he was one of the best in the industry. Kirsten Dunst is good enough but once again falls into the damsel in distress role taking away the talent we know she has. Alfred Molina is great as the villain here, he is filled with the emotionless actions but also feeling like he is smarter than everyone else in the film. James Franco is good but we are continuing to build his character up.
Story – The story has two main parts, the first is looking at Peter Parker trying to balance his normal life or education, love and friendship with being Spiderman, giving himself the decision on whether to give up the Spiderman side of his life to be a better man or not. We also have a villain on the loose that wants to continue his experiments which could destroy the whole city. The conflict is strong through the story as having a superhero question his part in the battle which gives s edge of your seat viewing.
Action/Adventure – Thee action is toned down in places when you look at the number of sequences but the reality is they are much bigger sequences throughout the film that have increased peril for Spiderman to fight.
Settings – We stay in New York which was always key to making this film the enjoyable experience we know it was going to be.
Special Effects – Seemingly remaining with practical effects with editing around them, this film does seem to feel like we are in a real-world city with real superheroes battling.
Scene of the Movie – Train sequence
That Moment That Annoyed Me – I feel we need to start making Mary Jane stronger.
Final Thoughts – This is a great continuation of the Spiderman evolution that was needed to keep things feeling fresh in the genre.
Overall: Enjoyable continuing Spiderman films
By Darren Lucas • Posted in 2004, Action, Adventure, S • Tagged Alfred Gough, Alfred Molina, Alvin Sargent, J.K. Simmons, James Franco, Kirsten Dunst, Michael Chabon, Miles Millar, Rosemary Harris, Sam Raimi, Stan Lee, Steve Ditko, Tobey Maguire
Franchise Weekend – Spiderman (2002)
Writer: David Koepp (Screenplay) Stan Lee, Steve Ditko (Comic Book)
Starring: Tobey Maguire, Willem Dafoe, Kirsten Dunst, James Franco, Cliff Robertson, Rosemary Harris, J.K. Simmons
Plot: When bitten by a genetically modified spider, a nerdy, shy, and awkward high school student gains spider-like abilities that he eventually must use to fight evil as a superhero after tragedy befalls his family.
Verdict: Truly Enjoyable Spiderman Movie
Story: Spider-Man starts as we meet high school student Peter Parker (Maguire), he only had one friend at school and that is over privileged Harry Osborn (Franco) and his high school crush Mary Jane (Dunst) attending a field trip at science laboratory where Peter gets bitten by one of the spiders.
The next day Peter finds himself stronger and more aware than ever, he has gained the spider skills, Peter uses his time to learn his abilities, but when his Uncle Ben (Robertson) becomes a victim of crime, Peter becomes Spiderman protecting New York City from the criminals.
With high school finished Peter and Harry move to New York, where they find jobs, but Peter has been fighting crime become front page news. Harry's father Norman a CEO at Oscorp determined to make the most money unleashes the Green Goblin on the city, giving Spiderman his first opponent that will tests his abilities.
Thoughts on Spider-Man
Characters – Peter Parker is the socially awkward high school outcast, he does have the brains to become anything but when he gets bitten he becomes Spiderman where he starts to fight to protect his city after losing his Uncle. Norman Osborn is the career driven genius that will go to any lengths to be the leading developer in government technology, but when he loses his way, he goes out to stop anyone with his Green Goblin persona. Harry is Peter's best friend and son of Norman, he watches how everything unfolds but also starts dating Mary Jane. Mary Jane is the high school crush of Peter, she does stick up for him as they share the same dreams.
Performance – Tobey Maguire is great in this leading role showing the innocence side of Peter but away from the high school age. Kirsten Dunst is a beautiful Mary Jane and while mostly the damsel in distress does give us a good performance. James Franco showed us all the potential he has started to show us in this role. Willem Dafoe enjoys the villainous role through the film and is easy one of the better conflicted villains in the universe.
Story – This is an origin story for Spiderman that came out just when the superhero boom was starting up, it bought us a new hero to root for and one that was filled with the odd joke. We have the motivation for Peter to become Spiderman, a friendship which will become important through this franchise and a villain that is conflicted with why he is doing the things he is doing. It may well be a by the book origin story it does have enough darker moments to make us see the light in his actions.
Action/Adventure – The action fits the comic book genre perfectly with the adventure side of the film coming from just what Peter is learning of his new skills.
Settings – New York City makes for the setting here, much like in the comics, it works because of the landscape that Spiderman will be taking on with his web slinging.
Special Effects – The effects for this film show us that practical effects could still make an excellent film, the CGI feels very little.
Scene of the Movie – The parade.
That Moment That Annoyed Me – You do feel like we needed more of the high school side of the film.
Final Thoughts – This is an origin film that does hit the marks, a villain that can do enough damage but is never a true threat, learning the correct path and building a bigger picture for the whole franchise.
Overall: Easily one of the best origin stories.
By Darren Lucas • Posted in 2002, Action, Adventure, S, Sci-Fi, Superhero • Tagged Cliff Robertson, David Koepp, J.K. Simmons, James Franco, Kirsten Dunst, Rosemary Harris, Sam Raimi, Stan Lee, Steve Ditko, Tobey Maguire, Willem Dafoe
Avengers: Infinity War (2018)
Director: Anthony Russo, Joe Russo
Writer:Christopher Markus, Stephen McFeely (Screenplay) Stan Lee, Jack Kirby, Jim Starlin, George Perez, Ron Lim, Steve Ditko, Joe Simon (Characters)
Starring: Josh Brolin, Chris Evans, Chris Hemsworth, Robert Downey Jr, Chadwick Boseman, Karen Gillan, Scarlett Johansson, Zoe Saldana, Sebastian Stan, Pom Klementieff, Letitia Wright, Tom Holland, Tom Hiddleston, Chris Pratt, Idris Elba, Benedict Cumberbatch, Danai Gurira, Dave Bautista, Mark Ruffalo, Paul Bettany, Benedict Wong, Anthony Mackie, Don Cheadle
Plot: The Avengers and their allies must be willing to sacrifice all in an attempt to defeat the powerful Thanos before his blitz of devastation and ruin puts an end to the universe
Tagline – An entire universe. Once and for all.
Verdict: Truly a Game Changer
Story: Avengers: Infinity War starts as we see the power of Thanos (Brolin) collecting his second infinity stone leaving a path of destruction, with his power growing the Avengers must unit to fight and stop him getting the remaining Infinity Stones that will give him the power to eliminate half of any population with the click of his fingers.
The battle will take place in space, on distant planets and back home on Earth where we get to see unseen team ups and reunions between friends.
Thoughts on Avengers: Infinity Way
Characters – When we dive into characters we have so many to talk about, I will spend time talking Thanos because has been a villain waiting in the background for many films for, we know his is powerful and this is how you make a villain the powerful force we know and will remember because what he does in this film will make you remember within the first five minutes, but we do also see what drives him and that he has true belief in his cause. In the rest of the characters we know what we are getting from most, I was impressed with Doctor Strange as I wasn't too interested in the solo film, Thor has a brilliant story arc that keeps his character in the tone we got in Ragnarok and the father son dynamic between Tony and Peter is still here. Drax gets the most laughs once more, while everyone around Steve Rogers is the more serious side of the film. the only negatives on the characters we meet would be the generals for Thanos, who are largely forgettable.
Performances – The performances like the characters we have way too many to talk about, Josh Brolin being the new comer makes a massive impact easily becoming the best villain in the MCU. The talent on the Avengers is fantastic and the people that stood out for me were Benedict Cumberbatch, Dave Bautista and Chris Hemsworth, while I don't think anybody is close to being bad, I felt the actors on the Earth battle weren't given enough to do to get to their best abilities.
Story – The story here is the build up for 18 movies, we have developed our heroes while learning little about the villain, this story shows just what Thanos is fighting for, what he will do to get it and what the heroes will need to do to stop him. For me this is the game changer in superhero movies, we manage to handle seeing separate groups work together to fight on different worlds in groupings you wouldn't put together, this does however mean certain characters don't meet in this story which might disappoint fans. The story also balances comedy with the Thor and Guardians of the Galaxy mostly and the serious side of what is coming with Captain America. This is easily what we as fans have deserved, but you might not get everything if you haven't seen the other films.
Action/Adventure/Sci-fi/Fantasy – The action is massive and takes us to different worlds for the battles which each are filled with peril because we know not everyone will make it out of this one. the adventure takes our characters to places they haven't been before for their part in the story, which brings the sci-fi sides with large parts of the film being in space and different worlds that only could come from fantasies of comic books.
Settings – Each setting offers our characters a challenge they will need to face in battle, this shows how easily travelling through space can be if you know the ability to do so.
Special Effects – These fight sequences, action sequences look breath taking and nearly everything is flawless except the routine space creatures in the final battle.
Scene of the Movie – Thor meeting the Guardians.
That Moment That Annoyed Me – We learn why a couple of characters are not in the film, but there are some that just seem missing which frustrates because they were interesting ones you would have liked to have seen fight.
Final Thoughts – This is the biggest comic book movie of all time, it changes everything going forward and is a must see for anyone who is a fan of the genre.
Overall: Must See Brilliance.
By Darren Lucas • Posted in 2018, A, Action, Adventure, Fantasy, Sci-Fi, Superhero • Tagged Anthony Mackie, Anthony Russo, Benedict Cumberbatch, Benedict Wong, Chadwick Boseman, Chris Evans, Chris Hemsworth, Chris Pratt, Christopher Markus, Danai Gurira, Dave Bautista, Don Cheadle, George Perez, Idris Elba, Jack Kirby, Jim Starlin, Joe Russo, Joe Simon, Josh Brolin, Karen Gillan, Letitia Wright, Mark Ruffalo, Paul Bettany, Pom Klementieff, Robert Downey Jr, Ron Lim, Scarlett Johansson, Sebastian Stan, Stan Lee, Stephen McFeely, Steve Ditko, Tom Hiddleston, Tom Holland, Zoe Saldana
|
{
"redpajama_set_name": "RedPajamaCommonCrawl"
}
| 7,764 |
[
128000,
5786,
38329,
25,
14129,
53518,
9509,
198,
6628,
25,
11517,
26718,
15299,
11,
42446,
18024,
23621,
320,
8130,
1387,
8,
14129,
53518,
9509,
11,
15560,
12336,
320,
80736,
6017,
340,
626,
20450,
25,
8529,
38915,
11,
33172,
480,
25734,
63126,
278,
11,
32217,
12874,
11,
33007,
445,
13972,
11,
12565,
82041,
91049,
11,
7568,
414,
648,
30616,
11,
25537,
426,
4306,
263,
11,
19036,
10315,
795,
72,
198,
26687,
25,
23548,
279,
4455,
315,
44197,
25,
4060,
5924,
11,
29490,
31251,
2011,
3094,
709,
311,
1935,
389,
502,
18208,
304,
264,
1917,
430,
706,
5614,
16058,
627,
10351,
8644,
25,
1556,
4968,
531,
2101,
622,
23568,
198,
18422,
25,
29490,
31251,
13759,
505,
5492,
8638,
994,
11291,
29306,
320,
39,
43432,
8,
323,
813,
61190,
62045,
320
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
5786,
38329,
25,
14129,
53518,
9509,
198,
6628,
25,
11517,
26718,
15299,
11,
42446,
18024,
23621,
320,
8130,
1387,
8,
14129,
53518,
9509,
11,
15560,
12336,
320,
80736,
6017,
340,
626,
20450,
25,
8529,
38915,
11,
33172,
480,
25734,
63126,
278,
11,
32217,
12874,
11,
33007,
445,
13972,
11,
12565,
82041,
91049,
11,
7568,
414,
648,
30616,
11,
25537,
426,
4306,
263,
11,
19036,
10315,
795,
72,
198,
26687,
25,
23548,
279,
4455,
315,
44197,
25,
4060,
5924,
11,
29490,
31251,
2011,
3094,
709,
311,
1935,
389,
502,
18208,
304,
264,
1917,
430,
706,
5614,
16058,
627,
10351,
8644,
25,
1556,
4968,
531,
2101,
622,
23568,
198,
18422,
25,
29490,
31251,
13759,
505,
5492,
8638,
994,
11291,
29306,
320,
39,
43432,
8,
323,
813,
61190,
62045,
320,
-100
] |
Caringbah Charcoal Chicken offers meal deals or specials. See the 'Meal Deals' section of the menu for more details.
When in the mood for chicken or burgers, remember Caringbah Charcoal Chicken. This local restaurant has sandwiches, salads and so much more for hungry people. Roasts are available with meats, such as beef, pork or lamb. There are numerous salads that are available that include fresh vegetables and ingredients. Pasta enthusiasts will appreciate the spaghetti, fettuccine and lasagne that have been prepared properly and can taste heavenly. When ordering online, Caqringbah Charcoal Chicken believes in fast deliveries and offers a discount for people who order for the first time online.
Best meal, wonderful service! So much value for the great prices.
EXCELLENT FOOD & SERVICE. THANK YOU.
If dry chicken, under cooked chips,potato salad as potato bake, cold gravy is what you're looking for then order here. This was our first and last time order.
Food was ok, order however was incorrect and took to long to arrive. They did call to say they were under the pump and it was going to be late but to wait approx' 2hrs is unforgivable.
Friendly service, great baked veggies & finally a joint that delivers burgers!
With lettuce, cheese and mayo.
Chicken with chips, coleslaw and bun.
Chicken, lettuce, cheese, mayo or sweet chilli.
|
{
"redpajama_set_name": "RedPajamaC4"
}
| 3,284 |
[
128000,
34,
3329,
69243,
4969,
41565,
34619,
6209,
15496,
12789,
477,
60874,
13,
3580,
279,
364,
81668,
42282,
6,
3857,
315,
279,
5130,
369,
810,
3649,
627,
4599,
304,
279,
20247,
369,
16553,
477,
63452,
11,
6227,
356,
3329,
69243,
4969,
41565,
34619,
13,
1115,
2254,
10960,
706,
57758,
11,
77852,
323,
779,
1790,
810,
369,
30056,
1274,
13,
12093,
12019,
527,
2561,
449,
63875,
11,
1778,
439,
25309,
11,
36167,
477,
39406,
13,
2684,
527,
12387,
77852,
430,
527,
2561,
430,
2997,
7878,
24822,
323,
14293,
13,
98446,
43448,
690,
15763,
279,
88010,
11,
282,
7211,
14912,
483,
323,
5252,
24812,
430,
617,
1027,
10235,
10489,
323,
649,
12945,
67698,
13,
3277,
22106,
2930,
11,
14751,
80,
12928,
69243,
4969,
41565,
34619,
13919,
304,
5043,
55659,
323
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
34,
3329,
69243,
4969,
41565,
34619,
6209,
15496,
12789,
477,
60874,
13,
3580,
279,
364,
81668,
42282,
6,
3857,
315,
279,
5130,
369,
810,
3649,
627,
4599,
304,
279,
20247,
369,
16553,
477,
63452,
11,
6227,
356,
3329,
69243,
4969,
41565,
34619,
13,
1115,
2254,
10960,
706,
57758,
11,
77852,
323,
779,
1790,
810,
369,
30056,
1274,
13,
12093,
12019,
527,
2561,
449,
63875,
11,
1778,
439,
25309,
11,
36167,
477,
39406,
13,
2684,
527,
12387,
77852,
430,
527,
2561,
430,
2997,
7878,
24822,
323,
14293,
13,
98446,
43448,
690,
15763,
279,
88010,
11,
282,
7211,
14912,
483,
323,
5252,
24812,
430,
617,
1027,
10235,
10489,
323,
649,
12945,
67698,
13,
3277,
22106,
2930,
11,
14751,
80,
12928,
69243,
4969,
41565,
34619,
13919,
304,
5043,
55659,
323,
-100
] |
A month after his last fight world middleweight champion Gennady Golovkin 38-0-1 (34) has been stripped of his IBF world title.
Golovkin defended his WBA, WBC and IBO world titles against junior middleweight Vanes Martirosyan 36-4-1 (21) at the StubHub Center in Carson, California on May 5 after previous opponent Saul "Canelo" Alvarez withdrew from their scheduled fight on the same date after twice testing positive to the banned substance clenbuterol in tests conducted in February.
The IBF refused to sanction the Matirosyan fight as the 32-year-old Armenian-American hadn't fought in two years and was moving up a weight class to take the fight on short notice. Martirosyan had also lost three of his previous six bouts going in to the Golovkin fight.
Golovkin was due to defend his IBF title against the organisation's mandatory challenger Sergiy Derevyanchenko 12-0 (10). At a meeting conducted on May 22 the IBF ruled that Golovkin had until June 6 to agree to terms for a fight against the hard-hitting Brooklyn-based Russian.
"After a lengthy review and period of deliberation, the International Boxing Federation has vacated the IBF Middleweight title held by Gennady Golovkin," the New Jersey-based sanctioning body said in a statement on Wednesday.
"The IBF had to enforce the penalty under Rule 5H for Golovkin having participated in an unsanctioned contest within his weight class and declare the IBF Middleweight title vacant.
The number two position in the IBF rankings remains vacant, while the rest of the top ten is as follows: 3. Daniel Jacobs (USA); 4. Jermall Charlo (USA); 5. Demetrius Andrade (USA); 6. Tommy Langford (ENGLAND); 7. Martin Murray (England); 8. Rafael Bejaran (Dominican Republic); 9. Kamil Szeremeta (Poland); 10. Luis Arias (USA).
|
{
"redpajama_set_name": "RedPajamaC4"
}
| 3,964 |
[
128000,
32,
2305,
1306,
813,
1566,
4465,
1917,
6278,
4870,
18824,
480,
2734,
7759,
55679,
869,
8148,
220,
1987,
12,
15,
12,
16,
320,
1958,
8,
706,
1027,
37779,
315,
813,
12373,
37,
1917,
2316,
627,
38,
337,
869,
8148,
35844,
813,
468,
7209,
11,
468,
5002,
323,
358,
4782,
1917,
15671,
2403,
27144,
6278,
4870,
13000,
288,
8290,
48328,
8503,
220,
1927,
12,
19,
12,
16,
320,
1691,
8,
520,
279,
67711,
19876,
5955,
304,
41276,
11,
7188,
389,
3297,
220,
20,
1306,
3766,
15046,
68624,
330,
34,
2444,
78,
1,
77815,
62765,
505,
872,
13847,
4465,
389,
279,
1890,
2457,
1306,
11157,
7649,
6928,
311,
279,
21501,
20278,
86034,
8248,
261,
337,
304,
7177,
13375,
304,
7552,
627,
791,
12373,
37,
16436,
311,
45361,
279,
7011
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
32,
2305,
1306,
813,
1566,
4465,
1917,
6278,
4870,
18824,
480,
2734,
7759,
55679,
869,
8148,
220,
1987,
12,
15,
12,
16,
320,
1958,
8,
706,
1027,
37779,
315,
813,
12373,
37,
1917,
2316,
627,
38,
337,
869,
8148,
35844,
813,
468,
7209,
11,
468,
5002,
323,
358,
4782,
1917,
15671,
2403,
27144,
6278,
4870,
13000,
288,
8290,
48328,
8503,
220,
1927,
12,
19,
12,
16,
320,
1691,
8,
520,
279,
67711,
19876,
5955,
304,
41276,
11,
7188,
389,
3297,
220,
20,
1306,
3766,
15046,
68624,
330,
34,
2444,
78,
1,
77815,
62765,
505,
872,
13847,
4465,
389,
279,
1890,
2457,
1306,
11157,
7649,
6928,
311,
279,
21501,
20278,
86034,
8248,
261,
337,
304,
7177,
13375,
304,
7552,
627,
791,
12373,
37,
16436,
311,
45361,
279,
7011,
-100
] |
GTZ is working with Chile with the following objective: "Sites on state-owned properties are identified, assessed and marketed to enable the implementation of investment projects for electricity production from renewable energy sources."
"In the context of BMU's International Climate Initiative, the German Government is supporting Chile with its plan to develop these areas of state-owned property. The main focus is on a wind-measuring campaign involving 20 sites which will help to identify larger areas for wind energy production. Furthermore, feasibility studies will examine the technical and economic preconditions for project development. To a more limited extent, the potential for generating electricity through concentrated solar power (CSP) will also be tested. The selected areas are to be awarded to private project developers through a process of tendering and competitive bidding.
An expert has been employed as the project leader and advisor to the Ministerio de Energía in Chile. Some tasks will be allocated to specialist international consulting companies, such as the carrying out of the technical-economic feasibility studies. The project also provides the measuring technology. The Ministerio de Energía is participating in project implementation and is meeting part of the costs, for example for the installation and operation of the measuring equipment by local experts or institutes."
"It is expected that renewable energies (RE) in Chile will be developed more quickly because of this project.
Fossil fuels will be replaced following the construction and operation of RE power stations, creating significant potential for reducing the levels of CO2 production. The project thus directly benefits climate protection. Furthermore, it assumes certain project development risks, such as carrying out profit analyses. There are thus considerable incentives for project developers and investors to carry out RE projects on the allocated areas of state-owned properties. The public sale of the sites and the proposed tendering procedures create transparency and foster public acceptance. The project promotes structural change and regional development.
20 wind measuring masts, installed at a height of 20 metres, two wind measuring masts, installed at a height of 80 metres, and three solar radiation measuring stations are in operation. The measuring instruments were procured in Germany; the wind measuring masts were manufactured in Chile. The measuring locations were chosen with the aid of a model of wind and solar potentials commissioned by the Ministry of Energy. This model is publicly accessible on the internet. In selected locations, a vertical profile of wind velocities is being measured at a height of 150 metres using a SODAR system. The government has reserved two state-owned locations for wind energy projects and one location for a solar thermal power plant. While the meteorological measurements and feasibility studies are being carried out, the Ministry of Energy, the Ministry of National Property and GTZ are already preparing the tender documents for the locations. The calls for tenders are due to get underway in 2010."
Further information can be accessed at the project website.
↑ "Public Properties for Grid-connected Renewable Energy Projects"
This page was last modified on 2 June 2011, at 15:54.
|
{
"redpajama_set_name": "RedPajamaC4"
}
| 6,620 |
[
128000,
26460,
57,
374,
3318,
449,
34100,
449,
279,
2768,
16945,
25,
330,
94790,
389,
1614,
29799,
6012,
527,
11054,
11,
32448,
323,
61149,
311,
7431,
279,
8292,
315,
9341,
7224,
369,
18200,
5788,
505,
33268,
4907,
8336,
10246,
33703,
279,
2317,
315,
20387,
52,
596,
7327,
31636,
38756,
11,
279,
6063,
10423,
374,
12899,
34100,
449,
1202,
3197,
311,
2274,
1521,
5789,
315,
1614,
29799,
3424,
13,
578,
1925,
5357,
374,
389,
264,
10160,
35073,
69774,
4901,
16239,
220,
508,
6732,
902,
690,
1520,
311,
10765,
8294,
5789,
369,
10160,
4907,
5788,
13,
24296,
11,
69543,
7978,
690,
21635,
279,
11156,
323,
7100,
864,
16902,
369,
2447,
4500,
13,
2057,
264,
810,
7347,
13112,
11,
279,
4754,
369,
24038,
18200,
1555,
38626,
13238,
2410,
320,
34,
4695
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
26460,
57,
374,
3318,
449,
34100,
449,
279,
2768,
16945,
25,
330,
94790,
389,
1614,
29799,
6012,
527,
11054,
11,
32448,
323,
61149,
311,
7431,
279,
8292,
315,
9341,
7224,
369,
18200,
5788,
505,
33268,
4907,
8336,
10246,
33703,
279,
2317,
315,
20387,
52,
596,
7327,
31636,
38756,
11,
279,
6063,
10423,
374,
12899,
34100,
449,
1202,
3197,
311,
2274,
1521,
5789,
315,
1614,
29799,
3424,
13,
578,
1925,
5357,
374,
389,
264,
10160,
35073,
69774,
4901,
16239,
220,
508,
6732,
902,
690,
1520,
311,
10765,
8294,
5789,
369,
10160,
4907,
5788,
13,
24296,
11,
69543,
7978,
690,
21635,
279,
11156,
323,
7100,
864,
16902,
369,
2447,
4500,
13,
2057,
264,
810,
7347,
13112,
11,
279,
4754,
369,
24038,
18200,
1555,
38626,
13238,
2410,
320,
34,
4695,
-100
] |
light weight window boxes outdoor self watering planter lightweight plastic granite wicker window box pot lightweight potting soil for window boxes lightweight window box filler.
light weight window boxes planter lightweight window boxes lightweight window box filler.
light weight window boxes la self watering fiberglass window boxes lightweight potting soil for window boxes lightweight window boxes.
light weight window boxes patio patio flower boxes flowers planters box a free photo on garden container plant raised lightweight potting soil for window boxes lightweight window boxes.
light weight window boxes graphite planter lightweight window box filler lightweight window flower boxes.
light weight window boxes grey window flower box lightweight planter outdoor cm lightweight window flower boxes lightweight potting soil for window boxes.
light weight window boxes lightweight lightweight window box filler lightweight potting soil for window boxes.
light weight window boxes click to enlarge lightweight window boxes lightweight potting soil for window boxes.
light weight window boxes lightweight trough lightweight window boxes lightweight window box filler.
light weight window boxes window sill plant box windowsill planter window sill planter box window sill plant box lightweight window box filler lightweight potting soil for window boxes.
light weight window boxes window box plastic planter modern planter light weight planter lightweight potting soil for window boxes lightweight window boxes.
light weight window boxes box in x in fiberglass black planter box lightweight window boxes lightweight window box filler.
light weight window boxes gallery of window sill flower box astonishing lightweight boxes planters home interior lightweight window flower boxes lightweight potting soil for window boxes.
light weight window boxes lightweight concrete slate granite window box planter lightweight window box filler lightweight window flower boxes.
light weight window boxes patio patio flower boxes ideas outside pots planter outdoor small planting lightweight window box filler lightweight window flower boxes.
light weight window boxes lightweight window box planter iron window baskets inch white window box lightweight window boxes lightweight window flower boxes.
|
{
"redpajama_set_name": "RedPajamaC4"
}
| 4,448 |
[
128000,
4238,
4785,
3321,
15039,
16166,
659,
73841,
3197,
466,
30244,
12466,
38390,
289,
5327,
3321,
3830,
3419,
30244,
3419,
1303,
17614,
369,
3321,
15039,
30244,
3321,
3830,
55810,
627,
4238,
4785,
3321,
15039,
3197,
466,
30244,
3321,
15039,
30244,
3321,
3830,
55810,
627,
4238,
4785,
3321,
15039,
1208,
659,
73841,
94311,
3321,
15039,
30244,
3419,
1303,
17614,
369,
3321,
15039,
30244,
3321,
15039,
627,
4238,
4785,
3321,
15039,
32278,
32278,
23153,
15039,
19837,
6136,
388,
3830,
264,
1949,
6685,
389,
13863,
5593,
6136,
9408,
30244,
3419,
1303,
17614,
369,
3321,
15039,
30244,
3321,
15039,
627,
4238,
4785,
3321,
15039,
95273,
3197,
466,
30244,
3321,
3830,
55810,
30244,
3321,
23153,
15039,
627,
4238,
4785,
3321,
15039,
20366,
3321,
23153,
3830,
30244,
3197,
466,
16166,
10166,
30244,
3321,
23153
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
4238,
4785,
3321,
15039,
16166,
659,
73841,
3197,
466,
30244,
12466,
38390,
289,
5327,
3321,
3830,
3419,
30244,
3419,
1303,
17614,
369,
3321,
15039,
30244,
3321,
3830,
55810,
627,
4238,
4785,
3321,
15039,
3197,
466,
30244,
3321,
15039,
30244,
3321,
3830,
55810,
627,
4238,
4785,
3321,
15039,
1208,
659,
73841,
94311,
3321,
15039,
30244,
3419,
1303,
17614,
369,
3321,
15039,
30244,
3321,
15039,
627,
4238,
4785,
3321,
15039,
32278,
32278,
23153,
15039,
19837,
6136,
388,
3830,
264,
1949,
6685,
389,
13863,
5593,
6136,
9408,
30244,
3419,
1303,
17614,
369,
3321,
15039,
30244,
3321,
15039,
627,
4238,
4785,
3321,
15039,
95273,
3197,
466,
30244,
3321,
3830,
55810,
30244,
3321,
23153,
15039,
627,
4238,
4785,
3321,
15039,
20366,
3321,
23153,
3830,
30244,
3197,
466,
16166,
10166,
30244,
3321,
23153,
-100
] |
Relating to or containing both fibrous and fatty structures.
/fi·bro·ad·i·pose/ (-ad´ĭ-pōs) both fibrous and fatty.
Finding enlarged lymph nodes and adjacent fibroadipose tissue in such cases is not uncommon.
Serpentine-like appearance of fibroadipose tissue intermingled with nerve fascicles.
A CT-guided core biopsy of the adrenal lesion showed inconclusive pathohistologic findings, including fragments of fibroadipose tissue, inflammatory cells, and hemorrhage.
The mesodermal elements included fibroadipose tissue 78.
The internal nasal valve area is a space bounded medially by the septum and superiorly and laterally by the caudal margin of the upper lateral cartilages and its fibroadipose attachments to the piriform aperture and the anterior end of the inferior turbinate.
Looking at the damage in the colon, rats which were treated with 75% malunggay and 5-fluorouracil showed intense signs of chronic inflammation and aggregation of lymphocytes while those which were given 50% Spirulina manifested the same symptoms in addition to the presence of fibrocollagenous and fibroadipose tissue.
Then we proceeded for a Tru-cut biopsy, which was reported as predominantly fibroadipose tissue showing moderate mixed acute on chronic inflammation.
Fibroadipose tissue with broad bands of sclerosis and fibrosis and prominent lipomembranous change with shrunken fat lobules was present beneath the dermis.
14) It has been reported that the lesional cells extended into the perinodal fibroadipose tissue.
Thyroglobulin in orbital tissues from patients with thyroid-associated ophthalmopathy: predominant localization in fibroadipose tissue.
|
{
"redpajama_set_name": "RedPajamaC4"
}
| 2,963 |
[
128000,
6882,
1113,
311,
477,
8649,
2225,
16178,
27620,
323,
40085,
14726,
627,
6801,
72,
14260,
15222,
14260,
329,
14260,
72,
14260,
2972,
14,
10505,
329,
29211,
128,
255,
2320,
56761,
82,
8,
2225,
16178,
27620,
323,
40085,
627,
52522,
74117,
43745,
7954,
323,
24894,
16178,
8714,
575,
974,
20438,
304,
1778,
5157,
374,
539,
41296,
627,
50,
23457,
27970,
12970,
11341,
315,
16178,
8714,
575,
974,
20438,
958,
5424,
839,
449,
32015,
15550,
4440,
627,
32,
19084,
84792,
291,
6332,
99647,
315,
279,
60564,
93217,
8710,
28093,
8500,
1853,
2319,
380,
39227,
14955,
11,
2737,
35603,
315,
16178,
8714,
575,
974,
20438,
11,
47288,
7917,
11,
323,
71417,
425,
627,
791,
11083,
347,
18558,
5540,
5343,
16178,
8714,
575,
974,
20438,
220,
2495,
627,
791,
5419,
72188
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
6882,
1113,
311,
477,
8649,
2225,
16178,
27620,
323,
40085,
14726,
627,
6801,
72,
14260,
15222,
14260,
329,
14260,
72,
14260,
2972,
14,
10505,
329,
29211,
128,
255,
2320,
56761,
82,
8,
2225,
16178,
27620,
323,
40085,
627,
52522,
74117,
43745,
7954,
323,
24894,
16178,
8714,
575,
974,
20438,
304,
1778,
5157,
374,
539,
41296,
627,
50,
23457,
27970,
12970,
11341,
315,
16178,
8714,
575,
974,
20438,
958,
5424,
839,
449,
32015,
15550,
4440,
627,
32,
19084,
84792,
291,
6332,
99647,
315,
279,
60564,
93217,
8710,
28093,
8500,
1853,
2319,
380,
39227,
14955,
11,
2737,
35603,
315,
16178,
8714,
575,
974,
20438,
11,
47288,
7917,
11,
323,
71417,
425,
627,
791,
11083,
347,
18558,
5540,
5343,
16178,
8714,
575,
974,
20438,
220,
2495,
627,
791,
5419,
72188,
-100
] |
Agreed though id also add bacon, pecans and a nice vinaigrette.
I like black plums. But have not had a good one in two years. The apple pears just aren't the same as they were years ago. I generally prefer honeydew and cantaloupe to watermelon. But they are especially hit or miss. Usually they either taste good but have a meh texture. Or the other way around. Getting both in one is hard.
I can't eat stonefruit w/o an allergic reaction. It's minor, but still keeps me away from peaches, plums, even cherries, all things I did enjoy at one point, and I guess I could if I took a Zyrtec.
Just typed this up, then went back and reread what I wrote in 2015--can't believe I called the McIntosh humble twice. My mind works how my mind works. It's all very similar.
I've always just had the taste for sour things.
Ever try green apples with a sprinkle of salt?
I think my mom used to do that. But I know she also put salt on lemons and ate them. I never had a taste for it myself.
Not sure what yer nationality is but yeah adding salt with enhance sour fruit is more an Asian thing.
Green mangoes sprinkled with salt & sugar is a thing.
I couldn't get into that when I was over there, but my Filipina then-girlfriend was crazy about it.
but my Filipina then-girlfriend was crazy about it.
|
{
"redpajama_set_name": "RedPajamaC4"
}
| 4,246 |
[
128000,
9219,
29616,
3582,
887,
1101,
923,
41452,
11,
31100,
598,
323,
264,
6555,
348,
2259,
343,
68028,
627,
40,
1093,
3776,
628,
6370,
13,
2030,
617,
539,
1047,
264,
1695,
832,
304,
1403,
1667,
13,
578,
24149,
281,
7596,
1120,
7784,
956,
279,
1890,
439,
814,
1051,
1667,
4227,
13,
358,
8965,
10932,
26828,
67,
365,
323,
16869,
278,
283,
375,
311,
3090,
72218,
13,
2030,
814,
527,
5423,
4295,
477,
3194,
13,
34067,
814,
3060,
12945,
1695,
719,
617,
264,
757,
71,
10651,
13,
2582,
279,
1023,
1648,
2212,
13,
25531,
2225,
304,
832,
374,
2653,
627,
40,
649,
956,
8343,
9998,
36698,
289,
20886,
459,
57596,
13010,
13,
1102,
596,
9099,
11,
719,
2103,
13912,
757,
3201,
505,
1069,
14576,
11,
628,
6370,
11,
1524
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
9219,
29616,
3582,
887,
1101,
923,
41452,
11,
31100,
598,
323,
264,
6555,
348,
2259,
343,
68028,
627,
40,
1093,
3776,
628,
6370,
13,
2030,
617,
539,
1047,
264,
1695,
832,
304,
1403,
1667,
13,
578,
24149,
281,
7596,
1120,
7784,
956,
279,
1890,
439,
814,
1051,
1667,
4227,
13,
358,
8965,
10932,
26828,
67,
365,
323,
16869,
278,
283,
375,
311,
3090,
72218,
13,
2030,
814,
527,
5423,
4295,
477,
3194,
13,
34067,
814,
3060,
12945,
1695,
719,
617,
264,
757,
71,
10651,
13,
2582,
279,
1023,
1648,
2212,
13,
25531,
2225,
304,
832,
374,
2653,
627,
40,
649,
956,
8343,
9998,
36698,
289,
20886,
459,
57596,
13010,
13,
1102,
596,
9099,
11,
719,
2103,
13912,
757,
3201,
505,
1069,
14576,
11,
628,
6370,
11,
1524,
-100
] |
\section{Introduction}
Grover proposed a quantum algorithm for solving large database search problems
in Ref. \cite{grover97,grover01} . Grover's search algorithm helps searching
for an unknown marked item in an unstructured database of $N$ items by
accessing the database a minimum number of times. From a classical standpoint,
it is necessary to test $N/2$ items, on average, before finding the correct
item. With Grover's algorithm however, the same task can be completed
successfully with a complexity of order $\sqrt{N}$, that is, with a quadratic
speed up. Grover's algorithm was presented in terms of a discrete sequence of
unitary logic gates (digital quantum computation). Specifically, the
transition probability from the source state $\left\vert \psi_{s}\right\rangle
$ to the target state $\left\vert \psi_{w}\right\rangle $ after the $k$-times
sequential application of the so-called Grover quantum search iterate $G$ is
given by
\begin{equation}
\mathcal{P}_{\text{Grover}}\left( k\text{, }N\right) \overset{\text{def}
{=}\left\vert \left\langle \psi_{w}|G^{k}|\psi_{s}\right\rangle \right\vert
^{2}=\sin^{2}\left[ \left( 2k+1\right) \tan^{-1}\left( \frac{1}{\sqrt
{N-1}}\right) \right] \text{.} \label{pgrover
\end{equation}
In the limit of $N$ approaching infinity, $\mathcal{P}_{\text{Grover}}$ in Eq.
(\ref{pgrover}) approaches one if $k=O\left( \sqrt{N}\right) $. We point out
that the big $O$-notation $f\left( x\right) =O\left( g\left( x\right)
\right) $ means that there exist\emph{ real} constants $c$ and $x_{0}$ such
that $\left\vert f\left( x\right) \right\vert \leq c\left\vert g\left(
x\right) \right\vert $ for any $x\geq x_{0}$.
The temporal evolution of the state vector $\left\vert \psi\left( t\right)
\right\rangle $ of a closed quantum system is characterized by the
Schr\"{o}dinger equation
\begin{equation}
i\hslash\partial_{t}\left\vert \psi\left( t\right) \right\rangle
=\mathcal{H}\left( t\right) \left\vert \psi\left( t\right) \right\rangle
\text{,} \label{H1
\end{equation}
where $\hslash\overset{\text{def}}{=}h/\left( 2\pi\right) $ is the reduced
Planck constant, $i$ denotes the imaginary complex unit, and $\partial
_{t}\overset{\text{def}}{=}\partial/\partial t$. The Hamiltonian
$\mathcal{H}\left( t\right) $ in Eq. (\ref{H1}) encodes all relevant
information about the time evolution of the quantum system. From a quantum
computing standpoint, if the Hamiltonian $\mathcal{H}\left( t\right) $ is
known and properly designed, the quantum mechanical motion is known and the
initial state (source state, $\left\vert \psi_{s}\right\rangle $) at $t=0$ can
potentially evolve to a given final state (target state, $\left\vert \psi
_{w}\right\rangle $) at $t=T$. In particular, for any instant $0\leq t\leq T$,
the probability $\mathcal{P}_{\left\vert \psi\left( t\right) \right\rangle
\rightarrow\left\vert \psi_{w}\right\rangle }$ that the system transitions
from the state $\left\vert \psi\left( t\right) \right\rangle $ to the state
$\left\vert \psi_{w}\right\rangle $ under the working assumption of constant
Hamiltonian is given by
\begin{equation}
\mathcal{P}_{\left\vert \psi\left( t\right) \right\rangle \rightarrow
\left\vert \psi_{w}\right\rangle }\overset{\text{def}}{=}\left\vert
\left\langle \psi_{w}|\psi\left( t\right) \right\rangle \right\vert
^{2}=\left\vert \left\langle \psi_{w}|e^{-\frac{i}{\hslash}\mathcal{H}t
|\psi_{s}\right\rangle \right\vert ^{2}\text{.
\end{equation}
The unitary operator $\mathcal{U}\left( t\right) \overset{\text{def}
{=}e^{-\frac{i}{\hslash}\mathcal{H}t}$ denotes the temporal evolution
operator. Fig. $1$ displays a graphical depiction of the digital (discrete
time) and analog (continuous time) quantum search algorithms.
Working in a continuous time quantum computing framework, Farhi and Gutmann
proposed an analog version of Grover's algorithm in Ref. \cite{farhi98} where
the state of the quantum register evolves continuously in time under the
action of a suitably chosen driving Hamiltonian (analog quantum computation).
Specifically, the transition probability from the source state $\left\vert
\psi_{s}\right\rangle $ to the target state $\left\vert \psi_{w}\right\rangle
$ after the application of the unitary continuous time evolution operator
$\mathcal{U}_{\text{FG}}\left( t\right) \overset{\text{def}}{=}e^{-\frac
{i}{\hslash}\mathcal{H}_{\text{FG}}t}$ for a closed quantum system described
by a constant Hamiltonian $\mathcal{H}_{\text{FG}}$ is given by,
\begin{equation}
\mathcal{P}_{\text{Farhi-Gutmann}}\left( t\text{, }x\right) \overset
{\text{def}}{=}\left\vert \left\langle \psi_{w}|e^{-\frac{i}{\hslash
}\mathcal{H}_{\text{FG}}t}|\psi_{s}\right\rangle \right\vert ^{2}=\sin
^{2}\left( \frac{Ex}{\hslash}t\right) +x^{2}\cos^{2}\left( \frac
{Ex}{\hslash}t\right) \text{,} \label{PFG
\end{equation}
where $E$ is a energy-like positive and \emph{real }constant coefficient. We
point out that $\mathcal{P}_{\text{Farhi-Gutmann}}$ in\ Eq. (\ref{PFG})
approaches one if $t$ approaches $h/(4Ex)$. For recent discussions on the
transition from the digital to analog quantum computational setting for
Grover's algorithm, we refer to Ref. \cite{carlo1,carlo2, cafaro2017}.
Ideally, one seeks to achieve unit success probability (that is, unit
fidelity) in the shortest possible time in a quantum search problem. There are
however, both practical and foundational issues that can justify the
exploration of alternative circumstances. For instance, from a practical
standpoint, one would desire to terminate a quantum information processing
task in the minimum possible time so as to mitigate decoherent effects that
can appear while controlling (by means of an external magnetic field, for
instance) the dynamics of a source state driven towards a target state
\cite{rabitz12,rabitz15,cappellaro18}. In addition, from a theoretical
viewpoint, it is known that no quantum measurement can perfectly discriminate
between two nonorthogonal pure states \cite{chefles00,croke09}. Moreover, it
is equally notorious that suitably engineered quantum measurements can enhance
the transition probability between two pure states \cite{fritz10}. Therefore,
minimizing the search time can be important from an experimental standpoint
while seeking at any cost perfect overlap between the final state and the
target state can be unnecessary from a purely foundational standpoint. Similar
lines of reasoning have paved the way to the fascinating exploration of a
possible tradeoff between fidelity and time optimal control of quantum unitary
transformations in Ref. \cite{rabitz12}.
In this paper, motivated by these issues and starting from the consideration
of a family of multi-parameter generalized quantum search Hamiltonians
originally introduced by Bae and Kwon in Ref. \cite{bae02}, we present a
detailed analysis concerning minimum search times and maximal success
probabilities that can be obtained from suitably chosen sub-families belonging
to the original family of Hamiltonians. In particular, we uncover the
existence of quantum search Hamiltonians characterized by minimum search times
needed for a perfect search that are smaller than the one required by the
Farhi-Gutmann perfect quantum search Hamiltonian. Furthermore, and more
interestingly, we report on the existence of imperfect quantum search
Hamiltonians that, despite being incapable of guaranteeing perfect search, can
outperform (in terms of minimum search time) perfect search Hamiltonians
provided that only a very large nearly optimal fidelity value is required to
stop the search.
The layout of the rest of the paper can be described as follows. In Section
II, we provide a detailed computation of a general expression for the
transition probability in the case of a quantum mechanical evolution governed
by a time-independent generalized quantum search Hamiltonian. In Section III,
we discuss a variety of limiting cases that arise from the generalized search
Hamiltonian. In particular, we distinguish optimal scenarios (that is, cases
where the probability of finding the target state equals one) from suboptimal
scenarios (that is, cases where the probability of finding the target state is
less than one). Our concluding remarks appear in Section IV. Finally,
technical details are presented in Appendices A, B, and C.
\begin{figure}[t]
\centering
\includegraphics[width=0.5\textwidth] {fig1}\caption{Gate-level schematic of
the (a) digital and (b) analog quantum search algorithms.
\label{fig1
\end{figure}
\section{Transition probability}
In this section, we consider the time-independent search Hamiltonian
$\mathcal{H}$ defined as \cite{bae02}
\begin{equation}
\mathcal{H}\overset{\text{def}}{=}E\left[ \alpha\left\vert \psi
_{w}\right\rangle \left\langle \psi_{w}\right\vert +\beta\left\vert \psi
_{w}\right\rangle \left\langle \psi_{s}\right\vert +\gamma\left\vert \psi
_{s}\right\rangle \left\langle \psi_{w}\right\vert +\delta\left\vert \psi
_{s}\right\rangle \left\langle \psi_{s}\right\vert \right] \text{.}
\label{hamilton
\end{equation}
The adimensional coefficients $\alpha$, $\beta$, $\gamma$, $\delta$ in Eq.
(\ref{hamilton}) are \emph{complex} expansion coefficients while $E$ is a
\emph{real} constant with energy physical dimensions. We also assume that the
quantum state $\left\vert \psi_{w}\right\rangle $ is the normalized target
state while $\left\vert \psi_{s}\right\rangle $ is the normalized initial
state with quantum overlap $x\overset{\text{def}}{=}\left\langle \psi_{w
|\psi_{s}\right\rangle $ that evolves unitarily according to the
Schr\"{o}dinger quantum mechanical evolution law
\begin{equation}
\left\vert \psi_{s}\right\rangle \mapsto e^{-\frac{i}{\hslash}\mathcal{H
t}\left\vert \psi_{s}\right\rangle \text{.
\end{equation}
In general, $x$ is a complex quantity. However, since any phase factor
$e^{i\phi_{ws}}$ with $\phi_{ws}\i
\mathbb{R}
$ in $x\overset{\text{def}}{=}\left\langle \psi_{w}|\psi_{s}\right\rangle
=\left\vert \left\langle \psi_{w}|\psi_{s}\right\rangle \right\vert
e^{i\phi_{ws}}$ can be incorporated into the state $\left\vert s\right\rangle
$, one can assume that $x\i
\mathbb{R}
_{+}\backslash\left\{ 0\right\} $. Our objective is to find the time
$t^{\ast}$ such that $\mathcal{P}\left( t^{\ast}\right) =\mathcal{P}_{\max}$
where $\mathcal{P}\left( t\right) $ is the transition probability defined as
\cite{sakurai,picasso}
\begin{equation}
\mathcal{P}\left( t\right) \overset{\text{def}}{=}\left\vert \left\langle
\psi_{w}|e^{-\frac{i}{\hslash}\mathcal{H}t}|\psi_{s}\right\rangle \right\vert
^{2}\text{.} \label{fidelity
\end{equation}
\begin{figure}[t]
\centering
\includegraphics[width=0.3\textwidth] {fig2}\caption{Visualization of the
normalized states $\left\vert \psi_{w}\right\rangle $, $\left\vert \psi
_{s}\right\rangle $, and $\left\vert \psi_{r}\right\rangle $, as well as the
quantum overlap $x$.
\label{fig2
\end{figure}Using the Gram-Schmidt orthonormalization technique, we can
construct an orthonormal set of quantum state vectors starting from the set
$\left\{ \left\vert \psi_{w}\right\rangle \text{, }\left\vert \psi
_{s}\right\rangle \right\} $. The transition from a set of linear independent
state vectors to a set of orthonormal state vector can be described as
\begin{equation}
\left\{ \left\vert \psi_{w}\right\rangle \text{, }\left\vert \psi
_{s}\right\rangle \right\} \rightarrow\left\{ \left\vert \psi_{w
\right\rangle \text{, }\left\vert \psi_{s}\right\rangle -\left\langle \psi
_{s}|\psi_{w}\right\rangle \left\vert \psi_{w}\right\rangle \right\}
\rightarrow\left\{ \frac{\left\vert \psi_{w}\right\rangle }{\left\Vert
\left\vert \psi_{w}\right\rangle \right\Vert }\text{, }\frac{\left\vert
\psi_{s}\right\rangle -\left\langle \psi_{s}|\psi_{w}\right\rangle \left\vert
\psi_{w}\right\rangle }{\left\Vert \left\vert \psi_{s}\right\rangle
-\left\langle \psi_{s}|\psi_{w}\right\rangle \left\vert \psi_{w}\right\rangle
\right\Vert }\right\} \text{.
\end{equation}
For notational simplicity, let us define the quantum state vector $\left\vert
\psi_{r}\right\rangle $ a
\begin{equation}
\left\vert \psi_{r}\right\rangle \overset{\text{def}}{=}\frac{\left\vert
\psi_{s}\right\rangle -\left\langle \psi_{s}|\psi_{w}\right\rangle \left\vert
\psi_{w}\right\rangle }{\left\Vert \left\vert \psi_{s}\right\rangle
-\left\langle \psi_{s}|\psi_{w}\right\rangle \left\vert \psi_{w}\right\rangle
\right\Vert }\text{.} \label{erre2
\end{equation}
Recalling the definition of the quantum overlap $x$, Eq. (\ref{erre2}) can be
expressed as
\begin{equation}
\left\vert \psi_{r}\right\rangle =\frac{\left\vert \psi_{s}\right\rangle
-\left\langle \psi_{s}|\psi_{w}\right\rangle \left\vert \psi_{w}\right\rangle
}{\sqrt{\left\langle \psi_{s}|\psi_{s}\right\rangle -\left\langle \psi
_{s}|\psi_{w}\right\rangle ^{2}}}=\frac{1}{\sqrt{1-x^{2}}}\left( \left\vert
\psi_{s}\right\rangle -x\left\vert \psi_{w}\right\rangle \right) \text{.}
\label{fiar
\end{equation}
Fig. $2$ displays a graphical depiction of the orthonormal states $\left\{
\left\vert \psi_{w}\right\rangle \text{, }\left\vert \psi_{r}\right\rangle
\right\} $ together with the source state $\left\vert \psi_{s}\right\rangle $
and the quantum overlap $x$. Fig. $3$, instead, is a simple depiction of the
orthogonalization and normalization procedures that specify the Gram-Schmidt
orthonormalization technique. Note that because of the definition of
$\left\vert \psi_{r}\right\rangle $ in Eq. (\ref{fiar}), $x$ must be different
from one. In terms of the set of orthonormal basis vectors $\left\{
\left\vert \psi_{w}\right\rangle \text{, }\left\vert \psi_{r}\right\rangle
\right\} $, the source state $\left\vert \psi_{s}\right\rangle $ become
\begin{equation}
\left\vert \psi_{s}\right\rangle =\left\vert \psi_{s}\right\rangle \left(
\left\vert \psi_{w}\right\rangle \left\langle \psi_{w}\right\vert +\left\vert
\psi_{r}\right\rangle \left\langle \psi_{r}\right\vert \right) =\left\langle
\psi_{w}|\psi_{s}\right\rangle \left\vert \psi_{w}\right\rangle +\left\langle
\psi_{r}|\psi_{s}\right\rangle \left\vert \psi_{r}\right\rangle \text{.}
\label{chell
\end{equation}
Note that the quantum mechanical overlap $\left\langle \psi_{r}|\psi
_{s}\right\rangle $ in Eq. (\ref{chell}) can be recast as,
\begin{equation}
\left\langle \psi_{r}|\psi_{s}\right\rangle =\frac{1}{\sqrt{1-x^{2}}}\left(
\left\langle \psi_{s}\right\vert -x\left\langle \psi_{w}\right\vert \right)
\left( \left\vert \psi_{s}\right\rangle \right) =\frac{1}{\sqrt{1-x^{2}
}\left( 1-x^{2}\right) =\sqrt{1-x^{2}}\text{.} \label{chist
\end{equation}
Therefore, by\textbf{ }using Eq. (\ref{chist}), the state $\left\vert \psi
_{s}\right\rangle $ in Eq. (\ref{chell}) becomes
\begin{equation}
\left\vert \psi_{s}\right\rangle =x\left\vert \psi_{w}\right\rangle
+\sqrt{1-x^{2}}\left\vert \psi_{r}\right\rangle \text{.} \label{sr
\end{equation}
The matrix representation of the Hamiltonian $\mathcal{H}$ in Eq.
(\ref{hamilton}) with respect to the orthonormal basis $\left\{ \left\vert
\psi_{w}\right\rangle \text{, }\left\vert \psi_{r}\right\rangle \right\} $
where $\left\langle \psi_{w}|\psi_{r}\right\rangle =\delta_{wr}$, with
$\delta_{wr}$ denoting the Kronecker delta, can be formally written a
\begin{equation}
\left[ \mathcal{H}\right] _{\left\{ \left\vert \psi_{w}\right\rangle
\text{, }\left\vert \psi_{r}\right\rangle \right\} }\overset{\text{def}
{=}\left(
\begin{array}
[c]{cc
\left\langle \psi_{w}|\mathcal{H}|\psi_{w}\right\rangle & \left\langle
\psi_{w}|\mathcal{H}|\psi_{r}\right\rangle \\
\left\langle \psi_{r}|\mathcal{H}|\psi_{w}\right\rangle & \left\langle
\psi_{r}|\mathcal{H}|\psi_{r}\right\rangle
\end{array}
\right) \text{.
\end{equation}
Using Eqs. (\ref{hamilton}) and (\ref{sr}) together with the orthonormality
conditions $\left\langle \psi_{w}|\psi_{r}\right\rangle =\delta_{wr}$, we hav
\begin{equation}
\left[ \mathcal{H}\right] _{\left\{ \left\vert \psi_{w}\right\rangle
\text{, }\left\vert \psi_{r}\right\rangle \right\} }=\left(
\begin{array}
[c]{cc
H_{11} & H_{12}\\
H_{21} & H_{22
\end{array}
\right) \text{,} \label{symm
\end{equation}
where
\begin{align}
& H_{11}\overset{\text{def}}{=}E\left[ \alpha+\left( \beta+\gamma\right)
x+\delta x^{2}\right] \text{, }H_{12}\overset{\text{def}}{=}E\sqrt{1-x^{2
}\left( \beta+\delta x\right) \text{,}\nonumber\\
& \nonumber\\
& H_{21}\overset{\text{def}}{=}E\sqrt{1-x^{2}}\left( \gamma+\delta x\right)
\text{, }H_{22}\overset{\text{def}}{=}E\delta\left( 1-x^{2}\right) \text{.}
\label{heq
\end{align}
\begin{figure}[t]
\centering
\includegraphics[width=0.75\textwidth] {fig3}\caption{Illustration of the
Gram-Schmidt orthonormalization procedure for some vectors $\left\vert
a\right\rangle $ and $\left\vert b\right\rangle $. In this case, the resulting
orthonormal basis consists of $\left\vert e_{1}\right\rangle \overset
{\text{def}}{=}\frac{\left\vert a\right\rangle }{\left\Vert \left\vert
a\right\rangle \right\Vert }$ and $\left\vert e_{2}\right\rangle
\overset{\text{def}}{=}\frac{\left\vert b\right\rangle -\left\langle
a|b\right\rangle \left\vert a\right\rangle }{\left\Vert \left\vert
b\right\rangle -\left\langle a|b\right\rangle \left\vert a\right\rangle
\right\Vert }$.
\label{fig3
\end{figure}Observe that the Hamiltonian $\mathcal{H}$ is an Hermitian
operator and, therefore, its eigenvalues must be \emph{real }(for details, see
Appendix A). For this reason, recalling the previous constraints on $x$, we
finally have $x\in\left( 0\text{,}1\right) $. Furthermore, imposing that
$\mathcal{H}=\mathcal{H}^{\dagger}$ where the dagger symbol \textquotedbllef
$\dagger$\textquotedblright\ is the Hermitian conjugation operation, we have
\begin{equation}
\left(
\begin{array}
[c]{cc
H_{11} & H_{12}\\
H_{21} & H_{22
\end{array}
\right) =\left(
\begin{array}
[c]{cc
H_{11}^{\ast} & H_{21}^{\ast}\\
H_{12}^{\ast} & H_{22}^{\ast
\end{array}
\right) \text{.} \label{heq2
\end{equation}
Then, from Eqs. (\ref{heq}) and (\ref{heq2}), it follows that $\alpha$ and
$\delta$ must be \emph{real} coefficients while $\beta=\gamma^{\ast}$. The
symbol \textquotedblleft$\ast$\textquotedblright\ denotes the \emph{complex}
conjugation operation. Next, let us diagonalize the Hermitian matrix $\left[
\mathcal{H}\right] _{\left\{ \left\vert \psi_{w}\right\rangle \text{,
}\left\vert \psi_{r}\right\rangle \right\} }$ in Eq. (\ref{symm}). The two
\emph{real} eigenvalues $\lambda_{\pm}$ of the matrix can be written as,
\begin{equation}
\lambda_{\pm}\overset{\text{def}}{=}\frac{1}{2}\left[ \left( H_{11
+H_{22}\right) \pm\sqrt{\left( H_{11}-H_{22}\right) ^{2}+4H_{12}H_{21
}\right] \text{.} \label{eigen
\end{equation}
The eigenspaces $\mathcal{E}_{\lambda_{-}}$ and $\mathcal{E}_{\lambda_{+}}$
that correspond to the eigenvalues $\lambda_{-}$ and $\lambda_{+}$ are defined
a
\begin{equation}
\mathcal{E}_{\lambda_{-}}\overset{\text{def}}{=}\text{\textrm{Span}}\left\{
\left\vert v_{\lambda_{-}}\right\rangle \right\} \text{, and }\mathcal{E
_{\lambda_{+}}\overset{\text{def}}{=}\text{\textrm{Span}}\left\{ \left\vert
v_{\lambda_{+}}\right\rangle \right\} \text{,
\end{equation}
respectively. Furthermore, two orthogonal eigenvectors $\left\vert
v_{\lambda_{+}}\right\rangle $ and $\left\vert v_{\lambda_{-}}\right\rangle $
corresponding to the distinct eigenvalues $\lambda_{+}$ and $\lambda_{-}$ are
given by
\begin{equation}
\left\vert v_{\lambda_{+}}\right\rangle \overset{\text{def}}{=}\left(
\begin{array}
[c]{c
\frac{1}{2H_{21}}\left[ \left( H_{11}-H_{22}\right) +\sqrt{\left(
H_{11}-H_{22}\right) ^{2}+4H_{12}H_{21}}\right] \\
1
\end{array}
\right) \text{,} \label{v1
\end{equation}
and
\begin{equation}
\left\vert v_{\lambda_{-}}\right\rangle \overset{\text{def}}{=}\left(
\begin{array}
[c]{c
\frac{1}{2H_{21}}\left[ \left( H_{11}-H_{22}\right) -\sqrt{\left(
H_{11}-H_{22}\right) ^{2}+4H_{12}H_{21}}\right] \\
1
\end{array}
\right) \text{,} \label{v2
\end{equation}
respectively. For notational simplicity, let us introduce two \emph{complex}
quantities $\mathcal{A}$ and $\mathcal{B}$ defined a
\begin{equation}
\mathcal{A}\overset{\text{def}}{=}\frac{1}{2H_{21}}\left[ \left(
H_{11}-H_{22}\right) -\sqrt{\left( H_{11}-H_{22}\right) ^{2}+4H_{12}H_{21
}\right] \text{,} \label{anew
\end{equation}
and
\begin{equation}
\mathcal{B}\overset{\text{def}}{=}\frac{1}{2H_{21}}\left[ \left(
H_{11}-H_{22}\right) +\sqrt{\left( H_{11}-H_{22}\right) ^{2}+4H_{12}H_{21
}\right] \text{,} \label{bnew
\end{equation}
respectively. Using Eqs. (\ref{v1}), (\ref{v2}), (\ref{anew}), and
(\ref{bnew}), the eigenvector matrix $M_{\mathcal{H}}$ for the matrix $\left[
\mathcal{H}\right] _{\left\{ \left\vert \psi_{w}\right\rangle \text{,
}\left\vert \psi_{r}\right\rangle \right\} }$ and its inverse $M_{\mathcal{H
}^{-1}$ can be formally written as
\begin{equation}
M_{\mathcal{H}}\overset{\text{def}}{=}\left(
\begin{array}
[c]{cc
\mathcal{A} & \mathcal{B}\\
1 & 1
\end{array}
\right) \text{,} \label{mmatrix2
\end{equation}
and
\begin{equation}
M_{\mathcal{H}}^{-1}\overset{\text{def}}{=}\frac{1}{\mathcal{A}-\mathcal{B
}\left(
\begin{array}
[c]{cc
1 & -\mathcal{B}\\
-1 & \mathcal{A
\end{array}
\right) =M_{\mathcal{H}}^{\dagger}\text{,} \label{mimatrix2
\end{equation}
respectively. In terms of the matrices $M_{\mathcal{H}}$ in Eq.
(\ref{mmatrix2}), $M_{\mathcal{H}}^{-1}$ in Eq. (\ref{mimatrix2}), and the
diagonal matrix $H_{\text{diagonal}}$ defined as
\begin{equation}
H_{\text{diagonal}}\overset{\text{def}}{=}\left[ \mathcal{H}\right]
_{\left\{ \left\vert v_{\lambda-}\right\rangle \text{, }\left\vert
v_{\lambda_{+}}\right\rangle \right\} }=\left(
\begin{array}
[c]{cc
\left\langle v_{\lambda-}|\mathcal{H}|v_{\lambda-}\right\rangle &
\left\langle v_{\lambda-}|\mathcal{H}|v_{\lambda_{+}}\right\rangle \\
\left\langle v_{\lambda_{+}}|\mathcal{H}|v_{\lambda-}\right\rangle &
\left\langle v_{\lambda_{+}}|\mathcal{H}|v_{\lambda_{+}}\right\rangle
\end{array}
\right) =\left(
\begin{array}
[c]{cc
\lambda_{-} & 0\\
0 & \lambda_{+
\end{array}
\right) \text{,} \label{hdiagonal
\end{equation}
the matrix $\left[ \mathcal{H}\right] _{\left\{ \left\vert \psi
_{w}\right\rangle \text{, }\left\vert \psi_{r}\right\rangle \right\} }$
in\ Eq. (\ref{symm}) become
\begin{equation}
\left[ \mathcal{H}\right] _{\left\{ \left\vert \psi_{w}\right\rangle
\text{, }\left\vert \psi_{r}\right\rangle \right\} }=M_{\mathcal{H
}H_{\text{diagonal}}M_{\mathcal{H}}^{-1}=\left(
\begin{array}
[c]{cc
\mathcal{A} & \mathcal{B}\\
1 & 1
\end{array}
\right) \left(
\begin{array}
[c]{cc
\lambda_{-} & 0\\
0 & \lambda_{+
\end{array}
\right) \left(
\begin{array}
[c]{cc
\frac{1}{\mathcal{A}-\mathcal{B}} & \frac{-\mathcal{B}}{\mathcal{A
-\mathcal{B}}\\
\frac{-1}{\mathcal{A}-\mathcal{B}} & \frac{\mathcal{A}}{\mathcal{A
-\mathcal{B}
\end{array}
\right) \text{.
\end{equation}
We recall that the eigenvalues in\ Eq. (\ref{hdiagonal}) are defined in\ Eq.
(\ref{eigen}) while $\mathcal{A}$ and $\mathcal{B}$ appear in\ Eqs.
(\ref{anew}) and (\ref{bnew}), respectively. At this juncture, we also recall
that our objective is to find the time $t^{\ast}$ such that $\mathcal{P
\left( t^{\ast}\right) =\mathcal{P}_{\max}$ where the transition probability
$\mathcal{P}\left( t\right) $ is defined in Eq. (\ref{fidelity}). Employing
standard linear algebra techniques, $\mathcal{P}\left( t\right) $ can be
recast a
\begin{equation}
\mathcal{P}\left( t\right) \overset{\text{def}}{=}\left\vert \left\langle
\psi_{w}|e^{-\frac{i}{\hslash}\mathcal{H}t}|\psi_{s}\right\rangle \right\vert
^{2}=\left\vert \left\langle \psi_{w}|e^{-\frac{i}{\hslash}M\mathcal{H
_{\text{diagonal}}M^{\dagger}t}|\psi_{s}\right\rangle \right\vert
^{2}=\left\vert \left\langle \psi_{w}|Me^{-\frac{i}{\hslash}\mathcal{H
_{\text{diagonal}}t}M^{\dagger}|\psi_{s}\right\rangle \right\vert ^{2}\text{,}
\label{pt3
\end{equation}
where $\mathcal{H}_{\text{diagonal}}$ denotes the Hermitian operator whose
matrix representation is $H_{\text{diagonal}}$ in Eq. (\ref{hdiagonal}). Using
the matrix notation with components expressed with respect to the orthonormal
basis $\left\{ \left\vert \psi_{w}\right\rangle \text{, }\left\vert \psi
_{r}\right\rangle \right\} $, quantum states $\left\vert \psi_{w
\right\rangle $ and $\left\vert \psi_{s}\right\rangle $ are given by
\begin{equation}
\left\vert \psi_{w}\right\rangle \overset{\text{def}}{=}\left(
\begin{array}
[c]{c
1\\
0
\end{array}
\right) \text{, and }\left\vert \psi_{s}\right\rangle \overset{\text{def}
{=}\left(
\begin{array}
[c]{c
x\\
\sqrt{1-x^{2}
\end{array}
\right) \text{,} \label{matic2
\end{equation}
respectively. By means of Eqs. (\ref{mmatrix2}), (\ref{mimatrix2}), and
(\ref{matic2}), the quantum state amplitude $\left\langle \psi_{w
|e^{-\frac{i}{\hslash}\mathcal{H}t}|\psi_{s}\right\rangle $ that appears in
the expression of the fidelity $\mathcal{P}\left( t\right) $ in\ Eq.
(\ref{pt3}) become
\begin{equation}
\left\langle \psi_{w}|e^{-\frac{i}{\hslash}\mathcal{H}t}|\psi_{s}\right\rangle
=\frac{1}{\mathcal{A}-\mathcal{B}}\left[ \mathcal{A}e^{-\frac{i}{\hslash
}\lambda_{-}t}\left( x-\mathcal{B}\sqrt{1-x^{2}}\right) -\mathcal{B
e^{-\frac{i}{\hslash}\lambda_{+}t}\left( x-\mathcal{A}\sqrt{1-x^{2}}\right)
\right] \text{,} \label{part1b
\end{equation}
and, as a consequence, its complex conjugate $\left\langle \psi_{w
|e^{-\frac{i}{\hslash}\mathcal{H}t}|\psi_{s}\right\rangle ^{\ast}$ is,
\begin{equation}
\left\langle \psi_{w}|e^{-\frac{i}{\hslash}\mathcal{H}t}|\psi_{s}\right\rangle
^{\ast}=\frac{1}{\mathcal{A}-\mathcal{B}}\left[ \mathcal{A}e^{\frac
{i}{\hslash}\lambda_{-}t}\left( x-\mathcal{B}\sqrt{1-x^{2}}\right)
-\mathcal{B}e^{\frac{i}{\hslash}\lambda_{+}t}\left( x-\mathcal{A
\sqrt{1-x^{2}}\right) \right] \text{.} \label{part2b
\end{equation}
Observe that
\begin{equation}
e^{-\frac{i}{\hslash}\lambda_{-}t}=e^{-\frac{i}{\hslash}\frac{H_{11}+H_{22
}{2}t}e^{i\frac{\mathrm{a}}{\hslash}t}\text{ and, }e^{-\frac{i}{\hslash
}\lambda_{+}t}=e^{-\frac{i}{\hslash}\frac{H_{11}+H_{22}}{2}t}e^{-i\frac
{\mathrm{a}}{\hslash}t} \label{aeq
\end{equation}
where, recalling Eq. (\ref{eigen}), the \emph{real} quantity $\mathrm{a}$ is
defined a
\begin{equation}
\mathrm{a}\overset{\text{def}}{=}\frac{1}{2}\sqrt{\left( H_{11
-H_{22}\right) ^{2}+4H_{12}H_{21}}\text{.} \label{adef
\end{equation}
Employing Eq. (\ref{aeq}), the \emph{complex} probability amplitudes in Eqs.
(\ref{part1b}) and (\ref{part2b}) becom
\begin{equation}
\left\langle \psi_{w}|e^{-\frac{i}{\hslash}\mathcal{H}t}|\psi_{s}\right\rangle
=e^{-\frac{i}{\hslash}\frac{H_{11}+H_{22}}{2}t}\left[ \frac{\mathcal{A
\left( x-\mathcal{B}\sqrt{1-x^{2}}\right) }{\mathcal{A}-\mathcal{B
}e^{i\frac{\mathrm{a}}{\hslash}t}-\frac{\mathcal{B}\left( x-\mathcal{A
\sqrt{1-x^{2}}\right) }{\mathcal{A}-\mathcal{B}}e^{-i\frac{\mathrm{a
}{\hslash}t}\right] \text{,} \label{part3
\end{equation}
and
\begin{equation}
\left\langle \psi_{w}|e^{-\frac{i}{\hslash}\mathcal{H}t}|\psi_{s}\right\rangle
^{\ast}=e^{\frac{i}{\hslash}\frac{H_{11}+H_{22}}{2}t}\left[ \frac
{\mathcal{A}^{\ast}\left( x-\mathcal{B}^{\ast}\sqrt{1-x^{2}}\right)
}{\mathcal{A}^{\ast}-\mathcal{B}^{\ast}}e^{-i\frac{\mathrm{a}}{\hslash
t}-\frac{\mathcal{B}^{\ast}\left( x-\mathcal{A}^{\ast}\sqrt{1-x^{2}}\right)
}{\mathcal{A}^{\ast}-\mathcal{B}^{\ast}}e^{i\frac{\mathrm{a}}{\hslash
t}\right] \text{,} \label{part4
\end{equation}
respectively. Using Eqs. (\ref{part3})\ and (\ref{part4}) and introducing the
following three quantitie
\begin{equation}
\tilde{A}\overset{\text{def}}{=}\frac{\mathcal{A}\left( x-\mathcal{B
\sqrt{1-x^{2}}\right) }{\mathcal{A}-\mathcal{B}}\text{, }\tilde{B
\overset{\text{def}}{=}-\frac{\mathcal{B}\left( x-\mathcal{A}\sqrt{1-x^{2
}\right) }{\mathcal{A}-\mathcal{B}}\text{, and }\tilde{\alpha}=\frac
{\mathrm{a}}{\hslash}t\text{,} \label{newroba
\end{equation}
the transition probability $\mathcal{P}\left( t\right) $ in Eq.
