text
stringlengths
14
5.22M
meta
dict
__index_level_0__
int64
0
9.97k
input_ids
sequencelengths
128
128
attention_mask
sequencelengths
128
128
labels
sequencelengths
128
128
2019 see's Jason O'Halloran switch to Yamaha as he joins last season's rookie sensation Tarran Mackenzie at Grant Bunting's McAms Yamaha team. After what has been a difficult season with Honda. Australian's Jason O'Halloran has announced at Motorcycle live today that he will partner the rapid rookie, Tarran Mackenzie at McAms Yamaha for 2019. O'Halloran has a wealth of experience on and off the bike as he aims to return to the top step of the podium, something he only managed once with Honda. The O'show joined the British racing scene in 2009, after competing in various championships back at home, moving up through the classes before joining Honda in the Superbike class in 2015 after a year with them in Superstock. Since then Jason has entered the showdown twice, finishing 5th in both 2016 and 2017. Joining O'Halloran will be Tarran Mackenzie who ended 2018 as the Rookie of the year. Tarran Mackenzie, the son of former 500cc podium finisher Niall Mackenzie, stepped up into Supersport for 2017 after clinching the Superstock crown but after a 100% winning record early on in the season, he was called up to replace Danny Kent for the rest of the season in Moto2. Things didn't work out as planned for Mackenzie who returned to BSB in 2018 with the McAms team where he ended his rookie year in 10th with 4 podiums to his name. Both O'Halloran and Mackenzie will be aiming to get themselfs into the showdown and join the likes of Redding, Irwin and Brookes in the 2019 British Superbike Championship fight. NowMoto's Riders Of The Day- Valencia.
{ "redpajama_set_name": "RedPajamaC4" }
6,072
[ 128000, 679, 24, 1518, 596, 18984, 507, 68070, 543, 55504, 3480, 311, 59535, 439, 568, 29782, 1566, 3280, 596, 31625, 37392, 350, 1138, 276, 33491, 57963, 520, 24668, 426, 27421, 596, 65813, 1026, 59535, 2128, 627, 6153, 1148, 706, 1027, 264, 5107, 3280, 449, 29987, 13, 13673, 596, 18984, 507, 68070, 543, 55504, 706, 7376, 520, 70762, 3974, 3432, 430, 568, 690, 8427, 279, 11295, 31625, 11, 350, 1138, 276, 33491, 57963, 520, 65813, 1026, 59535, 369, 220, 679, 24, 627, 46, 68070, 543, 55504, 706, 264, 12205, 315, 3217, 389, 323, 1022, 279, 13260, 439, 568, 22262, 311, 471, 311, 279, 1948, 3094, 315, 279, 59136, 11, 2555, 568, 1193, 9152, 3131, 449, 29987, 627, 791, 507, 596, 5269, 11096, 279, 8013, 22019, 6237, 304, 220, 1049 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 679, 24, 1518, 596, 18984, 507, 68070, 543, 55504, 3480, 311, 59535, 439, 568, 29782, 1566, 3280, 596, 31625, 37392, 350, 1138, 276, 33491, 57963, 520, 24668, 426, 27421, 596, 65813, 1026, 59535, 2128, 627, 6153, 1148, 706, 1027, 264, 5107, 3280, 449, 29987, 13, 13673, 596, 18984, 507, 68070, 543, 55504, 706, 7376, 520, 70762, 3974, 3432, 430, 568, 690, 8427, 279, 11295, 31625, 11, 350, 1138, 276, 33491, 57963, 520, 65813, 1026, 59535, 369, 220, 679, 24, 627, 46, 68070, 543, 55504, 706, 264, 12205, 315, 3217, 389, 323, 1022, 279, 13260, 439, 568, 22262, 311, 471, 311, 279, 1948, 3094, 315, 279, 59136, 11, 2555, 568, 1193, 9152, 3131, 449, 29987, 627, 791, 507, 596, 5269, 11096, 279, 8013, 22019, 6237, 304, 220, 1049, -100 ]
/*****************************************************************************/ /* File Implementing the shared memory system for Hack. * * THIS CODE ONLY WORKS WITH HACK, IT MAY LOOK LIKE A GENERIC ATOMIC * HASHTABLE FOR OCAML: IT IS NOT! * BUT ... YOU WERE GOING TO SAY BUT? BUT ... * THERE IS NO BUT! DONNY YOU'RE OUT OF YOUR ELEMENT! * * The lock-free data structures implemented here only work because of how the * Hack phases are synchronized. * * The hashtable maps string keys to string values. (The strings are really * serialized / marshalled representations of OCaml structures.) Key observation * of the table is that data with the same key are considered equivalent, and so * you can arbitrarily get any copy of it; furthermore if data is missing it can * be recomputed, so incorrectly saying data is missing when it is being written * is only a potential perf loss. Note that "equivalent" doesn't necessarily * mean "identical", e.g., two alpha-converted types are "equivalent" though not * literally byte- identical. (That said, I'm pretty sure the Hack typechecker * actually does always write identical data, but the hashtable doesn't need * quite that strong of an invariant.) * * The operations implemented, and their limitations: * * -) Concurrent writes: SUPPORTED One will win and the other will get * dropped on the floor. There is no way to tell which happened. Only promise * is that after a write, the one thread which did the write will see data in * the table (though it may be slightly different data than what was written, * see above about equivalent data). * * -) Concurrent reads: SUPPORTED If interleaved with a concurrent write, the * read will arbitrarily say that there is no data at that slot or return the * entire new data written by the concurrent writer. * * -) Concurrent removes: NOT SUPPORTED Only the master can remove, and can * only do so if there are no other concurrent operations (reads or writes). * * Since the values are variably sized and can get quite large, they are * stored separately from the hashes in a garbage-collected heap. * * Hash collisions are resolved via linear probing. */ /*****************************************************************************/ /* define CAML_NAME_SPACE to ensure all the caml imports are prefixed with * 'caml_' */ #define CAML_NAME_SPACE #include <caml/alloc.h> #include <caml/bigarray.h> #include <caml/callback.h> #include <caml/fail.h> #include <caml/intext.h> #include <caml/memory.h> #include <caml/mlvalues.h> #include <caml/unixsupport.h> #ifdef _WIN32 #include <windows.h> #else #define _GNU_SOURCE 1 #include <fcntl.h> #include <signal.h> #include <stdio.h> #include <string.h> #include <sys/errno.h> #include <sys/mman.h> #include <sys/syscall.h> #include <sys/types.h> #include <unistd.h> #endif #include <inttypes.h> #include <limits.h> #include <lz4.h> #include <stdalign.h> #include <sys/time.h> #include <time.h> #include "hh_assert.h" // Ideally these would live in a handle.h file but our internal build system // can't support that at the moment. These are shared with handle_stubs.c #ifdef _WIN32 #define Val_handle(fd) (win_alloc_handle(fd)) #else #define Handle_val(fd) (Long_val(fd)) #define Val_handle(fd) (Val_long(fd)) #endif /**************************************************************************** * Quoting the linux manpage: memfd_create() creates an anonymous file * and returns a file descriptor that refers to it. The file behaves * like a regular file, and so can be modified, truncated, * memory-mapped, and so on. However, unlike a regular file, it lives * in RAM and has a volatile backing storage. Once all references to * the file are dropped, it is automatically released. Anonymous * memory is used for all backing pages of the file. Therefore, files * created by memfd_create() have the same semantics as other * anonymous memory allocations such as those allocated using mmap(2) * with the MAP_ANONYMOUS flag. The memfd_create() system call first * appeared in Linux 3.17. ****************************************************************************/ #ifdef __linux__ #define MEMFD_CREATE 1 // glibc only added support for memfd_create in version 2.27. #ifndef MFD_CLOEXEC // Linux version for the architecture must support syscall memfd_create #ifndef SYS_memfd_create #if defined(__x86_64__) #define SYS_memfd_create 319 #elif defined(__powerpc64__) #define SYS_memfd_create 360 #elif defined(__aarch64__) #define SYS_memfd_create 385 #else #error "hh_shared.c requires an architecture that supports memfd_create" #endif #endif #include <asm/unistd.h> /* Originally this function would call uname(), parse the linux * kernel release version and make a decision based on whether * the kernel was >= 3.17 or not. However, syscall will return -1 * with an strerr(errno) of "Function not implemented" if the * kernel is < 3.17, and that's good enough. */ static int memfd_create(const char* name, unsigned int flags) { return syscall(SYS_memfd_create, name, flags); } #endif #endif #ifndef MAP_NORESERVE // This flag was unimplemented in FreeBSD and then later removed #define MAP_NORESERVE 0 #endif #ifdef _WIN32 static int win32_getpagesize(void) { SYSTEM_INFO siSysInfo; GetSystemInfo(&siSysInfo); return siSysInfo.dwPageSize; } #define getpagesize win32_getpagesize #endif /* Too lazy to use getconf */ #define CACHE_LINE_SIZE (1 << 6) #define WORD_SIZE sizeof(value) #define __ALIGN_MASK(x, mask) (((x) + (mask)) & ~(mask)) #define ALIGN(x, a) __ALIGN_MASK(x, (typeof(x))(a)-1) #define CACHE_ALIGN(x) ALIGN(x, CACHE_LINE_SIZE) #define WORD_ALIGN(x) ALIGN(x, WORD_SIZE) /* Each process reserves a range of values at a time from the shared counter. * Should be a power of two for more efficient modulo calculation. */ #define COUNTER_RANGE 2048 /*****************************************************************************/ /* Types */ /*****************************************************************************/ /* Convention: bsize = size in bytes, wsize = size in words. */ // Locations in the heap are encoded as byte offsets from the beginning of the // hash table. Because all data in the heap is word-aligned, these offsets will // always have 0 in the 3 low bits. // // Currently, we rely on the least significant bit being 0 to distinguish these // addresses from headers. Eventually we may want to rely on the 2 lower bits, // to represent 4 states in the GC tags instead of 3 (e.g., a gray color state // for incremental marking.) // // Note that the offsets do not start at the beginning of the heap, but the // start of the hash table. This has two important implications: // // 1. The offset 0 will always point to the hash of the first hash table entry, // which is never a meaningful offset. Because of this, we can take the address // 0 to be the "null" address. // // 2. During garbage collection, it is necessary to point from the heap to the // hash table itself, since we temporarily store heap headers in the addr field // of helt_t. By starting the offsets at the beginning of the hash table, we can // represent offsets into the hash table itself. typedef uintnat addr_t; // A field is either an address or a tagged integer, distinguished by low bit. typedef uintnat field_t; typedef struct { /* Layout information, used by workers to create memory mappings. */ size_t locals_bsize; size_t hashtbl_bsize; size_t heap_bsize; size_t shared_mem_bsize; /* Maximum number of hashtable elements */ size_t hashtbl_slots; /* Where the heap started (bottom), offset from hashtbl pointer */ addr_t heap_init; /* Where the heap will end (top), offset from hashtbl pointer */ addr_t heap_max; uintnat gc_phase; /* When we start a GC, we record the heap pointer here. We use this to * identify allocations performed during marking. These objects are not * explicitly marked, but are treated as reachable during the current * collection pass. * * This address should always fall between info->heap_init and info->heap. * This invariant is set up in hh_shared_init and maintained in * hh_start_cycle. */ addr_t gc_end; /* Bytes which are free (color=Blue). This quantity is initially 0 and * incremented during the GC sweep phase. The number will increase * monotonically until compaction, when all free space is reclaimed. */ uintnat free_bsize; /* Transaction counter. Entities being written by the current transaction will * have an entity version >= this counter. Committed entities will have a * version < this counter. */ intnat next_version; /* Logging level for shared memory statistics * 0 = nothing * 1 = log totals, averages, min, max bytes marshalled and unmarshalled * 2+ = log size of deserialized values in OCaml heap */ size_t log_level; /* Initially 0; set to 1 to signal that workers should exit */ size_t workers_should_exit; /* A counter increasing globally across all forks. */ alignas(128) uintnat counter; /* The number of nonempty slots in the hashtable. A nonempty slot has a * non-zero hash. We never clear hashes so this monotonically increases */ alignas(128) uintnat hcounter; /* The number of nonempty filled slots in the hashtable. A nonempty filled * slot has a non-zero hash AND a non-null addr. It increments when we write * data into a slot with addr==NULL and decrements when we clear data from a * slot */ alignas(128) uintnat hcounter_filled; /* The top of the heap, offset from hashtbl pointer */ alignas(128) addr_t heap; /* Head of the mark stack. */ alignas(128) uintnat mark_ptr; } shmem_info_t; /* Per-worker data which can be quickly updated non-atomically. Will be placed * in cache-aligned array in the first few pages of shared memory, indexed by * worker id. * * The first member of this struct is over-aligned to ensure that each element * of the global locals array is on a separate cache line. */ typedef struct { alignas(128) uint64_t counter; } local_t; // Every heap entry starts with a 64-bit header with the following layout: // // 6 3 0 0 0 00 // 3 6 8 7 2 10 // +-------------------------------+--------------------------------+------+--+ // |11111111 11111111 11111111 1111|1111 11111111 11111111 11111111 |111111|11| // +-------------------------------+--------------------------------+------+--+ // | | | | // | | | * 0-1 // | | | GC // | | * 2-7 tag // | * 31-1 decompress capacity (in words) // * 63-32 compressed size (in words) // // For GC, to distinguish headers from (word-aligned) pointers, the least bits // are never 00. The remaining 6 bits of the low word are used to encode a tag, // describing the type of object. // // For serialized objects (tag = 0), the remaining 7 bytes of the header word // encode two sizes, as outlined above, but other kinds of objects can use these // bytes differently, as long as it's possible to recover the size of the heap // object -- i.e., implement Obj_wosize, below. typedef uintnat hh_header_t; // The reserved header bits contain a tag used to distinguish between different // object layouts and find pointers within the object. typedef uintnat hh_tag_t; // Keep these in sync with "tag" type definition in sharedMem.ml #define Entity_tag 0 #define Heap_string_tag 13 #define Serialized_tag 19 static _Bool should_scan(hh_tag_t tag) { // The zero tag represents "entities" which need to be handled specially. // Callers to this function should first check for 0. assert(tag != Entity_tag); // By convention, only tags below Heap_string_tag contain pointers. We can // exploit this fact to reduce pointer finding to a single branch. // // In the future, if we add different layouts with a mixture of pointers and // other data, scanning for pointers will probably require a jump table. return tag < Heap_string_tag; } #define NULL_ADDR 0 #define Addr_of_ptr(entry) ((char*)(entry) - (char*)hashtbl) #define Ptr_of_addr(addr) ((char*)hashtbl + (addr)) #define Entry_of_addr(addr) ((heap_entry_t*)Ptr_of_addr(addr)) #define Deref(addr) (*(uintnat*)(Ptr_of_addr(addr))) /* also an l-value */ // During GC, we read words from the heap which might be an addr or a header, // and we need to distinguish between them. #define Is_addr(x) (((x)&0b11) == 0) // The low 2 bits of headers are reserved for GC. The white bit pattern // denotes an unmarked object, black denotes a marked object, and blue denotes a // free object. #define Color_white 0b01 #define Color_black 0b11 #define Color_blue 0b10 #define Color_hd(hd) ((hd)&0b11) #define Is_white(hd) (Color_hd(hd) == Color_white) #define Is_black(hd) (Color_hd(hd) == Color_black) #define Is_blue(hd) (Color_hd(hd) == Color_blue) #define White_hd(hd) (((hd) & ~0b11) | Color_white) #define Black_hd(hd) ((hd) | Color_black) #define Blue_hd(hd) (((hd) & ~0b11) | Color_blue) // Object headers contain a mark bit, tag, and size information. Objects with // the serialized tag contain the size information in a slightly different place // from other objects, so we need to look up the tag to read the size. #define Obj_tag(hd) (((hd) >> 2) & 0x3F) #define Obj_wosize_shift(tag) ((tag) < Serialized_tag ? 8 : 36) #define Obj_wosize_tag(hd, tag) ((hd) >> Obj_wosize_shift(tag)) #define Obj_wosize(hd) (Obj_wosize_tag(hd, Obj_tag(hd))) #define Obj_whsize(hd) (1 + Obj_wosize(hd)) #define Obj_bosize(hd) (Bsize_wsize(Obj_wosize(hd))) #define Obj_bhsize(hd) (Bsize_wsize(Obj_whsize(hd))) // Addrs point to the object header, so field 0 is +1 word. We should consider // making addrs point to the first field, and accessing the header at a -1 word // offset instead. #define Obj_field(addr, i) ((addr) + ((i) + 1) * WORD_SIZE) // Each heap entry starts with a word-sized header. The header encodes the size // (in words) of the entry in the heap and the capacity (in words) of the buffer // needed to decompress the entry. #define Entry_wsize(header) ((header) >> 36) #define Entry_decompress_capacity(header) \ (Bsize_wsize(((header) >> 8) & 0xFFFFFFF)) // The distance (in bytes) from one hh_entry_t* to the next. Entries are laid // out contiguously in memory. #define Heap_entry_slot_size(header) \ (sizeof(heap_entry_t) + Bsize_wsize(Entry_wsize(header))) /* Shared memory structures. hh_shared.h typedefs this to heap_entry_t. */ typedef struct { hh_header_t header; char data[]; } heap_entry_t; /* The hash table supports lock-free writes by performing a 16-byte CAS, * ensuring that the hash and address are written together atomically. */ typedef struct { uint64_t hash; addr_t addr; } helt_t; /*****************************************************************************/ /* GC */ /*****************************************************************************/ // The possible values of info->gc_phase #define Phase_idle 0 #define Phase_mark 1 #define Phase_sweep 2 // The max size is explicit to avoid exhausting available memory in the event of // a programmer error. We should not hit this limit, or come close to it. It // might become necessary to handle a mark stack overflow without crashing, but // this is not implemented. #define MARK_STACK_INIT_SIZE 512 // 4096 KiB #define MARK_STACK_MAX_SIZE (MARK_STACK_INIT_SIZE << 16) // 256 MiB // Note: because collection only happens on the master process, the following // values are only maintained in the master process and updates will not be // reflected in workers. // The marking phase treats the shared hash table as GC roots, but these are // marked incrementally. Because we might modify the hash table between mark // slices, we insert a write barrier in hh_remove. static uintnat roots_ptr = 0; // Holds the current position of the sweep phase between slices. static addr_t sweep_ptr = NULL_ADDR; /*****************************************************************************/ /* Globals */ /*****************************************************************************/ /* Shared memory metadata */ static shmem_info_t* info = NULL; /* Beginning of shared memory */ static char* shared_mem = NULL; /* Worker-local storage is cache line aligned. */ static local_t* locals = NULL; /* Base of the mark stack. */ static addr_t* mark_stack = NULL; /* The hashtable containing the shared values. */ static helt_t* hashtbl = NULL; /* This should only be used before forking */ static uintnat early_counter = 0; /* This is a process-local value. The master process is 0, workers are numbered * starting at 1. This is an offset into the worker local values in the heap. */ static size_t worker_id = 0; static size_t worker_can_exit = 1; CAMLprim value hh_used_heap_size(value unit) { CAMLparam1(unit); assert(info != NULL); CAMLreturn(Val_long(info->heap - info->heap_init)); } CAMLprim value hh_new_alloc_size(value unit) { CAMLparam1(unit); assert(info != NULL); CAMLreturn(Val_long(info->heap - info->gc_end)); } CAMLprim value hh_free_heap_size(value unit) { CAMLparam1(unit); assert(info != NULL); CAMLreturn(Val_long(info->free_bsize)); } CAMLprim value hh_gc_phase(value unit) { CAMLparam1(unit); assert(info != NULL); CAMLreturn(Val_long(info->gc_phase)); } CAMLprim value hh_log_level(value unit) { CAMLparam1(unit); assert(info != NULL); CAMLreturn(Val_long(info->log_level)); } CAMLprim value hh_next_version(value unit) { intnat v = 0; if (info) { v = info->next_version; } return Val_long(v); } CAMLprim value hh_commit_transaction(value unit) { CAMLparam1(unit); assert(info != NULL); info->next_version += 2; CAMLreturn(Val_unit); } CAMLprim value hh_hash_stats(value unit) { CAMLparam1(unit); CAMLlocal1(stats); stats = caml_alloc_tuple(3); Store_field(stats, 0, Val_long(info->hcounter)); Store_field(stats, 1, Val_long(info->hcounter_filled)); Store_field(stats, 2, Val_long(info->hashtbl_slots)); CAMLreturn(stats); } static void raise_failed_memfd_init(int errcode) { static const value* exn = NULL; if (!exn) exn = caml_named_value("failed_memfd_init"); caml_raise_with_arg(*exn, unix_error_of_code(errcode)); } #ifdef _WIN32 static HANDLE memfd; /************************************************************************** * We create an anonymous memory file, whose `handle` might be * inherited by subprocesses. * * This memory file is tagged "reserved" but not "committed". This * means that the memory space will be reserved in the virtual memory * table but the pages will not be bound to any physical memory * yet. Further calls to 'VirtualAlloc' will "commit" pages, meaning * they will be bound to physical memory. * * This is behavior that should reflect the 'MAP_NORESERVE' flag of * 'mmap' on Unix. But, on Unix, the "commit" is implicit. * * Committing the whole shared heap at once would require the same * amount of free space in memory (or in swap file). **************************************************************************/ static void memfd_init(size_t shared_mem_size) { memfd = CreateFileMapping( INVALID_HANDLE_VALUE, NULL, PAGE_READWRITE | SEC_RESERVE, shared_mem_size >> 32, shared_mem_size & ((1ll << 32) - 1), NULL); if (memfd == NULL) { win32_maperr(GetLastError()); raise_failed_memfd_init(errno); } if (!SetHandleInformation(memfd, HANDLE_FLAG_INHERIT, HANDLE_FLAG_INHERIT)) { win32_maperr(GetLastError()); raise_failed_memfd_init(errno); } } #else static int memfd = -1; /************************************************************************** * The memdfd_init function creates a anonymous memory file that might * be inherited by `Daemon.spawned` processus (contrary to a simple * anonymous mmap). * * The preferred mechanism is memfd_create(2) (see the upper * description). Then we try shm_open(3). * * The resulting file descriptor should be mmaped with the memfd_map * function (see below). ****************************************************************************/ static void memfd_init(size_t shared_mem_size) { #if defined(MEMFD_CREATE) memfd = memfd_create("fb_heap", 0); #endif if (memfd < 0) { char memname[255]; snprintf(memname, sizeof(memname), "/fb_heap.%d", getpid()); // the ftruncate below will fail with errno EINVAL if you try to // ftruncate the same sharedmem fd more than once. We're seeing this in // some tests, which might imply that two flow processes with the same // pid are starting up. This shm_unlink should prevent that from // happening. Here's a stackoverflow about it // http://stackoverflow.com/questions/25502229/ftruncate-not-working-on-posix-shared-memory-in-mac-os-x shm_unlink(memname); memfd = shm_open(memname, O_CREAT | O_RDWR, 0666); if (memfd < 0) { raise_failed_memfd_init(errno); } // shm_open sets FD_CLOEXEC automatically. This is undesirable, because // we want this fd to be open for other processes, so that they can // reconnect to the shared memory. int flags = fcntl(memfd, F_GETFD); if (flags == -1) { raise_failed_memfd_init(errno); } // Unset close-on-exec if (fcntl(memfd, F_SETFD, flags & ~FD_CLOEXEC) == -1) { raise_failed_memfd_init(errno); }; } if (ftruncate(memfd, shared_mem_size) == -1) { raise_failed_memfd_init(errno); } } #endif #ifdef _WIN32 static char* memfd_map(size_t size) { char* mem = NULL; mem = MapViewOfFile(memfd, FILE_MAP_ALL_ACCESS, 0, 0, size); if (mem == NULL) { win32_maperr(GetLastError()); uerror("MapViewOfFile", Nothing); } return mem; } #else static char* memfd_map(size_t size) { char* mem = NULL; /* MAP_NORESERVE is because we want a lot more virtual memory than what * we are actually going to use. */ int flags = MAP_SHARED | MAP_NORESERVE; int prot = PROT_READ | PROT_WRITE; mem = (char*)mmap(NULL, size, prot, flags, memfd, 0); if (mem == MAP_FAILED) { printf("Error initializing: %s\n", strerror(errno)); exit(2); } return mem; } #endif /**************************************************************************** * The function memfd_reserve force allocation of (mem -> mem+sz) in * the shared heap. This is mandatory on Windows. This is optional on * Linux but it allows to have explicit "Out of memory" error * messages. Otherwise, the kernel might terminate the process with * `SIGBUS`. ****************************************************************************/ static void raise_out_of_shared_memory(void) { static const value* exn = NULL; if (!exn) exn = caml_named_value("out_of_shared_memory"); caml_raise_constant(*exn); } #ifdef _WIN32 /* On Linux, memfd_reserve is only used to reserve memory that is mmap'd to the * memfd file. On Windows, this is required. */ static void memfd_reserve(char* base, char* mem, size_t sz) { (void)base; if (!VirtualAlloc(mem, sz, MEM_COMMIT, PAGE_READWRITE)) { win32_maperr(GetLastError()); raise_out_of_shared_memory(); } } #elif defined(__APPLE__) /* So OSX lacks fallocate, but in general you can do * fcntl(fd, F_PREALLOCATE, &store) * however it doesn't seem to work for a shm_open fd, so this function is * currently a no-op. This means that our OOM handling for OSX is a little * weaker than the other OS's */ static void memfd_reserve(char* base, char* mem, size_t sz) { (void)base; (void)mem; (void)sz; } #else static void memfd_reserve(char* base, char* mem, size_t sz) { off_t offset = (off_t)(mem - base); int err; do { err = posix_fallocate(memfd, offset, sz); } while (err == EINTR); if (err) { raise_out_of_shared_memory(); } } #endif static void map_info_page(int page_bsize) { // The first page of shared memory contains (1) size information describing // the layout of the rest of the shared file; (2) values which are atomically // updated by workers, like the heap pointer; and (3) various configuration // which is convenient to stick here, like the log level. assert(page_bsize >= sizeof(shmem_info_t)); info = (shmem_info_t*)memfd_map(page_bsize); } static void define_mappings(int page_bsize) { assert(info != NULL); size_t locals_bsize = info->locals_bsize; size_t mark_stack_max_bsize = MARK_STACK_MAX_SIZE * sizeof(mark_stack[0]); shared_mem = memfd_map(info->shared_mem_bsize); locals = (local_t*)(shared_mem + page_bsize); mark_stack = (addr_t*)(shared_mem + page_bsize + locals_bsize); hashtbl = (helt_t*)(shared_mem + page_bsize + locals_bsize + mark_stack_max_bsize); } static value alloc_heap_bigarray(void) { CAMLparam0(); CAMLlocal1(heap); int heap_flags = CAML_BA_CHAR | CAML_BA_C_LAYOUT | CAML_BA_EXTERNAL; intnat heap_dim[1] = {info->hashtbl_bsize + info->heap_bsize}; heap = caml_ba_alloc(heap_flags, 1, hashtbl, heap_dim); CAMLreturn(heap); } /*****************************************************************************/ /* Must be called by the master BEFORE forking the workers! */ /*****************************************************************************/ CAMLprim value hh_shared_init(value config_val, value num_workers_val) { CAMLparam2(config_val, num_workers_val); CAMLlocal1(result); int page_bsize = getpagesize(); /* Calculate layout information. We need to figure out how big the shared file * needs to be in order to create the file. We will also store enough of the * layout information in the first page of the shared file so that workers can * create mappings for the rest of the shared data. */ size_t num_workers = Long_val(num_workers_val); size_t locals_bsize = CACHE_ALIGN((1 + num_workers) * sizeof(local_t)); size_t hashtbl_slots = 1ul << Long_val(Field(config_val, 1)); size_t mark_stack_max_bsize = MARK_STACK_MAX_SIZE * sizeof(mark_stack[0]); size_t hashtbl_bsize = CACHE_ALIGN(hashtbl_slots * sizeof(helt_t)); size_t heap_bsize = Long_val(Field(config_val, 0)); /* The total size of the shared file must have space for the info page, local * data, the mark stack, the hash table, and the heap. */ size_t shared_mem_bsize = page_bsize + locals_bsize + mark_stack_max_bsize + hashtbl_bsize + heap_bsize; memfd_init(shared_mem_bsize); /* The info page contains (1) size information describing the layout of the * rest of the shared file; (2) values which are atomically updated by * workers, like the heap pointer; and (3) various configuration which is * conventient to stick here, like the log level. */ map_info_page(page_bsize); memfd_reserve((char*)info, (char*)info, page_bsize); info->locals_bsize = locals_bsize; info->hashtbl_bsize = hashtbl_bsize; info->heap_bsize = heap_bsize; info->shared_mem_bsize = shared_mem_bsize; info->hashtbl_slots = hashtbl_slots; info->heap_init = hashtbl_bsize; info->heap_max = info->heap_init + heap_bsize; info->gc_phase = Phase_idle; info->log_level = Long_val(Field(config_val, 2)); // Ensure the global counter starts on a COUNTER_RANGE boundary info->counter = ALIGN(early_counter + 1, COUNTER_RANGE); // Initialize top heap pointers info->heap = info->heap_init; // Invariant: info->heap_init <= info->gc_end <= info->heap // See declaration of gc_end info->gc_end = info->heap; define_mappings(page_bsize); // Reserve memory for locals, the initial mark stack, and hashtbl. // This is required on Windows. memfd_reserve(shared_mem, (char*)locals, locals_bsize); memfd_reserve( shared_mem, (char*)mark_stack, MARK_STACK_INIT_SIZE * sizeof(mark_stack[0])); memfd_reserve(shared_mem, (char*)hashtbl, hashtbl_bsize); #ifdef MADV_DONTDUMP // We are unlikely to get much useful information out of the shared heap in // a core file. Moreover, it can be HUGE, and the extensive work done dumping // it once for each CPU can mean that the user will reboot their machine // before the much more useful stack gets dumped! madvise(hashtbl, hashtbl_bsize + heap_bsize, MADV_DONTDUMP); #endif #ifndef _WIN32 // Uninstall ocaml's segfault handler. It's supposed to throw an exception on // stack overflow, but we don't actually handle that exception, so what // happens in practice is we terminate at toplevel with an unhandled exception // and a useless ocaml backtrace. A core dump is actually more useful. Sigh. struct sigaction sigact = {0}; sigact.sa_handler = SIG_DFL; sigemptyset(&sigact.sa_mask); sigact.sa_flags = 0; sigaction(SIGSEGV, &sigact, NULL); #endif result = caml_alloc_tuple(2); Store_field(result, 0, alloc_heap_bigarray()); Store_field(result, 1, Val_handle(memfd)); CAMLreturn(result); } /* Must be called by every worker before any operation is performed */ value hh_connect(value handle_val, value worker_id_val) { CAMLparam2(handle_val, worker_id_val); memfd = Handle_val(handle_val); worker_id = Long_val(worker_id_val); // Avoid confusion with master process, which is designated 0 assert(worker_id > 0); int page_bsize = getpagesize(); map_info_page(page_bsize); define_mappings(page_bsize); CAMLreturn(alloc_heap_bigarray()); } /*****************************************************************************/ /* Counter * * Provides a counter intended to be increasing over the lifetime of the program * including all forks. Uses a global variable until hh_shared_init is called, * so it's safe to use in the early init stages of the program (as long as you * fork after hh_shared_init of course). Wraps around at the maximum value of an * ocaml int, which is something like 30 or 62 bits on 32 and 64-bit * architectures respectively. */ /*****************************************************************************/ CAMLprim value hh_counter_next(value unit) { CAMLparam1(unit); CAMLlocal1(result); uintptr_t v = 0; if (info) { v = locals[worker_id].counter; if (v % COUNTER_RANGE == 0) { v = __atomic_fetch_add(&info->counter, COUNTER_RANGE, __ATOMIC_RELAXED); } ++v; locals[worker_id].counter = v; } else { v = ++early_counter; } result = Val_long(v % Max_long); // Wrap around. CAMLreturn(result); } /*****************************************************************************/ /* There are a bunch of operations that only the designated master thread is * allowed to do. This assert will fail if the current process is not the master * process */ /*****************************************************************************/ static void assert_master(void) { assert(worker_id == 0); } static void assert_not_master(void) { assert(worker_id != 0); } /*****************************************************************************/ CAMLprim value hh_stop_workers(value unit) { CAMLparam1(unit); assert_master(); info->workers_should_exit = 1; CAMLreturn(Val_unit); } CAMLprim value hh_resume_workers(value unit) { CAMLparam1(unit); assert_master(); info->workers_should_exit = 0; CAMLreturn(Val_unit); } CAMLprim value hh_set_can_worker_stop(value val) { CAMLparam1(val); worker_can_exit = Bool_val(val); CAMLreturn(Val_unit); } CAMLprim value hh_get_can_worker_stop(value unit) { CAMLparam1(unit); CAMLreturn(Val_bool(worker_can_exit)); } static void check_should_exit(void) { assert(info != NULL); if (worker_can_exit && info->workers_should_exit) { static const value* exn = NULL; if (!exn) exn = caml_named_value("worker_should_exit"); caml_raise_constant(*exn); } } CAMLprim value hh_check_should_exit(value unit) { CAMLparam1(unit); check_should_exit(); CAMLreturn(Val_unit); } /*****************************************************************************/ /* GC: Incremental Mark and Sweep * * Before compacting the heap, we must first find all live values. We can mark * all live values in the heap by starting with the root objects in the hash * table, then traversing the graph of all reachable objects from those roots. * * To avoid long pauses, we do this work incrementally. Between commands, we * perform "slices" of mark and sweep work. After a slice of work, we return * back to the server, which can either handle another request of perform * another slice. * * Because the program can modify the heap between slices of mark and sweep, we * need to be careful that all reachable objects are marked. We use a shapshot- * at-the-beginning approach, which ensures that all reachable objects at the * beginning of GC pass are marked. We also use an "allocate black" strategy, * meaning that any new objects allocated during a collection are considered * reachable. * * For snapshot-at-the-beginning, we use a Yuasa style deletion barrier. If a * field is modified during collection, the "old" reference is added to the mark * stack. The only modification that happens during a GC pass is hh_remove, * which is only called from the main server process, meaning we don't need to * store the mark stack in shared memory. * * The "allocate black" strategy is a bit non-standard. Because the shared heap * is a bump allocator, we don't actually use the black color for new * allocations. Instead, we record the location of the heap pointer at the * beginning of a collection. Any addresses below that address need to be * marked, while any addresses above that address are assumed to be live. */ /*****************************************************************************/ // Trigger the start of a new cycle (idle -> mark) CAMLprim value hh_start_cycle(value unit) { CAMLparam1(unit); assert(info->gc_phase == Phase_idle); info->gc_end = info->heap; roots_ptr = 0; sweep_ptr = info->heap_init; info->gc_phase = Phase_mark; CAMLreturn(Val_unit); } CAMLnoreturn_start static void mark_stack_overflow() CAMLnoreturn_end; static void mark_stack_overflow() { caml_failwith("mark_stack_resize: could not allocate space for mark stack"); } // Check if the mark stack needs to be resized // // The mark stack has an initial size of 4KiB. When we reach the end of the mark // stack, we double the size until we reach the maximum size of 256MiB. Notice // that the capacity of the mark stack is always a power of 2. // // The expression `x & (-x)` returns the least set bit in `x`. When this number // is equal to `x`, we know that `x` is a power of 2. // // Thus, when the mark stack pointer is a power of 2, we know that we are at // capacity and need to resize. We resize by doubling the capacity. // // Note that this operation is idempotent because `memfd_reserve` is idempotent. static void mark_stack_try_resize(uintnat mark_ptr) { if (mark_ptr > MARK_STACK_INIT_SIZE && ((mark_ptr & (-mark_ptr)) == mark_ptr)) { if (mark_ptr == MARK_STACK_MAX_SIZE) { mark_stack_overflow(); } // Double the size of the mark stack by reserving `mark_ptr` amount of space // starting at `mark_ptr`. memfd_reserve( shared_mem, (char*)&mark_stack[mark_ptr], mark_ptr * sizeof(mark_stack[0])); } } // When an address is overwritten during the mark phase, we add the old value to // the mark stack. This function can be called concurrently from workers when // they modify the heap. static void write_barrier(addr_t old) { if (old != NULL_ADDR && info->gc_phase == Phase_mark && old < info->gc_end) { hh_header_t hd = Deref(old); if (Is_white(hd)) { // Color the object black. Note that two workers might both enter this // branch for the same value. Both workers will color the object black and // both workers will add the value to the mark stack. // // This is okay, because marking is idempotent. Deref(old) = Black_hd(hd); // Add to mark stack. We need a CAS here instead of simply a fetch-add // because we need to know whether to resize the mark stack. // // We resize the mark stack at power-of-2 boundaries. Note that two // workers might observe the same power-of-2 value for mark_ptr, and both // try to resize. This is okay because `mark_stack_try_resize` is // idempotent. uintnat mark_ptr = __atomic_load_n(&info->mark_ptr, __ATOMIC_ACQUIRE); while (1) { mark_stack_try_resize(mark_ptr); if (__atomic_compare_exchange_n( &info->mark_ptr, &mark_ptr, mark_ptr + 1, 0, __ATOMIC_SEQ_CST, __ATOMIC_SEQ_CST)) { mark_stack[mark_ptr] = old; break; } } } } } // Add a reachable object to the mark stack. // // Objects allocated during marking will have an address greater than gc_end // and are treated as reachable. This is morally an "allocate black" scheme, // except we allocate white to avoid needing to sweep. Because we allocate // white and don't sweep these addresses, it's important that they are not // darkened. static inline void mark_slice_darken(field_t fld) { if ((fld & 1) == 0 && fld != NULL_ADDR && fld < info->gc_end) { hh_header_t hd = Deref(fld); if (Is_white(hd)) { Deref(fld) = Black_hd(hd); uintnat mark_ptr = info->mark_ptr; mark_stack_try_resize(mark_ptr); mark_stack[mark_ptr] = fld; info->mark_ptr = mark_ptr + 1; } } } // Entities have a committed value and potentially a "latest" value which is // being written by the current transaction. There are two cases: // // 1. entity_version < next_version // // The data at `entity_version & 1` is the committed value and is reachable. // The other slot is unreachable. // // 2. entity_version >= next_version // // The data at `entity_version & 1` is the latest value and is reachable. The // other slot is the committed and is also reachable. static void mark_entity(addr_t v, intnat next_version) { intnat entity_version = Deref(Obj_field(v, 2)); mark_slice_darken(Deref(Obj_field(v, entity_version & 1))); if (entity_version >= next_version) { mark_slice_darken(Deref(Obj_field(v, ~entity_version & 1))); } } // Perform a bounded amount of marking work, incrementally. During the marking // phase, this function is called repeatedly until marking is complete. Once // complete, this function will transition to the sweep phase. // // This function will mark at most `work` words before returning. This includes // the hash table and heap. CAMLprim value hh_mark_slice(value work_val) { CAMLparam1(work_val); assert(info->gc_phase == Phase_mark); // We are able to partially scan an object for pointers and resume scanning in // a subsequent slice. This is useful in the event of large objects which // would otherwise cause long pauses if we needed to scan them all at once. // // If we stop in the middle of an object, we will store the address of that // object and the index of the field where we should resume. Otherwise, these // values will be NULL_ADDR and 0 respectively. static addr_t current_value = NULL_ADDR; static uintnat current_index = 0; intnat work = Long_val(work_val); intnat hashtbl_slots = info->hashtbl_slots; intnat next_version = info->next_version; addr_t v; hh_header_t hd; hh_tag_t tag; uintnat i, size, start, end; // If the previous slice stopped in the middle of scanning an object, the // first thing we do in this slice is resume scanning where we left off. v = current_value; start = current_index; // Work through the mark stack, scanning all gray objects for pointers. // Because roots are colored gray but not added to the mark stack, also walk // the heap to find marked roots. while (work > 0) { if (v == NULL_ADDR && info->mark_ptr > 0) { v = mark_stack[--info->mark_ptr]; work--; // header word } if (v != NULL_ADDR) { hd = Deref(v); tag = Obj_tag(hd); size = Obj_wosize_tag(hd, tag); if (tag == Entity_tag) { mark_entity(v, next_version); v = NULL_ADDR; start = 0; work -= size; } else if (should_scan(tag)) { // Avoid scanning large objects all at once end = start + work; if (size < end) { end = size; } work -= end - start; for (i = start; i < end; i++) { mark_slice_darken(Deref(Obj_field(v, i))); } if (end < size) { // We did not finish scanning this object. We will resume scanning // this object in the next slice. start = end; } else { v = NULL_ADDR; start = 0; } } else { v = NULL_ADDR; work -= size; } } else if (roots_ptr < hashtbl_slots) { // Visit roots in shared hash table mark_slice_darken(hashtbl[roots_ptr++].addr); work--; } else { // Done marking, transition to sweep phase. info->gc_phase = Phase_sweep; break; } } current_value = v; current_index = start; CAMLreturn(Val_long(work)); } // Perform a bounded amount of sweeping work, incrementally. During the sweeping // phase, this function is called repeatedly until sweeping is complete. Once // complete, this function will transition to the idle phase. CAMLprim value hh_sweep_slice(value work_val) { CAMLparam1(work_val); assert(info->gc_phase == Phase_sweep); intnat work = Long_val(work_val); while (work > 0) { if (sweep_ptr < info->gc_end) { uintnat hd = Deref(sweep_ptr); uintnat whsize = Obj_whsize(hd); uintnat bhsize = Bsize_wsize(whsize); switch (Color_hd(hd)) { case Color_white: Deref(sweep_ptr) = Blue_hd(hd); info->free_bsize += bhsize; break; case Color_black: Deref(sweep_ptr) = White_hd(hd); break; case Color_blue: break; } sweep_ptr += bhsize; work -= whsize; } else { // Done sweeping info->gc_phase = Phase_idle; break; } } CAMLreturn(Val_long(work)); } /*****************************************************************************/ /* GC: Compact * * We collect the shared heap by compacting: moving live values "to the left" * until there is no more free space. We can then continue to bump allocate from * the end. * * The compaction algorithm is a Jonkers collector which performs the compaction * "in place" without allocating additional memory to maintain state. * * The algorithm is published, unfortunately, behind a costly subscription. * https://doi.org/10.1016/0020-0190(79)90103-0 * * Happily, an excellent description of the algorithm can be found in a freely * accessible paper by Benedikt Meurer, along with an extension for interior * pointers which is unused here: * https://benediktmeurer.de/files/fast-garbage-compaction-with-interior-pointers.pdf * * This particular algorithm has some nice properties, namely: * - Heap objects can have varying size * - We can compact the heap in-place without auxiliary storage * - The compacted heap preserves order, keeping related objects close together * - Is actually pretty simple, in the sense that it has few moving pieces, * although pointer reversal can take a moment to "click" * * However, there are also downsides to this choice: * - Is fully stop-the-world and non-incremental * - Pointer reversal techniques are not cache-friendly, and generally slow * compared to both contemporary and modern techniques * * Happily, the bursty nature of the type checker means that there are long (in * human scale) periods of down time between requests, so a long pause is not a * problem as long as it is well timed. * * For future work, it might be worthwhile to explore more incremental GC * strategies, which could spread the work over more small pauses instead. */ /*****************************************************************************/ // Threading is the fundamental operation of the GC. Moving objects potentially // invalidates every address in the heap. Threading makes it possible to update // those addresses without requiring extra storage. // // In a single step, threading replaces a pointer to a value with the value // itself. Where the value was, we insert a pointer to original pointer. This // swap is more easily understood when visualized: // // P Q // +---+ +---+ // | * |-->| X | // +---+ +---+ // // becomes // // P Q // +---+ +---+ // | X |<--| * | // +---+ +---+ // // Performing this single step repeatedly has the effect of replacing multiple // pointers to a given value with a linked list (or "thread") of pointers to the // value. For example: // // P Q R // +---+ +---+ +---+ // | * | | * |-->| X | // +---+ +---+ +---+ // | ^ // +-------------+ // // becomes (in two steps) // // P Q R // +---+ +---+ +---+ // | X |<--| * |<--| * | // +---+ +---+ +---+ static void gc_thread(addr_t p) { field_t q = Deref(p); if ((q & 1) == 0 && q != NULL_ADDR) { Deref(p) = Deref(q); Deref(q) = p; } } // See comment above `mark_entity` static void gc_scan_entity(addr_t v, intnat next_version) { intnat entity_version = Deref(Obj_field(v, 2)); gc_thread(Obj_field(v, entity_version & 1)); if (entity_version >= next_version) { gc_thread(Obj_field(v, ~entity_version & 1)); } } // As we walk the heap, we must be sure to thread every pointer to live data, as // any live object may be relocated. static void gc_scan(addr_t v, intnat next_version) { hh_header_t hd = Deref(v); hh_tag_t tag = Obj_tag(hd); if (tag == Entity_tag) { gc_scan_entity(v, next_version); } else if (should_scan(tag)) { for (int i = 0; i < Obj_wosize_tag(hd, tag); i++) { gc_thread(Obj_field(v, i)); } } } // With the heap threaded, we can now relocate "R" to a different known address // by "unthreading," or following the linked list of pointers until we reach the // original value X. Each word in the thread is replaced with the new address // and the original value is copied back into place. static void gc_update(addr_t src, addr_t dst) { uintnat p = Deref(src); while (Is_addr(p)) { uintnat q = Deref(p); Deref(p) = dst; p = q; } Deref(src) = p; } // Compacting the heap proceeds in three phases: // 1. Thread the root set // 2. Walk heap, update forward pointers // 3. Walk heap, update backward pointers and move objects CAMLprim value hh_compact(value unit) { CAMLparam1(unit); assert_master(); assert(info->gc_phase == Phase_idle); intnat hashtbl_slots = info->hashtbl_slots; intnat next_version = info->next_version; // Step 1: Scan the root set, threading any pointers to the heap. The // threading performed during this step will be unthreaded in the next step, // updating the hash table to point to the updated locations. for (intnat i = 0; i < hashtbl_slots; i++) { addr_t hashtbl_addr = Addr_of_ptr(&hashtbl[i].addr); gc_thread(hashtbl_addr); } // Step 2: Scan the heap object-by-object from bottom to top. The dst pointer // keeps track of where objects will move to, but we do not move anything // during this step. // // If we encounter an unmarked header, the object is unreachable, so do not // update the dst pointer. // // If we encounter an address, then this object was reachable via "forward" // reference, i.e., a pointer stored at a lower address. Because we know where // the object will move to (dst), we eagerly update the forward references and // copy the original header back. // // If we encounter a marked header, then the object is reachable only via // "backwards" reference. These backwards references will be handled in the // next step. // // NB: Instead of scanning the entire heap, it may be worthwhile to track the // min/max live addresses during the marking phase, and only scan that part. // Possible that the extra marking work would be more expensive than a linear // memory scan, but worth experimenting. // // NB: Also worth experimenting with explicit prefetching. addr_t src = info->heap_init; addr_t dst = info->heap_init; addr_t heap_ptr = info->heap; while (src < heap_ptr) { hh_header_t hd = Deref(src); intnat size; if (Is_blue(hd)) { size = Obj_bhsize(hd); } else { gc_update(src, dst); hd = Deref(src); size = Obj_bhsize(hd); gc_scan(src, next_version); dst += size; } src += size; } // Step 3: Scan the heap object-by-object again, actually moving objects this // time around. // // Unmarked headers still indicate unreachable data and is not moved. // // If we encounter an address, then the object was reachable via a "backwards" // reference from the previous step, and we fix up those references to point // to the new location and copy the original header back. // // Finally we can move the object. We unset the mark bit on the header so that // future collections can free the space if the object becomes unreachable. src = info->heap_init; dst = info->heap_init; while (src < heap_ptr) { hh_header_t hd = Deref(src); intnat size; if (Is_blue(hd)) { size = Obj_bhsize(hd); } else { gc_update(src, dst); hd = Deref(src); size = Obj_bhsize(hd); if (Obj_tag(hd) == Entity_tag) { // Move entities manually, resetting the entity version to 0 and writing // the previous entity data to the correct offset. If the entity version // is >= the next version, that means we're compacting after a canceled // recheck, so we must preserve the committed and latest data. intnat v = Deref(Obj_field(src, 2)); addr_t data0 = Deref(Obj_field(src, v & 1)); addr_t data1 = NULL_ADDR; if (v >= next_version) { data1 = Deref(Obj_field(src, ~v & 1)); v = 2; } else { v = 0; } Deref(dst) = hd; Deref(Obj_field(dst, 0)) = data0; Deref(Obj_field(dst, 1)) = data1; Deref(Obj_field(dst, 2)) = v; } else { memmove(Ptr_of_addr(dst), Ptr_of_addr(src), size); } dst += size; } src += size; } // TODO: Space between dst and info->heap is unused, but will almost certainly // become used again soon. Currently we will never decommit, which may cause // issues when there is memory pressure. // // If the kernel supports it, we might consider using madvise(MADV_FREE), // which allows the kernel to reclaim the memory lazily under pressure, but // would not force page faults under healthy operation. info->heap = dst; // Invariant: info->heap_init <= info->gc_end <= info->heap // See declaration of gc_end info->gc_end = dst; info->free_bsize = 0; // All live entities have been reset to version 0, so we can also reset the // global version counter. info->next_version = 2; CAMLreturn(Val_unit); } static void raise_heap_full(void) { static const value* exn = NULL; if (!exn) exn = caml_named_value("heap_full"); caml_raise_constant(*exn); } /*****************************************************************************/ /* Allocates a slot in the shared heap, given a size (in words). The caller is * responsible for initializing the allocated space with valid heap objects. */ /*****************************************************************************/ static addr_t hh_alloc(size_t wsize) { if (wsize == 0) return info->heap; size_t slot_size = Bsize_wsize(wsize); addr_t addr = __sync_fetch_and_add(&info->heap, slot_size); if (addr + slot_size > info->heap_max) { raise_heap_full(); } memfd_reserve(shared_mem, Ptr_of_addr(addr), slot_size); return addr; } CAMLprim value hh_ml_alloc(value wsize) { CAMLparam1(wsize); addr_t addr = hh_alloc(Long_val(wsize)); CAMLreturn(Val_long(addr)); } /*****************************************************************************/ /* Allocates an ocaml value in the shared heap. * Any ocaml value is valid, except closures. It returns the address of * the allocated chunk. */ /*****************************************************************************/ CAMLprim value hh_store_ocaml(value v, value tag_val) { CAMLparam1(v); CAMLlocal1(result); check_should_exit(); char *serialized, *compressed; intnat serialized_size; int compress_bound, compressed_size; caml_output_value_to_malloc( v, Val_int(0) /*flags*/, &serialized, &serialized_size); // Compress the serialized data. LZ4's maximum input size is ~2GB. If the // input is larger than that, LZ4_compressBound will return 0 and the // compression itself will do nothing. if (serialized_size > LZ4_MAX_INPUT_SIZE) { caml_invalid_argument("hh_store_ocaml: value larger than max input size"); } compress_bound = LZ4_compressBound(serialized_size); compressed = malloc(compress_bound); compressed_size = LZ4_compress_default( serialized, compressed, serialized_size, compress_bound); assert(compressed_size > 0); // Construct a header to describe the serialized and compressed data: // // A header is a single word where The low-order byte is reserved, meaning we // have 56 bits to store the serialized size and compressed size. Is it // enough? // // In the worst case, we try to compress uncompressible input of // LZ4_MAX_INPUT_SIZE, consuming the entire compress bound. That would be // 0x7E7E7E8E bytes compressed size. // // NOTE: The compressed size might actually be bigger than the serialized // size, in a worst case scenario where the input is not compressible. This // shouldn't happen in practice, but we account for it in the worse case. // // If we store the size in words instead of bytes, the max size is 0xFCFCFD2 // words, which fits in 2^28, so we can fit both sizes (in words) in 56 bits. // // All this is somewhat academic, since we have bigger problems if we're // trying to store 2 gig entries. // The compressed size is not necessarily word sized. To accommodate this, we // use a trick lifted from OCaml's own representation of strings, which also // have a header that stores the size in words. // // In the last byte of the block, we store a value which we can use to recover // the exact byte size of the string. If the string is exactly word sized, we // add another word to hold the final byte. size_t compressed_wsize = (compressed_size + WORD_SIZE) / WORD_SIZE; // Similarly, the serialized size might not necessarily be a multiple of the // word size. To decompress, we only need to provide a buffer that is large // enough, so we round up to the nearest word. size_t decompress_capacity = Wsize_bsize(WORD_ALIGN(serialized_size)); // Just in case the math above doesn't check out assert(compressed_size < 0x10000000); assert(decompress_capacity < 0x10000000); // Ensure tag fits in high 6 bits of low bytes int tag = Long_val(tag_val); assert(tag < 0x40); hh_header_t header = compressed_wsize << 36 | decompress_capacity << 8 | tag << 2 | Color_white; // Allocate space for the header and compressed data heap_entry_t* entry = Entry_of_addr(hh_alloc(1 + compressed_wsize)); // Write header and data into allocated space. entry->header = header; memcpy(&entry->data, compressed, compressed_size); // Write offset into final byte for byte size calculation // See entry_compressed_bsize for how this is used. size_t offset_index = Bsize_wsize(compressed_wsize) - 1; entry->data[offset_index] = offset_index - compressed_size; free(serialized); free(compressed); result = caml_alloc_tuple(3); Store_field(result, 0, Val_long(Addr_of_ptr(entry))); Store_field(result, 1, Val_long(compressed_size)); Store_field(result, 2, Val_long(serialized_size)); CAMLreturn(result); } // The final byte of a compressed heap entry contains an offset, which we can // use to convert the approximate size in words to the precise size in bytes. static size_t entry_compressed_bsize(heap_entry_t* entry) { size_t compressed_wsize = Entry_wsize(entry->header); size_t offset_index = Bsize_wsize(compressed_wsize) - 1; return offset_index - entry->data[offset_index]; } /*****************************************************************************/ /* Given an OCaml string, returns the 8 first bytes in an unsigned long. * The key is generated using MD5, but we only use the first 8 bytes because * it allows us to use atomic operations. */ /*****************************************************************************/ static uint64_t get_hash(value key) { return *((uint64_t*)String_val(key)); } static void raise_hash_table_full(void) { static const value* exn = NULL; if (!exn) exn = caml_named_value("hash_table_full"); caml_raise_constant(*exn); } /*****************************************************************************/ /* Adds a key value to the hashtable. This code is perf