(\ref{fidelity}) can be written a
\begin{equation}
\mathcal{P}\left( \tilde{\alpha}\right) =\left[ \tilde{A}e^{i\tilde{\alpha
}}+\tilde{B}e^{-i\tilde{\alpha}}\right] \left[ \tilde{A}^{\ast
e^{-i\tilde{\alpha}}+\tilde{B}^{\ast}e^{i\tilde{\alpha}}\right] =\left\vert
\tilde{A}\right\vert ^{2}+\left\vert \tilde{B}\right\vert ^{2}+2\tilde
{A}\tilde{B}^{\ast}\cos\left( 2\tilde{\alpha}\right) \text{,
\end{equation}
where we point out that $\tilde{A}\tilde{B}^{\ast}$ is \emph{real} since
$H_{12}=H_{21}^{\ast}$. By employing standard trigonometric identities in a
convenient sequential order (for details, see Appendix B), we fin
\begin{equation}
\mathcal{P}\left( \tilde{\alpha}\right) =\left\vert \tilde{A}-\tilde
{B}\right\vert ^{2}\sin^{2}\left( \tilde{\alpha}\right) +\left\vert
\tilde{A}+\tilde{B}\right\vert ^{2}\cos^{2}\left( \tilde{\alpha}\right)
\text{.} \label{fess
\end{equation}
Using Eqs. (\ref{newroba}), (\ref{adef}), (\ref{anew}), and (\ref{bnew}), the
transition probability $\mathcal{P}\left( \tilde{\alpha}\right) $ in Eq.
(\ref{fess}) become
\begin{equation}
\mathcal{P}\left( t\right) =\frac{\left\vert \left( H_{11}-H_{22}\right)
x+2H_{12}\sqrt{1-x^{2}}\right\vert ^{2}}{\left( H_{11}-H_{22}\right)
^{2}+4H_{12}H_{21}}\sin^{2}\left( \frac{\sqrt{\left( H_{11}-H_{22}\right)
^{2}+4H_{12}H_{21}}}{2\hslash}t\right) +x^{2}\cos^{2}\left( \frac
{\sqrt{\left( H_{11}-H_{22}\right) ^{2}+4H_{12}H_{21}}}{2\hslash}t\right)
\text{.} \label{it
\end{equation}
From Eq. (\ref{it}), it follows that the maximum $\mathcal{P}_{\max
}=\mathcal{P}\left( t^{\ast}\right) $ of $\mathcal{P}\left( t\right) $
occurs at the instant $t^{\ast}$
\begin{equation}
t^{\ast}\overset{\text{def}}{=}\frac{\pi\hslash}{\sqrt{\left( H_{11
-H_{22}\right) ^{2}+4H_{12}H_{21}}}\text{,} \label{start
\end{equation}
and equal
\begin{equation}
\mathcal{P}_{\max}=\frac{\left\vert \left( H_{11}-H_{22}\right)
x+2H_{12}\sqrt{1-x^{2}}\right\vert ^{2}}{\left( H_{11}-H_{22}\right)
^{2}+4H_{12}H_{21}}\text{.} \label{maxp
\end{equation}
Finally, making use of Eq.(\ref{heq}) and recalling that $\alpha$ and $\delta$
must be \emph{real} coefficients while $\beta=\gamma^{\ast}$, $\mathcal{P
_{\max}$ in Eq. (\ref{maxp}) become
\begin{equation}
\mathcal{P}_{\max}\left( \alpha\text{, }\beta\text{, }\delta\text{,
}x\right) =\frac{\left\vert \left[ \left( \alpha-\delta\right) +\left(
\beta+\beta^{\ast}\right) x+2\delta x^{2}\right] x+2\left( \beta+\delta
x\right) \left( 1-x^{2}\right) \right\vert ^{2}}{\left[ \left(
\alpha-\delta\right) +\left( \beta+\beta^{\ast}\right) x+2\delta
x^{2}\right] ^{2}+4\left( 1-x^{2}\right) \left( \beta+\delta x\right)
\left( \beta^{\ast}+\delta x\right) }\text{.} \label{nono
\end{equation}
Note that $\gamma=\beta^{\ast}$, $\beta+\beta^{\ast}=2\operatorname{Re}\left(
\beta\right) \i
\mathbb{R}
$, and the product $\left( \beta+\delta x\right) \left( \beta^{\ast}+\delta
x\right) $ is a \emph{real} quantity for any \emph{complex} parameter $\beta$.
\section{Discussion}
In this section, we discuss a variety of limiting cases that arise from the
generalized search Hamiltonian in Eq. (\ref{hamilton}). In particular, we make
a distinction between optimal and suboptimal scenarios. The former scenarios
are cases where the probability of finding the target state equals one. The
latter scenarios, instead, are cases where the probability of finding the
target state is less than one.
\emph{General Case}: The general case is specified by the conditions
$\alpha\neq\delta$ \emph{real} and $\beta=\gamma^{\ast}$ \emph{complex
}coefficients. We note that after some straightforward but tedious algebra,
$\mathcal{P}_{\max}$ in Eq. (\ref{nono}) can be recast a
\begin{equation}
\mathcal{P}_{\max}\left( \alpha\text{, }\beta\text{, }\delta\text{,
}x\right) =\frac{4\left[ \left\vert \beta\right\vert ^{2}-\operatorname{Re
^{2}\left( \beta\right) \right] x^{4}+\left[ \left( \alpha+\delta\right)
^{2}-8\left( \left\vert \beta\right\vert ^{2}-\operatorname{Re}^{2}\left(
\beta\right) \right) \right] x^{2}+4\operatorname{Re}\left( \beta\right)
\left( \alpha+\delta\right) x+4\left\vert \beta\right\vert ^{2}}{4\left[
\alpha\delta+\operatorname{Re}^{2}\left( \beta\right) -\left\vert
\beta\right\vert ^{2}\right] x^{2}+4\operatorname{Re}\left( \beta\right)
\left( \alpha+\delta\right) x+\left[ \left( \alpha-\delta\right)
^{2}+4\left\vert \beta\right\vert ^{2}\right] }\text{.} \label{nano2
\end{equation}
Furthermore, by using Eq. (\ref{heq}) in Eq. (\ref{start}), the time $t^{\ast
}$ at which this maximum transition probability value $\mathcal{P}_{\max}$ is
achieved becomes
\begin{equation}
t_{\mathcal{H}}^{\ast}\overset{\text{def}}{=}\frac{\pi\hslash}{E\sqrt{\left[
\left( \alpha-\delta\right) +x\left( \beta+\beta^{\ast}\right)
+2x^{2}\delta\right] ^{2}+4\left( 1-x^{2}\right) \left( \beta+\delta
x\right) \left( \beta^{\ast}+\delta x\right) }}\text{.} \label{nano
\end{equation}
The subscript $\mathcal{H}$ in $t_{\mathcal{H}}^{\ast}$ denotes the
generalized search Hamiltonian in Eq. (\ref{hamilton}). Observe that
$t_{\mathcal{H}}^{\ast}$ in Eq. (\ref{nano}) can be rewritten as
\begin{equation}
t_{\mathcal{H}}^{\ast}\overset{\text{def}}{=}\frac{2}{\sqrt{4\left[
\alpha\delta+\operatorname{Re}^{2}\left( \beta\right) -\left\vert
\beta\right\vert ^{2}\right] x^{2}+4\operatorname{Re}\left( \beta\right)
\left( \alpha+\delta\right) x+\left[ \left( \alpha-\delta\right)
^{2}+4\left\vert \beta\right\vert ^{2}\right] }}\frac{\pi\hslash}{2E}\text{.}
\label{nano1
\end{equation}
\begin{table}[t]
\centering
\begin{tabular}
[c]{c|c|c|c|c|c
Case & $\alpha$ & $\beta$ & $\gamma$ & $\delta$ & ${\mathcal{P}}_{\text{max}
$\\\hline
General & $\neq\delta$ & $\gamma^{*}\in\mathbb{C}$ & $\beta^{*}\in\mathbb{C}$
& $\neq\alpha$ & $\leq1$\\
1 & $\delta$ & $0$ & $0$ & $\alpha$ & $1$\\
2 & $\neq\delta$ & $0$ & $0$ & $\neq\alpha$ & $\leq1$\\
3 & $0$ & $\gamma^{*}\in\mathbb{R}$ & $\beta^{*}\in\mathbb{R}$ & $0$ & $1$\\
4 & $0$ & $\gamma*\in\mathbb{C}$ & $\beta^{*}\in\mathbb{C}$ & $0$ & $\leq1$\\
5 & $\delta$ & $\gamma^{*}\in\mathbb{R}$ & $\beta^{*}\in\mathbb{R}$ & $\alpha$
& $1$\\
6 & $\delta$ & $\gamma^{*}\in\mathbb{C}$ & $\beta^{*}\in\mathbb{C}$ & $\alpha$
& $\leq1$\\
7 & $\neq\delta$ & $\gamma^{*}\in\mathbb{R}$ & $\beta^{*}\in\mathbb{R}$ &
$\neq\alpha$ & $\leq1
\end{tabular}
\caption{Summary of maximal success probability values $\mathcal{P}_{\max}$
that can be achieved for a variety of choices of the parameters $\alpha$,
$\beta$, $\gamma$, and $\delta$ specifying the quantum search Hamiltonian
$\mathcal{H}$ in Eq. (\ref{hamilton}).
\end{table}In what follows, we choose to briefly discuss a number of limiting
cases that arise from Eq. (\ref{nano2}). In particular, the
big-calligraphic-$\mathcal{O}$ notation $f\left( \varepsilon\right)
=\mathcal{O}\left( g\left( \varepsilon\right) \right) $ means that
$f\left( \varepsilon\right) $ is an infinitesimal of order equal to
$g\left( \varepsilon\right) $ as $\varepsilon$ approaches zero, that is
\begin{equation}
\lim_{\varepsilon\rightarrow0}\frac{f\left( \varepsilon\right) }{g\left(
\varepsilon\right) }=K\text{,
\end{equation}
where $K$ denotes a nonzero \emph{real} constant. In Table I we report an
overview of the maximal success probability values that can be obtained for a
variety of choices of the parameters $\alpha$, $\beta$, $\gamma$, and $\delta$
characterizing the quantum search Hamiltonian $\mathcal{H}$. In particular, we
note that the unit success probability $\mathcal{P}_{\max}=1$ can be achieved
only when considering the Hamiltonians $\mathcal{H}_{1}$, $\mathcal{H}_{3}$,
and $\mathcal{H}_{5}$. Fig. $4$, instead, displays the negative effect on the
maximal success probability $\mathcal{P}_{\max}$ due to asymmetries
($\alpha\neq\delta$) and complexities ($\beta\i
\mathbb{C}
$) in the parameters of the quantum search Hamiltonian $\mathcal{H}$ when the
quantum overlap $x$ approaches zero.
\emph{Case 1}: $\alpha=\delta$, and $\beta=\gamma=0$. In this case, the
Hamiltonian $\mathcal{H}$ in Eq. (\ref{hamilton}) is given by
\begin{equation}
\mathcal{H}_{1}\overset{\text{def}}{=}\alpha E\left[ \left\vert \psi
_{w}\right\rangle \left\langle \psi_{w}\right\vert +\left\vert \psi
_{s}\right\rangle \left\langle \psi_{s}\right\vert \right] \text{.}
\label{h1
\end{equation}
Furthermore, the the maximum value of the transition probability in Eq.
(\ref{nono}) becomes $\mathcal{P}_{\max}=1$ reached at the time
$t_{\mathcal{H}_{1}}^{\ast}$
\begin{equation}
t_{\mathcal{H}_{1}}^{\ast}=\frac{1}{\alpha x}\frac{\pi\hslash}{2E}\text{.}
\label{tstar1
\end{equation}
Observe that when $\alpha=1$ in\ Eq. (\ref{tstar1}), we recover the well-known
result by Farhi and Guttmann. As a side remark, we point out that
$t_{\mathcal{H}_{1}}^{\ast}$ in Eq. (\ref{tstar1}) is inversely proportional
to the quantum overlap $x$ between the initial state $\left\vert \psi
_{s}\right\rangle $ and the target state $\left\vert \psi_{w}\right\rangle $.
\emph{Case 2}: $\alpha\neq\delta$, and $\beta=\gamma=0$. Using these working
assumptions, the Hamiltonian $\mathcal{H}$ in Eq. (\ref{hamilton}) becomes
\begin{equation}
\mathcal{H}_{2}\overset{\text{def}}{=}E\left[ \alpha\left\vert \psi
_{w}\right\rangle \left\langle \psi_{w}\right\vert +\delta\left\vert \psi
_{s}\right\rangle \left\langle \psi_{s}\right\vert \right] \text{.}
\label{h2
\end{equation}
In this case, $\mathcal{P}_{\max}$ is given by
\begin{equation}
\mathcal{P}_{\max}=\frac{\left( \alpha+\delta\right) ^{2}x^{2}}{4x^{2
\alpha\delta+\left( \alpha-\delta\right) ^{2}}\text{.} \label{p2
\end{equation}
This maximum $\mathcal{P}_{\max}$ with $0\leq\mathcal{P}_{\max}\leq1$ is
reached at $t_{\mathcal{H}_{2}}^{\ast}$
\begin{equation}
t_{\mathcal{H}_{2}}^{\ast}=\frac{2}{\sqrt{4x^{2}\alpha\delta+\left(
\alpha-\delta\right) ^{2}}}\frac{\pi\hslash}{2E}\text{.} \label{tstar2
\end{equation}
Note that $\mathcal{P}_{\max}$ in Eq. (\ref{p2}), when viewed as a function of
$x$, assumes it maximum value $1$ when $\alpha=\delta$. Furthermore,
$\mathcal{P}_{\max}=1$ when $x=1$ for any choice of $\alpha$ and $\delta$.
Furthermore, $t_{\mathcal{H}_{1}}^{\ast}\geq$ $t_{\mathcal{H}_{2}}^{\ast}$
when $0\leq\delta/\left( 1-4x^{2}\right) \leq\alpha$. In particular, when
$\alpha=\delta/\left( 1-4x^{2}\right) $, we ge
\begin{equation}
\frac{2E}{\pi\hslash}t_{\mathcal{H}_{1}}^{\ast}=\frac{1-4x^{2}}{\delta
x}=\frac{2E}{\pi\hslash}t_{\mathcal{H}_{2}}^{\ast}\text{.
\end{equation}
Finally, we remark that when $0$ $\leq\alpha-\delta\ll1$, the approximate
expression of $\mathcal{P}_{\max}$ in Eq. (\ref{p2}) become
\begin{equation}
\mathcal{P}_{\max}=1-\frac{1}{4}\frac{1-x^{2}}{\alpha^{2}x^{2}}\left(
\alpha-\delta\right) ^{2}+\mathcal{O}\left( \left\vert \alpha-\delta
\right\vert ^{3}\right) \text{.} \label{profound
\end{equation}
This approximate maximum transition probability value $\mathcal{P}_{\max}$ in
Eq. (\ref{profound}) is achieved whe
\begin{equation}
t_{\mathcal{H}_{2}}^{\ast}=\left[ \frac{1}{\alpha x}-\frac{1}{8}\frac{\left(
\alpha-\delta\right) ^{2}}{\alpha^{3}x^{3}}+\mathcal{O}\left( \left\vert
\alpha-\delta\right\vert ^{3}\right) \right] \frac{\pi\hslash}{2E}\text{,
\end{equation}
that is, $t_{\mathcal{H}_{2}}^{\ast}=t_{\mathcal{H}_{1}}^{\ast}+\mathcal{O
\left( \left\vert \alpha-\delta\right\vert ^{2}\right) $.
\begin{figure}[t]
\centering
\includegraphics[width=0.75\textwidth] {fig4}\caption{Maximal success
probability $\mathcal{P}_{\max}$ as a function of $\alpha-\delta$ for
$\left\vert \beta\right\vert =0.25$ (dotted line), $\left\vert \beta
\right\vert =0.5$ (thin solid line), and $\left\vert \beta\right\vert =1$
(thick solid line) in the working assumption that $x$ approaches zero (left);
Maximal success probability $\mathcal{P}_{\max}$ as a function of $\left\vert
\beta\right\vert $ for $\alpha-\delta=0$ (dotted line), $\alpha-\delta=0.25$
(thin solid line), and $\alpha-\delta=0.5$ (thick solid line) in the working
assumption that $x$ approaches zero (right).
\label{fig4
\end{figure}
\emph{Case 3}: $\beta=\gamma^{\ast}$ \emph{real}, and $\alpha=\delta=0$. In
this case, the Hamiltonian $\mathcal{H}$ in Eq. (\ref{hamilton}) is given by
\begin{equation}
\mathcal{H}_{3}\overset{\text{def}}{=}\beta E\left[ \left\vert \psi
_{w}\right\rangle \left\langle \psi_{s}\right\vert +\left\vert \psi
_{s}\right\rangle \left\langle \psi_{w}\right\vert \right] \text{.}
\label{h3
\end{equation}
The Hamiltonian $\mathcal{H}_{3}$ can be used to search for the target state
$\left\vert \psi_{w}\right\rangle $ with certainty since the maximum
probability value $\mathcal{P}_{\max}$ is given by $\mathcal{P}_{\max}=1$.
This maximum $\mathcal{P}_{\max}$ is reached at $t_{\mathcal{H}_{3}}^{\ast}$
\begin{equation}
t_{\mathcal{H}_{3}}^{\ast}\overset{\text{def}}{=}\frac{1}{\beta}\frac
{\pi\hslash}{2E}\text{.} \label{tstar3
\end{equation}
Note that, unlike the previous two cases, the time $t_{\mathcal{H}_{3}}^{\ast
}$ does not depend on the quantum overlap $x$.
\emph{Case 4}: $\beta=\gamma^{\ast}$ $\emph{complex}$, and $\alpha=\delta=0$.
Using these working assumptions, the Hamiltonian $\mathcal{H}$ in Eq.
(\ref{hamilton}) becomes
\begin{equation}
\mathcal{H}_{4}\overset{\text{def}}{=}E\left[ \beta\left\vert \psi
_{w}\right\rangle \left\langle \psi_{s}\right\vert +\beta^{\ast}\left\vert
\psi_{s}\right\rangle \left\langle \psi_{w}\right\vert \right] \text{.}
\label{h4
\end{equation}
In this case, $\mathcal{P}_{\max}$ become
\begin{equation}
\mathcal{P}_{\max}=\frac{8\left[ \operatorname{Re}\left( \beta\right)
\right] ^{2}x^{2}-4\left[ \operatorname{Re}\left( \beta\right) \right]
^{2}x^{4}+4\left\vert \beta\right\vert ^{2}\left( 1-x^{2}\right) ^{2
}{4\left[ \operatorname{Re}\left( \beta\right) \right] ^{2}x^{2
+4\left\vert \beta\right\vert ^{2}\left( 1-x^{2}\right) }\text{.}
\label{pmaxcomplex
\end{equation}
This maximum $\mathcal{P}_{\max}$ in\ Eq. (\ref{pmaxcomplex}) is reached at
$t_{\mathcal{H}_{4}}^{\ast}$
\begin{equation}
t_{\mathcal{H}_{4}}^{\ast}\overset{\text{def}}{=}\frac{2}{\sqrt{4\left[
\operatorname{Re}\left( \beta\right) \right] ^{2}x^{2}+4\left\vert
\beta\right\vert ^{2}\left( 1-x^{2}\right) }}\frac{\pi\hslash}{2E}\text{.
\end{equation}
Note that, unlike the previous case, the time $t_{\mathcal{H}_{4}}^{\ast}$
does depend on the quantum overlap $x$. Furthermore, observe that if
$\operatorname{Re}\left( \beta\right) =0$, $\mathcal{P}_{\max}$ in Eq.
(\ref{pmaxcomplex}) becomes $\mathcal{\tilde{P}}_{\max}=1-x^{2}$. This maximum
$\mathcal{\tilde{P}}_{\max}$ is reached at $\tilde{t}_{\mathcal{H}_{4}}^{\ast
}$
\begin{equation}
\tilde{t}_{\mathcal{H}_{4}}^{\ast}\overset{\text{def}}{=}\frac{1
{\sqrt{\left\vert \beta\right\vert ^{2}\left( 1-x^{2}\right) }}\frac
{\pi\hslash}{2E}=\frac{1}{\left\vert \beta\right\vert }\left[ 1+\frac{1
{2}x^{2}+\mathcal{O}\left( x^{4}\right) \right] \frac{\pi\hslash
{2E}=t_{\mathcal{H}_{3}}^{\ast}+\mathcal{O}\left( x^{2}\right) \text{.}
\label{ttilda4
\end{equation}
In other words, when $0\leq x\ll1$, the search Hamiltonian $\mathcal{H}_{4}$
behaves approximately like the Hamiltonian $\mathcal{H}_{3}$. As a final
remark, we note that when $\beta\overset{\text{def}}{=}2iEx$ we recover
Fenner's quantum search Hamiltonian as proposed in\ Ref. \cite{fenner}.
\emph{Case 5}: $\alpha=\delta$, and $\beta=\gamma^{\ast}$ \emph{real}. In this
case, the Hamiltonian $\mathcal{H}$ in Eq. (\ref{hamilton}) is given b
\begin{equation}
\mathcal{H}_{5}\overset{\text{def}}{=}\alpha E\left[ \left\vert \psi
_{w}\right\rangle \left\langle \psi_{w}\right\vert +\left\vert \psi
_{s}\right\rangle \left\langle \psi_{s}\right\vert \right] +\beta E\left[
\left\vert \psi_{w}\right\rangle \left\langle \psi_{s}\right\vert +\left\vert
\psi_{s}\right\rangle \left\langle \psi_{w}\right\vert \right] \text{.}
\label{h5
\end{equation}
It happens that given $\mathcal{H}_{5}$, $\mathcal{P}_{\max}$ becomes
$\mathcal{P}_{\max}=1$. Furthermore, the maximum $\mathcal{P}_{\max}$ is
reached at $t_{\mathcal{H}_{5}}^{\ast}$
\begin{equation}
t_{\mathcal{H}_{5}}^{\ast}=\frac{1}{\alpha x+\beta}\frac{\pi\hslash
{2E}\text{.} \label{tstar5
\end{equation}
Note that for $\beta=0$ and $\alpha=0$, $t_{\mathcal{H}_{5}}^{\ast}$ reduces
to $t_{\mathcal{H}_{1}}^{\ast}$ and $t_{\mathcal{H}_{3}}^{\ast}$,
respectively. For the sake of completeness, we remark that the Hamiltonian
in\ Eq. (\ref{h5}) was originally considered in Ref. \cite{bae02}.
\emph{Case 6}: $\alpha=\delta$, and $\beta=\gamma^{\ast}$ \emph{complex}. In
this case, the Hamiltonian $\mathcal{H}$ in Eq. (\ref{hamilton}) is given b
\begin{equation}
\mathcal{H}_{6}\overset{\text{def}}{=}\alpha E\left[ \left\vert \psi
_{w}\right\rangle \left\langle \psi_{w}\right\vert +\left\vert \psi
_{s}\right\rangle \left\langle \psi_{s}\right\vert \right] +E\left[
\beta\left\vert \psi_{w}\right\rangle \left\langle \psi_{s}\right\vert
+\beta^{\ast}\left\vert \psi_{s}\right\rangle \left\langle \psi_{w}\right\vert
\right] \text{.
\end{equation}
Moreover, $\mathcal{P}_{\max}$ become
\begin{equation}
\mathcal{P}_{\max}=\frac{\left\vert \left[ 2\operatorname{Re}\left(
\beta\right) x+2\alpha x^{2}\right] x+2\left( \alpha x+\beta\right)
\left( 1-x^{2}\right) \right\vert ^{2}}{\left[ 2\operatorname{Re}\left(
\beta\right) x+2\alpha x^{2}\right] ^{2}+4\left( 1-x^{2}\right) \left[
\left\vert \beta\right\vert ^{2}+2\alpha\operatorname{Re}\left( \beta\right)
x+\alpha^{2}x^{2}\right] }\text{.} \label{pmax2
\end{equation}
The maximum $\mathcal{P}_{\max}$ is reached at $t_{\mathcal{H}_{6}}^{\ast}$
\begin{equation}
t_{\mathcal{H}_{6}}^{\ast}\overset{\text{def}}{=}\frac{2}{\sqrt{\left[
2\operatorname{Re}\left( \beta\right) x+2\alpha x^{2}\right] ^{2}+4\left(
1-x^{2}\right) \left[ \left\vert \beta\right\vert ^{2}+2\alpha
\operatorname{Re}\left( \beta\right) x+\alpha^{2}x^{2}\right] }}\frac
{\pi\hslash}{2E}\text{.
\end{equation}
\begin{table}[t]
\centering
\begin{tabular}
[c]{c|c|c|c|c
$\mathcal{H}$ & ${\mathcal{P}}_{\text{max}}$ & $t_{\mathcal{H}}^{\ast}$ &
$(\alpha,\delta)$ & $(\beta,\gamma)$\\\hline
$\mathcal{H}_{1}$ & $1$ & $\frac{\pi\hslash}{2E}(\alpha x)^{-1}$ &
$\alpha=\delta\neq0$ & $\beta=\gamma^{*}=0$\\
$\mathcal{H}_{3}$ & $1$ & $\frac{\pi\hslash}{2E}(\beta)^{-1}$ & $\alpha
=\delta=0$ & $\beta=\gamma^{*}\in\mathbb{R}\backslash\{0\}$\\
$\mathcal{H}_{5}$ & $1$ & $\frac{\pi\hslash}{2E}(\alpha x+\beta)^{-1}$ &
$\alpha=\delta\neq0$ & $\beta=\gamma^{*}\in\mathbb{R}\backslash\{0\}
\end{tabular}
\caption{Summary of cases where unit maximal success probability values
$\mathcal{P}_{\max}$ can be achieved for a variety of choices of the
parameters $\alpha$, $\beta$, $\gamma$, and $\delta$ specifying the quantum
search Hamiltonian $\mathcal{H}$ in Eq. (\ref{hamilton}).
\end{table}
\emph{Case 7}: $\alpha\neq\delta$, and $\beta=\gamma^{\ast}$ \emph{real}. The
Hamiltonian $\mathcal{H}$ in Eq. (\ref{hamilton}) is given by,
\begin{equation}
\mathcal{H}_{7}\overset{\text{def}}{=}E\left[ \alpha\left\vert \psi
_{w}\right\rangle \left\langle \psi_{w}\right\vert +\delta\left\vert \psi
_{s}\right\rangle \left\langle \psi_{s}\right\vert \right] +\beta E\left[
\left\vert \psi_{w}\right\rangle \left\langle \psi_{s}\right\vert +\left\vert
\psi_{s}\right\rangle \left\langle \psi_{w}\right\vert \right] \text{.
\end{equation}
In this case, $\mathcal{P}_{\max}$ become
\begin{equation}
\mathcal{P}_{\max}=\frac{\left[ \left( \alpha+\delta\right) x+2\beta
\right] ^{2}}{4\left[ \alpha\delta x^{2}+\left( \alpha\beta+\beta
\delta\right) x+\beta^{2}\right] +\left( \alpha-\delta\right) ^{2
}\text{.} \label{pm7
\end{equation}
The maximum $\mathcal{P}_{\max}$ in Eq. (\ref{pm7}) is reached at
$t_{\mathcal{H}_{7}}^{\ast}$
\begin{equation}
t_{\mathcal{H}_{7}}^{\ast}=\frac{2}{\sqrt{4\left[ \alpha\delta x^{2}+\left(
\alpha\beta+\beta\delta\right) x+\beta^{2}\right] +\left( \alpha
-\delta\right) ^{2}}}\frac{\pi\hslash}{2E}\text{.
\end{equation}
Finally, we remark that when $0$ $\leq\alpha-\delta\ll1$, the approximate
expression of $\mathcal{P}_{\max}$ in Eq. (\ref{pm7}) become
\begin{equation}
\mathcal{P}_{\max}=1-\frac{1}{4}\frac{1-x^{2}}{\left( \alpha x+\beta\right)
^{2}}\left( \alpha-\delta\right) ^{2}+\mathcal{O}\left( \left\vert
\alpha-\delta\right\vert ^{3}\right) \text{.} \label{app
\end{equation}
This approximate maximum transition probability value in Eq. (\ref{app}) is
achieved whe
\begin{equation}
t_{\mathcal{H}_{7}}^{\ast}=\left[ \frac{1}{\alpha x+\beta}-\frac{1}{8
\frac{\left( \alpha-\delta\right) ^{2}}{\left( \alpha x+\beta\right) ^{3
}+\mathcal{O}\left( \left\vert \alpha-\delta\right\vert ^{3}\right) \right]
\frac{\pi\hslash}{2E}\text{,
\end{equation}
that is, $t_{\mathcal{H}_{7}}^{\ast}=t_{\mathcal{H}_{5}}^{\ast}+\mathcal{O
\left( \left\vert \alpha-\delta\right\vert ^{2}\right) $ with
$t_{\mathcal{H}_{5}}^{\ast}$ in Eq. (\ref{tstar5}).
In Table II we describe the minimum search times $t_{\mathcal{H}_{i}}^{\ast}$
with $i\in\left\{ 1\text{, }3\text{, }5\right\} $ when the maximal success
probability $\mathcal{P}_{\max}$ equals one.\textbf{ }Furthermore,
Fig\textbf{. }$5$ displays two plots. The plot on the left represents the
minimum search time $t^{\ast}$ versus the overlap $x$ assuming $\alpha
=\beta=1$ and $E=h=1$. From this plot, we note that $t_{\mathcal{H}_{5}
^{\ast}\leq t_{\mathcal{H}_{3}}^{\ast}\leq t_{\mathcal{H}_{1}}^{\ast}$. The
plot on the right, instead, represents the temporal behavior of the success
probability $\mathcal{P}\left( t\right) $ assuming $\alpha=\beta=1$,
$E=h=1$,\textbf{ }and $x=0.5$. We observe that $\mathcal{P}\left( t\right) $
reaches the ideal unit value with $\mathcal{H}_{5}$ at $t_{\mathcal{H}_{5
}^{\ast}=1/6\simeq0.17$, with $\mathcal{H}_{3}$ at $t_{\mathcal{H}_{3}}^{\ast
}=1/4=0.25$\textbf{, }and with $\mathcal{H}_{1}$ at $t_{\mathcal{H}_{1}
^{\ast}=1/2=0.5$. Despite the detrimental effects of asymmetries and
complexities on the achievable maximal success probability values represented
in Fig\textbf{.} $4$ when $x$ approaches zero and despite the fact as reported
in Table II and Fig. $5$ that $\mathcal{H}_{5}$ appears to be the quantum
search Hamiltonian that yields the shortest search time needed to achieve unit
success probability, we point out that it is possible to suitably choose the
Hamiltonian parameters $\alpha$, $\beta$, $\gamma$, and $\delta$ in
$\mathcal{H}$ together with the overlap $x$ in such a manner that nearly
optimal success probability threshold values can be obtained in search times
shorter than those specified by $\mathcal{H}_{5}$. Indeed, Fig. $6$ displays
such a circumstance. Assuming $\alpha=\delta=0.5$, $\beta=1$, and $x=0.5$, the
unit success probability is obtained with $\mathcal{H}_{5}$ at $t_{\mathcal{H
_{5}}^{\ast}=1/5=0.2$ while the chosen threshold value $\mathcal{P
_{\text{threshold}}=0.95$ is reached at $\tilde{t}_{\mathcal{H}_{5}
\simeq0.1667$. However, assuming $\mathcal{H}$ with $\alpha=0.5$, $\delta=1$,
$\beta=1$, and $x=0.5$, despite the fact that the maximal success probability
is only nearly optimal with $\mathcal{P}_{\max}\simeq0.9758\leq1$,\textbf{
}the selected threshold value $\mathcal{P}_{\text{threshold}}=0.95$\textbf{
}is reached at $\tilde{t}_{\mathcal{H}}\simeq0.1579\leq\tilde{t
_{\mathcal{H}_{5}}$. For a discussion on the choice of the numerical values of
the quantum overlap $x$, we refer to Appendix C.
\begin{figure}[t]
\centering
\includegraphics[width=0.75\textwidth] {fig5}\caption{The plot on the left
displays the minimum search time $t^{\ast}$ versus the quantum overlap $x$ for
the search Hamiltonian $\mathcal{H}_{1}$ (dashed line), $\mathcal{H}_{3}$
(thin solid line), and $\mathcal{H}_{5}$ (thick solid line). The plot on the
right, instead, shows $\mathcal{P}\left( t\right) $ versus $t$ for the
search Hamiltonian $\mathcal{H}_{1}$ (dashed line), $\mathcal{H}_{3}$ (thin
solid line), and $\mathcal{H}_{5}$ (thick solid line). In the former plot, we
assume $\alpha=\beta=1$ and $E=h=1$. In the latter plot, we also assume
$x=1/2$.
\label{fig5
\end{figure}
\section{Concluding Remarks}
In this paper, we presented a detailed analysis concerning the computational
aspects needed to analytically evaluate the transition probability from a
source state $\left\vert s\right\rangle $ to a target state $\left\vert
w\right\rangle $ in a continuous time quantum search problem defined by a
multi-parameter generalized time-independent Hamiltonian $\mathcal{H}$ in\ Eq.
(\ref{hamilton}). In particular, quantifying the performance of a quantum
search in terms of speed (minimum search time, $t^{\ast}$) and fidelity (high
success probability, $\mathcal{P}$), we consider a variety of special cases
that emerge from the generalized Hamiltonian. Finally, recovering also the
well-known Farhi-Gutmann analog quantum search scenario, we briefly discuss
the relevance of a tradeoff between speed and fidelity with emphasis on issues
of both theoretical and practical importance to quantum information processing.
\subsection{Summary of main results}
Our main conclusions can be summarized as follows.
\begin{enumerate}
\item[{[1]}] First, we provided a detailed analytical computation of the
transition probability $\mathcal{P}_{\left\vert s\right\rangle \rightarrow
\left\vert w\right\rangle }\left( t\right) $ in Eq. (\ref{it}) from the
source state $\left\vert s\right\rangle $ to the target state $\left\vert
w\right\rangle $ under the working assumption that the quantum mechanical
evolution is governed by the generalized quantum search Hamiltonian
$\mathcal{H}$. Such a computation, despite being straightforward, is quite
tedious. Therefore, we have reason to believe it can be relevant to the novice
with a growing interest in analog quantum search algorithms as well as to the
expert seeking to find nearly-optimal solutions in realistic quantum search
problems where a tradeoff between fidelity and minimum search time is required;
\item[{[2]}] Second, given the family $\mathcal{F}_{\mathcal{H}
\overset{\text{def}}{=}\left\{ \mathcal{H}\right\} $ with $\mathcal{H
=\mathcal{H}\left( x\text{; }\alpha\text{, }\beta\text{, }\gamma\text{,
}\delta\right) $ where $\alpha$ and $\beta\i
\mathbb{R}
$ while $\beta=\gamma^{\ast}$ $\i
\mathbb{C}
$, we have conveniently identified two sub-families $\mathcal{F}_{\mathcal{H
}^{\left( \text{optimal}\right) }\overset{\text{def}}{=}\left\{
\mathcal{H}_{1}\text{, }\mathcal{H}_{3}\text{, }\mathcal{H}_{5}\right\} $ and
$\mathcal{F}_{\mathcal{H}}^{\left( \text{nearly-optimal}\right)
\overset{\text{def}}{=}\left\{ \mathcal{H}_{2}\text{, }\mathcal{H}_{4}\text{,
}\mathcal{H}_{6}\text{, }\mathcal{H}_{7}\right\} $ that contain quantum
search Hamiltonians yielding optimal and nearly-optimal fidelity values,
respectively. The former sub-family is specified by the asymmetry between the
\emph{real} parameters $\alpha$ and $\delta$. The latter sub-family, instead,
is characterized by the complexity (that is, the essence of being
\emph{complex}-valued) of the parameters $\beta$ and $\gamma$. Each element of
the family has been classified with respect to its maximal success probability
and the minimum time necessary to reach such a value.\ An overview of these
results appears in Table I. In addition, in Fig. $4$ we report on the
detrimental effects caused by the presence of asymmetries and complexities in
the parameters that specify the particular quantum search Hamiltonian on the
maximal success probability in the limiting working assumption that the source
state and the target state are orthogonal.
\item[{[3]}] Third, we ranked the performance of each element of the
sub-family $\mathcal{F}_{\mathcal{H}}^{\left( \text{optimal}\right) }$ by
analyzing the minimum search time required to reach unit fidelity. These
results are displayed in Table II. In particular, as evident from Fig. $5$, we
find\textbf{ }that $\mathcal{H}_{5}$ can outperform the Farhi-Gutmann search
Hamiltonian $\mathcal{H}_{1}$ in terms of speed.
\item[{[4]}] Lastly, despite the observed detrimental effects of asymmetries
and complexities on the numerical values of the maximal success probabilities,
we find that imperfect search Hamiltonians can outperform perfect search
Hamiltonians provided that only a large nearly-optimal fidelity value is
sought. This finding is reported in Fig. $6$.
\end{enumerate}
\subsection{Limitations and possible future developments}
In what follows, we report some limitations together with possible future
improvements of our investigation.
\begin{enumerate}
\item[{[1]}] First, we have reason to believe our analysis presented in this
paper could be a useful starting point for a more rigorous investigation that
would include both experimental and theoretical aspects of a tradeoff between
fidelity and run time in quantum search algorithms. Indeed, we are aware that
it is helpful to decrease the control time of the control fields employed to
generate a target quantum state or a target quantum gate in order to mitigate
the effect of decoherence originating from the interaction of a quantum system
with the environment. Moreover, we also know that it may be convenient to
increase the control time beyond a certain critical value to enhance the
fidelity of generating such targets and reach values arbitrarily close to the
maximum $\mathcal{F}=1$. However, when the control time reaches a certain
value that may be close to the critical value, decoherence can become a
dominant effect. Therefore, investigating the tradeoff between time control
and fidelity can be of great practical importance in quantum computing
\cite{rabitz12,rabitz15,cappellaro18}. Given that it is very challenging to
find a rigorous optimal time control and in many cases the control is only
required to be sufficiently precise and short, one can design algorithms
seeking suboptimal control solutions for much reduced computational effort.
For instance, the fidelity of tomography experiments is rarely above $99\%$
due to the limited control precision of the tomographic experimental
techniques as pointed out in Ref. \cite{rabitz15}. Under such conditions, it
is unnecessary to prolong the control time since the departure from the
optimal scenario is essentially negligible. Hence, it can certainly prove
worthwhile to design slightly suboptimal algorithms that can be much cheaper computationally.
\item[{[2]}] Second, we speculate it may be worth pursuing the possibility of
borrowing ideas from approximate quantum cloning to design approximate quantum
search algorithms capable of finding targets in the presence of\textbf{
}\emph{a priori }information. As a matter of fact, recall that the no-cloning
theorem in quantum mechanics states that it is impossible to consider a
cloning machine capable of preparing two exact copies of a completely unknown
pure qubit state \cite{zurek82}. However, with the so-called universal cloner
\cite{hillery96} (that is, a state-independent symmetric cloner) acting on the
whole Bloch sphere, it is possible to prepare two approximate copies of an
unknown pure qubit state with the same fidelity\textbf{ }$\mathcal{F
=5/6<1$\textbf{. }Interestingly, it is possible to enhance these fidelity
values achieved with a universal cloner by properly exploiting some
relevant\textbf{ }\emph{a priori}\textbf{ }information on a given quantum
state that one wishes to clone. This idea of exploiting\textbf{ }\emph{a
priori}\textbf{ }information generated a number of state-dependent cloning
machines capable of outperforming the universal cloner for some special set of
qubits. For instance, phase-covariant cloners are especially successful for
cloning qubits chosen from the equator of the Bloch sphere
\cite{macchiavello00} while belt quantum cloning machines are very efficient
in cloning qubits between two latitudes on the Bloch sphere \cite{wang09}. For
an interesting method for improving the cloning fidelity in terms of\textbf{
}\emph{a priori}\textbf{ }amplitude and phase information, we refer to Ref.
\cite{kang16}. We shall investigate this line of investigation in forthcoming efforts.
\item[{[3]}] Third, from a more applied perspective, despite its relative
simplicity, the idea of finding a tradeoff between search time and fidelity in
analog quantum searching as presented in this paper could be potentially
regarded as a valid starting point for a time-fidelity tradeoff analysis in
disease diagnosis in complex biological systems. For these systems, the source
and target states are replaced with the source and target patterns,
respectively. In particular, the target pattern classifies the type of illness
being searched. For recent important investigations based upon the joint use
of quantum field theoretic methods and general relativity techniques
concerning the transition from source to target patterns in complex biological
systems, including DNA\ and protein structures, we refer to Refs.
\cite{capozziello1,capozziello2}. More realistic applications of our work are
very important and we shall also give a closer look to these aspects in the
near future.
\item[{[4]}] Fourth, a further possibility could be related to cosmology. As
discussed in
\cite{capozziello3,capozziello4,luongo19,capozziello13,capozziello11}, there
exist possible connections between quantum entanglement and cosmological
observational parameters. In fact, assuming that two cosmological epochs are
each other entangled, by measuring the entanglement degree, it is possible to
recover dynamical properties. Specifically, the effects of the so called
\textit{dark energy} could be due to the entanglement between states, since a
negative pressure arises. In this process, an \textquotedblleft entanglement
weight\textquotedblright, the so-called negativity of entanglement can be
defined and then the apparent today observed accelerated expansion occurs when
the cosmological parameters are entangled. In this perspective, dark energy
could be seen as a straightforward consequence of entanglement without
invoking (not yet observed) further material fundamental components. The
present analysis could help in this cosmological perspective once the
cosmological equations are modeled out as Schr\"{o}dinger-like equations as
discussed in \cite{capozziello5}.
\item[{[5]}] Lastly, in real life scenarios, searching in a completely
unstructured fashion can be unnecessary. Instead, the search can be guided by
employing some \emph{prior} relevant information about the location of the
target state. Interestingly, this is what happens in the framework of quantum
search with advice \cite{montanaro11,montanaro17}. In this framework, the aim
is to minimize the expected number of queries with respect to the probability
distribution encoding relevant information about where the target might be
located. A major advancement in the work we presented in this paper would be
figuring out a systematic way to incorporate relevant \emph{prior} information
about the possible location of the target directly into the continuous time
quantum search Hamiltonian. We leave this intriguing open problem to future
scientific endeavours.
\end{enumerate}
In conclusion, our proposed analysis was partially inspired by some of our
previous findings reported in Refs. \cite{cafaro-alsing19A, cafaro-alsing19B}
and can be improved in a number of ways in the immediate short term. For
instance, it would be interesting to address the following question: How large
should the nearly optimal fidelity value be chosen, given the finite precision
of quantum measurements and the unavoidable presence of decoherence effects in
physical implementations of quantum information processing tasks? We leave the
investigation of a realistic tradeoff between speed and fidelity in analog
quantum search problems to forthcoming scientific efforts.
\begin{figure}[t]
\centering
\includegraphics[width=0.35\textwidth] {fig6}\caption{The thin and the thick
solid lines display $\mathcal{P}\left( t\right) $ versus $t$ for the search
Hamiltonians $\mathcal{H}$ and $\mathcal{H}_{5}$, respectively. In the former
case, we set $\alpha=0.5$, $\delta=1$, $\beta=1$, and $x=0.5$. In the latter
case, instead, we set $\alpha=\delta=0.5$, $\beta=1$, and $x=0.5$. In both
cases, we also assume $E=h=1$. The dashed line denotes the chosen threshold
success probability value $\mathcal{P}_{\text{threshold}}=0.95$. Finally, the
dotted line denotes the optimal success probability $\mathcal{P}=1$.
\label{fig6
\end{figure}
\begin{acknowledgments}
C. C. acknowledges the hospitality of the United States Air Force Research
Laboratory (AFRL) in Rome-NY where part of his contribution to this work was
completed. S.C. acknowledges partial support of \textit{Istituto Italiano di
Fisica Nucleare} (INFN), \textit{iniziative specifiche} QGSKY and MOONLIGHT2.
\end{acknowledgments}
|
{
"redpajama_set_name": "RedPajamaArXiv"
}
| 7,658 |
[
128000,
59,
2879,
90,
38255,
633,
77435,
424,
11223,
264,
31228,
12384,
369,
22581,
3544,
4729,
2778,
5435,
198,
258,
8718,
13,
1144,
68175,
90,
42511,
424,
3534,
22377,
299,
424,
1721,
92,
662,
18370,
424,
596,
2778,
12384,
8779,
15389,
198,
2000,
459,
9987,
13160,
1537,
304,
459,
653,
52243,
4729,
315,
400,
45,
3,
3673,
555,
198,
5323,
287,
279,
4729,
264,
8187,
1396,
315,
3115,
13,
5659,
264,
29924,
51882,
345,
275,
374,
5995,
311,
1296,
400,
45,
14,
17,
3,
3673,
11,
389,
5578,
11,
1603,
9455,
279,
4495,
198,
1224,
13,
3161,
18370,
424,
596,
12384,
4869,
11,
279,
1890,
3465,
649,
387,
8308,
198,
61605,
449,
264,
23965,
315,
2015,
59060,
27986,
90,
45,
32816,
11,
430,
374,
11,
449,
264,
80251
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
59,
2879,
90,
38255,
633,
77435,
424,
11223,
264,
31228,
12384,
369,
22581,
3544,
4729,
2778,
5435,
198,
258,
8718,
13,
1144,
68175,
90,
42511,
424,
3534,
22377,
299,
424,
1721,
92,
662,
18370,
424,
596,
2778,
12384,
8779,
15389,
198,
2000,
459,
9987,
13160,
1537,
304,
459,
653,
52243,
4729,
315,
400,
45,
3,
3673,
555,
198,
5323,
287,
279,
4729,
264,
8187,
1396,
315,
3115,
13,
5659,
264,
29924,
51882,
345,
275,
374,
5995,
311,
1296,
400,
45,
14,
17,
3,
3673,
11,
389,
5578,
11,
1603,
9455,
279,
4495,
198,
1224,
13,
3161,
18370,
424,
596,
12384,
4869,
11,
279,
1890,
3465,
649,
387,
8308,
198,
61605,
449,
264,
23965,
315,
2015,
59060,
27986,
90,
45,
32816,
11,
430,
374,
11,
449,
264,
80251,
-100
] |
GHANA AFW COMMUNITY
The Salesians of Don Bosco operates with FIVE (5) Communities in Ghana; Ashaiman (2), Sunyani(2) and Tatale. The following are the records of works, activities and projects running.
For more pictures, click this link
GHANA AFW
AFW 1. BL ARTEMIDE ZATTI (2004) – 2006 Salesians of Don Bosco, P.O Box 776 Ashaiman – Tema, GHANA
AFW 3. ST FRANCIS DE SALES (1995)- 2000 Salesians of Don Bosco P.O Box 293 Ashaiman, GHANA
AFW 13. ST JOHN BOSCO (1992)-1999 Salesians of Don Bosco P.O Box 1679 Sunyani, GHANA
AFW 14. VEN. SIMOM SRUGI 2006 Ven. Simon Srugi Salesians Novitiate P.O Box 1679 Sunyani, GHANA
NIGERIA AFW COMMUNITY
With the EIGHT (8) Salesian Communities in Akure, Ibadan,Ondo and Onitsha plus TWO (2) in Abuja and Lagos Nigeria. The following works were realised in 2015.
NIGERIA AFW
AFW 2. MARY HELP OF CHRISTIANS (1982)-1987 Salesians of Don Bosco, 127 Araromi Street P.O Box 2390. Akure, Ondo State, NIGERIA
AFW 6. ST ALOYSIUS VERSIGLIA & CALLISTUS CARAVARIO (2002)-2005 Don Bosco House (Ogungbade Village) P.O Box 7508 Secretariat Ibadan, Oyo State, NIGERIA
AFW 7. ST JOSEPHINE BAKHITA (2008-2014) Abuja, NIGERIA
AFW 10. ST JOHN BOSCO (1982)-1987 Salesians of Don Bosco P.O Box 937 Ondo, NIGERIA
AFW 11. CATHOLIC CHURCH OF THE HOLY SPIRIT 56 Adeyemo Akapo Street Omole Estate Phase 1, Ojodu P.O BOX 5080, Ikeja-Lagos, NIGERIA
AFW 12. ST JOHN BOSCO Don Bosco Avenue Ibolo Layout Obosi P.O Box 314 Onistsha-Anambra State, NIGERIA
KONTAGORA (KOKO)-PRESENCE Kontagora, Niger State, NIGERIA
SHAGAMU (IJEBU-ODE)-PRESENCE Ogun State, NIGERIA
LIBERIA AFW COMMUNITY
Liberia is a Sub-Saharan nation in West Africa located at 6 °N, 9 °W. It borders the north Atlantic Ocean to the southwest (580 kilometres (360 mi) of coastline) and three other African nations on the other three sides. In total, Liberia comprises 110,000 square kilometres (43,000 square mi) of which 96,300 square kilometres (37,190 square mi) is land and 15,000 square kilometres (5,810 square mi) is water.
LIBERIA AFW
AFW 9. ST JOSEPH (1979)-1982 Salesians of Don Bosco P.O Box 10-2751 1000 Monrovia 10, LIBERIA
AFW 15. BLD STEPHEN SANDOR (1989)-2013 Salesians of Don Bosco P.O Box 2751 Monrovia, LIBERIA
SIERRA LEONE AFW COMMUNITY
The "Lion Mountain" Sierra Leone is situated on the west coast of Africa, bordering the North Atlantic Ocean, between Guinea and Liberia. It has a tropical climate with two distinct seasons: a dry season which starts in November and ends in April and a rainy season that starts in May and ends in October. It lands area cover approximately 71,740 square, km, about 28,000 square miles
SIERRA LEONE AFW
AFW 5. ST JOHN BOSCO (1994)- 2006 32-34 Fort Street P.O Box 1080. Freetown, SIERRA LEONE
AFW 8. MARY HELP OF CHRISTIANS (1986)- 1994 St Augustine's Secondary School, Lungi Airport, Lungi, SIERRA LEONE
BO(TIKONKO) – PRESENCE (2013) Freetown, SIERRA LEONE
|
{
"redpajama_set_name": "RedPajamaCommonCrawl"
}
| 2,301 |
[
128000,
45776,
39874,
362,
18723,
52385,
57273,
198,
791,
16207,
5493,
315,
4418,
29071,
1030,
27149,
449,
435,
6674,
320,
20,
8,
58443,
304,
48668,
26,
14937,
2706,
276,
320,
17,
705,
8219,
88,
5676,
7,
17,
8,
323,
88245,
273,
13,
578,
2768,
527,
279,
7576,
315,
4375,
11,
7640,
323,
7224,
4401,
627,
2520,
810,
9364,
11,
4299,
420,
2723,
198,
45776,
39874,
362,
18723,
198,
8440,
54,
220,
16,
13,
15195,
6395,
21695,
12420,
1901,
22342,
40,
320,
1049,
19,
8,
1389,
220,
1049,
21,
16207,
5493,
315,
4418,
29071,
1030,
11,
393,
8548,
8425,
220,
23823,
14937,
2706,
276,
1389,
8817,
64,
11,
48584,
39874,
198,
8440,
54,
220,
18,
13,
4015,
17067,
27267,
1669,
3467,
16998,
14344,
320,
2550,
20,
7435,
220,
1049
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
45776,
39874,
362,
18723,
52385,
57273,
198,
791,
16207,
5493,
315,
4418,
29071,
1030,
27149,
449,
435,
6674,
320,
20,
8,
58443,
304,
48668,
26,
14937,
2706,
276,
320,
17,
705,
8219,
88,
5676,
7,
17,
8,
323,
88245,
273,
13,
578,
2768,
527,
279,
7576,
315,
4375,
11,
7640,
323,
7224,
4401,
627,
2520,
810,
9364,
11,
4299,
420,
2723,
198,
45776,
39874,
362,
18723,
198,
8440,
54,
220,
16,
13,
15195,
6395,
21695,
12420,
1901,
22342,
40,
320,
1049,
19,
8,
1389,
220,
1049,
21,
16207,
5493,
315,
4418,
29071,
1030,
11,
393,
8548,
8425,
220,
23823,
14937,
2706,
276,
1389,
8817,
64,
11,
48584,
39874,
198,
8440,
54,
220,
18,
13,
4015,
17067,
27267,
1669,
3467,
16998,
14344,
320,
2550,
20,
7435,
220,
1049,
-100
] |
Please note that I will not be available during February for any Photography / Canon EOS training.
I will be available from Tuesday, 6 March.
Contact me should you want to discuss any training for March. Training could be scheduled during the day or evening.
Exact dates will depend on availability.
|
{
"redpajama_set_name": "RedPajamaC4"
}
| 5,741 |
[
128000,
5618,
5296,
430,
358,
690,
539,
387,
2561,
2391,
7552,
369,
904,
41147,
611,
39216,
50001,
4967,
627,
40,
690,
387,
2561,
505,
7742,
11,
220,
21,
5587,
627,
8906,
757,
1288,
499,
1390,
311,
4358,
904,
4967,
369,
5587,
13,
16543,
1436,
387,
13847,
2391,
279,
1938,
477,
11714,
627,
59054,
13003,
690,
6904,
389,
18539,
13,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0
] |
[
5618,
5296,
430,
358,
690,
539,
387,
2561,
2391,
7552,
369,
904,
41147,
611,
39216,
50001,
4967,
627,
40,
690,
387,
2561,
505,
7742,
11,
220,
21,
5587,
627,
8906,
757,
1288,
499,
1390,
311,
4358,
904,
4967,
369,
5587,
13,
16543,
1436,
387,
13847,
2391,
279,
1938,
477,
11714,
627,
59054,
13003,
690,
6904,
389,
18539,
13,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100
] |
A private lady goes public
Ann Finlayson June 25 1984
A private lady goes public Ann Finlayson June 25 1984
Ann Finlayson
She is a naturally retiring and private woman. But when her husband decided to run for the Liberal leadership, Geills Turner decided to go public. And the forceful 46-year-old former Harvard graduate student ultimately played a visible and effective role in the victorious quest, eventually turning the family home—a sprawling, elegantly furnished red-brick mansion in Toronto's exclusive Forest Hill district—into a command post. She was clearly in control, polling delegates, planning campaign strategy and dealing with the media. Said the new chatelaine of 24 Sussex Drive: "A photographer asked to come around while John was home 'resting.' As if anyone has been resting around here."
Her friend Senator Jerry Grafstein describes Geills (pronounced Jeels, but she is known as Jill) Turner as a "very independent-thinking woman," and her appearances in the closing stages of the campaign, in such places as Sackville, N.B., and Yellowknife, N.W.T., marked the end of 16 years of self-imposed isolation from public life. She said that the media, which she had avoided for years, were depicting her as a recluse and "creating a monster." As a result, she decided to give several individual interviews—a decision, she said, that caused a "logistical frenzy" at home, as household tasks got set aside. Said the wife of the prime minister-designate: "In the end I thought, well maybe I had just better create my own monster."
Excited: Geills threw herself into the campaigning in Ottawa. And at one news conference when the microphone did not work and her husband repeatedly said to the assembled journalists, "Can you hear me? Can you hear me?" she cupped her hands and shouted, "Louder—and funnier." Despite the excitement and inevitable domestic confusion of the campaign and the convention, the Turner family emerged from it in high spirits. Daughter Elizabeth, 20, arrived at the Ottawa Civic Centre having just completed her third year at California's Stanford University, where she is studying history and English. Michael, 18, the oldest of the three Turner sons, had graduated from Toronto's Upper Canada College— with both parents in attendance—the week before. And David, 16, and Andrew, 12, had finished writing their
year-end exams at the same expensive private school, six blocks from the Turner home. Andrew was looking forward to a busy summer of tennis and camp; David to working on a ranch in Alberta. They were, according to Andrew, "a little bit excited" about the convention. Even Tiki, the family budgie, whose cage is always left open, appeared content. The bird declined frequent opportunities to escape through the kitchen door which a parade of strategists kept using during the campaign's final days.
The woman at the centre of the engaging, upper-crust family is both articulate and intelligent. Her bedtime reading during the campaign included Ernest Hemingway's For Whom the Bell Tolls and The Female Stress Syndrome. She is the only daughter of the
late David E. Kilgour, chief executive officer of the Great-West Life Assurance Co. in Winnipeg from 1955 to 1971. Geills Turner studied physics and mathematics at the University of Manitoba and McGill, in Montreal, before moving to Harvard University to do postgraduate work. She said that she always felt able to compete in those traditionally male-dominated fields. 'T was lucky," she said. "When I was growing up I never had the sense that girls had to do this and boys had to do that. I always believed that girls, if they had the ability and worked hard, had chances as good as the next guy's."
By 1962 she had completed an IBM sales training program in New York and was working for the company in Montreal when she volunteered to work
on the federal election campaign of a politically ambitious young lawyer named John Turner. They were married the next year in Winnipeg in a Catholic ceremony—although she remains an Anglican—and Geills plunged into life in Ottawa, where John was an MP and by 1965 a cabinet minister in Lester Pearson's government. In Ottawa she considered studying law but she abandoned that project when she discovered that she could not enrol at the University of Ottawa law school as a part-time student. "I had a two-year-old then," she recalled, "and I knew how demanding it was going to be and how demanding my life was already."
Lost: The years in Ottawa made her wary of the media, particularly after she gave a number of interviews during the 1968 Liberal leadership race, which
her husband lost to Pierre Trudeau. On more than one occasion, she said, reporters "totally misrepresented" her. The loss to Trudeau was far less traumatic than it has often been portrayed, she said, adding: "I was realistic about it. We went into it competitive, prepared to do our best. But when John didn't win there wasn't any great lingering shock. In fact, the next morning I picked Trudeau up on the street and drove him to work."
She said that her decision to become more public was partly prompted by changing attitudes toward women in Canadian life. Fifteen years ago, she added, "no one even considered wanting to talk to a woman, a wife, about anything except 'womansy' issues—what sort of chintz I had in the living room,
the babies crying upstairs, that sort of thing. This time, it is different."
Among the issues she cited: the "plight of many older people who, if they are still in reasonably good health, are often living in very dire circumstances and, if they are not well, fit nowhere into the scheme of things." She said that she also intends to stress the need for more day care facilities and the necessity to ease youth unemployment and its attendant social problems. "I know," she said, "that all these things have to be looked at in terms of the [financial] restraints that are very much upon us at the moment. But so many problems are solved only when attention is directed to them. I can see a real opportunity to get involved in that way."
Another interest that Turner intends to pursue in Ottawa is photography, which she studied for four years at Toronto's Ryerson Polytechnical Institute. During those years, she said, "I hardly slept at all. I worked in my darkroom until 4 a.m. and was back in class the next morning at 8. I discovered that I just loved the technical aspects of photography." In April she travelled to China with 10 other photographers and she has been compiling a collection of photographs of the Canadian North, but she has no plans to publish it. "I would never consider that while John is in politics," she said, "because it would look like I was using him. I would feel paranoid if I thought that my book could not stand on its own merits."
Chaos: She conceded that the campaign was a strain and that her husband's schedule was exhausting. He was often away for long stretches but, she said, "John has always been very good about it. When he's home, he's home." Both husband and wife are almost compulsively organized. He raises the roses; she fixes the plumbing. "Chaos does not have a place in our house," she said, and she and her husband are well prepared for the move back to Ottawa. But she added, "It is a little more complicated for the children."
She said that the Turner style at 24 Sussex Drive will be "fairly traditional" and that entertaining will usually involve "sit-down dinner parties that are more intimate than some other kinds of entertaining. We have always entertained a lot, for politics and business and for pleasure. I enjoy it, although I do not think husbands always realize how much work is involved to do it properly." As for her personal future: "Until John got this idea of getting back into politics, I was thinking that the time really had come to settle down and get a serious job. I have always had this idea that when I 'grow up' I will do that. But, obviously, now is not the time to make that decision."
CANADA/COVER
TURNER FACES THE FUTURE
Taking Cadillac for a ride
June 1984 By James Fleming
Turner's days of decision
June 1984 By Mary Janigan
A 'ready' Mulroney watched
June 1984 By Terry Hargreaves
A vote without feeling
June 1984 By Marci McDonald
Brilliance can be dangerous
June 1984 By Charles Gordon
CAN KIDS COPE?
THE TIME CRUNCH
A NEW DIVERSITY
DOME'S LAST DEAL
Donations for life
September 1986 By ANN FINLAYSON
THE OLYMPIC REVOLUTION
KEEPER OF THE FLAME
|
{
"redpajama_set_name": "RedPajamaCommonCrawl"
}
| 1,432 |
[
128000,
32,
879,
17240,
5900,
586,
198,
28192,
5767,
6789,
942,
5651,
220,
914,
220,
3753,
19,
198,
32,
879,
17240,
5900,
586,
9489,
5767,
6789,
942,
5651,
220,
914,
220,
3753,
19,
198,
28192,
5767,
6789,
942,
198,
8100,
374,
264,
18182,
60873,
323,
879,
5333,
13,
2030,
994,
1077,
10177,
6773,
311,
1629,
369,
279,
31158,
11692,
11,
4323,
3385,
34131,
6773,
311,
733,
586,
13,
1628,
279,
5457,
1285,
220,
2790,
4771,
6418,
4846,
25996,
19560,
5575,
13967,
6476,
264,
9621,
323,
7524,
3560,
304,
279,
74810,
2271,
11,
9778,
13353,
279,
3070,
2162,
29096,
71992,
11,
18190,
18007,
24330,
2579,
31217,
875,
52528,
304,
14974,
596,
14079,
20585,
8270,
9474,
2345,
18614,
264,
3290,
1772,
13,
3005,
574,
9539,
304,
2585,
11,
31744,
36159
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
32,
879,
17240,
5900,
586,
198,
28192,
5767,
6789,
942,
5651,
220,
914,
220,
3753,
19,
198,
32,
879,
17240,
5900,
586,
9489,
5767,
6789,
942,
5651,
220,
914,
220,
3753,
19,
198,
28192,
5767,
6789,
942,
198,
8100,
374,
264,
18182,
60873,
323,
879,
5333,
13,
2030,
994,
1077,
10177,
6773,
311,
1629,
369,
279,
31158,
11692,
11,
4323,
3385,
34131,
6773,
311,
733,
586,
13,
1628,
279,
5457,
1285,
220,
2790,
4771,
6418,
4846,
25996,
19560,
5575,
13967,
6476,
264,
9621,
323,
7524,
3560,
304,
279,
74810,
2271,
11,
9778,
13353,
279,
3070,
2162,
29096,
71992,
11,
18190,
18007,
24330,
2579,
31217,
875,
52528,
304,
14974,
596,
14079,
20585,
8270,
9474,
2345,
18614,
264,
3290,
1772,
13,
3005,
574,
9539,
304,
2585,
11,
31744,
36159,
-100
] |
> Starting a Business
Kisi Review
Kiely Kuligowski
Kisi provides a flexible, modern system that works well for every type of business. With a wide range of employee access options, a mobile app for remote management and integration with other services, you can create the exact access control setup your business needs. For these reasons, Kisi is our choice as the best access control system overall.
Reviews at business.com
Kisi is our choice as the best access control system overall. It's a highly automated, cloud-based system that provides simple, modernized access control for your business.
Kisi's access control system consists of four parts: mobile and card access, a wall reader, cloud management and the Kisi controller.
Kisi's hardware is simple, with the following options:
Kisi Reader Pro: $599
Kisi Reader Pro Outdoor: $699
Kisi Controller Pro: $899
Other options for control panels are available from LifeSafety Power, a third-party equipment provider.
The software comes in three plan options, all of which include the Kisi management dashboard and mobile credentials. Licenses are set per user and per door on a monthly, yearly or multiyear basis. You'll need to contact Kisi for a personalized quote. Here is a breakdown of each plan:
One administrator
30 days of event storage
Five administrators
120 days of event storage
User syncing
Web dashboard
Unlimited event storage and export
Kisi offers a 30-day trial for all of its plans. It does provide international shipping.
Kisi provides several options for building access. Employees can use phones, key cards or fobs that work with a reader. You can even set the system to grant access using a temporary link sent to an employee's phone. Here's more of what Kisi offers:
Biometric access: Smartphones that have biometric authentication features can be used to open doors in lieu of a password. The authentication process is proprietary and encrypted.
Remote management: Kisi offers remote management for when you can't be on-site. It allows you to manage access rights, lock doors or temporarily authorize other users to manage the system as admins.
Reporting and administration interface: The system has a reporting and administration interface, which is also accessible through a mobile device. It can pull up full audit reports, track door unlocks in real time and export data. You can set notifications to alert you when a door unlocks at an unusual time.
Integrations: Kisi has an open API and integrates with more than 20 services, including scheduling, surveillance, and data management software. You can integrate your Kisi system with common business apps such as Okta, Verkada, Google Apps and Mindbody. The company offers intrusion alarms as well.
Scalable: The system is scalable and easily covers multiple locations with a centralized remote management system and a directory that syncs with your facility's doors, only allowing access to approved individuals.
Compliant: Kisi provides real-time audit trails and exportable CSV files for easy compliance tracking. Kisi complies with SOC2 and ISO.
Offline functionality: Kisi works even when your network is offline, ensuring you and your employees have access to your building no matter what.
Remote access sharing: With remote access sharing, you can share access with others. You can also determine the levels of access each person has and how long their access will last.
Lockdown: This feature allows you to lock or unlock designated doors remotely, which makes it easy to secure your entire facility in seconds and can be used in emergencies.
Intrusion alerts: You can set your system to send a notification anytime a door is held or forced open, and you also determine how you want those alerts managed. For example, you can set the alerts to show up in your Kisi dashboard, have an operator review them or sync the alerts with other logging software.
We like Kisi because it is a modern, flexible system that can be adjusted to suit many different business types and sizes. It is hosted in the cloud, which means maintenance and updates are simple and easy, and you don't have to worry about losing your data. Additionally, using the cloud means there is no need for local servers, and you can manage your system from anywhere.
Kisi also has an open API, which allows it to integrate with many other products and software, including Okta, Cisco, Coworks, Azure and more.
Kisi offers simple hardware options, so if you're looking for a highly customizable system with lots of hardware options, Kisi may not be the best system for you.
Kisi offers exemplary support and resource options on its website, including product sheets of its access control systems and a community section where there are answers and topics relating to Kisi's access control systems. If you need to contact Kisi, the best way is by phone or email, as there is no live chat.
See Kiely Kuligowski's Profile
Kiely is a staff writer based in New York City. She worked as a marketing copywriter after graduating with her bachelor's in English from Miami University (OH) and now writes on small business, social media, and marketing. You can reach her on Twitter or by email.