sensitive, please * check the perf before modifying. * * Returns the address associated with this key in the hash table, which may not * be the same as the address passed in by the caller. */ /*****************************************************************************/ CAMLprim value hh_add(value key, value addr) { CAMLparam2(key, addr); check_should_exit(); uint64_t elt_hash = get_hash(key); addr_t elt_addr = Long_val(addr); size_t hashtbl_slots = info->hashtbl_slots; size_t slot = elt_hash & (hashtbl_slots - 1); size_t init_slot = slot; while (1) { uint64_t old_hash = __atomic_load_n(&hashtbl[slot].hash, __ATOMIC_ACQUIRE); // If this slot looks free, try to take it. If we are racing with another // thread and lose, the CAS operation will write the current value of the // hash slot into `old_hash`. if (old_hash == 0 && __atomic_compare_exchange_n( &hashtbl[slot].hash, &old_hash, elt_hash, 0, /* strong */ __ATOMIC_SEQ_CST, __ATOMIC_SEQ_CST)) { __atomic_fetch_add(&info->hcounter, 1, __ATOMIC_RELAXED); old_hash = elt_hash; // Try to take the addr slot next } if (old_hash == elt_hash) { // Try to acquire the addr slot if needed. If the slot is already taken or // we lose a race to acquire it, we want to return the value of the addr // slot to the caller. addr_t old_addr = __atomic_load_n(&hashtbl[slot].addr, __ATOMIC_ACQUIRE); if (old_addr == NULL_ADDR && __atomic_compare_exchange_n( &hashtbl[slot].addr, &old_addr, elt_addr, 0, /* strong */ __ATOMIC_SEQ_CST, __ATOMIC_SEQ_CST)) { __atomic_fetch_add(&info->hcounter_filled, 1, __ATOMIC_RELAXED); } else { addr = Val_long(old_addr); } break; } slot = (slot + 1) & (hashtbl_slots - 1); if (slot == init_slot) { // We're never going to find a spot raise_hash_table_full(); } } CAMLreturn(addr); } /*****************************************************************************/ /* Finds the slot corresponding to the key in a hash table. The returned slot * is either free or points to the key. */ /*****************************************************************************/ static size_t find_slot(value key, helt_t* elt) { size_t hashtbl_slots = info->hashtbl_slots; uint64_t hash = get_hash(key); size_t slot = hash & (hashtbl_slots - 1); size_t init_slot = slot; while (1) { *elt = hashtbl[slot]; if (elt->hash == hash || elt->hash == 0) { return slot; } slot = (slot + 1) & (hashtbl_slots - 1); if (slot == init_slot) { raise_hash_table_full(); } } } /*****************************************************************************/ /* Returns true if the key is present. We need to check both the hash and * the address of the data. This is due to the fact that we remove by setting * the address slot to NULL (we never remove a hash from the table, outside * of garbage collection). */ /*****************************************************************************/ CAMLprim value hh_mem(value key) { CAMLparam1(key); check_should_exit(); helt_t elt; find_slot(key, &elt); CAMLreturn(Val_bool(elt.hash != 0 && elt.addr != NULL_ADDR)); } /*****************************************************************************/ /* Deserializes the value at the given address. */ /*****************************************************************************/ CAMLprim value hh_deserialize(value addr_val) { CAMLparam1(addr_val); CAMLlocal1(result); check_should_exit(); heap_entry_t* entry = Entry_of_addr(Long_val(addr_val)); size_t compressed_bsize = entry_compressed_bsize(entry); size_t decompress_capacity = Entry_decompress_capacity(entry->header); char* decompressed = malloc(decompress_capacity); size_t serialized_size = LZ4_decompress_safe( entry->data, decompressed, compressed_bsize, decompress_capacity); result = caml_input_value_from_block(decompressed, serialized_size); free(decompressed); CAMLreturn(result); } /*****************************************************************************/ /* Returns the address associated to a given key. */ /* The key MUST be present. */ /*****************************************************************************/ CAMLprim value hh_get(value key) { CAMLparam1(key); check_should_exit(); helt_t elt; find_slot(key, &elt); CAMLreturn(Val_long(elt.hash == 0 ? NULL_ADDR : elt.addr)); } /*****************************************************************************/ /* Returns the size of the value at the given address. */ /*****************************************************************************/ CAMLprim value hh_get_size(value addr_val) { CAMLparam1(addr_val); heap_entry_t* entry = Entry_of_addr(Long_val(addr_val)); size_t compressed_bsize = entry_compressed_bsize(entry); CAMLreturn(Val_long(compressed_bsize)); } /*****************************************************************************/ /* Removes a key from the hash table. * Only the master can perform this operation. */ /*****************************************************************************/ CAMLprim value hh_remove(value key) { CAMLparam1(key); assert_master(); helt_t elt; size_t slot = find_slot(key, &elt); if (elt.hash != 0 && elt.addr != NULL_ADDR) { // GC write barrier if (info->gc_phase == Phase_mark) { mark_slice_darken(elt.addr); } hashtbl[slot].addr = NULL_ADDR; info->hcounter_filled -= 1; } CAMLreturn(Val_unit); } /*****************************************************************************/ /* Blits an OCaml string representation into the shared heap. * * Note that, like OCaml's heap, the shared heap is word-addressible. Like * OCaml's strings, strings in the shared heap are encoded with a header * containing the size in words, where the last byte of the last word contains * an offset used to calculate the exact bytes size. */ /*****************************************************************************/ CAMLprim value hh_write_string(value addr, value s) { memcpy(Ptr_of_addr(Long_val(addr)), String_val(s), Bosize_val(s)); return Val_unit; } /*****************************************************************************/ /* Blits bytes into the shared heap. * * Unlike `hh_write_string` above, which writes the entire string representation * into shared memory, this function takes `pos`, an offset from the beginning * of the byte array, and `len`, the number of bytes to write starting at `pos`. * * Callers is responsible for ensuring the heap space is allocated and for * bounds checking the buffer, offset, and length. */ /*****************************************************************************/ CAMLprim value hh_write_bytes(value addr, value buf, value pos, value len) { memcpy( Ptr_of_addr(Long_val(addr)), Bytes_val(buf) + Long_val(pos), Long_val(len)); return Val_unit; } /*****************************************************************************/ /* Reads a string in the shared heap into a the OCaml heap. * * Because we store string data in the shared heap in the same format as OCaml * does for it's own heap, we can simply blit the data directly into the OCaml * heap, instead of using the designated caml_alloc_string function. */ /*****************************************************************************/ CAMLprim value hh_read_string(value addr, value wsize) { CAMLparam2(addr, wsize); CAMLlocal1(s); s = caml_alloc(Long_val(wsize), String_tag); memcpy( (char*)String_val(s), Ptr_of_addr(Long_val(addr)), Bsize_wsize(Long_val(wsize))); CAMLreturn(s); } static size_t hh_string_len(addr_t addr, char** ptr) { *ptr = Ptr_of_addr(Obj_field(addr, 0)); size_t tmp = Obj_bosize(Deref(addr)) - 1; return tmp - (*ptr)[tmp]; } CAMLprim value hh_compare_string(value addr1_val, value addr2_val) { if (addr1_val == addr2_val) return Val_int(0); char *ptr1, *ptr2; size_t len1 = hh_string_len(Long_val(addr1_val), &ptr1); size_t len2 = hh_string_len(Long_val(addr2_val), &ptr2); int res = memcmp(ptr1, ptr2, len1 <= len2 ? len1 : len2); return Val_int(res ? res : len1 - len2); } CAMLprim value hh_entity_advance(value entity_val, value data_val) { CAMLparam2(entity_val, data_val); addr_t entity = Long_val(entity_val); addr_t data = Long_val(data_val); intnat next_version = info->next_version; intnat entity_version_fld = Obj_field(entity, 2); intnat entity_version = Deref(entity_version_fld); intnat slot = entity_version & 1; if (entity_version < next_version) { // By updating the version, we are doing a kind of deferred logical deletion // of the committed data. Once we commit this transaction, the data in // `slot` will no longer be reachable. write_barrier(Deref(Obj_field(entity, slot))); slot = 1 - slot; Deref(entity_version_fld) = next_version | slot; } Deref(Obj_field(entity, slot)) = data; CAMLreturn(Val_unit); } CAMLprim value hh_load_acquire(value addr_val) { int64_t* ptr = (int64_t*)Ptr_of_addr(Long_val(addr_val)); return __atomic_load_n(ptr, __ATOMIC_ACQUIRE); } CAMLprim value hh_store_release(value addr_val, int64_t v) { int64_t* ptr = (int64_t*)Ptr_of_addr(Long_val(addr_val)); __atomic_store_n(ptr, v, __ATOMIC_RELEASE); return Val_unit; } CAMLprim value hh_compare_exchange( value weak_val, value addr_val, int64_t expected, int64_t desired) { int64_t* ptr = (int64_t*)Ptr_of_addr(Long_val(addr_val)); return Val_bool(__atomic_compare_exchange_n( ptr, &expected, desired, Bool_val(weak_val), __ATOMIC_SEQ_CST, __ATOMIC_SEQ_CST)); } CAMLprim value hh_compare_modify_addr( value weak_val, value addr_val, value expected_val, int64_t desired) { CAMLparam3(weak_val, addr_val, expected_val); int64_t* ptr = (int64_t*)Ptr_of_addr(Long_val(addr_val)); int64_t expected = Long_val(expected_val); int success = __atomic_compare_exchange_n( ptr, &expected, desired, Bool_val(weak_val), __ATOMIC_SEQ_CST, __ATOMIC_SEQ_CST); if (success) { write_barrier(expected); } CAMLreturn(Val_bool(success)); } CAMLprim value hh_load_acquire_byte(value addr_val) { return caml_copy_int64(hh_load_acquire(addr_val)); } CAMLprim value hh_store_release_byte(value addr_val, value v) { return hh_store_release(addr_val, Int64_val(v)); } CAMLprim value hh_compare_exchange_byte( value weak_val, value addr_val, value expected_val, value desired_val) { return hh_compare_exchange( weak_val, addr_val, Int64_val(expected_val), Int64_val(desired_val)); } CAMLprim value hh_compare_modify_addr_byte( value weak_val, value addr_val, value expected_val, value desired_val) { return hh_compare_modify_addr( weak_val, addr_val, expected_val, Int64_val(desired_val)); }
{ "redpajama_set_name": "RedPajamaGithub" }
9,677
[ 128000, 271, 23381, 3356, 1075, 2958, 32175, 287, 279, 6222, 5044, 1887, 369, 36082, 627, 1235, 353, 10245, 14083, 27785, 32904, 50, 4874, 96223, 11, 8871, 40330, 50969, 21170, 362, 95460, 7520, 52893, 198, 353, 36848, 2607, 3578, 4716, 32967, 32202, 25, 8871, 3507, 4276, 4999, 353, 11155, 2564, 15334, 468, 43272, 12890, 1753, 5257, 85729, 11155, 30, 11155, 12515, 353, 62207, 3507, 5782, 11155, 0, 45373, 23923, 15334, 95253, 10009, 3083, 21592, 63456, 4999, 1235, 353, 578, 5409, 12862, 828, 14726, 11798, 1618, 1193, 990, 1606, 315, 1268, 279, 198, 353, 36082, 35530, 527, 22183, 627, 1235, 353, 578, 83210, 14370, 925, 7039, 311, 925, 2819, 13, 320, 791, 9246, 527, 2216, 198, 353, 34016, 611, 33096, 4841, 44713, 315, 32967, 9655, 14726, 6266, 5422, 22695, 198 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 271, 23381, 3356, 1075, 2958, 32175, 287, 279, 6222, 5044, 1887, 369, 36082, 627, 1235, 353, 10245, 14083, 27785, 32904, 50, 4874, 96223, 11, 8871, 40330, 50969, 21170, 362, 95460, 7520, 52893, 198, 353, 36848, 2607, 3578, 4716, 32967, 32202, 25, 8871, 3507, 4276, 4999, 353, 11155, 2564, 15334, 468, 43272, 12890, 1753, 5257, 85729, 11155, 30, 11155, 12515, 353, 62207, 3507, 5782, 11155, 0, 45373, 23923, 15334, 95253, 10009, 3083, 21592, 63456, 4999, 1235, 353, 578, 5409, 12862, 828, 14726, 11798, 1618, 1193, 990, 1606, 315, 1268, 279, 198, 353, 36082, 35530, 527, 22183, 627, 1235, 353, 578, 83210, 14370, 925, 7039, 311, 925, 2819, 13, 320, 791, 9246, 527, 2216, 198, 353, 34016, 611, 33096, 4841, 44713, 315, 32967, 9655, 14726, 6266, 5422, 22695, 198, -100 ]
<!-- TOC generated with https://github.com/ekalinin/github-markdown-toc : gh-md-toc --insert --no-backup --hide-footer contrib/debugging-cpp.md --> <!--ts--> * [Debugging C++](#debugging-c) * [Quick start](#quick-start) * [Setup](#setup) * [Debugging Realm Unit Tests through Example](#debugging-realm-unit-tests-through-example) * [Details on debugging C++](#details-on-debugging-c) * [Visual Studio Code configurations](#visual-studio-code-configurations) * [Configuration: LLDB Debug Unit Tests](#configuration-lldb-debug-unit-tests) * [Configuration: LLDB Debug Integration Tests](#configuration-lldb-debug-integration-tests) * [Configuration: LLDB Node REPL](#configuration-lldb-node-repl) * [Configuration: LLDB Attach to Process](#configuration-lldb-attach-to-process) * [Working with lldb in VS Code](#working-with-lldb-in-vs-code) * [Breaking on exceptions](#breaking-on-exceptions) * [Inspecting/interacting with variables when paused](#inspectinginteracting-with-variables-when-paused) * [Advanced features](#advanced-features) * [Using a debug version of Node](#using-a-debug-version-of-node) * [Compiling a debug version of Node](#compiling-a-debug-version-of-node) * [Using a debug version of Node](#using-a-debug-version-of-node-1) * [Debugging Realm C++ in an iOS app using Xcode](#debugging-realm-c-in-an-ios-app-using-xcode) * [Debugging Realm C++ in an Android app using Android Studio](#debugging-realm-c-in-an-android-app-using-android-studio) * [Other C++ debugging tricks](#other-c-debugging-tricks) * [Inspecting the type of an auto variable](#inspecting-the-type-of-an-auto-variable) * [Using Instruments to profile Node code](#using-instruments-to-profile-node-code) <!--te--> # Quick start ## Setup First make sure your environment is setup by following the [building instructions](./building.md) Then you will need the following plugins for VSCode: * [C/C++ by Microsoft](https://github.com/Microsoft/vscode-cpptools) * [CodeLLDB](https://github.com/vadimcn/vscode-lldb) ## Debugging Realm Unit Tests through Example First lets take a look at `.vscode/launch.json`. This contains various ways to launch commands from vscode. For this example we will look at the command `LLDB Debug Unit Tests`. ```json { "type": "lldb", "request": "launch", "name": "LLDB Debug Unit Tests", "program": "node", "args": [ "--expose_gc", "${workspaceFolder}/tests/node_modules/jasmine/bin/jasmine.js", "spec/unit_tests.js", "--filter=${input:testFilter}" ], "cwd": "${workspaceFolder}/tests", "preLaunchTask": "Build Node Tests" } ``` A quick read through this code shows that the launch type is `lldb` provided by the CodeLLDB extension, and it is using the `node` command to invoke the `jasmine` test framework with our `spec/unit_tests.js`. The `${input:testFilter}` will prompt us for a string to use as filter to avoid running all tests every time. The `preLaunchTask` will compile Realm JS in debug mode before starting the debug session. When prompted for a filter, try using "testListPush" as the input. As we are fairly certain this will perform a `push` command on a realm list, we can place a breakpoint in the push function in `src/js_list.hpp` by locating the push function and clicking next to the desired line number (see example below) ![Breakpoint in Code](./assets/pushBreakpoint.png) Now we can run the test and see what happens. Click on the debug tab in the left bar of vscode: ![Debug Icon](./assets/debugIcon.png) Select the `LLDB Launch Unit Tests` from the run tab: ![Debug Run Tab](./assets/debugRunTab.png) Now press play, type "testListPush" as filter and hit <kbd>Enter</kbd> ![Enter test filter](./assets/debug-enter-test-filter.png) We should now arrive at our new breakpoint. ![Met Breakpoint](./assets/metBreakpoint.png) To run all tests, simply leave the filter at the default (`.`). # Details on debugging C++ ## Visual Studio Code configurations Visual Studio Code with the [CodeLLDB](https://marketplace.visualstudio.com/items?itemName=vadimcn.vscode-lldb) extension provides a good experience for debugging C++ code using the `lldb` debugger. The [launch.json](https://github.com/realm/realm-js/blob/master/.vscode/launch.json) file contains various useful debugger launch configurations which attach `lldb` to the `node` process so that breakpoints can be set and exceptions can be caught. These profiles can be seected from the list in the top right of the "Run and Debug" pane in VS Code. All the launch configurations are configured to [compile Realm JS in debug mode](https://github.com/realm/realm-js/blob/master/.vscode/launch.json#L98) before starting the debug session, so you do not need to remember to compile between sessions. ### Configuration: LLDB Debug Unit Tests This configuration will run the [unit tests](https://github.com/realm/realm-js/tree/master/tests) with `lldb` attached. By default, it will ask for the filter for the run each time you invoke it. If you are debugging a specific test, it can save time if you temporarily hardcode the filter: https://github.com/realm/realm-js/blob/master/.vscode/launch.json#L88. ### Configuration: LLDB Debug Integration Tests This configuration will run the [integration tests](https://github.com/realm/realm-js/tree/master/tests) with `lldb` attached. By default, it will ask for the grep pattern for the run each time you invoke it. If you are debugging a specific test, it can save time if you temporarily hardcode the filter: https://github.com/realm/realm-js/blob/master/.vscode/launch.json#L117. A pre-requisite for running these tests is to start the [https://github.com/realm/realm-js/blob/master/packages/realm-app-importer](`realm-app-importer`) script in a terminal, by running: `npx lerna bootstrap --scope @realm/integration-tests --include-dependencies && cd integration-tests/tests && npm run app-importer` – this is usually started automatically when you run the tests, but as we need to connect `lldb` directly to the `node` instance that is running the tests, you need to start it manually. ### Configuration: LLDB Node REPL This configuration starts a `node` REPL with the debugger attached. This allows you to easily evaluate statements and jump into the C++ debugger. If you are running the same commands over and over, you may want to save these to a temporary `.js` file and add this file's path to the `args` in https://github.com/realm/realm-js/blob/master/.vscode/launch.json#L98, so that `node` runs this script instead of a REPL. ### Configuration: LLDB Attach to Process This configuration will attach `lldb` to a running process. This can be useful for debugging Electron applications, for example, in which case you might want to connect the debugger to the `main.js` process. When this configuration is run, it will open a process picker. You should be able to identify the correct process by searching for a known string in the application name, though it might require some trial and error! ## Working with lldb in VS Code ### Breaking on exceptions It can be helpful to tick the `C++: on throw` and/or `C++: on catch` default breakpoints, in order to catch exceptions. ### Inspecting/interacting with variables when paused It is sometimes possible to get useful information on variables via the "Variables" panel in the debug pane, but sometimes it is not that helpful (e.g. with NAPI objects which just show as a memory address), or you might want to call methods on an instance rather than just inspect it. The `lldb` `p` command can be used in the "Debug Console" pane (to the right of the terminal) to do this when you are paused at a breakpoint – you can inspect/interact with anything in the scope of the current breakpoint, for example `p my_array.size()` or `p napi_object.Type()`. Note that this might not always work, e.g. sometimes it can crash when trying to inspect certain properties, in which case a useful technique is to add a line of code storing the value you are interested in temporarily so that you can inspect it in the variables window, e.g. `auto temp_type = napi_object.Type();`. ### Advanced features There are many useful advanced `lldb` features, for example: - you can add a breakpoint whenever a named method is called, even if you can't locate it in the source, with `br s -M method_name`, e.g. `br s -M ~realm::js::MyClass` to break whenever `realm::js::MyClass`'s destructor is called - you can print the memory address of a variable with `expr --raw -- &variable_name`, which can be useful when trying to work out if you are accidentally working with a copy of an object - you can make it break whenever a certain variable is read or modified, by right clicking on it in the Variables pane and clicking "Break on Value Read/Change/Access". The [`lldb` documentation](https://lldb.llvm.org/) and the [`CodeLLDB` documentation](https://github.com/vadimcn/vscode-lldb/blob/master/MANUAL.md) are useful resources. ## Using a debug version of Node It can sometimes be useful to use a debug version of Node. This allows you to view the source code of Node and v8 when inspecting stack traces, rather than the assembly code, and can also yield more useful stack traces when debugging deep C++ integration issues. ### Compiling a debug version of Node 1. Download the source code from https://nodejs.org/en/download/ 2. Unzip the source code to wherever you want to keep the debug version of Node (note that the debug symbol paths get hardcoded, so you need to recompile if you move it around after compilation) 3. From the root of the Node source directory, run `./configure --debug -C` – this configures the build in debug mode, and `-C` outputs `compile_commands.json` so that you can get better debug information in VS Code. 4. Run `make -j32` to compile Node. `-j32` specifies the number of jobs to run in parallel – it seems that 2x the number of threads (which is 2x the number of cores) is recommended. You can play around with different values – 32 seems to saturate the CPU of a Macbook Pro 16" (which has 8 cores = 16 threads), while still leaving it usable, and compiles in under half an hour. ### Using a debug version of Node To use a debug version of Node, change the path to `node` for the `lldb` launch configuration you are using to point to the debug version you compiled above, e.g. change https://github.com/realm/realm-js/blob/master/.vscode/launch.json#L103 to `"program": "/Users/my_name/dev/node-v16.13.2/out/Debug/node"`. You should now get full source code in stack traces. You can also open the Node source directory in VS Code and use the launch config from https://joyeecheung.github.io/blog/2018/12/31/tips-and-tricks-node-core/ (which has some other useful tips) if you wish to go deeper into the Node source code. ## Debugging Realm C++ in an iOS app using Xcode To debug Realm C++ in an iOS app using Xcode: 1. Ensure you are using a debug version of the Realm `xcframework` (`./scripts/build-ios.sh -c Debug simulator`) 2. In your Xcode project, go to `File` > `Add files to <project name>` and select your `realm-js/src` directory (it must be the same directory you used to build the `xcframework` as the paths are absolute). Ensure "Copy items" is not ticked, and "Create folder references" is selected, then press `Add`. 3. Repeat step 2, for your `realm-js/vendor/realm-core/src` directory. 4. Build and run the app in debug mode. You should now be able to navigate to Realm C++ source files and add breakpoints by navigating to the source files in the Project navigator. ## Debugging Realm C++ in an Android app using Android Studio To debug Realm C++ in an Android app using Android Studio (the integration test is already set up to do this so you shouldn't need to do it for that): 1. Ensure you are using a debug version of the Realm `.so` (`node scripts/build-android.js --arch=x86 --build-type=Debug`) 2. Prevent Gradle from stripping debug symbols from Realm by adding to your `app/build.gradle` in the `android.buildTypes.debug` section: ``` // Do not strip debug symbols from the Realm library packagingOptions { jniLibs.keepDebugSymbols += "**/librealm.so" } ``` 3. Add the source paths for Realm to the project by adding the paths (which can be relative to the `build.gradle` file) to your `app/build.gradle` in the `android` section: ``` // Add the Realm source files to the Android Studio project so that we can add breakpoints // in debug mode. These will not be compiled, it will still use the .so library. sourceSets { main.java.srcDirs += '<path to realm-js/src>' main.java.srcDirs += '<path to realm-js/vendor/realm-core/src>' } ``` 4. In Android Studio, go to `Run` > `Edit Configurations...` and in the `Debugger` tab, select a `Debug type` of `Native Only` 5. In the same window, add a `LLDB Startup Command` entry of `process handle --pass true --stop false --notify true SIGUSR1`. This prevents it from breaking on signals used internally in React Native. 6. Build and run the app in debug mode. You should now be able to navigate to Realm C++ source files and add breakpoints by navigating to the "Project Files" view (using the "Project" dropdown in the top left file browser). ### Debugging Realm C++ in an Android app using lldb You can also start `lldb-server` on the Android emulator and connect to it directly from another client (e.g. `lldb` or the VS Code LLDB plugin). You need to be using a rooted emulator (i.e. one of the images without Google Play). 1. Follow steps 1, 2 and 4 of the Android Studio debugging instructions (you do not have to leave it in "Native Only" debugging, but need to do this at least once so `lldb-server` is installed on the device) 2. Build and run the app in debug mode 3. Run `adb shell` to open a shell on the emulator 4. Run `su` to become root 5. Run `ps -A | grep com.yourapp`, replacing `com.yourapp` with your app's bundle ID, to get the PID (you can also see this in the Android Studio Debug tab) 5. Run `/data/data/com.yourapp/lldb/bin/lldb-server platform --server --listen "*:9123"`, replacing `com.yourapp` with your app's bundle ID (e.g. `com.realmreactnativetests`) This will start `lldb-server` running over TCP so you can connect to it. 6. In a separate local shell, run `adb forward tcp:9123 tcp:9123` to forward the `lldb-server` port to your local machine If you would like to make this happen on every startup, you can modify the script which Android Studio installs on to the device to always start `lldb-server` in TCP mode: 1. Open `/Applications/Android\ Studio.app/Contents/plugins/android-ndk/resources/lldb/android/start_lldb_server.sh` in a text editor 2. Modify the last line to e.g. `$BIN_DIR/lldb-server platform --server --listen "*:9123" & $BIN_DIR/lldb-server platform --server --listen $LISTENER_SCHEME://$DOMAINSOCKET_DIR/$PLATFORM_SOCKET --log-file "$PLATFORM_LOG_FILE" --log-channels "$LOG_CHANNELS" </dev/null >$LOG_DIR/platform-stdout.log 2>&1` #### Connecting with `lldb` To connect to the running server with `lldb`: 1. Run `lldb` 2. `platform select remote-android` 3. `platform connect connect://localhost:9123` 4. `attach PID`, replacing PID with your app's PID #### Connecting with VS Code 1. Open VS Code with the relevant source files (make sure you use the same directory which Realm JS was compiled in) 2. Run the [LLDB Attach to Android Emulator] debug launch config 3. Enter the app's PID at the prompt ## Other C++ debugging tricks ### Inspecting the type of an `auto` variable Sometimes it can be non-obvious what type an `auto` variable has. The debugger can potentially help you here, by adding a breakpoint then inspecting the type in the Variables pane, but an alternative approach is to use the following template trick (from https://stackoverflow.com/a/38820784/17700221): 1. Add `template<typename T> struct TD;` somewhere at the top level of a header file before the code you are looking at (probably in the `.hpp` file you are working with, just above the method in question, for Realm JS) 2. Add `TD<decltype(variable_name)> td;` after the variable (`variable_name`) who's type you want to inspect. 3. Now when you compile, you will get an error like `error: implicit instantiation of undefined template 'realm::js::TD<const realm::ObjectSchema &>'` – the type parameter of `TD` is the type of the variable in question, in this case `const realm::ObjectSchema &`. ### Using Instruments to profile Node code To run a Node script and capture a performance trace to analyse in Instruments, you can run it like: `xcrun xctrace record --template 'Time Profiler' --target-stdout - --launch -- ~/.nvm/versions/node/v16.13.2/bin/node index.js`. Using a debug version of Realm (e.g. compile Realm in debug mode, then `npm i ~/dev/realm-js` to install your local version into your Node project) may yield more useful information.