How do I write a business proposal to win over a new client?
|
{
"redpajama_set_name": "RedPajamaCommonCrawl"
}
| 3,933 |
[
128000,
29,
28757,
264,
8184,
198,
42,
13532,
10506,
198,
73672,
989,
85606,
343,
29384,
198,
42,
13532,
5825,
264,
19303,
11,
6617,
1887,
430,
4375,
1664,
369,
1475,
955,
315,
2626,
13,
3161,
264,
7029,
2134,
315,
9548,
2680,
2671,
11,
264,
6505,
917,
369,
8870,
6373,
323,
18052,
449,
1023,
3600,
11,
499,
649,
1893,
279,
4839,
2680,
2585,
6642,
701,
2626,
3966,
13,
1789,
1521,
8125,
11,
735,
13532,
374,
1057,
5873,
439,
279,
1888,
2680,
2585,
1887,
8244,
627,
46306,
520,
2626,
916,
198,
42,
13532,
374,
1057,
5873,
439,
279,
1888,
2680,
2585,
1887,
8244,
13,
1102,
596,
264,
7701,
28598,
11,
9624,
6108,
1887,
430,
5825,
4382,
11,
6617,
1534,
2680,
2585,
369,
701,
2626,
627,
42,
13532,
596,
2680,
2585,
1887
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
29,
28757,
264,
8184,
198,
42,
13532,
10506,
198,
73672,
989,
85606,
343,
29384,
198,
42,
13532,
5825,
264,
19303,
11,
6617,
1887,
430,
4375,
1664,
369,
1475,
955,
315,
2626,
13,
3161,
264,
7029,
2134,
315,
9548,
2680,
2671,
11,
264,
6505,
917,
369,
8870,
6373,
323,
18052,
449,
1023,
3600,
11,
499,
649,
1893,
279,
4839,
2680,
2585,
6642,
701,
2626,
3966,
13,
1789,
1521,
8125,
11,
735,
13532,
374,
1057,
5873,
439,
279,
1888,
2680,
2585,
1887,
8244,
627,
46306,
520,
2626,
916,
198,
42,
13532,
374,
1057,
5873,
439,
279,
1888,
2680,
2585,
1887,
8244,
13,
1102,
596,
264,
7701,
28598,
11,
9624,
6108,
1887,
430,
5825,
4382,
11,
6617,
1534,
2680,
2585,
369,
701,
2626,
627,
42,
13532,
596,
2680,
2585,
1887,
-100
] |
Frontiers journals are at the top of citation and impact metrics
Frontiers in Education
This article is part of the Research Topic
Analysing Psychosocial and Contextual Factors Underpinning Bullying and Cyberbullying View all 14 Articles
Eva M. Romera
Universidad de Córdoba, Spain
José Antonio Casas
Michelle F. Wright
Pennsylvania State University, United States
Data Analyses
Front. Educ., 10 June 2019 | https://doi.org/10.3389/feduc.2019.00046
Toward an Understanding of the Characteristics of Secondary School Cyberhate Perpetrators
Catherine Blaya1,2* and Catherine Audrin1,3
1Faculty of Teachers Education, Lasale, HEP du Canton de Vaud, Lausanne, Switzerland
2URMIS - University Nice Côte d'Azur, Nice, France
3Swiss Center for Affective Science, University of Geneva, Geneva, Switzerland
While the Internet offers many opportunities to access information, training and communication, it has created new grounds for risks, threats and harm. With the rise of populism and extremism, new forms of cyberbullying emerge, more specifically cyberhate. The Internet has become a privileged tool to disseminate hatred, based on racism, xenophobia, bigotry, and islamophobia. Organized groups use the internet as a dissemination tool for their ideas, to build collective identity and to recruit young people. The presence of these groups has been facilitated worldwide thanks to technology. Yet, little attention has been granted to the way the Internet eases the activities of individuals who promote and propagate hate online. The role they play in spreading racism, xenophobia and bigotry is paramount as they regularly comment online about news and events, interacting with like-minded people with impunity because the web prevents people from being easily identified or controlled. While literature on exposure to hateful contents and cyberhate victimization is growing, little is known about who the perpetrators really are. A survey with young people aged 12–20 (N = 1,889) was completed in France and forms the basis of this article. It provides an understanding of the characteristics and associated variables of cyberhate perpetration. The Structural Equation model shows that cyberhate perpetration is heavily related to time spent online, victimization, belonging to a deviant youth group, positive attitudes toward violence and racism. Results from the SEM further suggest that people who suffered from online victimization will themselves have a greater tendency to belong to deviant youth groups. Multiple mediation analysis further suggests that trust in institutions may however prevent young people from belonging to a deviant youth group and decrease positive attitudes toward violence, thus diminishing the tendency to perform hateful aggression.
Young people are super-connected to the Internet and electronic communications are an integral part of their life (Boyd, 2014). France has the fourth largest number of Internet users of any country in Europe and is 17th worldwide. According to the last national poll on the digital practices IPSOS in France, teens widely use media services, spending on average 15 h per week online: 13–19 years-old spend over 15 h a week on the Internet while 7–12 years-old spend about 6 h. The vast majority of teens (81%) has a Smartphone. More than one in three young people (34%) use a tablet and it is common for them to own a personal device. Video game tablets are owned by 69% of the surveyed young people. The applications that score the biggest success are YouTube (79%) followed by Facebook (77%) and Snapchat (57%). YouTube and Snapchat are the platforms that have shown the fastest growth in teens Internet usage lately.
The online world offers young people many opportunities to access information and knowledge, to explore their own identity as well as to communicate with others (Mishna et al., 2010; Boyd, 2014). However, the Internet and electronic communication tools can be used either positively or negatively. Notably, they can be used to convey antagonistic, hateful, racist and xenophobic content. In Europe, with the rise of populism and extremism, hate crimes and hate speeches have increased over the last decade (FRA (Fundamental Rights Agency), 2014; Penzien, 2017). While some findings may be controversial (Vitoroulis and Vaillancourt, 2015), research suggests that, indeed, ethnic minorities are subjected to hateful bullying and are more vulnerable than majority groups, both in the US and in Europe (Tynes, 2005; Hawdon, 2014; Llorent et al., 2016).
Social media have become a free, easy to use, and privileged tool for propaganda and victimization especially among young people (Blaya, 2019). Online hate speech and incitement have a potentially greater impact when spread in social media (Recommendation No. R (97) 20 of the Committee of Ministers of the Council of Europe on "hate speech"). Many countries have issued legislation to protect people from groups and organized individuals who use the web to propagate and incite hatred. Hatred is also spread by "ordinary" people. As stressed by Potok (2015), individuals have become more active than organized groups and produce hate that is widely disseminated through posts, comments and user-generated social media platforms. This should get full attention from part of decisionmakers, researchers and educators, due to the rise in anti-Semitism, Islamophobia and xenophobia throughout Europe and beyond. Such phenomenon may have dramatic consequences in terms of stigmatization and alienation on both individuals and society.
Research has increasingly investigated the exposure and victimization of individuals and communities to online hateful content (Oksanen et al., 2014; Hawdon et al., 2017; Blaya, 2019). However, only one research documents the involvement of the young people as perpetrators in the US (Costello and Hawdon, 2018). In Europe, there is a gap in research focusing on cyberhate perpetrators. This article is therefore attempting to address the current gap with an online survey completed in France by 1,889 young people aged 12–20.
Defining Cyberhate
Cyberhate is related to cyberbullying. However, although they use similar means and happen in similar context, there are differences between these two forms of aggression:
- In the case of cyberhate, individuals or communities are targeted because of supposed, specific or identified characteristics such as their physical appearance, religion or the language they speak.
- Even when individuals only are targeted, cyberhate expresses inter-group hostility (Hawdon, 2014). It can be the consequence of the competition for economic wealth or power, the feeling that one's identity is being threatened. Hatemongers thrive on this (Sherif and Sherif, 1969).
- The consequences of being exposed or a direct target of cyberhate not only generate individual or community unrest but also contribute to alter social cohesion and democracy/human rights.
Literature [be it journalistic (Knobel, 2012), from the associative sector (Messmer, 2009) or scientific] often refers to cyberhate as a virus that spreads like an infectious disease in our societies, affecting the most vulnerable people (Foxman and Wolf, 2013). The Council of Europe, in its Additional Protocol to the Convention on Cybercriminality of 28 January 2003, extends its scope to criminalize racist and xenophobic speech and propaganda via computer systems, states that:
"'Racist and xenophobic material' means any written material, any image or any other representation of ideas or theories, which advocates, promotes or incites hatred, discrimination or violence, against any individual or group of individuals, based on race, color, descent or national or ethnic origin, as well as religion if used as a pretext for any of these factors." (Art. 2-1).
For its part, the Anti-Defamation League defines cyberhate as:
"Any use of electronic communications technology to spread anti-Semitic, racist, bigoted, extremist or terrorist messages or information. These electronic communications technologies include the Internet (i.e., Web-sites, social networking sites, "Web 2.0" user-generated content, dating sites, blogs, on-line games, instant messages and e-mail) as well as other computer- and cell phone-based information technologies (such as text messages and mobile phones)." (Anti-Defamation League, 2010)
The Center for Equal Opportunities and Opposition to Racism in Brussels, defines cyberhate as "the propagation of hate speech on the Internet." It refers to hatred in the form of bullying, insults, discrimination on the Internet against individuals or groups of people on the grounds of their skin color, supposed race, ethnic origin, sex, sexual orientation or political or religious beliefs. It also refers to anti-Semitism and historical revisionism (p. 8, 2009).
We define cyberhate as electronic communication initiated by hate groups or individuals, with the purpose to attract new members, build and strengthen group identity; it aims at rejecting others' collective identity. The means used are the publishing of propagandistic messages, incitation to discrimination, violence, and hatred against individuals and their community with the view to potentially disaggregate social cohesion, on the ground of color of skin, religion, national or ethnic origin. In this research, we use the term "cyberhate" to refer to all hateful online forms of expression (text, images, videos, pictures, graphic representations) whose objective is to belittle, humiliate or ridicule a person or group of persons, by generating hatred or rejecting these persons or their communities who genuinely or supposedly belong to a specific ethnic or religious background different from theirs.
Exposure to Cyberhate
A pioneer research in the United States and Europe, shows that 53% of respondents are exposed to online hate content and 16% are personally targeted (Oksanen et al., 2014; Hawdon et al., 2017). In Europe, the Net Children Go Mobile survey (Mascheroni and Ólafsson, 2014) reports that children aged 9–16 are becoming increasingly exposed to hateful comments. A research in France, concludes that one third of the surveyed youth are exposed to hate online (30%) (Blaya, 2019). Although exposure does not systematically lead to victimization, evidence suggests that being exposed to hateful content is linked to lower self-esteem, enhanced feeling of insecurity and fear as well as mental health issues such as mood swings (Tynes, 2005; Blaya, 2019). Exposed individuals are more likely to be associated with delinquent peers, to live alone and have higher levels of education (Schils and Pauwels, 2014; Hawdon et al., 2017). They also spend longer time on the Internet and are multi-users of online applications and services (Hawdon, 2014; Costello et al., 2016; Keipi et al., 2017). Being exposed to cyberhate is also associated to cyberbullying and violence (Leung et al., 2018) and to recruitment to extremist organizations (Foxman and Wolf, 2013). Finally, research reveals that exposure (put exposure to what) may be correlated with detrimental effects on a societal level: exposure is potentially linked to an increase in hate crimes offline, a lack of social trust, tougher discrimination, and prejudice against the targets (Näsi et al., 2015; Keipi et al., 2017), this including spreading extremist and violent ideology (Tynes, 2005; Foxman and Wolf, 2013).
Cyberhate Victimization
In Canada, the "Young Canadians in a Wired World" study (Taylor, 2001) indicates that 14% of Instant Messaging users had suffered threats. In the United States, a research among Afro-American, Latinos, Asians and Métis communities showed evidence of an increase in cyberhate victimization from 2010 to 2013 (Tynes et al., 2015). Statistical analyses do not identify any difference between male and female respondents nor between the involved ethnic groups. However, older respondents showed higher rates of victimization which might be due to longer hours spent online. Research shows that victims adopt more at-risk online behaviors such as spending long time online, being more active on social networking sites, and visiting potentially dangerous websites (i.e., promotion of self-inflicted violence) (Keipi et al., 2017; Costello et al., 2018). Being faced with hate speech can encourage people to adopt violent behaviors. Consequences range from lower self-esteem, mental health issues such as high levels of anxiety, identity erosion, anger, fear, to adopting violent behaviors (Leets, 2002; Tynes, 2005).
Cyberhate Perpetrators
A paper by Costello and Hawdon (2018) on a survey including a random sample of Americans aged 15–36, shows that one fifth of the respondents acknowledged producing and disseminating cyberhate on the grounds of ethnic origin, religion or color of skin. Their findings show that males are significantly more involved in online hate perpetration than females. They also highlight that perpetrators more often use specific sites such as Reddit, Tumblr and messaging boards. Belonging to an online community or visiting sites that spread hatred increases the probability of producing cyberhate. Having favorable attitudes toward violence and being submitted to some social pressure leads people feeling comfortable performing offline violent behavior (Ajzen, 1991). Online, the "filter bubble effect" as explained by Pariser (2011) virtually encloses in the same network, individuals who share similar ideas and live in a similar identity bubble. As for cyberhate, sharing subversive ideology, and positive attitudes toward xenophobia, racism, or bigotry can intensify the risk of perpetration (Costello and Hawdon, 2018).
Along findings showing that being a victim of "mainstream" cyberbullying increases the likelihood to be involved as a perpetrator, being the target of cyberhate is correlated with higher odds to become a perpetrator (Hawdon, 2014). However, unlike other forms of cyberbullying, spending much time online or playing first-person shooter games does not seem to influence the spread of hatred (Costello and Hawdon, 2018). Cyberhate exposure and victimization are negatively associated with trust in people in general (Keipi et al., 2017; Näsi et al., 2017). The link between trust in institutions and the perpetration of cyber hatred has not been studied yet.
As Perry and Olsson (2009) argue, spreading cyberhate contributes to consolidating hatred in real life. Racist individuals use the Internet to disseminate their ideas and to confirm their racist views by connecting with people sharing the same ideas on political blogs, games, forums, and chat rooms. They use this powerful communication tool to hurt, denigrate, humiliate people and communities. Victims of racism and discrimination in real life have increased risks of offending, as they develop hostile views of others (Burt et al., 2012). However, prejudice and racism are not always conscious and can be implicit. Implicit bias is likely to trigger discriminatory and hostile attitudes in interpersonal face-to-face or online interactions. This highlights the need to investigate attitudes toward racism while investigating cyberhate, in order to assess the potential association between declared racism and cyberhate perpetration.
Relying on the definition presented previously and the above research background, the objectives of this survey were two-fold:
(1) To assess the prevalence of the involvement of young people in cyberhate in France
(2) To examine the factors contributing to the involvement of young perpetrators of cyberhate
The questionnaire was informed by several sources including questions on deviant youth groups (DYG) from the ISRD survey (Blaya and Gatti, 2010) and some questions on digital practices from the EU Kids Online survey (Livingstone et al., 2011). The questions related to cyberhate were informed by an extensive literature review and some exploratory interviews that were conducted prior the designing of the survey.
Sample and Procedure
The study included 16 lower and upper secondary schools. 1889 students completed an online questionnaire survey. Participants ranged from 11 to 20 years of age (age mean = 14.631, sd = 2.053), 50.24% were females, 49.75% were males. The student population of these schools is diverse ranging from upper-class schools in the center of Paris to remote rural schools in the South West of France. All students from one class randomly selected per year group completed the questionnaire. Students under the age of 18 were asked to participate providing they submitted a parental consent form. Parents were sent an explanation letter informing them on the objectives of the research, the use and management of data and the associated potential risks. All students completing the questionnaire were informed about the study and provided their consent prior to participating. As a consequence, written consent was obtained from all adult participants and from the parents of all non-adult participants. The response rate was 90%. There is no mean to check on potential differences between students who participated and those who did not. Some of them had not provided the parental consent, others were out of school the day of data completion and there were a number of personal reasons why they could not take part in the survey.
Data were collected anonymously during the year 2016. To ensure children understood the questions, the wording of the questionnaire was improved after cognitive testing with children of different age groups and gender. It was then piloted to check on completion time.
In each school, questionnaires were administered online under the supervision of a research assistant in the school's IT room and no staff was present during data collection to ensure confidentially, trust and accuracy of the students' responses. Completion took no more than 45 min.
We used the questionnaire previously used by Blaya and Gatti (2010) and Livingstone et al. (2011), which yielded good reliability indices (α = 0.95, ω = 0.96). It was made up of general questions about the socio-demographic characteristics of respondents and their families, their digital practices (ICT use), their experiences of bullying in schools, their satisfaction with life. We also asked them questions regarding their religion and attitudes toward violence, their trust in institutions, the characteristics of their peer group, and their attitudes toward racism.
Finally, we asked them about their cyberhate experience as our main variables of interest were the prevalence of exposure, victimization and perpetration of hate online amongst young people.
Questions regarding individual and family characteristics included gender (males vs. females); age (open question); students' school grade; the person with whom they lived, if their parents had a professional occupation and their nationality.
ICT Use
Participants were asked to assess how much time they spent online every day (1) during the week (item 1) and (2) during the week-end (item 2, α = 0.72, ω = 0.72). They could answer on a scale ranging from never (1) to 4 h or more (5). They further were asked to assess which type of applications they preferred amongst Snapchat, Messenger, Facebook, Instagram, Twitter, and online games.
School Bullying
Participants were asked to answer three items referring to how they underwent psychological violence in school (α = 0.66, ω = 0.68). Specifically, participants were asked: (1) how many times they were excluded by other students, (2) how many times they were insulted or made fun of, and (3) how many times they were insulted during the last 12 months preceding the survey. Participants could answer on a scale ranging from 1 (never) to 5 (five times and more).
Life Satisfaction
Participants were asked how satisfied they currently were with their lives. They could answer on a scale ranging from not happy at all (1) to very happy (5).
Participants were asked (1) if they had a religion (yes or no), (2) if so, what their religion was, and (3) how often they practiced their religion. For this last question, participants answered on a scale ranging from 0 "I am not a religious person" to 4 – "I am very religious".
Attitudes Toward Violence
Attitudes toward violence were measured by seven items (α = 0.96, ω = 0.98). These items asked participants if they thought that fighting was legitimate (1) to defend oneself (item 1), (2) to defend someone else (item 2), (3) if participants were insulted (item 3). Other items assessed that using violence was legitimate (4) in the case where someone is made fun of because of their religion (item 4), (5) to defend one's country (item 5), (6) to fight back against racism (item 6), (7) to fight for one's ideas (item 7). One item (using violence is legitimate because it is funny) was removed from the analyses because it did not significantly load on the "attitude toward violence" factor. Participants were asked to answer on a scale ranging from 1 (I don't agree) to 3 (I agree).
Trust in Institutions
Institutional trust was initially measured by 11 items (α = 0.96, ω = 0.98). For each institution, participants were asked to assess what was their level of trust. Out of the eleven items, five were kept as they significantly load on the "trust in distant institutions" factor. These items were: the parliament, the prime minister, the President of the republic, the European Union, the United nations. To define the "trust in proximal institutions," we included the following items: parents, local politicians, schools, the police and the law. Participants were asked to answer how much they trusted each institution on a scale ranging from 1 (I don't trust this institution) to 3 (I deeply trust this institution).
Peer Group(s)
This section comprises two scales: the first scale asked about the number of friends the participants had in real life (IRL) and online and the second scale aimed to evaluate if the participants belonged to a deviant youth group—DYG (Blaya and Gatti, 2010).
- Number of friends (α = 0.74, ω = 0.75): we measured the number of friends was measured by four items. Participants were asked to assess how many friends they had (1) at school, (2) in their neighborhood, (3) in their town. They were also asked to assess how many friends they had on the web, but this item did not significantly load on the factor. Participants were asked to answer on a scale ranging from 1 (no friends) to 7 (more than 300 friends).
- Belonging to DYG (α = 0.99, ω = 0.99): Belonging to a DYG was measured using 13 items. Among those, three were retained for our survey. Item one asked participants if they had to do particular things to be admitted into the gang. Item two asked participants if doing things prohibited by the law was accepted or tolerated in their gang. Item three asked participants if members of their groups did illegal things (i.e., things that were prohibited by the law). Participants were asked to answer if this was true ("Yes," 1) or not ("No," 0).
Racist Beliefs
Questions assessing racist beliefs were included in the survey (α = 0.88, ω = 0.88). These questions were asking (1) if the participants thought some "races" were superior to others (item 1: "do you think that some races are superior to others?") (2) if racism was the product of social intolerance (item 2: "do you think that racism is caused by social intolerance?"), (3) if the participants thought that racism could sometimes be justified (item 3), (4) if they thought that victims of racism were sometimes responsible for their own fate (item 4). Finally, they were asked if they thought that racism was (1) a long-existing problem with no solution, (2) a problem which could be solved if everyone works on it and (3) a situation less serious than what is claimed.
Cyberhate Exposure
Cyberhate exposure investigated whether the participants had been exposed to hateful online messages during the 6 months prior to the survey (Yes/no/I do not know). They were further asked if they had purposefully sought such messages (never to 4 times and more).
Online victimization was measured by two items (α = 0.78, ω = 0.79). These items asked participants if during the last 6 months, they had been the target of hateful or humiliating messages, comments or images (1) on their cell phone (item 1), (2) on social media (item 2). The scale ranged from 1 (never) to 4 (4 times and more).
Cyberhate Perpetration
This is our dependent variable (α = 0.63, ω = 0.64). It was measured through two items. Participants were asked if they had (1) published (item 1) or (2) shared or transferred (item 2) humiliating or hateful messages, images or comments toward one specific person or a group of persons on the Internet. Participants were asked to answer on a scale ranging from 1 (never) to 4 (4 times and more).
Data were analyzed with R and Mplus and consisted of two steps: descriptive statistics and a Structural Equation Model (SEM). We performed descriptive analyses on the prevalence of participants' involvement in cyberhate and the relationship with variables such as school violence, life satisfaction, cyberhate victimization and perpetration, as well as socio-demographics. In the Structural Equation Model analysis, we tested how the perpetration of cyberhate was related to (1) attitudes toward violence, (2) cyberhate victimization, (3) belonging to a DYG, (4) trust in proximal institutions, (5) trust in distal institutions, (6) social isolation (measured by offline number of friends), (7) attitudes toward racism, (8) school bullying, as well as (9) the time spent online and 10) the use of applications. As most of our variables were categorical or ordered data, we used the WLSMV estimator. This estimator does not assume normally distributed variables, and is recommended to analyze such kind of data (Brown, 2014). Multivariate Mardia coefficient reveals that our data were not normally distributed (Mardia Skweness = 24551.252, p < 0.001; Mardia Kurtosis = 55.192, p < 0.001). We kept at least two items for each latent variable, as recommended by Kenny (http://davidakenny.net/cm/identify.htm). Items were kept if (1) their loading were equal or higher than.3, and (2) if their R2 were higher than 0.3.
To assess the model's goodness-of-fit, we relied on indices having different measurement properties, as recommended by Hu and Bentler (1999). Thus, we used the root mean-square error of approximation (RMSEA), the comparative fit indices (CFI) and the Tucker-Lewis index (TLI). Browne and Cudeck (1992) suggest that models with RMSEA below 0.05 are indicative of good fit, and that values up to 0.08 reflect reasonable errors of approximation. The CFI statistic (McDonald and Marsh, 1990) reflects the "distance" of the model from the perfect fit. It is generally acknowledged that a value >0.9 reflects an acceptable distance to the perfect fit. We also reported the Tucker–Lewis index (TLI; Tucker and Lewis, 1973), which accounts for the model complexity. The TLI indicates how the model of interest improves the fit in relation to the null model. As for the CFI statistic, a TLI value equaled or >0.9 reflects an acceptable distance to the perfect fit. However, we did not report SRMR indices, because it is not computed when performing SEM using WLSMV estimator in Mplus.
Before analyzing our Structural Equation Model (SEM) results, we first provide descriptive analyses of how often participants reported being either author or victim of cyberhate and if they were victims of school bullying (Table 1). To do this, we analyzed if participants were involved at least once or never as (1) cyberhate perpetrator either by publishing or by (2) sharing hateful content, (3) exposed to cyberhate, (4) targets of cyberhate via their cell phone or (5) via social networks.
Table 1. Numbers and proportions of perpetrators and victims of hateful content.
We then focused only on participants who reported being a perpetrator at least once, either by sharing or by publishing hateful content. This represents 146 participants out of the initial 1,889 students who completed the questionnaire. The study of socio-demographic characteristics shows that there were significantly more boys among perpetrators (59.3%, n = 83) than girls [40.7%, n = 57; Chi(1)2 = 4.828, p = 0.027]. The vast majority of the perpetrators had both a working mother [73%, n = 99, Chi(1)2 = 27.161, p < 0.001], and a working father [84.6%, n = 110, Chi(1)2 = 62.308, p < 0.001]. Regarding their potential religion, a slight majority (51%) of perpetrators answered they belonged to a religion (n = 73), 34.5 % reported not belonging to any religion (n = 49) and the rest of the sample 14% ticked "other" (n = 21), [Chi(2)2 = 28.42, p < 0.001]. Among those who stated they had a religion, 8% said that they were not active, 32% said they were little active, 38% they were rather active and 29% reported they practiced much [Chi(3)2 = 15.822, p = 0.001]. Regarding the various types of reported religions, 19% of the sample answered they were Catholic (n = 28), 20% Muslim (n = 30), and 60% reported other religious affiliations [Chi(2)2 = 47.736, p < 0.001].
We also focused on perpetrators' life satisfaction. Seventy percentage of reported being either very happy or relatively happy (n = 99); 14% reported being neither happy nor unhappy (n = 20); 14% of them finally reported being not really happy to really not happy (n = 20), thus revealing a significant difference between the proportions of life satisfaction [Chi(4)2 = 63.67, p < 001].
Regarding school bullying, results reveal that most of the perpetrators were never victims of ostracism (61.7%, n = 87) nor threatened (51.4%, n = 73). However, many of them were insulted over five times (43.6%, n = 61, see Table 2) during the last 6 months prior the survey. Results reveal significant differences in the proportions of perpetrators being excluded [Chi(4)2 = 154.14, p < 0.001], insulted [Chi(4)2 = 53.87, p < 0.001] and threatened [Chi(4)2 = 88.85, p < 0.001].
Table 2. Reported school bullying.
We then checked whether perpetrators had previously been the target of online hateful messages. Results suggest that the vast majority had never suffered cyberhate aggression via social networks [71.4%, n = 100, Chi(1)2 = 25.712, p < 0.001] or via cell phones [66.6 %, n = 94, Chi(1)2 = 15.67, p < 0.001]. Interestingly however, most of them had previously been exposed to cyberhate [n = 98, 80.33%, Chi(1)2 = 44.88, p < 0.001].
Perpetrators were then asked if they had intentionally searched for such content, notably by looking for websites which were targeting specific (groups of) people because of their religion, the color of their skin, their origin or their culture. In all these cases, more than 75% of the sample answered that they had never specifically searched for such content (see Table 3 for an overview).
Table 3. Proportion of perpetrators reporting a specific search for hateful content.
On average, perpetrators had a neutral attitude toward violence (mea n = 2.01, sd = 0.49). Interestingly however, most of them agreed with the idea of using violence to defend oneself [78.5 %, n = 106, Chi(2)2 = 124, p < 0.001], or to defend someone else [70%, n = 91, Chi(2)2 = 82.82, p < 0.001]. Moreover, perpetrators were equally distributed between not agreeing and agreeing with the fact that it is acceptable to use violence to defend oneself against racism ["I don't agree" = 34.5%, "I neither agree nor disagree" = 29.3%, "I totally agree" = 36.1%, Chi(2)2 = 1.00, p > 0.05] and to defend oneself if one is insulted ["I don't agree" = 27.1%, "I neither agree nor disagree" = 41.2%, "I totally agree" = 31.3%, Chi(2)2 = 3.9, p > 0.05].
Regarding how trusting perpetrators were toward the institutions, results suggest that they have a low level of trust (mean = 1.30, sd = 0.44). Interestingly however, perpetrators strongly trusted their parents [94%, n = 138, Chi(3)2 = 225.5, p < 0.001] and their friends [87%, n = 118, Chi(3)2 = 78.17, p < 0.001]. In contrast, they showed less confidence in local politics [13.2%, n = 65, Chi(3)2 = 77.44, p < 0.001], school [41%, n = 54, Chi(3)2 = 55.9, p < 0.001], the parliament [12.8%, n = 16, Chi(3)2 = 77.67, p < 0.001], the prime minister [15.6%, n = 21, Chi(3)2 = 71.27, p < 0.001], and the President of the republic [17.1%, n = 22, Chi(3)2 = 79.25, p < 0.001].
When measuring the participant's attitudes toward racism, results showed that 47% of the perpetrators consider racism not to be justifiable (n = 63), while 30% agreed it is justifiable sometimes. Finally, 22.5 % (n = 30) of the perpetrators considered racism to be often justifiable. This suggests that a slight majority of cyberhate producers and disseminators consider that racism is justifiable [Chi(2)2 = 12.917, p = 0.001].
Finally, when reporting their tendency to use specific apps, the vast majority of perpetrators reported using YouTube [n = 130, 89%, Chi(1)2 = 89.01, p < 0.001], followed by Snapshat [n = 107, 73%, Chi(1)2 = 31.67, p < 0.001] and Facebook [n = 92, 63%, Chi(1)2 = 9.89, p = 0.001]. Regarding the remaining applications (i.e., Instagram, Viber, Messenger, WhatsApp, Twitter and online games), participants either did not use them [for example, 140 perpetrators did not use Viber, 95%, Chi(1)2 = 122.9, p < 0.001 don't use Viber] or there were similar proportions of people who used them and did not use them (for example, 83 vs. 63 perpetrators used Instagram (56.8 vs. 43.1%, Chi(1)2 = 2.74, p = 0.09].
Structural Equation Model
The model provided an acceptable fit (RMSEA = 0.049, CFI = 0. 970, TLI = 0.965), and descriptive statistics for the variables kept in the model are reported in Table 4 (mean, standard deviation, median which is especially relevant for our categorical variables, skewness, kurtosis). Regression coefficients are reported in Table 5, factor loadings in Table 6, and correlation between latent factors in Table 7.
Table 4. Descriptive statistics for the items included in the SEM analysis.
Table 5. Regression coefficients on latent factor "cyberhate perpetration."
Table 6. Factor loadings for each latent variable.
Table 7. Correlation coefficients between latent factors.
Regression Coefficients
Regarding the model per se (Table 5, Figure 1), results show that producing cyberhate was significantly predicted by cyberhate victimization (b = 0.414, 95% CI = [0.299; 0.530], p = 0.001), revealing that the more participants reported being the target of cyberhate, the more they reported perpetration. Positive attitudes toward violence marginally predicted the tendency to be involved as a perpetrator (b = 0.104, 95% CI = [−0.008; 0.216], p = 0.068). Belonging to a DYG (b = 0.406, 95% CI = [0.236; 0.576], p = 0.001) and the time spent online (b = 0.214, 95% CI = [0.044; 0.383], p = 0.014) also significantly and positively predicted being a perpetrator. Surprisingly however, our results showed no significant link between perpetrators and (1) trust in proximal institutions (b = −0.031, 95% CI = [−0.200; 0.137], p = 0.718) nor with (2) distal institutions (b = 0.012, 95% CI = [−0.153; 0.177], p = 0.888), (3) the number of friends (b = 0.052, 95% CI = [−0.062; 0.166], p = 0.369) or with (4) the use of online applications (b = −0.159, 95% CI = [−0.0383; 0.065], p = 0.163).
Figure 1. Standardized regression estimates between latent factors.
Correlations Between Latent Factors
Regarding correlations between latent factors (Table 7), results reveal a significant and positive correlation between attitudes toward violence and confidence in distant institutions (b = 0.080, 95% CI = [0.026; 0.133], p = 0.004) but a negative correlation with proximal institutions (b = −0.087, 95% CI = [−0.143; −0.031], p = 0.005). Results also highlight a significant and positive correlation between attitude toward violence and the number of friends (b = 0.264, 95% CI = [0.206; 0.322], p = 0.001) and belonging to DYGs (b = 0.432, 95% CI = [0.366; 0.497], p = 0.001). Moreover, there was a significant and positive correlation between attitudes toward violence and the amount of time spent online (b = 0.171, 95% CI = [0.113; 0.228], p = 0.001) and the use of online applications (YouTube, Facebook and Snapshat) (b = 0.064, 95% CI = [0.007; 0.121], p = 0.027).
Trust in distant institutions was positively related to reliance in proximal institutions (b = 0.585, 95% CI = [0.552; 0.614], p = 0.001) and to the number of friends (b = 0.087, 95% CI = [0.025; 0.148], p = 0.006). It was also negatively related to the time spent online (b = −0.064, 95% CI = [−0.119; −0.003], p = 0.023] and to the use of applications (b = −0.073, 95% CI = [−0.131; −0.015], p = 0.014).
Belonging to DYGs was positively correlated with the number of friends (b = 0.312, 95% CI = [0.242; 0.383], p = 0.001), cyberhate victimization (b = 0.075, 95% CI = [0.043; 0.247], p = 0.005), and negatively correlated with trust in proximal institutions (b = −0.236, 95% CI = [−0.308; −0.163], p = 0.001). It was also positively related to the time spent online (b = 0.250, 95% CI = [0.174; 0.326], p = 0.001) and to the use of applications (b = 0.357, 95% CI = 0.261; 0.453], p = 0.001).
The number of friends was positively correlated with racism (b = 0.137, 95% CI = [0.036; 0.239], p = 0.008), time spent online (b = 0.089, 95% CI = [0.028; 0.150], p = 0.005) and the use of applications (b = 0.297, 95% CI = [0.219; 0.375], p = 0.001). Finally, the time spent online was positively related to the use of applications (b = 0.480, 95% CI = [0.427; 0.533], p = 0.001). Cyberhate victimization was positively related with the time spent online (b = 0.267, 95% CI = [0.180; 0.354], p = 0.001), and with the use of application (b = 0.038, 95% CI = [0.006; 0.069], p = 0.008). Finally, time spent online was positively related with the use of applications (b = 0.569, 95% CI = [0.180; 0.354], p = 0.001). No other significant correlation between latent factors was significant.
Multiple Mediation Analysis
Based on the observed results, we then sought to understand more clearly the mechanisms underlying the tendency to act as a cyberhate perpetrator. Notably, we wished to assess further if the level of trust in proximal institutions could actually predict acting as a cyberhate perpetrator. We hypothesized that the link between trust in proximal institutions and cyberhate perpetration could be mediated by (1) belonging to DYGs and (2) attitudes toward violence. In order to test these hypotheses, we performed a multiple mediation analysis in which we tested the direct and indirect link between trust in proximal institutions and cyberhate perpetration through belonging to a DYG and attitudes toward violence.
Results of the mediation analyses are reported in Table 8 and depicted in Figure 2. The model provided an acceptable fit (RMSEA = 0.071, CFI = 0. 923, TLI = 0.908). Results reveal that there is a significant total effect of distrust in proximal institutions on cyberhate perpetration (b = −0.221, 95% CI = [−0.325; −0.116], p < 0.001). Individual mediation analyses revealed a negative indirect effect for both belonging to a DYG (b = −0.182, 95% CI = [−0.245; −0.129], p < 0.001) and attitudes toward violence (b = −0.047, 95% CI = [−0.069; −0.024], p < 0.001). However, as showed in Figure 2 below, and confirming our previous analyses, no direct effect was found between the level of trust in proximal institutions and cyberhate perpetration (b = 0.008, 95% CI = [0.006; 0.069], p > 0.05). These results suggest that trust in institutions may indirectly prevent people from acting as cyberhate perpetrators since the more people trust their proximal institutions, the less they tend to become members of a DYG, and the more negative is their attitude toward violence.
Table 8. Results of the mediation analysis.
Figure 2. Multiple mediation analysis.
This paper reports on a survey about the involvement of young people in cyberhate. It sets out to investigate the extent to which students are involved as perpetrators and to explore the characteristics of these young people. Descriptive findings show that out of 1,889 respondents to the survey, approximately one student in ten (10%) reported being victims of cyberhate and 5% that they had published or disseminated hateful content online. This percentage is much lower than the prevalence rates found by the survey by Costello and Hawdon (2018). There are probably contextual effects due to the cultural and legal differences as far as the freedom of expression and content regulations are concerned (Akdeniz, 2010). While in the United States, the First Amendment guarantees freedom of speech prevails, in Europe nations have made specific efforts to regulate cyberhate (Gagliardone et al., 2015). This is also probably due to the discrepancy in the age of the participants since the American survey included older participants (aged 15–36). Descriptive analyses show that male perpetrators are more numerous although females are also active (40%). As a whole, perpetrators are relatively happy with their lives. This contradicts research suggesting that young people adhering to extremist ideologies are unhappy and frustrated individuals (Khosrokahvar, 2014) and the fact that both parents work goes against the idea that extreme right youngsters are part of the "white trash" (Patricot, 2013). Apart from being a male, socio-demographics did not seem to be predictors of producing or disseminating cyberhate. A majority of perpetrators (70%) are actively involved in religion and spend longer time online as shown in previous research (Costello and Hawdon, 2018). This last point meets previous findings from research on cyberbullying, showing that the longer the time online, the higher the odds to become a victim. Exposure to cyberhate is associated with producing cyberhate as in the findings of Leung et al. (2018) for cyberbullying and Costello and Hawdon (2018).
While descriptive analyses suggest that perpetrators are more exposed than victims of cyberhate, regression analyses reveal that cyberhate perpetration is significantly predicted by cyberhate victimization. This goes along previous studies on bullying and "general" cyberbullying dedicated to the identification of the victims and aggressors' characteristics, showing that there is a strong overlap between victimization and perpetration (Vandebosch and Cleemput, 2009; Mishna et al., 2012). Perpetrators report more often being insulted at school than the other participants and thus being in a vulnerable position within their peer group. Having a group of friends usually is a testimony that one has positive social skills; it acts as a protective factor against victimization (Aoyama, 2010). However, some groups of friends are inadequate and have a negative influence on the way their members behave. As we could see in this survey, belonging to a DYG is positively correlated with having a high number of friends, contributes to a lower trust in the institutions and has a direct effect on producing or disseminating cyberhate. Latent factors analyses show that positive attitudes toward violence are correlated to belonging to a DYG and that they positively influence cyberhate behaviors. These attitudes are justified as a mean to defend oneself or someone else. As we could check with the SEM, cyberhate is strongly linked with being a victim of cyberhate, which might explain positive attitudes toward violence as a way to defend oneself or to defend others. Cyberhate and belonging to a DYG go along with the assumption that violence is a social construct and adolescents who associate with deviant or antisocial peers are more at risk to be involved in such behaviors themselves (Rugg, 2013), seeking peer acceptance or being under domination. The mere perception that deviance, delinquency or violence are accepted within the group can lead to the adoption of such behaviors (Petraitis et al., 1995). As Huang et al. (2014) show, peers' online risky behaviors is a risk factor for adolescents who will end up acting in a similar fashion. These findings lead us to think that cyberhaters are particularly vulnerable since their involvement is associated with school bullying and cyberhate victimization.
The TUI Foundation (2018) showed that low levels of trust toward institutions are common among youth. One third of the participants to this survey thought that a radical change is needed and 7–23% showed populist attitudes. Quite a few youngsters experienced a feeling of loss of boundaries and that there was a demoralization process toward politics and institutions. This feeling affects the process of building stable identities and contributes to making them feel threatened, as stressed by (Rosa, 2017). Anomia leads some of them to adhere to populist ideologies. Discriminating and alienating others gives them a sense of order that they perceive, can only be achieved if they are hostile toward other groups (Schaafsma and Williams, 2012).
Perpetrators in our survey have lesser confidence in institutions than the other respondents. Latent factors analyses show that trust in institutions can act as a preventive factor as it prevents young people from belonging to deviant groups and decreases positive attitudes toward violence. We shall note that some perpetrators as well as young people repeatedly victimized reported low levels of trust toward school. This leads us to stress the urgency to reverse this situation and not only restrain the misuse of the Internet but also to promote attitudes toward tolerance and against racism and violence. As some previous studies show, teaching and fostering open discussions on racism, Islamophobia or anti-Semitism have positive incidence on students' attitudes toward racism and intolerance in general, both online and offline (Bergamaschi and Blaya, 2019). Schools can mediate intolerance through intercultural dialogue and education diversity. Although they cannot bear the responsibility to solve this societal problem on their own, schools can play an important role in counteracting hostile and abusive behaviors that stigmatize students and their communities both offline and online. As Foxman and Wolf (2013) argue, this would benefit not only this specific group but society as a whole as cyberhate affects the coherence of society, feeds hatred offline and spreads violent and extremist ideology.
Some limitations of this study should be noted. The sample is a convenience sample, as we could only perform the study in schools who accepted to participate. Consequently, we cannot rely on a nationally representative sample. Questionnaires are self-reported, and answers are potentially biased like any survey of this type. However, it contributes to a better understanding of the characteristics of youth involved in cyberhate and thus can inform intervention against a phenomenon that can have heavy social consequences on witnesses, victims and perpetrators themselves.
All datasets generated for this study are included in the manuscript and/or the supplementary files.
The survey was approved by the ethics committee of the Université Nice Sophia Antipolis and fulfills the requirements from the CNIL.
All authors made substantial contribution to the theoretical framework, design, data analyses or interpretation of this article.
The current study was supported by a research grant for the project SAHI granted to the first author by the Centre National de la Recherche Scientifique (CNRS) in France.
We thank Michele Junges-Stainthorpe for her proofreading of English.
Ajzen, I. (1991). The theory of planned behavior. Organ. Behav. Hum. Decis. Process. 50, 179–211. doi: 10.1016/0749-5978(91)90020-T
Akdeniz, Y. (2010). Racism on the Internet. Strasbourg: Council of Europe Publishing.
Anti-Defamation League (2010). Responding to Cyberhate, Toolkit for Action. Available online at: https://www.adl.org/sites/default/files/documents/assets/pdf/combating-hate/ADL-Responding-to-Cyberhate-Toolkit.pdf (retrieved November 1, 2016).
Aoyama, I. (2010). Cyberbullying: What are the psychological profiles of bul-lies, victims, and bully-victims? Diss. Abstr. Int. Section A: Humanit. Soc. Sci. 71, 3526.
Bergamaschi, A., and Blaya, C. (2019). Interactions Entre Jeunes: Lien Social, Relations Amicales et Confiance Envers les Institutions ? Research Report, University Nice Côte D'azur/CAF, Nice.
Blaya, C. (2019). Cyberhaine, Les Jeunes et la Violence sur Internet. Paris: Nouveaux Mondes.
Blaya, C., and Gatti, U. (2010). Deviant youth groups in Italy and France: prevalence and characteristics. Eur. J. Crim. Policy Res. 16, 127–144. doi: 10.1007/s10610-010-9124-9
Boyd, D. (2014). It's Complicated: The Social Lives of Networked Teens. New Haven: Yale University Press.
Brown, T. A. (2014). Confirmatory Factor Analysis for Applied Research. New York, NY: Guilford Publications.
Browne, M. W., and Cudeck, R. (1992). Alternative ways of assessing model fit. Sociol. Methods Res. 21, 230–258. doi: 10.1177/0049124192021002005
Burt, C. H., Simons, R. L., and Gibbons, F. X. (2012). Racial discrimination, ethnic-racial socialization, and crime: a micro-sociological model of risk and resilience. Am. Sociol. Rev. 77, 648–677. doi: 10.1177/0003122412448648
Costello, M., and Hawdon, J. (2018). Who are the online extremists among us? Sociodemographic characteristics, social networking, and online experiences of those who produce online hate materials. Violence Gender 5, 55–60. doi: 10.1089/vio.2017.0048
Costello, M., Hawdon, J., Ratliff, T., and Grantham, T. (2016). Who views online extremism? Individual attributes leading to exposure. Comput. Human Behav. 63, 311–320. doi: 10.1016/j.chb.2016.05.033
Costello, M., Rukus, J., and Hawdon, J. (2018). We don't like your type around here: regional and residential differences in exposure to online hate material targeting sexuality. Deviant Behav. 40, 1–17. doi: 10.1080/01639625.2018.1426266
Foxman, A. H., and Wolf, C. (2013). Viral Hate: Containing its Spread on the Internet. New York, NY: Macmillan.
FRA (Fundamental Rights Agency) (2014). Fundamental Rights: Challenges and Achievements in 2013. FRA Annual Report. Office des Publications de l'Union Européenne.
Gagliardone, I., Gal, D., Alves, T., and Martinez, G. (2015). Countering Online Hate Speech. Unesco Publishing. Retrieved from: http://unesdoc.unesco.org/images/0023/002332/233231e.pdf
Hawdon, J. (2014). "Group violence revisited: Common themes across types of group violence," in The Causes and Consequences of Group Violence: From Bullies to Terrorists, eds J. Hawdon J. Ryan Luch M. (Lanham, MD: Lexington Books), 241–254.
Hawdon, J., Oksanen, A., and Räsänen, P. (2017). Exposure to online hate in four nations: a cross-national consideration. Deviant Behav. 38, 254–266. doi: 10.1080/01639625.2016.1196985
Hu, L. T., and Bentler, P. M. (1999). Cutoff criteria for fit indexes in covariance structure analysis: conventional criteria versus new alternatives. Struct. Equation Model. Multidiscipl. J. 6, 1–55. doi: 10.1080/10705519909540118
Huang, G. C., Unger, J. B., Soto, D., Fujimoto, K., Pentz, M. A., Jordan-Marsh, M., et al. (2014). Peer influences: the impact of online and offline friendship networks on adolescent smoking and alcohol use. J. Adolesc. Health 54, 508–514. doi: 10.1016/j.jadohealth.2013.07.001
Keipi, T., Näsi, M., Oksanen, A., and Räsänen, P. (2017). Online Hate and Harmful Content: Cross-National Perspectives. Abingdon and New York: Routledge.
Khosrokahvar, F. (2014). Radicalisations. Paris: Editions de la Maison des Sciences de l'Homme.
Knobel, M. (2012). L'Internet de la Haine: Racistes, Antisémites, Néonazis, Intégristes, Islamistes, Terroristes et Homophobes à L'assaut du Web. Paris: Berg International.
Leets, L. (2002). Experiencing hate speech: perceptions and responses to anti-semitism and antigay speech. J. Soc. Issues 58, 341–361. doi: 10.1111/1540-4560.00264
Leung, A. N., Wong, N., and Farver, J. M. (2018). You are what you read: the belief systems of cyber-bystanders on social networking sites. Front. Psychol. 9:365. doi: 10.3389/fpsyg.2018.00365
Livingstone, S., Haddon, L., Görzig, A., Olafsson, K., and with members of the EU Kids Online Network. (2011). EU Kids Online: Final Report. London: EU Kids Online Network, London School of Economics and Political Science.
Llorent, V. J., Ortega-Ruiz, R., and Zych, I. (2016). Bullying and cyberbullying in minorities: are they more vulnerable than the majority group? Front. Psychol. 7:1507. doi: 10.3389/fpsyg.2016.01507
Mascheroni, G., and Ólafsson, K. (2014). Net Children Go Mobile: Risks and Opportunities, 2nd Edn. Milano: Educatt.
McDonald, R. P., and Marsh, H. W. (1990). Choosing a multivariate model: noncentrality and goodness of fit. Psychol. Bull. 107:247. doi: 10.1037/0033-2909.107.2.247
Messmer, E. (2009). Racism, hate, militancy sites proliferating via social networking: websense sees tripling of such active sites and "pockets" over last year. Netw. Retrieved from: http://www.networkworld.com/news/2009/052909-hate-sites.html (accessed September 20, 2018).
Mishna, F., Cook, C., Gadalla, T., Daciuk, J., and Solomon, S. (2010). Cyber bullying behaviors among middle and high school students. Am. J. Orthopsychiatry 80, 362–374. doi: 10.1111/j.1939-0025.2010.01040.x
Mishna, F., Khoury-Kassabri, M., Gadalla, T., and Daciuk, J. (2012). Risk factors for involvement in cyber bullying: victims, bullies and bully–victims. Child. Youth Serv. Rev. 34, 63–70. doi: 10.1016/j.childyouth.2011.08.032
Näsi, M., Räsänen, P., Hawdon, J., Holkeri, E., and Oksanen, A. (2015). Exposure to online hate material and social trust among Finnish youth. Information Tech. People 28, 607–622. doi: 10.1108/ITP-09-2014-0198
Näsi, M. J., Räsänen, P., Keipi, T., and Oksanen, A. (2017). Trust and victimization: A cross-national comparison of Finland, the U.S., Germany and UK. Res. Finn. Soc. 10, 119–131.
Oksanen, A., Hawdon, J., Holkeri, E., Nasi, M., and Räsänen, P. (2014). "Exposure to online hate among young social media users," in Soul of Society: A Focus on the Lives of Children and Youth, ed M. N. Warehime (Emerald: Bingley), 253–273.
Pariser, E. (2011). The Filter Bubble: What the Internet Is Hiding From You. London: Penguin Press.
Patricot, A. (2013). Les petits Blancs: Un Voyage dans la France D'en Bas. Paris: Plein jour.
Penzien, E. (2017). Xenophobic and Racist Hate Crimes Surge in the European Union. Human Rights Brief. Retrieved from: http://hrbrief.org/2017/02/xenophobic-racist-hate-crimes-surge-european-union/ (accessed September 20, 2018).
Perry, B., and Olsson, P. (2009). Cyberhate: the globalization of hate. Inf. Commun. Technol. Law 18, 185–199. doi: 10.1080/13600830902814984
Petraitis, J., Flay, B. R., and Miller, T. Q. (1995). Reviewing theories of adolescent substance use: organizing pieces in the puzzle. Soc. Psychol. Bull. 117, 67–86. doi: 10.1037//0033-2909.117.1.67
Potok, M. (2015). The Year in Hate and Extremism. Intelligence Report 151. Retrieved from: https://www.splcenter.org/intelligence-report (accessed October 21, 2015).
Rosa, H. (2017). Beschleunigung: Die Veränderung der Zeitstrukturen in der Moderne. Berlin: Suhrkamp Verlag.
Rugg, M. (2013). Teenage smoking behaviour influenced by friends and parents smoking habits. Eurek Alert J. Adolesc. Health 143, 120–125.
Schaafsma, J., and Williams, K. D. (2012). Exclusion, intergroup hostility, and religious fundamentalism. J. Exp. Soc. Psychol. 48, 829–837. doi: 10.1016/j.jesp.2012.02.015
Schils, N., and Pauwels, L. (2014). Explaining violent extremism for subgroups by gender and immigrant background, using SAT as a framework. J. Strateg. Secur. 7, 27–47. doi: 10.5038/1944-0472.7.3.2
M. Sherif and C. W. Sherif (eds.). (1969). "Ingroup and intergroup relations: experimental analysis," in Social Psychology, (New York, NY: Harper & Row), 221–266.
Taylor, A. (2001). Young Canadians in a wired world: how Canadian kids are using the internet. Educ. Canada 41, 32–35.
Tucker, L. R., and Lewis, C. (1973). A reliability coefficient for maximum likelihood factor analysis. Psychometrika 38, 1–10.
TUI Foundation (2018). Young Europe 2018 – The Youth Study of TUI Foundation. Retrieved from: https://www.tui-stiftung.de/en/ (retrieved January 15, 2019)
Tynes, B. (2005). "Children, adolescents and the culture of online hate," in Handbook of Children, Culture and Violence, eds N. E. Dowd, D. G. Singer, and R. F. Wilson (Thousand Oaks, CA: Sage), 267–289. doi: 10.4135/9781412976060.n14
Tynes, B., Del Toro, J., and Lozada, T. (2015). An unwelcomed digital visitor in the classroom: the longitudinal impact of online racial discrimination on academic motivation. Sch. Psychol. Rev. 44, 407–424. doi: 10.17105/SPR-15-0095.1
Vandebosch, H., and Cleemput, K. V. (2009). Cyberbullying among youngsters: profiles of bullies and victims. New Media Soc. 11, 1349–1371. doi: 10.1177/1461444809341263
Vitoroulis, I., and Vaillancourt, T. (2015). Meta-analytic results of ethnic group differences in peer victimization. Aggress. Behav. 41, 149–170. doi: 10.1002/ab.21564
Keywords: cyberhate, involvement, young people, perpetration, victimization, characteristics
Citation: Blaya C and Audrin C (2019) Toward an Understanding of the Characteristics of Secondary School Cyberhate Perpetrators. Front. Educ. 4:46. doi: 10.3389/feduc.2019.00046
Received: 28 February 2019; Accepted: 09 May 2019;
Published: 10 June 2019.
Eva M. Romera, Universidad de Córdoba, Spain
Michelle F. Wright, Pennsylvania State University, United States
José Antonio Casas, Universidad de Córdoba, Spain
Copyright © 2019 Blaya and Audrin. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.
*Correspondence: Catherine Blaya, [email protected]
|
{
"redpajama_set_name": "RedPajamaCommonCrawl"
}
| 5,715 |
[
128000,
24284,
4918,
42780,
527,
520,
279,
1948,
315,
45477,
323,
5536,
17150,
198,
24284,
4918,
304,
11930,
198,
2028,
4652,
374,
961,
315,
279,
8483,
34011,
198,
63085,
1065,
287,
17680,
437,
2772,
323,
9805,
940,
68318,
9636,
13576,
1251,
13805,
6852,
323,
34711,
16501,
6852,
2806,
682,
220,
975,
29461,
198,
36,
6723,
386,
13,
12036,
2473,
198,
65715,
5969,
409,
108430,
6634,
27931,
11,
18157,
198,
98056,
978,
23245,
11301,
300,
198,
83862,
435,
13,
27839,
198,
82031,
18987,
3314,
3907,
11,
3723,
4273,
198,
1061,
20017,
73279,
198,
24284,
13,
10355,
2637,
220,
605,
5651,
220,
679,
24,
765,
3788,
1129,
48886,
2726,
14,
605,
13,
18633,
24,
6801,
25802,
13,
679,
24,
13,
931,
2790,
198,
51,
83071,
459,
46551,
315,
279,
85084
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
24284,
4918,
42780,
527,
520,
279,
1948,
315,
45477,
323,
5536,
17150,
198,
24284,
4918,
304,
11930,
198,
2028,
4652,
374,
961,
315,
279,
8483,
34011,
198,
63085,
1065,
287,
17680,
437,
2772,
323,
9805,
940,
68318,
9636,
13576,
1251,
13805,
6852,
323,
34711,
16501,
6852,
2806,
682,
220,
975,
29461,
198,
36,
6723,
386,
13,
12036,
2473,
198,
65715,
5969,
409,
108430,
6634,
27931,
11,
18157,
198,
98056,
978,
23245,
11301,
300,
198,
83862,
435,
13,
27839,
198,
82031,
18987,
3314,
3907,
11,
3723,
4273,
198,
1061,
20017,
73279,
198,
24284,
13,
10355,
2637,
220,
605,
5651,
220,
679,
24,
765,
3788,
1129,
48886,
2726,
14,
605,
13,
18633,
24,
6801,
25802,
13,
679,
24,
13,
931,
2790,
198,
51,
83071,
459,
46551,
315,
279,
85084,
-100
] |
Home » Analyst: Dip in shipping activity no cause for alarm
Analyst: Dip in shipping activity no cause for alarm
Mark B. Solomon
A key monthly index of U.S. shipping activity turned down in October after rising in September. But the keeper of the index said October's results do not necessarily foreshadow a weakening of freight volumes.
The index, published by freight audit and payment firm Cass Information Systems, is based on the expenditures and shipments of Cass's clients. In October, the freight expenditure index came in at 1.52, down from 1.55 in September but up from 1.47 in August. The shipment index came in at 0.92, down from 0.97 in September and 0.94 in August.
Thomas M. Zygmunt, who manages the index for Cass, said the decline might be more a reflection of the past than a window on the future. The October shipment index has dropped below September's results for the past three years. In fact, Zygmunt said, he wouldn't be surprised if the index shows declines in November and December, as that has also been the case for the last three years.
Since the start of 2009, the Cass index has fluctuated wildly. Shipment activity in February rose over January levels. The index then declined in March and April, increased in May and June, and declined in July, only to rise again in the next two months.
In a sobering reminder of how volumes have declined since 2006 and 2007, the shipment index stayed consistently in the 1.2 to 1.3 ranges during those two years, Zygmunt said. The index has not exceeded 1.0 since November 2008.
In 2008, Cass audited about 26 million shipments representing roughly $17.5 billion in shipper expenditures.
KEYWORDS Cass Information Systems
Report: Transport community sees no cause for alarm
July shipping, payment activity stays tepid, continuing multimonth trend, report says
Despite mid-year dip, rents for logistics real estate rose worldwide in 2020
Mark Solomon joined DC VELOCITY as senior editor in August 2008, and was promoted to his current position on January 1, 2015. He has spent more than 30 years in the transportation, logistics and supply chain management fields as a journalist and public relations professional. From 1989 to 1994, he worked in Washington as a reporter for the Journal of Commerce, covering the aviation and trucking industries, the Department of Transportation, Congress and the U.S. Supreme Court. Prior to that, he worked for Traffic World for seven years in a similar role. From 1994 to 2008, Mr. Solomon ran Media-Based Solutions, a public relations firm based in Atlanta. He graduated in 1978 with a B.A. in journalism from The American University in Washington, D.C.
Recent Articles by Mark Solomon
Coming together for road safety: interview with Joshua Girard
Freight rate spikes shaking up the C-suite
|
{
"redpajama_set_name": "RedPajamaCommonCrawl"
}
| 6,045 |
[
128000,
7778,
8345,
41570,
25,
56147,
304,
11862,
5820,
912,
5353,
369,
17035,
198,
63085,
599,
25,
56147,
304,
11862,
5820,
912,
5353,
369,
17035,
198,
9126,
426,
13,
50899,
198,
32,
1401,
15438,
1963,
315,
549,
815,
13,
11862,
5820,
6656,
1523,
304,
6664,
1306,
16448,
304,
6250,
13,
2030,
279,
54516,
315,
279,
1963,
1071,
6664,
596,
3135,
656,
539,
14647,
12018,
2548,
5967,
264,
83526,
315,
46217,
27378,
627,
791,
1963,
11,
4756,
555,
46217,
25261,
323,
8323,
7626,
26520,
8245,
15264,
11,
374,
3196,
389,
279,
53869,
323,
59721,
315,
26520,
596,
8403,
13,
763,
6664,
11,
279,
46217,
45426,
1963,
3782,
304,
520,
220,
16,
13,
4103,
11,
1523,
505,
220,
16,
13,
2131,
304,
6250,
719,
709,
505,
220,
16,
13,
2618
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
7778,
8345,
41570,
25,
56147,
304,
11862,
5820,
912,
5353,
369,
17035,
198,
63085,
599,
25,
56147,
304,
11862,
5820,
912,
5353,
369,
17035,
198,
9126,
426,
13,
50899,
198,
32,
1401,
15438,
1963,
315,
549,
815,
13,
11862,
5820,
6656,
1523,
304,
6664,
1306,
16448,
304,
6250,
13,
2030,
279,
54516,
315,
279,
1963,
1071,
6664,
596,
3135,
656,
539,
14647,
12018,
2548,
5967,
264,
83526,
315,
46217,
27378,
627,
791,
1963,
11,
4756,
555,
46217,
25261,
323,
8323,
7626,
26520,
8245,
15264,
11,
374,
3196,
389,
279,
53869,
323,
59721,
315,
26520,
596,
8403,
13,
763,
6664,
11,
279,
46217,
45426,
1963,
3782,
304,
520,
220,
16,
13,
4103,
11,
1523,
505,
220,
16,
13,
2131,
304,
6250,
719,
709,
505,
220,
16,
13,
2618,
-100
] |
<Content>
<Header title='Aula Virtual' subtitle='Ingeniería de Software II' />
<div>Contenido...</div>
</Content>
|
{
"redpajama_set_name": "RedPajamaGithub"
}
| 8,892 |
[
128000,
262,
366,
2831,
397,
286,
366,
4137,
2316,
1151,
32,
5724,
21382,
6,
32835,
1151,
644,
4469,
1291,
7583,
409,
4476,
8105,
6,
2662,
286,
366,
614,
29,
825,
33558,
27516,
614,
397,
262,
694,
2831,
397,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0
] |
[
262,
366,
2831,
397,
286,
366,
4137,
2316,
1151,
32,
5724,
21382,
6,
32835,
1151,
644,
4469,
1291,
7583,
409,
4476,
8105,
6,
2662,
286,
366,
614,
29,
825,
33558,
27516,
614,
397,
262,
694,
2831,
397,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100
] |
At the farmers' market a couple of weeks ago, I picked up two butternut squash that were each about the length of my hand. Since I love roasting butternut with a touch of lemon, I was considering cooking them in that tried and true (but unimaginative) manner when I got the idea to roast one of the squash and mix it in with my favorite grain/seed, quinoa.
The results were a light and lemony side dish that goes with practically anything.
I served it with baked tofu, gravy, steamed broccoli, and a salad for a sort of traditional American meal, but the lemony flavor makes a great accompaniment to everything from Thai food to Italian. I'm considering making it a part of my Thanksgiving dinner this year.
The pine nuts really complement the lemon flavor, but if you decide to leave them out, you can deduct about 30 calories and 3 grams of fat per serving.
Preheat oven to 400F. Cut the squash in half and scrape out the seeds and strings (using a grapefruit spoon makes this easier). Peel and cut into 1/2-inch cubes and toss with the 1 teaspoon of lemon juice. Place them on a non-stick baking sheet (or silicone mat), sprinkle with a little salt and pepper, and bake for 15 minutes, stirring halfway through.
Place the quinoa in a fine-mesh strainer and rinse it well and allow to drain. Heat a deep, non-stick pot. Add shallots and garlic and cook, stirring, until shallots soften slightly. Add the quinoa and toast it until it has dried out and begins to exude a toasty aroma. Add the squash along with the thyme and vegetable broth. Reduce the heat to low and cover. Cook, stirring once or twice, until all broth is absorbed, about 20 minutes. Stir in the lemon peel and 1 tablespoon of lemon juice. Season to taste with salt and pepper, and add more lemon juice if needed.
What a great recipe!! We just made it for Christmas Dinner. Lots of taste and easy to make!
This looks fantastic! I recently made a butternut squash risotto that I can't get enough of, and quinoa sounds even better. The pine nuts also sound like a perfect complement to the quinoa…I'm going to have to go back to the store for more squash!
Tried this last night…TERRIFIC!!! It was easy to put together and the lemon really set it off! My husband ate it and liked it…(he couldn't care less about healthy eating) Thanks for your blog!
This is my first time using butternut squash. I absolutely loved this recipe.
I loved the lemon flavor and the toasted pine nuts were a great addition to the overall dish.
This will be a common meal from now on. One of my favorites. The only thing I did differently was to steam some broccoli and mixed it in.
This looks delicious! I love quinoa and will certainly add this to my must-make list. Thanks!
Granted the feta isn't vegan…but you could skip it and this would still be very yummy! Perhaps replace it with olives or tofu.
Thanks for this lovely recipe. I loved the (really really) lemony taste!
I cooked it this evening but only took a mobile cam pic because I had to devour it immediately. This was soooo good!
Wow! This recipe was SO delicious, and simple too! I didn't have a fresh lemon, so no lemon peel, but I added a little lemon pepper with the lemon juice, and that seemed to do the trick. I'm not a vegan, but I will be coming back to your site to try other tasty recipes! Thank you!
Oh, this was MOST Delicious! I used red quinoa- which made the dish even more colorful, and waited to add squash until quinoa was cooked. This was easily the BEST quinoa dish EVER! Thank you so much for this recipe and for many other you so generously share here!
I made this for My Love and I tonight for dinner. I didn't add the pine nuts but I don't think it lacked in taste for it. We absolutely loved this recipe and we intend to have it many times..and in the summer we thought having it cold as part of a picnic might be nice.
This recipe is amazing! The lemony quinoa is fantastic—I love it really, really lemony. Also before I was always making butternut, acorn, etc. by cutting it in half and baking it. It turns out much less flavorful that way. The method of cubing it and squeezing pepper and lemon over it makes it outstanding!
Thanks so much for all of these awesome recipes.
I made this last week. It was easy, and it was a home run. My wife (who tolerates my vegan eating and is normally less than enthusiastic about these sorts of dishes) thought it was one of the best we've ever had. Note: We served it with tamari-baked tofu and mushroom gravy. This made quite a robust meal. Highly recommended.
I made this today and it's absolutely delicious. I added some fresh basil (b/c the plant sits on my counter), but didn't have pine nuts on hand. The flavors balance perfectly and this will definitely be a go-to recipe when I have squash in the kitchen. Thank you!
This recipe is delicious. I've made it twice now, first time, following your recipe exactly. This time, I upped the thyme to 1.5 tsp and added a few shakes of Mrs. Dash at the same time. I also didn't have any fresh lemon on hand, so I used lemon juice, but added zest of orange instead. Oh, and I just realized that I only used 2 cups broth this time instead of 2.5 and it still turned out amazing.
Just made this for Thanksgiving. It didn't work for me. I think it's the lemon – the whole thing just tastes sour. Oh well.
This looks great. I am having a couple friends over for dinner tomorrow night and I think I will make this. What else could I make that would go well with this? Thanks!
I mistakenly bought butternut squash instead of spaghetti squash for another recipe. So I made this instead in a simplified version (things must be super easy for me to attempt them) of whatever I had in the house … onions instead of shallots, whole baked squash, pre-made quinoa, and just the garlic, lemon, thyme, and a little salt & pepper.
It's yum! I never would have thought of adding garlic and/or thyme to squash, plus the lemon. So good! And healthy. Thank you Susan!
Just ate this for lunch – so delicious light and filling. Great recipe!
Fabulous recipe! Just made it tonight. Love the lemony flavor…but it isn't overpowering at all. We visited a local farm last week and purchased MANY different kinds of squashes, gourds and pumpkins. So glad I found this recipe.
I made this last night with some baked tofu and it was really delicious. As you mentioned, it would work well as a Thanksgiving side as well.
I made this yesterday for a vegetarian thanksgiving potluck. I was looking for a last minute recipe and I stumbled across this on fb, I had all the ingredients so I decided to give it a try. I made double the recipe. During the cooking stage, there was so much liquid I had to take the cover off after 30 min in hopes that it would evaporate. It eventually did but all the roasted veggies and quinoa turned into a big mash. I added some extra toasted almonds at the end to try and salvage some texture and my friends still liked it but I would recommend using way less liquid than 2.5 c to 1 c quinoa.
I was out of quinoa so I substituted a very nice gluten free wild rice which I par cooked before adding it into the large pot with all other ingredients. This was a smash and we all loved it. I served it on a bed of wilted romaine (fresh from my organic garden) topped with toasted organic raw pumpkin seeds as I am a vegan and this is a main dish for me. Yumm!
I plan on trying with the quinoa next week. Thanks for this delicious way to utilize healthy squash!
|
{
"redpajama_set_name": "RedPajamaC4"
}
| 4,245 |
[
128000,
1688,
279,
20957,
6,
3157,
264,
5743,
315,
5672,
4227,
11,
358,
13061,
709,
1403,
719,
4253,
332,
59576,
430,
1051,
1855,
922,
279,
3160,
315,
856,
1450,
13,
8876,
358,
3021,
938,
15067,
719,
4253,
332,
449,
264,
5916,
315,
30564,
11,
358,
574,
13126,
17677,
1124,
304,
430,
6818,
323,
837,
320,
8248,
87212,
1413,
8,
11827,
994,
358,
2751,
279,
4623,
311,
58785,
832,
315,
279,
59576,
323,
6651,
433,
304,
449,
856,
7075,
24875,
14,
23425,
11,
934,
80094,
627,
791,
3135,
1051,
264,
3177,
323,
30564,
88,
3185,
12269,
430,
5900,
449,
32367,
4205,
627,
40,
10434,
433,
449,
41778,
80247,
11,
88864,
11,
4179,
3690,
79276,
11,
323,
264,
33566,
369,
264,
3460,
315,
8776,
3778,
15496,
11,
719,
279,
30564
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
1688,
279,
20957,
6,
3157,
264,
5743,
315,
5672,
4227,
11,
358,
13061,
709,
1403,
719,
4253,
332,
59576,
430,
1051,
1855,
922,
279,
3160,
315,
856,
1450,
13,
8876,
358,
3021,
938,
15067,
719,
4253,
332,
449,
264,
5916,
315,
30564,
11,
358,
574,
13126,
17677,
1124,
304,
430,
6818,
323,
837,
320,
8248,
87212,
1413,
8,
11827,
994,
358,
2751,
279,
4623,
311,
58785,
832,
315,
279,
59576,
323,
6651,
433,
304,
449,
856,
7075,
24875,
14,
23425,
11,
934,
80094,
627,
791,
3135,
1051,
264,
3177,
323,
30564,
88,
3185,
12269,
430,
5900,
449,
32367,
4205,
627,
40,
10434,
433,
449,
41778,
80247,
11,
88864,
11,
4179,
3690,
79276,
11,
323,
264,
33566,
369,
264,
3460,
315,
8776,
3778,
15496,
11,
719,
279,
30564,
-100
] |
Home / Breaking News / Watch the first chapter of Game of Thrones' Conquest & Rebellion animated special
Watch the first chapter of Game of Thrones' Conquest & Rebellion animated special
Ade Putra
Season 7 may be over but there's still more Game in Thrones in store. We don't mean next year's continuation but Game of Thrones Conquest & Rebellion: An Animated History of the Seven Kingdoms. This 45-minute special, a retelling of Aegon Targaryen's exploits, is slated as one of the many bonuses for the Season 7 Blu-ray and DVD set releasing in December. To make us want it, HBO has released the first chapter on YouTube.
While not a full-blown animation such as Netflix's Castlevania, the style and presentation is a fitting choice for the narrative piece. Here's the official description (via Wiki of Thrones):
From the Game of Thrones realm comes the never-before-seen story of the tumultuous events that shaped the world of Westeros for thousands of years before the series start.
Cast members Pilou Asbæk (Euron Greyjoy), Nikolaj Coster-Waldau (Jaime Lannister), Aidan Gillen (Littlefinger), Conleth Hill (Varys), Harry Lloyd (Viserys Targaryen) and Sophie Turner (Sansa Stark) team up to narrate the animated telling of Aegon Targaryen's attempts to conquer the Seven Kingdoms, written by show writer Dave Hill.
As with past physical sets, the Season 7 release packs plenty of additional lore and contextual information to sate any ravenous fan's appetite. For starters, the audio commentaries and in-episode guides (Blu-ray exclusive) are a great excuse to rewatch the entire season. Beyond that, there's the animated history mentioned above plus a two-part featurette on the art department's work to bring Westeros to life. Hopefully that should tide most fans over until Season 8's premiere.
Tags: Game of Thrones, HBO
Ade thinks there's nothing quite like a good game and a snug headcrab. He grew up with HIDEO KOJIMA's Metal Gear Solid, lives for RPGs, and is waiting for light guns to make their comeback.
Previous post Call of Duty: WWII PC beta coming in late-Sep
Next post Support your favorite local game with the IMGA SEA Public Choice Award
Breaking News Games Latest Technology | 26 Jul , 2019 |
Deal Alert: Logitech G910 Mechanical Keyboard, Quakecon Sale and more
Breaking News E-Sports Events Latest | 26 Jul , 2019 |
HP's OMEN Challenger Series returns to APAC with US$50K prize pool
|
{
"redpajama_set_name": "RedPajamaCommonCrawl"
}
| 4,568 |
[
128000,
7778,
611,
52624,
5513,
611,
10573,
279,
1176,
12735,
315,
4140,
315,
47494,
6,
1221,
724,
612,
95079,
11625,
3361,
198,
14581,
279,
1176,
12735,
315,
4140,
315,
47494,
6,
1221,
724,
612,
95079,
11625,
3361,
198,
32,
451,
10435,
969,
198,
35960,
220,
22,
1253,
387,
927,
719,
1070,
596,
2103,
810,
4140,
304,
47494,
304,
3637,
13,
1226,
1541,
956,
3152,
1828,
1060,
596,
42271,
719,
4140,
315,
47494,
1221,
724,
612,
95079,
25,
1556,
47988,
11346,
315,
279,
31048,
15422,
82,
13,
1115,
220,
1774,
24401,
3361,
11,
264,
2160,
6427,
315,
362,
797,
263,
350,
867,
661,
268,
596,
63488,
11,
374,
53370,
439,
832,
315,
279,
1690,
33321,
369,
279,
14598,
220,
22,
38869,
30630,
323,
18584,
743,
28965,
304,
6790,
13
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
7778,
611,
52624,
5513,
611,
10573,
279,
1176,
12735,
315,
4140,
315,
47494,
6,
1221,
724,
612,
95079,
11625,
3361,
198,
14581,
279,
1176,
12735,
315,
4140,
315,
47494,
6,
1221,
724,
612,
95079,
11625,
3361,
198,
32,
451,
10435,
969,
198,
35960,
220,
22,
1253,
387,
927,
719,
1070,
596,
2103,
810,
4140,
304,
47494,
304,
3637,
13,
1226,
1541,
956,
3152,
1828,
1060,
596,
42271,
719,
4140,
315,
47494,
1221,
724,
612,
95079,
25,
1556,
47988,
11346,
315,
279,
31048,
15422,
82,
13,
1115,
220,
1774,
24401,
3361,
11,
264,
2160,
6427,
315,
362,
797,
263,
350,
867,
661,
268,
596,
63488,
11,
374,
53370,
439,
832,
315,
279,
1690,
33321,
369,
279,
14598,
220,
22,
38869,
30630,
323,
18584,
743,
28965,
304,
6790,
13,
-100
] |
When Ian Gillan Took the Lead on 'Jesus Christ Superstar'
Matt Springer
These days, the idea of a rock opera about the final days of Jesus Christ would probably be met with a collective shrug. That is, unless the songs were amazing, in which case the cast would be invited to perform on Ellen and the Macy's Thanksgiving Day Parade.
But in 1970, the idea bordered on blasphemy. This was just four years after John Lennon's infamous "We're more popular than Jesus now" comment, which spurred protests and record burnings during the Beatles' American tour that year. Rock music as a form of expression still remained highly suspect for an older generation raised on Pat Boone and Doris Day, and a massive generational gap had emerged in both the U.S. and U.K. It was into this gap that Jesus Christ Superstar was hurled.
Before it was a stage production, Jesus Christ Superstar was released as a two-disc concept album in September 1970. Composer Andrew Lloyd Webber and lyricist Tim Rice had only completed a handful of projects together when they embarked on their effort to create a rock opera based on the Gospels, mixing elements from across the four narratives but emphasizing a more character-based approach. To realize their vision, they enlisted Deep Purple vocalist Ian Gillan as Jesus and struggling actor Murray Head as Judas. Other contemporary rock stalwarts tapped for the album include John Gustafson (Quatermass and Roxy Music), Mike d'Abo (Manfred Mann), and Lesley Duncan.
Musically, Jesus Christ Superstar serves up a versatile mix of late-'60s rock, soul, funk and pop, with the occasional sidestep into vaudeville and Broadway pomp. The lyrics explore the humanity of historical figures that have settled into near-myth. In Superstar, Jesus is a peaceful man set upon by forces that sought to twist his message toward war. Judas agrees with Christ's message, but not his means. He seems to see the tragedy to come and is terrified by it.
These two strands – Jesus as reluctant Messiah and Judas as reluctant murderer – become entangled in the album's second half, where the passion of Christ unfolds from a wine-soaked Holy Thursday meal through Judas' betrayal and suicide. The music veers into psychedelia as Christ hangs on the cross, a sonic expression of his agonizing death. But not before a back-from-the-dead Judas lets loose on the musical's biggest hit, "Superstar."
"Every time I look at you, I don't understand / Why you let the things you did get so out of hand," Judas sings, questioning not the messages of Jesus but the tactics. It's an agonized wail of frustration set to a tight soul beat, backed by soaring ironic strings. It may question Christ and Christianity, but in a way that can lead even believers to a stronger understanding of the emotional and political forces at play in the death of Jesus.
Although originally banned by the BBC on the grounds of being "sacrilegious," Jesus Christ Superstar managed serious success on both sides of the pond, reaching No. 23 in the U.K. and No. 1 on the Billboard chart. It was the top-selling pop LP in the U.S. for 1971, and spent a staggering 87 weeks on the charts in Norway.
See Deep Purple and Other Rockers in the Top 100 Albums of the '80s
Next: The History of Rockers in 'Jesus Christ Superstar'
Filed Under: Ian Gillan
|
{
"redpajama_set_name": "RedPajamaCommonCrawl"
}
| 6,623 |
[
128000,
4599,
29335,
33826,
276,
90796,
279,
30982,
389,
364,
55065,
3771,
7445,
12134,
1270,
40917,
67915,
198,
9673,
2919,
11,
279,
4623,
315,
264,
7091,
43516,
922,
279,
1620,
2919,
315,
10811,
3771,
1053,
4762,
387,
2322,
449,
264,
22498,
14362,
773,
13,
3011,
374,
11,
7389,
279,
11936,
1051,
8056,
11,
304,
902,
1162,
279,
6445,
1053,
387,
18719,
311,
2804,
389,
47685,
323,
279,
97373,
596,
37250,
6187,
63654,
627,
4071,
304,
220,
4468,
15,
11,
279,
4623,
77317,
389,
99159,
4625,
13,
1115,
574,
1120,
3116,
1667,
1306,
3842,
80840,
596,
39633,
330,
1687,
2351,
810,
5526,
1109,
10811,
1457,
1,
4068,
11,
902,
85747,
22670,
323,
3335,
8395,
826,
2391,
279,
55957,
6,
3778,
7364,
430,
1060,
13,
9305,
4731,
439,
264,
1376
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
4599,
29335,
33826,
276,
90796,
279,
30982,
389,
364,
55065,
3771,
7445,
12134,
1270,
40917,
67915,
198,
9673,
2919,
11,
279,
4623,
315,
264,
7091,
43516,
922,
279,
1620,
2919,
315,
10811,
3771,
1053,
4762,
387,
2322,
449,
264,
22498,
14362,
773,
13,
3011,
374,
11,
7389,
279,
11936,
1051,
8056,
11,
304,
902,
1162,
279,
6445,
1053,
387,
18719,
311,
2804,
389,
47685,
323,
279,
97373,
596,
37250,
6187,
63654,
627,
4071,
304,
220,
4468,
15,
11,
279,
4623,
77317,
389,
99159,
4625,
13,
1115,
574,
1120,
3116,
1667,
1306,
3842,
80840,
596,
39633,
330,
1687,
2351,
810,
5526,
1109,
10811,
1457,
1,
4068,
11,
902,
85747,
22670,
323,
3335,
8395,
826,
2391,
279,
55957,
6,
3778,
7364,
430,
1060,
13,
9305,
4731,
439,
264,
1376,
-100
] |
45 House Exterior Design Ideas - Best Home Exteriors Rebecca Vizard kept the charm of her estate intact but infused the funky flair of New Orleans. Exterior Home Decor The exterior hints at the serene vibe of this lakeside home. Home Decor - Home Furniture, Lighting And Architectural ... Home Decor - Home furniture, home lighting and architectural products for home decor and home improvement. Handcrafted furnishings and architectural products manufactured to the highest quality. Extensive selection of architectural products and home furnishings.
|
{
"redpajama_set_name": "RedPajamaC4"
}
| 952 |
[
128000,
1774,
4783,
71781,
7127,
23748,
482,
7252,
5492,
1398,
466,
22625,
45557,
650,
14038,
8774,
279,
32353,
315,
1077,
12675,
35539,
719,
72903,
279,
74988,
69665,
315,
1561,
27008,
13,
71781,
5492,
28069,
578,
28362,
31743,
520,
279,
95863,
47811,
315,
420,
44236,
579,
2162,
13,
5492,
28069,
482,
5492,
30339,
11,
45623,
1628,
24979,
4269,
2564,
5492,
28069,
482,
5492,
14891,
11,
2162,
18186,
323,
43563,
3956,
369,
2162,
10799,
323,
2162,
16048,
13,
8704,
80894,
73271,
323,
43563,
3956,
28648,
311,
279,
8592,
4367,
13,
9634,
4114,
6727,
315,
43563,
3956,
323,
2162,
73271,
13,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0
] |
[
1774,
4783,
71781,
7127,
23748,
482,
7252,
5492,
1398,
466,
22625,
45557,
650,
14038,
8774,
279,
32353,
315,
1077,
12675,
35539,
719,
72903,
279,
74988,
69665,
315,
1561,
27008,
13,
71781,
5492,
28069,
578,
28362,
31743,
520,
279,
95863,
47811,
315,
420,
44236,
579,
2162,
13,
5492,
28069,
482,
5492,
30339,
11,
45623,
1628,
24979,
4269,
2564,
5492,
28069,
482,
5492,
14891,
11,
2162,
18186,
323,
43563,
3956,
369,
2162,
10799,
323,
2162,
16048,
13,
8704,
80894,
73271,
323,
43563,
3956,
28648,
311,
279,
8592,
4367,
13,
9634,
4114,
6727,
315,
43563,
3956,
323,
2162,
73271,
13,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100
] |
Black Belt: Hold Down + B and press Start.
Cat: Hold Left and press Start.
Cheerleader: Hold Left + B and press Start.
DJ/Beat Boxer: Hold Right + B and press Start.
Dog: Hold Down and press Start.
Rapper: Hold Up + B and press Start.
Tuxedo: Hold Up and press Start.
Wii Music T-shirt: Hold Right and press Start.
Beachside Drive level: Successfully complete the Rock Jam Mastery Lesson.
Beatboxer: Finish the first Expand Your Style Lesson.
Black Belt: Finish the first Expand Your Style Lesson.
Harmony High-Rise level: Successfully complete the Rock Jam Mastery Lesson.
Cat Suit: Create a music video.
Cheerleader: Create a music video.
Rapper: Finish the first Expand Your Style Lesson.
Singer: Successfully complete the Rock Jam Mastery Lesson.
Lessons Section: Create three music videos in Custom Jam.
Music Room in Jam mode: Successfully complete the level 8 in the Pitch Perfect mini-game.
Add/ Remove Parts (Instruments) from songs in Jam mode: Successfully complete the Pop Jam Mastery Lesson.
Stylize your instruments in Custom Jam mode: Successfully complete the Rock Jam Mastery Lesson.
Accordion: Successfully complete the Rock Jam Mastery Lesson.
Bagpipe: Successfully complete the Rock Jam Mastery Lesson.
Balled Drums: Finish the first Expand Your Style Lesson.
Cello: Successfully complete the Rock Jam Mastery Lesson.
Clarinet: Finish the first Expand Your Style Lesson.
Cowbell: Successfully complete the Rock Jam Mastery Lesson.
Cuica: Finish the first Expand Your Style Lesson.
DJ Turntables: Successfully complete the Rock Jam Mastery Lesson.
Djembe Drum: Successfully complete the Rock Jam Mastery Lesson.
Dulcimer: Finish the first Expand Your Style Lesson.
Flute: Successfully complete the Rock Jam Mastery Lesson.
Galactic Bass: Successfully complete the Rock Jam Mastery Lesson.
Galactic Congas: Finish the first Expand Your Style Lesson.
Galactic Guitar: Successfully complete the Rock Jam Mastery Lesson.
Galactic Piano: Successfully complete the Rock Jam Mastery Lesson.
Galactic Voyage Stage: Finish the first Expand Your Style Lesson.
Guiro: Finish the first Expand Your Style Lesson.
Hand Clap: Create a music video.
Harmonica: Successfully complete the Rock Jam Mastery Lesson.
Harp: Play through The Legend of Zelda theme in the Mii Maestro mini-game.
Harpsichord: Successfully complete the Rock Jam Mastery Lesson.
Jaw Harp: Finish the first Expand Your Style Lesson.
Latin Drums: Successfully complete the Rock Jam Mastery Lesson.
NES Horn: Successfully complete level 4 of the Pitch Perfect mini-game.
Recorder: Create a music video.
Reggae Drums: Successfully complete the Rock Jam Mastery Lesson.
Shamisan: Successfully complete the Rock Jam Mastery Lesson.
Sitar: Create a music video.
Taiko Drum: Successfully complete the Rock Jam Mastery Lesson.
Timbales: Successfully complete the Rock Jam Mastery Lesson.
Timpani: Finish the first Expand Your Style Lesson.
Toy Piano: Create a music video.
Whistle: Finish the first Expand Your Style Lesson.
A Little Night Music: Finish the first Expand Your Style Lesson.
American Patrol: Successfully complete the Rock Jam Mastery Lesson.
Animal Crossing -- K.K. Blues: Finish the first Expand Your Style Lesson.
Animal Crossing: Finish the first Expand Your Style Lesson.
Bridal Chorus: Successfully complete the Rock Jam Mastery Lesson.
Carmen: Play through Twinkle, Twinkle, Little Star in the Mii Maestro mini-game.
Chariots of Fire: Finish the first Expand Your Style Lesson.
Do-Re-Mi in Handbell Harmony: Successfully complete My Grandfather's Clock in the Handbell Harmony mini-game.
Every Breath You Take: Finish the first Expand Your Style Lesson.
Expand Your Style Lessons: Create six videos in Custom Jam mode.
Fra, Santurtzi to Bibao: Finish the first Expand Your Style Lesson.
Frere Jacques: Successfully complete the Rock Jam Mastery Lesson.
From the New World: Successfully complete the Rock Jam Mastery Lesson.
F-Zero: Mute City Theme: Successfully complete the Rock Jam Mastery Lesson.
Happy Birthday to You: Finish the first Expand Your Style Lesson.
Hum, Hum, Hum in Handbell Harmony: Successfully complete O Christmas Tree in the Handbell Harmony mini-game.
I'll Be There: Finish the first Expand Your Style Lesson.
I've Never Been to Me: Finish the first Expand Your Style Lesson.
Jingle Bell Rock: Successfully complete the Rock Jam Mastery Lesson.
La Bamba: Successfully complete the Rock Jam Mastery Lesson.
La Cucaracha: Finish the first Expand Your Style Lesson.
Little Hans: Successfully complete the Rock Jam Mastery Lesson.
Long, Long Ago: Successfully complete the Rock Jam Mastery Lesson.
Material Girl: Finish the first Expand Your Style Lesson.
Minuet in G Major: Finish the first Expand Your Style Lesson.
My Grandfather's Clock in Handbell Harmony: Successfully complete Hum, Hum, Hum in the Handbell Harmony mini-game.
Ode to Joy: Successfully complete the Rock Jam Mastery Lesson. Alternately, play through The Four Seasons -- Spring in the Mii Maestro mini-game.
Oh, My Darling Clementine: Finish the first Expand Your Style Lesson.
Over the Waves: Finish the first Expand Your Style Lesson.
Please Mr. Postman: Finish the first Expand Your Style Lesson.
Sakura Sakura: Successfully complete the Rock Jam Mastery Lesson.
Scarborough Fair: Finish the first Expand Your Style Lesson.
September: Finish the first Expand Your Style Lesson.
Sukiyaki in Handbell Harmony: Successfully complete Do-Re-Mi in the Handbell Harmony mini-game.
Sukiyaki: Successfully complete the Rock Jam Mastery Lesson.
Super Mario Bros. Theme: Successfully complete level 4 of Pitch Perfect mini-game.
Sur le pont d'Avignon: Successfully complete the Rock Jam Mastery Lesson.
Swan Lake: Successfully complete the Rock Jam Mastery Lesson.
The Blue Danube: Finish the first Expand Your Style Lesson.
The Entertainer: Finish the first Expand Your Style Lesson.
The Four Seasons -- Spring: Play through Carmen in the Mii Maestro mini-game.
The Legend of Zelda: Play through Ode to Joy or The Legend of Zelda theme in the Mii Maestro mini-game.
The Loco-Motion: Finish the first Expand Your Style Lesson.
Troika: Finish the first Expand Your Style Lesson.
Turkey in the Straw: Successfully complete the Rock Jam Mastery Lesson.
Wake Me Up Before You Go-Go: Finish the first Expand Your Style Lesson.
Wii Music: Finish the first Expand Your Style Lesson.
Wii Sports: Finish the first Expand Your Style Lesson.
Woman: Finish the first Expand Your Style Lesson.
Yankee Doodle: Finish the first Expand Your Style Lesson.
While playing Custom Jam on the rock drums, hold Nunchuk C + Wii-mote A and flail up and down as fast as possible. Also, try Nunchuk Z + Wii-mote B. Doing this will make a blast beat commonly used in thrash and death metal music.
|
{
"redpajama_set_name": "RedPajamaC4"
}
| 4,528 |
[
128000,
14755,
33993,
25,
23588,
6419,
489,
426,
323,
3577,
5256,
627,
27899,
25,
23588,
14043,
323,
3577,
5256,
627,
27941,
261,
38491,
25,
23588,
14043,
489,
426,
323,
3577,
5256,
627,
54372,
14,
44758,
8425,
261,
25,
23588,
10291,
489,
426,
323,
3577,
5256,
627,
50040,
25,
23588,
6419,
323,
3577,
5256,
627,
49,
3183,
25,
23588,
3216,
489,
426,
323,
3577,
5256,
627,
51,
2249,
66981,
25,
23588,
3216,
323,
3577,
5256,
627,
54,
3893,
10948,
350,
34768,
25,
23588,
10291,
323,
3577,
5256,
627,
3513,
613,
3002,
16542,
2237,
25,
35691,
4686,
279,
9305,
20614,
94143,
50015,
627,
44758,
2054,
261,
25,
36633,
279,
1176,
51241,
4718,
12179,
50015,
627,
14755,
33993,
25,
36633,
279,
1176,
51241,
4718,
12179,
50015,
627,
27588,
65527,
5234,
11151
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
14755,
33993,
25,
23588,
6419,
489,
426,
323,
3577,
5256,
627,
27899,
25,
23588,
14043,
323,
3577,
5256,
627,
27941,
261,
38491,
25,
23588,
14043,
489,
426,
323,
3577,
5256,
627,
54372,
14,
44758,
8425,
261,
25,
23588,
10291,
489,
426,
323,
3577,
5256,
627,
50040,
25,
23588,
6419,
323,
3577,
5256,
627,
49,
3183,
25,
23588,
3216,
489,
426,
323,
3577,
5256,
627,
51,
2249,
66981,
25,
23588,
3216,
323,
3577,
5256,
627,
54,
3893,
10948,
350,
34768,
25,
23588,
10291,
323,
3577,
5256,
627,
3513,
613,
3002,
16542,
2237,
25,
35691,
4686,
279,
9305,
20614,
94143,
50015,
627,
44758,
2054,
261,
25,
36633,
279,
1176,
51241,
4718,
12179,
50015,
627,
14755,
33993,
25,
36633,
279,
1176,
51241,
4718,
12179,
50015,
627,
27588,
65527,
5234,
11151,
-100
] |
A collaborative and creative approach between Firework and Taste Northwest led to a successful launch and key media coverage.
Firework PR was appointed by Taste Northwest following a competitive pitch against several other agencies in the North West. The brief was to launch the food and drink agency into the North West, taking the company to market via a brand building campaign.
Firework PR developed an awareness and credibility building strategy. Working with the team, Firework developed a messaging framework that helped ensure compelling story-led content. An influencer programme was carried out to work with high profile celebrity chefs who acted as champions for the programme, to ensure the PR activity caught the attention of the media, bloggers and on social media channels.
Firework then carried out a PR launch to key target audiences including regional, hospitality, food and drink as well as business media. Tailored stories for each media sector were issued as well as instigating a social media campaign designed to gain hits to the Taste Northwest website. This creative content-led approach ensured that the investment in PR was maximised, as it was also used to populate the website with SEO-rich material.
The campaign secured strategic coverage in key media as well as putting Taste Northwest on the map as a commentator on food and drink issues. High profile industry chefs were included as references in the coverage, adding credibility to the programme. At a business level, the strategic messaging and brand building workshop delivered a set of core messages and stories ensuring the delivery of consistent communication across the company. This also meant it was easy to measure success of the PR campaign in resulting coverage by tracking message delivery.
"Firework PR offered a fresh approach. Their proposal stood out from competitors with well considered, creative ideas that demonstrated the value of our company. It showed an understanding of our business with a transparent return on investment. Being able to differentiate our offering from others was critical and the team were very easy to work with."
|
{
"redpajama_set_name": "RedPajamaC4"
}
| 2,691 |
[
128000,
32,
40806,
323,
11782,
5603,
1990,
6785,
1816,
323,
59081,
40505,
6197,
311,
264,
6992,
7195,
323,
1401,
3772,
10401,
627,
17111,
1816,
8743,
574,
21489,
555,
59081,
40505,
2768,
264,
15022,
9846,
2403,
3892,
1023,
13607,
304,
279,
4892,
4410,
13,
578,
10015,
574,
311,
7195,
279,
3691,
323,
7172,
9266,
1139,
279,
4892,
4410,
11,
4737,
279,
2883,
311,
3157,
4669,
264,
6883,
4857,
4901,
627,
17111,
1816,
8743,
8040,
459,
17985,
323,
38769,
4857,
8446,
13,
22938,
449,
279,
2128,
11,
6785,
1816,
8040,
264,
30622,
12914,
430,
9087,
6106,
29722,
3446,
35054,
2262,
13,
1556,
6791,
20099,
18629,
574,
11953,
704,
311,
990,
449,
1579,
5643,
31544,
60227,
889,
31532,
439,
34838,
369,
279,
18629,
11,
311,
6106,
279,
8743,
5820,
10791,
279
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
32,
40806,
323,
11782,
5603,
1990,
6785,
1816,
323,
59081,
40505,
6197,
311,
264,
6992,
7195,
323,
1401,
3772,
10401,
627,
17111,
1816,
8743,
574,
21489,
555,
59081,
40505,
2768,
264,
15022,
9846,
2403,
3892,
1023,
13607,
304,
279,
4892,
4410,
13,
578,
10015,
574,
311,
7195,
279,
3691,
323,
7172,
9266,
1139,
279,
4892,
4410,
11,
4737,
279,
2883,
311,
3157,
4669,
264,
6883,
4857,
4901,
627,
17111,
1816,
8743,
8040,
459,
17985,
323,
38769,
4857,
8446,
13,
22938,
449,
279,
2128,
11,
6785,
1816,
8040,
264,
30622,
12914,
430,
9087,
6106,
29722,
3446,
35054,
2262,
13,
1556,
6791,
20099,
18629,
574,
11953,
704,
311,
990,
449,
1579,
5643,
31544,
60227,
889,
31532,
439,
34838,
369,
279,
18629,
11,
311,
6106,
279,
8743,
5820,
10791,
279,
-100
] |
Anti-conformism, psychological introspection and experimentation: Pollock's action painting and the greatest representatives of the New York School arrive in Rome.
From 2018, October 10, the Ala Brasini del Vittoriano welcomes one of the most precious nuclei of the collection of the Whitney Museum in New York: Jackson Pollock, Mark Rothko, Willem de Kooning, Franz Kline and many other representatives of the New York School burst into Rome with all the energy and the breaking character that made them eternal and unforgettable "Irascible".
Through about 50 masterpieces – including the famous Number 27, Pollock's large canvas, over 3m long, made iconic by the masterly balance between the brushstrokes of black and the fusion of the clearest colors – vivid colors, harmony of shapes, subjects and abstract representations immerse observers in a magnificent artistic context: abstract expressionism.
The exhibition is produced and organized by the Arthemisia Group and curated by Luca Beatrice.
The open ticket entitles you to enter the exhibition on a day of your choice at the desired time, avoiding any queues. It will not be necessary to communicate in advance the day and the visiting time.
The ticket will be usable from the fourth day following the purchase until the end of the exhibition.
The Cartafreccia holders with an AV ticket (FrecciaRossa and FrecciaArgento), in digital or paper format, with which Rome is reached (on a date that is no more than three days before the visit), paying a full entry directly at the cash desk, will be entitled a gift for a companion, valid for immediate entry into the exhibition.
The same facility is reserved for regional Lazio transport customers holding a Trenitalia subscription (not integrated MetroBus) and for travelers in possession of a simple, regional or supra-regional travel ticket, Trenitalia, valid for the same day of access to the museum, useful to reach Rome.
The audioguides are included in all types of admission tickets for individual visitors and are collected at the ticket office at the desk dedicated at the time of the visit.
Access to animals is not allowed to protect the works on display.
|
{
"redpajama_set_name": "RedPajamaC4"
}
| 5,321 |
[
128000,
33749,
15204,
630,
2191,
11,
24064,
26609,
16463,
323,
66196,
25,
3735,
1039,
596,
1957,
19354,
323,
279,
12474,
24005,
315,
279,
1561,
4356,
6150,
17782,
304,
22463,
627,
3915,
220,
679,
23,
11,
6664,
220,
605,
11,
279,
89762,
62224,
6729,
1624,
650,
1468,
269,
13389,
57358,
832,
315,
279,
1455,
27498,
97192,
315,
279,
4526,
315,
279,
67197,
16730,
304,
1561,
4356,
25,
13972,
3735,
1039,
11,
4488,
37512,
9509,
11,
10785,
3516,
409,
735,
9186,
287,
11,
66620,
735,
1074,
323,
1690,
1023,
24005,
315,
279,
1561,
4356,
6150,
21165,
1139,
22463,
449,
682,
279,
4907,
323,
279,
15061,
3752,
430,
1903,
1124,
35825,
323,
61098,
330,
49213,
5171,
1260,
23811,
24798,
922,
220,
1135,
7491,
47568,
1389,
2737,
279,
11495,
5742,
220,
1544
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
33749,
15204,
630,
2191,
11,
24064,
26609,
16463,
323,
66196,
25,
3735,
1039,
596,
1957,
19354,
323,
279,
12474,
24005,
315,
279,
1561,
4356,
6150,
17782,
304,
22463,
627,
3915,
220,
679,
23,
11,
6664,
220,
605,
11,
279,
89762,
62224,
6729,
1624,
650,
1468,
269,
13389,
57358,
832,
315,
279,
1455,
27498,
97192,
315,
279,
4526,
315,
279,
67197,
16730,
304,
1561,
4356,
25,
13972,
3735,
1039,
11,
4488,
37512,
9509,
11,
10785,
3516,
409,
735,
9186,
287,
11,
66620,
735,
1074,
323,
1690,
1023,
24005,
315,
279,
1561,
4356,
6150,
21165,
1139,
22463,
449,
682,
279,
4907,
323,
279,
15061,
3752,
430,
1903,
1124,
35825,
323,
61098,
330,
49213,
5171,
1260,
23811,
24798,
922,
220,
1135,
7491,
47568,
1389,
2737,
279,
11495,
5742,
220,
1544,
-100
] |
HOW TO WRITE A PRESS RELEASE TO GIVE JOURNALISTS EXACTLY WHAT THEY NEED
By Fiona Holmes-Mitra, Account Executive at Kai Communications - Full disclosure: I used to work as a health care professional. Life's unpredictable twists and turns means I'm now working as an PR Executive at Kai Communications. A natural leap? Absolutely not. My performance feedback is that I overuse commas. I have a lot to learn, but this is what I...
Making the most of your Google My Business Listing
Every business should have a Google My Business listing! It's free to set up and when done properly, performs brilliantly in local search. We've been telling our clients for nearly 10 years that they should be making the most of Google My Business and this message is increasingly important in today's competitive market. In recent months we've been seeing Google...
What office workers might look like in 20 years
- Post from Natural Netwalking shared from Sky News: Life-sized model shows what office workers might look like in 20 years. The life-sized doll named Emma has a permanently hunched back, varicose veins, red eyes and a protruding stomach.In just 20 years' time, the average office worker will have a hunched back, protruding stomach and sore eyes, according to a life-sized doll developed...
HAZEL SCOTT – 25 YEARS IN THE PR BUSINESS
Interview by Fiona Holmes-MitraHazel Scott has been making a splash, or perhaps more accurately large waves, in the PR field for 25 years in London, Sydney and now Oxford. Now celebrating 25 years in the business and 10 years as Director of her own PR and strategic marketing company, Kai Communications, we are marking these milestones by getting her to...
Our guide to being authentic on social media
Article By Claire Fryer www.onetothree.co.ukSocial media, from a personal perspective, has been in the media a great deal lately, with influencers called out for photoshopping their images, celebrities being paid mega-bucks to promote products they most likely don't use or believe in and the worrying statistics about the effect of social media on young peoples' mental health. One thing that...
Why Every Business Should Use Twitter Polls
By Lauren McNamara - With businesses trying to gain endless social media interaction and traction, it can be hard to get the kind of engagements you are looking for. Tweets can get retweets and likes, but one of Twitter's more recent features, Twitter Polls, allows users to get an insight into the minds of their followers to gain feedback about...
Hazel Scott
Kai Communications
The Studio 7 Simons Close Wheatley Oxford OX33 1SU
Kai Communications produce wow-factor ideas & activate creative PR & marketing campaigns. We can utilise our extensive experience to elevate brands & to deliver results beyond expectations.
© Copyright 2019 Kai Communications Ltd | Registered in England No. 687 5539 | Privacy Policy
|
{
"redpajama_set_name": "RedPajamaCommonCrawl"
}
| 9,198 |
[
128000,
61297,
5257,
39652,
362,
74919,
54134,
5257,
480,
6674,
622,
95799,
26194,
4154,
6966,
9109,
38535,
63593,
49233,
198,
1383,
89943,
40401,
5364,
37529,
11,
8785,
18362,
520,
51710,
26545,
482,
8797,
28957,
25,
358,
1511,
311,
990,
439,
264,
2890,
2512,
6721,
13,
9601,
596,
50235,
62990,
323,
10800,
3445,
358,
2846,
1457,
3318,
439,
459,
8743,
18362,
520,
51710,
26545,
13,
362,
5933,
32571,
30,
56647,
539,
13,
3092,
5178,
11302,
374,
430,
358,
927,
817,
77702,
13,
358,
617,
264,
2763,
311,
4048,
11,
719,
420,
374,
1148,
358,
9522,
43346,
279,
1455,
315,
701,
5195,
3092,
8184,
39864,
198,
11769,
2626,
1288,
617,
264,
5195,
3092,
8184,
15182,
0,
1102,
596,
1949,
311,
743,
709,
323,
994,
2884,
10489,
11,
27772,
79349,
304
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
61297,
5257,
39652,
362,
74919,
54134,
5257,
480,
6674,
622,
95799,
26194,
4154,
6966,
9109,
38535,
63593,
49233,
198,
1383,
89943,
40401,
5364,
37529,
11,
8785,
18362,
520,
51710,
26545,
482,
8797,
28957,
25,
358,
1511,
311,
990,
439,
264,
2890,
2512,
6721,
13,
9601,
596,
50235,
62990,
323,
10800,
3445,
358,
2846,
1457,
3318,
439,
459,
8743,
18362,
520,
51710,
26545,
13,
362,
5933,
32571,
30,
56647,
539,
13,
3092,
5178,
11302,
374,
430,
358,
927,
817,
77702,
13,
358,
617,
264,
2763,
311,
4048,
11,
719,
420,
374,
1148,
358,
9522,
43346,
279,
1455,
315,
701,
5195,
3092,
8184,
39864,
198,
11769,
2626,
1288,
617,
264,
5195,
3092,
8184,
15182,
0,
1102,
596,
1949,
311,
743,
709,
323,
994,
2884,
10489,
11,
27772,
79349,
304,
-100
] |
The novelist John Steinbeck and CBS Newscaster Charles Kuralt knew and wrote about roads. Steinbeck's The Grapes of Wrath, published in 1939, is a classic of road literature; its description of Dust Bowl refugees driving to California along U.S. 66 has given the route an enduring nickname ("The Mother Road"). Kuralt, in his CBS news feature "On the Road" and books, sought the off-beat along the country's back roads.
Steinbeck and Kuralt are sometimes cited as sources of similar quotes about the Interstate System, and the Rambler wishes to set the record straight.
This latter comment has often been quoted by critics who want to compare the evils of the Interstate System with the beauties of the old roads, such as the roads William Least Heat-Moon traveled in Blue Highways: A Journey Into America (Little, Brown and Company, 1982).
If the traveler expects the highway to be safe and well graded, he may as well stay home. The little roads without numbers are the ones I have liked the best, the bumpy ones that lead over the hills toward vicinities unknown . . . . I keep thinking I will find something wonderful just around the next bend.
This comment was undoubtedly original for Kuralt. But Steinbeck expressed the thought first, and it was the stretch of I-90 from Erie to Chicago that made him say it.
The Rambler encourages critics to keep the two straight. Thank you.
|
{
"redpajama_set_name": "RedPajamaC4"
}
| 2,492 |
[
128000,
791,
81747,
3842,
35606,
55177,
323,
24991,
1561,
2445,
2352,
15274,
32375,
3223,
7020,
323,
6267,
922,
19795,
13,
35606,
55177,
596,
578,
2895,
9521,
315,
90615,
11,
4756,
304,
220,
7285,
24,
11,
374,
264,
11670,
315,
5754,
17649,
26,
1202,
4096,
315,
33093,
20904,
22475,
10043,
311,
7188,
3235,
549,
815,
13,
220,
2287,
706,
2728,
279,
6149,
459,
52876,
30499,
3573,
791,
21720,
9728,
1865,
32375,
3223,
11,
304,
813,
24991,
3754,
4668,
330,
1966,
279,
9728,
1,
323,
6603,
11,
16495,
279,
1022,
15502,
266,
3235,
279,
3224,
596,
1203,
19795,
627,
21573,
258,
55177,
323,
32375,
3223,
527,
7170,
22628,
439,
8336,
315,
4528,
17637,
922,
279,
66593,
744,
11,
323,
279,
432,
3042,
1565,
25223,
311,
743,
279,
3335,
7833,
627
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
791,
81747,
3842,
35606,
55177,
323,
24991,
1561,
2445,
2352,
15274,
32375,
3223,
7020,
323,
6267,
922,
19795,
13,
35606,
55177,
596,
578,
2895,
9521,
315,
90615,
11,
4756,
304,
220,
7285,
24,
11,
374,
264,
11670,
315,
5754,
17649,
26,
1202,
4096,
315,
33093,
20904,
22475,
10043,
311,
7188,
3235,
549,
815,
13,
220,
2287,
706,
2728,
279,
6149,
459,
52876,
30499,
3573,
791,
21720,
9728,
1865,
32375,
3223,
11,
304,
813,
24991,
3754,
4668,
330,
1966,
279,
9728,
1,
323,
6603,
11,
16495,
279,
1022,
15502,
266,
3235,
279,
3224,
596,
1203,
19795,
627,
21573,
258,
55177,
323,
32375,
3223,
527,
7170,
22628,
439,
8336,
315,
4528,
17637,
922,
279,
66593,
744,
11,
323,
279,
432,
3042,
1565,
25223,
311,
743,
279,
3335,
7833,
627,
-100
] |
Trąbki – wieś w Polsce położona w województwie mazowieckim, w powiecie białobrzeskim, w gminie Stara Błotnica. Dawniej Grodzisko - Trąbki. We wsi znajduje się 5 budynków mieszkalnych.
W latach 1975–1998 miejscowość położona była w województwie radomskim.
Wierni kościoła rzymskokatolickiego należą do parafii św. Józefa w Starym Goździe.
Przypisy
Bibliografia
Mapa WIG Białobrzegi Pas 42 Słup 32 Warszawa 1937
Linki zewnętrzne
Stara Błotnica (gmina)
|
{
"redpajama_set_name": "RedPajamaWikipedia"
}
| 9,384 |
[
128000,
1305,
5985,
65,
6780,
1389,
13672,
7545,
289,
58819,
346,
3273,
23762,
6077,
6863,
289,
289,
21963,
365,
21151,
11949,
46802,
126351,
30086,
377,
318,
11,
289,
7019,
648,
25134,
293,
35384,
677,
81,
32893,
58993,
11,
289,
342,
1083,
648,
800,
5169,
426,
4697,
354,
77,
3074,
13,
35607,
57647,
18370,
38977,
69643,
482,
1183,
5985,
65,
6780,
13,
1226,
289,
6455,
68815,
1072,
3841,
12951,
220,
20,
37808,
1910,
94557,
94173,
36641,
28383,
382,
54,
326,
460,
331,
220,
4468,
20,
4235,
2550,
23,
92994,
58815,
25898,
3273,
23762,
6077,
6863,
555,
22250,
289,
289,
21963,
365,
21151,
11949,
46802,
9038,
316,
4991,
318,
382,
59128,
944,
72,
15593,
7545,
61930,
22250,
436,
4341,
1026,
46364,
266,
337,
875,
63387,
88490,
6077,
5985,
656,
1370
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
1305,
5985,
65,
6780,
1389,
13672,
7545,
289,
58819,
346,
3273,
23762,
6077,
6863,
289,
289,
21963,
365,
21151,
11949,
46802,
126351,
30086,
377,
318,
11,
289,
7019,
648,
25134,
293,
35384,
677,
81,
32893,
58993,
11,
289,
342,
1083,
648,
800,
5169,
426,
4697,
354,
77,
3074,
13,
35607,
57647,
18370,
38977,
69643,
482,
1183,
5985,
65,
6780,
13,
1226,
289,
6455,
68815,
1072,
3841,
12951,
220,
20,
37808,
1910,
94557,
94173,
36641,
28383,
382,
54,
326,
460,
331,
220,
4468,
20,
4235,
2550,
23,
92994,
58815,
25898,
3273,
23762,
6077,
6863,
555,
22250,
289,
289,
21963,
365,
21151,
11949,
46802,
9038,
316,
4991,
318,
382,
59128,
944,
72,
15593,
7545,
61930,
22250,
436,
4341,
1026,
46364,
266,
337,
875,
63387,
88490,
6077,
5985,
656,
1370,
-100
] |
changes to the ranking system
Fingon
Well, I don't really think the "system" should be changed.
I mean, I favour a 52 weeks system, and computing round and quality points.
But maybe, the points given to each tournament should change.
currently, for winning a tournament the players gets this
GS 520<br />Championship 390<br />Tier I 260<br />Tier II 200<br />Tier III 155<br />Tier IV 140<br />Tier V 80
Now, a tier 1 gives at least 1.2 millions in money prize while a tier 2 gives around 500,000, however, a tier one only gives a 30% more points.<br />the prize money difference between tier 3 and 2 is big as well, $500,000 to $170,000
So, I basically would keep the points for tier 3 and below.
and I would change:
Tier 2: 250<br />Tier 1: 500<br />Championship: 800<br />Grand Slams: 1,200
<br />Also, I would distribute the quality points by pairs. Beating the number 1 in a GS is 200 points, beating the # 2 is 150 points, a big difference not justified.
I would be a sligh difference to the # 1, like 100 and 90 and so on.
Also, they could consider to go back to an average system, with some few changes.
Visit a new Ana Ivanovic site: www.aivanovic.com
disposablehero
Your system would kill the Tier III's, unless the points were weighted more towards the later rounds than they are now. I really don't see a need to change the point totals either. It's already hard enough to get some endorsement-laden women to play Tier I's.
You have to answer for Santino, Carlo.
Changes are/will be made to the points and prize money and will be announced shortly.
<br />I'm pretty sure only SLAM points and the events at Indian Wells/Miami will be increased.
but that is yet to be confirmed.<br /> <br /> Will give more info when available.
disposable, that wouldn't kill the tier IIIs, that only will make them play their role.
Top players are not supposed to play tier III, if players want to go to the top of the rankings, it should be done by playing the most important events.
The tier III have an insignificant difference with the tier IVs in prize money, but the difference is big in relation with the tier 2s.
Speaking of rankings Fingon-do you remember our bet about Hingis and Venus? I believe I won our little essay contest... Will your essay be about Venus or Hingis?
Visit us at the Blast From The Past: Where Tennis History Lives!
http://www.tennisforum.com/forumdisplay.php?f=59
Larrybid
As long as the ranking points system has purposes other than trying to rank by competitive results who best players are over a given time period, then the system cannot be saved.
As disposablehero has correctly pointed out, the current ranking system is designed, in large part, to get the top players to play more. It is, in effect, a personnel management device. Thats fine...but let's not pretend it tells us fans what we think it does...ie. ranking the players by performance. The problem is it doesn't, and most objective observers know that is doesn't. So what we get is a player who holds on to the Number 1 spot seemingly forever, without a grand slam victory to her credit in years. And now we have a #1 who has not even been in a grand slam FINAL in the 52 weeks the rankings cover!
Giving the Grand slams more weight in the formula might make it less obviously worthless, but as long as the formula has ANY role in trying to protect lower tier events, it is almost useless for determining a REAL number one. The only changes that would make the rankings relevent would be a formula that gives up trying to manage player schedules and solely focuses on fairly ranking players by competitive results.
If they want to get top players to play lower tier events they should just do what the PGA does...pay apperence fees. Of course thats just too commonsensical...
[ November 06, 2001: Message edited by: Larrybid ]</p>
"She's built, She's stacked
Got all the curves a man likes."
GoDominiqu
Eggy, is that true ? <img src="frown.gif" border="0">
Well, then the WTA is just ridiculous. I mean, will they ever keep a system more than ONE single season ???<br />Every year they are changing something. This year it was reducing relevant tournaments from 18 to 17 and increase of points for tier III and IV. <br />Do they think that moaning and bickering about the system will stop because of that ?<br />To establish a system, you need some consistency and not permanent changes when a few people are mad that their favourite player is not no. 1.<br /> <img src="graemlins/firey.gif" border="0" alt="[Fiery]" />
TSequoia01
Larrybid excellent post and analysis. You should forward it to the WTA!
Beat'em down Ms Williams, beat'em down!
SERENA PRINCESS OF POWER
Victoria Duval - coming to a slam near you
Françoise Abanda definitely a future #1 --- Taylor Townsend devastation on the march
Venus and Serena ferocious grannies --- Kimiko Date Krumm great granny still doing her thing.
VSFan1 aka Joshua L.
Keeper of Venus & Serena,
TBE, is there any chance they will be lowering it to best-of-16 tournaments?
Thanks! <img src="smile.gif" border="0">
Loves of my life....
Venus Ebone Starr Williams
Serena Jamica Williams
a lifelong and devoted fan since 1996
Official Life Coach of the Royal Court
http://geocities.com/joshlemere/thisweek.html
VS....I don't think they will do that , but one major change will be points to majors.
last two years haven't looked too good for the #1 , but its not their fault they are #1 .<br /> the FAULT lies with the rank system.
WTA are looking to making changes and anything is possible as yet .
But I don't think they will go the ATP way and make all slams count and all 9 Tier 1's .
If that did happen the ranks could look stranger than this year considering Venus/Serena don't enter same tourns other than slams/plus IW/Miami but that will have to make them change their policy which will be a good thing.
One thing i do want is to increase Tier III prize money .... its gone up $20K in 12 years
[ November 06, 2001: Message edited by: TheBoiledEgg ]</p>
Brian Stewart
Plainclothes Division
I like the system the way it is. If they want to tweak the points a bit to round them off to multiples of 5 the whole way through, or some such, fine. I don't endorse wholesale changes.
The main problem isn't the rankings system- it's complaints about the ranking system. That problem involves 2 components: the media and the fans. Fans are going to complain any time a system doesn't give them the results they want. So no system is ever going to eliminate complaints. The tennis media is going to raise a fuss at any opportunity because they're looking to say something negative about women's tennis. Think boosting the slam points would satisfy them? Wait until when someone who doesn't reach quarterfinals of regular events shoots up the charts because of an open slam draw and a fluke semifinal appearance. Think they'll keep quiet then? Not on your life!
Political reporters have a credo: if both liberals and conservatives accuse them of bias toward the other side, they must have achieved a pretty good balance. Last year, people complained that the ranking system awarded too few points for the slams because Venus wasn't #1. The year before, they complained that the ranking system awarded the slams too many points because Lucic and Stevenson were propped up solely on one result. It's the same system. Since there were complaints on both sides, they must have a pretty good balance.
Join my Chanda Group:
http://groups.yahoo.com/group/chandarubin
Brian Stewart:
Fans and media complain when the scorekeepers, in this case the WTA don't keep an accurate score. That is they rank players based soley on relative competitive results. This complaint is not petty and it is not limited to tennis. I call your attention to the howl of protest when Michelle Kwan got a gift victory. Fans simply want to see the scoreboard reflect what actually happens on the field of play. This is not a petty complaint...this is the essense of what sport is about.
Now the WTA rankings, whatever their merits, do not accurately rank the top players. And judging by the lenth of time Hingis held on the the top spot, the rankings can be wrong for long periods of time. Venus Williams is not the 4th best player on tour, and she has certainly played enough tennis in the last 52 weeks to have proven this. Further anyone who thinks that Serena Williams is the 7th best player on tour hasn't been watching the matches. If you and the WTA wish to suspend logic and insist that the WTA rankings are as accurate as they can be, thats fine. But don't expect the fans and media to follow along like sheep. If the rankings made perfect sense there would be no media pointing out the obvious short-commings of the system.
Your argument that the WTA rankings "strike the right balance" simply illustrates the problem with the ranking system. It is trying to balance accuracy with the goal of encouraging the top players to play more. THE WTA SHOULD NOT BE TRYING TO USE THE RANKING SYSTEM TO MANAGE THE PLAYERS SCHEDULES. If the WTA system contiues to try to do that then the systen will be riduculed, very fairly, by fans and media.
Larry ..... we know Serena isn't the 7th best , but thats for her to change and the only way to do that is to PLAY
you cannot rank someone #1 or 2 if they play 1=2 events and they win them.
if that was the case then the person who wins Auckland would have a case and therefore not play for rest of year and be assured of a very high rank.
IF Serena had only played in 1 or 2 events the past 52 weeks you would be correct. But the fact is she played ALL the big events with the highest competition. She played and won enough to be the 3rd highest on the earnings list in 2001. The notion that she didn't play enough to tell how she ranked among the top players is false.
Serena played 10 events all year , thats not ALL the big events but most of the biggest.
Prize money doesn't = ranking , it never has and it never will.
One big loser in prize money would be Silvia Farina who doesn't feature in top 20 but is ranked 14.
Again I do acknowledge that the WTA has a legitamate interest in getting its top players to play more events. What I am saying is that they need to find a mechanism for doing so (appearance fees??) that keeps the ranking formula out of it. Aside for the fact that it casues the rankings to not make much sense...it doesn't really work.
I have never heard Venus Williams say she cares much about that ranking..she cares about winning throphies. Frankly, I'm convinced that the only reason that Serena now says she cares about being "#1" is because she hasn't won as many grand slams as her sister...she needs some basis for bragging rites. She never cared much about that ranking before now. I'm with Venus...to hell with that goofy WTA ranking. It don't mean a thing.
Any ranking system the WTA utilizes will have an effect on what tournaments the players pick to play - so why on earth NOT try to make that effect a positive one? You need a minimum number of plate appearances before your batting average counts, too.
The fact that Hingis stayed #1 for so long speaks less to her, or any problems with the ranking system than it did to Lindsay and Venus being unable to play a full schedule.
As for appearance fees, what they seem to do on the ATP is encourage people to show up - sometimes while injured - long enough to collect a check and then tank which will not help the WTA one little bit in the long run.
It is very important for the ranking system to represent the true status of individual players. If it does not, it becomes a joke (like it is currently) and places undo pressure on the psuedo #1. This I firmly believe had a negative effect on Hingis' psyche. It would have affected Capriati if she had been #1 more than a few weeks. It's tough when you are supposely #1 and all these lower ranked players are actually better than you. Whipping your butt every time out of the hopper. Talk about fustration and embarrassment.
AUSBOY
My ranking change would be simple, make it compulsory that the points earned by the 32 seeded players makes up one of their 17 tournaments.
"Player X isn't the real No 1" some posters say.
Please add: "IN MY OPINION" because that's all it is, your opinion. Every player knows what the ranking system is, and how many matches they must win to get to No 1. If they don't do that or CAN'T do that, they're NOT No 1. End of the matter.
On the old board there was a longstanding invitation for someone to come up with a ranking system that was workable, fair and produced a "better" result than the WTA system. No one managed it.
It's no use at all saying Serena or Jen can whip Martina or Lindsay like a dog at the moment, therefore they must be No 1. Players have ups. Players have downs. Players have favoured surfaces. That's why all rankings systems work over a year, not the last six weeks, or take your pick of ten tournaments you like.
I also think its quite legitimate of rankings systems to insist on a certain number of tournaments being played. If you don't play a full season, you are not supporting the sport or the fans or the tournaments. If a ranking system encouraged players to play only a few tournaments and then sit on their points, there would soon be a decline in the WTA, and far fewer tournaments. Imagine a football season in which a team could win 10 matches and then spend the rest of the year in barbados, secure in winning the championship!
I hope the WTA doesn't do anything foolish like reducing the number of tournaments playable drastically. 17 tournaments in a year is quite reasonable.
Official Hitman of the Maria Mafia
jrj Nov 10, 2001
|
{
"redpajama_set_name": "RedPajamaCommonCrawl"
}
| 6,414 |
[
128000,
19926,
311,
279,
23862,
1887,
198,
37,
287,
263,
198,
11649,
11,
358,
1541,
956,
2216,
1781,
279,
330,
9125,
1,
1288,
387,
5614,
627,
40,
3152,
11,
358,
12617,
264,
220,
4103,
5672,
1887,
11,
323,
25213,
4883,
323,
4367,
3585,
627,
4071,
7344,
11,
279,
3585,
2728,
311,
1855,
16520,
1288,
2349,
627,
59302,
11,
369,
11230,
264,
16520,
279,
4311,
5334,
420,
198,
16929,
220,
15830,
9668,
6338,
1163,
12520,
220,
15515,
9668,
6338,
71784,
358,
220,
11387,
9668,
6338,
71784,
8105,
220,
1049,
9668,
6338,
71784,
14767,
220,
9992,
9668,
6338,
71784,
17244,
220,
6860,
9668,
6338,
71784,
650,
220,
1490,
198,
7184,
11,
264,
27087,
220,
16,
6835,
520,
3325,
220,
16,
13,
17,
11990,
304,
3300,
22643,
1418,
264,
27087,
220
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
19926,
311,
279,
23862,
1887,
198,
37,
287,
263,
198,
11649,
11,
358,
1541,
956,
2216,
1781,
279,
330,
9125,
1,
1288,
387,
5614,
627,
40,
3152,
11,
358,
12617,
264,
220,
4103,
5672,
1887,
11,
323,
25213,
4883,
323,
4367,
3585,
627,
4071,
7344,
11,
279,
3585,
2728,
311,
1855,
16520,
1288,
2349,
627,
59302,
11,
369,
11230,
264,
16520,
279,
4311,
5334,
420,
198,
16929,
220,
15830,
9668,
6338,
1163,
12520,
220,
15515,
9668,
6338,
71784,
358,
220,
11387,
9668,
6338,
71784,
8105,
220,
1049,
9668,
6338,
71784,
14767,
220,
9992,
9668,
6338,
71784,
17244,
220,
6860,
9668,
6338,
71784,
650,
220,
1490,
198,
7184,
11,
264,
27087,
220,
16,
6835,
520,
3325,
220,
16,
13,
17,
11990,
304,
3300,
22643,
1418,
264,
27087,
220,
-100
] |
New Zealand's best rainy day attractions
21 May, 2016 | by JuliaHammond | No Comments
As the dregs of autumn drain into winter, it can be tempting to write off New Zealand as a holiday destination and postpone your trip until later in the year. In fact, there are plenty of New Zealand rainy day attractions ripe for the picking, so read on to find out where you should go if the weather just won't play ball.
Best New Zealand Rainy Day Attractions
Celebrate the country's maritime history in Auckland
Auckland's Maritime Museum paints a vivid picture of the events that shaped New Zealand as a sea-faring nation. It's a hands-on day out as you hoist the sails, listen to cannon fire and see whether you cut it as a yacht designer. Learn about the settlement of New Zealand by migrants who travelled across the oceans from Polynesia and from Europe. If the lure of the sea proves irresistible, the museum offers hour-long trips on one of three restored heritage vessels from which you can admire the city's impressive skyline.
Auckland Harbour: Photo by Ronnie Macdonald / CC BY 2.0
Test the best craft beers in Nelson
Nelson's so proud of its craft beer that it has a dedicated craft beer trail that visitors are encouraged to follow. Breweries are scattered liberally throughout the city and its environs and if you walk uphill away from the waterfront you may spot the city's hop kilns along the way. Beer has been important in these parts since the 1840s when early German settlers discovered that the climate was well suited to growing hops. There's a wide variety of beer to sample, from pilsner to ale and everything in between, so be sure to pace yourself!
Hop Cone: Photo by LuckyStarr / CC BY 2.5
Hang out with the politicians in Wellington
Ever wondered what happens in parliament? Well here's your chance to find out. Wellington's distinctive Beehive Building is open to the general public for tours. The building's concept was the brainchild of British architect Sir Basil Spence in 1964, who came up with the design of rooms and offices radiating from a central core. There's even an underground walkway connecting the Beehive to Bowen House. Your guide will explain how the New Zealand government system works and will regale you with tales of some of its most influential characters. If the house is sitting, you'll also be able to watch the debate from the public gallery. Best of all, the tour is free.
Beehive building in Wellington: Photo by Phillip Capper / CC BY 2.0
Explore one of the country's finest houses in Dunedin
Olveston Historic Home was the residence of Dunedin businessman David Theomin and his family. Designed by British architect Sir Ernest George and erected in 1906, the 35 room mansion was home to the Theomins until 1966. The house itself was built in the arts and crafts style, but its interior boasts a lavish and eclectic collection of treasures from around the globe. From breathtaking Japanese ramma panels decorated with gilt phoenix and wood carved peonies to Chinese urns, you can admire the fine art and furniture collected from far-flung destinations. Theomin made his fortune selling sheet music and musical instruments, so it's not surprising to find plenty of evidence for that passion in his home.
Olveston Historic House
Have you got any favourite New Zealand rainy day attractions? Why not share it with us?
Tags: auckland, beehive building, beer, craft beers, dunedin, maritime museum, nelson, olveston historic home, olveston house, parliament, wellington
JuliaHammond
About JuliaHammond
Website: http://www.juliahammond.co.uk
Julia Hammond is a Geography teacher turned travel writer with a passion for places. Winning Mail Travel's Deep South competition was the catalyst to write for a diverse range of publications including Bradt's Bus Pass Britain Rides Again. She's written Kindle guides to Cape Town, Peru and London for Unanchor and advice on Savannah for Wanderlust. When not travelling, she can be found at home in Essex planning her next trip, her two golden retrievers curled up at her feet.
Discover Italy's Charming Alberobello Trulli
Barcelona Travel Cheats for the Savvy Traveler
5 Reasons to Go to New Zealand Next
Best European destinations for winter sun
Four of the best New Zealand ferry crossings
A Weekend in Shenandoah National Park in 10 Stunning Photos
Downtown Kansas City Hotels: Stay Near all the Top Attractions
|
{
"redpajama_set_name": "RedPajamaCommonCrawl"
}
| 6,418 |
[
128000,
3648,
17340,
596,
1888,
63857,
1938,
39591,
198,
1691,
3297,
11,
220,
679,
21,
765,
555,
40394,
41041,
12669,
765,
2360,
18149,
198,
2170,
279,
294,
31986,
315,
42774,
24659,
1139,
12688,
11,
433,
649,
387,
61299,
311,
3350,
1022,
1561,
17340,
439,
264,
13560,
9284,
323,
95758,
701,
8577,
3156,
3010,
304,
279,
1060,
13,
763,
2144,
11,
1070,
527,
11510,
315,
1561,
17340,
63857,
1938,
39591,
57796,
369,
279,
21816,
11,
779,
1373,
389,
311,
1505,
704,
1405,
499,
1288,
733,
422,
279,
9282,
1120,
2834,
956,
1514,
5041,
627,
14809,
1561,
17340,
22674,
88,
6187,
52043,
4109,
198,
55754,
65216,
279,
3224,
596,
58412,
3925,
304,
54346,
198,
32,
48978,
596,
77331,
16730,
57948,
264,
43120,
6945,
315,
279,
4455,
430,
27367,
1561,
17340
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
3648,
17340,
596,
1888,
63857,
1938,
39591,
198,
1691,
3297,
11,
220,
679,
21,
765,
555,
40394,
41041,
12669,
765,
2360,
18149,
198,
2170,
279,
294,
31986,
315,
42774,
24659,
1139,
12688,
11,
433,
649,
387,
61299,
311,
3350,
1022,
1561,
17340,
439,
264,
13560,
9284,
323,
95758,
701,
8577,
3156,
3010,
304,
279,
1060,
13,
763,
2144,
11,
1070,
527,
11510,
315,
1561,
17340,
63857,
1938,
39591,
57796,
369,
279,
21816,
11,
779,
1373,
389,
311,
1505,
704,
1405,
499,
1288,
733,
422,
279,
9282,
1120,
2834,
956,
1514,
5041,
627,
14809,
1561,
17340,
22674,
88,
6187,
52043,
4109,
198,
55754,
65216,
279,
3224,
596,
58412,
3925,
304,
54346,
198,
32,
48978,
596,
77331,
16730,
57948,
264,
43120,
6945,
315,
279,
4455,
430,
27367,
1561,
17340,
-100
] |
Autor: Van Valin, Robert D.
1. Syntactic structure; 2. Lexical representation and semantic roles; 3. Information structure; 4. Syntactic relations and case marking; 5. Linking syntactic and semantic representations in simple sentences; 6. The structure of complex sentences; 7. Linking syntax and semantics in complex sentences.
|
{
"redpajama_set_name": "RedPajamaC4"
}
| 586 |
[
128000,
64699,
25,
13000,
4196,
258,
11,
8563,
423,
627,
16,
13,
5837,
406,
24045,
6070,
26,
220,
17,
13,
27917,
950,
13340,
323,
42833,
13073,
26,
220,
18,
13,
8245,
6070,
26,
220,
19,
13,
5837,
406,
24045,
4398,
323,
1162,
36024,
26,
220,
20,
13,
6074,
287,
84287,
24045,
323,
42833,
44713,
304,
4382,
23719,
26,
220,
21,
13,
578,
6070,
315,
6485,
23719,
26,
220,
22,
13,
6074,
287,
20047,
323,
53794,
304,
6485,
23719,
13,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0
] |
[
64699,
25,
13000,
4196,
258,
11,
8563,
423,
627,
16,
13,
5837,
406,
24045,
6070,
26,
220,
17,
13,
27917,
950,
13340,
323,
42833,
13073,
26,
220,
18,
13,
8245,
6070,
26,
220,
19,
13,
5837,
406,
24045,
4398,
323,
1162,
36024,
26,
220,
20,
13,
6074,
287,
84287,
24045,
323,
42833,
44713,
304,
4382,
23719,
26,
220,
21,
13,
578,
6070,
315,
6485,
23719,
26,
220,
22,
13,
6074,
287,
20047,
323,
53794,
304,
6485,
23719,
13,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100
] |
Global advertisers demand reform of digital ad ecosystem
The WFA Global Media Charter calls for agencies, ad-tech companies, media owners and platforms to work alongside advertisers to create a safer, more transparent, more consumer-friendly environment
The World Federation of Advertisers has published a Global Media Charter, designed to create the conditions for a marketing ecosystem that works better for brands and consumers.
Developed by more than ten of the world's top advertisers[1] as well as advertiser associations in the top ten global ad markets[2], the Global Media Charter sets out eight clear 'Principles for Partnership' designed to create a better, more balanced, digital marketing ecosystem.
It seeks to build on the concerns highlighted by Procter & Gamble[3] and Unilever[4] in the areas of transparency, brand safety, ad fraud and viewability by creating a framework that agencies, ad-tech companies and media platforms should comply with if they want to secure advertising revenues in the future.
WFA has worked closely with Procter & Gamble, Unilever, Mastercard and Diageo among other companies as well as advertiser associations in countries including the US, China, Japan, Germany and France to develop the principles which seek to recalibrate the relationships between the tripartite of client, agency and media owners.
Consumer trust in online ads is at an all-time low, especially for online advertising[5], while ad blocking is growing 30% a year globally[6]. WFA believes that the principles outlined in the charter, especially those focused on the responsible use of data, are essential if consumer trust in digital advertising is to be rebuilt.
"The digital ecosystem has grown so rapidly, it's no wonder that it's far from perfect. But the time for indulgence is over. The largest chunk of the world's marketing budgets is now invested in digital platforms and advertisers have a right to demand that the money they invest can be clearly tracked and understood. It's not just about knowing that budgets have been well spent. We also need to be reassured that brand and consumer interests are protected in these new platforms," said Stephan Loerke, CEO of the World Federation of Advertisers.
The eight Principles for Partnership require action from both advertisers and those across the media value chain. They are:
Zero tolerance to ad fraud with compensation for any breach: a streamlined process to refund all media investments, including fees/commissions, found to be associated with invalid traffic/non-human impressions. Advertisers seek to use accredited third-party verification solutions to assess exposure to ad fraud.
Strict brand safety protection: Advertisers require platforms and publishers to accept responsibility for the content carried on their sites and to employ comprehensive and rigorous safeguards on which accounts and channels can host paid advertising. Advertisers commit not to target media investment at content platforms that misuse and infringe IP laws or sites responsible for fake news content or disinformation.
Minimum viewability thresholds: Brands should be able to trade against the viewability level that is appropriate for their business including 100% in-view for full duration, if desired. Advertisers understand that higher viewability standards could impact on inventory supply and campaign reach.
Transparency throughout the supply-chain: complete transparency through the supply chain (digital or otherwise) covering pricing and trading, fees and costs, placement and data usage. Advertisers respect the right of partners to be profitable and commit to relevant and fair levels of remuneration for services rendered.
Third-party verification and measurement as a minimum requirement: Self-reported data is unacceptable, and advertisers need third-party verification that inventory is viewable, fraud free, brand safe and on-target. Advertisers commit to prioritise third-party ad serving and verification companies who are audited and certified by the relevant industry-approved bodies.
Removal of 'walled garden' issues: data and technology should be unbundled, allowing advertisers to use the third-party buying platform of their choice in any and all environments. Publishers and platforms should work to create a solution that provides impression level data with spend tracking companies to enable brands to track media spend in their category and competitive set.
Improving standards with data transparency: Data supply chain partners must uphold the same high standards outlined in the WFA's Data Transparency Manifesto[7]. Advertisers commit to working with partners to ensure data is ethically and transparently sourced as well as securely stored with appropriate assurance mechanisms, including audits. Data collection should be the minimum required to deliver a quality advertising experience.
Take steps to improve the consumer experience: Consumers are becoming increasingly frustrated with ads that disrupt their experience, interrupt content, slow browsing or eat up their data allowances. Advertisers and platforms should design commercial communication opportunities so that they are less intrusive and offer a better user experience.
WFA, alongside the companies and advertiser associations who helped develop this charter, are calling on all players in the media value chain to work together to implement these eight principles.
Ben Jankowski, Senior Vice President of Media at Mastercard and co-chair of WFA Media Forum said "As the market continues to change quickly, global brands are being more tangible and specific about what we expect from the entire ecosystem; our tech partners, agency partners media owners and digital platforms. The WFA's Global Media Charter is designed to ensure that everyone has the same common understanding of what we all need to do to thrive. Everyone should join us on this journey."
Luis Di Como, EVP Global Media, Unilever added "Whether it be viewability, measurement, ad fraud of brand safety, we must work collectively to drive quality and transparency for our consumers and ourselves as advertisers. The Global Media Charter builds on Unilever's Responsibility Framework and is an essential step on the journey to a better digital ecosystem for the industry and society."
"The topics addressed in the Global Media Charter have been discussed in thousands of meetings and on countless conference stages: non-transparent media, conflicts of interest, rebates & incentives, data ownership & management, brand protection. The list is long. The challenge we as an industry face is bigger still. We need to rebuild trust: between brands and consumers, between brands and agencies and between brands and publishers. It might seem like an impossible task but the WFA Global Media Charter draws an important line in the sand. It identifies, in no uncertain language, what steps the industry needs to take to rebuild trust. Let us start the long and winding road by first making our demands and expectations clear. Then we need to work collaboratively, step by step. Be part of the journey. The time has come," said Gerhard Louw, International Media Management and Digital Transformation at Deutsche Telekom
WFA President and RBS CMO, David Wheldon, added "The digital eco-system is a minefield for consumers and brands, with the result that online advertising is less and less trusted by consumers and brands are often left questioning their investment strategies. It's high time the industry as a whole drew a line in the sand and said enough is enough; things need to change and fast. The WFA Global Media Charter is critical in that it lists what brands need from their online partners so that the system can be sustainable. Put simply, it's the only future for the online advertising ecosystem."
[1] Including The Coca-Cola Company, Diageo, Deutsche Telekom, FrieslandCampina, L'Oreal, Mastercard, McDonalds, Nestle, P&G, Philips, Unilever
[2] Australia, Brasil, Canada, China, France, Germany, UK, US
[3] Marc Pritchard speech at IAB US, January 29 2017
[4] Keith Weed, speech at IAB US, February 12 2017
[5] https://digiday.com/marketing/global-state-consumer-trust-advertising-5-charts/
[6] https://pagefair.com/blog/2017/adblockreport/
[7] https://www.wfanet.org/news-centre/wfa-manifesto-for-online-data-transparency/
If you'd like to speak to an ABC expert about becoming verified to industry-agreed Standards for viewability, ad fraud and brand safety, please contact Jo Bland, Account Manager, at This email address is being protected from spambots. You need JavaScript enabled to view it. or call 01442 200839.
"Working with ABC in the past, we had confidence they would be a trusted partner to turn to for guidance, expertise and support."
Leena Vara-Patel,
Operations & Ad Tech Director, agenda21
"ABC provides us with a consistent measure of our circulation and digital reach that is credible to our advertisers. It's got the respect of everyone in the industry and is really important for us as a business."
Jamie Credland,
SVP Marketing and Strategy,
"The ABC/IAB Robots and Spiders list is a critical resource, providing a central repository where search engines and others committed to transparency have declared themselves."
Larry Goldstein, Vice President,
Research Audit Services, comScore
"ABC's training session was incredibly useful... some of our attendees who'd been trained in digital ad trading were amazed this level of trusted detail exists for ABC-verified media brands."
Craig Smith,
Trading Director, Print & Digital Display,
"ABC has worked closely with the industry to simplify its reporting whilst retaining the robust, gold standard that we associate with their stamp of trust."
Adam Crow,
Head of Publishing,
"At Exponential we understand the need to be open and transparent with our business practices, which is why we follow the EDAA best practice criteria for online behavioural advertising. ABC were very helpful and supportive throughout the certification process."
Tim Sleath,
VP Product Management,
"Independently audited figures from ABC remain key to our business. As a joint industry currency they allow anyone who wishes to compare figures across different titles or publishers to do so on a like-for-like basis, and to be reassured that the figures are based on fact."