{ "redpajama_set_name": "RedPajamaGithub" }
5,371
[ 128000, 6499, 5257, 34, 8066, 449, 3788, 1129, 5316, 916, 14, 1247, 36207, 258, 72220, 30004, 2996, 2442, 511, 551, 37224, 4533, 2442, 511, 1198, 4302, 1198, 2201, 15825, 455, 1198, 8727, 19556, 6044, 68579, 3252, 1824, 604, 22030, 16508, 6499, 2641, 10197, 9, 510, 8098, 3252, 356, 1044, 9725, 2, 8514, 3252, 1824, 340, 9, 510, 25310, 1212, 9725, 2, 28863, 19471, 340, 256, 353, 510, 22574, 9725, 2, 15543, 340, 256, 353, 510, 8098, 3252, 42206, 8113, 20756, 1555, 13688, 9725, 2, 8514, 3252, 5621, 7828, 61675, 82194, 43847, 44530, 340, 9, 510, 7955, 389, 28803, 356, 1044, 9725, 2, 15216, 10539, 72151, 3252, 1824, 340, 256, 353, 510, 9789, 19074, 6247, 33483, 9725, 2, 30318, 5594, 3310, 26327, 26187, 22166, 340, 415, 353, 510, 7843 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 6499, 5257, 34, 8066, 449, 3788, 1129, 5316, 916, 14, 1247, 36207, 258, 72220, 30004, 2996, 2442, 511, 551, 37224, 4533, 2442, 511, 1198, 4302, 1198, 2201, 15825, 455, 1198, 8727, 19556, 6044, 68579, 3252, 1824, 604, 22030, 16508, 6499, 2641, 10197, 9, 510, 8098, 3252, 356, 1044, 9725, 2, 8514, 3252, 1824, 340, 9, 510, 25310, 1212, 9725, 2, 28863, 19471, 340, 256, 353, 510, 22574, 9725, 2, 15543, 340, 256, 353, 510, 8098, 3252, 42206, 8113, 20756, 1555, 13688, 9725, 2, 8514, 3252, 5621, 7828, 61675, 82194, 43847, 44530, 340, 9, 510, 7955, 389, 28803, 356, 1044, 9725, 2, 15216, 10539, 72151, 3252, 1824, 340, 256, 353, 510, 9789, 19074, 6247, 33483, 9725, 2, 30318, 5594, 3310, 26327, 26187, 22166, 340, 415, 353, 510, 7843, -100 ]
This Committee run pre school is based in a large well equipped hall and meets on Tuesdays, Wednesdays and Thursdays. Sessions can be booked to suit from full days to 1/2 day sessions. The preschool was rated Good in its latest inspection. The experienced staff are well qualified and work closely with individual and small groups of children. They plan activities in all areas of the curriculum which are matched to children's needs and interests. Often these are based around a theme which will be supported by resources, visits and visitors. More details on our Sessions page. Find out what we have to offer on our Facilities & Equipment page and see what Ofsted and others have had to say about us on the Testimonials page. If you would like to come and visit or book a free session please contact us – we look forward to hearing from you. You are all a wonderful team who shine with passion for childcare – thank you all.
{ "redpajama_set_name": "RedPajamaC4" }
5,963
[ 128000, 2028, 10554, 1629, 864, 2978, 374, 3196, 304, 264, 3544, 1664, 19167, 14321, 323, 20628, 389, 83783, 14097, 11, 6658, 4978, 14097, 323, 83785, 14097, 13, 31900, 649, 387, 34070, 311, 7937, 505, 2539, 2919, 311, 220, 16, 14, 17, 1938, 16079, 13, 578, 61905, 574, 22359, 7839, 304, 1202, 5652, 26767, 627, 791, 10534, 5687, 527, 1664, 15337, 323, 990, 15499, 449, 3927, 323, 2678, 5315, 315, 2911, 13, 2435, 3197, 7640, 304, 682, 5789, 315, 279, 30676, 902, 527, 18545, 311, 2911, 596, 3966, 323, 12034, 13, 36016, 1521, 527, 3196, 2212, 264, 7057, 902, 690, 387, 7396, 555, 5070, 11, 21728, 323, 15613, 627, 7816, 3649, 389, 1057, 31900, 2199, 13, 7531, 704, 1148, 584, 617, 311, 3085, 389, 1057, 66389, 612, 20849, 2199 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 2028, 10554, 1629, 864, 2978, 374, 3196, 304, 264, 3544, 1664, 19167, 14321, 323, 20628, 389, 83783, 14097, 11, 6658, 4978, 14097, 323, 83785, 14097, 13, 31900, 649, 387, 34070, 311, 7937, 505, 2539, 2919, 311, 220, 16, 14, 17, 1938, 16079, 13, 578, 61905, 574, 22359, 7839, 304, 1202, 5652, 26767, 627, 791, 10534, 5687, 527, 1664, 15337, 323, 990, 15499, 449, 3927, 323, 2678, 5315, 315, 2911, 13, 2435, 3197, 7640, 304, 682, 5789, 315, 279, 30676, 902, 527, 18545, 311, 2911, 596, 3966, 323, 12034, 13, 36016, 1521, 527, 3196, 2212, 264, 7057, 902, 690, 387, 7396, 555, 5070, 11, 21728, 323, 15613, 627, 7816, 3649, 389, 1057, 31900, 2199, 13, 7531, 704, 1148, 584, 617, 311, 3085, 389, 1057, 66389, 612, 20849, 2199, -100 ]
Dr. Robert Waite/Washington: "this terrible European war". The United States, the American Public and the Outbreak of War in 1914 (A speech at the international colloquium on 06/11/2014 concerning the beginning of the First World War 100 years ago) On August 1, 1914, the German ambassador to Czarist Russia delivered the declaration of war to his Russian counterpart, setting in motion the conflict that quickly spread from a squabble in the Balkans to a European wide war of annihilation.1 Throughout the first months of the conflict the American public followed the rapidly developing events closely through its major sources of information, newspapers and magazines. "Our interest in the European struggle has its broadest basis in the fact that we are a nation of European immigrants," an editor of The Literary Digest wrote in the August 15th issue as he explained the extensive press coverage.2 With this deep-seated interest, the big-city newspapers had already stationed correspondents throughout Europe and the articles they submitted to their home papers were picked up and reprinted in small towns across the nation. Reporters for the Associated Press, United Press, Reuters, and the International News Service based in Europe sent back accounts daily and these too were transmitted to newspapers across the nation. Each day, many of the newspapers in the smaller, regional markets carried up to several articles on the growing diplomatic crisis and the outbreak of war. The editors shared the mounting and widespread concern, plus news of war sold newspapers. Albany, New York's newspaper the Times-Union, a daily that served the Capital District, a cluster of several medium sized cities in upstate New York, ran front-page stories on the war throughout the summer of 1914, even a regular article entitled simply "The War News For Busy Readers."It termed the conflict "appalling and disastrous" in an August 4th editorial.3 The articles and reports from Europe were crucial in shaping views across America on the war. In the summer and fall of 1914 the American public relied on newspapers for their information on events beyond their own community. The daily press as well as a number of magazines, most weeklies, fed the widespread interest for news. The media had considerable influence over public opinion, for these publications not only provided the news, but also molded how its readers viewed the events of the world. In 1914 there were no public opinion polls to sample and gauge sentiment, however. The response of the American public, its commercial and political leaders to "this terrible European war," "the most devastating war in European history," can, therefore, best be assessed by a broad survey of the news media, namely a closer look at those vehicles that did so much to shape public views and opinions, the newspapers and magazines.4 During the first months of the conflict the belligerents waged a vigorous publicity campaign in the United States targeting the press, the public and political leaders. The European powers strived to sway public opinion and to gain at least the tacit support of this major economic and political power which was closely linked with Europe economically but which chose to remain distant with its diplomatic connections.5 Belgium sent an official commission to present its case before President Wilson. The French president called the White House and asserted that German troops had used the dreaded and banned dum-dum bullets. Kaiser Wilhelm sent a personal dispatch to Washington defending the conduct of his troops and their actions at Louvaine. German academics and German-Americans were especially active in this concerted effort to sway American public opinion.6 The German chancellor issued a statement that he addressed directly to the American people. The president of the Reichstag and the leaders of other influential organizations released a pamphlet entitled "The Truth About Germany." The German government distributed across America a pamphlet entitled "How the Franco German Conflict Could Have Been Avoided" which included a host of diplomatic cables and other relevant documents.7 How did the American public, its business and political leaders, react to the outbreak of war in Europe in August 1914 and to the efforts of the belligerents to influence their views on the war? Can one speak of a consensus in public sentiment?8 Did attitudes and opinions shift in the first months of the conflict? Did the American media place the responsibility, the blame for launching a European wide war, on any one particular nation? Other questions need also to be addressed. How can public opinion be measured and gauged? What did the leading figures in commerce and trade see as the war's impact on the United States? Was there a broad consensusamong members of Congress? And lastly, how did President Wilson, the head of state who did so much to lead public opinion, respond during the early phase of the war as fighting engulfed much of Europe, and did his responses have an impact on the nation's reactions to the war? When war broke out in Europe and spread rapidly across the continent the American public had already long been following the diplomatic crises that had done much to pave the way for a major conflagration. The frequent reports in the leading newspapers of New York, Chicago, and Los Angeles, for example, were reprinted often in the small, regional press, thereby reaching a much larger audience throughout America. Most of the media initially presented the system of European diplomatic relations as inherently unstable and troublesome, and therefore largely responsible for war. The weekly and monthly magazines carried thoughtful analyses. Among these journals some were decidedly pacifist, while others envisioned an active role for America in European affairs. Much of the discussion in the press reflected the editor's view of America's role in the world and how the conflict affected American national security. The outbreak of warin Europe also sparked a vigorous debate about militarism, power politics, preparedness, and national security in the United States, issues reflected in the press coverage.9 During the several yearsleading up to the outbreak of war, the American press hadoften published accounts of political and diplomatic developments in Europe and the mounting threats to peace. The magazine Living Age saw already in November 1912 the growing importance of "the demands of Austria-Hungary," but concluded then:"The dangers of the European situation are still in the future. There is now happily little doubt that the war will be localized," if a war were to break out.10 In the January 1913 issue of The Atlantic Monthly the distinguished scholar Guglielmo Ferrero published a long article on "The Dangers of War in Europe." Ferrero saw the major threats coming from "a long peace, the inexperience of the masses, a literature which falsely exalts the heroic in war and exaggerates its influence among the populace," all of which contributed to a broad sentiment favoring war as a means to settle territorial disputes and satisfy national ambitions.11 On the range of American sentiment toward the European powers, James Davenport Whelpley, a prominent journalist, offered an overview in his 1914 book entitled American Public Opinion in which he dealt with most European nations and a variety of issues. An original study and one of the few attempts to measure public sentiment, Whelpley's bookdescribed the sentiment toward England as "amicable and understanding" in 1914. He, nevertheless, devoted a full chapter to the often uneasy relationship between the US and Great Britain. In contrast, he wrote that the "relations between Germany and the United States are excellent and always have been."Whelpley went on to survey the public's views of other European and Asian nations. Nowhere did he see hints of an impending crisis nor widespread alarm among the American public.12 During the months leading up to the outbreak of war in 1914 the coverage of affairs in Europe intensified in the media, in the newspapers and magazines that most Americans read and turned to. The situation is "charged with the most menacing possibilities and the most potent danger," observed the magazine The Living Age in March 1914 as it surveyed the growing international tensions in the Balkans, the tense relations between Germany and Turkey, and the mounting military prowess of Russia. "Germany certainly believes that it is exposed to sudden attack, and such a belief is apt to increase the anxiety in which it originated." 13 A month later, the April issue of The Literary Digest described at length the recent increases in the size of the Russian army, its improved weaponry, and the massing of troops on its western border earlier that month. "And against what country if not Germany are thesepreparations being made," it asked. The article quoted German, French, and British newspapers heavily and their views of the current situation.14 In late July 1914, with tensions mounting, the American public, as well as its political leaders, were simply uncertain what would happen next in Europe. To be sure, newspapers throughout the nation closely followed the unfolding diplomatic crisis. Many journalists were hopeful that a conflict crisis could be averted but no one ventured to predict what would come. "Negotiations may prevent clash of arms," read a headline in the San Francisco Chronicle. "Final moves made for peace in Europe." Another headline announced "Financiers Serve Notice On Powers There Will Be No Money to Carry on General War."15 As the threat of war came closer, most continental nations curbed over-sea's telegram traffic so America's media had only official statements and public announcements to provide its readers with information. Reporters, seeking any information, turned to tourists returning from Europe and eagerly published their observations, however inadequate or narrow the perspective.16 The mood in the press began to darken. "Horror is one salient emotion aroused in Americans by the spectacle of Mars stalking across Europe, if editorial opinion in this country is a fair reflection," wrote an editor of The Outlook in an August 15th survey of the media. He quoted a number of newspapers from across the nation, each voicing mounting anguish and bewilderment caused by the events in Europe. "A feeling of depression, of sadness, almost of bitterness, must possess every thinking person as Europe flames into war," penned a reporter for the New York Sun newspaper.17 Once war broke out, widely circulated and influential periodicals voiced their deep despair over the events in Europe. "Forecasts as to what may happen, now that all Europe has decided to halt the progress of civilization by going in for wholesale murder on a more terrible scale than the world has witnessed, would be utterly futile," cautioned The Nation, a view that reflected the cables from American diplomats in Europe.18 "All Europe is in the swiftest and most desperate war in history," telegrammed the U.S. ambassador from London.19 Most Americans were in all likelihood surprised by the outbreak of war, and the press which had followed closely the escalation of events did little to clarify the situation. "Reports of Ultimatum by Kaiser Offset Peace Hope," read an August 1st headline on the front page of the New York Times. That same day, the Atlantic Constitution ran on its front page an article entitled "Assurances From Germany Give Hope of Compromise," as the media struggled to stay abreast of the rapidly unfolding developments in Europe.20 As soon as the fighting started, the media jumped in to keep Americans informed. The Washington Post and the New York Times each began a regular series entitled "How the War Rages" and "Summary of War News" which carried abbreviated dispatches from reporters in the various theaters of war. Regional newspapers, such as Albany, New York's Times-Union, ran a front page column entitled "The War News for Busy Readers." Initial reports described the gains made by Germany's armed forces. Newspapers carried thorough accounts of the bloody battles the troops were engaged in.21 Monthly journals, such as Current Opinion, offered in-depth analysis. Its September edition ran a long article headlined "The Greatest War of History Breaks Over Europe." An editor in The Atlantic Monthly wrote: "The sudden transformation of Europe from a peaceful continent to a great battle field is something that so bewilders American public opinion that denunciations of a war so 'senseless,' so 'insane,' so 'utterly without cause,' have been heard on every hand."22 Even local newspapers voiced the despair. "Particularly appalling and disastrous as must be a war of such proportions," commented an editor for the Times-Union newspaper in the August 4th issue as he described the conflict in Europe.23 The press and the public struggled to make sense out of these events, of the rapidly escalating combat that the armed forces of the European powers were engaged in. "To Americans, far from the tramp of armies and safe from the aggression of covetous neighbors, such militant enthusiasm, such driving force of tradition and patriotism, is literally incomprehensible," explained Roland Usher, a historian at St. Louis' Washington University, in The Atlantic Monthly. Usher, a critic of German policies, had already in a 1913 study of Pan-Germanism concluded that Germany's ambitions beyond its borders dominated and shaped European diplomatic relations. "The Germans aim at nothing less than the domination of Europe and of the world by the Germanic race," he wrote in the first paragraph of the book. "The vital factor in the modern international situation is the aggression of Germany, her determination to expand her territories, to increase her power and wealth."24 During August and September reports from correspondents in Europe confirmed the worst fears; the nature and extent of the conflict and the fighting wasunprecedented. "The magnitude of the forces involved staggers the imagination; besides them the armies of the Napoleonic era fade into significance," noted a journalist. The impact of the sheer numbers of the troops in arms, the resources mobilized to support them will, wrote an editor in The Nation, "in every country…enormously increase those economic factors which have so much to do with the outcome of any prolonged struggle." In a frank assessment of the belligerents' military strength, he concluded simply: these forces make "inevitable the greatest battles the world has yet seen."25 The American media--the daily newspapers and the weekly/monthly magazines-- followed the events in Europe closely as the local conflict spread rapidly across the continent, a chain reaction of events set in motion by Austria's ultimatum.26 Most did recognize the complexity of the situation, the intricacies of the diplomatic system that had developed in the late 19th century. "The war on Servia [sic]…supplied the spark which set in motion those irresistible forces which are dragging five of the greatest nations in the world into a war of annihilation," commented a reporter for the New York Herald newspaper. Herbert Templin, the European manager of the International News Service concurred. "It had been smoldering for years, seeking an opportunity to break out, and it was bound to occur," he wrote.27 Closely following the declarations of war and the initial battles between the newly mobilized armed forces, the belligerents launched another campaign, one to gain the favor of the American public and their political leaders. They madeconcerted efforts to influence this powerful and neutral nation as they strived to get the United States to take their side or at least remain fully uninvolved. The German Reich was especially active.28 This eagerness on the part of Germany to show the American public how it conducted the war as well as the rightness of its decision to declare war in the first place was but an element of a broader effort to court public opinion. The American media, the newspapers and the weekly/monthly magazines that did much to shape public opinion were not persuaded. Already in mid-August, The Outlook magazine published an article entitled "The German Point of View of the War" which stated simply that Germany had "no friends or well-wishers" in Europe or America. Its author wrote that if the hostile feelings long shown Germany by France, Russia, and England, had been reported in the American press, "the American public might not have been so surprised at the rapid development of events in the last few days; it would understand that the Germans did not think it safe to wait until the Czar had finished his mobilization, and that the German people, including the Socialists, are ready to risk their all in what they consider their supreme struggle for existence." Albany, New York's Times-Union newspaper ran a headline "Berlin Is Gone War Mad." And one of its reporters wrote that "Patriotic mobs filled the streets during the night, shouting for war with both Russia and France." An estimated "fifty thousand men and women" rallied in front of the Kaiser's palace and "cheered repeatedly for Emperor William and the German empire." The Kaiser appeared at the window and addressed the crowd with "a ringing appeal to the patriotic sentiment of the throng."29 Influential magazines commented on the outcry over the media coverage of Germany's role in precipitating war and the conduct of its troops during the first weeks of the fighting. In its August 22, 1914, issue, the widely read The Literary Digest responded to what it termed "bitter protests" from German newspapers, German societies and prominent German-Americans over the alleged "unfair treatment," the "anti-German editorials," and the "abysmal ignorance concerning German conditions."30 The editors pulled together a selection of the comments from critics of the press coverage, in particularly the influential weeklies such as The Outlook, The Independent, and Harper's Weekly. While many editorial writers made a distinction between the German people, whom they generally applauded, and the German government, which they held largely responsible for the war, most responses from Germany rejected the effort to distinguish between the people and the rulers. The Literary Digest's editor quoted from a number of different sources, from dozens of newspapers, particularly letters to the editor published in prominent newspapers, as well as official pronouncements from German spokesmen. These pro-German responses, he concluded, had a broad unanimity among them – the war was forced upon Germany and the military conflict was an epic fight between "the Slavic world and the German world."31 The New York Times put a satirical spin on this view. "As we understand the theory of the holy war, the Kaiser had a divine mission to rescue England, France and Belgium from the impending menace of Slav domination. They were pig-headed about it and refused to be rescued. So, with a heavy heart, the Kaiser was compelled to thrash them in order to save them."32 Magazines and newspapers across the nation received "by every mail," an editor of The Nation wrote in mid-October 1914, "masses of printed matter, specially marked, and prepared and intended to convince us of the correctness of Germany's position, and of the cruel injustices that has been done her by the failure of American public opinion to support her cause."33 The press was not the only recipient of materials from Germany which attempted to shape American attitudes. Teachers of German in schools throughout the country were "bombarded" with letters and materials from individuals and societies in Germany, reams of information justifying their war stand. These were, The Nation reported in mid-October, sent to "every ascertainable address" in America. These materials identified what they termed "misrepresentations" and presented "their holy cause," and often they came from one of the newly established "______ Society for the Spreading Abroad the Truth about Germany" which sprang up in many German cities and targeted communities in the United States. In addition, German newspapers published special issues that were handed to Americans leaving Berlin during the first weeks of the war "with the request that each copy be preserved and sent to an American newspaper." What an editor of The Nation termed "a misleading pamphlet" entitled "The Truth About Germany. Facts About the War" was distributed widely by mail and even offered at newsstands in New York City. There, a newspaper published it in full. Early in the text which ran to 86 pages it was asserted: "We are soldiers, because we have to be soldiers, because otherwise Germany and German civilization would be swept away from the face of the earth." The pamphlet included chapters on such topics as "How the War Came About," "The Attitude of Germany's Enemies," and "Lies About Germany." It concluded: "To know that we have American friendship in this struggle will mean a great deal moral support for us in the coming trying days, for we know that the country of George Washington and Abraham Lincoln places itself on the side of a just cause and one worth of humanity's blessing," as it attempted to rally support by the plea to America's most revered leaders.34 The editor of New York City's German language newspaper the Staats-Zeitung, Hermann Ridder, added his voice to those contesting German responsibility for the outbreak of war. "The assertion that German wanted war [is] ridiculous and absurd," he wrote.35 Other pro-German actions included a "war rally" at New York City's Terrace Garden in late September and it drew more than 10,000 to speeches and music. A Congressman who attended and addressed the audience criticized the press for what he termed its "unneutrality."36 Newspapers and journals ran letters to the editor from German scholars and diplomats who vigorously defended their nation's position. They urged Americans to view the justness of Germany's actions in the war.37 What a magazine editor termed "the deluge of pro-German literature" persisted because, he wrote, of the widely held belief "that the German side is not getting a hearing in the American press," that this nation's links to England and its willingness to accept what a German professor termed "the infamous lies of the British press."38 One of the strongest pro-German voices came from the prominent psychologist Hugo Müstenberg. Born in Germany and based at Harvard University since the 1890s, Müstenberg was tireless in his defense of Germany's actions. Already in 1914 he published a book, The War and America, which he dedicated"To All Lovers of Fair Play," clearly implying that those with an open mind about the conflict would gain much from reading his text. Distressed by the extent of anti-German sentiment, Müstenberg wrote that he was troubled "because it deprives one of the ideal faith which has filled my heart for years, the faith in the fairness of the American people."39 Müstenbenberg devoted a full chapter to what he termed "The Anti-German Sentiment," and throughout the book he remains an ardent defender. "The war was forced on Germany," he asserted. It was "absolutely clear that the war was started by Russia and France and that Germany was in no way responsible," he wrote, as he vigorously refuted the widely held view of German responsibility. Sitting in his office in Boston, Müstenberg was clearly taken by the impact of the war on his homeland. There he saw a "new inner unity of the nation, and one thing above all, the tremendous increase of the monarchial conviction," a sentiment that certainly did not move the American public which historically had been deeply suspicious of kingly rule. He added that the American press had failed to "grasp the true historic meaning of the war and its inner consequences." Furthermore, Münsterberg commented, "only one great historic fact stands out, that the German nation and the Emperor were never more one than since the hour when the war against Russian broke out."40 Within the American public such talk of monarchy and the one-ness of the nation with its hereditary ruler were outright repulsive. In fact, most Americans looked with deep suspicion upon the monarchial nations of Europe and held that form of government accountable for the diplomatic morass that had led to war. The widespread distribution of pro-German materials, the extensive coverage of Germany's perception of the events leading to the military confrontation seemed to have little impact on American public opinion which from the outbreak of war was decidedly pro-British. As an editor of The Nation explained in mid-October, "The judgment of this country was based upon a calm consideration of the facts leading up to the war, and upon the invasion of Belgium as set forth by the Germans themselves. American good opinion was forfeited when the Kaiser rejected Sir Edward Grey's two distinct offers to assure peace, when the 'scrap of paper' incident occurred, and the Chancellor admitted the flagrant violation of the law of nations."41 In the court of American public opinion the decision went clearly against Germany, against an autocratic state, and against its aggressive leadership. This sentiment marked the decided rejection of the archaic system of international relations that had placed so much emphasis on the balance of power which, it was now widely believed, had in fact fueled international tensions.42 How well informed was the American public on the complex issues surrounding the outbreak of war in August 1914 and the spread of the military conflict across Europe? During these fateful months, from August through October, the major newspapers, those in New York City, Chicago, Los Angeles, and Boston, published articles almost daily from their correspondents based in Europe who had received regular briefings from government representatives or who had less formal but nevertheless meaningful contact with policy makers. Newspapers in the small cities and towns reprinted many of these articles or relied on the news services, the United Press for example, and they too carried daily accounts that reached across the nation. Leading magazines published in-depth and lengthy articles.43 The intensive press coverage led an editor with the magazine The Living Age to assert in early November 1914 that "no people in the world are getting more information about the war than Americans," as he argued strongly in support of the soundness of the judgment of the American people and for the balanced and even handed coverage of the war in the media. "Public opinion in any country is a matter of delicate adjustment" and the repeated efforts of the belligerent nations to shape sentiment were bound to fail, he asserted. Not only did the European powers fail to weigh fully "the forces and counter-forces at work in a different nation than their own," but such efforts "may turn the scales in an undesirable direction." The journalist found already "signs that the strenuous efforts being made on all sides to prejudice this neutral people have excited a certain amount of amusement." Furthermore, "to join in what threatens to become a scramble for American goodwill promises more harm than good." He concluded simply: "Undue effort to influence public opinion" in America will certainly not have the desired effect.44 The consensus in the American media was clear – the public, well informed through press reports, stood behind Great Britain and its allies who "are fighting on behalf of the civilized world to destroy a false and brutal idea," wrote an editor for The Saturday Review in October 1914. "America is firmly united with Great Britain today in feeling that the Will to Power of a nation which has thrust honor and justice from the way of its ambition is a grave and instant menace to the whole world."45 Already in the first months of the war magazines and newspapers turned to established scholars of European affairs for their views on the war, on the question of responsibility for launching the conflict, as the media strived to offer its readers thoughtful analyses. The number of these accounts, though difficult to accurately measure, was large. Mostreflected the position of the editorial board of the respective publication.Dr. Charles W. Eliot, former president of Harvard University, was one such contributor. Eliot concluded that the causes of the conflict lay in "two old and widespread evils in Europe from which America has been exempt for at least 150 years. The first is secret diplomacy with power to make issues and determine events, and the second is autocratic executives who can swing the whole physical forces of the nation to this side or that without consulting the people or their representatives."46 Eliot's views were held by the editors of a number of prominent newspapers whoblamed the autocratic system and Europe's failed power-politics diplomacy for the war."The conclusions that remain fixed in the American mind are that the Kaiser had the power to stop the war and filed to do so; that Austria-Hungary was recklessly severe in her attitude toward Servia [sic] because Germany had promised to buck her up; and that the violation of Belgium's neutrality was an indefensible proceeding that cannot be explained away or justified," wrote the editor of Current Opinion as he summed up the widely held belief that Germany bore much responsibility for the outbreak of war.47 The historian Roland Usher concurred and placed the immediate responsibility for the outbreak of war upon Austria. Its ultimatums, he wrote in The Atlantic Monthly, the "language in which they were couched, the circumstances of their presentation, and of the receipt of the reply, render it improbable that Austria wished to force upon Servia [sic] the solution by war of an infinitely larger issue than that raised by the murder of the unfortunate Archduke and his wife."48 For Austria, "the war is literally a war of self-preservation," crucial to ruler's aim to hold together its vast and diverse population, Usher explained. Austria expected "great results" from these efforts and firmly believed these policies would "knit the various peoples together and give them a common object to strive for and a common victory to celebrate." The conflict served other purposes. "It is none the less a war of ambition and aggression," wrote Usher in August 1914, a means of guaranteeing Austria's century long dream of "dominating southeastern Europe," of ruling the Balkans.49 Austria's ambitions were, Usher asserted, well known "to every diplomat in Europe," especially those states "whose interests would be much injured by the annihilation of Servia [sic]." Nonetheless, "the fears of general European war" would cause other nations on the continent to pause and to be slow to interfere, he added. The "domestic difficulties" of England, France, and Russia, Usher argued, would prevent each from acting decisively.50 While a number of the scholars quoted in the press placed much of the blame on Austria, "many an editorial finger points at William II of Germany, as he is admitted to be the one overshadowing personality of the opening days of the war."51 As an editor with the New York Globe newspaper commented, "It is difficult to admit that German interests were menaced beyond reasonable tolerance, that Austria took a stand against her dominative neighbor which was arbitrary in the extreme without full sanction of the Kaiser, or that there was any doubt in Wilhelmstrasse that Austria's attitude would compel Russia and France to intervene. It is for these reasons that American opinion is almost solidly arranged against Germany as the aggressor, ruthlessly plunging Europe into what looks like the bloodiest of wars to satisfy the overwhelming ambition of the Emperor."52 The editors of The Outlook were blunt in their conclusions: "History will hold the German Emperor responsible for the war in Europe." They summarized Germany's relationship to each of the belligerents, its role in prompting each along the road to war, thereby bolstering their argumentthat Germany's actions did much to launch the war.53 The American press almost universally laid the blame on Germany, the responsibility for war in August 1914 and its rapid expansion from a regional conflict to a European wide conflagration. The distinguished historian Bernadotte E. Schmitt, a professor at Cleveland's Western Reserve University, added his voice to those condemning Germany's actions. "Apart from our citizens of German birth or German descent, the public opinion of the United States seems to be decidedly against Germany in the struggle ushered in by her own declaration of war against Russia." His point of view, Schmitt added, was not motivated by a "love of the Russian colossus nor by a dislike of the German people." Rather, "as a nation we do protest against the doctrine of militarism as preached by and practiced by his Majesty William II."54 The Outlook magazine published a survey of the press in mid-August and found widespread agreement on the issue of responsibility for the horrible conflict. "Monarchial cliques, absolutists, and those in Germany in particular, are held responsible," it concluded and offered a number of examples.55 The German Reich had, however, its defenders. "The haste in which the powers of Europe have rushed to arms is exceeded only by the haste in which the anti-German press of America is seeking to place the blame for the commencement of hostilities," wrote Karl F. Geiser, a professor at Oberlin College in an August 11th letter to The Nation. In his missive, Geiser argued that The Nation in particular had "fixed the responsibility of the whole affair upon the German Kaiser." He presented a long argument in Germany's defense, as he attempted to refute that journal's editorial comments.56 Geiser remained one of a handful of vigorous defenders of Germany. He was joined by, among others, Herman Ridder, the editor of New York City's Staats-Zeitung.57 The American press, newspapers across the nation, in major cities and small towns, carriedhundreds of articles on the conflict during the first months of the war, covering every conceivable topic such as the sheer size of the armed forces involved, the novelty of the conflict, the unprecedented conditions, the brutality of the fighting, and the loss of life. Frequently, newspapers and magazines turned to experts on military affairs for their view points and opinions. There was among them one general point of agreement: "The resources of the world are not sufficient to maintain a conflict of such dimensions for a long period." It would not be a long war; most experts estimated that the conflict would last from one month to a year at the most. While only a few, however, anticipated the "decisive blow" within the next six months, almost no one expected it to be a protracted and bloody struggle, going on for several years, costing the lives of so many.58 The rivalries, the imperial ambitions, economic pressure, domestic strains, growing military strength, had long been present in Europe. There was keen interest in what precipitated war in 1914, as journalists and scholars sought to identify who was responsible for the bloodshed and destruction. They also covered the unfolding conflict, the combat on the western and eastern fronts. By the fall of 1914 America's views of the war in Europe had pretty much been shaped and determined, as the public read the daily accounts of the war and the debates on who was responsible for the terrible conflict. The American public was, an editor of The Living Agewrote in November 1914, well informed about the events on the battle field. "No people of the world are getting more information about the war than are the Americans," James Whelpley asserted. "Their press is uncensored, scores of correspondents in England, France, Germany, and elsewhere are laboring night and day to fill American publications with news; thousands of returning travelers from all parts of Europe are daily contributing their stories to eager pressmen; and of all nationalities the American alone has been accorded facilities in Germany, and with the German army to see and judge for himself as to the real situation so far as the conduct of the war devastated region is concerned."59 While the American media, the press and magazines, followed closely the unfolding of the war, offering their readers daily accounts of the fighting and also analyses of the conflict, many Americans felt securely distant, sheltered and protected by the vastness of the Atlantic Ocean. That offered a broad sense of relief as well as a feeling of security. As an editor of The Literary Digest commented in the August 8, 1914, issue, "Our isolated position and freedom from entangling alliances inspire our press with the cheering assurance that we are in no peril of being drawn into the European quarrel."60 An editor for New York's Sun newspaper added, the United States "will inevitably to some extent benefit from the waste and destruction abroad, but it has permanent cause of gratitude in its insulation from the worst."61 This attitude was reflected in editorial writings in newspapers and magazines across the nation. The media, namely the daily newspapers as well as financial publications, speculated on the economic impacts of the conflict on American trade, finance, manufactures and the agricultural sector. As one journalist observed, "the closing of our stock exchanges, the exportation of gold to Europe, the rise in wheat and corn, the failure of business firms, help to remind our editors that a war which involved all Europe could not but have its effects among us."62 A lengthy survey from mid-August of how the press viewed the potential economic impact of the war began: "The price the United States pays for the madness of warring Europe is the upset of our money market and the blockade of our commerce."63 The war had the potential, observers commented and often discussed at length, to have far reaching and lasting consequences for the economy of the United States. Trade with Europe was severely disrupted. Ports on the Atlantic seaboard halted operations as "The carrying ships of the world have been diverted into war activities and millions of tons of cotton, food stuffs and other articles destined for foreign markets must remain on the remain in storage while millions of tons of manufactured goods expected by merchants in this country from Europe must remain on the other side of the ocean," wrote Gilson Gardner, a prominent journalist.64 The war affected not only the major trade and merchant marine companies of New York, Boston, Philadelphia, and Baltimore, nor solely the financiers of Wall Street, Chicago and Pittsburgh, nor largely the manufacturer centers of the mid-West. The war impacted the farmers in the South who produced cotton that was sold abroad and the farmers of the Great Plains who grew corn and wheat for the world market. All were concerned with how the war in Europe would hit their bottom line. "We cannot get away from the hard fact that war is a destroyer," observed a reporter for the Wall Street Journal in early September. "In the present case it would not be so bad if only two of the great powers were engaged. With all fighting – a condition deemed unthinkable a few weeks ago – the effects are incalculable."65 A host of questions and uncertainties faced America's banking and commercial leaders as the financial markets were thrown into turmoil. The Dean of New York University's School of Commerce, Joseph French Johnson, wrote disheartedly: "The war has blocked the wheels of industry in every country on the globe. It has turned back the hands of the clock of our material or industrial civilization."66 Already in early August, however, a few observers anticipated economic gains for the nation. The President of New York's Investment Bankers Association saw a decided advantage for American trade because at the end of the war "it will be extremely difficult for European countries to finance their oversea trade." The surge in manufacturing after the war would favor American industry. "I believe that the future for this country is brighter today than it has ever been," he concluded.67 Financial institutions acted quickly to reassure the American market and to protect this nation's supply of gold.68 A number of newspapers urged the US government and American business to "take up the world's trade, which Europe has forsaken for the battlefront." New York's Sun newspaper saw in the conflict the opportunity to vastly expand this nation's merchant marine. Reports circulated that President Wilson had in mind a plan to bring much of the world's shipping under the American flag, to the gain of American business, by offering registration to ships of other nations. The President discussed this with leaders of Congress already on July 31stwho supported the idea and theyagreed to investigate it further. By sailing under the flag of a neutral power, the vessels could not be pressed into service by a belligerent nor seized as war booty.69 Another New York City newspaper termed the moment "a supreme opportunity for American manufacturers to gain world-wide markets." In spite of the military conflict crippling Europe, "the needs of the world must be supplied."70 New York's Journal of Commerce quoted an "authority" who asserted that the war "may mark the beginning of a new commercial and industrial era in the United States." The amount of the economic boost would depend only upon "the alacrity with which the American business man will seize the opportunity, and upon the wisdom with which the American legislator will face the situation."71 Joseph French Johnson, a prominent economist, summarized "the chief items of profit and loss to the American people" in a 1914 article. According to Johnson, the conflict would drain gold from the nation, thereby restricting credits. This would, however, give America's banks the opportunity to increase their prestige and connections in the world. The closure of the European market to American securities might permanently divert capital from this nation. Such would give American banks a greater opportunity to enter South American and Asian markets and to secure a larger percentage of this market. The war cut off raw materials, some essential to the manufacturing sector, and this would certainly affect profits. While the conflict interfered with this trade, the sale of foodstuffs and military supplies for high prices in the European markets would be a gain. "We know that Europe will come to us for our goods," voiced Henry Lee Higginson, a noted American businessman, in a letter to President Wilson. Other experts offered a variety of points of view.72 Termed by the New York Times "one of the most distinguished economists of the country," Johnson had mixed views on the war's impact. "A striking feature of the situation is the uneven influence of the war on American industries," he wrote. "We shall probably see, if the situation continues, certain industries and commercial organizations working at top speed and making enormous profits, while besides them will be the empty offices and deserted factories of other industries."73 Johnson foresaw significant gains for American agriculture, a major part of the economy. With the interruptions in shipping and the shift of vast amounts of manpower out of agriculture, American producers were well positioned to step forward, meet the heightened demand and reap, as a result, significant profits. Other sectors of the economy faced an uncertain future. The closure of the European market to American securities and the diversion of large amounts of foreign capital would adversely impact the financial centers, Johnson argued.He was especially concerned with the drain of gold from this country to Europe, a trend that began in 1913 which could lead to restriction on credit and inflation.74 Nations of Europe were in need of American products. Although the official neutrality of the United States restricted sales to the belligerents, export and sale of weapons to Great Britain continued; they were delivered through Canada. German Americans protested, but the Foreign Affairs Committee of the House of Representatives permitted sales by American manufacturers to any government, "provided they do not discriminate between belligerents." With the blockade of the Atlantic already in effect, that meant trade with Britain could continue.75 Agriculture products from the American heartland would be welcome abroad as the war shut down the trade routes of traditional suppliers. But, economists cautioned, breaking into new markets would not come easily.76 The efforts made by the government and private enterprise were rewarded, and in October the President reported that business conditions were improving across the nation, that orders for goods from abroad were rising, as the initial impact of the war had passed. To facilitate foreign trade, Wilson made the bold announcement that "the United States is prepared to protect to the utmost the rights of shippers of American exports when such goods are being transported in vessels flying neutral flags,"Arthur Henning, the Chicago Tribune's longtime Washington correspondent,reported.77 The State Department followed quickly with guidelines for exports to belligerents, and these two efforts went far in boosting trade. The measures were intended to reassure traders that the government, with all its power and authority, stood firmly behind their right to trade freely with belligerent nations, something they were initially reluctant to do. "The president's announcement on Monday and the state department's memorandum are regarded as constituting the biggest boost given American foreign trade since the outbreak of the war," observed Henning.78 The President's statement and State Department announcement on free trade clearly favored Great Britain and led to German protests. The economic dimensions of the war in Europe also impacted the domestic politics of the United States. President Wilson had early in 1914 predicted an industrial boom, which also meant electoral success for his party. The gains were interrupted by the outbreak of the conflict. Wilson was very concerned with the state of the American economy because "business revival meantime is vital to the chances of the democratic party in the next Presidential election," commented the Wall Street Journal.79 The war and its disruption of trade resulted in a drop in customs' revenue of more than $10.6 million dollars when compared to the previous year. President Wilson went before Congress on September 4th to request a massive tax increase to offset the loss of custom duties from trade with Europe. The President asked for emergency legislation to raise $100 million of additional revenue. "We ought not to borrow. We ought to resort to taxation," the President explained to Congress. "The occasion is not of our own making. We had no part it making it." The legislation, the emergency Internal Revenue Tax Bill, passed quickly.80 Wilson faced some tough economic issues, among them restive labor unions. In late July the President received notification that the Brotherhood of Locomotive Engineers and the Brotherhood of Locomotive Engineermen and Fireman had voted to strike. "All freight movement and much of the passenger services would be indefinitely suspended," wrote William Lea Chambers, a commissioner of the U.S. Board of Mediation. "The mining operations would stop at once, then the industries generally; all crop movements would suddenly cease." The impact on the economy would be disastrous.81 In early August the President acted and averted arailway strike on 98 western rail lines. Recognizing that the impact of a strike on trade and commerce would be far-reaching--these railroads served much of the western half of the nation, from Chicago to Los Angeles-- he met with negotiators and representatives of the railroad companies and organized labor.82 A month later, the President persuaded union coal miners in Colorado to agree to a three year truce and no-strike.83 In his efforts to keep labor calm, Wilson appealed strongly to their sense of patriotism and the need to rally behind America when Europe was at war. Along with calming disgruntled workers, the President moved quickly to reassure the American public that the administration would initiate immediate measures to guarantee the nation's continuing fiscal well-being. Already on July 31st, Wilson and his advisers adopted "peace measures" aimed to strengthen, the Chicago Daily Tribune wrote, the "financial conditions in the United States to withstand the effects of the liquidation in Europe and the tremendous demand for gold in the countries on the brink of war."84 The seven steps taken and announced by Wilson included losing the restrictions on the amounts of currency banks must hold in reserve, depositing gold held by the Treasury in banks, the organization of a new banking system to better regulate currency and gold flows to Europe, proposed legislation to permit the registry in the US of foreign trading vessels, as the President moved quickly to gain the cooperation of the financial industry. He called a special meeting in Washington for leading bankers who assembled on August 2nd. Secretary of the Treasury William Gibbs McAdoo addressed the group and called for "intelligent co-operation on the part of the government and the banks" to guide the nation through the financial crisis sparked by the outbreak of war.85 A day later Congress moved to stabilize the currency markets. By an overwhelming majority it passed a bill that made available to national banks "unlimited millions of currency." The distribution of funds began immediately.86 The President faced other issues pressuring the economy. Already in early August "the swift advance in the prices of food-stuff, with the European situation as the pretext, has brought to the first place in American discussion the question of government interference in the interest of the consumer,"reported the Christian Science Monitor.87 President Wilson directed the attorney general to investigate the rise in prices and to advise him on measures to combat this alarming trend. Congress followed the President's lead and called upon both the Department of Justice and the Secretary of Commerce to determine the causes for the rapid rise in prices when exports had come to a virtual standstill.88 In addition to trade, banking, labor, and price issues, the President faced a major dip in revenue due to the loss of customs fees, a shortfall estimated at more than $2million a week in early September.89 Wilson prepared to address Congress and to call for a sharp rise in taxes to cover the anticipated shortfall. While the federal government had sufficient revenue to cover expenses, an increase in taxes was, Wilson asserted, necessary to prevent a deficit. He recommended that Congress raise taxes on such commodities as beer, whisky, tobacco, railway and theater tickets, and even soft drinks. The President called upon federal agencies to reduce their expenses.90 "In common with the rest of the country, Washington waits with breathless interest news from the waring nations of Europe," wrote Charles S. Groves, a journalist with the Boston Globe newspaper in mid-September. "But one will have to look far to discover an outward sign of excitement." The various branches of government, including the White House, Congress, as well as the War, State and Treasury Departments "find new and important problems presented as a result of the conflict on the other side of the Atlantic," but these have "all come to be part of the day's work."91 Despite the importance of the war in Europe for America, its position in the world, its economy, and its status as a neutral, Congress devoted remarkably little attention to the war during these first months of fighting. After spending about two weeks on emergency legislation related to the European conflict, to international trade and shipping, the President turned to revenue. It was but a matter of time before President Wilson asked Congress for a war tax.92 Still, the Congressional Record Index for 1914 identifies some 60 items as dealing directly with the war in Europe, and many of these were newspaper articles reprinted in the Congressional Record. Members of Congress introduced such materials into the record, and also added specific appeals, such as the "Antiwar Proclamation" from the Labor Council of Greater New York from August 25.93 A member of the Senate moved to include in the Congressional Record President Wilson's September 8th peace proclamation in which he called for a day of prayer for peace.94 Members of Congress did sometimes make their own predictions on the outcome of the war. New York Congressman Herman Metz, who the New York Times described as having a "wide knowledge of Germany and things German," reportedly told the press on September 23rd that "victory for Germany as the final outcome of the war is beyond all question." He predicted that peace "would come soon" and that it would find German troops still on French soil in the west and Russian soil in the east.95 Throughout the spring and early summer of 1914, President Wilson followed closely the unfolding events in Europe and he was informed immediately by telegram of the assassination of Archduke Franz Ferdinand. The President responded with a telegram to the Austrian emperor expressing that he was "deeply shocked at the atrocious murder."96 When war did break out on the continent the American Ambassador to France, Myron Timothy Herrick, telegrammed the Secretary of State in Washington: "Situation in Europe is regarded here as the gravest in history. It is apprehended that civilization is threatened by demoralization which would follow a general conflagration." Herrick urged the President to step forward and serve as an arbitrator.97 At a July 27th press conference a reporter had asked the President: "Whether the United States is in a position to maintain to peace of Europe." Wilson answered non-committedly, "Well that is a matter which it would be, perhaps, unwise for me to say anything about. I can only say that the United States has never attempted to interfere in European affairs."98 American diplomatic agents abroad urged the President to take action. Ambassador Herrick in Pariscabled Washington: "I believe that a strong plea for delay and moderation from the President of the United States would meet with the respect and approval of Europe."99 The US Ambassador to the United Kingdom, Walter Hines Page, notified Wilson that he had immediately and on his own initiative gone to the Prime Minister and asked "if he saw any way in which the good offices of our Government cd. Be used and that, if he did or should see any way, I prayed that he wd. Inform me." Page wrote the President that "It's the Slav and the German. Each wants his day and neither has got beyond the stage of tooth and claw." He added, "If they do have a general war they will so set back the march of progress in Europe as to set the day forward for American leadership."100 On July 31st the Chargé ?Affaires in Russia cabled Washington: "Situation becoming steadily more hopeless."101 On July 30thPresident Wilson addressed a Press Conference in Washington. Asked if he had taken any action in to stem the likelihood of war in Europe, Wilson responded simply "No, sir…" and added that no request for his services had been received.102 Even after war broke out, Wilson's deep seated feelings toward the conflict, his views on responsibility and his immediate reactions to the events of the war, particularly those that most affected the United States, are exceedingly difficult to discern. As President, he notoriously resisted seeking advice and he left no body of private writings that might offer insight. His public utterances were guarded. His advisors complained about him being withdrawn and uncommunicative. Yet it is clear that Wilson held America's neutrality, its impartiality in the conflict and the well-established right to unencumbered trade over the Atlantic, as fundamental principles that had to be recognized by the belligerents. Neutrality was of foremost importance to this country and central to his guidance of American foreign policy.103 To a large degree, Wilson was also an isolationist, unwilling to become involved in the conflicts of Europe, his isolationism was based on the presumption that the western hemisphere was impregnable and that the consequences of a war in Europe would be limited. Those initial views were, however, soon challenged by events of the conflict. Wilson came to recognize that the nature of the warwould go far in shaping the world order. The President also had a distinct view of America as a bastion of freedom, and he viewed the US as an economic powerhouse whose presence could not easily be ignored by the European powers. American interests, especially trade by sea with Europe, had to be respected. Still, Wilson desired above all for the nation to remain neutral, a view he shared with most Americans. The President remained convinced that the nation's trade, the ability of its merchant vessels to navigate the oceans, particularly the Atlantic, had to be respected by the European powers. This had long been a guiding element of American foreign policy. In the summer of 1914, America was in the position to have its expectations acknowledged and recognized by the European powers, for the nation had become the strongest economic power in the world, even though its military strength stood well behind that of Germany and England.104 President Wilson's first public remarks on the European war came on August 3rd when he met with correspondents for his semi-weekly press conference. The outbreak of war in Europe clearly weighed heavily upon him. "The strain and the tremendous burden he has been carrying for the last week has drawn deep lines of care across his face," wrote a correspondent for the Chicago Daily Tribune. Wilson began addressing the press corps as soon as they had assembled, without waiting for a question. He was clearly eager to reassure the nation and he urged calm.105 In spite of the furor in Europe, the President told the press that "the excitement ought not spread to the United States." Noting the magnitude of the situation, "perhaps the gravest…in modern times," he stated that "it need not affect the United States unfavorably in the long run."106 Wilson went out of his way to reassure leaders of business and commerce that "there was no cause for alarm," a statement he repeated to the press and to representatives from Congress who called upon him at the White House. "I know from my conferences with the secretary of the treasury there is no cause for alarm." He added that the Treasury Department was closely monitoring the financial situation throughout the country. "The bankers and business men of the country are cooperating with the Government with a zeal, intelligence, and spirit which make the outcome secure.""America is absolutely prepared to meet the financial situation and to straighten everything out without any material difficulty."Wilson also took the opportunity to urge members of Congress not to delay "not to delay the pending trust legislation programme [sic]…until the next session of Congress."107 Also on August 3rd, just several days after the initiation of hostilities, the press carried reports that the President was deeply engaged and closely following developments in Europe. "American ambassadors ordered to do everything possible to prevent general conflict," read the headlines. "All hope not gone." An editor for Albany's Times-Union newspaper added, "President Wilson's good offices will be at the service of Europe."108 Along withdirecting American diplomatic representative abroad to keep the State Department in Washington fully abreast of any opportunity for the US to mediate the conflict, Wilson took steps to insulate the economy from any blows. The President met with Congressional leaders and obtained their agreement to a proposal to permit foreign ships to sail under American registry in order to keep international trade and commerce operating.109 Wilson also directed Secretary of the Treasury William McAdoo, to New York City to confer with bankers and to reassure them.110 On August 4th, President Wilson made known to the U.S. and to the world that this nation stood "strictly neutral" in the conflict. "Whereas a state of war unhappily exists between Austria-Hungary and Servia [sic] and between Germany and Russia and between Germany and France," the President identified as illegal 11 acts, most involving enlistment or service in the armed forces or merchant marine of one of the belligerents. Along with this stern warning to nationals not to join one of the combatants' armed forces, Wilson cautioned the belligerent powers to keep their naval vessels out of US waters. Such a move, he stated forcefully, "must be regarded as unfriendly and offensive."111 The President followed on August 5th with two Executive Orders, one to aid American citizens stranded in Europe by the outbreak of the war and the other to further ensure the neutrality of this nation by prohibiting radio stations from transmitting "messages of an unneutral nature" from any of the belligerents. At a press conference the very next day no member of the press asked the President about the assassination, a striking omission in light of the media's otherwise extensive coverage of European affairs. The act that had launched the crisis was perceived as a regional incident.112 President Wilson did receive requests to take a side in the conflict, much as the American public had been able to read in the press appeals from the belligerents. On August 6th, Charles William Eliot, the highly influential president of Harvard University wrote directly to Wilson urging him to take the lead and organize "an effective international police method, suited to the present crimes," that "would overpower Austria-Hungary and Germany with all possible promptness and thoroughness." Eliot envisioned a US led blockade of Germany and Austria-Hungary, "an alliance to rebuke and punish" the two nations "for the outrages they are now committing." Wilson did not answer this letter.113 Throughout these weeks, Wilson had faced a traumatic personal situation at the White House that certainly pulled much of his attention and energy. His wife of 29 years, Ellen Louise Axson, lay mortally ill with kidney disease. "Every moment that could be spared from his office the President spent here, by her side who had been his constant coworker in the past," wrote an editor for The Literary Digest. He added that "President Wilson's tender to the warring nations of his good offices for peace in Europe was written while he was sitting at the bedside of Mrs. Wilson." She died on August 6th.114 Wilson continued to remain focused on the unfolding war in Europe, although deeply affected by his wife's death.115 On August 18th President Wilson addressed the American people and issued a forceful call for neutrality "in speech and conduct," as he viewed with concern the energetic campaign of the belligerents to influence public opinion. His address was carried in a number of newspapers, and it began: "Every man who really loves America will act and speak in the true spirit of neutrality, which is the spirit of impartiality and fairness and friendliness to all concerned."Wilson stated that the country was made up of individuals from many nations, "chiefly from the nations now at war," and this would invariably shape their views of the war. He argued against the divisive influence on the country and work against "the proper performance of our duty as the one great nation at peace" to serve as a mediator. "The United States must be neutral in fact as well as in name during these days that are to try men's souls."116 Efforts to mediate the conflict on behalf of the US government continued, largely through close advisers to the President, particularly Edward Mandell House, who initiated The Inquiry, a group that advised the President on peace strategy and war aims.117 In early August, House presented Wilson with a letter he had received from Arthur Zimmermann, a ranking official in Germany's Foreign Ministry. House wrote: "I have a feeling that Germany will soon be glad to entertain suggestions of mediation, and that the outlook is more hopeful in that direction than elsewhere." Wilson's advisor then wrote to Zimmerman, expressing the President's "deep regret" that he had not been able "to bring about a better understand between the great Powers of Europe," but added that the "offer of mediation was not an empty one." House, who acted on the President's behalf – Wilson termed him "my second personality" and stated "His thoughts and mine are one" – noted in the letter to Zimmermann, "Now that His Majesty has so brilliantly shown the power of His army, would it not be consistant [sic] with His life long endeavor to maintain peace, to consent to overtures being made in that direction?"118 Later in August other developments followed. At a diplomatic conference in Washington