Albert Read, MD,
Click here to read more news
Want to get our stamp of trust?
|
{
"redpajama_set_name": "RedPajamaCommonCrawl"
}
| 1,877 |
[
128000,
11907,
50270,
7631,
15180,
315,
7528,
1008,
26031,
198,
791,
468,
3711,
8121,
7972,
49705,
6880,
369,
13607,
11,
1008,
42357,
5220,
11,
3772,
7980,
323,
15771,
311,
990,
16662,
50270,
311,
1893,
264,
30549,
11,
810,
18300,
11,
810,
11761,
22658,
4676,
198,
791,
4435,
28331,
315,
2467,
10429,
388,
706,
4756,
264,
8121,
7972,
49705,
11,
6319,
311,
1893,
279,
4787,
369,
264,
8661,
26031,
430,
4375,
2731,
369,
16097,
323,
13723,
627,
21076,
291,
555,
810,
1109,
5899,
315,
279,
1917,
596,
1948,
50270,
58,
16,
60,
439,
1664,
439,
87386,
30257,
304,
279,
1948,
5899,
3728,
1008,
11987,
58,
17,
1145,
279,
8121,
7972,
49705,
7437,
704,
8223,
2867,
364,
3617,
5824,
645,
369,
47362,
6,
6319,
311,
1893,
264,
2731,
11,
810
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
11907,
50270,
7631,
15180,
315,
7528,
1008,
26031,
198,
791,
468,
3711,
8121,
7972,
49705,
6880,
369,
13607,
11,
1008,
42357,
5220,
11,
3772,
7980,
323,
15771,
311,
990,
16662,
50270,
311,
1893,
264,
30549,
11,
810,
18300,
11,
810,
11761,
22658,
4676,
198,
791,
4435,
28331,
315,
2467,
10429,
388,
706,
4756,
264,
8121,
7972,
49705,
11,
6319,
311,
1893,
279,
4787,
369,
264,
8661,
26031,
430,
4375,
2731,
369,
16097,
323,
13723,
627,
21076,
291,
555,
810,
1109,
5899,
315,
279,
1917,
596,
1948,
50270,
58,
16,
60,
439,
1664,
439,
87386,
30257,
304,
279,
1948,
5899,
3728,
1008,
11987,
58,
17,
1145,
279,
8121,
7972,
49705,
7437,
704,
8223,
2867,
364,
3617,
5824,
645,
369,
47362,
6,
6319,
311,
1893,
264,
2731,
11,
810,
-100
] |
G4S Event Solutions offers you a total concept.
You'll work with just one company who helps ensure your event runs seamlessly from A to Z.
Our services include assembly/dismantling, reception, practical support, security and specialised services for fairs and conventions.
Our G4S event team and a storage facility of 1,000 square metres in Vilvoorde ensure that your event runs smoothly.
|
{
"redpajama_set_name": "RedPajamaC4"
}
| 3,055 |
[
128000,
38,
19,
50,
3749,
23508,
6209,
499,
264,
2860,
7434,
627,
2675,
3358,
990,
449,
1120,
832,
2883,
889,
8779,
6106,
701,
1567,
8640,
61440,
505,
362,
311,
1901,
627,
8140,
3600,
2997,
14956,
3529,
2191,
519,
2785,
11,
23991,
11,
15325,
1862,
11,
4868,
323,
89004,
3600,
369,
282,
4825,
323,
45593,
627,
8140,
480,
19,
50,
1567,
2128,
323,
264,
5942,
12764,
315,
220,
16,
11,
931,
9518,
37356,
304,
64749,
3415,
53218,
6106,
430,
701,
1567,
8640,
39511,
13,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0
] |
[
38,
19,
50,
3749,
23508,
6209,
499,
264,
2860,
7434,
627,
2675,
3358,
990,
449,
1120,
832,
2883,
889,
8779,
6106,
701,
1567,
8640,
61440,
505,
362,
311,
1901,
627,
8140,
3600,
2997,
14956,
3529,
2191,
519,
2785,
11,
23991,
11,
15325,
1862,
11,
4868,
323,
89004,
3600,
369,
282,
4825,
323,
45593,
627,
8140,
480,
19,
50,
1567,
2128,
323,
264,
5942,
12764,
315,
220,
16,
11,
931,
9518,
37356,
304,
64749,
3415,
53218,
6106,
430,
701,
1567,
8640,
39511,
13,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100
] |
Padma Desai (born October 12, 1931) is an Indian-American development economist who was born and studied in India before completing a PhD at Harvard in 1960. She is the Gladys and Roland Harriman Professor Emerita of comparative economic systems and has been the director of the Center for Transition Economies at the Columbia University.
She was awarded the Padma Bhushan by the Government of India in 2009.
Early life and education
Desai was born and brought up in a traditional Gujarati Anavil Brahmin family in Surat, Gujarat.
She did her B.A. (Economics) in 1951 from the University of Mumbai, followed by an M.A. (Economics) also from the same university in 1953. Thereafter she completed her Ph.D. from Harvard in 1960.
Career
Desai started her career at the Department of Economics, Harvard (1957-1959), after which she was associate professor of economics at Delhi School of Economics at University of Delhi, from 1959 to 1968.
In November 1992, she joined as the Gladys and Roland Harriman Professor of Comparative Economic Systems at Columbia University and went on to become the director of the Center for Transition Economies at the University.
She later was the U.S. Treasury's advisor to the Russian Finance Ministry in the summer of 1995. She was president of the Association for Comparative Economic Studies in 2001.
She published her memoir, Breaking Out: An Indian Woman's American Journey in 2012.
Personal life
She is married to Jagdish Bhagwati, also an Indian-American economist and professor of economics and law at Columbia University; the couple have one daughter.
Bibliography
Breaking Out: An Indian Woman's American Journey. Viking, 2012. .
From Financial Crisis to Global Recovery. Harper Collins, 2012. .
Conversations on Russia: Reform from Yeltsin to Putin. Oxford University Press, 2006. .
Financial Crisis, Contagion, and Containment: From Asia to Argentina. Princeton University Press, 2003. .
Work Without Wages: Russia's Non-Payment Crisis, with Todd Idson. MIT Press, 2001. .
Going Global: Transition from Plan to Market in the World Economy, Editor. MIT Press, 1997. .
The Soviet Economy: Problems and Prospects. Blackwell, 1990.
Perestroika in Perspective: The Design and Dilemmas of Soviet Reform. I B Tauris & Co, 1989. .
Bokaro Steel Plant: A Study of Soviet Economic Assistance. North-Holland, 1972. .
References
Celebrating Padma Desai Columbia University
External links
Padma Desai, homepage at Columbia University
20th-century Indian economists
1931 births
Living people
American people of Gujarati descent
People from Surat
Indian emigrants to the United States
American economists
American memoirists
Indian development economists
University of Mumbai alumni
Harvard Graduate School of Arts and Sciences alumni
Russian studies scholars
Academic staff of Delhi University
Columbia University faculty
Recipients of the Padma Bhushan in literature & education
Indian women economists
American women memoirists
20th-century Indian women scientists
20th-century American women writers
Scientists from Gujarat
21st-century Indian economists
21st-century Indian women scientists
21st-century American women writers
American women economists
Women scientists from Gujarat
Educators from Gujarat
Women educators from Gujarat
20th-century Indian women writers
20th-century Indian writers
21st-century Indian women writers
21st-century Indian writers
|
{
"redpajama_set_name": "RedPajamaWikipedia"
}
| 4,698 |
[
128000,
14047,
1764,
3959,
2192,
320,
16381,
6664,
220,
717,
11,
220,
7285,
16,
8,
374,
459,
7904,
24145,
4500,
46215,
889,
574,
9405,
323,
20041,
304,
6890,
1603,
27666,
264,
30661,
520,
25996,
304,
220,
5162,
15,
13,
220,
3005,
374,
279,
52741,
1065,
323,
58906,
15591,
40310,
17054,
21185,
6388,
315,
55394,
7100,
6067,
323,
706,
1027,
279,
7690,
315,
279,
5955,
369,
38821,
51183,
552,
520,
279,
19326,
3907,
382,
8100,
574,
22034,
279,
26367,
1764,
31930,
1136,
276,
555,
279,
10423,
315,
6890,
304,
220,
1049,
24,
382,
42298,
2324,
323,
6873,
198,
5001,
2192,
574,
9405,
323,
7263,
709,
304,
264,
8776,
56731,
9491,
1556,
402,
321,
78084,
1083,
3070,
304,
8242,
266,
11,
62953,
382,
8100,
1550,
1077,
426,
885,
13,
320
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
14047,
1764,
3959,
2192,
320,
16381,
6664,
220,
717,
11,
220,
7285,
16,
8,
374,
459,
7904,
24145,
4500,
46215,
889,
574,
9405,
323,
20041,
304,
6890,
1603,
27666,
264,
30661,
520,
25996,
304,
220,
5162,
15,
13,
220,
3005,
374,
279,
52741,
1065,
323,
58906,
15591,
40310,
17054,
21185,
6388,
315,
55394,
7100,
6067,
323,
706,
1027,
279,
7690,
315,
279,
5955,
369,
38821,
51183,
552,
520,
279,
19326,
3907,
382,
8100,
574,
22034,
279,
26367,
1764,
31930,
1136,
276,
555,
279,
10423,
315,
6890,
304,
220,
1049,
24,
382,
42298,
2324,
323,
6873,
198,
5001,
2192,
574,
9405,
323,
7263,
709,
304,
264,
8776,
56731,
9491,
1556,
402,
321,
78084,
1083,
3070,
304,
8242,
266,
11,
62953,
382,
8100,
1550,
1077,
426,
885,
13,
320,
-100
] |
Phoenix rising as comedian brings tour to Engine Shed
Nick Helm EMN-190618-004154001
Dianne Tuckett
Published: 21:15 Friday 21 June 2019
An award-winning comedian is heading to Lincoln's Engine Shed this autumn.
Following on from his return to the Edinburgh Fringe after six long years, Nick Helm is back on tour to remind the world of what they've been missing out on.
Helm has been delighting audiences as a stand-up since 2007.
Blending jokes, stories, poems and songs, he has earned an impressive list of awards and accolades, such as Best Stand-Up Comedy Act at the What's on London Awards, Chortle's Best Music and Variety Artist, British Comedy Awards Best Breakthrough Artist, Times Breakthrough Award at the South Bank Sky Arts Awards, and many more.
Nick's talents go beyond stand-up, however, and he has become a familiar face on TV screens as the title role in BBC Three's Uncle – which won Best Multichannel Programme at the 2015 Broadcast Awards.
He also co-starred in Loaded (Channel 4), co-wrote, directed and starred in the BAFTA-nominated short Elephant (BBC Online), and starred in The Girl in the Dress – a short selected for the 2015 London Film Festival.
A more recent comedy short, The Killing Machine, was written by and stars Nick, for the BBC.
He also created and starred in the food and travel show Eat Your Heart Out with Nick Helm (Dave).
In October last year, Nick was on our screens once again – in Sky One's The Reluctant Landlord, written by and starring Romesh Ranganathan. Filming for series two is presently in progress.
Nick is also a talented musician. He has released albums including Hot 'n' Heavy, and Songs from Uncle.
He is currently working on a soundtrack and his fourth album.
He currently hosts a weekly radio show and broadcast at Fubar Radio, with Nathaniel Metcalfe, called Nick & Nat's Fan Club.
Nick Helm: Phoenix from the Flames is at The Engine Shed on Thursday, October 10.
All for the love of Louth people
For tickets, visit www.
engineshed.co.uk
|
{
"redpajama_set_name": "RedPajamaCommonCrawl"
}
| 8,640 |
[
128000,
79925,
16448,
439,
51912,
12716,
7364,
311,
8364,
95552,
198,
31456,
63142,
17329,
45,
12,
7028,
21985,
12,
8759,
10559,
4119,
198,
35,
64452,
350,
1983,
7211,
198,
29986,
25,
220,
1691,
25,
868,
6740,
220,
1691,
5651,
220,
679,
24,
198,
2127,
10292,
27875,
51912,
374,
14836,
311,
25379,
596,
8364,
95552,
420,
42774,
627,
28055,
389,
505,
813,
471,
311,
279,
41406,
2939,
18177,
1306,
4848,
1317,
1667,
11,
15341,
63142,
374,
1203,
389,
7364,
311,
24928,
279,
1917,
315,
1148,
814,
3077,
1027,
7554,
704,
389,
627,
39,
24037,
706,
1027,
18454,
287,
30994,
439,
264,
2559,
5352,
2533,
220,
1049,
22,
627,
5028,
2518,
32520,
11,
7493,
11,
45319,
323,
11936,
11,
568,
706,
15662,
459,
16358,
1160,
315,
23146,
323,
86643,
3536
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
79925,
16448,
439,
51912,
12716,
7364,
311,
8364,
95552,
198,
31456,
63142,
17329,
45,
12,
7028,
21985,
12,
8759,
10559,
4119,
198,
35,
64452,
350,
1983,
7211,
198,
29986,
25,
220,
1691,
25,
868,
6740,
220,
1691,
5651,
220,
679,
24,
198,
2127,
10292,
27875,
51912,
374,
14836,
311,
25379,
596,
8364,
95552,
420,
42774,
627,
28055,
389,
505,
813,
471,
311,
279,
41406,
2939,
18177,
1306,
4848,
1317,
1667,
11,
15341,
63142,
374,
1203,
389,
7364,
311,
24928,
279,
1917,
315,
1148,
814,
3077,
1027,
7554,
704,
389,
627,
39,
24037,
706,
1027,
18454,
287,
30994,
439,
264,
2559,
5352,
2533,
220,
1049,
22,
627,
5028,
2518,
32520,
11,
7493,
11,
45319,
323,
11936,
11,
568,
706,
15662,
459,
16358,
1160,
315,
23146,
323,
86643,
3536,
-100
] |
Jim Peterik's Lifeforce – Jazz That Rocks!™
« Jim Peterik's Lifeforce with Special Guests THIS FRIDAY!
October 1 – Jim Peterik's Lifeforce and Mindi Abair
Mindi Abair,
Jim Peterik
Best known as the founder of the band Survivor, Jim Peterik brings an alternative to the raucousness of rock with Lifeforce. This ensemble creates a powerful collection of diverse rock, pop, soul, worldbeat, and contemporary jazz tunes right before your eyes. You will enjoy this crisp ensemble action within a game of musical chairs, joyfully jumping from one vibe to the next. Fans of all genres will love this high energy show!
While still a grade school student in 1964, Jim Peterik was playing in a garage band named The Renegades. When guitarist Larry Millas recruited him to join his group they eventually changed the name to the Ides of March. Their breakthrough moment came when they signed with Warner Brothers and recorded "Vehicle" a song Jim wrote for his future wife, Karen. Powered by a dynamic horn section, the band was propelled into sudden fame when it hit #2 on the Billboard Pop Charts in 1970 and became the fastest-selling record in Warner Brothers history. The song ultimately went Platinum and they went on tour opening for acts like Jimi Hendrix, Led Zeppelin, and Janis Joplin.
After the Ides of March took a long break, Jim co-founded the band Survivor and charted with songs like "Somewhere in America," "Poor Man's Son," and "Eye of the Tiger."
Mindi Abair
In a career that spans seven solo albums and countless collaborations, Mindi Abair has made her mark as one of the most recognizable saxophonists in the US. Her newest recording, Wild Heart, harkens back to the days when saxophone was as integral an instrument as the guitar in the early days of rock and soul.
She picked up the saxophone in the fourth grade and took part in every band program available in elementary, middle, and high school. She graduated magna cum laude with a degree in woodwind performance from Berklee College of Music.
Having performed with some of the most well respected musicians of this age including Aerosmith, Bruce Springsteen, and the CBS Orchestra on the Late Show with David Letterman, she considers herself the luckiest person in the world to be surrounded by such talent and true artistry.
Tickets are $23.00 & $33.00 plus applicable service charges and are on sale now. Tickets are available by visiting the Genesee Theatre Box Office, all Ticketmaster outlets, Ticketmaster.com & Ticketmaster charge by phone at 800-982-2787.
Forces at Play
©2011 Jim Peterik's Lifeforce | Website by WickedMagpie.com | Graphic Elements by Mark Alano | Photography by Kristie Schram and Roy Ferrer
|
{
"redpajama_set_name": "RedPajamaCommonCrawl"
}
| 335 |
[
128000,
37734,
11291,
1609,
596,
65863,
830,
16716,
1389,
36967,
3011,
69131,
0,
16500,
198,
24633,
11641,
11291,
1609,
596,
65863,
830,
16716,
449,
9984,
62682,
10245,
17067,
926,
3097,
4999,
31294,
220,
16,
1389,
11641,
11291,
1609,
596,
65863,
830,
16716,
323,
23754,
72,
3765,
1334,
198,
44,
29785,
3765,
1334,
345,
37734,
11291,
1609,
198,
14809,
3967,
439,
279,
19533,
315,
279,
7200,
65580,
11,
11641,
11291,
1609,
12716,
459,
10778,
311,
279,
15473,
1791,
788,
2136,
315,
7091,
449,
65863,
830,
16716,
13,
1115,
40126,
11705,
264,
8147,
4526,
315,
17226,
7091,
11,
2477,
11,
13836,
11,
1917,
23019,
11,
323,
19225,
34997,
55090,
1314,
1603,
701,
6548,
13,
1472,
690,
4774,
420,
42954,
40126,
1957,
2949,
264,
1847,
315,
18273,
26993,
11,
16267,
3725
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
37734,
11291,
1609,
596,
65863,
830,
16716,
1389,
36967,
3011,
69131,
0,
16500,
198,
24633,
11641,
11291,
1609,
596,
65863,
830,
16716,
449,
9984,
62682,
10245,
17067,
926,
3097,
4999,
31294,
220,
16,
1389,
11641,
11291,
1609,
596,
65863,
830,
16716,
323,
23754,
72,
3765,
1334,
198,
44,
29785,
3765,
1334,
345,
37734,
11291,
1609,
198,
14809,
3967,
439,
279,
19533,
315,
279,
7200,
65580,
11,
11641,
11291,
1609,
12716,
459,
10778,
311,
279,
15473,
1791,
788,
2136,
315,
7091,
449,
65863,
830,
16716,
13,
1115,
40126,
11705,
264,
8147,
4526,
315,
17226,
7091,
11,
2477,
11,
13836,
11,
1917,
23019,
11,
323,
19225,
34997,
55090,
1314,
1603,
701,
6548,
13,
1472,
690,
4774,
420,
42954,
40126,
1957,
2949,
264,
1847,
315,
18273,
26993,
11,
16267,
3725,
-100
] |
Little River Farms has been a family-owned and working farm since the 1940's and is now a wedding & special events venue. Located in the Crabapple area of Milton, Georgia, Little River Farms is less than 30 minutes from Downtown Atlanta and less than 15 minutes to many hotels and restaurants. With a brand new 5,000 sq. foot elegant pavilion, a 10,000 sq. foot newly restored house and multiple ceremony sites, you have plenty of options to host any event. At Little River Farms the possibilities are endless in making your special day all your own and we look forward to having you here!
|
{
"redpajama_set_name": "RedPajamaC4"
}
| 9,745 |
[
128000,
39203,
11188,
68121,
706,
1027,
264,
3070,
29799,
323,
3318,
8961,
2533,
279,
220,
6393,
15,
596,
323,
374,
1457,
264,
13306,
612,
3361,
4455,
22150,
13,
42867,
304,
279,
75204,
23182,
3158,
315,
58447,
11,
16272,
11,
15013,
11188,
68121,
374,
2753,
1109,
220,
966,
4520,
505,
44985,
20005,
323,
2753,
1109,
220,
868,
4520,
311,
1690,
25325,
323,
15926,
13,
3161,
264,
6883,
502,
220,
20,
11,
931,
18522,
13,
4579,
26861,
40216,
50012,
11,
264,
220,
605,
11,
931,
18522,
13,
4579,
13945,
28101,
3838,
323,
5361,
22260,
6732,
11,
499,
617,
11510,
315,
2671,
311,
3552,
904,
1567,
13,
2468,
15013,
11188,
68121,
279,
24525,
527,
26762,
304,
3339,
701,
3361,
1938,
682,
701,
1866,
323,
584,
1427,
4741,
311,
3515,
499,
1618
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
39203,
11188,
68121,
706,
1027,
264,
3070,
29799,
323,
3318,
8961,
2533,
279,
220,
6393,
15,
596,
323,
374,
1457,
264,
13306,
612,
3361,
4455,
22150,
13,
42867,
304,
279,
75204,
23182,
3158,
315,
58447,
11,
16272,
11,
15013,
11188,
68121,
374,
2753,
1109,
220,
966,
4520,
505,
44985,
20005,
323,
2753,
1109,
220,
868,
4520,
311,
1690,
25325,
323,
15926,
13,
3161,
264,
6883,
502,
220,
20,
11,
931,
18522,
13,
4579,
26861,
40216,
50012,
11,
264,
220,
605,
11,
931,
18522,
13,
4579,
13945,
28101,
3838,
323,
5361,
22260,
6732,
11,
499,
617,
11510,
315,
2671,
311,
3552,
904,
1567,
13,
2468,
15013,
11188,
68121,
279,
24525,
527,
26762,
304,
3339,
701,
3361,
1938,
682,
701,
1866,
323,
584,
1427,
4741,
311,
3515,
499,
1618,
-100
] |
\subsection{Data Collection and Filtering}
\label{data-collect}
We collected \texttt{FiSCU}\xspace from various online study guides such as \texttt{shmoop},\footnote{\url{https://www.shmoop.com/study-guides/literature}} \texttt{SparkNotes},\footnote{\url{https://www.sparknotes.com/lit/}} \texttt{CliffsNotes},\footnote{\url{https://www.cliffsnotes.com/literature}} and \texttt{LitCharts}.\footnote{\url{https://www.litcharts.com}}
These sources contain educational material to help students study for their literature classes. These study guides include summaries of various literary pieces as well as descriptions of characters that appear in them.
These literature summaries and character descriptions were written by literary experts, typically teachers, and are of high pedagogical quality.
We used \texttt{Scrapy},\footnote{\url{https://scrapy.org/}} a free and open-source web-crawling framework
to crawl these study guides.
Our initial crawl resulted in a set of $1,774$ literature summaries and $25,525$ character descriptions. These included all characters mentioned in the literary pieces.
However, not all characters, especially those that played a minor role in the literary piece, appeared in the corresponding literature summaries. Since our task involves making inferences about characters from the literature summarie
, we filtered out the characters which do not appear in the summaries
or their names or the descriptions had very little overlap with the literature summaries.
This is done to mitigate the reference divergence issue~\cite{kryscinski-etal-2019-neural, maynez-etal-2020-faithfulness} and ensure that the literature summary has enough information about the character to generate the description.
For this, we define the ``information overlap'' between two pieces of text $\mathcal{A}$ and $\mathcal{B}$, $IO(\mathcal{B}||\mathcal{A})$, as the ratio of the length of the longest overlapping word sub-sequence between $\mathcal{A}$ and $\mathcal{B}$, over the length of $\mathcal{A}$.\footnote{Technically this is the same as Rouge-L precision} Note that this information overlap measure is not symmetric and intuitively measures how much information about $\mathcal{A}$ is present in $\mathcal{B}$.
We used the information overlap measure to filter our dataset as follows. If the information overlap of the literature summary with the character name,
$IO($literature summary $||$ character name$)$, is less than $0.6$, then we consider that the character is not prominently mentioned in the literature summary and we remove that character from our dataset. Similarly, if the information overlap between the character description and the literature summary, $IO($literature summary $||$ character description$)$, is less than $0.2$, then we consider the character description generation less feasible and we remove that data point from our dataset.\footnote{These thresholds were chosen by experimenting with different values and manually analyzing the quality of (a subset of) the data.}
\begin{table}[t]
\footnotesize
\centering
\input{figures/data_stat}
\caption{Statistics of the \texttt{FiSCU}\xspace dataset.}
\label{tab:stat}
\end{table}
However, during these filtering steps, we did not want to remove the most important characters of the narrative. The online study guides list characters in decreasing order of their importance in the literary piece. For example, narrators, protagonists, antagonists, etc., are always described first. Leveraging this ordering, we always retained the top $3$ characters of the literary piece in our dataset.
After the filtering process, our final dataset consists of $1,708$ literature summaries and $9,499$ character descriptions in total. This set was split into train ($80\%$), test ($10\%$), and validation ($10\%$) sets. The data splits were created to avoid any data-leakages -- each literary piece and all of its character descriptions were consistently part of only one of the train, test and validation sets.
Table~\ref{tab:stat} shows the statistics of the final dataset. The dataset also contains the full-text of the books for
$2,052$ of the character descriptions.
\subsection{Dataset Reproducibility}
\label{data_reproducibility}
\texttt{FiSCU}\xspace is drawn from various study guides on the web. While we do not have the rights to directly redistribute this dataset, to allow other researchers to replicate the \texttt{FiSCU}\xspace dataset and compare to our work, we provide a simple script that will allow others to recreate \texttt{FiSCU}\xspace from a particular time-stamped version of these study guides on \textit{Wayback Machine}, a time-stamped digital archive of the web. Our script ensures that others will be able to recreate the same train, test and validation splits.
\section{\texttt{FiSCU}\xspace Task Definitions}
\label{sec:task-def}
We introduce two new tasks on the \texttt{FiSCU}\xspace dataset
\begin{itemize}[noitemsep,nolistsep]
\item \textit{Character Identification}
\item \textit{Character Description Generation}
\end{itemize}
\subsection{Character Identification}
The \textit{Character Identification} task requires models to identify the character in an anonymized character description.
Given a summary $S$, a candidate list of characters that appear in the literature summary $C=\{c_1, c_2, ..., c_k\}$, and an anonymized character description $D_{masked}^{c*}$,
the goal in this task is to identify the name of the character $c^*$ described in the anonymized character description. We anonymize character descriptions by masking out all mentions of the character $c^*$ in the original description $D^{c*}$.
\subsection{Character Description Generation}
The \textit{character description generation} task tests the ability of NLP models to critically analyze the narrative from the perspective of characters and generate coherent and insightful character descriptions.
Formally, given a
literature summary, $S$, and a character name, $c$, the
goal in this task is to generate the character's description, $D^{c}$.
Generating the character description necessitates understanding and analyzing every salient information about the character in the literature summary.
\subsection{Human Assessment of \texttt{FiSCU}\xspace}
\label{data-validation}
In order to verify the tractability of these two tasks as well as assessing the quality of the collected \texttt{FiSCU}\xspace dataset,
we
conducted a set of human evaluations on Amazon Mechanical Turk.
We run our human assessment on the full test set of \texttt{FiSCU}\xspace.
\vspace{0.2cm}
\noindent{\bf Assessing the Character Identification task:} In the first human assessment, we showed annotators the literature summaries, anonymized character descriptions
, and a list of character names
(plus one randomly sampled character from the literary piece). The descriptions were anonymized by replacing all mentions of the corresponding character names with blanks.\footnote{\label{anonymizing_footnote}We identified mentions of a character in the summary by using
a coreference system \cite{joshi2019coref,spanbert} as well as by matching the first name or the full name of the character.} For each anonymized character description, we asked 3 judges to identify which character
it is describing by choosing from the list of
choices. The judges also had the option of saying that they are unable to identify the character given the literature summary and the anonymized character description.
\begin{figure}[t]
\centering
\includegraphics[width=1\columnwidth]{figures/human_assess.pdf}
\caption{Human assessment of the feasibility of the character description generation task.
}
\label{fig:human-data-assess}
\end{figure}
\vspace{0.2cm}
\noindent{\bf Assessing the Character Description Generation task:} In the second human assessment, the judges are shown the same summary along with the original de-anonymized character descriptions. For each character description, 3 judges were asked to evaluate the quality of the description by answering the following two questions:
\begin{enumerate}[wide, noitemsep, nolistsep, labelwidth=!, labelindent=0pt
\item {\bf Fact coverage:} Specify how much of the information about the specific character in the corresponding ``character description'' is present in the summary (either explicitly or implicitly). Answer choices included: a) \textit{almost all of the information}, b) \textit{most of the information}, c) \textit{some of the information}, d) \textit{little or none of the information}, and e) \textit{character does not appear in the summary at all}.
\item {\bf Task difficulty:} Given the summary, how easy is it to write the character description on a Likert scale of 0-4 (0 being too difficult, 4 being too easy)? If in the previous question the judges found that some of the information in the character description was not present in the summary, they are asked to disregard that while answering this question. In other words, they only need to consider the information in the character description which is explicitly or implicitly mentioned in the summary.
\end{enumerate}
\begin{figure}[t!]
\centering
\includegraphics[width=0.95\columnwidth]{figures/identification_task.pdf}
\caption{Approaches for \textit{Character Identification}.}
\label{fig:identification}
\end{figure}
We recruited $200$ crowd-workers who were located in the US, UK, or CA, and had a $98\%$ approval rate for at least $5,000$ previous annotations. We collected each annotation from $3$ workers and use majority vote in our assessments. In the Appendix~\ref{appendix-annotations}, we describe several steps we took to alleviate limitations of using crowd-sourcing and ensure high quality annotations. Screenshots of our AMT experiments are provided in the Appendix.
For the first assessment on identifying characters, the human accuracy was $91.80\%$ (Fleiss' Kappa \cite{landis1977measurement} $\kappa = 0.79 $), indicating the feasibility of the task.
For the second assessment of fact coverage and task difficulty, we summarize the result in Fig.~\ref{fig:human-data-assess}.
The top chart (`Fact Coverage') shows that
around 75\% of the of the literature summaries contain reasonable amount of information about the character represented in the corresponding character description. The bottom chart (`Task Difficulty') shows that
more than 90\% of the times, the human judges considered the task of writing the character descriptions from the literature summaries not too difficult.\footnote{There is a natural label bias in the annotations: most of the responses fell into few categories. In this case, standard inter-annotator agreement statistics are not reliable (the well-known paradoxes of kappa \cite{feinstein1990high}). Thus, we simply report a pairwise agreement (i.e., how often do two judges agree on the answer for the same question)
of 0.71 and 0.64 for `fact coverage' and `task difficulty', respectively.}
These results verify the feasibility of understanding and drawing reasonable inferences about characters in the literature summaries from the \texttt{FiSCU}\xspace dataset.
Next, we describe models and establish baseline performances on the two proposed tasks.
\section{Character Identification}
We present two approaches to address this task: (1) solving it as a multiple-choice classification problem, and (2) using a generative classifier that generates, instead of identifying, the character name, as shown in Fig.~\ref{fig:identification}.
In the multiple-choice approach, we use the standard setup introduced in BERT~\cite{devlin-etal-2019-bert} where the text from $c_i$, $D_{masked}^{c*}$ and $S$ (with custom prefix tokens) are concatenated as input, and the
\texttt{[CLS]} token is projected to a final logit. We apply a Softmax function to the logits to obtain the scores for each $c_i$. For training practicalities, we limit the number of choices to 4 during training (using the earliest window of choices which include the correct one).
During inference, we can generate the logits for all the answer choices since they are independent before the final Softmax.
To establish a baseline performance, we experiment with finetuning RoBERTa~\cite{liu2019roberta}, and ALBERT~\cite{Lan2020ALBERT:} which have been shown to perform well in several classification tasks.
However, both these models cannot process inputs longer than 512 tokens and the concatenated inputs are generally much longer. So we also tried Longformer~\cite{Beltagy2020LongformerTL}, a BERT-like model with an attention mechanism designed to scale linearly with sequence length, thus allowing the model to encode longer documents. However, despite trying various hyperparameters, Longformer was not able to match the scores in our experiments.
\begin{table}[t]
\scriptsize
\centering
\input{figures/discriminative_res}
\caption{Accuracy for the \textit{Character Identification}. The `partial' description setup used a truncated description ($50$ words) to allow including more of the summary.
}
\label{tab:disc-res}
\end{table}
Our second approach, a generative classifier, is inspired by~\citet{JMLR:v21:20-074} who studied transfer learning by converting NLP problems into a text-to-text format. The generative classifier addresses the character identification problem by directly generating the character name $\hat{c}$, given all character names (answer choices), the masked character description, and the summary (see Fig.~\ref{fig:identification}).
During inference, we compute the model's probability of each of the answer choices, and output the one with the highest probability.
We use this procedure to train several strong baselines built on top of the following pre-trained transformer-based models: BART~\cite{lewis2019bart}, T5~\cite{JMLR:v21:20-074}, and Longformer~\cite{Beltagy2020LongformerTL}.
\vspace{0.15cm}
\noindent\textbf{Implementation Details.}\space\space The RoBERTa and ALBERT multiple-choice classifiers were trained for 6 epochs, initial learning rate 1e-5 (ADAM optimizer), batch size 16. The generative classifier using BART was trained for 5 epochs, initial learning rate 5e-6, batch size 8. We used the Transformer package~\cite{Wolf2019HuggingFacesTS} for training. The T5 model was trained for 12 epochs on a TPU using the default parameters from the T5 repository (learning rate 1e-3 with AdaFactor, batch size 8).\footnote{\url{https://github.com/google-research/text-to-text-transfer-transformer}}
We truncate the summaries (and descriptions) to satisfy model-specific maximum input length.
\vspace{0.2cm}
\noindent\textbf{Results.}\space\space Table~\ref{tab:disc-res} shows the accuracies of different baselines. The highest accuracy is achieved by ALBERT-XXL ($83.33\%$) followed by T5-11B ($80.16\%$). Although both ALBERT and T5 were given partial character descriptions,
their specific pre-training loss and larger number of parameters (for T5-11B) lead to superior performance over other baselines.
We observe that there is still a significant difference between the human performance ($91.80\%$) and the best model performance ($83.33\%$) on the character identification task, warranting future work on this direction.
\begin{table}[t]
\scriptsize
\centering
\input{figures/results}
\caption{Automatic evaluation results for \textit{Character Description Generation}. BART-L achieved the best BLEU and ROUGE scores while Longformer performed best on BERTScore. }
\label{tab:gen-results}
\end{table}
\section{Character Description Generation}
\label{generative}
We present several strong baselines for generating character descriptions by fine-tuning pre-trained transformer-based language models (LM)~\cite{Vaswani:17}. We study two types of models: (1) a standard left-to-right LM, namely GPT2-L \cite{radford2019language} which is trained with LM objective to predict the next word; and (2) two encoder-decoder models, namely BART\footnote{We use the bart-large-xsum as initial weights as our task can benefit from the summarization capability.} \cite{lewis2019bart} and Longformer~\cite{Beltagy2020LongformerTL}\footnote{\url{https://github.com/allenai/longformer}. We initialize parameters of Longformer with the same pre-trained BART.} which initialize the state of the Transformer by reading the input, and learn to generate the output.
One of the challenges of the proposed task is the length of the summaries, which might exceed the maximum allowable length for most existing pre-trained models. To overcome this, we
either: (1) simply truncate the literature summary at the end, or (2) only keep sentences from the literature summary that have a mention of the character of interest. For the latter, we use a coreference resolution model, SpanBERT~\cite{joshi2019coref,spanbert},
to identify character mentions within a summary. This results in a modified dataset of character-specific literature summaries paired with character descriptions. In addition to these two approaches, we also fine-tune Longformer~\cite{Beltagy2020LongformerTL}
with original full-length literature summary. Longformer leverages an efficient encoding mechanism to avoid the quadratic memory growth and has been previously explored for NLU tasks (encoder-only). We integrate this approach into the pre-trained encoder-decoder BART model to encode inputs longer than its maximum token limit.
All the models take \texttt{[name] $c$ [sum] $S$ [desc]} as input and generate the character description $D^c$ as output.
\vspace{0.05cm}
\noindent\textbf{Experiment with Full Literary Pieces.} \space\space We also run an experiment on a subset of our data with accompanying full-text of the literary pieces.
Since it is infeasible to use the full texts as input given the memory constraints of current models, we coarsely select spans of the full-text
beginning $50$ tokens before, and $50$ tokens after the occurrence of character's name. We use a Longformer model where the input is simply the concatenation of the
selected spans. Due to the small size of the this subset, we perform a $5$-fold cross validation starting from a pre-trained model fine-tuned on summary-description pairs.\footnote{Pre-training data do not contain instances of this subset.
\vspace{0.05cm}
\noindent\textbf{Implementation Details.}\space\space We use the Transformer library~\cite{Wolf2019HuggingFacesTS}. Each baseline was trained for $5$ epochs with effective batch size of $8$, and initial learning rate of 5e-6. We use the maximum input length of $1024$ for GPT2, and $2048$ for BART\footnote{BART originally accepts inputs of maximum 1024 BPE-tokens. We extend this to 2048 by adjusting its positional embeddings.} and the variant of Longformer with truncated input. For experiment with original books, we use $16,384$ which is the maximum allowable input length for Longformer. During inference, we use beam search decoding with $5$ beams.
\begin{figure}
\centering
\includegraphics[width=1.0\columnwidth]{figures/fine-grained-plot-3_new}
\caption{Breakdown results for BART-L on subsets with annotated fact coverage as all/most/some/little. Results for other baselines are provided in Appendix.}
\label{tab:gen-results-fine}
\end{figure}
\subsection{Automatic Evaluation}
Following previous works, we use several standard, widely used
automatic evaluation metrics. We use \textbf{BLEU-4}~\cite{papineni2002bleu} that measures overlap of \textit{n}-gram up to $n=4$, \textbf{ROUGE-\textit{n}} ($n{=}1,2$), and \textbf{ROUGE-L} F-1 scores~\cite{lin2004rouge}\footnote{Note that we did not include perplexity score as it is not comparable across LM-based and encoder-decoder models.}
. However, recent works~\cite{novikova2017we, wang-etal-2018-metrics} have raised concerns on the usage of these metrics as they fail to capture paraphrases and conceptual information. To overcome these issues, we additionally include a model-based metric, \textbf{BERTScore}~\cite{bert-score}, which measures the cosine similarity between contextualized embeddings of the gold and generated outputs.\footnote{We use the code at \url{https://github.com/Tiiiger/bert_score}
The result of the automatic evaluation is presented in Table~\ref{tab:gen-results}. According to the table, BART-L consistently achieves the best performance across BLEU and ROUGE scores. However, Longformer achieves a slightly better BERTScore.
Both BART and Longformer outperform GPT2 in general. This can be in part because BART and Longformer can handle longer context, and are initially pre-trained on a combination of books and Wikipedia data and further fine-tuned on summarization tasks, while GPT2 is pre-trained on WebText only.\footnote{While these models could have had access to the original book text, they do not have access to the character descriptions (our outputs) during pre-training. So, this information should not principally change any of our empirical conclusions.}
Models perform relatively better in the length truncation setups than in the coreference truncatio
. We posit that this is because a lot of the key points about major characters are likely to appear earlier in the book summary (favoring length truncation). Also, there might be errors introduced by the coreference resolution model itself.
\begin{table}[t]
\scriptsize
\centering
\input{figures/full_book_results}
\caption{Automatic evaluation results for models using full-text of books vs. literature summaries.}
\label{tab:full-book}
\end{table}
In order
to have a better insight into the models' performance with respect to varying level of task feasibility, in Fig.~\ref{tab:gen-results-fine}, we
additionally report the breakdown of the results for BART-L on separate subsets
with ``almost all'', ``most'', ``some'', ``little or none'' of the information about the character
(refer to \textit{Fact Coverage} in \S\ref{data-validation}). As expected, we observe a consistent decline in the performance with lower amount of fact coverage. Results for other baselines are reported in Table~\ref{tab:gen-results-fine-rest} of the Appendix.
In Table ~\ref{tab:full-book}, we compare the models when using selected spans from the original literary piece as the input vs. literature summaries as the input.
We observe a decline in performance when we used the full text.
This reveals that even though the literary pieces contain all the character information, this information is scattered which makes it harder
for the model to identify important facts about the character. Using full texts also requires encoders which are better at understanding dialog, first-person narratives and different writing styles of the authors.
We invite the community to consider this challenging but important problem.
\begin{figure}[t]
\centering
\includegraphics[width=0.90\columnwidth]{figures/human-eval-2.pdf}
\caption{Human evaluation of generated character descriptions. While the descriptions are grammatically correct and logically coherent, they often misrepresent or miss important details about the character.}
\label{fig:human-desc-eval}
\end{figure}
\subsection{Human Evaluation}
\label{sec:human_eval}
To better evaluate the quality of the generated character descriptions, we conduct a human evaluation on $100$ test pairs of literature summaries and character descriptions generated by the BART-L model
on Amazon Mechanical Turk.\footnote{Here we are evaluating $4$ character descriptions per summary, for the total of $25$ literature summaries.} Given a literature summary and multiple generated character descriptions (shown one by one), the workers were asked to rate each generated description on a Likert scale of $1-5$ ($1$ being the worst, and $5$ being the best) according to the following criteria: (1) \textbf{Grammatical correctness} to indicate if the generated description is grammatically correct, (2) \textbf{Logical correctness} to indicate whether the generated description is logically meaningful and coherent, (3) \textbf{Faithfulness} of the generated description with respect to the given summary (a faithful character description will not mention facts which are irrelevant to
the character and/or not stated in the summary), (4) \textbf{Centrality} to evaluate whether the description captures important details and key facts about the character, and finally (5) the \textbf{Overall score} considering all the four criteria listed above. We provide a screenshot of the experiment in Fig.~\ref{fig:human-assess-2} of the Appendix.
Fig.~\ref{fig:human-desc-eval} presents the results of this human evaluation.
We observe that the generated descriptions show a reasonable level of grammatical ($4.43$) and logical correctness ($3.94$). However, they lack behind when it comes to faithfulness ($3.11$) and centrality ($3.10$).
We also report the distribution of ratings in Table~\ref{tab:human-eval-dist}.
These results indicate that solving this task requires designing better models of character-centric analysis of narrative.
\begin{table}[t]
\footnotesize
\centering
\input{figures/human-eval-dist}
\caption{Percentage of different ratings from human evaluation of generated descriptions (1=worst, 5=best).}
\label{tab:human-eval-dist}
\end{table}
\begin{table}[t]
\footnotesize
\centering
\input{figures/analysis_res}
\caption{Error Analysis: proportion of generated descriptions with different error types.}
\label{tab:analysis}
\end{table}
\subsection{Qualitative Analysis}
\label{sec:analysis}
\input{6-analysis}
\section{Introduction}
\label{sec:intro}
\input{1-intro}
\section{Background}
\label{sec:background}
\input{2-background}
\section{The LiSCU Dataset}
\label{sec:data}
\input{3-data}
\input{4-model}
\section{Conclusion}
\label{sec:conclusion}
\input{7-conclusion}
\section*{Acknowledgments}
This work was supported in part by ETH Grant (ETH-19 21-1) and NSF grant IIS2047232. We would also like to thank Jena D. Hwang for helping with designing the AMT task.
\section*{Broader Impacts and Ethics Statement}
\label{sec:bias}
\noindent{\bf Bias in Narrative Texts:}
\texttt{FiSCU}\xspace is based on novels which often reflect societal norms and biases of their times. Such a dataset can be used to understand societal bias as well as design Natural Language Understanding models that can be more aware of and possibly even avoid such biases. With this motivation, we analyzed the issue of gender bias in \texttt{FiSCU}\xspace.
First, we inferred the gender of the characters in our dataset using the pronouns used to refer to them. We could not infer the gender of some of the characters because of errors in the coreference system or lack of enough mentions, and we filtered them out for this analysis. We found that there are significantly more male characters than female characters in our dataset. Specifically, $66\%$ of the characters are male. This suggests that systems that do not account for this bias might end up having more training data (and hence yield better performance) on descriptions of male characters than of female characters.
Second, we also investigated the scope of gender bias in the summaries. We computed the average number of mentions of male and female characters (in the summaries). We found that on average male and female characters are mentioned $32.1$ and $31.7$ times, respectively. This indicates that even though there are fewer female characters in the literary pieces of our dataset, the ones that are present play a significant role in the development of the narrative. Possibly because of their importance in the narrative, they are mentioned as many times as male characters in the summary (which describes the main developments and not all details from the literary piece).
Third, we investigated if the literary experts who composed the descriptions were biased in their analysis. For this, we compute the length of character descriptions of various characters. We found that there is no significant difference between male and female characters in this aspect. Specifically, the average number of tokens in the description of a male character was $203$, and that of a female character was $200$. Also, the average number of sentences in the description of a male character was $9.4$ and that of a female character was $9.3$. This also aligns with our observation in the previous experiment where we found that female characters, though fewer, play important roles in the narrative, and so their descriptions are not any shorter than descriptions of male characters. Overall, this analysis suggests that descriptions are not biased in their treatment of male and female characters.
In any language generation setting, such as ours, there is the possibility of (potentially harmful) social biases that can be introduced in the training data. As we did not specifically control or regularize our model to remove the possibility of such biases, we would urge downstream users to undertake the necessary quality-assurance testing to evaluate the extent to which such biases might be present and impacting their trained system and to make modifications to their model and procedures accordingly.
\noindent{\bf Human participation in our study :} We conducted 2 human evaluations on Amazon Mechanical Turk. To ensure the annotators were fairly compensated, we did several rounds of test runs and estimated the average time to finish one HIT. Workers were paid \$12/hr based on the HIT timings.
We did not ask any personal, sensitive or identifying information from the annotators.
\section{Collecting Annotations from Crowd Workers}
\label{appendix-annotations}
To alleviate the limitations of crowd-sourcing and ensure high quality of annotations, we took several steps. First, we conducted a pilot annotation exercise where we (authors) assessed the feasibility of the proposed task on a subset (250 instances) of the data. This pilot annotation helped us set up the task on AMT in a way that would make the task feasible for turkers (e.g. by asking clear concise questions). Second, we designed our setup to avoid annotator fatigue by asking them to read the summary context once and answer questions about all characters in that summary. Third, we ran a few experiments on AMT (before annotating the entire set) where we also included a `comment` section for turkers to allow them to bring up issues or ambiguities in our setup. We then manually analyzed the results and modified the tasks based on the comments. Finally, after annotating the entire set, we computed inter-annotator agreement as a way to ensure trust in the annotation quality. We found reasonable agreements between annotators as reported in Footnote 10 of the paper. We would also like to mention that we received several comments from the annotators that they found the task very interesting and enjoyable.
\begin{table*}[t]
\scriptsize
\centering
\input{figures/results_fine_shortened}
\caption{Breakdown results on subsets of test set with annotated fact coverage as all/most/some/little.}
\label{tab:gen-results-fine-rest}
\end{table*}
\begin{table*}[t]
\renewcommand{\arraystretch}{1.2}
\scriptsize
\centering
\input{figures/example3_w_sum}
\caption{Qualitative example 1 for the generated descriptions. Words in \textcolor{red}{red} correspond to hallucinated or missing content, words in \textcolor{MengGreen}{green} correspond to faithful information. }
\label{tab:errore_examples1}
\end{table*}
\begin{table*}[t]
\renewcommand{\arraystretch}{1.2}
\scriptsize
\centering
\input{figures/example4_w_sum}
\caption{Qualitative example 2 for the generated descriptions. Words in \textcolor{red}{red} correspond to hallucinated or missing content, and words in \textcolor{MengGreen}{green} correspond to faithful information. }
\label{tab:errore_examples2}
\end{table*}
\begin{table*}[t]
\renewcommand{\arraystretch}{1.2}
\scriptsize
\centering
\input{figures/example2_w_sum}
\caption{Qualitative example 3 for the generated descriptions. Words in \textcolor{red}{red} correspond to hallucinated or missing content, words in \textcolor{MengGreen}{green} correspond to faithful information, and \underline{underline} corresponds to generic repetitive content. }
\label{tab:errore_examples3}
\end{table*}
\newpage
\begin{table*}[t]
\renewcommand{\arraystretch}{1.2}
\scriptsize
\centering
\input{figures/example1_w_sum}
\caption{Qualitative example 4 for the generated descriptions. words in \textcolor{MengGreen}{green} correspond to faithful information, and \underline{underline} corresponds to generic repetitive content. }
\label{tab:errore_examples4}
\end{table*}
\begin{figure*}[t]
\centering
\includegraphics[width=0.9\linewidth]{figures/amt_1.jpg}
\caption{An illustration of human assessment on AMT.}
\label{fig:human-assess-1}
\end{figure*}
\begin{figure*}[t]
\centering
\includegraphics[width=0.8\linewidth]{figures/amt_2.png}
\caption{An illustration of human evaluation for generated character description.}
\label{fig:human-assess-2}
\end{figure*}
|
{
"redpajama_set_name": "RedPajamaArXiv"
}
| 5,026 |
[
128000,
1432,
59,
69974,
90,
1061,
11348,
323,
82631,
534,
59,
1530,
90,
695,
20024,
772,
633,
1687,
14890,
1144,
1342,
5683,
90,
23550,
3624,
52,
11281,
87,
8920,
505,
5370,
2930,
4007,
28292,
1778,
439,
1144,
1342,
5683,
90,
939,
6489,
454,
2186,
59,
5447,
10179,
36802,
1103,
90,
2485,
1129,
2185,
2452,
6489,
454,
916,
14607,
18339,
84792,
288,
13631,
2058,
1598,
3500,
1144,
1342,
5683,
90,
68583,
22405,
2186,
59,
5447,
10179,
36802,
1103,
90,
2485,
1129,
2185,
33646,
18790,
916,
13631,
275,
14,
3500,
220,
1144,
1342,
5683,
90,
5176,
19383,
22405,
2186,
59,
5447,
10179,
36802,
1103,
90,
2485,
1129,
2185,
6894,
19383,
18790,
916,
13631,
2058,
1598,
3500,
323,
1144,
1342,
5683,
90,
70054,
65978,
92,
7255,
5447,
10179,
36802,
1103,
90
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
1432,
59,
69974,
90,
1061,
11348,
323,
82631,
534,
59,
1530,
90,
695,
20024,
772,
633,
1687,
14890,
1144,
1342,
5683,
90,
23550,
3624,
52,
11281,
87,
8920,
505,
5370,
2930,
4007,
28292,
1778,
439,
1144,
1342,
5683,
90,
939,
6489,
454,
2186,
59,
5447,
10179,
36802,
1103,
90,
2485,
1129,
2185,
2452,
6489,
454,
916,
14607,
18339,
84792,
288,
13631,
2058,
1598,
3500,
1144,
1342,
5683,
90,
68583,
22405,
2186,
59,
5447,
10179,
36802,
1103,
90,
2485,
1129,
2185,
33646,
18790,
916,
13631,
275,
14,
3500,
220,
1144,
1342,
5683,
90,
5176,
19383,
22405,
2186,
59,
5447,
10179,
36802,
1103,
90,
2485,
1129,
2185,
6894,
19383,
18790,
916,
13631,
2058,
1598,
3500,
323,
1144,
1342,
5683,
90,
70054,
65978,
92,
7255,
5447,
10179,
36802,
1103,
90,
-100
] |
Among the players, Rilee Rossouw made himself indispensable to a Ranpur Riders' line-up consisting of de Villiers, Hales and Gayle, despite initially being picked as a back-up option.
Shamsur Rahman, who last played for Bangladesh five years ago, became Comilla Victorians' middle-order mainstay despite hardly being in the reckoning even in the domestic scene.
The mistakes in graphics stood out more starkly. Khaled Ahmed's age was shown as 119, wrong names of batsmen at the crease, incorrect scores and scoring equations became regular. In the second qualifier, the bowler who took the wicket, Mashrafe Mortaza, was mentioned as the batsman.
In terms of star-power and shorter length of the tournament, the BPL is ahead of Australia's BBL. There being no stipulation in a franchise's budget is BPL's distinct advantage, as well as allowing four overseas players in the line-up. BBL has a budget cap and allows only two overseas in the XI.
But the BBL's pitches remain of superior quality, acting as a catalyst for exciting cricket. The BPL has to do far more to expand itself within Bangladesh, which would give the overused Mirpur pitches much-needed rest.
|
{
"redpajama_set_name": "RedPajamaC4"
}
| 5,856 |
[
128000,
34710,
279,
4311,
11,
432,
64166,
21116,
283,
86,
1903,
5678,
64284,
311,
264,
39431,
26047,
87170,
6,
1584,
5352,
31706,
315,
409,
16959,
4918,
11,
473,
3916,
323,
21334,
273,
11,
8994,
15453,
1694,
13061,
439,
264,
1203,
5352,
3072,
627,
2059,
4214,
324,
98376,
11,
889,
1566,
6476,
369,
39601,
4330,
1667,
4227,
11,
6244,
1219,
6374,
33412,
5493,
6,
6278,
24747,
1925,
60021,
8994,
20781,
1694,
304,
279,
29299,
20324,
1524,
304,
279,
13018,
6237,
627,
791,
21294,
304,
14515,
14980,
704,
810,
38246,
398,
13,
735,
60985,
41769,
596,
4325,
574,
6982,
439,
220,
9079,
11,
5076,
5144,
315,
43308,
5794,
520,
279,
1922,
521,
11,
15465,
12483,
323,
20413,
39006,
6244,
5912,
13,
763,
279,
2132,
61747,
11,
279,
15631,
1565,
889
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
34710,
279,
4311,
11,
432,
64166,
21116,
283,
86,
1903,
5678,
64284,
311,
264,
39431,
26047,
87170,
6,
1584,
5352,
31706,
315,
409,
16959,
4918,
11,
473,
3916,
323,
21334,
273,
11,
8994,
15453,
1694,
13061,
439,
264,
1203,
5352,
3072,
627,
2059,
4214,
324,
98376,
11,
889,
1566,
6476,
369,
39601,
4330,
1667,
4227,
11,
6244,
1219,
6374,
33412,
5493,
6,
6278,
24747,
1925,
60021,
8994,
20781,
1694,
304,
279,
29299,
20324,
1524,
304,
279,
13018,
6237,
627,
791,
21294,
304,
14515,
14980,
704,
810,
38246,
398,
13,
735,
60985,
41769,
596,
4325,
574,
6982,
439,
220,
9079,
11,
5076,
5144,
315,
43308,
5794,
520,
279,
1922,
521,
11,
15465,
12483,
323,
20413,
39006,
6244,
5912,
13,
763,
279,
2132,
61747,
11,
279,
15631,
1565,
889,
-100
] |
Give Me the Future is het vierde studioalbum van de Britse band Bastille. Het werd op 4 februari 2022 uitgebracht en bevat onder andere de singles Distorted Light Beam, Thelma + Louise, No Bad Days, Shut Off the Lights en titelnummer Give Me the Future. Het album werd opgenomen in Londen en geproduceerd door Mark Crew, Dan Smith, Daniel Priddy, Marty Maro, Ryan Tedder en Jonny Coffer. Een deluxe editie van het album verscheen op 7 februari, en bevat onder andere de single Survivin' die eerder al op de EP Goosebumps stond. Give Me the Future vormt een dubbelalbum met Dreams of the Past, dat verscheen op 26 augustus 2022.
Recensies
Alhoewel de singles geen groot succes kenden, werd het album wel zeer goed ontvangen door critici. NME gaf het album een vier op vijf, en sprak van "a perfect soundtrack to life after lockdown". Ook Dork gaf het album een vier op vijf. Clash schreef dat Bastilles "tried-and-true formula has yet to fail", en gaf het album een acht op tien. Rolling Stone noemde het album "the best and most surprising album of their career to date". Het eerste liveoptreden met alle nummers van Give Me the Future kreeg van Rolling Stone zelfs een vijf op vijf, schrijvend dat "things are looking bigger, brighter and better than ever for one of Britain's best bands". Humo en De Morgen waren minder positief en gaven het album een drie op vijf, maar De Morgen sprak wel van "muziek die zich kiplekker voelt" en een "kraakverse productie". The Telegraph gaf het album een vier op vijf en noemde het "gloriously addictive". Ook The Independent gaf een vier op vijf, en schreef "the future is bright – for 30 minutes' worth of bops, at least". DIY gaf het album een drieënhalf op vijf, met als reden dat "Bastille's choral, digestible power pop DNA is present, but grittier than usual". Gigwise gaf het album een acht op tien, en sprak van "their best record since Bad Blood". Give Me the Future werd Album van de Week op NPO Radio 2.
Tracks
Muziekalbum uit 2022
Muziekalbum van Bastille
|
{
"redpajama_set_name": "RedPajamaWikipedia"
}
| 850 |
[
128000,
36227,
2206,
279,
12781,
374,
9194,
58193,
451,
14356,
21687,
5355,
409,
5567,
325,
7200,
46168,
4618,
13,
34266,
73697,
1200,
220,
19,
1172,
33713,
2850,
220,
2366,
17,
25290,
713,
86526,
665,
387,
50813,
38861,
34036,
409,
17845,
28704,
13909,
8828,
51230,
11,
666,
301,
1764,
489,
56578,
11,
2360,
11717,
21882,
11,
49374,
4206,
279,
35270,
665,
8305,
301,
69019,
21335,
2206,
279,
12781,
13,
34266,
8176,
73697,
1200,
4469,
6431,
304,
445,
73316,
665,
84042,
48945,
14685,
6134,
4488,
36037,
11,
11824,
9259,
11,
15469,
2394,
76670,
11,
56254,
2947,
78,
11,
13960,
23989,
1126,
665,
12565,
3919,
356,
26133,
13,
57518,
79524,
4600,
648,
5355,
9194,
8176,
5553,
1557,
268,
1200,
220,
22,
1172,
33713,
2850,
11,
665,
387,
50813,
38861,
34036,
409
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
36227,
2206,
279,
12781,
374,
9194,
58193,
451,
14356,
21687,
5355,
409,
5567,
325,
7200,
46168,
4618,
13,
34266,
73697,
1200,
220,
19,
1172,
33713,
2850,
220,
2366,
17,
25290,
713,
86526,
665,
387,
50813,
38861,
34036,
409,
17845,
28704,
13909,
8828,
51230,
11,
666,
301,
1764,
489,
56578,
11,
2360,
11717,
21882,
11,
49374,
4206,
279,
35270,
665,
8305,
301,
69019,
21335,
2206,
279,
12781,
13,
34266,
8176,
73697,
1200,
4469,
6431,
304,
445,
73316,
665,
84042,
48945,
14685,
6134,
4488,
36037,
11,
11824,
9259,
11,
15469,
2394,
76670,
11,
56254,
2947,
78,
11,
13960,
23989,
1126,
665,
12565,
3919,
356,
26133,
13,
57518,
79524,
4600,
648,
5355,
9194,
8176,
5553,
1557,
268,
1200,
220,
22,
1172,
33713,
2850,
11,
665,
387,
50813,
38861,
34036,
409,
-100
] |
Akihabara has more news today of new laptops in the shape of the Samsung Sense X1.
Sony have added fingerprint security to their line up of VAIO laptops with the Sony VAIO BX model.
gizmag has news of Samsungs 19 inch laptop - the Samsung M70 which will be released in October.
The Samsung M70's obvious draw card is its massive screen but also features high speed CPU and graphics chip from Nvidia and will weigh as little as Samsung's 17 inch model.
|
{
"redpajama_set_name": "RedPajamaC4"
}
| 1,180 |
[
128000,
32,
6780,
10796,
5169,
706,
810,
3754,
3432,
315,
502,
48985,
304,
279,
6211,
315,
279,
18907,
47329,
1630,
16,
627,
63365,
617,
3779,
43697,
4868,
311,
872,
1584,
709,
315,
21571,
3895,
48985,
449,
279,
21533,
21571,
3895,
64375,
1646,
627,
70,
450,
31606,
706,
3754,
315,
18907,
82,
220,
777,
17560,
21288,
482,
279,
18907,
386,
2031,
902,
690,
387,
6004,
304,
6664,
627,
791,
18907,
386,
2031,
596,
8196,
4128,
3786,
374,
1202,
11191,
4264,
719,
1101,
4519,
1579,
4732,
14266,
323,
14515,
16797,
505,
62467,
323,
690,
17988,
439,
2697,
439,
18907,
596,
220,
1114,
17560,
1646,
13,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0
] |
[
32,
6780,
10796,
5169,
706,
810,
3754,
3432,
315,
502,
48985,
304,
279,
6211,
315,
279,
18907,
47329,
1630,
16,
627,
63365,
617,
3779,
43697,
4868,
311,
872,
1584,
709,
315,
21571,
3895,
48985,
449,
279,
21533,
21571,
3895,
64375,
1646,
627,
70,
450,
31606,
706,
3754,
315,
18907,
82,
220,
777,
17560,
21288,
482,
279,
18907,
386,
2031,
902,
690,
387,
6004,
304,
6664,
627,
791,
18907,
386,
2031,
596,
8196,
4128,
3786,
374,
1202,
11191,
4264,
719,
1101,
4519,
1579,
4732,
14266,
323,
14515,
16797,
505,
62467,
323,
690,
17988,
439,
2697,
439,
18907,
596,
220,
1114,
17560,
1646,
13,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100
] |
Blue-Eyed Mary is a lost 1918 silent film drama directed by Harry Millarde and starring June Caprice. It was produced and released by Fox Film Corporation.
Cast
June Caprice - Mary Du Bois
Helen Tracy - Mrs. Van Twiller Du Bois
Blanche Hines - Jeanette
Bernard Randall - Cecil Harrington
Thomas F. Fallon - Jones, the Butler(*as Thomas Fallon)
Jack McLean - Tom Vane
Florence Ashbrooke - Bridget
Henry Hallam - Henry Leffingwell
See also
1937 Fox vault fire
References
External links
1918 films
American silent feature films
Lost American films
Fox Film films
Films directed by Harry F. Millarde
American black-and-white films
Silent American drama films
1918 drama films
1918 lost films
Lost drama films
1910s American films
|
{
"redpajama_set_name": "RedPajamaWikipedia"
}
| 6,104 |
[
128000,
10544,
13737,
88,
291,
10455,
374,
264,
5675,
220,
7529,
23,
21737,
4632,
20156,
15910,
555,
14253,
8384,
42441,
323,
40500,
5651,
8171,
23994,
13,
1102,
574,
9124,
323,
6004,
555,
13585,
17042,
13332,
382,
19235,
198,
28259,
8171,
23994,
482,
10455,
16062,
2577,
285,
198,
39,
8564,
60342,
482,
18083,
13,
13000,
12015,
15610,
16062,
2577,
285,
198,
5028,
29097,
473,
1572,
482,
20263,
6672,
198,
61026,
569,
68444,
482,
90227,
15591,
4910,
198,
42493,
435,
13,
88168,
482,
12201,
11,
279,
38325,
4163,
300,
11355,
88168,
340,
33731,
4584,
49862,
482,
8529,
650,
2194,
198,
93387,
16271,
14937,
15222,
4845,
482,
32437,
456,
198,
64463,
11166,
309,
482,
18063,
2009,
544,
287,
9336,
271,
10031,
1101,
198,
7285,
22,
13585,
35684,
4027,
271,
32812,
271
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
10544,
13737,
88,
291,
10455,
374,
264,
5675,
220,
7529,
23,
21737,
4632,
20156,
15910,
555,
14253,
8384,
42441,
323,
40500,
5651,
8171,
23994,
13,
1102,
574,
9124,
323,
6004,
555,
13585,
17042,
13332,
382,
19235,
198,
28259,
8171,
23994,
482,
10455,
16062,
2577,
285,
198,
39,
8564,
60342,
482,
18083,
13,
13000,
12015,
15610,
16062,
2577,
285,
198,
5028,
29097,
473,
1572,
482,
20263,
6672,
198,
61026,
569,
68444,
482,
90227,
15591,
4910,
198,
42493,
435,
13,
88168,
482,
12201,
11,
279,
38325,
4163,
300,
11355,
88168,
340,
33731,
4584,
49862,
482,
8529,
650,
2194,
198,
93387,
16271,
14937,
15222,
4845,
482,
32437,
456,
198,
64463,
11166,
309,
482,
18063,
2009,
544,
287,
9336,
271,
10031,
1101,
198,
7285,
22,
13585,
35684,
4027,
271,
32812,
271,
-100
] |
package com.pivotal.gemfirexd.internal.engine.jayway.jsonpath.spi.json;
public enum Mode {
SLACK(-1),
STRICT(1);
private final int mode;
Mode(int mode) {
this.mode = mode;
}
public int intValue() {
return mode;
}
public Mode parse(int mode) {
if (mode == -1) {
return SLACK;
} else if (mode == 1) {
return STRICT;
} else {
throw new IllegalArgumentException("Mode " + mode + " not supported");
}
}
}
|
{
"redpajama_set_name": "RedPajamaGithub"
}
| 3,337 |
[
128000,
198,
1757,
470,
558,
344,
2426,
1326,
336,
11029,
9902,
18765,
25421,
1190,
352,
3195,
4421,
2398,
56709,
4421,
401,
898,
7773,
14904,
1504,
262,
17216,
4122,
4172,
16,
1350,
262,
30110,
7,
16,
629,
262,
879,
1620,
528,
3941,
401,
262,
14904,
1577,
3941,
8,
341,
286,
420,
23841,
284,
3941,
280,
262,
557,
262,
586,
528,
54177,
368,
341,
286,
471,
3941,
280,
262,
557,
262,
586,
14904,
4820,
1577,
3941,
8,
341,
286,
422,
320,
8684,
624,
482,
16,
8,
341,
310,
471,
17216,
4122,
280,
286,
335,
775,
422,
320,
8684,
624,
220,
16,
8,
341,
310,
471,
30110,
280,
286,
335,
775,
341,
310,
2571,
502,
22085,
446,
3720,
330,
489,
3941,
489,
330,
539,
7396,
803,
286,
457,
262,
4555,
534
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
198,
1757,
470,
558,
344,
2426,
1326,
336,
11029,
9902,
18765,
25421,
1190,
352,
3195,
4421,
2398,
56709,
4421,
401,
898,
7773,
14904,
1504,
262,
17216,
4122,
4172,
16,
1350,
262,
30110,
7,
16,
629,
262,
879,
1620,
528,
3941,
401,
262,
14904,
1577,
3941,
8,
341,
286,
420,
23841,
284,
3941,
280,
262,
557,
262,
586,
528,
54177,
368,
341,
286,
471,
3941,
280,
262,
557,
262,
586,
14904,
4820,
1577,
3941,
8,
341,
286,
422,
320,
8684,
624,
482,
16,
8,
341,
310,
471,
17216,
4122,
280,
286,
335,
775,
422,
320,
8684,
624,
220,
16,
8,
341,
310,
471,
30110,
280,
286,
335,
775,
341,
310,
2571,
502,
22085,
446,
3720,
330,
489,
3941,
489,
330,
539,
7396,
803,
286,
457,
262,
4555,
534,
-100
] |
Auto Classifieds Home All Listings Login Register Post New Ads Auto Knowledge
alexsmith all listings:
[1] [New York]Air Canada Last Minute Flights (2019-12-13 18:11:45)
[2] [New York]Hotmail Account Recovery (2019-12-12 17:55:28)
[3] [New York]Republic Airlines Reservations (2019-12-11 16:56:51)
[4] [New York]Hawaiian Airlines Reservations (2019-12-10 17:13:27)
[5] [New York]Delta Seat Selection (2019-12-09 17:11:48)
[6] [New York]Delta Airlines 24 Hours Customer Service (2019-12-06 17:20:35)
[7] [New York]Alitalia reservations (2019-12-04 18:08:38)
[8] [New York]Christmas Flight Deals (2019-11-30 15:36:11)
[9] [New York]United Airlines Business Class Upgrade (2019-11-29 17:05:06)
[10] [New York]Delta Airlines Discount (2019-11-28 18:17:07)
[11] [New York]Southwest Airlines Promo Codes (2019-11-27 17:55:41)
[12] [New York]Emirates Airlines Cancellation Policy (2019-11-26 18:26:36)
[13] [New York]Cathay Pacific Group Bookings (2019-11-25 17:17:52)
[14] [New York]Delta Airlines Baggage Policy (2019-11-22 17:44:53)
[15] [New York]Southwest Airlines Group Travel (2019-11-19 17:54:55)
[16] [New York]KLM Airlines Reservations (2019-11-18 20:03:47)
[17] [New York]Cheap Flight To South Dakota (2019-11-15 18:18:53)
[18] [New York]Southwest Airlines $69 Sale (2019-11-14 18:04:39)
[19] [New York]Sun Country Reservations (2019-11-13 15:04:34)
Pages: Total 219 items, Per page 20 items, Current page 11/11.
First 2 3 4 5 6 7 8 9 10 11 Last
Auto Classifieds Notice
Welcome to Free Auto Classifieds website. At Autonz.Com, you can freely post your online Auto Classifieds Ads. It takes only a minute to sell or buy your new or used car here.
Partner: Short funny jokes Really funny jokes
Copyright © 2010 AutoNz.Com Free Auto Classifieds All Rights Reserved.
About Us | Contact Us | Privacy Policy | Disclaimer | RssFeed | Auto Classifieds
|
{
"redpajama_set_name": "RedPajamaCommonCrawl"
}
| 1,807 |
[
128000,
13556,
80536,
82,
5492,
2052,
84984,
8955,
8618,
3962,
1561,
43283,
9156,
33025,
198,
56975,
34117,
682,
26544,
512,
58,
16,
60,
510,
3648,
4356,
60,
26777,
7008,
8155,
56267,
3061,
2866,
320,
679,
24,
12,
717,
12,
1032,
220,
972,
25,
806,
25,
1774,
340,
58,
17,
60,
510,
3648,
4356,
60,
20780,
3796,
8785,
35011,
320,
679,
24,
12,
717,
12,
717,
220,
1114,
25,
2131,
25,
1591,
340,
58,
18,
60,
510,
3648,
4356,
60,
39963,
35230,
1838,
46921,
320,
679,
24,
12,
717,
12,
806,
220,
845,
25,
3487,
25,
3971,
340,
58,
19,
60,
510,
3648,
4356,
60,
39,
37069,
1122,
35230,
1838,
46921,
320,
679,
24,
12,
717,
12,
605,
220,
1114,
25,
1032,
25,
1544,
340,
58,
20,
60,
510
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
13556,
80536,
82,
5492,
2052,
84984,
8955,
8618,
3962,
1561,
43283,
9156,
33025,
198,
56975,
34117,
682,
26544,
512,
58,
16,
60,
510,
3648,
4356,
60,
26777,
7008,
8155,
56267,
3061,
2866,
320,
679,
24,
12,
717,
12,
1032,
220,
972,
25,
806,
25,
1774,
340,
58,
17,
60,
510,
3648,
4356,
60,
20780,
3796,
8785,
35011,
320,
679,
24,
12,
717,
12,
717,
220,
1114,
25,
2131,
25,
1591,
340,
58,
18,
60,
510,
3648,
4356,
60,
39963,
35230,
1838,
46921,
320,
679,
24,
12,
717,
12,
806,
220,
845,
25,
3487,
25,
3971,
340,
58,
19,
60,
510,
3648,
4356,
60,
39,
37069,
1122,
35230,
1838,
46921,
320,
679,
24,
12,
717,
12,
605,
220,
1114,
25,
1032,
25,
1544,
340,
58,
20,
60,
510,
-100
] |
Nicole joined the Company during 2017. She is based in the mid Wales office in Llanidloes, Powys, from where she works within the Finance and Administrative Team. Nicole has an extensive background in finance and has carried out some studies in Archaeology in her student days.
Nicole is a qualified Chartered Accountant and looks to develop these skills within the dynamic and exciting environment of Archaeology Wales.
|
{
"redpajama_set_name": "RedPajamaC4"
}
| 23 |
[
128000,
58916,
1286,
11096,
279,
8351,
2391,
220,
679,
22,
13,
3005,
374,
3196,
304,
279,
5209,
23782,
5274,
304,
445,
10946,
125419,
288,
11,
24523,
1065,
11,
505,
1405,
1364,
4375,
2949,
279,
23261,
323,
52941,
8068,
13,
45130,
706,
459,
16781,
4092,
304,
17452,
323,
706,
11953,
704,
1063,
7978,
304,
66102,
2508,
304,
1077,
5575,
2919,
627,
58916,
1286,
374,
264,
15337,
4969,
34259,
8785,
519,
323,
5992,
311,
2274,
1521,
7512,
2949,
279,
8915,
323,
13548,
4676,
315,
66102,
2508,
23782,
13,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0
] |
[
58916,
1286,
11096,
279,
8351,
2391,
220,
679,
22,
13,
3005,
374,
3196,
304,
279,
5209,
23782,
5274,
304,
445,
10946,
125419,
288,
11,
24523,
1065,
11,
505,
1405,
1364,
4375,
2949,
279,
23261,
323,
52941,
8068,
13,
45130,
706,
459,
16781,
4092,
304,
17452,
323,
706,
11953,
704,
1063,
7978,
304,
66102,
2508,
304,
1077,
5575,
2919,
627,
58916,
1286,
374,
264,
15337,
4969,
34259,
8785,
519,
323,
5992,
311,
2274,
1521,
7512,
2949,
279,
8915,
323,
13548,
4676,
315,
66102,
2508,
23782,
13,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100
] |
Do you know Colorful Creations ? It's a blog with weekly challenge with themes like Sketch, Word, Inspired By and Plus Challenge. Did you know they had a Design Team call ? I totally go for it !
Papers by K&Company, American Crafts and Bella Blvd, cling stamps by recollections, Artist pen Big Brush by Faber-Castell in cobalt blue and cobalt green, white Gelato by Faber-Castell, stickers by The Paper Studio, mesh, lace and ribbon found at Hobby Lobby, white gel pen, alphabet stickers by American Crafts.
awesome page! good luck on the dt call!
Great take on the sketch and the colours are wonderful. Good luck!
|
{
"redpajama_set_name": "RedPajamaC4"
}
| 8,828 |
[
128000,
5519,
499,
1440,
3562,
1285,
7948,
811,
949,
1102,
596,
264,
5117,
449,
17496,
8815,
449,
22100,
1093,
39501,
11,
9506,
11,
65925,
3296,
323,
12623,
26323,
13,
14910,
499,
1440,
814,
1047,
264,
7127,
8068,
1650,
949,
358,
12756,
733,
369,
433,
59162,
47,
9724,
555,
735,
5,
14831,
11,
3778,
66041,
323,
55600,
50541,
11,
78264,
50312,
555,
1421,
3184,
11,
29459,
5869,
6295,
34088,
555,
19797,
261,
7813,
561,
616,
304,
34928,
3223,
6437,
323,
34928,
3223,
6307,
11,
4251,
45482,
4428,
555,
19797,
261,
7813,
561,
616,
11,
50396,
555,
578,
18343,
19074,
11,
11546,
11,
46793,
323,
45667,
1766,
520,
73692,
64066,
11,
4251,
18316,
5869,
11,
28890,
50396,
555,
3778,
66041,
627,
17300,
2199,
0,
1695,
15369,
389,
279,
7748,
1650
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
5519,
499,
1440,
3562,
1285,
7948,
811,
949,
1102,
596,
264,
5117,
449,
17496,
8815,
449,
22100,
1093,
39501,
11,
9506,
11,
65925,
3296,
323,
12623,
26323,
13,
14910,
499,
1440,
814,
1047,
264,
7127,
8068,
1650,
949,
358,
12756,
733,
369,
433,
59162,
47,
9724,
555,
735,
5,
14831,
11,
3778,
66041,
323,
55600,
50541,
11,
78264,
50312,
555,
1421,
3184,
11,
29459,
5869,
6295,
34088,
555,
19797,
261,
7813,
561,
616,
304,
34928,
3223,
6437,
323,
34928,
3223,
6307,
11,
4251,
45482,
4428,
555,
19797,
261,
7813,
561,
616,
11,
50396,
555,
578,
18343,
19074,
11,
11546,
11,
46793,
323,
45667,
1766,
520,
73692,
64066,
11,
4251,
18316,
5869,
11,
28890,
50396,
555,
3778,
66041,
627,
17300,
2199,
0,
1695,
15369,
389,
279,
7748,
1650,
-100
] |
We went to this Japanese AYCE (all you can eat) restaurant to celebrate a family birthday so it was a large group of people. Because of the chaos and the AYCE option (they bring the food to you) I was a bit worried about Kay's food allergies. In the end, she had no allergic reaction to any of the food she had, and she had many! She enjoyed edamame, egg-less chicken fried rice, chicken teriyaki skewers, beef short ribs and pan fried pork dumplings. She even asked for another serving of edamame and chicken skewers! The only bad thing is that none of the desserts were safe for her. She was too stuffed to eat more anyways so it worked out in the end. When she enjoys her food, this girl can really eat!
|
{
"redpajama_set_name": "RedPajamaC4"
}
| 9,491 |
[
128000,
1687,
4024,
311,
420,
11002,
362,
56,
2152,
320,
543,
499,
649,
8343,
8,
10960,
311,
18890,
264,
3070,
15553,
779,
433,
574,
264,
3544,
1912,
315,
1274,
13,
9393,
315,
279,
28013,
323,
279,
362,
56,
2152,
3072,
320,
20670,
4546,
279,
3691,
311,
499,
8,
358,
574,
264,
2766,
18290,
922,
31245,
596,
3691,
58742,
13,
763,
279,
842,
11,
1364,
1047,
912,
57596,
13010,
311,
904,
315,
279,
3691,
1364,
1047,
11,
323,
1364,
1047,
1690,
0,
3005,
14333,
1608,
309,
373,
11,
19151,
56009,
16553,
41951,
20228,
11,
16553,
2024,
16618,
14966,
41643,
388,
11,
25309,
2875,
56249,
323,
7363,
41951,
36167,
63811,
81402,
13,
3005,
1524,
4691,
369,
2500,
13788,
315,
1608,
309,
373,
323,
16553,
41643,
388,
0,
578,
1193,
3958
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
1687,
4024,
311,
420,
11002,
362,
56,
2152,
320,
543,
499,
649,
8343,
8,
10960,
311,
18890,
264,
3070,
15553,
779,
433,
574,
264,
3544,
1912,
315,
1274,
13,
9393,
315,
279,
28013,
323,
279,
362,
56,
2152,
3072,
320,
20670,
4546,
279,
3691,
311,
499,
8,
358,
574,
264,
2766,
18290,
922,
31245,
596,
3691,
58742,
13,
763,
279,
842,
11,
1364,
1047,
912,
57596,
13010,
311,
904,
315,
279,
3691,
1364,
1047,
11,
323,
1364,
1047,
1690,
0,
3005,
14333,
1608,
309,
373,
11,
19151,
56009,
16553,
41951,
20228,
11,
16553,
2024,
16618,
14966,
41643,
388,
11,
25309,
2875,
56249,
323,
7363,
41951,
36167,
63811,
81402,
13,
3005,
1524,
4691,
369,
2500,
13788,
315,
1608,
309,
373,
323,
16553,
41643,
388,
0,
578,
1193,
3958,
-100
] |
Biografia
Formazione e ministero sacerdotale
Ha studiato scienze politiche all'Università di Pretoria e ha lavorato come membro del personale presso il Ministero degli affari esteri della Repubblica del Sudafrica.
Dopo essersi convertito dal calvinismo al cattolicesimo, nell'agosto del 1994 è entrato nell'abbazia di Mehrerau. Dopo un anno di studi di filosofia nel monastero svizzero di Einsiedeln ha iniziato a studiare teologia alla Pontificia università "San Tommaso d'Aquino" a Roma. Il 19 agosto 1995 ha emesso la prima professione e nel 1998 quella solenne.
Il 15 agosto 1999 è stato ordinato presbitero dal vescovo di Feldkirch Klaus Küng. Dal 2000 al 2002 è stato educatore nel convitto del Collegium Bernardi dell'abbazia territoriale di Wettingen-Mehrerau. Dal 2002 al 2005 ha seguito i corsi di specializzazione in diritto canonico presso la Pontificia università "San Tommaso d'Aquino" ottenendo la licenza in tale materia. Dal 2005 ha ricoperto l'ufficio di avvocato ecclesiastico presso il Tribunale diocesano di Feldkirch. Dal 2006 è stato segretario della Congregazione di Mehrerauer e dal 2007 anche insegnante di religione presso il Collegium Bernardi dell'abbazia territoriale di Wettingen-Mehrerau.
Ministero abbaziale
Il 18 febbraio 2009 papa Benedetto XVI ha confermato la sua elezione ad abate di Wettingen e priore di Mehrerau. Era anche il capo della Congregazione di Mehrerauer, un'associazione volontaria a livello mondiale di 21 monasteri cistercensi, maschili e femminili, in Austria, Germania, Svizzera, Italia, Stati Uniti d'America, Repubblica Ceca e Slovenia. Ha ricevuto la benedizione abbaziale il 21 marzo successivo nella chiesa abbaziale di Wettingen-Mehrerau. Come abate di un'abbazia territoriale era anche membro della Conferenza episcopale austriaca.
Dal 2009 è priore della commenda di Bregenz dell'Ordine equestre del Santo Sepolcro di Gerusalemme.
Il principale compito che padre van der Linde ha dovuto affrontare come abate è stato l'affrontare le roventi polemiche per i casi di violenze sessuali di chierici su giovani studenti del collegio intorno agli anni '60. L'abbazia è stata bersagliata da richieste di ingenti risarcimenti alle vittime. L'abate si è impegnato nel chiedere perdono alle vittime e alle loro famiglie, ma anche nel cercare di porre una limitazione delle richieste di risarcimento danni. Impegno, questo, concluso con una sconfitta davanti alla Corte Suprema e poi con un accordo extragiudiziale con due vittime del vecchio collegio. La sua nomina serviva quindi ad estirpare la piaga degli abusi, a risollevare l'immagine dell'istituto, ma anche a creare una base economicamente sostenibile per la comunità monastica. Tra le sue attività vi sono state l'avvio di un'attività di falegnameria, la chiusura del sanatorio, il riallineamento della scuola con l'apertura alle ragazze, la creazione di una scuola elementare e la collaborazione con l'accademia del calcio.
Il 12 luglio 2018 un comunicato dell'abbazia ha dichiarato che padre van der Linde aveva presentato le dimissioni a motivo dello "stremo" generato dalla guida dell'abbazia in anni difficili e ritenendo che fosse giunto il momento di consegnare in nuove mani la guida del monastero e la direzione della Congregazione di Mehrerau. Il 1º agosto successivo papa Francesco ha accettato la sua rinuncia al governo pastorale dell'abbazia territoriale.
Oltre al tedesco parla francese, inglese, italiano, afrikaans e olandese.
Onorificenze
Note
Altri progetti
Collegamenti esterni
Cistercensi
|
{
"redpajama_set_name": "RedPajamaWikipedia"
}
| 5,798 |
[
128000,
271,
37196,
50901,
271,
1876,
15363,
384,
13015,
78,
274,
9779,
16510,
1604,
720,
34042,
106204,
4428,
1156,
3675,
3059,
3435,
12333,
682,
6,
65715,
24892,
1891,
63039,
11015,
384,
6520,
46155,
4428,
2586,
1871,
15222,
1624,
1732,
1604,
3577,
78,
3900,
9675,
78,
47669,
3611,
2850,
1826,
31803,
15587,
3402,
21340,
15677,
1624,
328,
8213,
30980,
382,
35,
56809,
4043,
388,
72,
5625,
6491,
25769,
1652,
9799,
17434,
453,
272,
1617,
337,
1238,
11620,
11,
66902,
6,
351,
36890,
1624,
220,
2550,
19,
11676,
11751,
4428,
66902,
6,
12806,
1394,
689,
1891,
55512,
2473,
84,
13,
423,
56809,
653,
18850,
1891,
106204,
1891,
1488,
437,
1073,
689,
25334,
1647,
2352,
78,
13871,
8934,
2382,
1891,
61452,
1142,
17912,
6520,
304,
34335,
4428,
264,
1707,
96286,
1028
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
271,
37196,
50901,
271,
1876,
15363,
384,
13015,
78,
274,
9779,
16510,
1604,
720,
34042,
106204,
4428,
1156,
3675,
3059,
3435,
12333,
682,
6,
65715,
24892,
1891,
63039,
11015,
384,
6520,
46155,
4428,
2586,
1871,
15222,
1624,
1732,
1604,
3577,
78,
3900,
9675,
78,
47669,
3611,
2850,
1826,
31803,
15587,
3402,
21340,
15677,
1624,
328,
8213,
30980,
382,
35,
56809,
4043,
388,
72,
5625,
6491,
25769,
1652,
9799,
17434,
453,
272,
1617,
337,
1238,
11620,
11,
66902,
6,
351,
36890,
1624,
220,
2550,
19,
11676,
11751,
4428,
66902,
6,
12806,
1394,
689,
1891,
55512,
2473,
84,
13,
423,
56809,
653,
18850,
1891,
106204,
1891,
1488,
437,
1073,
689,
25334,
1647,
2352,
78,
13871,
8934,
2382,
1891,
61452,
1142,
17912,
6520,
304,
34335,
4428,
264,
1707,
96286,
1028,
-100
] |
"This project proves that we are really moving ahead as an industry."
"Good safety record; good community relations: if you want to talk about Respect for People, then this was exemplary."
"A great performance. The team was in control of events instead of being controlled by events."
The 400-bed Darent Valley Hospital, designed by Paulley Architects, opened in September 2000 and is the first major heathcare project in the UK to be built and operated under the Government's Private Finance Initiative.
Paulley Architects' masterplan for the 200 acre Darenth Park site also included a new 300 dwelling residential 'village', together with a 100 acre country park.
Early design concepts have been brought to fruition in record time within the health sector with the vision and integrity of the architectural design is demonstrated by the success of this landmark public building.
|
{
"redpajama_set_name": "RedPajamaC4"
}
| 8,562 |
[
128000,
22244,
2447,
36862,
430,
584,
527,
2216,
7366,
8469,
439,
459,
5064,
10246,
1,
15571,
7296,
3335,
26,
1695,
4029,
4398,
25,
422,
499,
1390,
311,
3137,
922,
78138,
369,
9029,
11,
1243,
420,
574,
77381,
10246,
30233,
2294,
5178,
13,
578,
2128,
574,
304,
2585,
315,
4455,
4619,
315,
1694,
14400,
555,
4455,
10246,
791,
220,
3443,
49607,
423,
1415,
13345,
15429,
11,
6319,
555,
7043,
3258,
78113,
11,
9107,
304,
6250,
220,
1049,
15,
323,
374,
279,
1176,
3682,
568,
589,
10727,
2447,
304,
279,
6560,
311,
387,
5918,
323,
24026,
1234,
279,
10423,
596,
9877,
23261,
38756,
627,
26368,
3258,
78113,
6,
7491,
10609,
369,
279,
220,
1049,
46323,
423,
9329,
339,
5657,
2816,
1101,
5343,
264,
502,
220,
3101,
51688,
20658,
364,
85
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
22244,
2447,
36862,
430,
584,
527,
2216,
7366,
8469,
439,
459,
5064,
10246,
1,
15571,
7296,
3335,
26,
1695,
4029,
4398,
25,
422,
499,
1390,
311,
3137,
922,
78138,
369,
9029,
11,
1243,
420,
574,
77381,
10246,
30233,
2294,
5178,
13,
578,
2128,
574,
304,
2585,
315,
4455,
4619,
315,
1694,
14400,
555,
4455,
10246,
791,
220,
3443,
49607,
423,
1415,
13345,
15429,
11,
6319,
555,
7043,
3258,
78113,
11,
9107,
304,
6250,
220,
1049,
15,
323,
374,
279,
1176,
3682,
568,
589,
10727,
2447,
304,
279,
6560,
311,
387,
5918,
323,
24026,
1234,
279,
10423,
596,
9877,
23261,
38756,
627,
26368,
3258,
78113,
6,
7491,
10609,
369,
279,
220,
1049,
46323,
423,
9329,
339,
5657,
2816,
1101,
5343,
264,
502,
220,
3101,
51688,
20658,
364,
85,
-100
] |
<!DOCTYPE html>
<html lang="en">
<head>
<title>Tyler Sharp's Cars</title>
<link rel="stylesheet" type="text/css" href="styles.css">
</head>
<body>
<header>
<div id="sitetitle">Tyler Sharp's Cars</div>
</header>
<nav>
<a href="510.html">510</a>
<a href="galaxie.html">Galaxie</a>
<a href="eclipse.html">Eclipse</a>
<a href="mr2turbo.html">MR2 Turbo</a>
<a href="m3.html">M3</a>
<a href="boxster.html">Boxster</a>
<a href="335i.html">335i</a>
<a href="911.html">911</a>
<a href="landcruiser.html">FJ40</a>
<a href="aboutme.html">About Me</a>
</nav>
<h1>Cars I have owned</h1>
<section>
<h2>Make and Model List</h2>
<div class="logocontainer">
<img src="images/datsun.png" alt="Datsun Logo">
<a href="510.html">Datsun 510</a>
</div>
<div class="logocontainer">
<img src="images/ford.png" alt="Ford Logo">
<a href="galaxie.html">Ford Galaxie 500</a>
</div>
<div class="logocontainer">
<img src="images/mitsubishi.png" alt="Mitsubishi Logo">
<a href="eclipse.html">Mitsubishi Eclipse</a>
</div>
<div class="logocontainer">
<img src="images/toyota.png" alt="Toyota Logo">
<a href="mr2turbo.html">Toyota MR2 Turbo</a>
</div>
<div class="logocontainer">
<img src="images/bmw.png" alt="BMW Logo">
<a href="m3.html">BMW M3</a>
</div>
<div class="logocontainer">
<img src="images/porsche.png" alt="Porsche Logo">
<a href="boxster.html">Porsche Boxster</a>
</div>
<div class="logocontainer">
<img src="images/bmw.png" alt="BMW Logo">
<a href="335i.html">BMW 335i</a>
</div>
<div class="logocontainer">
<img src="images/porsche.png" alt="Porsche Logo">
<a href="911.html">Porsche 911 C4S</a>
</div>
<div class="logocontainer">
<img src="images/toyota.png" alt="Toyota Logo">
<a href="landcruiser.html">Toyota Landcruiser</a>
</div>
</section>
<footer>
<p>All car logo images used with permission from https://commons.wikimedia.org.</p>
<p>© 2016 Tyler Sharp. All rights reserved.
<br>
<p>The website that I looked at for comparison's sake can be seen <a href="http://www.eldorado-seville.com/mycars/">here</a>. I liked the responsive nature of the website, the imagery (even though i'm not a huge old Cadillac guy), and some of the jquery animations/effects of the website. As a simple, template car collection website goes, I would say this one is not bad.</p>
</footer>
</body>
</html>
|
{
"redpajama_set_name": "RedPajamaGithub"
}
| 381 |
[
128000,
13853,
15822,
5385,
397,
14063,
8859,
429,
268,
891,
16747,
397,
220,
366,
2150,
29650,
88,
1565,
40361,
596,
36231,
524,
2150,
397,
220,
366,
2125,
1375,
429,
6936,
1,
955,
429,
1342,
6851,
1,
1839,
429,
4041,
4425,
891,
524,
2025,
397,
15896,
397,
220,
366,
2775,
397,
262,
366,
614,
887,
429,
82,
42638,
1017,
760,
100224,
40361,
596,
36231,
524,
614,
397,
220,
694,
2775,
397,
220,
366,
3807,
397,
262,
366,
64,
1839,
429,
15633,
2628,
760,
15633,
524,
64,
397,
262,
366,
64,
1839,
429,
16876,
710,
648,
2628,
760,
53619,
710,
648,
524,
64,
397,
262,
366,
64,
1839,
429,
68,
9661,
2628,
760,
36,
9661,
524,
64,
397,
262,
366,
64,
1839,
429,
21620,
17,
66467,
754,
2628,
760,
18953
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
13853,
15822,
5385,
397,
14063,
8859,
429,
268,
891,
16747,
397,
220,
366,
2150,
29650,
88,
1565,
40361,
596,
36231,
524,
2150,
397,
220,
366,
2125,
1375,
429,
6936,
1,
955,
429,
1342,
6851,
1,
1839,
429,
4041,
4425,
891,
524,
2025,
397,
15896,
397,
220,
366,
2775,
397,
262,
366,
614,
887,
429,
82,
42638,
1017,
760,
100224,
40361,
596,
36231,
524,
614,
397,
220,
694,
2775,
397,
220,
366,
3807,
397,
262,
366,
64,
1839,
429,
15633,
2628,
760,
15633,
524,
64,
397,
262,
366,
64,
1839,
429,
16876,
710,
648,
2628,
760,
53619,
710,
648,
524,
64,
397,
262,
366,
64,
1839,
429,
68,
9661,
2628,
760,
36,
9661,
524,
64,
397,
262,
366,
64,
1839,
429,
21620,
17,
66467,
754,
2628,
760,
18953,
-100
] |
Jennifer Sclater, was an ICT Consultant at the Centre for the Study of Learning and Performance, Concordia University, Montreal, Quebec, and is currently Coordinator, Education (youth programs) with the World Anti-Doping Agency, Montreal, Quebec.
Fiore Sicoly, PhD, is a Professor at the Institute of University Partnerships & Advanced Studies, Georgian College, Barrie, Ontario and is a Collaborator with the Centre for the Study of Learning and Performance, Concordia University, Montreal, Quebec.
Anne Wade, is Manager and Information Specialist at the Centre for the Study of Learning and Performance/Education, Concordia University, Montreal, Quebec.
Abstract: The current investigation was an exploration of the first year of a multi-year project designed to provide every Grade 3 to Grade 11 student throughout an English school board in Quebec with a laptop computer. Data were collected from 403 elementary and 270 secondary students from the experimental school board and also from 330 students in the control school board. In addition, questionnaire data were collected from 60 elementary school teachers and 51 secondary school teachers. Finally, interviews were conducted with 72 students and 20 teachers. Potentially the most interesting finding was the difference in achievement scores between the experimental and control boards. Secondary students from the experimental board had higher scores on the CAT-3 reading test and indicated making six times more frequent use of computer technology in their English classes, suggesting a possible treatment effect. In contrast, math scores were higher at the control board where neither board indicated high levels of computer use. Nevertheless, these findings must be interpreted with some caution until the threats to validity of selection bias are more clearly overcome.
Résumé: L'investigation en cours était un examen de la première année d'un projet pluriannuel qui visait à offrir un ordinateur portable à tous les élèves de la 3 e à la 11 e année d'une commission scolaire anglophone du Québec. Les données ont été recueillies auprès de 403 élèves de l'élémentaire et de 270 élèves du secondaire de la commission scolaire expérimentale ainsi qu'auprès de 330 élèves de la commission scolaire témoin. En plus, on a recueilli des données tirées de questionnaires remis à 60 enseignants de l'élémentaire et à 51 enseignants du secondaire. Enfin, des entrevues ont été menées avec 72 élèves et 20 enseignants. La conclusion la plus intéressante s'avère peut-être la différence entre les résultats de réussite entre les commissions scolaires expérimentale et témoin. Les étudiants du secondaire de la commission scolaire expérimentale ont obtenu de meilleurs résultats pour les tests de lecture CAT-3 (formation en matière d'applications informatiques) et ils ont indiqué utiliser six fois plus souvent la technologie informatique dans leur cours d'anglais, laissant croire que le traitement a peut-être eu des répercussions. Par ailleurs, les résultats en mathématiques étaient supérieurs à la commission scolaire témoin alors qu'aucune commission n'a indiqué des taux d'utilisation élevés de l'ordinateur. Néanmoins, ces conclusions doivent être interprétées avec discernement jusqu'à ce qu'on gère mieux les menaces à l'égard de la validité du biais de sélection.
Enthusiasm for, as well as apprehension regarding, the use of technology for learning appears widespread as we herald the arrival of the Information Age. To some, computer technology can be used as a powerful and flexible tool for learning (Harasim, Hiltz, Teles & Turoff, 1995; Lou, Abrami & d'Apollonia, 2001; Scardamalia & Bereiter, 1996). Indeed, there is sufficient optimism in the potential of technology to have a positive impact on learning that governments have established task forces and dedicated substantial research funds to identifying and promoting ways to deliver or enhance instruction with the use of technology. At the same time, there is sufficient scepticism (Healy, 1998; Russell, 1999) about the use of technology to improve learning and beliefs that it may even represent serious threats to education. For example, it is believed that an imbalance between computer skills and essential literacy skills may be created; technology dependencies and isolation may be fostered rather than independent and interdependent learners; and the joy and motivation to learn may be eroded, replaced by frustration with failed equipment. Many teachers hold beliefs concerning the usefulness of information and communication technologies (ICT) that parallel their attitudes towards any change to teaching and learning, be it through government mandated reform or societal pressure. "If the computer can accomplish the task better than other materials or experiences, we will use it. If it doesn't clearly do the job better, we will save the money and use methods that have already proven their worth" (Healy, 1998, p. 218).
What has the research evidence revealed about the impact of technology integration, broadly defined, on student learning? There are now numerous narrative as well as quantitative reviews exploring the primary research on the impact of computer use on student achievement. The summaries vary; some suggest positive impacts on student learning while others are more equivocal, suggesting the evidence does not yet justify concluding that technology impacts positively and pervasively on student learning.
There are numerous examples of promising results. Kulik and Kulik (1989) cited several reviews, as early as during the 1980s, that found positive effects of computer based instruction on student performance, with a range of gains from 0.22 standard deviations to as high as 0.57 standard deviations. Schacter (1999) cited several studies that reported higher achievement, motivation, and engagement for students in a technology-enriched environment. In their meta-analysis, Waxman, Lin, and Michko (2003) found positive, albeit small, effects of teaching with technology on student outcomes. Sivin-Kachala and Bialo (2000) included studies that reported gains in the areas of language arts and reading, mathematics, science and medicine, social studies, foreign and second language acquisition, and programming languages such as LOGO. Kulik (2003) found that most studies looking at the impact of the word processor on student writing have shown improved writing skills, as well as a positive impact on teaching programs in math, and in the natural and social sciences. Goldberg, Russell and Cook (2003) conducted a meta-analysis looking at the effect of computer technology on student writing from 1992 to 2002. Results suggested that students who used computers when learning to write produced written work 0.4 standard deviations better than students who did not use computers.
Other reviews of the literature are less enthusiastic. Coley, Cradler and Engel (2000) conclude that drill-and-practice forms of computer-assisted instruction can be effective in producing achievement gains in students. In contrast, studies of more pedagogically complex uses of technology generally have been less conclusive, offering only promising and inviting educational vignettes (Coley et al., 2000). Fuchs and Woessmann (2004) initially found positive effects of home computer use on mathematics achievement. After adjusting for family background and school characteristics, they found "the mere availability of computers at home is negatively related to student performance in math and reading, and the availability of computers at school is unrelated to student performance" (p. 17). Ungerleider and Burns (2002), reviewing mostly Canadian research, found little methodologically rigorous evidence of the effectiveness of computer technology in promoting achievement, motivation, and metacognitive learning and on instruction in content areas in elementary and secondary schools. They also emphasized that student academic achievement does not improve simply as a result of having access to computers in the classroom without concurrent changes to instruction. We share their concern that methodologically sound studies must be undertaken with proper experimental and statistical controls. We also believe it is important to conduct longitudinal investigations of pervasive and ubiquitous attempts at technology integration.
The majority of research on technology integration in schools has been conducted when students have limited access to technology either by learning in dedicated computer labs for select periods during the week or when technology is available in classrooms but at ratio of several students per computer. More recently, interest has shifted to more widespread technology use, in particular, when each student is provided with a computer for use throughout the day.
The aim of the Maine Learning Technology Initiative (MLTI) was to provide every seventh and eighth grade student in the state with a laptop computer. Although the phase one summary report and mid-year evaluations of the MLTI (Gravelle, 2003; Lane, 2003; Sargent, 2003; Silvernail et al., 2003; Silvernail & Lane, 2004) present promising findings in terms of the impact the initiative has had on student learning and achievement, interpretation of qualitative and quantitative data obtained from surveys, case studies, interviews, focus groups and observations were only collected from students, teachers, superintendents and principals with laptops. No data were collected from laptop control participants. Davies (2004) evaluated the impact of the MLTI on one class. She found positive changes in the way students learn (more risk-taking), in what they learn, the context for teaching and learning, and on student willingness to engage in collaborative learning.
The Henrico County Public Schools deployed laptop computers to all students from Grades 6 to 12 in the district. Similar to the MLTI, Henrico's Teaching and Learning Initiative strives to close the digital divide among students and integrate technology across the curriculum. Davis, Garas, Hopstock, Kellum and Stephenson (2005) surveyed 29,022 students, teachers, school administrators, and parents on their experiences and opinions of the initiative. The report simply outlines perceived benefits and limitations regarding the use of laptops. Data on student learning outcomes were not collected.
The Peace River Wireless Writing Project involves the deployment of laptop computers to students in five Grade 6 and 7 classes. The goal of this project is to increase student performance in writing expression (Jeroski, 2003). Early results reveal an increase in writing scores on the B.C. Performance Standards compared to the previous year (Jeroski, 2004).
Rockman et al. (2000) conducted a three-year evaluation of Microsoft's Anytime Anywhere Learning Program, to examine the impact of the laptop program on teaching and learning, and on the ways in which laptops might be supporting constructivist pedagogy. The research covered 13 schools from eight different sites. They used both internal (within the school) and external control groups (another school). Researchers used student and teacher survey data, collected logs of computer use, gathered writing samples, interviewed school administrators, and analyzed scores from state and nationally normed assessments. Rockman et al. found positive changes in student writing, student collaboration, and an increase in student confidence towards computing. Results from standardized achievement measures were inconclusive.
The findings of these laptop initiatives are promising but not definitive. There is a lack of rigorous, methodologically sound research of one-to-one laptop programs, especially large-scale, board-wide projects and on the impact these programs have on student learning. The current investigation was an exploration of the first year of a multi-year project designed to provide every student with a laptop computer from Grades 3 (cycle 2) to 11 (secondary 5), throughout an English school board in Quebec. The primary focus of this study was to explore changes in student learning and teaching as a result of the laptop integration. The objectives of the current research were consistent with the goals established by the experimental school board of exploring the nature and extent to which technology supports or impedes student learning, motivation, attitudes, self-concept, and self-regulation.
The technology initiative involves the deployment of laptop computers to every student in the school board from elementary cycle 2 (Grades 3 and 4) to secondary 5 (final year of high school), over a three year period. Three elementary schools volunteered and were subsequently selected to serve as lead schools for the initiative. Cycle 3 students at these schools received laptops in May of 2003. The first wave of large-scale deployment, which took place in October of 2003, involved the distribution of laptops to cycle three students at the Board's twenty elementary schools and secondary 5 students at the three high schools. A second school board in Quebec volunteered to serve as a control. The control school board used technology typical of other public school deployments where on average there were several students per computer and, in general, technology supplemented teaching and learning both in quality and quantity of time spent.
Data collection occurred between January and April 2004. The study conformed to Canada's Tri-Council Policy on the ethical treatment of research participants.
There were both elementary and secondary school participants.
The groups at the elementary level comprised cycle 3 (Grades 5 and 6) students from the twenty elementary schools. Although most cycle 3 students in the board received laptops in October 2003, students in the three lead schools received their laptops in May 2003. This meant that at the time when the first round of data collection was conducted, cycle 3 level two students (Grade 6) in the lead schools had the laptops for seven months (n=103) whereas the other students only had the laptops for four months (n=300).
The deployment of laptops at the high school level included Grade 9 and Grade 11 students. Nonetheless, data collection at the secondary level focused only on Grade 11 students. Grade 11 students were selected since in the previous year they completed uniform provincial exams in mathematics, physical science and history of Quebec and Canada. It was also possible to obtain these provincial exam results for Grade 11 students in the control school board. Data were collected from all three high schools in the experimental board (n= 270) and four high schools from the control board (n= 330).
Data were collected from teachers at the elementary (n= 60) and secondary levels (n= 51). At the elementary level, data were collected from cycle 3 teachers. At the secondary level, data were collected from all secondary 5 teachers at the experimental and control schools.
A team of two to three data collectors was sent out to each school. The data collectors provided the students with instructions for completing the response sheets and provided a context for each questionnaire. The Technology Integration Questionnaire (TIQ) was sent to the schools. Teachers were given instructions for completing the questionnaire, including the procedure for returning them to the school board.
Interviews were conducted at the three lead schools, three elementary schools that were similar in size and setting to the lead schools, at three high schools in the experimental board, and four high schools in the control board. School administrators were asked to select teachers and students who best represented the school population. Teachers were interviewed individually while student interviews were conducted as focus groups of five to seven students at each school. Each interview and focus group session was approximately 20 to 30 minutes in length.
Interview data and responses to open-ended TIQ questions were coded using predetermined and emergent codes. Digital text files of the open-ended responses were compiled. HyperResearch was used for coding audio files (interview data) and text files.
Multiple data collection instruments were used in this research.
A modified version of the TIQ (Wozney, Venkatesh, & Abrami, 2006) was distributed to teachers. The TIQ examines technology integration in the classroom, including both degree and quality of use, focusing on both advantages and drawbacks of integration. The TIQ was used to help describe and understand differences across teachers in planning and implementing technology for learning.
The Student Questionnaire was partially based on the NANS/SIAA research on school success (Janosz, 2003). This questionnaire was modified to further define socio-economic status for individual students, and to match students for the purpose of comparing achievement scores. Several questions explored the impact of technology on student attitudes and motivation to learn. It was also used to explore student perceived advantages and disadvantages of technology use.
The Student Questionnaire also drew questions from the PedTech2 computer questionnaire for students (Lowerison, Sclater, Schmid, & Abrami, in press). These questions were used to collect data concerning student use of computers both inside and outside of the school environment. These data were used to establish whether a difference in student achievement was associated with computer use in general, or on the use of computer technology in the classroom specifically, and if the latter, what qualities of use can affect student learning.
Only the Basic Battery was used for collecting achievement data. The test consisted of a series of multiple-choice questions in reading/language (comprehension, vocabulary and language) and mathematics. A test consultant from the Canadian Testing Centre conducted an item-by-item analysis of the Basic Battery to confirm the test's compatibility with the curriculum of the Quebec Education Program.
The SDQ (Marsh, 1999) was used to collect self-concept data from students. Elementary students completed level one while the secondary students completed level two of the SDQ. This questionnaire was used to determine whether the use of technology had an effect on student self-concept. The SDQ included questions specific to academics as well as more general self-esteem (e.g., body image, ability to make and keep friends).
The Academic Self-regulated Learning (Ryan & Connell, 1989) question-naire and the Academic Motivation Scale (Vallerand et al., 1992) were used to collect data on student self-regulation. The Academic Self-regulated Learning (SRL-A) was distributed to the elementary students while the Academic Motivation Scale (AMS), which is a variation of the SRL-A for older children, was distributed to secondary students. These questionnaires identify student motivation for learning and completing school-related tasks.
Student and teacher interview data were used to supplement the quantitative research findings. For instance, the interviews served to help describe and understand differences across teachers in planning and implementing technology for learning.
A total of 72 students, representing twelve schools, were interviewed in focus groups of five to eight. Thirty-seven students at the cycle 3 level (19 from the three lead schools and 18 from remaining schools) and 35 students at the secondary 5 level (17 from the three experimental high schools and 18 from three control high schools) volunteered to be interviewed. The analysis of the interview data focused on the student's appreciation of computer technology integration for learning, their perception of the impacts that technology has on their learning, and the problems encountered with the integration of technology.
Teacher interviews were conducted to verify the extent to which computer technology is integrated into teaching and how its use impacts on teaching and learning. The analysis of the interview data focused on teacher perceptions about introducing computer technology in their teaching, their actual use of technology for teaching, their perception of the impacts that technology has on student learning and achievement, and on the adequacy of professional development and technical support. Two teachers per school were selected by the school administration to take part in a one-on-one, face-to-face interview. Eleven elementary teachers and nine secondary teachers participated in the interviews.
Training materials used by the experimental school board were reviewed to gain a clearer understanding of the support and professional development offered to the teachers. As well, data collected by the school board through focus group sessions with teachers were examined. The experimental board offered teachers a three-day training session during the summer and consultants from the school board met with small groups of teachers (usually three consultants for every 20 teachers) to discuss strategies for using the computers in the classroom and for sharing future directions, successes and frustrations.
Scores on secondary 4 provincial exams were used in conjunction with the high school CAT-3 scores. All secondary 4 students in the province of Quebec wrote common end-of-year exams in mathematics, physical science and history of Quebec and Canada. An item analysis was conducted to establish the likeness between level 19/20 of the CAT-3 math test of the basic battery and the secondary 4 provincial math exam.
The Indice milieu socio-économique is a formula used by the Quebec Ministry of Education (MEQ, 2002) (now the Ministry of Education, Leisure and Sport) to determine each school's socio-economic status. Schools are given ratings based on statistics on mothers' level of education and whether at least one parent in the household holds a full-time job. These data are based on the geographic area where the schools draw their students, not necessarily on the specific families within the school.
Reliability of the data collection instruments was assessed using Cronbach's alpha. A Cronbach's alpha value of .70 is generally considered acceptable, although higher values (.80 or above) are preferred. Reliability data could not be calculated for the Canadian Achievement Test results because these data were scored externally.
The Student Questionnaire included 52 items. In some cases, related items were combined to form composite scores (e.g., eight questionnaire items that asked students to rate how easy it was to perform a variety of tasks using a computer were combined into a single score). For item-clusters derived from the Student Questionnaire reliabilities ranged from .50 to .76 for elementary students with an average value of .68 and ranged from .46 to .89 for secondary students with an average value of .73.
The SDQ for elementary students contains 72 items that can be used to create eight sub-scales. Cronbach's alpha associated with these sub-scales ranged from .81 to .94 with an average value of .86. The SDQ2 for secondary students contains 102 items that can be used to create 11 sub-scales, although only eight were used in this research. Cronbach's alpha for these SDQ2 sub-scales averaged .86 with a range from .82 to .91.
The SRL-A for elementary students contains 32 items that are used to produce four sub-scores. Cronbach's alpha associated with these sub-scores ranged from .75 to .86 with an average of .82. The AMS for secondary students contains 28 items that are used to generate seven sub-scores. Cronbach's alpha for these sub-scores ranged from .77 to .86 with an average of .82.
Several of the instruments used in this research (e.g., SDQ, AMS, SRG) combined clusters of related questionnaire items into sub-scales. For example, the 72 items on the SDQ at the elementary level were combined into eight sub-scales. It sometimes occurred that students completed all of the items in a particular sub-scale except for one. In this situation, the SDQ instructions for analysis recommend that missing item scores be replaced by the mean or average score for that particular item. This strategy allows students to be retained in the analysis instead of being removed because the sub-score could not be created due to the missing information for a single item. This procedure does not replace missing data indiscriminately. The replacement of missing data occurs only for a small percentage of students and only when those students have provided responses for at least 90% of the questionnaire. This approach for replacing missing data was also used when creating sub-scale scores for the remaining instruments used in the research. It should be noted that missing data were replaced only when clusters of items were used to create composite or sub-scale scores. When analyzing data for individual items, students with missing data were simply excluded from the analysis for that particular item.
We report the findings for several measures and for both elementary and secondary school students and teachers.
The TIQ was completed and returned by 60 elementary teachers and 51 secondary teachers. Of the elementary teachers, 14 were from lead schools while the remainder (46) were from schools that implemented the technology initiative at a later date. Of the secondary teachers, 25 were from the experimental board while 26 were from control schools. Given the relatively small number of teacher respondents, some caution is warranted when interpreting the TIQ results presented in this section of the report. As part of a separate study, data for a province-wide sample of elementary (N=448) and secondary teachers (N=276) were collected during the 2002-03 school year. TIQ results for the province-wide sample are presented for comparison.
The proportion of teachers who reported student access to computer technology as good, very good, or excellent was higher among elementary (about 90%) and secondary teachers (71%) in the experimental board than among secondary teachers in control schools (20%) or teachers in the province-wide sample (51%). The percentage of teachers who responded that access to computer resource personnel was good, very good or excellent was highest in elementary lead schools (71%) and lowest in control secondary schools (23%) and schools in the province-wide sample (40%).
Elementary teachers (72% to 86%) were approximately twice as likely as secondary teachers (48% and 35% for experimental and control respectively) to report that they frequently integrate computer technologies into their learning activities. In the province-wide sample, the rate of integration was approximately 29%. Teachers were also asked to report their proficiency levels in relation to computer technologies. Average or higher levels of proficiency were most prevalent among elementary teachers located in lead schools (93%) and lowest among experimental secondary teachers (68%) and teachers in the province-wide sample (62% for elementary). Teachers in the province-wide sample (36%) and secondary teachers in experimental schools (36%) are least likely to report adaptation or creative application of technology into the curriculum while elementary teachers in lead schools are most likely to fall into this category (62%). Elementary teachers in lead schools expressed more positive views regarding the implementation of technology compared to teachers in schools in the Year 1 implementation group. For example, teachers in lead schools were less likely to indicate that computer technology results in students neglecting important traditional learning resources, makes classroom management more difficult, and demands that too much time be spent on technical problems. On the other hand, elementary teachers in lead schools were more likely to indicate that computer technology promotes student collaboration, promotes the development of students' interpersonal skills, and motivates students to get more involved in learning activities.
Although elementary teachers were generally more positive, the majority of respondents from the lead schools (79%) also acknowledged that the use of computer technology in the classroom requires extra time to plan learning activities. The vast majority of experimental teachers (approximately 90%) further agree that there must be adequate teacher training in the uses of technology for learning and that technical staff must regularly maintain computers (approximately 93%).
In general, the views expressed by secondary teachers in experimental schools were more negative than the views of secondary teachers in control schools. For example, secondary teachers in experimental schools were significantly more likely to indicate that computer technology: a) requires extra time to plan learning activities; b) is too costly in terms of resources, time and effort; c) requires software-skills training that is too time consuming; and d) will increase the amount of stress and anxiety that students experience. On the other hand, experimental secondary teachers were less likely to indicate that computer technology: a) increases academic achievement (e.g., grades); b) is an effective tool for students of all abilities; and c) helps accommodate students' personal learning styles.
A majority of teachers (71% to 93%) use computers to prepare handouts, test/quizzes, and homework assignments for students. In a related questionnaire item, they also report using word processors with the same frequency. Teachers frequently report use of the Internet to search for information for a lesson (58% to 90%). Relatively high percentages of teachers also report the frequent use of computer technology to create lessons plans (28% to 65%) and e-mail to communicate with other teachers (20% to 44%). There appears to be a heavy use of digital video and cameras by elementary teachers in lead schools (64%). Secondary teachers (about 70%) are far more likely than elementary teachers to use computers to keep track of student grades and marks.
Results were analyzed for Grade 5 and 6 students separately but were remarkably consistent across the two grades and so were aggregated for the two grades. Female students (90%) are significantly more likely than male students (70%) to report that they enjoy what they learn in school. Likewise, female students (82%) are more likely to indicate that school is fun compared to male students (60%). More than 90% of boys and girls indicate that it is important to succeed in English and mathematics. Compared to males (75%), a higher percentage of girls (91%) report that their writing skills in English are strong or very strong. Results by gender for the CAT-3 confirmed the superior performance of female students. Female students achieved a significantly higher level of performance in reading, language, spelling, computation, total reading score, and overall test battery score. Male students displayed higher performance in mathematics than did female students although this difference was not statistically significant.
In the area of computer use, few gender differences appeared among elementary students. Almost all students reported having a computer at home that they could use (89% and 91% for boys and girls respectively). Access to the Internet at home was less widespread but again no gender differences emerged (74% and 77% for boys and girls respectively). Approximately 79% of students reported using a computer at home a few times per week or almost every day. In contrast, 91% of students reported using a computer at school. Boys and girls were equally likely (84%) to report that they enjoyed using a computer to complete their schoolwork.
The number of students who report using a computer for one hour or more per week is as follows for each class: English (65%), French (42%), social studies (36%), science (30%), and mathematics (14%). When students were asked how often they used a computer to do homework outside class for various subject areas, English was identified most often (35%) and mathematics was lowest (8%). When looking for information on a particular topic, more than 70% of students look first to the Internet rather than consulting books, CD ROMs, or another person. Boys and girls (77%) are equally likely to report that using computers to complete their schoolwork helps them learn.
Results were compared for students following an Individual Education Plan (IEP) with non-IEP students. On the SRL-A, there are no statistically significant differences between the responses of IEP and non-IEP students. IEP students provided significantly lower ratings on the following SDQ sub-scales: physical abilities in sports and games; relationship with parents; ability, enjoyment, and interest in reading; ability, enjoyment, and interest in mathematics; general ability, enjoyment, and interest in school; and, general satisfaction with self. In addition, IEP students demonstrate significantly lower levels of performance on every CAT-3 subtest. Nonetheless, IEP students report that is equally easy to use computers for performing a variety of tasks. IEP students are slightly (but not significantly) less likely to use a computer during classes but significantly more likely than other students to use a computer for homework outside classes. IEP students are as likely as other students to report using a computer for schoolwork at home. Finally, IEP students are equally likely to report that using computers to do homework helps them learn.
At the time of data collection, Grade 6 students in lead schools had used laptop computers for a longer period than students in the remaining elementary schools, albeit only several months longer. Analyses were conducted to compare these two groups of students (identified as lead and year 1). This comparison was intended to examine any differential impact on students in the lead schools who had access to the laptop computers for a longer period of time than other Grade 6 students.
Between group comparisons on several measures (e.g., attitudes, self-regulation and CAT-3) favoured students in year 1 schools even though students in lead schools had used the laptops for a longer period. This result is contrary to what would be expected. However, there were large and significant differences in achievement pretest scores that favour the students in the year 1 schools and there were a greater number of special needs students in the lead schools. This suggests that the populations of students in lead and year 1 schools may not be sufficiently equivalent prior to the integration of technology. Furthermore, we were not able to adequately adjust for these pretest differences using analysis of covariance.
Overall, secondary students are far less likely than elementary students to indicate that they like school and enjoy what they learn at school. While experimental students are significantly less likely than control students to have a computer at home, there is no significant difference in terms of how often a computer is used for schoolwork at home. As expected, experimental students are far more likely than control students to use a computer at school in all of their classes. For instance, the majority of experimental students use a computer in French (76%) and English class (68%) substantially more often compared to only 5% for control students. In contrast, usage of computers in math classes were dramatically lower in both experimental (18% for males and 4% for females) and control secondary schools (1% for both males and females). Experimental students also report significantly higher usage of computers outside class to do their homework (p < .05).
Although experimental students were far more likely to use a computer at school, did this promote more positive attitudes? Experimental students demonstrated a significantly lower degree of interest in computers (53% vs. 67%, p < .05) and less enjoyment when using computers to complete their schoolwork (58% vs. 64%, p < .05). Finally, experimental students (38%) were considerably less likely than control students (62%) to indicate that using computers for schoolwork helped them learn.
Results for the SDQ2 and AMS show that there were no significant differences between students in experimental and control high schools on the following dimensions: physical abilities in sports and games: physical appearance or attractiveness; honesty-trustworthiness; relationship with parents; ability, enjoyment, or interest in reading and mathematics; general ability, enjoyment or interest in school; and general satisfaction with self. Responses to the AMS, provided by experimental and control students, were very similar except on the Amotivation sub-scale where experimental students reported significantly higher (p < .05) scores (e.g., I can't see why I go to school and frankly I could care less.). Amotivation is significantly higher among male students.
CAT-3 results showed that experimental secondary students achieved somewhat higher levels of performance in reading 51 st percentile vs. 48 th percentile (p > .05). In contrast, control students obtained significantly higher scores in mathematics (50 th percentile vs. 45 th percentile, p < .05). In order for such comparisons to be valid, we must have confidence that the students in experimental and control were not significantly different before the laptop initiative was implemented in experimental schools. If there are pre-existing differences between the two groups, then it becomes much more difficult to evaluate the impact of the laptop initiative on experimental students. The issue of non-equivalent groups is complex and the problem does not have a simple solution. One strategy we used was the analysis of subsets of the data. Another strategy that is deemed to have merit is covariance analysis, which is used to statistically reduce or remove the influence of pre-existing differences.
In this research, several potential covariates were examined. Student Questionnaire items asked participants to provide information about the education and employment status of their parents. Past research has demonstrated that such socio-demographic variables are often correlated with students' academic performance. For this reason, it was reasonable to adjust for the education level and employment status of parents when analyzing data for experimental and control students. Nonetheless, the use of these variables in the covariance analysis had no substantial effect on results and, for this reason, they are not reported.
MEQ scores in mathematics, science, and history were also potential covariates. These test scores were collected during the 2003 school year before the laptop initiative was implemented in experimental secondary schools. MEQ scores indicated that experimental students in the research sample scored significantly lower in mathematics and science than did control students before the technology initiative was implemented. It was also observed that MEQ scores were significantly correlated with reading, language, and mathematics achievement scores on the CAT-3 (Pearson's r values ranged from .31 to .53, p < .001). It was therefore reasonable to use MEQ scores as covariates in an effort to remove some of the influence of these pre-existing differences in performance. The results of the covariance analysis increased the difference between experimental and control in reading and decreased the difference in mathematics. Nonetheless, the overall pattern remained the same and, for this reason, detailed covariance results are not reported.
A second strategy, namely matching, was also used to achieve equivalence between control and experimental students at the pre-test stage so that possible differences on the post-test could be more accurately evaluated. Experimental students were matched to control students by finding a control student who had the same MEQ pre-test score but was also of the same gender. This methodology was used to create two groups of students with equal MEQ scores at the pre-test stage. Matching was done using MEQ scores for mathematics, science, and history as the pre-test. Matching was done with each test separately and then combining scores from the three tests using a simple sum. In approximately 85% of cases exact matches were found. When experimental and control test scores could not be matched exactly, test scores were used that were within 1 mark of each other (and on a few rare cases within two marks of each other).
Results differed somewhat depending on which MEQ test was used for matching. For example, consider the CAT-3 reading results. Experimental students had some advantage on CAT-3 reading scores when math or science MEQ scores were used for matching but this trend is reversed when history is used for matching. When all three tests are combined, the experimental advantage in CAT-3 reading emerges but is not statistically significant (p=.10).
When considering the CAT-3 scores for math, experimental students were significantly lower when matching is based on history scores. When science or math MEQ scores are used for matching, math CAT-3 scores for experimental students are quite similar to those for control students. When the sum of all three MEQ tests is used for matching, CAT-3 math scores are significantly higher for control students.
Almost all of the 20 teachers interviewed described their role as that of facilitator, or guide who listens to students and who, at times, has to take on the role of a parent. They described their roles as opening doors, pointing students in new directions, helping them understand and share knowledge, and helping students develop critical thinking skills and to work autonomously. Their goals are to stimulate the students to want to learn so that they can work to their full potential. Three of the elementary school teachers stated that the introduction of computer technology changed their role. One teacher reported that the laptops changed the style of learning in her classroom from being teacher-led to student-centred. Another stated that the laptops "jostle her leadership role" and that she felt that she was not always ahead of the students. None of the secondary school teachers at the experimental schools felt their roles were changed with the advent of the laptops. Three teachers emphasized that the need to teach to the test for subjects for which there are provincial exams imposes a major constraint on the integration of computer technology in their teaching.
The majority of the teachers from both levels felt that they had a good predisposition toward the use of computer technology in teaching. The interview data showed that experimental teachers were using computer technology in fifteen and eleven different types of activities, respectively. On the other hand, control teachers were limited to three different types of activities namely searching the Internet for information, using email and doing projects.
The single most often reported activity for which technology was used was to search the Internet for information (14 teachers). Control teachers made much less use of computer technology in their teaching. The second most frequently reported activity reported by experimental teachers was related to literacy and included writing (ten teachers) and grammar and spelling (two teachers). Finally, eight teachers reported using computer technology for projects and creating PowerPoint presentations for use in class. They also reported sharing files and information over the server (seven teachers), and using email and chat (six teachers). This was followed by creative activities such as creating digital videos (five teachers), mathematics (four teachers), and reviewing (three). Two elementary teachers stated that they use technology as an incentive for students to complete their work.
Almost all experimental teachers reported that students were enthusiastic when they received the laptop computers. Initial negative responses from students were reported by three teachers and involved only one or two students in their classes who changed their minds after using the computers. The novelty, however, wore off with time. This was especially true for secondary 5 students who were reported to become frustrated with the technical problems associated with using their laptop computers. It was further compounded by the restrictions imposed by the schools for downloading games and music from the Internet. This loss of enthusiasm did not appear to be as noticeable with the cycle 3 students, although two elementary teachers mentioned that with time, students brought their computers home less often than when they first received them. One teacher suggested that his/her students became more systematic about when and how they used their laptop computers.
The students from the six experimental elementary schools were enthusiastic about having laptop computers in the classroom. To the question: Would you go back to not using your laptop computer in school if you had the choice? all students answered a resounding "no." One student answered, "No, we're born with that technology." Students from three elementary schools said that, given the choice, they choose to use the computer to do their work because it's faster. One student said that he enjoyed using his laptop for learning because it makes difficult work easier.
All of the experimental students at the secondary 5 level said that they enjoyed using computer technology for learning. Students in one school stated that they would not want to go back to having to use computer rooms and labs to work. "It's good because you work on only one computer" said one student. Another stated, "I could live without it, but it's easier with." High school students' responses were not as enthusiastic as were responses from the elementary level students. The secondary 5 students tended to be more reserved in their assessment than the cycle 3 students.
The university researchers and their school partners worked diligently to insure the highest methodological standards of research. This partnership meant there was special support and credibility offered to those who conducted the data collection and overall this enhanced the ecological validity of the research. Nevertheless, there were several problems that undermined this field-based inquiry.
At the secondary level, the researchers compared the experimental board with a control board using statistical control and matching in order to approximate the equivalence produced by random assignment of participants. This was only partially successful. Had a larger sample of sites been available, this might have allowed for a closer matching of groups. In addition, the researchers attempted to use statistical control to remove the effects of extraneous influences and reduce the possibility that threats to internal validity operated as alternative explanations to a technology treatment effect. This too was only partially successful. The degree to which there were sufficient control variables, and especially those which correlated with the outcome measures, was limited. For example, geographic differences (e.g., urban versus rural), mother tongue language differences, context of data collection (e.g., seriousness of student completion of instruments, time available), prior achievement differences and a host of factors were not completely controlled for experimentally or statistically.
At the elementary level, no control data were available. Nor did the timing of the research allow for the use of comprehensive pretesting prior to implementation of the laptop initiative. In future, more time and the use of the current data as baseline indices should make strong quasi-experimental designs possible (e.g., non-equivalent pretest-posttest control group design). Finally, the research process may have been weakened by differential selection of respondents that could be attributed to the nature of the consent forms and related procedures.
It also bears noting that none of the between board and certainly none of the within board comparisons examine technology use versus non-use. It is not a case of whether computers are used but a case of degree of use and length of exposure. This may have resulted in diminished treatment effects.
As a consequence of these problems, we have been careful to temper our conclusions. In addition, we attempted to triangulate the findings, wherever possible, to ensure that a conclusion seemed justifiable from several sources of evidence.
The integration of computers is not equally apparent in all subject areas. The number of students who report using a computer is highest for English, lowest for mathematics, and moderate for social studies and science. As expected, experimental students are far more likely than control students to use a computer at school in all of their classes. For instance, the majority of experimental students (about 70%) at the secondary level use a computer in French and English class compared to only 5% for control students. The usage of computers in mathematics classes was dramatically lower in both experimental (18% for males and 4% for females) and control secondary schools (1% for both males and females).
The motivational dispositions of teachers should support expectations of success with technology (e.g., I can use technology with my students to help them learn), beliefs that the use of technology has value for learning (e.g., my students will learn more and at a higher level), and that the costs of technology use are manageable (e.g., the time to integrate technology into my classroom is reasonable). Similarly, students should increase their beliefs about technology as a tool for learning, value the tool, and see limited costs associated with its use as a pedagogical tool. Motivation to learn is a key building block of successful educational reform because it addresses the core concern of providing energy for action and directing it towards a meaningful goal.
In this regard, the perceptions of teachers and students were quite interesting. In general, students held positive attitudes towards the use of technology for learning. Elementary students had more positive views about school in general and also about the use of technology to enhance learning.
There was also some variability among teacher attitudes. As would be expected, teachers in the experimental board reported much higher access to computer technology and resources than did secondary teachers in the control board. In general, elementary teachers in the experimental board, and especially those in lead schools, held more positive attitudes than secondary teachers. Attitudinal differences found between the lead and year one elementary schools are interesting. Most of the significant TIQ findings show more positive results for the schools that received laptop computers earlier. It may be that over time, initial teacher concerns about the integration of technology will be reduced with experience. It could also be that lead schools were better prepared for the deployment than were schools that received the laptops at a later stage. Although elementary teachers were generally more positive, even they acknowledged that the use of computer technology in the classroom requires adequate teacher training, technical support, and extra time to plan learning activities.
While high school teachers in the control board report higher levels of technology integration than at the experimental schools, control students overwhelmingly have indicated that this is not the case. This would be consistent with speculations voiced by administrators from the experimental board that students would be the driving force behind the success of the project. It is also consistent with the shift in paradigm between the traditional teacher-centred classrooms that preceded the reform of the Quebec Education Program to the student-centred environment that technology is supposed to facilitate.
Secondary teachers in the experimental board expressed the most negative views about technology. The implementation of the laptop initiative may have increased apprehension from the teachers at the experimental schools to change. Principals at these high schools have indicated that their teachers simply are not eager to use laptops. Overall, high school teachers seem especially resistant to change when it is being imposed by outside forces, which is the case with the laptop initiative. School board officials now realize that if new initiatives come from within the school, teachers will be more likely to adopt the initiative. In support of this hypothesis, teachers from control schools using technology voluntarily report much higher ratings of integration and satisfaction. This suggests that strategies for change using technology may need to be varied depending on the level of teaching and the context in which computers are being deployed.
In terms of key academic indicators, potentially the most interesting finding is the difference in CAT-3 scores between the experimental and control boards. Secondary students at the experimental schools had higher scores on the CAT-3 reading test and indicated making six times more frequent use of computer technology in their English classes, suggesting a possible treatment effect. Others have found that the use of technology has a positive impact on student writing especially at the secondary level (Goldberg, Russell, & Cook, 2003; Jeroski, 2003; Lowther, Ross, & Morrison, 2003; Rockman, et al., 2000). In contrast, mathematics scores were higher at the control schools where neither board indicated high levels of computer use for math. Nevertheless, these findings must be interpreted with some caution until the threats to validity of selection bias are more clearly overcome. Otherwise, the measures of core academic competencies, student self-concept and student self-regulation serve as useful and important baseline measures against which future progress can be measured.
The first phase of technology integration is to insure that teachers and students are comfortable with the uses of the tool and its features. It is evident that this familiarity is well under way as the laptops are deployed and used regularly during the school day. Subsequent phases of the laptop initiative are intended to focus on deeper, more challenging pedagogical applications, which rely increasingly on student-centred learning, and cross-curricular competencies as described in the Quebec Education Program.
Several decades ago, Benjamin Bloom argued for the importance of time-on-task as one key ingredient of learning success. It remains a key indicator of school success that teachers and students must be meaningfully engaged and, while technology can assist through its power and engagement, it is important that classroom management be in place so that the tool does not become a distraction.
This may require new strategies for classroom management. Or it may merely indicate that teachers are better able to detect off-task behaviour in a computer environment. Regardless, an exploration of how and whether off-task behaviour using computers leads to meaningful incidental learning (i.e., what are the students doing when they are off task?) should be considered.
School Success plans and goals are means by which these phases may be concretized. They can exist at multiple levels (e.g., board, school, teachers, and student) and they can be both short-term and long-term (e.g., more student collaboration, increased CAT-3 test results, etc.).
In addition, both future training and support for technology should focus on advanced uses, once familiarity has been accomplished. Ideas include: a) ensuring that teachers and students are aware of and using curricular and cross-curricular tools for learning with technology (e.g., electronic portfolios to support self-regulation); b) science and math applications which provide guided support for complex learning, and multimedia tools for developing literacy skills, etc.; c) examining the pedagogical uses of digital learning aspects found in learning object repositories and learning design tools to assemble them; d) developing collaborative learning skills among students which focus on positive interdependence and individual accountability; e) facilitating teacher and student expertise in information literacy including access and retrieval strategies for the internet and the abilities to make judgments about the quality, veracity, and completeness of information; f) encouraging communities of practice among teachers and administrators by creating distributed learning networks both within and between schools linking educators together and opening the doors of their classrooms to one another; and g) focusing assessment and evaluation of the technology integration on both the products of the initiative (i.e., what has been accomplished) as well as the process of the initiative (i.e., how it has been accomplished), documenting the success stories and best practices so they can be replicated.
Otherwise, the promise of technology must be tempered with the reality of the costs to purchase and maintain it even beyond the time and costs associated with learning how to use it wisely. In the former regard there is evidence in this initial report of the difficulties associated with maintenance. A technical problem is a reality that can compromise the dream, which future engineering developments may yet overcome. In the interim, technical support is a sine qua non of a computer-based learning environment. The hardware and software are still quirky and problematic especially for diverse and neophyte users.
Finally, we have argued that it is of essential importance to conduct rigorous and longitudinal research on the impacts of ubiquitous technology use on teaching and learning—the products of technology integration. We need unambiguous answers to whether technology is effective, on which outcomes, with which students and teachers, at what school levels, and for which subject areas. But we also need to answer questions about what technology works and how—the process of technology integration. Future research should better document the nature of teaching and learning with technology, determine aspects of effective professional development and describe the cross-curricular, collaborative and student-centred learning activities which lead to the promotion of academic competencies, enhanced self-concept and better student self-regulation.
The authors would like to thank the following people for their time, patience and continuous support: our data collectors and cleaners (Yin Liang, Bing Xiao Jiang, Lili Tang, Bounmy Thammavong, Julie Kwan, Seo Hung Lim, Gabriella Frankel, Sun Bo, Marina Adou, Mary Ann Chacko and Helen Stathopolous, Larysa Lysenko); Aline Grenier; Aida Hadzeomerovec; David Galati (Canadian Testing Centre); the members of the research committee from the experimental and control school boards; and Yuri Daschko and Susan Mongrain (Industry Canada). Finally, we wish to extend our sincere appreciation to the teachers, principals, students, and parents at the experimental and control school boards for believing that this project was an important one and for providing us with class time and giving up their free time for data collection.
Coley, R.J., Cradler, J., & Engel, P.K. (2000). Computers and the classroom: The status of technology in U.S. schools. Princeton, NJ: Policy Information Center, Educational Testing Service.
Davies, A. (2004). Finding proof of learning in a one-to-one computing classroom. Report submitted to Maine Learning Technology Initiative. Connections Publishing.
Davis, D., Garas, N., Hopstock, P., Kellum, A., & Stephenson, T. (2005, February). Henrico County Public Schools iBook survey report. Arlington, VA: Development Associates.
Fuchs, T., & Woessmann, L. (2004, November). Computers and student learning: Bivariate and multivariate evidence on the availability and use of computers at home and at school. CESifo Working Paper number 1321.
Goldberg, A., Russell, M., & Cook, A. (2003, February). The effect of computers on student writing: A meta-analysis of studies from 1992 to 2002. The Journal of Technology, Learning and Assessment, 2(1).
Gravelle, P. B. (2003, April). Early evidence from the field – the Maine Learning Technology Initiative: Impact on the digital divide. Bangor, ME: Center for Education Policy, University of Southern Maine.
Harasim, L., Hiltz, S. R., Teles, L., & Turoff, M. (1995). Learning networks: A field guide to teaching and learning on-line. Cambridge, MA: MIT Press.
Healy, J. M. (1998). Failure to connect: How computers affect children's minds—for better and worse. New York: Simon & Schuster.
Janosz, M. (2003). Questionnaire sur l'environment socio-educatif. Montreal, QC: Université de Montréal.
Kulik, J. A, & Kulik, C-L. C. (Eds.) (1989). Instructional systems [Special Issue]. International Journal of Educational Research: Meta-Analysis in Education, 13(3). 277–289.
Lane, D. M. M. (2003). The Maine Learning Technology Initiative: Impact on students and learning. Paper presented at the Annual Meeting of New England Educational Research Organization, Portsmouth, New Hampshire.
Lou, Y., Abrami, P. C., & d'Apollonia, S. (2001, Fall). Small group and individual learning with technology: A meta-analysis. Review of Educational Research, 71(3), 449–521.
Lowerison, G., Sclater, J., Schmid, R., Abrami, P.C. (in press). Student perceived effectiveness of computer technology use in postsecondary classrooms. Computers in Education.
Lowther, D. L., Ross, S. M., & Morrison, G. M. (2003). When each one has one: the influences on teaching strategies and student achievement of using laptops in the classroom. Educational Technology Research & Development, 51(3), 23-45.
Marsh, H. W. (1999) Self Description Questionnaire II. University of Western Sydney : Macarthur.
MEQ. (2002) Indice de milieu socio-économique par école, 2001-2002. Quebec , QC : The Ministry.
Rockman et al. (2000). A more complex picture: laptop use and impact in th\e context of changing home and school access. A third in a series of research studies on Microsoft's Anytime Anywhere Learning Program. Retrieved December 26, 2005 from http://rockman.com/projects/laptop/laptop3exec.htm.
Russell, T. L. (1999). The no significant difference phenomenon. Raleigh, NC: North Carolina State University Press.
Ryan, R. M., & Connell, J. P. (1989). Perceived locus of causality and internalization: Examining reasons for acting in two domains. Journal of Personality and Social Psychology, 57, 749–761.
Sargent, K. I. (2003). The Maine Learning Technology Initiative: What is the impact on teacher beliefs and instructional practices? Paper presented at the Annual Meeting of New England Educational Research Organization, Portsmouth, New Hampshire.
Scardamalia, M., & Bereiter, C. (1996). Computer support for knowledge-building communities. In T. Koschmann, (Ed.). CSCL: Theory and practice of an emerging paradigm. Mahwah, NJ: Erbaum.
Schacter, J. (1999) The impact of education technology on student achievement: What the most current research has to say. Milken Exchange on Education Technology.
Silvernail, D. L., Harris, W. J., Lane, D. M., Fairman, J., Gravelle, P., Smith, L., Sargent, K., & McIntire W. (2003, March). Maine Learning Technology Initiative: Teacher, student, and school perspectives. Mid-year evaluation report. Bangor, ME: Maine Education Policy Research Institute.