the German ambassador, Johann Heinrich von Bernstorff, was approached with an offer of American mediation. "Here everyone desires peace, for the United States suffers heavily because of the war," the Ambassador wrote in a telegram to his superiors in Berlin. "I, therefore, did not reject the offer, since I wanted to leave the odium of rejection to our enemies." Bernstorff urged serious consideration of the offer "because public opinion here, which has already been strongly influenced by England, will unquestionable turn against the belligerent whom they hold responsible for prolonging the war."119 Also in August, Wilson's confidant Colonel House made a personal trip to Europe to speak directly with leaders of the belligerent nations. Upon his return to the US he met with President Wilson on August 30th. During a lengthy conversation with the President, House wrote later, he had "told of my experiences in Europe and gave him more of the details of my mission." More than a mere advisor, House provided Wilson intelligence he had gathered, information that had shaped his own strongly held views. During these weeks efforts to mediate the conflict had intensified, but met with little favorable response. While House was on his way to meet the President, the Secretary of State relayed a message from the Czar regarding the "offer of mediation" and expressing his gratitude. However, the Czar explained, "Russia did not desire war and did everything to avoid it, but from the moment this war was imposed upon her she cannot fail to defend her rights by force of arms." That was the fifth response received from belligerents and this led William Jennings Bryan to tell the President that "Each one declares he is opposed to war and anxious to avoid it and then lays the blame upon someone else."120 With little progress to show for the effort to persuade the belligerents to agree to American mediation, President Wilson issued a proclamation on September 8th calling for a national day of prayer. Noting that the "great nations of the world have taken up arms" and "the counsel of statesmen have not been able to save [them] from the terrible sacrifice," Wilson turned to "prayer and counsel" and designated Sunday, October 4th as "a day of prayer and supplication" and urged "all God-fearing persons to repair…to their places of worship there to unite their petitions to Almighty God that, overruling the counsel of men, setting straight the things they cannot govern or alter, taking pity on the nations now in the throes of conflict, in His mercy and goodness showing a way where men can see none."121 Even into mid-September, the belligerent nationsand their supporters attempted to sway American public opinion and to gain the sympathy of the President. On September 18th, newspapers carried a report that Wilson refused to meet with a representative of several German-American associations "protesting the charges of atrocities made by the Belgian commission against the German army." The President asserted that, in accordance with his strict stand on neutrality, he had consistently refused to meet with representatives of the nations at war. He was, newspapers reported, deeply upset by such efforts to influence American policy and to steer the nation away from its strict neutrality.122 On September 10th the Chicago Daily Tribune reported that the Kaiser had written personally to Wilson asserting that "Belgian civilians drove his generals to be severe." Although the President and his staff were keeping the contents of the cable secret – "no one at the White House or state department would even admit officials that it had arrived," the message was clearly timed to be there shortly before the arrival of an official commission from Belgium which the President did receive.123 Wilson responded directly to the Kaiser on September 17th. "I received your Majesty's important letter," he wrote, "and perused it with great care." The President used the opportunity to assert the neutrality of the US and that he foresaw a day of reckoning coming when the European powers would confer on "the evils committed in this war and [assign] the appropriate responsibility."124 To conclude, during the summer and fall of 1914 those nations involved in "this terrible European war" scrambled to gain support abroad, particularly in the United States. This task proved challenging, to say the least, especially for Germany and its allies. Journalists, such as the editor of The Outlook who wrote in late September, "because under our free institutions public opinion has great facility both for formation and expression partly because we are remote from the conflict and our jury is less prejudiced," proudly announced the objectivity of their coverage and the open minds of their readers. A similar sentiment applied to the fundamental question of who was responsible in the first place for the outbreak of war. Here, too, the American media came to a consensus. Asking "who brought on this war," The Outlook's editor concluded: "History will hold Austria-Hungry and Germany responsible for the terrible tragedy which is now spreading dissolution throughout Europe."125 These two points of view sum up American sentiments during the first months of the conflict. To a large degree, the coverage of the war by the established magazines and journals reflected the outlooks of their editors and their owners, their views on international relations, power politics, American national security, and militarism. These conflicting points of view fought their own battles within the American media as they sought public support, and aimed to affect the nation's stand on the war. The success of each in shaping public opinion can at best be gauged by a thorough review of the media, the newspapers and magazines that American relied upon for information and points of view. Lacking public opinion polls which first were developed in the 1930s, a broad survey of the media offers the best view of American opinion. It is that public sentiment shifted over the course of the war. As a scholar wrote in 1937, when tensions were once more increasing on the continent, Americans had "lost interest" in the war by the winter of 1914-1915. "The truth is that the epic scale of the war was beyond popular comprehension. So, in the ensuing months, we informed ourselves indifferently of the progress of the conflict through dull communiqués," he wrote.126 This struggle for public opinion and support continued through 1917 and America's entrance into the conflict. It persisted even through the peace settlement as the political leaders and the public strived to articulate America's role in the world.127 Throughout these years, Woodrow Wilson strived to articulate not only his view on neutrality but to shape the nation's as well. Already by late September 1914, the President had reached certain conclusions about the European conflict and these guided him through the American declaration of war in April 1917. Wilson came to believe that a German victory would seriously threaten America's security; that it would spark the growth of domestic militarism; that the Allies would prove victorious because they had thwarted the German assault and were now in greater control of the war; and that the Allies showed interest in building a post-war world based on disarmament. These assumptions led Wilson to believe that the best way to build a world free of military arms race was to offer limited assistance to the Allies. Wilson had aimed to play the honest broker to the Allied and Central powers, a mediator who sought a fair peace, a true neutral party.128 For Wilson and America central to this policy was strict neutrality. But that proved increasingly more difficult as his policies clearly favored Britain and as Germany became more desperate, more aggressive. Its declaration of unrestricted submarine warfare defied Wilson and widely held American principles. This action above all made continued neutrality improbable. By early April 1917, the President explained in an address to a joint session of Congress: "Neutrality is no longer feasible or desirable where the peace of the world is involved and the freedom of its peoples, and the menace to that peace and freedom lies in the existence of autocratic governments backed by organized force which is controlled wholly by their will, not by the will of their people. We have seen the last of neutrality in such circumstances." The declaration of war followed.129 [email protected] (im folgenden Fenster [Datei>Drucken]) 1 On the response of US diplomats to the declaration of war, see Papers Relating to the Foreign Relations of the United States. 1914 Supplement. The World War (Washington, D.C.: United States Government Printing Office, 1928), 16-48. 2 "How the War Affects America," The Literary Digest LXIV(August 15, 1914), 256. 3 "The War News For Busy Readers," Times-Union (August 3, 1914). Some Aspects of War" Times-Union (August 4, 1914). 4 "Who Is Responsible?" The Outlook (September 30, 1914), 245. There was some effort at the time to gauge public opinion; see, for example, "American Opinion on the War. A Poll of the Press," The Outlook 107(15 August 1914), 907-908, which did just that, survey a range of newspapers and magazines. Dale E. Zacher, The Scripps Newspapers Go to War, 1914-18 (Urbana: University of Illinois Press, 2008), 20-22, 26, 33-50. 5 "Europe's War and America's Sympathies," Current Opinion LVII (October 1914), 221. "The War in Europe. An International Symposium," The Outlook 107(15 August 1914), 897-907. 6 "Germany Interpreted By a German-American," The Outlook 107(22 August 1914),954-956. "Europe's War and America's Sympathies," 221. "Europe Appealing to America," The Literary Digest LXIX(September 19, 1914), 495-496. "Ridder on War Situation," Times-Union (September 13, 1914); Hermann Ridder was the editor of New York City's German language newspaper, the Staats-Zeitung. 7 "Europe's War and America's Sympathies," 221. Enclosure II, Telegram from the Belgian Ministry for Foreign Affairs to the Belgium Minister in Washington, in Arthur Link, editor, The Papers of Woodrow Wilson, Volume 30, May 6-September 5,1914 (Princeton, New Jersey: Princeton University Press, 1979), 458. A Draft of a Reply to William II; Remarks to the Belgian Commissioner; and Poincaire's Telegram, Enclosure (translation), September 10, 1914, in Arthur Link, editor, The Papers of Woodrow Wilson, Volume 31, September 6 – December 31, 1914 (Princeton, New Jersey: Princeton University Press, 1979), 32-33, 33-34, 38-39. 8 See Fraser J. Harbutt, "War Peace, and Commerce. The American Reacton to the Outbreak of World War I in Europe 1914," in Holger Afflerbach & David Stevenson, An Improbable War. The Outbreak of World War I and European Political Culture before 1914 (New York: Berghahn Books, 2007), 320-334. On the issue of public opinion, see James Davenport Whelpley, American Public Opinion (New York: E.P. Dunton & Company, 1914), a collection of his essays on opinion on international issues. Published in May 1914, before the outbreak of war, the book was an early effort to gauge public sentiment on international issues. 9 For a fuller discussion of these issues, see Ross A. Kennedy, The Will to Believe. Woodrow Wilson, World War I, and America's Strategy for Peace and Security (Kent, Ohio: Kent State University Press, 2009), 1-24. Kennedy differentiates between what he identifies as the pacifists who saw the arms races and diplomatic issues that led to war as an European issue and who were convinced that America was largely insulated from the war by geography, the liberal interventionists who feared a German victory, and the Atlanticists who viewed a German victory as posing a serious threat to America. James Hay, "The War Terror," Sunday Star (Washington D.C.) (January 10, 1915), reprinted in Congressional Record Appendix and Index, 63rd Congress, 3rd Session, Volume LII, Park VI, 103-105. See the collection of newspaper articles written by former president Theodore Roosevelt, a vocal proponent of preparedness, America and the World War (NY: Scribner's Sons, 1915). 10 "The War and the Dangers of the Future," The Living Age 275(November 16, 1912), 433-437; the quote is from page 433. 11 Guglielmo Ferrero, "The Dangers of War in Europe," The Atlantic Monthly 111(January 1913), 1-9; quote is from page 4. 12 Whelpley, American Public Opinion, 28-38, 260, 264. 13 "The Increase of Disquiet in Europe," The Living Age 280(March 7, 1914), 626-628. 14 "Germany's War Scar From Russia," The Literary Digest 48(April 4, 1914), 749-750. 15 "Final Moves For Peace in Europe," San Francisco Chronicle (August 1, 1914). "Reports of Ultimatum By Kaiser Offset By Peace Hope," Boston Daily Globe (August 1, 1914). "Financiers Serve Notice On Powers There Will Be No Money to Carry on General War," Times-Union (August 1, 1914). 16 "Travelers Think War Was Forced on Kaiser," Atlanta Constitution (September 8, 1914). Even the regional press queried locals, see "Albanians Who Are In Europe," Times-Union (August 1, 1914). 17 "American Opinion of the War. A Poll of the Press," The Outlook 107(August 15, 1914), 907. "What Readers of The Outlook Think of The War," The Outlook 107(September 2, 1914), 44-47. 18 "The Military Preparedness," The Nation 99(August 6, 1914), 150. Samuel Taylor Moore, America and the World War (New York: Greenberg Publishers, 1937), 2, 9. 19 The Ambassador in Great Britain (Page) to the Secretary of State, London, August 6, 1914, in Foreign Relations, 1914, Supplement, 46. 20 "Reports of Ultimatum By Kaiser Offset Peace Hope," New York Times (August 1, 1914). "Assurances From Germany Give Hope of Compromise," Atlantic Constitution (August 1, 1914). See also, "All Military Eyes Fixed on War Stage," New York Times (August 1, 1914). 21 "How the War Rages," Washington Post (September 2, 1914). "The War Situation," Times-Union (August 1, 1914). "Summary of War News," New York Times (September 2, 1914). "The War News For Busy Readers," Times-Union (August 3, 1914). "Germany the Gainer in Military Advantage," Los Angeles Times (September 2, 1914). "Field at Liege Blood-Soaked," Los Angeles Times (September 2, 1914). "Allies' Left Forced Back as Germans Concentrate Attack," Christian Science Monitor (September 2, 1914). 22 "Why Europe Is At War," The Atlantic Monthly XLIX(August 7, 1914), 253. "The Germans in France," The Literary Digest XLIX(September 5, 1914), 400-401. 23 "Some Aspects of the War," Times-Union (August 4, 1914). 24 Roland G. Usher, "The Reasons Behind the War," Atlantic Monthly 114(1914), 444. Roland G. Usher, Pan- Germanism (Boston: Houghton Mifflin Company, 1913), 1, 4, passim. Roland G. Usher, The Story of the Great War (New York: The Macmillan Company, 1919), 3-16. 25 "Military Preparedness," 151-152. 26 "The War in Belgium," The Literary Digest XLIX(August 22, 1914). 289-294. "The Greatest War of History Breaks Over Europe," Current Opinion LVII(September 1914), 149-153. "How the War Wages," Washington Post (September 2, 1914). "Summary of War News," New York Times (September 2, 1914). "Germany the Gainer in Military Advantage," Los Angeles Times (September 2, 1914). "Allies Left Forced Back As Germans Concentrate Attack," Christian Science Monitor (September 2, 1914). "The Germans in France," TheLiterary Digest LXIX(September 5,1914), 399-406. 27 Quoted in "Why Europe Is At War," 253. "Powers Looked for a War Excuse," Times-Union (August28, 1914). 28 H.C.G. von Jagemann, "Germany's Struggle for Existence," The Outlook 108(September 16, 1914), 144-145. "Bavaria in War Time," The Outlook 108(September 30, 1914), 251-253. "Germany's Object in the War as Interpreted by a Prussian Military Officer," The Outlook 108(September 9, 1914), 68-71. "With the Germans in Belgium," The Outlook 108(September 16, 1914), 139-143. See, "Appeal of Warring Nations to American Sentiment" and "German Efforts to Influence American Opinion," in Current Opinion LVII (October, 1914), 222ff. 29 Ernst Richard, "The German Point of View of the War," The Outlook 107(August 15, 1914), 903-904. "Berlin Is Gone War Mad," Times-Union (August 1, 1914). See also "Germany Interpreted By a German-American," The Outlook 107(August 22, 1914), 954-956. 30 "Blaming Germany for the War," The Literary Digest (August 22, 1914), 293. "Mr. Ridder On War Situation," Times-Union (September 19, 1914). 31 "Blaming Germany for the War," 293. "Germany Ready To Fight the World To Protect Her Honor," Times-Union (August 4, 191). 32 Quoted in "American Sentiment and the German Viewpoint," Current Opinion LVII (September 1914), 150. 33 "German Appeal to America," The Nation 99(October 15, 1914), 455. 34 Ibid. "Truth About Germany. Facts About the War," emphasis in original, 6, 86. 35 Quoted in "Mr. Ridder On War Situation," Times-Union (September 19, 1914). 36 "War Rally Here By German-Americans," New York Times (September 28, 1914). 37 See, for example, "The 'Anti-German' Press," The Nation 99(August 20 1914), 221-222; "Professor Darmstaedter Replies," "England's Violation of Neutral Territory," and "Argument From Germany," The Nation 99(November 4, 1914), 548-549. 38 "German Appeals to America," 455. "British Lies and American Sentiment," The Nation 99(November 26, 1914), 621. See, Joseph Meditt Patterson, "Germans Adhere to Laws of War," Chicago Daily Tribune (September 26, 1914). 39 Hugo Müsterberg, The War and America (New York: D. Appleton and Company, 1914), 19. See the response by John Cowper Powys, The War and Culture. A Reply to Professor Münstenberg (New York: G. Arnold Shaw, 1914), who rejected Müstenberg's assertions that "Germany's preparations for war were purely defensive; [and] second, that Germany's defeat in the war would mean a devastating blow for culture, and a disastrous set-back to the best interests of humanity." 40 Müsterberg, The War and America, 205-207, 209-210. 41 "German Appeals to America," 455-456. 42 Ross A. Kennedy, The Will to Believe. Woodrow Wilson, World I, and America's Strategy for Peace and Security (Kent, Ohio: Kent State University Press, 2009), 12-14. 43 See, for example, "The War in Belgium," The Literary Digest XLIX(August 22, 1914), 289-290. "The War in Europe. An International Symposium," The Outlook 107(August 15, 1914), 896-907. 44 Whelpley, "Courting of America," 323-324. "England Still Makes … Favorite Weapon, Says Staats-Zeitung," Washington Post (September 28, 1914). 45 "The American Attitude," The Saturday Review, reprinted in The Living Age 283(October 3, 1914), 52-53. 46 "Europe's War and American Sympathies," 224. 47 Ibid., 223. 48 Usher, "Reasons Behind the War," 444-445. 49 Ibid. See also, "Why Europe Is At War," The Literary Digest XLIX(August 15, 1914), 254-262. "The Quarrel Between Britain, Austria-Hungary, and Servia," The Nation 99(August 13, 1914), 186. 50 Usher, "Reasons Behind the War," 446-448. For a differing view, see Constantin Theodor Dumba, Ambassador of Austria-Hungry, "The Austro-Servian Conflict," The Outlook 107(August 29, 1914), 1028. 51 "Why Europe Is At War," 253-254. See also, "The Lust of Empire," The Nation 99(October 22, 1914), 493. "The Responsibility For War," The Nation 99(August 6, 1914), 151. "Blaming Germany for the War," The Literary Digest XLIX(August 21, 1914), 293-294. "German Jingoism," The Outlook 97(April 22, 1911), 8-9. 52 Quoted in "Why Europe Is At War" 254. 53 "The War Against Popular Rights," The Outlook 107(August 15, 1914), 891. See Ernst Richard, "The German Point of View of the War," The Outlook 107(August 15, 1914), 903-905. Frederic William Hale, "The Germans and the War. The People and the Kriegspartei," The Outlook 107(September 2, 1914), 36-38. Maurice Parmelee, "An American In 'Berlin," The Outlook 107(September 2, 1914), 38. 54 Bernadotte E. Schmitt, "Made in Germany," The Nation 99(August 27, 1914), 251. See also the response of The Nation's Editor, "The Real Crime Against Germany," The Nation 99(August 13, 1914), 111; and the editorial, "The War's Motives," Times-Union (August 5, 1914). 55 "American Opinion on the War, 907. See, "Germany Interpreted By a German-American," The Outlook 107(August 22, 1914), 954-956. 56 Karl F. Geiser, letter, "The Anti-German Press," The Nation 99(August 20, 1914), 221-212. 57 "Ridder on War Situation," Times-Union (September 13, 1914). 58 "Why Europe Is At War," 255. 59 James Davenport Whelpley, "The Courting of America." 60 "How The War Affects America," The Literary Digest XLIX (August 15, 1914), 256. Kennedy, Will to Believe, 26-29. 61 Quoted in "How The War Affects America," 256. 62 "Europe's Call to Arms," The Literary Digest XLIX (August 8, 1914), 215. 63 "The Financial Side," The Literary Digest XLIX (August 15, 1914), 257. 64 Gilson Gardner, "War Effects and Finance," Times-Union (August 13, 1914). See, "War and Our Merchant Marine," The Literary Digest LXIX (August 22, 1914), 290-293 65 "Stock Exchange May Open in a Few Weeks, Says Adams," Wall Street Journal (September 2, 1914). Gilson Gardner, "War Effects and Finance," Times-Union (August 13, 1914). 66 Alba B. Johnson, "America's Industries as Affected by the European War," American Academy of Political and Social Sciences (hereafter AAPSS) 61(September 1914), 1. Joseph French Johnson, "The Probable Condition of the American Money Market After the War is Over," AAPSS 60(1915), 133. Johnson was very concerned about the impact of the war, which he anticipated as lasting six months, on America's capital market as funds would be taken by the European powers to finance their war efforts. 67 A.B. Leach, "The Effect of the European War on American Business," AAPSS 60(1915), 143-144. 68 "Unlimited Millions Available to Banks to Meet Any Crisis" and "Gold Supply Fully Safeguarded," Times-Union (August 3,1914). 69 A News Report (August 1, 1914) New Shipping Bill Will be Pushed Through Monday, in Link, Papers of Woodrow Wilson, Volume 30, 325-326. "Wilson Would Protect Shipping of the World," Atlantic Constitution (August 1, 1914). "How the War Affects America," 256. 70 Quoted in "How the War Affects America," 256. Gardner, "War Effects and Finance." 71 "American's Loss and Gain in Europe's War," The Literary Digest 49(August 29, 1914), 330. 72 Joseph French Johnson quotes are from New York's Evening Post newspaper and were cited in "America's Loss and Gain in Europe's War," 330. "How We Will Gain and Lose by War. Dean Johnson Sees Opportunities for Us to Extend Our Financial Influence," New York Times (September 6, 1914). From Henry Lee Higginson to Woodrow Wilson, August 20, 1914, in Link, Papers of Woodrow Wilson, Volume 30, 420-421. 73 Quoted in "America's Loss and Gain." 74 "How We Will Gain and Lose by War." Johnson added his voice to the debate over responsibility for the war: he wrote that Germany had increased its holdings of gold from $194 million in 1913 to $336 million in mid-July 1914, a "highly significant" measure from "one of the world's powers [that] deliberately planned and promoted this war." 75 "House Committee Will Ask Ruling On Sale of American War Supplies," Washington Post (September 2, 1914). 76 "How We Will Gain and Lose by War." "Expert Estimates Profit and Loss to U.S. by War," Chicago Daily Tribune (August 17, 1914). "Credit Problem Thorn in Side of Trade Conquest," Chicago Daily Tribune (September 5, 1914). 77 "Business Is Improving, President Wilson Hears," Chicago Daily Tribune (October 10, 1914). Arthur Sears Henning, "U.S. To Protect Export Shippers, Wilson Assures," Chicago Daily Tribune (October 13, 1914). 78 Arthur Sears Henning, "Americans Free To Ship Supplies to Belligerents," Chicago Daily Tribune (October 15, 19114). 79 "Stock Exchange May Open in a Few Weeks." 80 From William Gibbs McAdoo, September 2, 1914; and An Address to a Joint Session of Congress, September 4, 1914 in Link, Papers of Woodrow Wilson, Volume 30, 467-468, 473-474. "Pay War's Toll, President Urges," Washington Post (September 5, 1914). "What We Pay to See Europe At War," The Literary Digest XLIX(September 19, 1914), 491-492. The President's call for additional tax revenue gained widespread coverage; see, for example, "Wilson Asks Congress For War Tax," Times-Union (September 4, 1914). 81 Letter, William Lea Chambers to Woodrow Wilson, July 26, 1914, in Link, Papers of Woodrow Wilson, Volume 30, 305-306. 82 "Wilson's Appeal to Patriotism, Determined to Prevent Big Strike on Railroads," Los Angeles Times (August 1, 1914). 83 Miners Accept Wilson's Terms," Los Angeles Times (September 17, 1914). Draft of a Tentative Basis for the Adjustment of the Colorado Strike, in Link, Papers of Woodrow Wilson, Volume 30, 486-488. See, "Plight of the Railways Further Aggravated by War," Wall Street Journal (October 5, 1914). From Frank J. Hayes and Others to Woodrow Wilson, September 16, 1914; and From Jesse Floyd Wellborn to Woodrow Wilson, September 18, 1914, in Link, Papers of Woodrow Wilson, Volume 31, 37, 48. 84 "Guard America From Losses By War in Europe. Wilson and Congress Move to Prevent Money Shortage and Other Ills," Chicago Daily Tribune (August 1, 1914). 85 Ibid. "America Has Billions To Meet Emergency," Los Angeles Times (August 1, 1914). "Extraordinary Action Taken by Financiers To Forestall a Crisis," Atlanta Constitution (August 2, 1914). "McAdoo Calls To Financiers," Atlanta Constitution (August 2, 1914). "Unlimited Millions Available to Banks top Meet Any Crisis," Times-Union (August 3, 1914). "Wilson Would Protect Shipping of the World," Atlanta Constitution (August 1, 1914), "Financial Chiefs Will Preserve Commerce. Bankers and Industrial Captains Confer With President on Nation's Credit," San Francisco Chronicle (August 15, 1914). 86 "Unlimited Millions Available to Banks to Meet Any Crisis," front page. 87 "American Events in Review," Christian Science Monitor (August 15, 1914). 88 Ibid. "Guard America From Losses by War in Europe," Chicago Daily Tribune (August 1, 1914). 89 "War Tax Bill To Be Hurried," Chicago Daily Tribune (September 1, 1914). 90 Address to a Joint Session of Congress (September 4, 1914), in Link, Papers of Woodrow Wilson, Volume 30, 473-475. "War Tax Bill To Be Hurried." "Hundred Million War Deficit Subject of Wilson Message," Los Angeles Times (September 3, 1914). "Cut in Revenue To Be Met With More Economy," Christian Science Monitor (September 18, 1914). 91 Charles S. Groves, "How Official Washington Views War in Europe," Boston Daily Globe (September 13, 1914). 92 "Congress Proceeds With Work," Christian Science Monitor (August 19, 1914). 93 Congressional Record Index, Volume 51, 63-2, 137-138, 477. These items were listed under the headings "Europe" and "War and Preparations for War." "Antiwar Proclamation," Congressional Record-Senate, Volume 51, Part 14 (August 25, 1914), 14194. Congressional Record-Senate, Volume 51, Part 15(September 16, 1914), 15192. 94 "President's Peace Proclamation," Congressional Record-Senate, Volume 51, Part 15(September 8, 1914), 14803. 95 "America Must Intervene to End War, Says Metz," New York Times (September 23, 1914). 96 The Ambassador in Austria-Hungary (Penfield) to the Secretary of state, Vienna, July 13, 1914, in Foreign Relations, 1914, Supplement,22-23. From Frederic Courtland Penfield, Vienna, June 28, 1914, and To Francis Joseph I, Washington, June 28, 1914, Remarks at a Press Conference, June 29, 1914, in Link, Papers of Woodrow Wilson, Volume 30, 222-223. Wilson's own views can be discerned in his public papers and official correspondence, the only material available to historians; see, Kurt Wimer, "Woodrow Wilson and World Order," in Arthur S. Link, editor, Woodrow Wilson and a Revolutionary World, 1913-1921 (Chapel Hill: University of North Carolina Press, 1982), 146-150. 97 Myron Timothy Herrick to William Jennings Bryan, Paris. July 28, 1914. Rec'd 7:30 P.M., in Link, Papers of Woodrow Wilson, Volume 30, 313. See the editorial, "President Wilson's Peace Proffer," Times-Union (August 5, 1914). 98 Portions of Remarks at a News Conference, in Link, Papers of Woodrow Wilson, Volume 30, 307. 99 Cable, Paris, Myron Timothy Herrick to WJB, July 28, 1914, in Link, Papers of Woodrow Wilson, Volume 30, 313. The Ambassador in France (Herrick) to the Secretary of State, July 28, 1914, in Papers Relating to the Foreign Relations of the United States, 18. 100 From Walter Hines Page, Dear Mr. President, London July 29, 1914, in Link, Papers of Woodrow Wilson, Volume 30, 314-316. 101 The Chargé ?Affaires in Russia (Wilson) to the Secretary of State, July 31, 1914, in Papers Relating to the Foreign Relations of the United States, 26. 102 Remarks at a Press Conference, July 30, 1914, in Link, Papers of Woodrow Wilson, Volume 30, 317. 103 Robert W. Tucker, Woodrow Wilson and the Great War. Reconsidering America's Neutrality 1914-1917 (Charlottesville: University of Virginia Press, 2007), 19-24. 104 Ibid., 3-6, 49-50. Woodrow Wilson, Fourth of July address, July 4, 1917, in Link, Papers of Woodrow Wilson, Volume 30, 248-255. "President Wilson Advises All to be Calm," Times-Union (August 3, 1914). 105 "Wilson Pleads 'Remain Calm'," Chicago Daily Tribune (August 4, 1914). "Pres. Wilson Advises All To Be Calm." 106 Quoted in "President Advises Nation to be Calm," New York Times (August 4, 1914). "Wilson Watches War in Europe," Los Angeles Times (August 3, 1914). 107 "Wilson Pleads 'Remain Calm.'" "President Advises Nation to be Calm." "Pres. Wilson Advises All To Be Calm." 108 "U.S. Diplomats Work for Peace," Atlanta Constitution (August 2, 1914). See the editorial, "President Wilson's Peace Proffer," Times-Union (August 5, 1914). 109 "U.S. Diplomats Work for Peace." "President Wilson's Peace Proffer." See Wilson's comments, Remarks at a Press Conference, August 3, 1914, in Link, Papers of Woodrow Wilson, Volume 30, 331-335. "U.S. Diplomats Work For Peace," Atlanta Constitution (August 2, 1914). 110 "Wilson Watches War in Europe," Los Angeles Times (August 3, 1914). 111 The proclamation was published in its entirety in the New York Times, see "President Wilson Proclaims Our Strict Neutrality; Bars All Aid to Belligerents and Defines the Law," New York Times (August 5, 1914). 112 "Executive Order 2011 – To Enforce Neutrality of Wireless Stations," August 5, 1914. Online by Gerhard Peters and John T. Woolley, The American Presidency Project. http//www.presidency.ucsb.edu/ws/?pid=75364. "Executive Order 2012 – For the Relief, Protection and Transportation Home of Americans in Europe at the Outbreak of the European War of 1914," August 5, 1914. Online by Gerhard Peters and John T. Woolley, The American Presidency Project. http//www.presidency.ucsb.edu/ws/?pid=75365. 113 From Charles William Eliot. Confidential. Dear President Wilson: Asticou, Maine 6 August 1914, in Link, Papers of Woodrow Wilson, Volume 30, 353-354. 114 "Mrs. Wilson Dies in White House," New York Times (August 7, 1914). "Mrs Woodrow Wilson," The Literary Digest XLIX(August 15, 1914), 258. 115 See the letter the letter to Mary Allen Hulbert, September 6, 1914, in which he wrote with regard to the death of his wife: "I am lamed and wounded more sorely than any words I have can describe," in Link, Papers of Woodrow Wilson, Volume 31, 3. "President Wilson's Trial," Times-Union (august 6, 1914). "Mrs. Woodrow Wilson," 258. 116 An Appeal to the American People. My fellow countrymen: [Aug. 18, 1914], in Link, Papers of Woodrow Wilson, Volume 30, 393-394. "President Wilson Bids All His Countrymen be Neutral Both in Speech and Action," Christian Science Monitor (August 18, 1914). Wimer, "Woodrow Wilson and World Order," 151-156. 117 From Edward Mandell House, with Enclosures, September 5, 1914, in Link, Papers of Woodrow Wilson, Volume 30, 488. On the importance of House in formulating America's war aims and peace strategy, see Inga Floto, "Woodrow Wilson: War Aims, Peace Strategy, and the European Left," in Link, Woodrow Wilson and a Revolutionary World, 129-130; Tucker, Woodrow Wilson and the Great War, 38-49; and Godfrey Hodgson, Woodrow Wilson's Right Hand. The Life of Colonel Edward M. House (New Haven: Yale University Press, 2006). 118 Enclosure I, Edward Mandell House to Arthur Zimmerman (July 8, 1914); and Enclosure II, Edward Mandell House to William II (July 8, 1914), in Link, Papers of Woodrow Wilson, Volume 30, 265-267. Tucker, Woodrow Wilson and the Great War, 38. From Edward Manelll House, with Enclosures. Dear Governor: Prides Crossing, Mass. September 5th, 1914; and Enclosure I. Edward Mandell House to Arthur Zimmermann. My dear Herr Zimmermann: Washington, September 5, 1941, in Link, Papers of Woodrow Wilson, Volume 30, 488-489. 119 Count Johann Heinrich von Bernstorff to the German Foreign Office. Washington, den 7. September 1914; and Translation. Washington, September 7, 1914, in Link, Papers of Woodrow Wilson, Volume 31, 9-10. 120 From William Jennings Bryan. My Dear Mr. President: Washington August 28, 1914, in Link, Papers of Woodrow Wilson, Volume 30, 456-457. The five responses came from the Czar, the governments of France, Austria-Hungary, Great Britain, and Germany. See also the Telegram from the Belgian Foreign Minister in Ibid., 458-461. Secretary of State Bryan did not give up his plea for mediation and on December 1st he wrote to Wilson and urged the President to once more attempt to mediate; From William Jennings Bryan. My dear Mr. President: Washington December 1, 1914, in Link, Papers of Woodrow Wilson, Volume 31, 378-379. 121 A Proclamation. [Sept. 8, 1914], in Link, Papers of Woodrow Wilson, Volume 31, 10-11. "President Sets Day To Pray for Peace," Los Angeles Times (September 9, 1914). 122 "Wilson Bars Appeal By German-Americans," Atlantic Constitution (September 19, 1914). 123 "Kaiser In Plea To U.S. Says Foe Uses 'Dumdums'," Chicago Daily Tribune (September 10, 1914). 124 A Draft of a Reply to William II, September 15, 1914; and To Count Johann Heinrich von Bernstorff, September 16, 1914, in Link, Papers of Woodrow Wilson, Volume 31, "Wilson Replies to Protest of the Kaiser," San Francisco Chronicle (September 17, 1914); and "President Wilson and the Kaiser," Shanghai Times (October 2, 1914). A Draft Reply to William II, September 15, 1914; and To Count Johann Heinrich von Bernstorff, September 16, 1914, in Link, Papers of Woodrow Wilson, Volume 31, 32-33, 34-35.. 125 "Who Is Responsible?," 245-249. 126 Moore, America and the World War, 12. 127 Tucker, Woodrow Wilson and the Great War, 188-191. Kennedy, Will to Believe, 163-167, 182-186. 128 Kennedy, Will to Believe, 65. Wilson, letter to House, in Link, Papers of Woodrow Wilson, Volume 34, 271. 129 An Address to a Joint Session of Congress, April 2, 1917; and Enclosure, April 6, 1917, in Link, Papers of Woodrow Wilson, Volume 41, 519-527, 552; the quote is from page 523.