Silvernail, D. L. & Lane, D. M. (2004, Feb.). The Impact of Maine's one-to one laptop program on middle school teachers and students. Phase one summary evidence. Research report no.1. Bangor, ME: Maine Education Policy Research Institute, University of Southern Maine Office.
Sivin-Kachala, J., & Bialo, E. R. (2000). 2000 Research report on the effectiveness of technology in schools (7th ed.). Software & Information Industry Association.
Ungerleider, C., & Burns, T. (2002). Information and communication technologies in elementary and secondary education: a state of art review. Prepared for 2002 Pan-Canadian Education Research Agenda Symposium "Information Technology and Learning", Montreal, QC.
Vallerand, R. J., Pelletier, L. G., Blais, M. R., Briere, N. M., Senecal, C. B., & Vallieres, E. F. (1992-1993) Academic Motivation Scale. Educational and Psychological Measurement, 52 & 53.
Waxman, H. C., Lin, M-F, & Michko, G. M. (2003, December). A meta-analysis of the effectiveness of teaching and learning with technology on student outcomes. Learning Point Associates.
Wozney, L., Venkatesh, V., & Abrami, P. C. (2006). Implementing computer technologies: Teachers' perceptions and practices. Journal of Technology and Teacher Education, 14(1), 173–207.
|
{
"redpajama_set_name": "RedPajamaC4"
}
| 1,402 |
[
128000,
72526,
328,
566,
977,
11,
574,
459,
75302,
56546,
520,
279,
14821,
369,
279,
19723,
315,
21579,
323,
21304,
11,
64193,
689,
3907,
11,
30613,
11,
35195,
11,
323,
374,
5131,
43424,
11,
11930,
320,
88,
2969,
7620,
8,
449,
279,
4435,
23853,
9607,
34807,
16784,
11,
30613,
11,
35195,
627,
23550,
461,
56954,
5849,
11,
30661,
11,
374,
264,
17054,
520,
279,
10181,
315,
3907,
23663,
34322,
612,
21844,
19241,
11,
87542,
9304,
11,
4821,
7379,
11,
21193,
323,
374,
264,
49681,
859,
449,
279,
14821,
369,
279,
19723,
315,
21579,
323,
21304,
11,
64193,
689,
3907,
11,
30613,
11,
35195,
627,
79039,
43982,
11,
374,
10790,
323,
8245,
40420,
520,
279,
14821,
369,
279,
19723,
315,
21579,
323,
21304,
26729,
34985,
11,
64193,
689,
3907
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
72526,
328,
566,
977,
11,
574,
459,
75302,
56546,
520,
279,
14821,
369,
279,
19723,
315,
21579,
323,
21304,
11,
64193,
689,
3907,
11,
30613,
11,
35195,
11,
323,
374,
5131,
43424,
11,
11930,
320,
88,
2969,
7620,
8,
449,
279,
4435,
23853,
9607,
34807,
16784,
11,
30613,
11,
35195,
627,
23550,
461,
56954,
5849,
11,
30661,
11,
374,
264,
17054,
520,
279,
10181,
315,
3907,
23663,
34322,
612,
21844,
19241,
11,
87542,
9304,
11,
4821,
7379,
11,
21193,
323,
374,
264,
49681,
859,
449,
279,
14821,
369,
279,
19723,
315,
21579,
323,
21304,
11,
64193,
689,
3907,
11,
30613,
11,
35195,
627,
79039,
43982,
11,
374,
10790,
323,
8245,
40420,
520,
279,
14821,
369,
279,
19723,
315,
21579,
323,
21304,
26729,
34985,
11,
64193,
689,
3907,
-100
] |
Hino gallery is pleased to present a solo exhibition of recent paintings by Isao Nakamura from Monday, November 7th 2016.
It could be said that Isao Nakamura is one of those painters who continually searches for a sense of "painterliness" in his work. During the 1970s, he produced monochromatic paintings in a systematic way. However, over time, and mostly during the act of making itself, Nakamura found that he yearned for a sense of liberation from the restrictive nature of this early orderly constructed oeuvre. Since he started to heed this "voice of liberation" in the late 1980s, he has been developing a new body of paintings which he has titled using a coined word "ISEI" - literally translated from Japanese Kanji as "Mind Vigor".
For Nakamura, the preferred interpretation of 'mind' suggests a constantly transforming emotional approach to his work. The marks, forms, gestures and colors within the paintings are applied subconsciously and therefore unpredictably, resulting in unintentional compositions rendered in paint on canvas. One action triggers another and ultimately generates a chain reaction. Nakamura believes that 'pure painting' can exist when the event (the act of making), overrides preconception. "ISEI" is a working process that Nakamura has applied during his 40-year career as a painter and one that he will continue to explore.
This time hino gallery will show the most recent paintings from the "ISEI" series which includes large scale works of the dimensions 194cm x 259cm. We hope you will enjoy the dynamism that radiates from these paintings.
|
{
"redpajama_set_name": "RedPajamaC4"
}
| 5,180 |
[
128000,
39,
3394,
18537,
374,
18949,
311,
3118,
264,
13839,
28099,
315,
3293,
36692,
555,
2209,
3524,
44329,
84817,
505,
7159,
11,
6841,
220,
22,
339,
220,
679,
21,
627,
2181,
1436,
387,
1071,
430,
2209,
3524,
44329,
84817,
374,
832,
315,
1884,
97953,
889,
35611,
27573,
369,
264,
5647,
315,
330,
34717,
261,
49958,
1,
304,
813,
990,
13,
12220,
279,
220,
4468,
15,
82,
11,
568,
9124,
1647,
5059,
99866,
36692,
304,
264,
37538,
1648,
13,
4452,
11,
927,
892,
11,
323,
10213,
2391,
279,
1180,
315,
3339,
5196,
11,
44329,
84817,
1766,
430,
568,
1060,
19212,
369,
264,
5647,
315,
55633,
505,
279,
58096,
7138,
315,
420,
4216,
85869,
20968,
69483,
61480,
13,
8876,
568,
3940,
311,
75499,
420,
330,
10063,
315,
55633,
1,
304
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
39,
3394,
18537,
374,
18949,
311,
3118,
264,
13839,
28099,
315,
3293,
36692,
555,
2209,
3524,
44329,
84817,
505,
7159,
11,
6841,
220,
22,
339,
220,
679,
21,
627,
2181,
1436,
387,
1071,
430,
2209,
3524,
44329,
84817,
374,
832,
315,
1884,
97953,
889,
35611,
27573,
369,
264,
5647,
315,
330,
34717,
261,
49958,
1,
304,
813,
990,
13,
12220,
279,
220,
4468,
15,
82,
11,
568,
9124,
1647,
5059,
99866,
36692,
304,
264,
37538,
1648,
13,
4452,
11,
927,
892,
11,
323,
10213,
2391,
279,
1180,
315,
3339,
5196,
11,
44329,
84817,
1766,
430,
568,
1060,
19212,
369,
264,
5647,
315,
55633,
505,
279,
58096,
7138,
315,
420,
4216,
85869,
20968,
69483,
61480,
13,
8876,
568,
3940,
311,
75499,
420,
330,
10063,
315,
55633,
1,
304,
-100
] |
Austerity is defined as a set of economic policies a government implements to control public sector debt.
Austerity measures are the response of a government whose public debt is so large that the risk of default, or the inability to service the required payments on its debt obligations, becomes a real possibility. Default risk can spiral out of control quickly; as an individual, company or country slips further into debt, lenders will charge a higher rate of return for future loans, making it more difficult for the borrower to raise capital.
Austerity only takes place when the gap between government receipts and government expenditures shrinks. A reduction in government spending doesn't simply equate austerity measures.
Broadly speaking, there are three primary types of austerity measures. The first is focused on revenue generation (higher taxes), and it often even supports more government spending. The goal is to stimulate growth with spending and capturing the benefits through taxation. Another kind is sometimes called the Angela Merkel model — after the German chancellor — and focuses on raising taxes while cutting nonessential government functions. The last, which features lower taxes, and lower government spending, is the preferred method of free-market advocates.
The global economic downturn that began in 2008 left many governments with reduced tax revenues and exposed what some believed were unsustainable spending levels. Several European countries, including the United Kingdom, Greece and Spain, have turned to austerity as a way to alleviate budget concerns. Austerity became almost imperative during the global recession in Europe, where eurozone members don't have the ability to address mounting debts by printing their own currency. Thus, as their default risk increased, creditors put pressure on certain European countries to aggressively tackle spending.
There is some disagreement among economists about the effect of tax policy on the government budget. Former Ronald Reagan adviser Arthur Laffer famously argued that strategically cutting taxes would spur economic activity, paradoxically leading to more revenue.
Still, most economists and policy analysts agree that raising taxes will raise revenues. This was the tactic that many European countries took. For example, Greece increased value-added tax (VAT) rates to 23% in 2010 and imposed an additional 10% tariff on imported cars. Income tax rates increased on upper-income scales, and several new taxes were levied on property.
The opposite austerity measure is reducing government spending. Most consider this a more efficient means of reducing the deficit. New taxes mean new revenue for politicians, who are inclined to spend it on constituents.
Spending takes many forms: grants, subsidies, wealth redistribution, entitlement programs, paying for government services, providing for the national defense, benefits to government employees and foreign aid. Any reduction in spending is a de facto austerity measure.
Interest on newly issued government securities may be cut, making these investments less attractive to investors, but reducing government interest obligations.
The Federal Reserve may either reduce or increase the money supply and interest rates as circumstances dictate to resolve the crisis.
Perhaps the most successful model of austerity, at least in response to a recession, occurred in the United States between 1920 and 1921.The unemployment rate in the U.S. economy jumped from 4% to almost 12%. Real gross national product (GNP) declined almost 20%—greater than any single year during the Great Depression or Great Recession.
President Warren G. Harding responded by cutting the federal budget by almost 50%. Tax rates were reduced for all income groups, and the debt dropped by more than 30%. In a speech in 1920, Harding declared that his administration "will attempt intelligent and courageous deflation, strike at government borrowing...and will attack the high cost of government with every energy and facility."
What Are the Risks of Austerity Measures?
Austerity runs contradictory to certain schools of economic thought that have been prominent since the Great Depression. In an economic downturn, falling private income reduces the amount of tax revenue that a government generates. Likewise, government coffers fill up with tax revenue during an economic boom. The irony is that public expenditures, such as unemployment benefits, are needed more during a recession than a boom.
Countries that belong to a monetary union, such as the European Union, do not have as much autonomy or flexibility when boosting their economy during a recession. Autonomous countries can use their central banks to artificially lower interests rates or increase the money supply in an attempt to encourage the private market into spending or investing its way out of a downturn.
For instance, the United States' Federal Reserve has engaged in a dramatic program of quantitative easing since November 2009. Countries such as Spain, Ireland and Greece did not have the same financial flexibility due to their commitment to the euro, although the European Central Bank (ECB) also enacted quantitative easing, though later than in the U.S.
Mainly, austerity measures have failed to improve the financial situation in Greece because the country is struggling with a lack of aggregate demand. It is inevitable that aggregate demand declines with austerity. Structurally, Greece is a country of small businesses rather than large corporations, so it benefits less from the principles of austerity such as lower interest rates. These small companies do not benefit from a weakened currency, as they are unable to become exporters.
While most of the world followed the financial crisis in 2008 with years of lackluster growth and rising asset prices, Greece has been mired in its own depression. Greece's gross domestic product (GDP) in 2010 was $299.36 billion. In 2014, its GDP was $235.57 billion according to the U.N. This is a staggering destruction in the country's economic fortunes, akin to the Great Depression in the United States in the 1930s.
Greece's problems began following the Great Recession as the country was spending too much money relative to tax collection. As the country's finances spiraled out of control and interest rates on sovereign debt exploded higher, the country was forced to seek bailouts or default on its debt. Default carried the risk of a full-blown financial crisis with a complete collapse of the banking system. It would also be likely to lead to an exit from the euro and the European Union.
In exchange for bailouts, the EU and European Central Bank (ECB) embarked on an austerity program that sought to bring Greece's finances under control. The program cut public spending and increased taxes often at the expense of Greece's public workers and was very unpopular. Greece's deficit has dramatically decreased, but the country's austerity program has been a disaster in terms of healing the economy.
The austerity program compounded Greece's problem of a lack of aggregate demand. Cutting spending led to even lower aggregate demand, which made Greece's long-term economic fortunes even drier, leading to higher interest rates. The right remedy would involve a combination of short-term stimulus to shore up aggregate demand with long-term reforms of Greece's public sector and tax collection departments.
The major benefit of austerity is lower interest rates. Indeed, interest rates on Greek debt fell following its first bailout. However, the gains were limited to the government having decreased interest rate expenses. The private sector was unable to benefit. The major beneficiaries of lower rates are large corporations. Marginally, consumers benefit from lower rates, but the lack of sustainable economic growth kept borrowing at depressed levels despite the lower rates.
The second structural issue for Greece is the lack of a significant export sector. Typically, a weaker catalyst is a boost for a country's export sector. However, Greece is an economy composed of small businesses with fewer than 100 employees. These types of companies are not equipped to turn around and start exporting. Unlike countries in similar situations with large corporations and exporters, such as Portugal, Ireland or Spain, which have managed to recover, Greece re-entered a recession in the fourth quarter of 2015.
Grexit, an abbreviation for "Greek exit," refers to Greece's potential withdrawal from the eurozone and the reintroduction of the drachma as its currency.
Aggregate demand is the total amount of goods and services demanded in the economy at a given overall price level at a given time.
Underconsumption is the purchase of goods and services at levels that fall below the available supply.
|
{
"redpajama_set_name": "RedPajamaC4"
}
| 2,377 |
[
128000,
32,
55255,
374,
4613,
439,
264,
743,
315,
7100,
10396,
264,
3109,
5280,
311,
2585,
586,
10706,
11897,
627,
32,
55255,
11193,
527,
279,
2077,
315,
264,
3109,
6832,
586,
11897,
374,
779,
3544,
430,
279,
5326,
315,
1670,
11,
477,
279,
38550,
311,
2532,
279,
2631,
14507,
389,
1202,
11897,
30255,
11,
9221,
264,
1972,
13336,
13,
8058,
5326,
649,
42197,
704,
315,
2585,
6288,
26,
439,
459,
3927,
11,
2883,
477,
3224,
68754,
4726,
1139,
11897,
11,
46115,
690,
6900,
264,
5190,
4478,
315,
471,
369,
3938,
17017,
11,
3339,
433,
810,
5107,
369,
279,
70719,
311,
4933,
6864,
627,
32,
55255,
1193,
5097,
2035,
994,
279,
13225,
1990,
3109,
57580,
323,
3109,
53869,
14362,
15872,
13,
362,
14278,
304,
3109,
10374,
3250,
956,
5042
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
32,
55255,
374,
4613,
439,
264,
743,
315,
7100,
10396,
264,
3109,
5280,
311,
2585,
586,
10706,
11897,
627,
32,
55255,
11193,
527,
279,
2077,
315,
264,
3109,
6832,
586,
11897,
374,
779,
3544,
430,
279,
5326,
315,
1670,
11,
477,
279,
38550,
311,
2532,
279,
2631,
14507,
389,
1202,
11897,
30255,
11,
9221,
264,
1972,
13336,
13,
8058,
5326,
649,
42197,
704,
315,
2585,
6288,
26,
439,
459,
3927,
11,
2883,
477,
3224,
68754,
4726,
1139,
11897,
11,
46115,
690,
6900,
264,
5190,
4478,
315,
471,
369,
3938,
17017,
11,
3339,
433,
810,
5107,
369,
279,
70719,
311,
4933,
6864,
627,
32,
55255,
1193,
5097,
2035,
994,
279,
13225,
1990,
3109,
57580,
323,
3109,
53869,
14362,
15872,
13,
362,
14278,
304,
3109,
10374,
3250,
956,
5042,
-100
] |
Approximately 800 bears are still kept under appalling keeping conditions on Vietnam's bear farms.
Today, it is possible to completely substitute bear bile using cheap and effective herbal and synthetic ingredients. In fact, these alternatives have been readily available since the 1950s. Considering the detrimental effects of bear bile farming on the conservation of wild bears, as well as the extremely cruel methods of bile extraction and poor keeping conditions, bile from farmed bears can be described as a highly unethical and a totally unnecessary product.
|
{
"redpajama_set_name": "RedPajamaC4"
}
| 4,898 |
[
128000,
70620,
7253,
220,
4728,
30824,
527,
2103,
8774,
1234,
85905,
10494,
4787,
389,
23315,
596,
11984,
34324,
627,
15724,
11,
433,
374,
3284,
311,
6724,
28779,
11984,
73394,
1701,
12136,
323,
7524,
51487,
323,
28367,
14293,
13,
763,
2144,
11,
1521,
27548,
617,
1027,
31368,
2561,
2533,
279,
220,
6280,
15,
82,
13,
56877,
279,
65069,
6372,
315,
11984,
73394,
33489,
389,
279,
29711,
315,
8545,
30824,
11,
439,
1664,
439,
279,
9193,
28128,
5528,
315,
73394,
33289,
323,
8009,
10494,
4787,
11,
73394,
505,
3117,
2106,
30824,
649,
387,
7633,
439,
264,
7701,
89735,
323,
264,
12756,
26225,
2027,
13,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0
] |
[
70620,
7253,
220,
4728,
30824,
527,
2103,
8774,
1234,
85905,
10494,
4787,
389,
23315,
596,
11984,
34324,
627,
15724,
11,
433,
374,
3284,
311,
6724,
28779,
11984,
73394,
1701,
12136,
323,
7524,
51487,
323,
28367,
14293,
13,
763,
2144,
11,
1521,
27548,
617,
1027,
31368,
2561,
2533,
279,
220,
6280,
15,
82,
13,
56877,
279,
65069,
6372,
315,
11984,
73394,
33489,
389,
279,
29711,
315,
8545,
30824,
11,
439,
1664,
439,
279,
9193,
28128,
5528,
315,
73394,
33289,
323,
8009,
10494,
4787,
11,
73394,
505,
3117,
2106,
30824,
649,
387,
7633,
439,
264,
7701,
89735,
323,
264,
12756,
26225,
2027,
13,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100
] |
By its very nature—complex, interconnected, change-prone, and operating across both levels of analysis and time—the academic study of international phenomena is not amenable to traditional disciplinary boundaries. In recognition of this reality, the international studies (INS) major is multi-disciplinary, with an emphasis in the core disciplines of political studies, history and economics, together with intensive training in foreign languages and research methods. Students will emerge from the program with a grasp of the major theories, methods and substantive issues pertinent to the study of international political, social and economic phenomena, and prepared to pursue careers in government, law, international non- or inter-governmental organizations, the military or academia, among others.
The INS major is overseen by the International Studies Program Committee.
"I enjoy International Studies because it is taught by good professors and it is a subject I love. The classes have relatively few students - which feel like private lectures - and the students are truly engaged and interested in the subject."
|
{
"redpajama_set_name": "RedPajamaC4"
}
| 789 |
[
128000,
1383,
1202,
1633,
7138,
2345,
24126,
11,
83416,
11,
2349,
27748,
606,
11,
323,
10565,
4028,
2225,
5990,
315,
6492,
323,
892,
22416,
14584,
4007,
315,
6625,
44247,
374,
539,
1097,
12837,
311,
8776,
57315,
23546,
13,
763,
18324,
315,
420,
8903,
11,
279,
6625,
7978,
320,
9751,
8,
3682,
374,
7447,
52765,
44550,
11,
449,
459,
25679,
304,
279,
6332,
49255,
315,
5054,
7978,
11,
3925,
323,
28989,
11,
3871,
449,
37295,
4967,
304,
7362,
15823,
323,
3495,
5528,
13,
20783,
690,
34044,
505,
279,
2068,
449,
264,
34477,
315,
279,
3682,
26018,
11,
5528,
323,
67749,
4819,
62623,
311,
279,
4007,
315,
6625,
5054,
11,
3674,
323,
7100,
44247,
11,
323,
10235,
311,
23564,
31133,
304,
3109,
11,
2383,
11,
6625,
2536,
12,
477,
958
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
1383,
1202,
1633,
7138,
2345,
24126,
11,
83416,
11,
2349,
27748,
606,
11,
323,
10565,
4028,
2225,
5990,
315,
6492,
323,
892,
22416,
14584,
4007,
315,
6625,
44247,
374,
539,
1097,
12837,
311,
8776,
57315,
23546,
13,
763,
18324,
315,
420,
8903,
11,
279,
6625,
7978,
320,
9751,
8,
3682,
374,
7447,
52765,
44550,
11,
449,
459,
25679,
304,
279,
6332,
49255,
315,
5054,
7978,
11,
3925,
323,
28989,
11,
3871,
449,
37295,
4967,
304,
7362,
15823,
323,
3495,
5528,
13,
20783,
690,
34044,
505,
279,
2068,
449,
264,
34477,
315,
279,
3682,
26018,
11,
5528,
323,
67749,
4819,
62623,
311,
279,
4007,
315,
6625,
5054,
11,
3674,
323,
7100,
44247,
11,
323,
10235,
311,
23564,
31133,
304,
3109,
11,
2383,
11,
6625,
2536,
12,
477,
958,
-100
] |
Q: Mapping between T --> IHandler I have the following interface
public interface IHandler<T>
{
void Handle(T myObject);
}
I'd like to have a HandlersManager class with holds a mapping between object types to their corresponding handler, but I'm not sure how I'm supposed to define the object that hold this mapping.
For example, what I'd like to have is this:
typeof(string) --> instance of IHandler<string>
typeof(MyClass) --> instance of IHandler<MyClass>
The best thing I got so far was to define Dictionary<Type, object> for the mapping, but in this case I would have to cast the value to IHandler<T> every time I get it.
Is there a better solution or something that I have completely missed?
A: That's as good as it can get with only a generic IHandler<T> interface.
In order to explore more options, we could define a non-generic version of the interface:
public interface IHandler
{
void Handler(object myObject);
}
Then you could also define a generic abstract base class that implements both IHandler<T> and IHandler:
public abstract class BaseHandler<T> : IHandler, IHandler<T>
{
public abstract void Handle(T myObject);
void IHandler.Handle(object myObject)
{
((IHandler<T>)this).Handle((T) myObject);
}
}
At this point you can have an IDictionary<Type, IHandler> and you can directly call IHandler.Handle on the values you pull out of it:
var obj = /* whatever */
dictionary[obj.GetType()].Handle(obj);
On the other hand we now have an additional interface and an abstract base class just to hide a cast from "user" code, which doesn't sound very impressive.
A: I suspect you're using this to resolve dependencies. Instead, use a dedicated container that will handle these issues for you.
If you don't want to do that, you want something like this:
Dictionary<Type, object> dictionary;
IHandler<T> Resolve<T>() {
return (IHandler<T>)dictionary[typeof(T)];
}
There isn't any other way with generics.
Is there a better solution or something that I have completely missed?
No, but manager classes are generally code smells. Be careful.
|
{
"redpajama_set_name": "RedPajamaStackExchange"
}
| 5,081 |
[
128000,
48,
25,
39546,
1990,
350,
3929,
358,
3126,
358,
617,
279,
2768,
3834,
198,
898,
3834,
358,
3126,
3203,
397,
517,
262,
742,
14078,
4233,
856,
1211,
317,
633,
40,
4265,
1093,
311,
617,
264,
96663,
2087,
538,
449,
10187,
264,
13021,
1990,
1665,
4595,
311,
872,
12435,
7158,
11,
719,
358,
2846,
539,
2771,
1268,
358,
2846,
10171,
311,
7124,
279,
1665,
430,
3412,
420,
13021,
627,
2520,
3187,
11,
1148,
358,
4265,
1093,
311,
617,
374,
420,
512,
10433,
3693,
8,
220,
3929,
2937,
315,
358,
3126,
5053,
397,
10433,
38585,
1999,
8,
3929,
2937,
315,
358,
3126,
80433,
1999,
1363,
791,
1888,
3245,
358,
2751,
779,
3117,
574,
311,
7124,
10685,
36606,
11,
1665,
29,
369,
279,
13021,
11,
719,
304,
420,
1162,
358
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
48,
25,
39546,
1990,
350,
3929,
358,
3126,
358,
617,
279,
2768,
3834,
198,
898,
3834,
358,
3126,
3203,
397,
517,
262,
742,
14078,
4233,
856,
1211,
317,
633,
40,
4265,
1093,
311,
617,
264,
96663,
2087,
538,
449,
10187,
264,
13021,
1990,
1665,
4595,
311,
872,
12435,
7158,
11,
719,
358,
2846,
539,
2771,
1268,
358,
2846,
10171,
311,
7124,
279,
1665,
430,
3412,
420,
13021,
627,
2520,
3187,
11,
1148,
358,
4265,
1093,
311,
617,
374,
420,
512,
10433,
3693,
8,
220,
3929,
2937,
315,
358,
3126,
5053,
397,
10433,
38585,
1999,
8,
3929,
2937,
315,
358,
3126,
80433,
1999,
1363,
791,
1888,
3245,
358,
2751,
779,
3117,
574,
311,
7124,
10685,
36606,
11,
1665,
29,
369,
279,
13021,
11,
719,
304,
420,
1162,
358,
-100
] |
We asked, and nearly seven thousand loyal gymrats, meatheads and Crossfitters responded! When you workout do you go barehand, use gloves, grips or straps? You may (or may not) be surprised at what some of these customer reviews have to say!
We polled 10,000 avid weightlifters, Crossfit fans, and gym goers to see what was their favorite type of hand protection for working out. We weren't all that surprised at what they had to say.
Barehand - 27% of respondents said that they don't use any type of hand protection for weight training or workouts and prefer to go barehand. Reviews suggested things like: "I prefer to feel the weight in my hands," "Gloves get in the way," "My hands get too sweaty to use anything especially when I'm dripping wet after a Crossfit WOD.
Workout Gloves - 39% of the customer reviews and comments showed that a lot of people are still using traditional old school bodybuilder gloves. They liked that they can avoid getting calluses and dry skin, but they did mention A LOT that they really didn't like when the gym gloves are too bulky, overly padded, or too warm.
Weightlifting Grips - 25% told us that they like using weight lifting grips for Crossfit or their gym routines. They liked the idea of not having a big bulky glove to get in the way of HIIT (High intensity interval training) workouts, but it still offered them adequate hand protection. Most of the reviews said that they usually lost them, or didn't like that they fell off in between exercises.
Weightlifting Straps - The remaining 9% of those surveyed said they like using their weightlifting straps. To be fair, from both the guys and girls, reviews told us that barehand or gloves aren't used during their normal workout, they just use lifting straps for heavy lifts like deadlifts, snatches or squats.
Barehand reviews told us that you don't like wearing anything. GymPaws are compact and fit right in the palm of your hands.
Gloves users hated how hot and sweaty their hands get. Because of the unique design of GymPaws they allow maximum air circulation. No more sweaty hands!
Grips reviewers were annoyed that they kept losing their grips or that they didn't stay in place. GymPaws have 4 finger loops to keep them in place through your whole workout!
Weightlifting Straps and gloves or grips or barehand really aren't interchangeable to be honest. Straps are used for heavy lifts and usually not used for many other exercises in the gym.
You can see all of GymPaws® Brand products here on the website and checkout using Amazon, Paypal or credit card, and in addition you can also see our full catalog on Amazon right here http://www.amazon.com/shops/gympaws.
Whatever type of hand protection you decide to use, read the customer reviews thoroughly and look for those that mention specific workouts, exercises or uses.
This is kind of a funny review video a personal trainer sent us!
|
{
"redpajama_set_name": "RedPajamaC4"
}
| 6,711 |
[
128000,
1687,
4691,
11,
323,
7154,
8254,
16579,
29947,
19343,
64037,
11,
13339,
36910,
323,
11511,
69,
29163,
16846,
0,
3277,
499,
26308,
656,
499,
733,
12743,
10888,
11,
1005,
36516,
11,
67339,
477,
49349,
30,
1472,
1253,
320,
269,
1253,
539,
8,
387,
14792,
520,
1148,
1063,
315,
1521,
6130,
8544,
617,
311,
2019,
4999,
1687,
84721,
220,
605,
11,
931,
56653,
4785,
36069,
388,
11,
11511,
6410,
7359,
11,
323,
19343,
733,
388,
311,
1518,
1148,
574,
872,
7075,
955,
315,
1450,
9313,
369,
3318,
704,
13,
1226,
15058,
956,
682,
430,
14792,
520,
1148,
814,
1047,
311,
2019,
627,
33,
548,
10888,
482,
220,
1544,
4,
315,
34281,
1071,
430,
814,
1541,
956,
1005,
904,
955,
315,
1450,
9313,
369,
4785,
4967,
477,
46944,
323
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
1687,
4691,
11,
323,
7154,
8254,
16579,
29947,
19343,
64037,
11,
13339,
36910,
323,
11511,
69,
29163,
16846,
0,
3277,
499,
26308,
656,
499,
733,
12743,
10888,
11,
1005,
36516,
11,
67339,
477,
49349,
30,
1472,
1253,
320,
269,
1253,
539,
8,
387,
14792,
520,
1148,
1063,
315,
1521,
6130,
8544,
617,
311,
2019,
4999,
1687,
84721,
220,
605,
11,
931,
56653,
4785,
36069,
388,
11,
11511,
6410,
7359,
11,
323,
19343,
733,
388,
311,
1518,
1148,
574,
872,
7075,
955,
315,
1450,
9313,
369,
3318,
704,
13,
1226,
15058,
956,
682,
430,
14792,
520,
1148,
814,
1047,
311,
2019,
627,
33,
548,
10888,
482,
220,
1544,
4,
315,
34281,
1071,
430,
814,
1541,
956,
1005,
904,
955,
315,
1450,
9313,
369,
4785,
4967,
477,
46944,
323,
-100
] |
This is a list of the items and equipment you can get in the game, with links to more information on the Zelda Wiki. The table can be sorted by order of acquisition, item or location. The locations are linked to the appropriate places in the guide, and for more information see the equipment page.
This page was last edited on 7 February 2017, at 01:55.
This page has been accessed 33,467 times.
|
{
"redpajama_set_name": "RedPajamaC4"
}
| 2,515 |
[
128000,
2028,
374,
264,
1160,
315,
279,
3673,
323,
7241,
499,
649,
636,
304,
279,
1847,
11,
449,
7902,
311,
810,
2038,
389,
279,
55731,
30328,
13,
578,
2007,
649,
387,
10839,
555,
2015,
315,
24279,
11,
1537,
477,
3813,
13,
578,
10687,
527,
10815,
311,
279,
8475,
7634,
304,
279,
8641,
11,
323,
369,
810,
2038,
1518,
279,
7241,
2199,
627,
2028,
2199,
574,
1566,
19685,
389,
220,
22,
7552,
220,
679,
22,
11,
520,
220,
1721,
25,
2131,
627,
2028,
2199,
706,
1027,
25790,
220,
1644,
11,
20419,
3115,
13,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0
] |
[
2028,
374,
264,
1160,
315,
279,
3673,
323,
7241,
499,
649,
636,
304,
279,
1847,
11,
449,
7902,
311,
810,
2038,
389,
279,
55731,
30328,
13,
578,
2007,
649,
387,
10839,
555,
2015,
315,
24279,
11,
1537,
477,
3813,
13,
578,
10687,
527,
10815,
311,
279,
8475,
7634,
304,
279,
8641,
11,
323,
369,
810,
2038,
1518,
279,
7241,
2199,
627,
2028,
2199,
574,
1566,
19685,
389,
220,
22,
7552,
220,
679,
22,
11,
520,
220,
1721,
25,
2131,
627,
2028,
2199,
706,
1027,
25790,
220,
1644,
11,
20419,
3115,
13,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100
] |
tank agitated leaching. surface area. The leaching process is conducted in leach tanks that Sodium cyanide NaCN releases free cyanide as long as the.
The leach circuit comprises 22 tanks mately 1 000 as 100% NaCN tons of cyanide for cyanide control at Ergo has been one of leachcost optimization.
|
{
"redpajama_set_name": "RedPajamaC4"
}
| 8,013 |
[
128000,
86271,
945,
33337,
514,
12092,
13,
7479,
3158,
13,
578,
514,
12092,
1920,
374,
13375,
304,
514,
613,
26951,
430,
83541,
58988,
579,
13106,
29768,
19786,
1949,
58988,
579,
439,
1317,
439,
279,
627,
791,
514,
613,
16622,
41095,
220,
1313,
26951,
296,
2718,
220,
16,
220,
931,
439,
220,
1041,
4,
13106,
29768,
20181,
315,
58988,
579,
369,
58988,
579,
2585,
520,
74302,
78,
706,
1027,
832,
315,
514,
613,
16845,
26329,
13,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0
] |
[
86271,
945,
33337,
514,
12092,
13,
7479,
3158,
13,
578,
514,
12092,
1920,
374,
13375,
304,
514,
613,
26951,
430,
83541,
58988,
579,
13106,
29768,
19786,
1949,
58988,
579,
439,
1317,
439,
279,
627,
791,
514,
613,
16622,
41095,
220,
1313,
26951,
296,
2718,
220,
16,
220,
931,
439,
220,
1041,
4,
13106,
29768,
20181,
315,
58988,
579,
369,
58988,
579,
2585,
520,
74302,
78,
706,
1027,
832,
315,
514,
613,
16845,
26329,
13,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100
] |
Billy Slater says punishment won'..
Billy Slater says punishment won't 'ram the point home' for Joseph Leilua
Mark Levy
Billy SlaterJoseph Leiluarugby league featuredWESTS TIGERS
Rugby league legend Billy Slater has criticised the punishment handed down to Joseph Leilua.
The Wests Tigers centre Joseph Leilua was handed down a four-match suspension by the NRL judiciary for his high shot on Panthers fullback Dylan Edwards.
Billy Slater told Mark Levy he wasn't surprised by Leilua's dangerous tackle.
"This has been a part of Joey's game for a long period of time.
"He is such a quality player that he doesn't need to have these brain explosions in his game."
Billy agreed that the transgression "certainly brought the game into disrepute", but argued the punishment didn't fit the crime.
"I got hit off the ball after I passed it in 2018 by Sia Soliola, and he got five weeks. I was asleep, I got taken off in a stretcher.
"I feel that they're making an example of Joey Leilua, and I don't even know if four weeks is going to ram the point home.
"I think it's got to be an internal punishment from the Wests Tigers."
Click PLAY below to hear Billy's comments in full
Image: Wests Tigers/Official website
Rugby LeagueSports
|
{
"redpajama_set_name": "RedPajamaCommonCrawl"
}
| 8,137 |
[
128000,
97003,
98103,
2795,
25060,
2834,
6,
35047,
97003,
98103,
2795,
25060,
2834,
956,
364,
2453,
279,
1486,
2162,
6,
369,
15466,
2009,
321,
4381,
198,
9126,
68290,
198,
97003,
98103,
61760,
2009,
321,
19253,
773,
1729,
10966,
15109,
95325,
50,
350,
1953,
4419,
198,
49,
773,
1729,
10966,
13314,
33919,
98103,
706,
60479,
279,
25060,
23415,
1523,
311,
15466,
2009,
321,
4381,
627,
791,
4410,
82,
40816,
12541,
15466,
2009,
321,
4381,
574,
23415,
1523,
264,
3116,
46804,
25288,
555,
279,
95254,
72975,
369,
813,
1579,
6689,
389,
45267,
2539,
1445,
44458,
37863,
627,
97003,
98103,
3309,
4488,
68290,
568,
5828,
956,
14792,
555,
2009,
321,
4381,
596,
11660,
22118,
627,
22244,
706,
1027,
264,
961,
315,
55835,
596,
1847,
369,
264,
1317,
4261,
315,
892,
627
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
97003,
98103,
2795,
25060,
2834,
6,
35047,
97003,
98103,
2795,
25060,
2834,
956,
364,
2453,
279,
1486,
2162,
6,
369,
15466,
2009,
321,
4381,
198,
9126,
68290,
198,
97003,
98103,
61760,
2009,
321,
19253,
773,
1729,
10966,
15109,
95325,
50,
350,
1953,
4419,
198,
49,
773,
1729,
10966,
13314,
33919,
98103,
706,
60479,
279,
25060,
23415,
1523,
311,
15466,
2009,
321,
4381,
627,
791,
4410,
82,
40816,
12541,
15466,
2009,
321,
4381,
574,
23415,
1523,
264,
3116,
46804,
25288,
555,
279,
95254,
72975,
369,
813,
1579,
6689,
389,
45267,
2539,
1445,
44458,
37863,
627,
97003,
98103,
3309,
4488,
68290,
568,
5828,
956,
14792,
555,
2009,
321,
4381,
596,
11660,
22118,
627,
22244,
706,
1027,
264,
961,
315,
55835,
596,
1847,
369,
264,
1317,
4261,
315,
892,
627,
-100
] |
MANAGEMENT OF RADIOACTIVE WASTES, AND NON-RADIOACTIVE WASTES FROM NUCLEAR FACILITIES (1)
Nuclear Fuel Cycle & Radioactive Waste (1)
Symposium on safety assessment of radioactive waste repositories; Symposium sur lanalyse de la surete des depots de dechets radioactifs (1)
Nuclear Energy Agency of the OECD (NEA) (1)
BALTIC SEA (1)
INTERMEDIATE-LEVEL RADIOACTIVE (1)
LOW-LEVEL RADIOACTIVE WASTES (1)
Use of safety assessment for repository systems development in Finland
Peltonen, E.K.; Nykyri, M.P.
Proceedings of the Symposium on safety assessment of radioactive waste repositories1990
[en] Development of repository systems for three different waste types, arising at the Olkiluoto nuclear power plant, is in active active stage in accordance with the schedule set in the policy decision made by the Finnish Government in 1983. A repository for low- and intermediate-level operating waste (VLJ-repository) should be in operation by the end of 1992. Excavation works at Olkiluoto were started in April 1988. The plans include co-location of a repository for decommissioning wastes. A repository development programme for spent fuel is proceeding, too. At the end of 1985 technical plans including safety assessment for deep disposal in cyrstalline bedrock were presented and screening of candidate areas for site investigations was reported. The field investigations are going on at five sites and will be finalized by the end of 1992. In addition, technical plans will be updated and a comprehensive safety assessment will be performed taking into account the investigation sites. In the repository systems development safety and performance assessments have been widely used, the objects ranging from concept feasibility, repository design, and optimization of technical barriers to licencing of construction. The analyses and the ways to present their results are discussed. 9 refs., 5 figs
MANAGEMENT OF RADIOACTIVE WASTES, AND NON-RADIOACTIVE WASTES FROM NUCLEAR FACILITIES (E5200)
Nuclear Energy Agency, 75 - Paris (France); 1024 p; ISBN 92-64-0334-3; ; 1990; p. 189-200; Organisation for Economic Co-operation and Development; Paris (France); Symposium on safety assessment of radioactive waste repositories; Symposium sur l'analyse de la surete des depots de dechets radioactifs; Paris (France); 9-13 Oct 1989
Nuclear Energy Agency of the OECD (NEA)
BALTIC SEA, INTERMEDIATE-LEVEL RADIOACTIVE, LOW-LEVEL RADIOACTIVE WASTES, RADIOACTIVE WASTE DISPOSAL, RISK ASSESSMENT, SAFETY ANALYSIS, UNDERGROUND DISPOSAL
MANAGEMENT, MATERIALS, RADIOACTIVE MATERIALS, RADIOACTIVE WASTES, SEAS, SURFACE WATERS, WASTE DISPOSAL, WASTE MANAGEMENT, WASTES
Related RecordRelated Record
|
{
"redpajama_set_name": "RedPajamaCommonCrawl"
}
| 7,348 |
[
128000,
23111,
62829,
3083,
83260,
40187,
468,
6483,
1600,
11,
3651,
21219,
11151,
43953,
40187,
468,
6483,
1600,
4393,
452,
5576,
24896,
85403,
75521,
320,
16,
340,
45,
9834,
37384,
42392,
612,
13792,
3104,
49522,
320,
16,
340,
29012,
54237,
389,
7296,
15813,
315,
59862,
12571,
50757,
26,
74938,
1765,
31791,
5893,
325,
409,
1208,
2771,
668,
951,
2219,
2469,
409,
409,
331,
1441,
9063,
533,
22589,
320,
16,
340,
45,
9834,
12634,
16784,
315,
279,
79517,
320,
4031,
32,
8,
320,
16,
340,
33,
36930,
1341,
78911,
320,
16,
340,
16321,
44,
36932,
12,
40977,
83260,
40187,
320,
16,
340,
9628,
12,
40977,
83260,
40187,
468,
6483,
1600,
320,
16,
340,
10464,
315,
7296,
15813,
369,
12827,
6067,
4500,
304,
37355,
198,
94872,
783,
268,
11,
469
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
23111,
62829,
3083,
83260,
40187,
468,
6483,
1600,
11,
3651,
21219,
11151,
43953,
40187,
468,
6483,
1600,
4393,
452,
5576,
24896,
85403,
75521,
320,
16,
340,
45,
9834,
37384,
42392,
612,
13792,
3104,
49522,
320,
16,
340,
29012,
54237,
389,
7296,
15813,
315,
59862,
12571,
50757,
26,
74938,
1765,
31791,
5893,
325,
409,
1208,
2771,
668,
951,
2219,
2469,
409,
409,
331,
1441,
9063,
533,
22589,
320,
16,
340,
45,
9834,
12634,
16784,
315,
279,
79517,
320,
4031,
32,
8,
320,
16,
340,
33,
36930,
1341,
78911,
320,
16,
340,
16321,
44,
36932,
12,
40977,
83260,
40187,
320,
16,
340,
9628,
12,
40977,
83260,
40187,
468,
6483,
1600,
320,
16,
340,
10464,
315,
7296,
15813,
369,
12827,
6067,
4500,
304,
37355,
198,
94872,
783,
268,
11,
469,
-100
] |
Get Any High Availability Products You Like!
Certbus.com offers Questions and Answers that will help you to get well prepared for your High Availability. These questions are selected by our professional expert team which are designed to test your knowledge and ensure your understanding about the technology. With our materials, you will sure to pass the exams and get the High Availability certification.
Certbus.com provide you free demo of all High Availability Products. You can have a try of our High Availability training products before you make your decisions to buy. You can download them easily from our website You may find sample High Availability questions and answers for downloads on all the High Availability exams pages. And all the demos are for free. Even though, our actual High Availability products are more useful and comprehensive than their demo versions, it is something we urge you to try first. Informed choices are always the best choices.
|
{
"redpajama_set_name": "RedPajamaC4"
}
| 9,568 |
[
128000,
1991,
5884,
5234,
52910,
15899,
1472,
9086,
4999,
38034,
10551,
916,
6209,
24271,
323,
38343,
430,
690,
1520,
499,
311,
636,
1664,
10235,
369,
701,
5234,
52910,
13,
4314,
4860,
527,
4183,
555,
1057,
6721,
6335,
2128,
902,
527,
6319,
311,
1296,
701,
6677,
323,
6106,
701,
8830,
922,
279,
5557,
13,
3161,
1057,
7384,
11,
499,
690,
2771,
311,
1522,
279,
40786,
323,
636,
279,
5234,
52910,
28706,
627,
38034,
10551,
916,
3493,
499,
1949,
17074,
315,
682,
5234,
52910,
15899,
13,
1472,
649,
617,
264,
1456,
315,
1057,
5234,
52910,
4967,
3956,
1603,
499,
1304,
701,
11429,
311,
3780,
13,
1472,
649,
4232,
1124,
6847,
505,
1057,
3997,
1472,
1253,
1505,
6205,
5234,
52910,
4860,
323,
11503,
369,
31572,
389,
682,
279,
5234,
52910,
40786
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
1991,
5884,
5234,
52910,
15899,
1472,
9086,
4999,
38034,
10551,
916,
6209,
24271,
323,
38343,
430,
690,
1520,
499,
311,
636,
1664,
10235,
369,
701,
5234,
52910,
13,
4314,
4860,
527,
4183,
555,
1057,
6721,
6335,
2128,
902,
527,
6319,
311,
1296,
701,
6677,
323,
6106,
701,
8830,
922,
279,
5557,
13,
3161,
1057,
7384,
11,
499,
690,
2771,
311,
1522,
279,
40786,
323,
636,
279,
5234,
52910,
28706,
627,
38034,
10551,
916,
3493,
499,
1949,
17074,
315,
682,
5234,
52910,
15899,
13,
1472,
649,
617,
264,
1456,
315,
1057,
5234,
52910,
4967,
3956,
1603,
499,
1304,
701,
11429,
311,
3780,
13,
1472,
649,
4232,
1124,
6847,
505,
1057,
3997,
1472,
1253,
1505,
6205,
5234,
52910,
4860,
323,
11503,
369,
31572,
389,
682,
279,
5234,
52910,
40786,
-100
] |
Car insurence in Michigan. Auto Insurance Quotes can Save you HUNDREDS on Auto Insurance!
In other words, this policy will definitely need to pay exorbitant prices can do this within sixty days. All you have undoubtedly noticed that rates seem to over look. "You need to be confident that you misinterpreted what really happened or if you can pick an insurance score" to assess the risk the higher your credit score high and dry despite the fact is that there are other advantages to enjoy stress-free driving. Looking at an auto insurance is acceptable are on a provider, ask.
The big difference in rates from all the discounts from some sleazy salesman or on the internet will bombard you with a clean driving record, a car makes more of your own money! It is not what we told ourselves, is an Internet connection and about it, other than the actual rates they will try match the coverage. Additionally, by insuring your car stolen or even medical bills of anyone who is at fault, liability coverage is right for you. In the past this will in turn cause a chain reaction which could typically be for rental vehicle coverage. Once emergency assistance coverage is always the case.
Comprehensive policies are not only provides residential protection, but is it possible for your auto insurance is no payment for a full policy and what you know who the at-fault driver's vehicle policy. With that, hunting for the next phone call and ask. If you need to pay more attention than such stories deserve. First and find a company offers, the best way to do is research on every car needs to be the liability if a particular company, if you're on the road and helps you out if the driving profile of the insured, and so is known as a new vehicle. It is essential to many of these sites, but the most costly to you. Purchasing direct car insurence in Michigan quote that they are also several other variables to consider. Looking at the car insurance quotes online you can take remedial measures, such as taking action to take advantage of all expenses for the damages done to the issue we are well aware of proper seat-belt safety or coverage? With this approach you and so is carrying the proof of ownership of the country, the amount for a year to get consistently high quality ones is the amount you drive a vehicle accident. Nonetheless, you cannot expect a reduced settlement or even a single person after an accident, it will assist you in shopping the right factors takes a lot more for your package with a genuine company which handles the repairs. Ever thought of buying a new driver, or the California car insurence in Michigan policies..
You must make comparisons between one company, the peace of mind. The question is yes, then you have narrowed that search down to the ease and convenience of having auto insurance. Some of those extras can raise the price of insurance. Like with most insurance bang for your present policy is not too long ago, the only place to start with. They will pay any money if you take the smarter approach, and get into any collisions or accidents, but the insurance company in customer service. Most insurance companies make the mistake was either with you will have to seek out and compare quotes. Often Organizations will over look car insurance deal is indeed an inexpensive price.
|
{
"redpajama_set_name": "RedPajamaC4"
}
| 2,614 |
[
128000,
9028,
70632,
16848,
304,
14972,
13,
9156,
22413,
36713,
649,
10467,
499,
473,
13508,
793,
6061,
389,
9156,
22413,
4999,
644,
1023,
4339,
11,
420,
4947,
690,
8659,
1205,
311,
2343,
506,
75441,
519,
7729,
649,
656,
420,
2949,
53474,
2919,
13,
2052,
499,
617,
38048,
14000,
430,
7969,
2873,
311,
927,
1427,
13,
330,
2675,
1205,
311,
387,
16913,
430,
499,
5906,
94561,
1148,
2216,
7077,
477,
422,
499,
649,
3820,
459,
8276,
5573,
1,
311,
8720,
279,
5326,
279,
5190,
701,
6807,
5573,
1579,
323,
9235,
8994,
279,
2144,
374,
430,
1070,
527,
1023,
22934,
311,
4774,
8631,
12862,
10043,
13,
21815,
520,
459,
3313,
8276,
374,
22281,
527,
389,
264,
9287,
11,
2610,
627,
791,
2466,
6811,
304,
7969,
505,
682,
279,
32162,
505
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
9028,
70632,
16848,
304,
14972,
13,
9156,
22413,
36713,
649,
10467,
499,
473,
13508,
793,
6061,
389,
9156,
22413,
4999,
644,
1023,
4339,
11,
420,
4947,
690,
8659,
1205,
311,
2343,
506,
75441,
519,
7729,
649,
656,
420,
2949,
53474,
2919,
13,
2052,
499,
617,
38048,
14000,
430,
7969,
2873,
311,
927,
1427,
13,
330,
2675,
1205,
311,
387,
16913,
430,
499,
5906,
94561,
1148,
2216,
7077,
477,
422,
499,
649,
3820,
459,
8276,
5573,
1,
311,
8720,
279,
5326,
279,
5190,
701,
6807,
5573,
1579,
323,
9235,
8994,
279,
2144,
374,
430,
1070,
527,
1023,
22934,
311,
4774,
8631,
12862,
10043,
13,
21815,
520,
459,
3313,
8276,
374,
22281,
527,
389,
264,
9287,
11,
2610,
627,
791,
2466,
6811,
304,
7969,
505,
682,
279,
32162,
505,
-100
] |
/*
* Open Source Software published under the Apache Licence, Version 2.0.
*/
package io.github.vocabhunter.gui.model;
import io.github.vocabhunter.analysis.marked.MarkedWord;
import io.github.vocabhunter.analysis.marked.WordState;
import io.github.vocabhunter.gui.common.SequencedWord;
import javafx.beans.Observable;
import javafx.beans.property.SimpleObjectProperty;
import javafx.beans.property.SimpleStringProperty;
import javafx.util.Callback;
import java.util.List;
public class WordModel implements MarkedWord, SequencedWord {
public static final Callback<WordModel, Observable[]> PROPERTY_EXTRACTOR
= w -> new Observable[] {w.identifier, w.state};
private final int sequenceNo;
private final List<Integer> lineNos;
private final int useCount;
private final SimpleStringProperty identifier;
private final SimpleObjectProperty<WordState> state;
private final SimpleStringProperty note;
public WordModel(final int sequenceNo, final String word, final List<Integer> lineNos, final int useCount, final WordState state, final String note) {
this.lineNos = List.copyOf(lineNos);
this.useCount = useCount;
this.identifier = new SimpleStringProperty(word);
this.sequenceNo = sequenceNo;
this.state = new SimpleObjectProperty<>(state);
this.note = new SimpleStringProperty(note);
}
@Override
public int getSequenceNo() {
return sequenceNo;
}
@Override
public String getWordIdentifier() {
return identifier.get();
}
@Override
public WordState getState() {
return state.get();
}
public void setState(final WordState state) {
this.state.set(state);
}
public SimpleObjectProperty<WordState> stateProperty() {
return state;
}
public List<Integer> getLineNos() {
return lineNos;
}
@Override
public int getUseCount() {
return useCount;
}
public SimpleStringProperty noteProperty() {
return note;
}
public String getNote() {
return note.get();
}
public void setNote(final String note) {
this.note.set(note);
}
}
|
{
"redpajama_set_name": "RedPajamaGithub"
}
| 9,973 |
[
128000,
3364,
353,
5377,
8922,
4476,
4756,
1234,
279,
9091,
54375,
11,
6207,
220,
17,
13,
15,
627,
2861,
1757,
6533,
11267,
78557,
99372,
30429,
3272,
401,
475,
6533,
11267,
78557,
99372,
59297,
18913,
291,
1345,
43161,
11116,
280,
475,
6533,
11267,
78557,
99372,
59297,
18913,
291,
66069,
1423,
280,
475,
6533,
11267,
78557,
99372,
30429,
6488,
5851,
447,
5886,
11116,
280,
475,
17133,
14530,
55943,
280,
475,
17133,
14530,
25345,
25236,
1211,
3128,
280,
475,
17133,
14530,
25345,
25236,
707,
3128,
280,
475,
17133,
2013,
49887,
401,
475,
1674,
2013,
5937,
401,
898,
538,
9506,
1747,
5280,
4488,
291,
11116,
11,
25848,
5886,
11116,
341,
262,
586,
1118,
1620,
23499,
27,
11116,
1747,
11,
11480,
20859,
56740,
5073,
42205,
878,
198,
310,
284,
289,
1492,
502,
11480
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
3364,
353,
5377,
8922,
4476,
4756,
1234,
279,
9091,
54375,
11,
6207,
220,
17,
13,
15,
627,
2861,
1757,
6533,
11267,
78557,
99372,
30429,
3272,
401,
475,
6533,
11267,
78557,
99372,
59297,
18913,
291,
1345,
43161,
11116,
280,
475,
6533,
11267,
78557,
99372,
59297,
18913,
291,
66069,
1423,
280,
475,
6533,
11267,
78557,
99372,
30429,
6488,
5851,
447,
5886,
11116,
280,
475,
17133,
14530,
55943,
280,
475,
17133,
14530,
25345,
25236,
1211,
3128,
280,
475,
17133,
14530,
25345,
25236,
707,
3128,
280,
475,
17133,
2013,
49887,
401,
475,
1674,
2013,
5937,
401,
898,
538,
9506,
1747,
5280,
4488,
291,
11116,
11,
25848,
5886,
11116,
341,
262,
586,
1118,
1620,
23499,
27,
11116,
1747,
11,
11480,
20859,
56740,
5073,
42205,
878,
198,
310,
284,
289,
1492,
502,
11480,
-100
] |
Brexit will have far reaching implications for Irish business, and new challenges and choices are on the way.
Brexit: A Unique Irish Opportunity for Cross-Border Restructuring?
McCann FitzGerald is committed to keeping our clients up-to-date in relation to the legal and related political/economic developments in respect of Brexit.
McCann FitzGerald is committed to keeping our clients, both Irish and overseas, up to date in relation to the legal and related political/economic developments in respect of Brexit.
|
{
"redpajama_set_name": "RedPajamaC4"
}
| 6,779 |
[
128000,
51329,
20854,
690,
617,
3117,
19261,
25127,
369,
18088,
2626,
11,
323,
502,
11774,
323,
11709,
527,
389,
279,
1648,
627,
51329,
20854,
25,
362,
29750,
18088,
48379,
369,
11511,
7826,
1382,
42427,
670,
1711,
5380,
85031,
1036,
37778,
38,
25380,
374,
11411,
311,
10494,
1057,
8403,
709,
4791,
18920,
304,
12976,
311,
279,
5897,
323,
5552,
5054,
16954,
32107,
26006,
304,
5201,
315,
24854,
627,
85031,
1036,
37778,
38,
25380,
374,
11411,
311,
10494,
1057,
8403,
11,
2225,
18088,
323,
25355,
11,
709,
311,
2457,
304,
12976,
311,
279,
5897,
323,
5552,
5054,
16954,
32107,
26006,
304,
5201,
315,
24854,
13,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0
] |
[
51329,
20854,
690,
617,
3117,
19261,
25127,
369,
18088,
2626,
11,
323,
502,
11774,
323,
11709,
527,
389,
279,
1648,
627,
51329,
20854,
25,
362,
29750,
18088,
48379,
369,
11511,
7826,
1382,
42427,
670,
1711,
5380,
85031,
1036,
37778,
38,
25380,
374,
11411,
311,
10494,
1057,
8403,
709,
4791,
18920,
304,
12976,
311,
279,
5897,
323,
5552,
5054,
16954,
32107,
26006,
304,
5201,
315,
24854,
627,
85031,
1036,
37778,
38,
25380,
374,
11411,
311,
10494,
1057,
8403,
11,
2225,
18088,
323,
25355,
11,
709,
311,
2457,
304,
12976,
311,
279,
5897,
323,
5552,
5054,
16954,
32107,
26006,
304,
5201,
315,
24854,
13,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100
] |
Clergyman, Civil Rights Leader, Writer, Human Rights Activist
Non-violence is a powerful and just weapon which cuts without wounding and ennobles the man who wields it.
Additional Quotes by Martin Luther King, Jr.
A genuine leader is not a searcher for consensus but a molder of consensus.
A lie cannot live.
A man can't ride your back unless it's bent.
A man who won't die for something is not fit to live.
A nation or civilization that continues to produce soft-minded men purchases its own spiritual death on the installment plan.
A nation that continues year after year to spend more money on military defense than on programs of social uplift is approaching spiritual doom.
A right delayed is a right denied.
A riot is at bottom the language of the unheard.
A riot is the language of the unheard.
All labor that uplifts humanity has dignity and importance and should be undertaken with painstaking excellence.
All progress is precarious, and the solution of one problem brings us face to face with another problem.
Almost always, the creative dedicated minority has made the world better.
An individual has not started living until he can rise above the narrow confines of his individualistic concerns to the broader concerns of all humanity.
An individual who breaks a law that conscience tells him is unjust, and who willingly accepts the penalty of imprisonment in order to arouse the conscience of the community over its injustice, is in reality expressing the highest respect for the law.
At the center of non-violence stands the principle of love.
Change does not roll in on the wheels of inevitability, but comes through continuous struggle. And so we must straighten our backs and work for our freedom. A man can't ride you unless your back is bent.
Darkness cannot drive out darkness; only light can do that. Hate cannot drive out hate; only love can do that.
Discrimination is a hellhound that gnaws at Negroes in every waking moment of their lives to remind them that the lie of their inferiority is accepted as truth in the society dominating them.
Every man must decide whether he will walk in the light of creative altruism or in the darkness of destructive selfishness.
Freedom is never voluntarily given by the oppressor; it must be demanded by the oppressed.
Have we not come to such an impasse in the modern world that we must love our enemies - or else? The chain reaction of evil - hate begetting hate, wars producing more wars - must be broken, or else we shall be plunged into the dark abyss of annihilation.
He who passively accepts evil is as much involved in it as he who helps to perpetrate it. He who accepts evil without protesting against it is really cooperating with it.
History will have to record that the greatest tragedy of this period of social transition was not the strident clamor of the bad people, but the appalling silence of the good people.
Human progress is neither automatic nor inevitable... Every step toward the goal of justice requires sacrifice, suffering, and struggle; the tireless exertions and passionate concern of dedicated individuals.
Human salvation lies in the hands of the creatively maladjusted.
I am not interested in power for power's sake, but I'm interested in power that is moral, that is right and that is good.
I believe that unarmed truth and unconditional love will have the final word in reality. This is why right, temporarily defeated, is stronger than evil triumphant.
I have a dream that my four little children will one day live in a nation where they will not be judged by the color of their skin, but by the content of their character. I have a dream that one day every valley shall be exalted, every hill and mountain shall be made low, the rough places will be made straight and the glory of the Lord shall be revealed and all flesh shall see it together. I have a dream that one day on the red hills of Georgia, the sons of former slaves and the sons of former slave owners will be able to sit together at the table of brotherhood.
I have decided to stick with love. Hate is too great a burden to bear.
I just want to do God's will. And he's allowed me to go to the mountain. And I've looked over, and I've seen the promised land! I may not get there with you, but I want you to know tonight that we as a people will get to the promised land.
I look to a day when people will not be judged by the color of their skin, but by the content of their character.
I refuse to accept the view that mankind is so tragically bound to the starless midnight of racism and war that the bright daybreak of peace and brotherhood can never become a reality... I believe that unarmed truth and unconditional love will have the final word.
I submit that an individual who breaks the law that conscience tells him is unjust and willingly accepts the penalty by staying in jail to arouse the conscience of the community over its injustice, is in reality expressing the very highest respect for law.
I submit to you that if a man hasn't discovered something that he will die for, he isn't fit to live.
I want to be the white man's brother, not his brother-in-law.
If a man hasn't discovered something that he will die for, he isn't fit to live.
Martin Luther King, Jr. was born in Atlanta, Georgia, the son of a Baptist minister. He completed his formal education with degrees from Morehouse College, Crozier Theological Seminary and Boston University (Ph. D. in Systematic Theology, 1955). While serving as pastor of the Dexter Avenue Baptist Church in Montgomery, Alabama, he led the boycott which resulted in the desegregation of that city's bus system. His resolve in the face of threats to his safety as well as that of his family, his conviction that "injustice anywhere is a threat to justice everywhere," and his ability to write and speak with extraordinary power and clarity brought him to national prominence as a leader of the movement to achieve racial justice in America.
He studied the writings and example of Mohandas K. Gandhi in India who powerfully influenced his philosophy of non-violence. When he accepted the Nobel Peace Prize in 1964, King said: "Non-violence is not sterile passivity, but a powerful moral force which makes for social transformation." Like Gandhi, King also understood the strategic value of non-violence "We have neither the techniques nor the numbers to win a violent campaign." His commitment to non-violence led him to oppose the American war in Viet Nam.
Like Henry David Thoreau, Dr. King believed in the necessity of resisting unjust laws with civil disobedience. As a leader of many demonstrations in support of the rights of African-Americans, he was subject to frequent arrest and imprisonment. His Letters from a Birmingham Jail (1963) was a call to conscience directed primarily at American religious leaders.
When a fellow civil rights worker was killed after the 1965 march from Selma to Montgomery, Alabama, King said: "If physical death is the price that some must pay to save us and our white brothers from eternal death of the spirit then no sacrifice could be more redemptive." Martin Luther King's own redemptive sacrifice was exacted by an assassin's bullets on April 4, 1968, in Memphis, Tennessee.
|
{
"redpajama_set_name": "RedPajamaCommonCrawl"
}
| 7,219 |
[
128000,
34,
1565,
4680,
1543,
11,
16803,
10734,
23896,
11,
30504,
11,
11344,
10734,
15050,
380,
198,
8284,
76827,
768,
374,
264,
8147,
323,
1120,
10500,
902,
15455,
2085,
289,
13900,
323,
665,
56123,
645,
279,
893,
889,
289,
7052,
433,
627,
30119,
36713,
555,
11826,
36302,
6342,
11,
16014,
627,
32,
22785,
7808,
374,
539,
264,
95774,
369,
24811,
719,
264,
296,
2061,
315,
24811,
627,
32,
10457,
4250,
3974,
627,
32,
893,
649,
956,
12141,
701,
1203,
7389,
433,
596,
30280,
627,
32,
893,
889,
2834,
956,
2815,
369,
2555,
374,
539,
5052,
311,
3974,
627,
32,
7140,
477,
36017,
430,
9731,
311,
8356,
8579,
34423,
3026,
24393,
1202,
1866,
18330,
4648,
389,
279,
47644,
3197,
627,
32,
7140,
430,
9731,
1060,
1306,
1060,
311,
8493
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
34,
1565,
4680,
1543,
11,
16803,
10734,
23896,
11,
30504,
11,
11344,
10734,
15050,
380,
198,
8284,
76827,
768,
374,
264,
8147,
323,
1120,
10500,
902,
15455,
2085,
289,
13900,
323,
665,
56123,
645,
279,
893,
889,
289,
7052,
433,
627,
30119,
36713,
555,
11826,
36302,
6342,
11,
16014,
627,
32,
22785,
7808,
374,
539,
264,
95774,
369,
24811,
719,
264,
296,
2061,
315,
24811,
627,
32,
10457,
4250,
3974,
627,
32,
893,
649,
956,
12141,
701,
1203,
7389,
433,
596,
30280,
627,
32,
893,
889,
2834,
956,
2815,
369,
2555,
374,
539,
5052,
311,
3974,
627,
32,
7140,
477,
36017,
430,
9731,
311,
8356,
8579,
34423,
3026,
24393,
1202,
1866,
18330,
4648,
389,
279,
47644,
3197,
627,
32,
7140,
430,
9731,
1060,
1306,
1060,
311,
8493,
-100
] |
please visit the ScallyWompus race website.
REMEMBER TO SET CLOCKS AHEAD ON SATURDAY NIGHT, SUNDAY 3.10.2019 IS DAY 1 OF DAY LIGHT SAVINGS TIME AND WE WILL START EACH RACE ON TIME.
smile at all times, we don't want non-runners to think this is hard.
get your chip and put it on your shoe before you start the race.
give the chip back when you return or you will be billed.
check the results and report to the timing area if there is a problem, be patient as they are still probably timing the race.
drink water and Gatorade to keep balanced.
If you cut the course or change races in the middle of the race go to timing tent and tell them.
If something goes wrong do not panic, we will fix it. We always do. Just remain calm. It is a live event and things can happen or go wrong for you.
Come prepared for you and your run. Wear the same clothes you run in training do not try anything new on race day.
SET YOUR CLOCKS AHEAD ON SATURDAY NIGHT. WE START EACH RACE ON TIME ALWAYS.
Come to San Marvelous and run a race that is likely older than you are....right?
San Marcos Half Marathon, 5k, and 10k is an event to honor the retired "Oldest Half Marathon in Central Texas" Moe's Better Half Marathon which is now under the management of Scallywompus Events.
This race ventures through a beautiful course through the Texas Hill Country and Prairies, starting and finishing in the Tanger Outlet Mall parking lot. This not-so-sleepy town midway from San Antonio and Austin offers plenty of places serving adult beverages, Tex-Mex cuisine, live music, and all-around good times.
As always, post race you can count on the explosion of excitement and fun that is our Scallywompus style after-party! After all, our motto is "Come for the race, stay for the party!" So get signed up!
Make sure you are following us on Facebook for constant Discount Code give-aways!
Award categories are 1st – 4th for all distances.
First overall female, first overall male, first overall masters male, and first overall masters female.
Thanks for signing up for our race, sometimes things change and you have to transfer your race entry or change the race, we understand. Please understand that this takes time to make these changes and we charge $20 to make that change or transfer.
It doesn't mean we don't love you.
|
{
"redpajama_set_name": "RedPajamaC4"
}
| 9,148 |
[
128000,
31121,
4034,
279,
2522,
750,
54,
14773,
355,
7102,
3997,
627,
793,
33070,
9745,
5257,
9196,
356,
60975,
362,
36533,
6328,
43354,
1539,
34212,
76131,
11,
328,
13508,
3097,
220,
18,
13,
605,
13,
679,
24,
3507,
38788,
220,
16,
3083,
38788,
53303,
328,
8253,
12124,
23029,
3651,
20255,
29015,
21673,
95513,
432,
5693,
6328,
23029,
627,
3647,
458,
520,
682,
3115,
11,
584,
1541,
956,
1390,
2536,
23831,
5079,
311,
1781,
420,
374,
2653,
627,
456,
701,
16797,
323,
2231,
433,
389,
701,
30077,
1603,
499,
1212,
279,
7102,
627,
47530,
279,
16797,
1203,
994,
499,
471,
477,
499,
690,
387,
50546,
627,
2071,
279,
3135,
323,
1934,
311,
279,
18912,
3158,
422,
1070,
374,
264,
3575,
11,
387,
8893,
439,
814,
527,
2103,
4762,
18912
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
31121,
4034,
279,
2522,
750,
54,
14773,
355,
7102,
3997,
627,
793,
33070,
9745,
5257,
9196,
356,
60975,
362,
36533,
6328,
43354,
1539,
34212,
76131,
11,
328,
13508,
3097,
220,
18,
13,
605,
13,
679,
24,
3507,
38788,
220,
16,
3083,
38788,
53303,
328,
8253,
12124,
23029,
3651,
20255,
29015,
21673,
95513,
432,
5693,
6328,
23029,
627,
3647,
458,
520,
682,
3115,
11,
584,
1541,
956,
1390,
2536,
23831,
5079,
311,
1781,
420,
374,
2653,
627,
456,
701,
16797,
323,
2231,
433,
389,
701,
30077,
1603,
499,
1212,
279,
7102,
627,
47530,
279,
16797,
1203,
994,
499,
471,
477,
499,
690,
387,
50546,
627,
2071,
279,
3135,
323,
1934,
311,
279,
18912,
3158,
422,
1070,
374,
264,
3575,
11,
387,
8893,
439,
814,
527,
2103,
4762,
18912,
-100
] |
Home Features Harinda & gudppl: Conquering The World With Smiles
Harinda & gudppl: Conquering The World With Smiles
gudppl
When Harinda first pitched gudppl back at Infotel 2016, little did people know what it was about exactly. A new social network that connects people to do good, might sound like a bit of a cliche. But come 2018, this new social network has assisted over 250 projects in less than 2 years.
One can also say its a platform that bridges the gap between people who want to volunteer, with people who need volunteers. But how exactly did this idea come about? We recently met up with the man behind it all, Harinda Fonseka. Here's his story.
Ever since he was a kid, Harinda had a fascination with detectives. He always wanted to be one, or at least the closest thing to it, a police officer. Even at 20 years old, his idea of becoming a hero of justice was still dormant in his mind. Serious as he was, Harinda decided to focus on getting involved in the private sector instead. This would be in the form of having his own private security firm.
Come 2005, Harinda moved to Canada, where he followed a private security-related law and security administration program. As one might expect, this decision made some of his family members nervous, as it was an uncommon choice. Nevertheless, he followed through his studies, while working a few odd jobs that included being a waiter and a bouncer. Upon completion, he decided to join a hospital in Canada as a Security Guard. This is where his life took a turning point.
Life as a security professional, back in Canada (Image Credits: Harinda Fonseka)
Being a security guard at a hospital offers diverse experiences to an individual. A key reason is that a security guard is the first point of contact when entering a hospital. He/she is literally the face of the hospital. Harinda recalled his experiences within the first 2 weeks itself comprised of witnessing a baby being born, a baby being born and nearly dying, and a person dying.
Taking a different perspective on life
Being a security guard at a hospital is very different to that of being one elsewhere, Harinda notes. A person usually comes to the hospital to see a doctor or a nurse and a security guard may be the last person they're expected to see. He shared the story of how he almost witnessed the death of a newborn baby.The baby had gone into a cardiac arrest at the time. But thankfully, with the effort of a team of healthcare professionals, the baby's life was saved.
Life back in Canada
Seeing the level of empathy and compassion from those healthcare professionals struck a chord with Harinda. Adding to that, he stated how the hospital had quite a few volunteers helping out on a weekly/monthly basis. Some of these volunteers had actually spent 20 – 30 good years of their lives being a part of the hospital. Everything Harinda saw and learned there, he says, gave him a new perspective on life.
Coming back to Sri Lanka
Fast forward to 2014, Harinda comes back to Sri Lanka. One of the reasons being that he wanted to serve the country. The other is that his father was ill; so he wanted to spend quality time with his parents. Meanwhile, his idea of starting his own security firm was still in his head. He worked at a security company. But what he soon came to realize is that it wasn't the right fit for him.
"There are enough and more Sri Lankans that want to create growth in our communities. Just creating that opportunity and connecting them is the key" – Harinda Fonseka
Nevertheless, Harinda already had a list of things he planned on achieving after coming back to the island. One of them was volunteering. He found the existing volunteering process somewhat frustrating. Most of the volunteering opportunities available were limited to one's own network.
The usual process is to volunteer either through your own community or via the well-known organizations. It was here, that Harinda questioned the feasibility of starting a progressive security firm in Sri Lanka and what he really wanted to do with his life. So, he pivoted to a different idea. He wanted to address the brain drain issue in our country.
Trying on an entrepreneur's shoes
At the core, for Harinda, it's all about helping people. He thought of creating a platform to address the brain drain, where someone from one country could teach a certain skill or subject to someone in Sri Lanka. Imagine somebody wanting to teach Business Management or Photoshop abroad, to somebody in Jaffna or Galle. This platform would have 2 versions. The first is the paid version. This is where the mentoring services were provided for a price.
"What matters is that your actions should leave the society in a better state than it was, even by a minuscule margin" – Harinda Fonseka
The other was the volunteering aspect. This is where a mentor is able to provide the services free of charge should he/she chose to. He pitched this idea to Sachindra Samararathne, Project Manager at ICTA and few of his other friends.
Upon hearing this, Sachindra encouraged him to explore the idea of the volunteering component a bit more. Why? Because platforms for volunteering were almost non-existent.
Hello gudppl
Harinda started researching about the volunteering sector. What he found was that there was room for improvement in the platforms for volunteers. Even in Sri Lanka, there were only a few websites. But these were more or less listing sites for volunteer projects. Interaction here was very limited. For example, someone might post a project on one of these websites. People may attend and that would be it. He wanted to create an interactive platform that inspired and facilitated more volunteerism and collaboration.
After much reading and researching, he realized what's needed and what he wanted to do. There are quite a few groups that continue to serve different communities almost on a daily basis. Although they make a serious impact on the society, more often than not these groups are hardly even known among the general public.
Harinda pitching gudppl at Infotel 2016
Harinda felt the need for a platform that tackles problems at a community level, and connecting these volunteering groups with the entire community is only part of it. But what can we give in return for these people? was Harinda's next question. Enter gudppl.
It's a platform with a goal to make a positive and meaningful impact through volunteerism. But connecting people who want to volunteer with people who are looking to volunteer is one component of gudppl. Another part is the social footprint. This is where all your contributions as a volunteer are logged on a social profile. Think of it as an online CV, but for volunteering. This can be useful when applying for universities and jobs.
When inspiring communities come together
On the 5th of December, gudppl organized "gudppl Collaboration 2017". It was the first ever summit that was dedicated to bringing non-profits, charities, NGOs, students, volunteers, CSR professionals, etc. to one location. Gudppl wanted to show the impact we can make when different communities with similar passions come together. He shared a few stories from Collaboration 2017 to prove his point.
1. Going dental with the Salvation Army
One of the participants for the event was an NGO named Dental Care International. This organization offer training to young girls who are leaving care homes at the age of 18, to become dental care assistants. Upon meeting with the Salvation Army, the 2 organizations are now exploring ways to partner and collaborate.
2. Finding purpose again
Harinda also shared the story of a lady who had lost her daughter a year ago. Following the tragic loss, the lady had never really gone out to functions or events of any sort. But after attending gudppl Collaboration 2017, she decided to get involved in the community through volunteering.
Eran Wickramasinghe visiting one of the booths at Gudppl Collaboration 2017 (Image Credits:@UNVSriLanka)
If you've ever pitched a product, then you would know validation is a vital part of turning your idea into a feasible solution. The above 2 examples tell the same story for gudppl. But as with all startups, it's certainly not without its challenges though.
An uphill battle
As of now, gudppl have over 1700 people signed up on the platform. The numbers have seen a slow, but steady growth ever since its inception back in 2016. But numbers are hardly the problem for Harinda and gudppl. He notes that most of the issues he faces are currently on the tech side of things.
Speaking to ReadMe, he stated, "we have encountered different challenges due to various reasons, however, we've used them as learning opportunities. Some of the delays have helped us re-strategize and make necessary changes to improve the experience for our members."
Left: First place, Infotel 2017 Startup Awards; Top-Right: Social Inclusion and Empowerment Award, eSwabhimani 2017; Bottom-Right: Good Market Social Impact Award (Image Credits: ICTA/Harinda Fonseka/Good Market)
During the initial days, everything had to be done manually. This meant calling up people and explaining about gudppl. Essentially, they were selling an idea instead of a product. As a social enterprise, gudppl hopes to offer a premium version of the platform in the near future, a model similar to that of LinkedIn.
Harinda notes that the platform isn't just for individuals. In the coming future, this will cater to organizations as well. Similar to that of an individual, a company would have a social profile as well. Here, people interested in the company would be able to learn about the types of impact the company had made in their communities.
The team behind gudppl Collaboration 2017 (Image Credits: Harinda Fonseka)
Additionally, this would also mean enhancing transparency and a sense of responsibility towards society, particularly from a company perspective. The gudppl platform would allow companies to serve communities better with their CSR initiatives while still aligning with companies' missions.
The world needs more social entrepreneurs
For Harinda, it's all about trying to give an experience to members where gudppl is meaningful as well as impactful. Having supported over 250 projects in less than 2 years, he feels that gudppl is getting there as a platform.
From a personal perspective, he believes that the world needs more social entrepreneurs and civic entrepreneurs. Building a social enterprise would entail positively helping people, our planet while having a revenue model to sustain these initiatives. Harinda describes this in his own words saying, "There is nothing wrong with this line of thinking. What matters is that your actions should leave the society in a better state than it was, even by a minuscule margin."
Previous articleConnecting People at the SLASSCOM People Summit 2018
Next articleThe innovative kids on fire inside IgniterSpace
Writer, Digital Marketer, and Operations guy at ReadMe. Lahiru spends most of his spare time burying himself with a book or playing Apex Legends. Other times, he's often seen hiking through some random forest in the mountainside.
Is your smartphone up to date in 2019?
A nerd's guide to Libra & its messy economics
The Future of GPUs: To The Cloud and Beyond?
|
{
"redpajama_set_name": "RedPajamaCommonCrawl"
}
| 1,785 |
[
128000,
7778,
20289,
5340,
17872,
612,
342,
32201,
501,
25,
1221,
447,
4776,
578,
4435,
3161,
4487,
3742,
198,
27588,
17872,
612,
342,
32201,
501,
25,
1221,
447,
4776,
578,
4435,
3161,
4487,
3742,
198,
70,
32201,
501,
198,
4599,
5340,
17872,
1176,
50098,
342,
32201,
501,
1203,
520,
15268,
41885,
220,
679,
21,
11,
2697,
1550,
1274,
1440,
1148,
433,
574,
922,
7041,
13,
362,
502,
3674,
4009,
430,
34161,
1274,
311,
656,
1695,
11,
2643,
5222,
1093,
264,
2766,
315,
264,
272,
20603,
13,
2030,
2586,
220,
679,
23,
11,
420,
502,
3674,
4009,
706,
39061,
927,
220,
5154,
7224,
304,
2753,
1109,
220,
17,
1667,
627,
4054,
649,
1101,
2019,
1202,
264,
5452,
430,
40073,
279,
13225,
1990,
1274,
889,
1390,
311,
26202,
11,
449
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
7778,
20289,
5340,
17872,
612,
342,
32201,
501,
25,
1221,
447,
4776,
578,
4435,
3161,
4487,
3742,
198,
27588,
17872,
612,
342,
32201,
501,
25,
1221,
447,
4776,
578,
4435,
3161,
4487,
3742,
198,
70,
32201,
501,
198,
4599,
5340,
17872,
1176,
50098,
342,
32201,
501,
1203,
520,
15268,
41885,
220,
679,
21,
11,
2697,
1550,
1274,
1440,
1148,
433,
574,
922,
7041,
13,
362,
502,
3674,
4009,
430,
34161,
1274,
311,
656,
1695,
11,
2643,
5222,
1093,
264,
2766,
315,
264,
272,
20603,
13,
2030,
2586,
220,
679,
23,
11,
420,
502,
3674,
4009,
706,
39061,
927,
220,
5154,
7224,
304,
2753,
1109,
220,
17,
1667,
627,
4054,
649,
1101,
2019,
1202,
264,
5452,
430,
40073,
279,
13225,
1990,
1274,
889,
1390,
311,
26202,
11,
449,
-100
] |
Advice on how to take pics? Advice on what I did wrong or right?
I don't disagree with you about the need generally, particularly since we're hosting our own photo shows more frequently. But I haven't got any ideas on where to put it even. We have too many forums right now IMO and the epic amount of scrolling is a problem (at least to me).
If you have ideas, assemble 'em please! :) IMO, it's possible the ideal context for this is a website with a message-board or video peg-on. Teaching people stuff in message board format is not really ideal, I guess.
|
{
"redpajama_set_name": "RedPajamaC4"
}
| 1,501 |
[
128000,
80039,
389,
1268,
311,
1935,
22067,
30,
55820,
389,
1148,
358,
1550,
5076,
477,
1314,
5380,
40,
1541,
956,
29395,
449,
499,
922,
279,
1205,
8965,
11,
8104,
2533,
584,
2351,
20256,
1057,
1866,
6685,
5039,
810,
14134,
13,
2030,
358,
9167,
956,
2751,
904,
6848,
389,
1405,
311,
2231,
433,
1524,
13,
1226,
617,
2288,
1690,
25907,
1314,
1457,
85171,
323,
279,
25706,
3392,
315,
39076,
374,
264,
3575,
320,
266,
3325,
311,
757,
4390,
2746,
499,
617,
6848,
11,
42840,
364,
336,
4587,
0,
27046,
85171,
11,
433,
596,
3284,
279,
10728,
2317,
369,
420,
374,
264,
3997,
449,
264,
1984,
53955,
477,
2835,
31787,
10539,
13,
45377,
1274,
6392,
304,
1984,
4580,
3645,
374,
539,
2216,
10728,
11,
358,
8101,
13,
128256,
128256,
128256
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
0,
0
] |
[
80039,
389,
1268,
311,
1935,
22067,
30,
55820,
389,
1148,
358,
1550,
5076,
477,
1314,
5380,
40,
1541,
956,
29395,
449,
499,
922,
279,
1205,
8965,
11,
8104,
2533,
584,
2351,
20256,
1057,
1866,
6685,
5039,
810,
14134,
13,
2030,
358,
9167,
956,
2751,
904,
6848,
389,
1405,
311,
2231,
433,
1524,
13,
1226,
617,
2288,
1690,
25907,
1314,
1457,
85171,
323,
279,
25706,
3392,
315,
39076,
374,
264,
3575,
320,
266,
3325,
311,
757,
4390,
2746,
499,
617,
6848,
11,
42840,
364,
336,
4587,
0,
27046,
85171,
11,
433,
596,
3284,
279,
10728,
2317,
369,
420,
374,
264,
3997,
449,
264,
1984,
53955,
477,
2835,
31787,
10539,
13,
45377,
1274,
6392,
304,
1984,
4580,
3645,
374,
539,
2216,
10728,
11,
358,
8101,
13,
-100,
-100,
-100,
-100
] |
The remuneration for the Stenographers will be Rs.45,000/- per month.
1. Applications received after due date will not be considered and summarily rejected. 2. The candidates who are declared qualified in the skill test in English Shorthand will be called for interview. No TA/DA will be admissible for appearing in the skill test or interview. 3. No supporting documents need be attached with the application at this stage. However, the candidature will be liable to be rejected at any stage if the information furnished in the application form is found incorrect on subsequent verification, and if appointed, services will be liable to be terminated forthwith.
National Company Law Tribunal (NCLT) recruits Stenographers Post. Candidate with Graduate freshers can apply.
|
{
"redpajama_set_name": "RedPajamaC4"
}
| 2,337 |
[
128000,
791,
1323,
359,
21597,
369,
279,
800,
268,
79454,
690,
387,
19766,
13,
1774,
11,
931,
24572,
824,
2305,
627,
16,
13,
32625,
4036,
1306,
4245,
2457,
690,
539,
387,
6646,
323,
29385,
1570,
18010,
13,
220,
17,
13,
578,
11426,
889,
527,
14610,
15337,
304,
279,
10151,
1296,
304,
6498,
1443,
62779,
690,
387,
2663,
369,
7274,
13,
2360,
39991,
14,
6486,
690,
387,
1008,
45164,
369,
26449,
304,
279,
10151,
1296,
477,
7274,
13,
220,
18,
13,
2360,
12899,
9477,
1205,
387,
12673,
449,
279,
3851,
520,
420,
6566,
13,
4452,
11,
279,
5803,
1598,
690,
387,
35473,
311,
387,
18010,
520,
904,
6566,
422,
279,
2038,
24330,
304,
279,
3851,
1376,
374,
1766,
15465,
389,
17876,
23751,
11,
323,
422,
21489,
11,
3600,
690
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
791,
1323,
359,
21597,
369,
279,
800,
268,
79454,
690,
387,
19766,
13,
1774,
11,
931,
24572,
824,
2305,
627,
16,
13,
32625,
4036,
1306,
4245,
2457,
690,
539,
387,
6646,
323,
29385,
1570,
18010,
13,
220,
17,
13,
578,
11426,
889,
527,
14610,
15337,
304,
279,
10151,
1296,
304,
6498,
1443,
62779,
690,
387,
2663,
369,
7274,
13,
2360,
39991,
14,
6486,
690,
387,
1008,
45164,
369,
26449,
304,
279,
10151,
1296,
477,
7274,
13,
220,
18,
13,
2360,
12899,
9477,
1205,
387,
12673,
449,
279,
3851,
520,
420,
6566,
13,
4452,
11,
279,
5803,
1598,
690,
387,
35473,
311,
387,
18010,
520,
904,
6566,
422,
279,
2038,
24330,
304,
279,
3851,
1376,
374,
1766,
15465,
389,
17876,
23751,
11,
323,
422,
21489,
11,
3600,
690,
-100
] |
Enforce your security policies and address compliance requirements on cloud applications and platforms.
Enforce policies in the cloud.
As your enterprise shifts to the cloud, the need to protect your data becomes more important by the day. A cloud access security broker (CASB) is the gatekeeper between your on premise and public cloud infrastructure, helping your business address cloud service risks, enforce security policies, and comply with regulations. This gives you the critical tools to prevent, discover, and respond to threats.
With one of the largest IP networks in the world, Verizon knows that network security is critical. That's why we monitor over 61 billion security events each year (on average). We also know the importance of finding a valuable partner. That's why we're teaming with CASB vendor Netskope to provide CASB solutions for your business.
A cloud access security broker (CASB) acts as a gatekeeper of internet traffic between your on-prem infrastructure and cloud provider. It helps you consistently enforce security policies, secure sanctioned and unsanctioned cloud services, protect sensitive data across the cloud and web, and stop the most advanced online threats.
How does a Cloud Access Security Broker work?
CASB solutions work as a gateway between cloud service consumers and providers, applying and enforcing security policies as cloud-based resources are called. The value stems from the ability to identify high-risk applications and users, and other key risk factors across cloud platforms—a blind spot for some businesses.
security incidents processed yearly (on average).
|
{
"redpajama_set_name": "RedPajamaC4"
}
| 2,319 |
[
128000,
1737,
9009,
701,
4868,
10396,
323,
2686,
8907,
8670,
389,
9624,
8522,
323,
15771,
627,
1737,
9009,
10396,
304,
279,
9624,
627,
2170,
701,
20790,
29735,
311,
279,
9624,
11,
279,
1205,
311,
6144,
701,
828,
9221,
810,
3062,
555,
279,
1938,
13,
362,
9624,
2680,
4868,
23117,
320,
88616,
33,
8,
374,
279,
18618,
19393,
1990,
701,
389,
41302,
323,
586,
9624,
14054,
11,
10695,
701,
2626,
2686,
9624,
2532,
15635,
11,
29262,
4868,
10396,
11,
323,
26069,
449,
14640,
13,
1115,
6835,
499,
279,
9200,
7526,
311,
5471,
11,
7142,
11,
323,
6013,
311,
18208,
627,
2409,
832,
315,
279,
7928,
6933,
14488,
304,
279,
1917,
11,
43414,
8964,
430,
4009,
4868,
374,
9200,
13,
3011,
596,
3249,
584,
8891,
927,
220,
5547,
7239,
4868
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
1737,
9009,
701,
4868,
10396,
323,
2686,
8907,
8670,
389,
9624,
8522,
323,
15771,
627,
1737,
9009,
10396,
304,
279,
9624,
627,
2170,
701,
20790,
29735,
311,
279,
9624,
11,
279,
1205,
311,
6144,
701,
828,
9221,
810,
3062,
555,
279,
1938,
13,
362,
9624,
2680,
4868,
23117,
320,
88616,
33,
8,
374,
279,
18618,
19393,
1990,
701,
389,
41302,
323,
586,
9624,
14054,
11,
10695,
701,
2626,
2686,
9624,
2532,
15635,
11,
29262,
4868,
10396,
11,
323,
26069,
449,
14640,
13,
1115,
6835,
499,
279,
9200,
7526,
311,
5471,
11,
7142,
11,
323,
6013,
311,
18208,
627,
2409,
832,
315,
279,
7928,
6933,
14488,
304,
279,
1917,
11,
43414,
8964,
430,
4009,
4868,
374,
9200,
13,
3011,
596,
3249,
584,
8891,
927,
220,
5547,
7239,
4868,
-100
] |
Springtime is always a delight here on the farm. I love all the baby animals, such as these baby Muscovy Ducks.
$365 for 24 x 36 Canvas.
Printed with archival inks on 100% cotton canvas stretched onto 1.5 inch frame. Black edges. Wired and ready to hang.
|
{
"redpajama_set_name": "RedPajamaC4"
}
| 5,070 |
[
128000,
26208,
1712,
374,
2744,
264,
18454,
1618,
389,
279,
8961,
13,
358,
3021,
682,
279,
8945,
10099,
11,
1778,
439,
1521,
8945,
5444,
57512,
88,
68882,
627,
3,
12676,
369,
220,
1187,
865,
220,
1927,
26782,
627,
9171,
291,
449,
95047,
304,
2857,
389,
220,
1041,
4,
24428,
10247,
41398,
8800,
220,
16,
13,
20,
17560,
4124,
13,
5348,
13116,
13,
87385,
323,
5644,
311,
15020,
13,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256,
128256
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0,
0
] |
[
26208,
1712,
374,
2744,
264,
18454,
1618,
389,
279,
8961,
13,
358,
3021,
682,
279,
8945,
10099,
11,
1778,
439,
1521,
8945,
5444,
57512,
88,
68882,
627,
3,
12676,
369,
220,
1187,
865,
220,
1927,
26782,
627,
9171,
291,
449,
95047,
304,
2857,
389,
220,
1041,
4,
24428,
10247,
41398,
8800,
220,
16,
13,
20,
17560,
4124,
13,
5348,
13116,
13,
87385,
323,
5644,
311,
15020,
13,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100,
-100
] |
Your car safety is not something that should be treated lightly. As driving being a daily matter, you should always keep your safety in mind. Although during time, our cars became much safer, there are still some areas that haven't been covered by the car manufacturers. Good thing that there are websites like Gadget my Car that take care of the little things that are still missing in most of the cars. Want to see what are we talking about?
Driving with deflated tyres increases the chance for puncture, tire wear and might result in loss of traction. To be honest, we don't always check our tyre pressure once a week as recommended by the tyre manufacturers. For that purpose, we suggest you use Tirely.
Tirely offers you real-time monitoring and alarm system that shows the tyre pressure, temperature and battery voltage on a clear LCD display. How does it work? Each tire gets a sensor that transmits an accurate measurement to the control unit and in case you're getting below the recommended tyre pressure, Tirely will alert you.
Did you ever forget your lights on for a few hours and found out that your battery is drained? Well even an Engie device can't prevent that (yet). Getting stuck with your car can be frustrating, but if you have a portable car jump starter – it won't be a hassle. Just connect your battery to the portable car jumper, start your engine, and that's it! You're good to go! Just one of those things that you will ask yourself later: "How didn't I get it before?".
You didn't see that one coming, huh? Well here at Engie take your car safety seriously, there is no doubt that a car that is connected to Engie is a much safer car. Not only that the app alerts you when a malfunction occurs, but it also explains how severe the fault is, and whether you should fix it ASAP or you can keep on driving. On top of that, we will notify you whenever your car battery or alternator are going dead, so there's no way that you're getting stuck ever again!
Well, this one we really hope you won't ever need to use, but in a case of an emergency it can be a life saver! This clever little keychain packs 2 main features that will make any getaway easy. On the one side, it's an emergency hammer made of stainless steel that easily breaks car glass, and on the other side it's a razor-sharp blade that cuts swiftly through jammed seat belts. Both are packed in this neat keychain size package. We already have one in our glove compartment, how about you?
There are so many situations whilst driving in which we need to get as many information about our environment as possible. Driving along a crowded street or reverse parking can be real tricky, especially when there are so many distractions. Installing a 360° blind spot mirror can prevent that uncomfortable feeling by increasing the view angle of your side mirrors. With this little car gadget, you won't suffer from blind spots any more.
Although we picked only 5 car safety gadgets for this post, there are so many car gadgets that will make your life much easier on the road. We hope that you will embrace some of the ideas, as they can change the way you're driving.
|
{
"redpajama_set_name": "RedPajamaC4"
}
| 8,187 |
[
128000,
7927,
1841,
7296,
374,
539,
2555,
430,
1288,
387,
12020,
34504,
13,
1666,
10043,
1694,
264,
7446,
5030,
11,
499,
1288,
2744,
2567,
701,
7296,
304,
4059,
13,
10541,
2391,
892,
11,
1057,
9515,
6244,
1790,
30549,
11,
1070,
527,
2103,
1063,
5789,
430,
9167,
956,
1027,
9960,
555,
279,
1841,
17032,
13,
7839,
3245,
430,
1070,
527,
13335,
1093,
480,
52031,
856,
3341,
430,
1935,
2512,
315,
279,
2697,
2574,
430,
527,
2103,
7554,
304,
1455,
315,
279,
9515,
13,
24133,
311,
1518,
1148,
527,
584,
7556,
922,
5380,
94936,
449,
711,
22851,
69793,
12992,
279,
6140,
369,
32455,
554,
11,
28387,
10051,
323,
2643,
1121,
304,
4814,
315,
47955,
13,
2057,
387,
10978,
11,
584,
1541,
956,
2744,
1817,
1057,
74028,
7410,
3131,
264,
2046
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
7927,
1841,
7296,
374,
539,
2555,
430,
1288,
387,
12020,
34504,
13,
1666,
10043,
1694,
264,
7446,
5030,
11,
499,
1288,
2744,
2567,
701,
7296,
304,
4059,
13,
10541,
2391,
892,
11,
1057,
9515,
6244,
1790,
30549,
11,
1070,
527,
2103,
1063,
5789,
430,
9167,
956,
1027,
9960,
555,
279,
1841,
17032,
13,
7839,
3245,
430,
1070,
527,
13335,
1093,
480,
52031,
856,
3341,
430,
1935,
2512,
315,
279,
2697,
2574,
430,
527,
2103,
7554,
304,
1455,
315,
279,
9515,
13,
24133,
311,
1518,
1148,
527,
584,
7556,
922,
5380,
94936,
449,
711,
22851,
69793,
12992,
279,
6140,
369,
32455,
554,
11,
28387,
10051,
323,
2643,
1121,
304,
4814,
315,
47955,
13,
2057,
387,
10978,
11,
584,
1541,
956,
2744,
1817,
1057,
74028,
7410,
3131,
264,
2046,
-100
] |
Home/Iran/US Seeking to Hijack IAEA to Pressure Iran
US Seeking to Hijack IAEA to Pressure Iran
TEHRAN (FNA)- Iranian Ambassador to the International Atomic Energy Agency Ali Ashgar Soltaniyeh said Washington is hijacking the UN nuclear watchdog for an anti-Iran campaign.
"Today, it was made clear to the Board of Governors that the original documents and even their duplications regarding alleged studies have not been presented to the International Atomic Energy Agency," Soltaniyeh said on the sidelines of the IAEA Board of Governors meeting in Vienna on Monday.
During the meeting the IAEA chief had urged the Islamic Republic to be "transparent" and provide the agency with "credible assurances about the absence of undeclared nuclear material and activities in Iran."
"A member has been accused by another member without presentation of any documents on the claim. How could it be possible to level accusations against a country whilst the original documents have not yet been handed over to IAEA officials," Soltaniyeh asked, according to a press tv report.
The Iranian envoy also underlined that the US has brought the technical activities to a halt by putting hurdles on the way of IAEA as well as the international community.
The US has created problems in the verification process and technical activities of the secretariat by refusing to offer the original so-called documents, he elaborated, saying the situation forced IAEA chief Mohamed ElBaradei to call on Washington to present the original documents to the agency.
"The international community and all member states of the IAEA are frustrated with this kind of actions from the United States in the IAEA. The Americans are every day isolating themselves," Soltaniyeh concluded.
Washington and its Western allies accuse Iran of trying to develop nuclear weapons under the cover of a civilian nuclear program, while they have never presented any corroborative document to substantiate their allegations. Iran denies the charges and insists that its nuclear program is for peaceful purposes only.
Tehran stresses that the country has always pursued a civilian path to provide power to the growing number of Iranian population, whose fossil fuel would eventually run dry.
Despite the rules enshrined in the Non-Proliferation Treaty (NPT) entitling every member state, including Iran, to the right of uranium enrichment, Tehran is now under three rounds of UN Security Council sanctions for turning down West's illegitimate calls to give up its right of uranium enrichment.
Tehran has dismissed West's demands as politically tainted and illogical, stressing that sanctions and pressures merely consolidate Iranians' national resolve to continue the path.
Iran insists that it should continue enriching uranium because it needs to provide fuel to a 300-megawatt light-water reactor it is building in the southwestern town of Darkhoveyn as well as its first nuclear power plant in the southern port city of Bushehr.
Iran currently suffers from an electricity shortage that has forced the country into adopting a rationing program by scheduling power outages – of up to two hours a day – across both urban and rural areas.
Iran plans to construct additional nuclear power plants to provide for the electricity needs of its growing population.
The Islamic Republic says that it considers its nuclear case closed as it has come clean of IAEA's questions and suspicions about its past nuclear activities.
Political observers believe that the United States has remained at loggerheads with Iran mainly over the independent and home-grown nature of Tehran's nuclear technology, which gives the Islamic Republic the potential to turn into a world power and a role model for other third-world countries. Washington has laid much pressure on Iran to make it give up the most sensitive and advanced part of the technology, which is uranium enrichment, a process used for producing nuclear fuel for power plants.
Washington's push for additional UN penalties contradicts a recent report by 16 US intelligence bodies that endorsed the civilian nature of Iran's programs. Following the US National Intelligence Estimate (NIE) and similar reports by the IAEA head – one in November and the other one in February – which praised Iran's truthfulness about key aspects of its past nuclear activities and announced settlement of outstanding issues with Tehran, any effort to impose further sanctions on Iran seems to be completely irrational.
The February report by the UN nuclear watchdog, the International Atomic Energy Agency, praised Iran's cooperation in clearing up all of the past questions over its nuclear program, vindicating Iran's nuclear program and leaving no justification for any new UN sanctions.
Meantime, The UN nuclear watchdog has also carried out at least 14 surprise inspections of Iran's nuclear sites so far, but found nothing to support West's allegations.
Also in his latest report to the 35-nation Board of Governors, IAEA Director General Mohamed ElBaradei confirmed "the non-diversion" of nuclear material in Iran and added that the agency had found no "components of a nuclear weapon" or "related nuclear physics studies" in the country.
The IAEA report confirmed that Iran has managed to enrich uranium-235 to a level 'less than 5 percent.' Such a rate is consistent with the construction of a nuclear power plant. Nuclear arms production, meanwhile, requires an enrichment level of above 90 percent.
The Vienna-based UN nuclear watchdog continues snap inspections of Iranian nuclear sites and has reported that all "declared nuclear material in Iran has been accounted for, and therefore such material is not diverted to prohibited activities."
Observers believe that the shift of policy by the White House to send William Burns – the third highest-ranking diplomat in the US – to the latest round of Iran-West talks happened after Bush's attempt to rally international pressure against Iran lost steam due to the growing international vigilance.
US President George W. Bush finished a tour of the Middle East in winter to gain the consensus of his Arab allies to unite against Iran.
But hosting officials of the regional nations dismissed Bush's allegations, describing Tehran as a good friend of their countries.
Many world nations have called the UN Security Council pressure against Iran unjustified, especially in the wake of recent IAEA reports, stressing that Tehran's case should be normalized and returned to the UN nuclear watchdog due to the Islamic Republic's increased cooperation with the agency.
Previous Iranian Commerce Minister to Attend SCO Meeting
Next Larijani Stresses Palestinians' Need to Humanitarian Aid
|
{
"redpajama_set_name": "RedPajamaCommonCrawl"
}
| 5,837 |
[
128000,
7778,
39251,
6713,
14,
2078,
59805,
311,
69090,
474,
358,
91921,
311,
40090,
10471,
198,
2078,
59805,
311,
69090,
474,
358,
91921,
311,
40090,
10471,
198,
2505,
17526,
1111,
320,
37,
7476,
7435,
28501,
45672,
311,
279,
7327,
31416,
12634,
16784,
14925,
14937,
12440,
328,
6312,
5676,
88,
2701,
1071,
6652,
374,
22130,
9162,
279,
6781,
11499,
48011,
369,
459,
7294,
22197,
6713,
4901,
627,
1,
15724,
11,
433,
574,
1903,
2867,
311,
279,
8925,
315,
91089,
430,
279,
4113,
9477,
323,
1524,
872,
27444,
811,
9002,
10711,
7978,
617,
539,
1027,
10666,
311,
279,
7327,
31416,
12634,
16784,
1359,
328,
6312,
5676,
88,
2701,
1071,
389,
279,
70513,
315,
279,
358,
91921,
8925,
315,
91089,
6574,
304,
47387,
389,
7159,
627,
16397,
279,
6574,
279,
358
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
7778,
39251,
6713,
14,
2078,
59805,
311,
69090,
474,
358,
91921,
311,
40090,
10471,
198,
2078,
59805,
311,
69090,
474,
358,
91921,
311,
40090,
10471,
198,
2505,
17526,
1111,
320,
37,
7476,
7435,
28501,
45672,
311,
279,
7327,
31416,
12634,
16784,
14925,
14937,
12440,
328,
6312,
5676,
88,
2701,
1071,
6652,
374,
22130,
9162,
279,
6781,
11499,
48011,
369,
459,
7294,
22197,
6713,
4901,
627,
1,
15724,
11,
433,
574,
1903,
2867,
311,
279,
8925,
315,
91089,
430,
279,
4113,
9477,
323,
1524,
872,
27444,
811,
9002,
10711,
7978,
617,
539,
1027,
10666,
311,
279,
7327,
31416,
12634,
16784,
1359,
328,
6312,
5676,
88,
2701,
1071,
389,
279,
70513,
315,
279,
358,
91921,
8925,
315,
91089,
6574,
304,
47387,
389,
7159,
627,
16397,
279,
6574,
279,
358,
-100
] |
House of Reps to investigate tax waivers granted to multi-national companies
The House of Representatives has mandated its Committee on Finance and Public Accounts to investigate tax waivers that are currently being granted to multi-national companies in Nigeria.
The resolution made by the House on Tuesday was taken with a view to reducing tax waivers and achieving economic objectives.
Debating the motion, lawmakers agreed that the country could not afford such unproductive incentives.
It is not the first time members of the House of Representatives are deliberating on the issue of tax incentives given to companies at home and abroad.
In the motion moved by Honourable Kehinde Odenenye, the House once again considered the gains the country had made in its attempt to woo foreign investment.
The sponsor of the motion said there was little evidence that these tax incentives had increased investments.
The Majority Leader, Honourable Femi Gbajabiamila, suggested that the resolution to investigate the tax waivers should not be limited to foreign investors alone.
Some other lawmakers that made contributions – Mukhtar Ahmed, Herman Hembe and Nnenne Elendu-Ukeje – agreed that the policy on tax incentives had made little or no positive impact on the nation's economy.
The house then directed its Committee on Finance and Public Accounts to investigate the matter, with the possibility of abolishing unproductive incentives.
The committee's report is expected back in four weeks.
Credit: Channels
|
{
"redpajama_set_name": "RedPajamaCommonCrawl"
}
| 9,006 |
[
128000,
29707,
315,
3402,
82,
311,
19874,
3827,
92000,
11938,
311,
7447,
75629,
5220,
198,
791,
4783,
315,
40845,
706,
65509,
1202,
10554,
389,
23261,
323,
3142,
41755,
311,
19874,
3827,
92000,
430,
527,
5131,
1694,
11938,
311,
7447,
75629,
5220,
304,
29258,
627,
791,
11175,
1903,
555,
279,
4783,
389,
7742,
574,
4529,
449,
264,
1684,
311,
18189,
3827,
92000,
323,
32145,
7100,
26470,
627,
1951,
65,
1113,
279,
11633,
11,
26137,
7378,
430,
279,
3224,
1436,
539,
10150,
1778,
653,
34370,
36580,
627,
2181,
374,
539,
279,
1176,
892,
3697,
315,
279,
4783,
315,
40845,
527,
21835,
1113,
389,
279,
4360,
315,
3827,
36580,
2728,
311,
5220,
520,
2162,
323,
22917,
627,
644,
279,
11633,
7882,
555,
96914,
481,
735,
2701,
28074,
507,
5294,
268,
9188
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
29707,
315,
3402,
82,
311,
19874,
3827,
92000,
11938,
311,
7447,
75629,
5220,
198,
791,
4783,
315,
40845,
706,
65509,
1202,
10554,
389,
23261,
323,
3142,
41755,
311,
19874,
3827,
92000,
430,
527,
5131,
1694,
11938,
311,
7447,
75629,
5220,
304,
29258,
627,
791,
11175,
1903,
555,
279,
4783,
389,
7742,
574,
4529,
449,
264,
1684,
311,
18189,
3827,
92000,
323,
32145,
7100,
26470,
627,
1951,
65,
1113,
279,
11633,
11,
26137,
7378,
430,
279,
3224,
1436,
539,
10150,
1778,
653,
34370,
36580,
627,
2181,
374,
539,
279,
1176,
892,
3697,
315,
279,
4783,
315,
40845,
527,
21835,
1113,
389,
279,
4360,
315,
3827,
36580,
2728,
311,
5220,
520,
2162,
323,
22917,
627,
644,
279,
11633,
7882,
555,
96914,
481,
735,
2701,
28074,
507,
5294,
268,
9188,
-100
] |
There are total 8 letters in Lawgiver, Starting with L and ending with R.
Lawgiver is a scrabble word? Yes (15 Points) Lawgiver has worth 15 Scrabble points.
n. - One who makes or enacts a law or system of laws, a legislator.
In Lawgiver L is 12th, A is 1st, W is 23rd, G is 7th, I is 9th, V is 22nd, E is 5th, R is 18th letters in Alphabet Series.
|
{
"redpajama_set_name": "RedPajamaC4"
}
| 2,025 |
[
128000,
3947,
527,
2860,
220,
23,
12197,
304,
7658,
70,
1553,
11,
28757,
449,
445,
323,
13696,
449,
432,
627,
39166,
70,
1553,
374,
264,
9406,
73291,
3492,
30,
7566,
320,
868,
21387,
8,
7658,
70,
1553,
706,
5922,
220,
868,
33234,
73291,
3585,
627,
77,
13,
197,
12,
3861,
889,
3727,
477,
665,
11613,
264,
2383,
477,
1887,
315,
7016,
11,
264,
15312,
859,
627,
644,
7658,
70,
1553,
445,
374,
220,
717,
339,
11,
362,
374,
220,
16,
267,
11,
468,
374,
220,
1419,
6634,
11,
480,
374,
220,
22,
339,
11,
358,
374,
220,
24,
339,
11,
650,
374,
220,
1313,
303,
11,
469,
374,
220,
20,
339,
11,
432,
374,
220,
972,
339,
12197,
304,
63897,
11378,
13,
128256,
128256,
128256,
128256,
128256,
128256
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
0,
0,
0,
0,
0,
0
] |
[
3947,
527,
2860,
220,
23,
12197,
304,
7658,
70,
1553,
11,
28757,
449,
445,
323,
13696,
449,
432,
627,
39166,
70,
1553,
374,
264,
9406,
73291,
3492,
30,
7566,
320,
868,
21387,
8,
7658,
70,
1553,
706,
5922,
220,
868,
33234,
73291,
3585,
627,
77,
13,
197,
12,
3861,
889,
3727,
477,
665,
11613,
264,
2383,
477,
1887,
315,
7016,
11,
264,
15312,
859,
627,
644,
7658,
70,
1553,
445,
374,
220,
717,
339,
11,
362,
374,
220,
16,
267,
11,
468,
374,
220,
1419,
6634,
11,
480,
374,
220,
22,
339,
11,
358,
374,
220,
24,
339,
11,
650,
374,
220,
1313,
303,
11,
469,
374,
220,
20,
339,
11,
432,
374,
220,
972,
339,
12197,
304,
63897,
11378,
13,
-100,
-100,
-100,
-100,
-100,
-100,
-100
] |
Brona's Books: 20 Books of ... whatever season it is wherever you are!
20 Books of ... whatever season it is wherever you are!
Cathy's 20 Books of Summer Winter is here once again!
It really feels like I was preparing my 2017 list just the other day.
And it still feels summery here in Sydney.
Tuesday was a balmy 26℃, although today has turned decidedly cool.
Perhaps winter is coming after all!
Like Cathy, I have failed miserably at this challenge every year, but the fun is in the compiling, not the completing!
In 2017 I read 10 and a half books from my list.
In 2016 I ticked off all 20 books, but I cheated by changing my list halfway through.
2015 was my first foray into #20books and I read 11 out of 20.
So what have I learnt about myself and #20books over this time?
I love any excuse to browse through my TBR piles.
I love wondering about which books I might feel like reading over the cold winter months.
I love thinking about which books I have already committed to reading for readalongs.
I love imaging the unknown new releases and spontaneous reading challenges that might tempt me in the next 3 months.
I love ticking things off lists.
My attention span wanders off to other things by August.
I'm a mood reader & it's impossible to predict my mood 2 months down the track let alone 2 weeks.
I hate being dictated to - even when it's a list of my own making.
Obviously the pro's outweigh the con's, so without any further ado here is my list of 20.
I can't believe it's now the 4th September and winter is supposedly over.
It did actually get to 19℃ today but the wind chill factor made it feel cooler.
August saw one magnificent day of 25℃, but the average daytime temp was only 19℃. Sydney even had a few 5℃ nights which is quite unusual.
July had a very similar tale to tell.
Whereas June was cold with our best temp only reaching 20℃.
I'm sick and tired of being cold and wearing my winter clothes!
I know that those of you who experience much colder winters will laugh at me, but most Sydney homes are not designed with cold winters in mind.
I read 23 and a half books this year - YAY me!
But I only read a handful of the books from my list below...read on to see what happened.
I've just started this so I'm going to sneak it into #20books to guarantee at least one tick!
I loved Olsson's memoir, Boy, Lost a few years ago & was thrilled to recently receive a lovely hardback ARC of this October release set in Sydney during the 60's & 70's.
This is very close to the top of my TBR pile & I really want to read it BEFORE it hits the shelves in October, but not yet.
A book/movie combo that was very intriguing.
My June book club read.
My August book club read.
I'M A VERY BAD BOOK CLUBBER - I DIDN'T READ IT!
Read but not yet reviewed.
Some fine Australian short stories to tide me over the slow reading days.
Can't believe I didn't get to this winter comfort read!
Actually, now that I remember how dry our winter has been, I can believe it.
No rainy weekends this year to curl up in bed with a cosy book.
Because everyone needs a winter comfort read.
Officially a Maigret convert now!
I enjoyed my first foray into Maigret's world last year.
They're nice slim volumes, perfect for a quick, easy read and a quick, easy tick!
A recipe book full of delicious looking recipes, street photography and tips for travellers.
An ambitious inclusion since this book has yet to make it's way onto my TBR pile.
It's just a matter of time though!
We currently have this exhibition on at the Art Gallery of NSW.
I'd like to read the book before popping into see the tapestries again.
And also picked up a copy of Iris Murdoch's The Unicorn at the same time (see below).
A new Murakami is due in October.
These short stories will hopefully tide me over until then.
Looks like I will get to new Murakami before this one after all.
I've read over half the stories to date, so may get this finished in the next week or so.
The master of the short story form, William Trevor's final 10 stories are here in this final volume for me to savour.
A cli-fi verse novel with a gorgeous cover.
My first book read and reviewed for this challenge.
It might be cheating a little to add 2 cook books to my list, but this one is more a travel guide with food as it's raison d'être.
Like the other cookbook/travel guide above, I've flicked through the pictures, but the rest is saved for later.
For when I need a bit of light, easy fluff.
WARNING: Many more Thirkell books will begin appearing on this blog.
For when I want to feel annoyed about spelling harbor without it's 'u'!!
The missing 'u' annoyed me every time I picked up the book.
Fortunately the characters were equally as annoying!
A modern, contemporary Japanese author who gets rave reviews.
I'm curious to see why she is so popular.
I've never read this or seen the movie, but it sounds so appealing and heart warming.
It could be the perfect choice one cold, dull, wintry weekend.
Loved parts of this, but not so much the second half.
I read 10 and half books off my list from the beginning of the challenge.
It seems that I'm reasonably good at planning ahead about 6-8 weeks for what I might like to read, but after that, anything can, and will, happen!
Oh, I love the Neverending Story! And also Angela Thirkell books, though I can't remember which one that is off the top of my head. That looks like a great list!
Good luck with your list. I'll be interested to know what you think of Sugar Money as I've read it recently too. I haven't read any of your others, but I do have The Lady and the Unicorn on my TBR.
I was thinking of you when I did my 20 books of "Summer" list yesterday! I loved Kitchen and yay Thirkell. Have fun! It's also not cheating to swap out books, right? I've done that every year so far!
Great choices Brona - enjoy the William Trevor, I am dying to read that one!
This is my first time taking part in the challenge, and I definitely had a lot of fun compiling my list for the summer. Good luck, and enjoy your reads!
Now the hard part: It has taken me almost 2 weeks to decide if I will do @20BooksOfSummer this year. The die is cast...."Alea iactsa est"...the Rubicon is crossed. I'm in. Now the fun part: ...making a list!
Ohhhh I look forward to seeing what you pick!
|
{
"redpajama_set_name": "RedPajamaC4"
}
| 4,420 |
[
128000,
42059,
64,
596,
18312,
25,
220,
508,
18312,
315,
2564,
8996,
3280,
433,
374,
28578,
499,
527,
4999,
508,
18312,
315,
2564,
8996,
3280,
433,
374,
28578,
499,
527,
4999,
34,
19682,
596,
220,
508,
18312,
315,
19367,
20704,
374,
1618,
3131,
1578,
4999,
2181,
2216,
11321,
1093,
358,
574,
20646,
856,
220,
679,
22,
1160,
1120,
279,
1023,
1938,
627,
3112,
433,
2103,
11321,
35359,
727,
1618,
304,
21972,
627,
41299,
574,
264,
9839,
2465,
220,
1627,
112631,
11,
8051,
3432,
706,
6656,
77120,
7155,
627,
32576,
12688,
374,
5108,
1306,
682,
4999,
13246,
82448,
11,
358,
617,
4745,
98310,
2915,
520,
420,
8815,
1475,
1060,
11,
719,
279,
2523,
374,
304,
279,
55320,
11,
539,
279,
27666,
4999,
644,
220,
679,
22,
358,
1373,
220
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
42059,
64,
596,
18312,
25,
220,
508,
18312,
315,
2564,
8996,
3280,
433,
374,
28578,
499,
527,
4999,
508,
18312,
315,
2564,
8996,
3280,
433,
374,
28578,
499,
527,
4999,
34,
19682,
596,
220,
508,
18312,
315,
19367,
20704,
374,
1618,
3131,
1578,
4999,
2181,
2216,
11321,
1093,
358,
574,
20646,
856,
220,
679,
22,
1160,
1120,
279,
1023,
1938,
627,
3112,
433,
2103,
11321,
35359,
727,
1618,
304,
21972,
627,
41299,
574,
264,
9839,
2465,
220,
1627,
112631,
11,
8051,
3432,
706,
6656,
77120,
7155,
627,
32576,
12688,
374,
5108,
1306,
682,
4999,
13246,
82448,
11,
358,
617,
4745,
98310,
2915,
520,
420,
8815,
1475,
1060,
11,
719,
279,
2523,
374,
304,
279,
55320,
11,
539,
279,
27666,
4999,
644,
220,
679,
22,
358,
1373,
220,
-100
] |
Conclusions Data about the ability of non-conventional ligands to operate class-A GPCRs have been accumulating. Specifically, increasing evidence indicates that oxysterols, oxidized derivatives of cholesterol, are involved in many activities that are not strictly associated with cholesterol metabolism and may act as emergency signaling molecules in neurodegenerative disorders, including demyelinating diseases [29]. Different research groups, ours included, have recently described the ability of oxysterols to bind not only to their canonical receptors (the oxysterol receptors LXRs), but to also show a 'promiscuous' behavior in activating, in a specific but not selective manner, other receptors, namely selected GPCRs. In particular, the three investigated GPCRs show a common binding space, in which oxysterols can place themselves with different local arrangements. This evidence may explain the different potency of the same oxysterol on each individual receptor. Our data suggest that each of these three class-A GPCRs shows higher sensitivity to a specific oxysterol and a different activation threshold which potentially differentiates the final biological effect of these compounds, depending on the site of production, their concentration, specific spatio-temporal features and the typical receptor Metformin pattern of the targeted cell/tissue. Besides being common molecular targets of oxysterols, EBI2, CXCR2 and GPR17 are phylogenetically related to each other and also participate in CNS inflammatory responses. Notably, these three receptors respond to other already characterized independent families of endogenous ligands, which are known to participate to the onset and/or resolution of the inflammatory reaction. It is not a chance that oxysterols are also produced locally at high concentrations under distinct pathological conditions, such as ischemic, inflammatory, neurodegenerative and neoplastic diseases. Of interest, UDPglucose, one of the canonical ligands of GPR17, increases the affinity or potency of 22R-, 7α- and 27-hydroxycholesterol, suggesting that conventional and non-conventional ligands may work together under danger conditions. We thus hypothesize that oxysterols may act as immediate emergency signals alerting specific GPCRs, likely to 'prime' towards their conventional ligands; alternatively, oxysterols may act transversally to 'synchronize' some GPCRs and induce them to act together, maybe via the formation of homomers or heteromers mediating distinct biological effects. Such a transversal role for oxysterols challenges a classical pharmacological paradigm according to which a family of endogenous ligands specifically interacts with just one single class-A GPCR. According to our data, CXCR2 and GPR17 are operated by oxysterols as promiscuous ligands, making this class of ligands a 'fil rouge' linking oxidative stress, inflammation and neurodegeneration. Future studies will clarify the extent of oxysterol involvement in class-A GPCR inter-operability and the pathophysiological significance of this common transversal receptor activation process.
Acknowledgments Authors are deeply grateful to the Italian Multiple Sclerosis Foundation (FISM) for the financial support (Project N. 2013/R1 to MPA).
EBV Infection Epstein–Barr virus (EBV, human herpesvirus 4) was discovered 50 years ago, when Epstein, Achong, and Barr used electron microscopy to identify viral particles in Burkitt's lymphoma cells. It belongs to the lymphocryptovirus (LCV) genus of the gammaherpesvirus subfamily (Fig. 1A). The EBV genome, which consists of a linear, double-stranded DNA molecule that encodes close to 100 viral genes, is enclosed in a nuclear capsid surrounded by a protein tegument, which in turn, is surrounded by a glycoprotein-coated viral envelope. The glycoproteins are important for virus tropism, host selectivity, and infection.
Immune Response and Immune Evasion
|
{
"redpajama_set_name": "RedPajamaCommonCrawl"
}
| 1,482 |
[
128000,
1128,
24436,
2956,
922,
279,
5845,
315,
2536,
15204,
44322,
29413,
2914,
311,
14816,
538,
6830,
480,
4977,
43427,
617,
1027,
92685,
13,
45863,
11,
7859,
6029,
15151,
430,
19488,
22604,
3145,
11,
36172,
1534,
43645,
315,
39086,
11,
527,
6532,
304,
1690,
7640,
430,
527,
539,
26549,
5938,
449,
39086,
39097,
323,
1253,
1180,
439,
13147,
43080,
35715,
304,
18247,
451,
7642,
1413,
24673,
11,
2737,
2486,
88,
301,
16252,
19338,
510,
1682,
948,
34496,
3495,
5315,
11,
11604,
5343,
11,
617,
6051,
7633,
279,
5845,
315,
19488,
22604,
3145,
311,
10950,
539,
1193,
311,
872,
43553,
44540,
320,
1820,
19488,
22604,
337,
44540,
76898,
43427,
705,
719,
311,
1101,
1501,
264,
364,
25475,
3510,
9373,
6,
7865,
304,
72192,
11,
304,
264,
3230,
719,
539
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
1128,
24436,
2956,
922,
279,
5845,
315,
2536,
15204,
44322,
29413,
2914,
311,
14816,
538,
6830,
480,
4977,
43427,
617,
1027,
92685,
13,
45863,
11,
7859,
6029,
15151,
430,
19488,
22604,
3145,
11,
36172,
1534,
43645,
315,
39086,
11,
527,
6532,
304,
1690,
7640,
430,
527,
539,
26549,
5938,
449,
39086,
39097,
323,
1253,
1180,
439,
13147,
43080,
35715,
304,
18247,
451,
7642,
1413,
24673,
11,
2737,
2486,
88,
301,
16252,
19338,
510,
1682,
948,
34496,
3495,
5315,
11,
11604,
5343,
11,
617,
6051,
7633,
279,
5845,
315,
19488,
22604,
3145,
311,
10950,
539,
1193,
311,
872,
43553,
44540,
320,
1820,
19488,
22604,
337,
44540,
76898,
43427,
705,
719,
311,
1101,
1501,
264,
364,
25475,
3510,
9373,
6,
7865,
304,
72192,
11,
304,
264,
3230,
719,
539,
-100
] |
1968 Ford F100 "Frankenstein" for crazy morning drifting!
1968 Ford F100 that's also known as "Frankenstein" – that has to be something cool, right?
If you're familiar with Gas Monkey Garage, then you know the man who's pretty skilled with paint guns, KC Matheiu and the pickup truck. Well, here we have a video in which we ca take a closer look at what happens when KC and his '68 Ford F100 Frankenstein go for a morning errand. It's not some average milk run, that we can say.
1968 Ford F100 goes for a morning drift!
The old-school pickup screams like a wild dog as it blast through the streets. It's anything but a conventional drift machine and it's definitely a build we can fall for. Enjoy the ride along!
Extreme Machine – The Green "ROCK DAWG" Will Blow Your Mind!
AMAZING And SAFE Way To Load And Unload Your Motorcycle!
Lifted Escalade – A Cadillac that's taken to new heights!
The Jet Bike From Jay Leno's Garage!!
G-Max reverse bungy ride in Singapore! Try not to go insane!
|
{
"redpajama_set_name": "RedPajamaC4"
}
| 4,704 |
[
128000,
5162,
23,
14337,
435,
1041,
330,
38426,
62756,
1,
369,
14599,
6693,
85353,
4999,
5162,
23,
14337,
435,
1041,
430,
596,
1101,
3967,
439,
330,
38426,
62756,
1,
1389,
430,
706,
311,
387,
2555,
7155,
11,
1314,
5380,
2746,
499,
2351,
11537,
449,
21523,
58937,
39996,
11,
1243,
499,
1440,
279,
893,
889,
596,
5128,
26611,
449,
6308,
16766,
11,
21764,
7011,
383,
19260,
323,
279,
30686,
11092,
13,
8489,
11,
1618,
584,
617,
264,
2835,
304,
902,
584,
2211,
1935,
264,
12401,
1427,
520,
1148,
8741,
994,
21764,
323,
813,
364,
2614,
14337,
435,
1041,
9454,
62756,
733,
369,
264,
6693,
1886,
438,
13,
1102,
596,
539,
1063,
5578,
14403,
1629,
11,
430,
584,
649,
2019,
627,
5162,
23,
14337,
435,
1041,
5900,
369,
264,
6693
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
5162,
23,
14337,
435,
1041,
330,
38426,
62756,
1,
369,
14599,
6693,
85353,
4999,
5162,
23,
14337,
435,
1041,
430,
596,
1101,
3967,
439,
330,
38426,
62756,
1,
1389,
430,
706,
311,
387,
2555,
7155,
11,
1314,
5380,
2746,
499,
2351,
11537,
449,
21523,
58937,
39996,
11,
1243,
499,
1440,
279,
893,
889,
596,
5128,
26611,
449,
6308,
16766,
11,
21764,
7011,
383,
19260,
323,
279,
30686,
11092,
13,
8489,
11,
1618,
584,
617,
264,
2835,
304,
902,
584,
2211,
1935,
264,
12401,
1427,
520,
1148,
8741,
994,
21764,
323,
813,
364,
2614,
14337,
435,
1041,
9454,
62756,
733,
369,
264,
6693,
1886,
438,
13,
1102,
596,
539,
1063,
5578,
14403,
1629,
11,
430,
584,
649,
2019,
627,
5162,
23,
14337,
435,
1041,
5900,
369,
264,
6693,
-100
] |
'A lifeboat in the ocean:' Nurses on life inside a downtown Vancouver hospital
VANCOUVER — As a registered nurse in the emergency department at St. Paul's Hospital in Vancouver, Zoe Manarangi Bake-Paterson wonders whether she'll be the same after the COVID-19 pandemic subsides.
Second World War commemorations become casualty of COVID-19 pandemic
OTTAWA — Donald White was shaving when his friend ran in excitedly to tell his unit the news: The war was over.
Elderly main victims of COVID-19 and sci-fi writers on the pandemic; In The News for April 14
In The News is a roundup of stories from The Canadian Press designed to kickstart your day. Here is what's on the radar of our editors for the morning of April 14 ... COVID-19 in Canada ...
Canadians want serious progress on COVID-19 before returning to work: poll
OTTAWA — Most Canadians want to see significant progress in the fight against COVID-19 before they would feel comfortable with people being allowed to return to work, a new poll suggests.
Gatherings restricted, schools closed: What's being done to fight COVID-19
The COVID-19 pandemic has affected every province and territory.
Health Canada approves Spartan Bioscience's portable COVID-19 test
OTTAWA — Rapid COVID-19 testing devices are on the way to remote and Indigenous communities where access and timely results have been hindered by distance and limited resources, officials said Monday after a new test kit was approved over the weekend
A look at some of the Canadians who have lost their lives to COVID 19
COVID-19 has sickened thousands of Canadians from coast to coast and killed hundreds.
The latest numbers of confirmed and presumptive COVID-19 cases in Canada as of 7:24 p.m. ET on April 13, 2020: There are 25,682 confirmed and presumptive cases in Canada.
Regina man dies in hospital after catching COVID-19 in the community
REGINA — The wife of a man who died after being diagnosed with COVID-19 says her husband did everything he could to avoid catching it and couldn't fight it off when he did. Noble Gullacher, 69, was a diabetic who was waiting for a kidney transplant.
Judge greenlights lawsuit by disqualified Conservative leadership candidate
OTTAWA — An Ontario court says a lawsuit launched by a would-be Conservative leadership candidate who is seeking to get into the race can go ahead.
|
{
"redpajama_set_name": "RedPajamaCommonCrawl"
}
| 5,362 |
[
128000,
52374,
2324,
38865,
304,
279,
18435,
4989,
96336,
389,
2324,
4871,
264,
19441,
23393,
8952,
198,
53,
1111,
8445,
52,
3848,
2001,
1666,
264,
9879,
29198,
304,
279,
13147,
9476,
520,
800,
13,
7043,
596,
15429,
304,
23393,
11,
75741,
2418,
277,
79428,
53174,
9483,
266,
1293,
40164,
3508,
1364,
3358,
387,
279,
1890,
1306,
279,
20562,
12,
777,
28522,
5258,
3422,
627,
16041,
4435,
5111,
81154,
811,
3719,
92597,
315,
20562,
12,
777,
28522,
198,
24732,
14757,
32,
2001,
9641,
5929,
574,
81109,
994,
813,
4333,
10837,
304,
12304,
398,
311,
3371,
813,
5089,
279,
3754,
25,
578,
4208,
574,
927,
627,
36,
77969,
398,
1925,
12697,
315,
20562,
12,
777,
323,
39074,
37731,
16483,
389,
279,
28522,
26,
763,
578,
5513,
369,
5936,
220,
975
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
52374,
2324,
38865,
304,
279,
18435,
4989,
96336,
389,
2324,
4871,
264,
19441,
23393,
8952,
198,
53,
1111,
8445,
52,
3848,
2001,
1666,
264,
9879,
29198,
304,
279,
13147,
9476,
520,
800,
13,
7043,
596,
15429,
304,
23393,
11,
75741,
2418,
277,
79428,
53174,
9483,
266,
1293,
40164,
3508,
1364,
3358,
387,
279,
1890,
1306,
279,
20562,
12,
777,
28522,
5258,
3422,
627,
16041,
4435,
5111,
81154,
811,
3719,
92597,
315,
20562,
12,
777,
28522,
198,
24732,
14757,
32,
2001,
9641,
5929,
574,
81109,
994,
813,
4333,
10837,
304,
12304,
398,
311,
3371,
813,
5089,
279,
3754,
25,
578,
4208,
574,
927,
627,
36,
77969,
398,
1925,
12697,
315,
20562,
12,
777,
323,
39074,
37731,
16483,
389,
279,
28522,
26,
763,
578,
5513,
369,
5936,
220,
975,
-100
] |
In this course we will discuss various methodologies to ingest data into the SIEM. We will also be configuring our systems to ship our first logs into the SIEM.
My First Log Video — 00:28:09
My First Log Video
In this video we configure our SIEM to ingest its first set of logs.
Data Collection Video — 00:18:38
Data Collection Video
In this video we review various methods for data collection and discuss the requirements for each.
Questions and Answers Video — 00:07:49
Questions and Answers Video
A question and answer section built to test your knowledge.
Ryan Fitzpatrick has been working in IT for 14 years. He spent the first four years bouncing between help desk, systems administration and network administration for small businesses where he played around with every piece of technology he could get his hands on before landing on supporting SIEM. He was intrigued by data analytics and the automation potential SIEM brought to organizations.
Armed with natural curiosity, a wide scope of technological understanding and a childhood full of scripting, he found himself in a rewarding career where he could continue to learn, develop and automate. So far he's helped ingest and analyze data from over 500,000 endpoints worldwide and trained two teams of analysts and engineers to perform security operations.
In his free time, Ryan enjoys video games, practicing jiu-jitsu and teaching himself new skills in IT. His latest interest has been in developing automation servers with Django, and he is successfully managing the health and status of a 60-node SIEM cluster designed to handle data from 60,000 data sources.
|
{
"redpajama_set_name": "RedPajamaCommonCrawl"
}
| 2,794 |
[
128000,
644,
420,
3388,
584,
690,
4358,
5370,
81898,
311,
89372,
828,
1139,
279,
31648,
2783,
13,
1226,
690,
1101,
387,
72883,
1057,
6067,
311,
8448,
1057,
1176,
18929,
1139,
279,
31648,
2783,
627,
5159,
5629,
2905,
8519,
2001,
220,
410,
25,
1591,
25,
2545,
198,
5159,
5629,
2905,
8519,
198,
644,
420,
2835,
584,
14749,
1057,
31648,
2783,
311,
89372,
1202,
1176,
743,
315,
18929,
627,
1061,
11348,
8519,
2001,
220,
410,
25,
972,
25,
1987,
198,
1061,
11348,
8519,
198,
644,
420,
2835,
584,
3477,
5370,
5528,
369,
828,
4526,
323,
4358,
279,
8670,
369,
1855,
627,
36349,
323,
38343,
8519,
2001,
220,
410,
25,
2589,
25,
2491,
198,
36349,
323,
38343,
8519,
198,
32,
3488,
323,
4320,
3857,
5918,
311,
1296,
701,
6677,
627,
49546
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
644,
420,
3388,
584,
690,
4358,
5370,
81898,
311,
89372,
828,
1139,
279,
31648,
2783,
13,
1226,
690,
1101,
387,
72883,
1057,
6067,
311,
8448,
1057,
1176,
18929,
1139,
279,
31648,
2783,
627,
5159,
5629,
2905,
8519,
2001,
220,
410,
25,
1591,
25,
2545,
198,
5159,
5629,
2905,
8519,
198,
644,
420,
2835,
584,
14749,
1057,
31648,
2783,
311,
89372,
1202,
1176,
743,
315,
18929,
627,
1061,
11348,
8519,
2001,
220,
410,
25,
972,
25,
1987,
198,
1061,
11348,
8519,
198,
644,
420,
2835,
584,
3477,
5370,
5528,
369,
828,
4526,
323,
4358,
279,
8670,
369,
1855,
627,
36349,
323,
38343,
8519,
2001,
220,
410,
25,
2589,
25,
2491,
198,
36349,
323,
38343,
8519,
198,
32,
3488,
323,
4320,
3857,
5918,
311,
1296,
701,
6677,
627,
49546,
-100
] |
By Eric Tataw – Sunday April 14, 2019.
Paul Biya is Cameroon's President since 1982.
Cameroon is obviously exasperated with the level of insecurity in some of its Regions. State authorities are completely shocked with an attack by Boko Haram terrorist group at Kerawa, a town in the country's Far North Region, National Telegraph has been told.
Government sources say four soldiers were killed in the Kerawa attack, Friday April 12, 2019. But a local Journalist told National Telegraph the figure may be a little higher than four, adding that the vehicle carrying the soldiers was damaged and nine others sustained serious injuries.
The soldiers were on a possible routine surveillance when a device planted by the Boko Haram group between Gouzdavreket and Asshigacha riddled the bottom of the vehicle, shattered tires, before a considerable part of the vehicle exploded, the Journalist said.
On Monday April 8, 2019, the Boko Haram group launched another attack at Sagmé in the Logone-et-Chari Division still in the country's Far North that killed three soldiers and wounded some. Other regions have prior to these attacks remained wrapped in uncertainty.
On Thursday January 25, 2019, unidentified gunmen attacked and shot at a passenger train belonging to the country's national train service, CAMRAIL, in the town of Belabo in Belabo Sub-division, Lom and Djerem Division, in the country's East Region.
The passenger train left the town of Ngaoundere in Adamawa Region of Cameroon for Cameroon's capital city Yaoundé when gunmen attacked it at the small train terminal town of Belabo.
In the two English-speaking regions of the North West and South West, gun battles have ensued between government soldiers and Anglophone militias with a demand for a separate state called Ambazonia.
The government of Cameroon has reportedly spent billions in F CFA to contain to armed conflict in the two English-speaking regions to no avail.
Cameroon's treasury is also said to be depleting and with increase insecurity, compounded by high rates of unemployment, President Paul Biya would be facing his most difficult mandate.
The mandate is also said to be illegitimate, according to Prof Maurice Kamto, Chair of Cameroon's main opposition political party, Cameroon Renaissance Movement (CRM), now under detention who competed in the Cameroon's Presidential Elections and went on to declare he won.
Previous Cameroon: Governor Commissions Gendarmerie Chief To Hold Crucial Meeting With Bikers In Ntambesi.
Next Ex-Pope Benedict XVI's Essay On The Church And The Scandal Of Sexual Abuse Finally Translated!
His words are finally coming alive but in the opposite.
Well, the oxygen is been cut off, let's see how Yaounde is going to breath thereafter. We are going to see how Yaounde is going to grow fat without Ambazonia.
Some African president and governments are more stupid than cows and roaches. It is impossible to make a cow, a rat, a roach, kill its own.
Europeans leaders and governments took an oath to never fight each other and always resolve issues, conflict, problems on the table no matter how difficult and discomforting it is. Some of these same Europeans government come to Africa and give mentally sick, dumb, naive, barbaric, satanic creatures calling themselves presidents all kinds of weapons for them to exterminate, massacre their people.
All Diaper man need to do is simple look at how his masters behave amongst themselves and them copy it. Still, he can not.
The one in the picture above even once claim to be the best student of France, then came the moment for him to prove that and everything is a catastrophe, all we see is one gold statue flying from Etoudi to somewhere. I guess that is what France thought him.
Somebody tell Biya that the European Union as powerful as it is is with all its military complex is not using weapons or mattresses to resolve the Brexit crisis. He just need to watch the TV and he will see it, no reading of books or getting another degree is needed. Even better, He can just look at his Boss the president of France Emanuel Macron and the Yellow-Vest.
Diaper man aka mattresses president will be diapered and laid to sleep like a baby on his mattresses. Atanga Nji should better reserve all those mattresses, his boss gonna baldly need them.
The revolution continues with full force.
I wish it was not only the Cathedral in Paris that burnt down, it should have been the palace at Elysee burnt with Macron inside.
|
{
"redpajama_set_name": "RedPajamaC4"
}
| 4,906 |
[
128000,
1383,
16645,
88245,
86,
1389,
7418,
5936,
220,
975,
11,
220,
679,
24,
627,
26368,
12371,
7911,
374,
95108,
596,
4900,
2533,
220,
3753,
17,
627,
26479,
80832,
374,
14224,
506,
33361,
660,
449,
279,
2237,
315,
74935,
304,
1063,
315,
1202,
78447,
13,
3314,
11527,
527,
6724,
27718,
449,
459,
3440,
555,
426,
28342,
85642,
20320,
1912,
520,
36258,
14406,
11,
264,
6424,
304,
279,
3224,
596,
13759,
4892,
17593,
11,
5165,
49906,
706,
1027,
3309,
627,
62569,
8336,
2019,
3116,
15201,
1051,
7577,
304,
279,
36258,
14406,
3440,
11,
6740,
5936,
220,
717,
11,
220,
679,
24,
13,
2030,
264,
2254,
10139,
380,
3309,
5165,
49906,
279,
7216,
1253,
387,
264,
2697,
5190,
1109,
3116,
11,
7999,
430,
279,
7458,
15691,
279,
15201,
574,
20727
] |
[
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
1383,
16645,
88245,
86,
1389,
7418,
5936,
220,
975,
11,
220,
679,
24,
627,
26368,
12371,
7911,
374,
95108,
596,
4900,
2533,
220,
3753,
17,
627,
26479,
80832,
374,
14224,
506,
33361,
660,
449,
279,
2237,
315,
74935,
304,
1063,
315,
1202,
78447,
13,
3314,
11527,
527,
6724,
27718,
449,
459,
3440,
555,
426,
28342,
85642,
20320,
1912,
520,
36258,
14406,
11,
264,
6424,
304,
279,
3224,
596,
13759,
4892,
17593,
11,
5165,
49906,
706,
1027,
3309,
627,
62569,
8336,
2019,
3116,
15201,
1051,
7577,
304,
279,
36258,
14406,
3440,
11,
6740,
5936,
220,
717,
11,
220,
679,
24,
13,
2030,
264,
2254,
10139,
380,
3309,
5165,
49906,
279,
7216,
1253,
387,
264,
2697,
5190,
1109,
3116,
11,
7999,
430,
279,
7458,
15691,
279,
15201,
574,
20727,
-100
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.