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
8,947
[ 128000, 9023, 13, 8563, 29614, 635, 22964, 32799, 25, 330, 576, 17936, 7665, 4208, 3343, 578, 3723, 4273, 11, 279, 3778, 3142, 323, 279, 4470, 9137, 315, 5111, 304, 220, 7529, 19, 198, 4444, 8982, 520, 279, 6625, 82048, 447, 2411, 389, 220, 2705, 14, 806, 14, 679, 19, 18815, 279, 7314, 315, 279, 5629, 4435, 5111, 220, 1041, 1667, 4227, 340, 1966, 6287, 220, 16, 11, 220, 7529, 19, 11, 279, 6063, 37756, 311, 356, 57000, 380, 8524, 12886, 279, 18489, 315, 4208, 311, 813, 8690, 45116, 11, 6376, 304, 11633, 279, 12324, 430, 6288, 9041, 505, 264, 8330, 73291, 304, 279, 60969, 598, 311, 264, 7665, 7029, 4208, 315, 3008, 92341, 13, 16, 46982, 279, 1176, 4038, 315, 279, 12324, 279, 3778, 586, 8272, 279, 19019 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 9023, 13, 8563, 29614, 635, 22964, 32799, 25, 330, 576, 17936, 7665, 4208, 3343, 578, 3723, 4273, 11, 279, 3778, 3142, 323, 279, 4470, 9137, 315, 5111, 304, 220, 7529, 19, 198, 4444, 8982, 520, 279, 6625, 82048, 447, 2411, 389, 220, 2705, 14, 806, 14, 679, 19, 18815, 279, 7314, 315, 279, 5629, 4435, 5111, 220, 1041, 1667, 4227, 340, 1966, 6287, 220, 16, 11, 220, 7529, 19, 11, 279, 6063, 37756, 311, 356, 57000, 380, 8524, 12886, 279, 18489, 315, 4208, 311, 813, 8690, 45116, 11, 6376, 304, 11633, 279, 12324, 430, 6288, 9041, 505, 264, 8330, 73291, 304, 279, 60969, 598, 311, 264, 7665, 7029, 4208, 315, 3008, 92341, 13, 16, 46982, 279, 1176, 4038, 315, 279, 12324, 279, 3778, 586, 8272, 279, 19019, -100 ]
Because there are so many Ergodyne products, we will take a look at some of the most popular items. The company has been in business for over 30 years and has the slogan "Tenacious Work Gear". Years of innovation has led the company to introduce recognized and trusted brands. These product lines include Skullerz bump caps, GloWear hi-vis apparel, ProFlex work gloves, and Chill-Its cooling supplies. This is a small portion of the Ergodyne family of products. Let's find out what makes these the stand-outs. First, Ergodyne designs rough, ready, and reliable safety gear. The Skullerz line of bump caps are non-ANSI rated head protection. These provide protection against minor injuries like bumps and scrapes. They are useful for warehouse workers, mechanics, and maintenance. Skullerz bump caps feature thermo-formed foam and mesh venting for comfort and fit. The removable impact-resistant ABS plastic shell provides the protection you need. Styles include baseball cap, long and short brim, hi-vis and even LED lit. Customize bump caps with embroidery or purchase styles with the Ergodyne logo. Next, GloWear high visibility apparel is available in a variety of styles. Safety vests, jackets, shirts, and pants come in hi-vis orange and yellow/lime. Silver reflective stripes help increase visibility at night and when working in poor weather conditions. The silver reflective also make many of the hi-viz apparel ANSI rated. The ANSI ratings range from class 1 to class 3. Rainwear, high visibility hats, and accessories finish out the GloWear line of apparel. Durable and affordable, add your own unique touch with custom logo gear. Another line unique to Ergodyne is ProFlex work gloves. Styles include anti-vibration, impact reduction, and thermal. Material handling and fire and rescue style gloves feature coated palms and knuckle protection. Chill-Its cooling supplies include evaporative bandanas and bands. Absorptive hard hat liners, dew rags, and neck shades keep you cool during the warm months. Stay protected from the sun and remain hydrated while on the job site. Finally, Ergodyne has other safety products that are worth noting. Those series include Arsenal tool storage, ProFlex knee pads, and Squids worksite organizers. Be tenacious and shop thousands of in-stock Ergodyne work gear products at low wholesale prices.
{ "redpajama_set_name": "RedPajamaC4" }
5,357
[ 128000, 18433, 1070, 527, 779, 1690, 74302, 1094, 818, 3956, 11, 584, 690, 1935, 264, 1427, 520, 1063, 315, 279, 1455, 5526, 3673, 13, 578, 2883, 706, 1027, 304, 2626, 369, 927, 220, 966, 1667, 323, 706, 279, 52637, 330, 33787, 19995, 5664, 28603, 3343, 23116, 315, 19297, 706, 6197, 279, 2883, 311, 19678, 15324, 323, 22542, 16097, 13, 4314, 2027, 5238, 2997, 61891, 261, 89, 28675, 19079, 11, 25372, 54, 686, 15960, 82489, 55425, 11, 1322, 32771, 990, 36516, 11, 323, 87589, 12, 37220, 28015, 17135, 13, 1115, 374, 264, 2678, 13651, 315, 279, 74302, 1094, 818, 3070, 315, 3956, 13, 6914, 596, 1505, 704, 1148, 3727, 1521, 279, 2559, 85075, 627, 5451, 11, 74302, 1094, 818, 14769, 11413, 11, 5644, 11, 323, 15062, 7296, 14787, 13 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 18433, 1070, 527, 779, 1690, 74302, 1094, 818, 3956, 11, 584, 690, 1935, 264, 1427, 520, 1063, 315, 279, 1455, 5526, 3673, 13, 578, 2883, 706, 1027, 304, 2626, 369, 927, 220, 966, 1667, 323, 706, 279, 52637, 330, 33787, 19995, 5664, 28603, 3343, 23116, 315, 19297, 706, 6197, 279, 2883, 311, 19678, 15324, 323, 22542, 16097, 13, 4314, 2027, 5238, 2997, 61891, 261, 89, 28675, 19079, 11, 25372, 54, 686, 15960, 82489, 55425, 11, 1322, 32771, 990, 36516, 11, 323, 87589, 12, 37220, 28015, 17135, 13, 1115, 374, 264, 2678, 13651, 315, 279, 74302, 1094, 818, 3070, 315, 3956, 13, 6914, 596, 1505, 704, 1148, 3727, 1521, 279, 2559, 85075, 627, 5451, 11, 74302, 1094, 818, 14769, 11413, 11, 5644, 11, 323, 15062, 7296, 14787, 13, -100 ]
Karl von Frankenberg ist der Name folgender Personen: * Karl von Frankenberg und Proschlitz (1746–1819), deutscher Generalmajor, Kommandeur des Infanterieregiments Nr. 30 Karl Gottlob Ludwig Sylvius von Frankenberg und Ludwigsdorf (1732–1795), deutscher Generalmajor, Kommandeur des Füsilierregiments Frankenberg Karl Wolfgang von Frankenberg und Ludwigsdorf (1730–1791), deutscher Generalmajor, Erbherr und Amtshauptmann
{ "redpajama_set_name": "RedPajamaWikipedia" }
7,388
[ 128000, 42, 49358, 6675, 9454, 56936, 6127, 2761, 4076, 9630, 13265, 88140, 1473, 9, 35131, 6675, 9454, 56936, 2073, 1322, 21740, 75, 11289, 320, 11771, 21, 4235, 10562, 24, 705, 409, 6256, 9211, 3331, 37605, 11, 27790, 1969, 12844, 951, 15268, 81130, 19380, 70, 12843, 70193, 13, 220, 966, 720, 35131, 69109, 1718, 85550, 47137, 9334, 6675, 9454, 56936, 2073, 85550, 13752, 33942, 320, 11908, 17, 4235, 11128, 20, 705, 409, 6256, 9211, 3331, 37605, 11, 27790, 1969, 12844, 951, 435, 2448, 35904, 1291, 1610, 12843, 9454, 56936, 198, 35131, 87598, 6675, 9454, 56936, 2073, 85550, 13752, 33942, 320, 11908, 15, 4235, 11128, 16, 705, 409, 6256, 9211, 3331, 37605, 11, 9939, 52971, 618, 2073, 362, 2562, 939, 52998, 18022, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0 ]
[ 42, 49358, 6675, 9454, 56936, 6127, 2761, 4076, 9630, 13265, 88140, 1473, 9, 35131, 6675, 9454, 56936, 2073, 1322, 21740, 75, 11289, 320, 11771, 21, 4235, 10562, 24, 705, 409, 6256, 9211, 3331, 37605, 11, 27790, 1969, 12844, 951, 15268, 81130, 19380, 70, 12843, 70193, 13, 220, 966, 720, 35131, 69109, 1718, 85550, 47137, 9334, 6675, 9454, 56936, 2073, 85550, 13752, 33942, 320, 11908, 17, 4235, 11128, 20, 705, 409, 6256, 9211, 3331, 37605, 11, 27790, 1969, 12844, 951, 435, 2448, 35904, 1291, 1610, 12843, 9454, 56936, 198, 35131, 87598, 6675, 9454, 56936, 2073, 85550, 13752, 33942, 320, 11908, 15, 4235, 11128, 16, 705, 409, 6256, 9211, 3331, 37605, 11, 9939, 52971, 618, 2073, 362, 2562, 939, 52998, 18022, -100, -100, -100, -100, -100, -100, -100, -100, -100 ]
package com.flowpowered.commons; import java.io.IOException; import java.io.InputStream; import java.io.InterruptedIOException; public class InterruptableInputStream extends InputStream { private final InputStream in; private final long sleepTime; public InterruptableInputStream(InputStream in) { this(in, -1); } public InterruptableInputStream(InputStream in, long sleepTime) { this.in = in; this.sleepTime = sleepTime; } @Override public int read() throws IOException { while (true) { if (in.available() > 0) { return in.read(); } if (Thread.interrupted()) { throw new InterruptedIOException(); } if (sleepTime < 0) { Thread.yield(); } else { try { Thread.sleep(sleepTime); } catch (InterruptedException e) { throw new InterruptedIOException(); } } } } @Override public void close() throws IOException { in.close(); } }
{ "redpajama_set_name": "RedPajamaGithub" }
14
[ 128000, 198, 1757, 470, 35171, 52616, 18960, 401, 475, 1674, 4340, 14563, 280, 475, 1674, 4340, 31004, 280, 475, 1674, 4340, 7522, 81953, 15402, 401, 898, 538, 22933, 481, 10689, 2289, 25899, 341, 262, 879, 1620, 25899, 304, 280, 262, 879, 1620, 1317, 6212, 1489, 401, 262, 586, 22933, 481, 10689, 83922, 304, 8, 341, 286, 420, 6024, 11, 482, 16, 317, 262, 557, 262, 586, 22933, 481, 10689, 83922, 304, 11, 1317, 6212, 1489, 8, 341, 286, 420, 1896, 284, 304, 280, 286, 420, 11365, 1489, 284, 6212, 1489, 280, 262, 557, 262, 571, 2226, 198, 262, 586, 528, 1373, 368, 3872, 9530, 341, 286, 1418, 320, 1904, 8, 341, 310, 422, 320, 258, 48211, 368, 871, 220, 15, 8, 341, 394, 471, 304, 4217, 545, 310 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 198, 1757, 470, 35171, 52616, 18960, 401, 475, 1674, 4340, 14563, 280, 475, 1674, 4340, 31004, 280, 475, 1674, 4340, 7522, 81953, 15402, 401, 898, 538, 22933, 481, 10689, 2289, 25899, 341, 262, 879, 1620, 25899, 304, 280, 262, 879, 1620, 1317, 6212, 1489, 401, 262, 586, 22933, 481, 10689, 83922, 304, 8, 341, 286, 420, 6024, 11, 482, 16, 317, 262, 557, 262, 586, 22933, 481, 10689, 83922, 304, 11, 1317, 6212, 1489, 8, 341, 286, 420, 1896, 284, 304, 280, 286, 420, 11365, 1489, 284, 6212, 1489, 280, 262, 557, 262, 571, 2226, 198, 262, 586, 528, 1373, 368, 3872, 9530, 341, 286, 1418, 320, 1904, 8, 341, 310, 422, 320, 258, 48211, 368, 871, 220, 15, 8, 341, 394, 471, 304, 4217, 545, 310, -100 ]
Smoke from wildfires in Oregon and California creates hazy skies as the sun is seen above the Washington state Capitol, Saturday afternoon in Olympia, Wash. Numerous air quality wa... AP Photo/Ted S. Warren Vehicles destroyed by a wildfire are shown in Maldin, Washington State. Servpro cleaning workers are sprayed as they exit the Life Care Center in Kirkland, Washington at the end of a day spent cleaning inside the facility near Seattle. The nursing home... A patient is loaded into an ambulance at the Life Care Center in Kirkland, Washington near Seattle. The nursing home is at the center of the outbreak of the coronavirus in Washingt... Two women wearing masks walk away from the Life Care Center in Kirkland, Washington. Health officials in Washington state said Sunday night that a second person had died from the c... One man takes photos as another pedestrian looks out at waves crashing against a seawall at high tide during a windstorm in Seattle. More than 140,000 households and businesses los... AP Photo/Elaine Thompson A notice that a home is unsafe to occupy is shown posted at a home in Port Orchard, Wash., that suffered heavy damage Tuesday when a tornado touched down in the area. Workers clear debris from Salmonberry Road, in Port Orchard, Wash., where a tornado touched down. A worker with Cascade Natural Gas, changes out a gas meter at a home in Port Orchard, Wash. that was damaged when a tornado touched down in the area. People stand in front of a damaged home, in Port Orchard, Wash., the day after a tornado caused heavy damage in the area. Workers cut limbs from a downed tree in Port Orchard, Wash., where a tornado touched down Tuesday. A worker clears debris at Salmonberry Dry Storage in Port Orchard, Wash., where a tornado touched down. A National Weather Service storm damage survey team was working elsewhere in... A worker trims branches from a tree that toppled over at a home in Port Orchard, Wash. in a neighborhood that suffered heavy damage when a tornado touched down in the area. Uprooted trees are shown on the roof of a home in Port Orchard, Wash., the day after a tornado caused heavy damage in the area. People walk through debris at Salmonberry Dry Storage, in Port Orchard, Washington state, where a tornado touched down Tuesday. Downed trees caused by the tornado in Port Orchard, Washington state. Steve Ringman/The Seattle Times via AP Melinda St. John is seen through a broken window as she recovers valuables from the living room of a house owned by St. John's sister Beth Mueller, in Port Orchard, Washington stat... A woman walks through a debris-strewn yard in front of a damaged home, in Port Orchard, Washinghton state, the day after a tornado caused heavy damage in the area Tuesday. Melinda St. John, center, helps her nieces, Hannah Mueller, 20, left, and Jasmin Mueller, 16, right, recover family photos from the living room of a house owned by St. John's siste... A National Weather Service storm damage survey team is heading to a town west of Seattle where a strong tornado blew through a neighborhood. Khalistan Supporters Vandalise Mahatma Gandhi's Statue During Protest In US Hundreds of Sikhs gathered outside Indian Embassy in downtown Washington to express solidarity with the protesting farmers. Trump's Teen Son Barron Tested Positive For COVID-19, Reveals Melania In a blog posted on the White House website, Melania said that Barron Trump, 14, exhibited no symptoms, a departure from herself and the president, who have both said they experienced mild symptoms 'Will Provide Citizenship To 11 Million Illegal Immigrants If Voted To Power': Joe Biden 'We have to be beating the virus, rebuilding the economy and figuring out how to restore American leadership around the world,' says Joe Biden while addressing a virtual fund raiser event. Masses Flock To Washington National Mall For Prayer March The march stretched from the Lincoln Memorial to the US Capitol, and was organised by the Rev. Franklin Graham, a prominent conservative evangelical and Trump supporter. Trump Campaign Sues To Block Mail-In Ballot Rule Changes The Republicans' lawsuit claims a new system adopted by the State Board of Elections will allow for absentee ballots to be cast late and without proper witness verification, 'which invites fraud, coercion, theft, and otherwise illegitimate voting'. US Congressman Urges China To End 'Provocations' Raja Krishnamoorthi said this following a classified briefing on the issue by the House Permanent Select Committee on Intelligence, of which he is the first and only Indian-American member. Former VP Joe Biden Wins Hard-fought Michigan, Deals Major Blow To Sanders The Vermont senator's hopes rested on Idaho, North Dakota and Washington state, where votes were still being cast or tabulated but where far fewer delegates were at stake. ISIS Chief Abu Bakr al-Baghdadi Died Like A Dog In US Raid, Says Donald Trump In his much-anticipated address to the world, Trump thanked Russia, Syria and Kurds for their efforts, and Israel for its intelligence inputs that helped execute the operation. Pakistan 'Most Dangerous Among Countries' I Dealt With: Ex-US Secretary Of Defence Jim Mattis said that the radicalisation of their society was one of the primary reasons. 'By the way, that is also the view of members of the Pakistan military. They realise what they've got going on there.' Indian Embassy To Impart Free Hindi Classes To Students At US University The six-week non-credit Introductory Hindi Language course, beginning August 28, will be conducted by Dr Moxraj, a teacher of Indian Culture at the embassy. Trump's America Is Once Again Locking Horns With Iran. What Should India Do? Donald Trump has been aching for a war with Iran, as are some of the more deranged members of his administration such as John Bolton, the National Security Adviser.
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
7,013
[ 128000, 77980, 505, 99482, 304, 19313, 323, 7188, 11705, 305, 13933, 50393, 439, 279, 7160, 374, 3970, 3485, 279, 6652, 1614, 32633, 11, 7884, 13658, 304, 96829, 11, 6113, 13, 86915, 3805, 4367, 10667, 9522, 2599, 11064, 17146, 291, 328, 13, 26713, 198, 53, 42965, 14763, 555, 264, 93225, 527, 6982, 304, 386, 4852, 258, 11, 6652, 3314, 627, 40259, 782, 16204, 7487, 527, 78721, 439, 814, 4974, 279, 9601, 10852, 5955, 304, 32446, 1974, 11, 6652, 520, 279, 842, 315, 264, 1938, 7543, 16204, 4871, 279, 12764, 3221, 16759, 13, 578, 28456, 2162, 9522, 32, 8893, 374, 6799, 1139, 459, 51632, 520, 279, 9601, 10852, 5955, 304, 32446, 1974, 11, 6652, 3221, 16759, 13, 578, 28456, 2162, 374, 520, 279, 4219, 315, 279, 31188, 315, 279, 33333 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 77980, 505, 99482, 304, 19313, 323, 7188, 11705, 305, 13933, 50393, 439, 279, 7160, 374, 3970, 3485, 279, 6652, 1614, 32633, 11, 7884, 13658, 304, 96829, 11, 6113, 13, 86915, 3805, 4367, 10667, 9522, 2599, 11064, 17146, 291, 328, 13, 26713, 198, 53, 42965, 14763, 555, 264, 93225, 527, 6982, 304, 386, 4852, 258, 11, 6652, 3314, 627, 40259, 782, 16204, 7487, 527, 78721, 439, 814, 4974, 279, 9601, 10852, 5955, 304, 32446, 1974, 11, 6652, 520, 279, 842, 315, 264, 1938, 7543, 16204, 4871, 279, 12764, 3221, 16759, 13, 578, 28456, 2162, 9522, 32, 8893, 374, 6799, 1139, 459, 51632, 520, 279, 9601, 10852, 5955, 304, 32446, 1974, 11, 6652, 3221, 16759, 13, 578, 28456, 2162, 374, 520, 279, 4219, 315, 279, 31188, 315, 279, 33333, -100 ]
Although black holes have been depicted in film and television works such as the 2014 movie "Interstellar," their true appearances are still a mystery. After years of global efforts, the first ever images of the black hole is now in the final stage of "printing" and will be released next Wednesday, according to Chinese Academy of Sciences (CAS). Through the technique of Very Long Baseline Interferometry (VLBI), which links radio dishes across the globe to create an Earth-sized interferometer, nearby super-massive black holes could be "photographed," says the program's official website.
{ "redpajama_set_name": "RedPajamaC4" }
1,355
[ 128000, 16179, 3776, 20349, 617, 1027, 44894, 304, 4632, 323, 12707, 4375, 1778, 439, 279, 220, 679, 19, 5818, 330, 3386, 78393, 1359, 872, 837, 27351, 527, 2103, 264, 23347, 627, 6153, 1667, 315, 3728, 9045, 11, 279, 1176, 3596, 5448, 315, 279, 3776, 14512, 374, 1457, 304, 279, 1620, 6566, 315, 330, 99931, 1, 323, 690, 387, 6004, 1828, 8079, 11, 4184, 311, 8620, 16192, 315, 23199, 320, 88616, 4390, 24798, 279, 15105, 315, 15668, 5843, 15004, 4939, 5783, 809, 7133, 320, 31798, 8768, 705, 902, 7902, 9063, 26863, 4028, 279, 24867, 311, 1893, 459, 9420, 28935, 41305, 21037, 11, 14373, 2307, 1474, 395, 535, 3776, 20349, 1436, 387, 330, 52399, 91673, 1359, 2795, 279, 2068, 596, 4033, 3997, 13, 128256, 128256, 128256, 128256, 128256, 128256, 128256 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0 ]
[ 16179, 3776, 20349, 617, 1027, 44894, 304, 4632, 323, 12707, 4375, 1778, 439, 279, 220, 679, 19, 5818, 330, 3386, 78393, 1359, 872, 837, 27351, 527, 2103, 264, 23347, 627, 6153, 1667, 315, 3728, 9045, 11, 279, 1176, 3596, 5448, 315, 279, 3776, 14512, 374, 1457, 304, 279, 1620, 6566, 315, 330, 99931, 1, 323, 690, 387, 6004, 1828, 8079, 11, 4184, 311, 8620, 16192, 315, 23199, 320, 88616, 4390, 24798, 279, 15105, 315, 15668, 5843, 15004, 4939, 5783, 809, 7133, 320, 31798, 8768, 705, 902, 7902, 9063, 26863, 4028, 279, 24867, 311, 1893, 459, 9420, 28935, 41305, 21037, 11, 14373, 2307, 1474, 395, 535, 3776, 20349, 1436, 387, 330, 52399, 91673, 1359, 2795, 279, 2068, 596, 4033, 3997, 13, -100, -100, -100, -100, -100, -100, -100, -100 ]
It was clear that audiences would soon see another 007 game with a new James Bond movie about to come out. Gamers certainly hit gold though when Activision released 007 Legends earlier today. The new 007 installment is for the Xbox 360 and PlayStation 3, and gives players the full agent experience by supplying 50 years of Bond?s biggest adventures.
{ "redpajama_set_name": "RedPajamaC4" }
9,944
[ 128000, 2181, 574, 2867, 430, 30994, 1053, 5246, 1518, 2500, 220, 11194, 1847, 449, 264, 502, 7957, 24537, 5818, 922, 311, 2586, 704, 13, 31079, 388, 7995, 4295, 6761, 3582, 994, 15050, 1854, 6004, 220, 11194, 42986, 6931, 3432, 13, 578, 502, 220, 11194, 47644, 374, 369, 279, 21222, 220, 6843, 323, 32365, 220, 18, 11, 323, 6835, 4311, 279, 2539, 8479, 3217, 555, 44413, 220, 1135, 1667, 315, 24537, 56470, 8706, 32078, 13, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 ]
[ 2181, 574, 2867, 430, 30994, 1053, 5246, 1518, 2500, 220, 11194, 1847, 449, 264, 502, 7957, 24537, 5818, 922, 311, 2586, 704, 13, 31079, 388, 7995, 4295, 6761, 3582, 994, 15050, 1854, 6004, 220, 11194, 42986, 6931, 3432, 13, 578, 502, 220, 11194, 47644, 374, 369, 279, 21222, 220, 6843, 323, 32365, 220, 18, 11, 323, 6835, 4311, 279, 2539, 8479, 3217, 555, 44413, 220, 1135, 1667, 315, 24537, 56470, 8706, 32078, 13, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100 ]
The provision of aid is increasingly under scrutiny with increasing demands for results. This raises the question: what are our expectations from aid and are they realistic? Too often accountability is argued for without questioning if what is understood by the term is relevant or applicable. The Political Economy of Aid and Accountability: The Rise and Fall of Budget Support in Tanzania explores the real meaning of accountability and argues for a new approach to aid more relevant to recipient countries. Offering fresh, insightful ideas Helen Tilley presents a contemporary theory of accountability through a case study of the delivery of general budget support in Tanzania. By considering the wider system of often contradictory political and social relations that influence and in turn constrain donor-government relations she questions the traditional understanding of accountability and deconstructs its epistemological assumptions. Engaging in an interdisciplinary discussion drawing upon economics, sociology, political science, anthropology, psychology and philosophy the book constructs a modern and nuanced understanding of accountability and foreign aid. By a deep and careful analysis of the text, enabling a new printing history of Leviathan to be constructed, this edition demonstrates that the traditional picture is substantially wrong. Both the Bear and Ornaments editions contain corrections and changes by Hobbes himself and are therefore central to reconstructing his text. In their substantial Introduction the editors examine all previous editions of Leviathan (as well as the manuscript copy prepared for Hobbes as a presentation copy for the King), throwing light on its history and calling into question the assumptions of previous editors. They thus provide an entirely new picture of its production. Schuhmann and Rogers also make full use of the Latin edition of Leviathan, published in 1668 when Hobbes was 80 years old. Through these new perspectives they are able to offer the first complete critical edition to take proper account of the publishing history and of Hobbes's own wishes. The result is as definitive an edition of Leviathan as modern scholarship can provide. Philosophic discussion of the destabilization brought on by globalism, mass migration and the dehumanization of all human activity especially popular pastimes like sport and recreation. French philosophic tradition of criticism brought to bear on the crisis of culture. This volume presents the famous seventeenth-century debate on freedom between Thomas Hobbes and John Bramhall.
{ "redpajama_set_name": "RedPajamaC4" }
2,335
[ 128000, 791, 17575, 315, 12576, 374, 15098, 1234, 36752, 449, 7859, 18651, 369, 3135, 13, 1115, 25930, 279, 3488, 25, 1148, 527, 1057, 17078, 505, 12576, 323, 527, 814, 26569, 30, 25619, 3629, 39242, 374, 18784, 369, 2085, 34685, 422, 1148, 374, 16365, 555, 279, 4751, 374, 9959, 477, 8581, 13, 578, 31597, 38661, 315, 38505, 323, 84790, 25, 578, 43777, 323, 15128, 315, 28368, 9365, 304, 69894, 41424, 279, 1972, 7438, 315, 39242, 323, 29633, 369, 264, 502, 5603, 311, 12576, 810, 9959, 311, 22458, 5961, 13, 67118, 7878, 11, 70162, 6848, 43881, 58769, 3258, 18911, 264, 19225, 10334, 315, 39242, 1555, 264, 1162, 4007, 315, 279, 9889, 315, 4689, 8199, 1862, 304, 69894, 13, 3296, 13126, 279, 22622, 1887, 315, 3629, 71240, 5054, 323, 3674, 4398 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 791, 17575, 315, 12576, 374, 15098, 1234, 36752, 449, 7859, 18651, 369, 3135, 13, 1115, 25930, 279, 3488, 25, 1148, 527, 1057, 17078, 505, 12576, 323, 527, 814, 26569, 30, 25619, 3629, 39242, 374, 18784, 369, 2085, 34685, 422, 1148, 374, 16365, 555, 279, 4751, 374, 9959, 477, 8581, 13, 578, 31597, 38661, 315, 38505, 323, 84790, 25, 578, 43777, 323, 15128, 315, 28368, 9365, 304, 69894, 41424, 279, 1972, 7438, 315, 39242, 323, 29633, 369, 264, 502, 5603, 311, 12576, 810, 9959, 311, 22458, 5961, 13, 67118, 7878, 11, 70162, 6848, 43881, 58769, 3258, 18911, 264, 19225, 10334, 315, 39242, 1555, 264, 1162, 4007, 315, 279, 9889, 315, 4689, 8199, 1862, 304, 69894, 13, 3296, 13126, 279, 22622, 1887, 315, 3629, 71240, 5054, 323, 3674, 4398, -100 ]
Unit testing asserts can be difficult to use. Approval tests simplify this by taking a snapshot of the results, and confirming that they have not changed. Artima SuiteRunner is a free open source testing toolkit for Java released under the Open Software License. You can use this tool with JUnit to run existing JUnit test suites, or standalone to create unit and conformance tests for Java APIs. The three main advantages Artima SuiteRunner offers to JUnit users are reporters, runpaths, and recipe files. Existing JUnit users can use SuiteRunner to run their JUnit tests, which allows them to gain the benefits of reporters, runpaths, and recipe files while continuing to use their JUnit test cases. Bumblebee is a framework that builds on top of JUnit to create documentation by example. Carma is a tool which validates the quality of your product by analyzing your test cases. It clearly identifies gaps in your test cases and reports the conditions which certainly require additional and/or enhanced test cases. Checkstyle is a development tool to help programmers write Java code that adheres to a coding standard. It automates the process of checking Java code to spare humans of this boring (but important) task. This makes it ideal for projects that want to enforce a coding standard. Checkstyle is highly configurable and can be made to support almost any coding standard. An example configuration file is supplied supporting the Sun Code Conventions. As well, other sample configuration files are supplied for other well known conventions. Concordion is an open source framework for Java that lets you turn a plain English description of a requirement into an automated test — an active specification. CT-Eclipse (Continuous Testing for Eclipse) builds on the automated developer support in Eclipse to make it even easier to keep your Java code well-tested, if you have a JUnit test suite. With CT-Eclipse enabled, as you edit your code, Eclipse runs your tests quietly in the background, and notifies you if any of them fail or cause errors. It is most useful in situations where you would already have a test suite while you are changing code: when performing maintenance, refactoring, or using test-first development. CT-Eclipse includes the ability to run tests in a prioritized order, and to filter out irrelevant tests. We have found that with tests run so often, a simple "Most Recently Failed First" metric is sufficient to achieve very good prioritization. You may have more sophisticated ideas about prioritizing and filtering tests--these can be contributed as plug-ins to the extension points provided by CT-Eclipse. DDSteps is a JUnit extension for building data driven test cases. In a nutshell, DDSteps lets you parameterize your test cases, and run them more than once using different data. Since DDSteps is 100% JUnit compatible, you can run your new data driven test cases just like any old JUnit test case. No IDE plugins or new Ant tasks are required - just add the DDSteps jars to your classpath and you are ready to go! DDSteps uses external test data (in Excel) which is injected into your test case using standard JavaBeans properties. Your test case is run once for each row of data, so adding new tests is just a matter of adding a row of data in Excel. DDSteps integrates best-of-breed toolkits for web and database testing, such as JWebUnit, DbUnit and Spring Framework. By making these toolkits data driven, you can do powerful function testing. Automated end-to-end testing of your website is not only possible - it is easy. DepUnit is designed with the belief that in any complicated system the unit tests build upon one another. In many unit test frame works there is a considerable amount of effort put into allowing the tester to setup and tear down the environment so that the tests can be performed. We believe that this setup and tear down procedure should be a unit test as well. For example a connection needs to be made to the database before unit tests can be performed on the data. The connection process should be a unit test and the other tests depend on it to succeed. With this in mind DepUnit lets you create what we call hard and soft dependencies between tests. DepUnit also allows for clean up tests that perform the tear down of other frameworks. DepUnit is also designed with the idea that data is at the heart of all unit tests. Unit tests usually test a system with some given set of data. DepUnit provides easy mechanisms for passing data into unit tests and passing data from one test to another. DepUnit also provides an easy way to run the same tests multiple times with different data. EasyMock provides Mock Objects for interfaces in JUnit tests by generating them on the fly using Java's proxy mechanism. Due to EasyMock's unique style of recording expectations, most refactorings will not affect the Mock Objects. So EasyMock is a perfect fit for Test-Driven Development. The Ejb3Unit project automates Entity and Session bean testing outside the container for the EJB 3.0 specification. Feed4JUnit makes it easy to write parameterized tests for the JUnit framework and feed them with predefined or random test data. It enables you to improve your testing easily. FindBugs is a program which uses static analysis to look for bugs in Java code. FindBugs requires JRE (or JDK) 1.4.0 or later to run. However, it can analyze programs compiled for any version of Java. Grester is a Maven2 Plugin for the Jester Tool, written entirely in Groovy. It was born out of a need to quickly test junit tests with Jester from within Maven projects. GroboUtils aims to expand the testing possibilities of Java. It contains many sub-projects which experiment with different aspects of testing through Java. The popular tools included with GroboUtils include multi-threaded tests, hierarchial unit tests, and a code coverage tool. GuiceBerry brings the joys of dependency injection to your test cases and test infrastructure. It leverages Guice to accomplish this. It allows you to use a composition model for the services your test needs, rather than the traditional extends MyTestCase approach. GuiceBerry does not supplant your JUnit testing framework -- it builds on top of it (and works around it, when necessary), so you can run your tests normally, from your favorite command line or IDE environment. Testing framework to test GWT application, without GWTTestCase, running in a standard JVM and using standard tests tools : JUnit, Easymock, reflection ... gwt-test-utils enable Unit Test in a standard JVM by modifying GWT classes on the fly with a specific java agent : all JSNI methods are replace with Java code. Haste represents an approach to system testing that is philosophically consistent with standard XP unit testing practices. Test code runs in the same address space as the application under test, allowing for ready examination of application state. The fundamental Haste abstractions of Story, Step, and StoryBook provide a framework to implement system tests. Utility classes simplify test development. In addition to acting as XP acceptance tests, Haste tests aid source maintenance and extension, and can play an important role in a release process. JBehave is a java-based framework designed to encourage collaboration between Developers, QAs, BAs, business and other team members through automated scenarios. Behaviour-driven development (BDD) is an evolution of test-driven development (TDD) and acceptance-test driven design, and is intended to make these practices more accessible and intuitive to newcomers and experts alike. JDepend traverses Java class file directories and generates design quality metrics for each Java package. JDepend allows you to automatically measure the quality of a design in terms of its extensibility, reusability, and maintainability to manage package dependencies effectively. jDiffChaser is a Java Open Source Software that automates visual GUI comparisons between two versions of a Swing application. jDiffChaser plays previously recorded scenarios and takes a screenshot of the last production version GUI rendering and another screenshot of the current development version. Then it compares both screens, finds the differences between them and lists all in a html report. Of course you can define zones to ignore during comparisons. Scenarios can be played locally on a single host, that means sequentially, or they can be played at the same time on two hosts when real time data is needed by the tested application. JEasyTest is an Eclipse IDE plugin created to simplify unit testing of code that is hard to test using standard mock objects frameworks, as for example code using legacy code. JEasyTest uses AspectJ load-time bytecode modification "to inject mock invocations" (constructor and static method invocations) in which we are not allowed to use standard mock object tools (this technique is also known as Virtual Mock Objects). JEasyTest has been thought to be integrated with existing mock object frameworks to overcome some of their limitations. Throughout a literate API, the border between the code under test and the test itself nearly disappears and the concept of endo-testing is moved a step forward: the testing context, and only this, becomes a privileged environment from where we can set expectations as if we were inside the code to be tested. JellyUnit is a Jelly based JUnit testing mechanism. This allows Jelly scripts to be used to perform unit testing which can be particularly useful if you wish to test XML, XPath, SQL, HTTP, JMS or SOAP interactions. JellyUnit works by using the JUnit library in a Jelly script to create JUnit TestSuite and TestCase objects. There are all the usual JUnit assertion tests available such as and . You can use both Jexl and XPath expressions in the tag via either the test or the xpath attributes. Inside these test scripts you can use the full range of Jelly tags such as navigating over XML test data creating multiple test cases based on sample data, performing SQL operations, SOAP calls, HTTP or JMS requests etc. Jeté is a system and integration testing framework. The purpose of Jeté is to make system testing easier and more broadly accessible while being flexible enough to test existing systems. Jetif is a regression test framework in pure Java. It provides a simple and flexible architecture for Java unit testing and functional testing, and used for testing in both individual and enterprise software development. It's easy to use, but powerful, and with some important features for enterprise software testing. This project was inspired by JUnit, JTestCase and TestNG. There are several ideas come from JUnit, for example the assertion mechanism and TestListener concept, so it's easy to move to Jetif from JUnit. A Java class library for developer testing with "mock methods". JMockit consists of a single class with a small set of static methods, which allow arbitrary methods and constructors of any other class to be replaced by mock implementations at runtime. This facility can be used for writing unit or integration tests where the code under test is isolated from other parts of the codebase on which calls are made. This approach is an alternative to the now conventional use of "mock objects", as provided by tools such as EasyMock and jMock. The advantage is that no particular design must be followed by code under test. Legacy code can be unit tested without the need for any adaptation. In short, JMockit makes testability much less of an issue, or even a non-issue. Since JMockit depends on the JVM class redefinition mechanism exposed by java.lang.instrumentation, JUnit (or TestNG) tests that use it must be run under a Java SE 5 VM. However, application and test code can still be compiled to older versions of the language. JTestCase is a 100% pure Java, open-source microframework that helps in separating test case data from test case units. JTestCase embodies the concept of a TestCase. A TestCase can be seen as combination of one (or more) assert for a specific set of input parameters. JTiger Unit Testing Framework for Java 2 Standard Edition 5.0 is an open Source solution that provides a robust and feature-rich abstraction to develop and execute unit test cases. Test case metadata and unit test documentation is expressed through Java annotations. Assertions, from the basic to the complex, can be made using the JTiger assertions package rather than having to write the logic for those assertions yourself. JTiger includes rich assertion abilities, ranging from 'assert true' to 'assert adherence to the Object equals method contract on this type', an Apache Ant task, and reporting capabilities in HTML, XML or plain text format. For an example JTiger HTML report, see the JTiger Self Test Report. JTiger provides reassurance of being a robust unit test framework by providing its own self test fixtures that assert 100% class and 100% method code coverage over the JTiger source code. JUnit is a simple framework for writing and running automated tests for Java. JUnit extension for system test. JUnitum is developed from ideas of TestNG / Simplium. It provides system test features to simplify and speed up system test cases. The highlighting benefit of JUnitum is that you can use these features without any conflict with your exisiting test development environment. This project adds a new runner to JUnit and provides much easier and readable parameterised tests for JUnit 4.5 and higher. MockCentral is an easy-to-use, fully-featured set of tools that provides a new approach to java software testing using mock objects. It enables you to create and access libraries of mock objects defined in xml files external to the testing code, allowing for cleaner test cases and easy mock object organization and reuse. Mockrunner is a lightweight framework for unit testing applications in the J2EE environment. It supports servlets, filters, tag classes and Struts actions and forms. Furthermore it includes a JDBC, a JMS and a JCA test framework and can be used in conjunction with MockEJB to test EJB based applications. Mockrunner extends JUnit and simulates the necessary behaviour without calling the real infrastructure. It does not need a running application server or a database. Furthermore it does not call the webcontainer or the Struts ActionServlet. It is very fast and enables the user to manipulate all involved classes and mock objects in all steps of the test. It can be used to write very sophisticated unit-tests for J2EE based applications without any overhead. Mockrunner does not support any type of in-container testing. MoMEUnit is an instance of the xUnit architecture for unit testing of J2ME applications. It is derived from well known JUnit framework. It is only CLDC 1.1 complied. MoMEUnit includes Ant Integration package. It consists of several fully featured, extensible tasks that simplify use of MoMEUnit framework with Ant build system. MultithreadedTC is a framework for testing concurrent Java applications. It features a metronome that is used to provide fine control over the sequence of activities in multiple threads. NoUnit allows you to see how good your JUnit tests are. It generates a report from your code to graphically show you how many of your project's methods are being tested , and how well. RMock 2.0.0 is a Java mock object framework to use with jUnit. RMock has support for a setup-modify-run-verify workflow when writing jUnit tests. It integrates better with IDE refactoring support and allows designing classes and interfaces in a true test-first fashion. ScalaCheck is a powerful tool for automatic unit testing of Scala and Java programs. It features automatic test case generation and minimization of failing test cases. ScalaCheck started out as a Scala port of the Haskell library QuickCheck, and has since evolved and been extended with features not found in Haskell QuickCheck. With ScalaTest, you can test either Scala or Java code. By integrating with popular tools such as JUnit, TestNG, Ant, and Maven, ScalaTest makes it easy to take your testing to a higher, more productive level in new or existing Scala or Java projects. StrutsTestCase for JUnit is an extension of the standard JUnit TestCase class that provides facilities for testing code based on the Struts framework. StrutsTestCase provides both a Mock Object approach and a Cactus approach to actually run the Struts ActionServlet, allowing you to test your Struts code with or without a running servlet engine. Because StrutsTestCase uses the ActionServlet controller to test your code, you can test not only the implementation of your Action objects, but also your mappings, form beans, and forwards declarations. And because StrutsTestCase already provides validation methods, it's quick and easy to write unit test cases. Swing Explorer is a tool for Swing developers intended for visual exploring of a Swing-based application internals. It finds all the windows in the explored Swing application and displays their component hierarchies as a tree. Each component in the tree can be displayed in the Swing Explorer's work area and visually inspected. Swing Explorer helps to determine sub-components when user moves mouse over them and provides additional information about currently selected component (layout, size, coordinates, border and other things). TESTARE is a java testing framework that aims to simplify the test development process for distributed java applications. TESTARE's initial focus is on ejb testing, but its extensible architecture makes it very easy to develop in container testing support for other technologies, such as SERVLETS, JMS listeners, CORBA ORBs or RMI. As such, TESTARE can be used to more easily implement the test driven development for distributed java development efforts. "Tests with Parameters" allows you to simply add parameters to your JUnit test methods. TwiP calls such methods with all possible combinations of their parameters... or at least some reasonable subset of commonly failing values in the case of Integers, etc. UISpec4J is an Open Source functional and/or unit testing library for Swing-based Java applications, built on top of the JUnit test harness. If you are writing a Swing application, you will appreciate UISpec4J above all for its simplicity: UISpec4J's APIs are designed to hide as much as possible the complexity of Swing, resulting in easy to write and easy to read test scripts. This is especially true when comparing UISpec4J tests with those produced using Swing or low-level, event-based testing libraries. Unitils is an open source library aimed at making unit testing easy and maintainable. Unitils builds further on existing libraries like dbunit and integrates with JUnit and TestNG. Unitils provides general asserion utilities, support for database testing, support for testing with mock objects and offers integration with Spring , Hibernate and the Java Persistence API (JPA). It has been designed to offer these services to unit tests in a very configurable and loosely coupled way. As a result, services can be added and extended very easily.
{ "redpajama_set_name": "RedPajamaC4" }
3,044
[ 128000, 4665, 7649, 57876, 649, 387, 5107, 311, 1005, 13, 64877, 7177, 40821, 420, 555, 4737, 264, 16694, 315, 279, 3135, 11, 323, 50096, 430, 814, 617, 539, 5614, 627, 9470, 7675, 21652, 20051, 374, 264, 1949, 1825, 2592, 7649, 66994, 369, 8102, 6004, 1234, 279, 5377, 4476, 1914, 13, 1472, 649, 1005, 420, 5507, 449, 622, 4665, 311, 1629, 6484, 622, 4665, 1296, 56264, 11, 477, 44488, 311, 1893, 5089, 323, 390, 12057, 7177, 369, 8102, 34456, 13, 578, 2380, 1925, 22934, 5277, 7675, 21652, 20051, 6209, 311, 622, 4665, 3932, 527, 19578, 11, 1629, 22354, 11, 323, 11363, 3626, 13, 69571, 622, 4665, 3932, 649, 1005, 21652, 20051, 311, 1629, 872, 622, 4665, 7177, 11, 902, 6276, 1124, 311, 8895, 279, 7720, 315, 19578, 11, 1629 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 4665, 7649, 57876, 649, 387, 5107, 311, 1005, 13, 64877, 7177, 40821, 420, 555, 4737, 264, 16694, 315, 279, 3135, 11, 323, 50096, 430, 814, 617, 539, 5614, 627, 9470, 7675, 21652, 20051, 374, 264, 1949, 1825, 2592, 7649, 66994, 369, 8102, 6004, 1234, 279, 5377, 4476, 1914, 13, 1472, 649, 1005, 420, 5507, 449, 622, 4665, 311, 1629, 6484, 622, 4665, 1296, 56264, 11, 477, 44488, 311, 1893, 5089, 323, 390, 12057, 7177, 369, 8102, 34456, 13, 578, 2380, 1925, 22934, 5277, 7675, 21652, 20051, 6209, 311, 622, 4665, 3932, 527, 19578, 11, 1629, 22354, 11, 323, 11363, 3626, 13, 69571, 622, 4665, 3932, 649, 1005, 21652, 20051, 311, 1629, 872, 622, 4665, 7177, 11, 902, 6276, 1124, 311, 8895, 279, 7720, 315, 19578, 11, 1629, -100 ]
Morley Canoes | Swan Lake, Montana Morley Canoes master craftsmen: Greg, Steven and Anne Morley. Morley Canoes is housed in a classic Montana log cabin and sits on Hwy 83, in the quaint community of Swan Lake. If you see a canoe outside of the workshop/showroom it's a good indication Greg and Steven are working away. During the summer and fall it's almost a guarantee they'll be working 7 days a week and would love to have you come in to say hi. The Swan Valley is an outdoor enthusiasts playground, so don't be surprised if they might have slipped out to test out a boat on the water or are out running with four-legged Kona in the woods. From Missoula, MT: Take Grand Ave and N 2nd St W to Old U.S. 93 E/N Orange St 49 s (0.2 mi), follow MT-200 E to MT-83 N in Lake County 1 h 50 min (110 mi) From Seeley Lake, MT: Head north on MT-83 N 56.8 mi 55 min From Glacier National Park: Follow N Fork Rd to US-2 E in Columbia Falls 35 min (22.9 mi), Turn left onto US-2 E 2 min (1.6 mi), Drive to MT-83 S in Lake County 43 min (40.6 mi) Highlights of Shopping Offerings Morley Canoes is a family labor of love. Greg Morley started skillfully handcrafting wooden vessels in 1972 out of an unassuming log cabin, nestled in the upper Swan Valley. With a background in forestry and outdoor recreation he fell in love with building boats. He doesn't shy away from letting you know it's not work, but a lifestyle. Greg and Anne raised two sons balancing building custom boats with mountain and water family adventures. Both sons moved on to do their own thing after college thinking they wouldn't move back to Swan Lake. In 2004, Steven married with three children decided to move the family from Hawaii back to his childhood hometown of Swan Lake, MT. With Steven's return, father and son have been working side by side building custom wood vessels (canoes, kayaks, skiffs, and sups). Steven felt with his father aging someone had to carry on the craft of building wooden vessels. He feels there is something special about having an experience on the water, in a boat that is an experience in itself. Boats are typically built using western red cedar, ash and cherry wood. They build approximately one wooden vessel a month and ship them as far as Japan, New Zealand and Germany. Even if you're not in the market for one of their builds, it's an incredible experience to see them working or listen to their stories. The wildlife outnumber people, so they've got some good ones. It doesn't get much more Montana than this! 9:00am - 6:00pm 7 days/week summer & fall Seasons or Months Open year round *call ahead in the winter and spring
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
2,189
[ 128000, 42778, 3258, 3053, 7217, 765, 44501, 11940, 11, 37105, 198, 42778, 3258, 3053, 7217, 7491, 65881, 268, 25, 16431, 11, 24565, 323, 29026, 8613, 3258, 627, 42778, 3258, 3053, 7217, 374, 52258, 304, 264, 11670, 37105, 1515, 13691, 323, 23874, 389, 80077, 220, 6069, 11, 304, 279, 88608, 4029, 315, 44501, 11940, 13, 1442, 499, 1518, 264, 84589, 4994, 315, 279, 26129, 35275, 3039, 433, 596, 264, 1695, 28137, 16431, 323, 24565, 527, 3318, 3201, 13, 12220, 279, 7474, 323, 4498, 433, 596, 4661, 264, 15803, 814, 3358, 387, 3318, 220, 22, 2919, 264, 2046, 323, 1053, 3021, 311, 617, 499, 2586, 304, 311, 2019, 15960, 13, 578, 44501, 13345, 374, 459, 16166, 43448, 42715, 11, 779, 1541, 956, 387, 14792, 422, 814, 2643, 617, 43578, 704 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 42778, 3258, 3053, 7217, 765, 44501, 11940, 11, 37105, 198, 42778, 3258, 3053, 7217, 7491, 65881, 268, 25, 16431, 11, 24565, 323, 29026, 8613, 3258, 627, 42778, 3258, 3053, 7217, 374, 52258, 304, 264, 11670, 37105, 1515, 13691, 323, 23874, 389, 80077, 220, 6069, 11, 304, 279, 88608, 4029, 315, 44501, 11940, 13, 1442, 499, 1518, 264, 84589, 4994, 315, 279, 26129, 35275, 3039, 433, 596, 264, 1695, 28137, 16431, 323, 24565, 527, 3318, 3201, 13, 12220, 279, 7474, 323, 4498, 433, 596, 4661, 264, 15803, 814, 3358, 387, 3318, 220, 22, 2919, 264, 2046, 323, 1053, 3021, 311, 617, 499, 2586, 304, 311, 2019, 15960, 13, 578, 44501, 13345, 374, 459, 16166, 43448, 42715, 11, 779, 1541, 956, 387, 14792, 422, 814, 2643, 617, 43578, 704, -100 ]
Škofijska knjižnica je interna knjižnica Nadškofije Ljubljana in ima dve enoti: Vidmarjevo knjižnico in Škofijsko pastoralno knjižnico. Zgodovinski razvoj Vidmarjevo knjižnico je leta 1875 ustanovil ljubljanski škof Jernej Vidmar, ko je po svoji odpovedi škofovanju in preselitvi v Kranj zapustil zasebno knjižnico škofijski menzi. Nahaja se v nadškofijskem dvorcu, njen fond šteje 4057 del. Večinoma gre za starejše publikacije v nemškem in latinskem jeziku, v slovenščini je samo nekaj del (npr. Dalmatinova Biblia, Krajnşka zhbeliza, Kopitarjeva Glagolita Clozianus). Knjižnica ima Czernyjev abecedni katalog in ni odprta za javnost. Leta 1951 je bila razglašena za kulturni spomenik. Škofijska pastoralna knjižnica se danes nahaja v stavbi Alojzijevišča (Poljanska cesta). Nastala je kot priročna knjižnica povojnega verskega lista Oznanilo (1945-1952) v škofijskem dvorcu. Knjižni fond se je vzpostavil z nakupi, darovi in zapuščinami umrlih klerikov (npr. škofov G. Rožmana, A. Kalana, A. B. Jegliča, A. Vovka; duhovnikov F. S. Finžgarja, A. Stroja, J. Šolarja, V. Kragla), in ukinjenih ustanov (npr. Zavod sv. Stanislava, Marijanišče). Knjižnica hrani nad 50.000 enot gradiva. Prevladujejo teološki, pastoralni in katehetski priročniki, verske revije ter umetnostno-zgodovinska dela. Viri - Škofijska knjižnica v Ljubljani - D. Lovrić Anušić, J. Antolin Oman: Škofijska knjižnica v Ljubljani. Ljubljana, 2013. Zgibanka. - K. Rivo: Škofijska knjižnica v Ljubljani. Ljubljana, 2001. Diplomsko delo. Knjižnice v Ljubljani Verske ustanove v Ljubljani
{ "redpajama_set_name": "RedPajamaWikipedia" }
2,470
[ 128000, 104907, 74, 93123, 2580, 4657, 1168, 7910, 12453, 77, 3074, 4864, 2655, 64, 1168, 7910, 12453, 77, 3074, 35762, 105403, 1073, 32376, 445, 73, 392, 53835, 3444, 304, 93793, 111760, 665, 89392, 25, 48654, 5730, 3841, 3415, 1168, 7910, 12453, 77, 4042, 304, 101945, 74, 93123, 2580, 9509, 90371, 2201, 1168, 7910, 12453, 77, 4042, 382, 57, 40811, 869, 53977, 24788, 106405, 271, 53, 307, 5730, 3841, 3415, 1168, 7910, 12453, 77, 4042, 4864, 1095, 64, 220, 9674, 20, 117368, 321, 92602, 392, 53835, 598, 6780, 110050, 1073, 8569, 36900, 48654, 5730, 11, 15593, 4864, 3273, 67107, 7910, 52006, 5047, 72, 37524, 9509, 831, 16023, 8783, 304, 1685, 301, 275, 10176, 348, 735, 6713, 73, 34078, 125853, 114813, 65, 2201, 1168, 7910, 12453, 77, 4042, 110050, 93123 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 104907, 74, 93123, 2580, 4657, 1168, 7910, 12453, 77, 3074, 4864, 2655, 64, 1168, 7910, 12453, 77, 3074, 35762, 105403, 1073, 32376, 445, 73, 392, 53835, 3444, 304, 93793, 111760, 665, 89392, 25, 48654, 5730, 3841, 3415, 1168, 7910, 12453, 77, 4042, 304, 101945, 74, 93123, 2580, 9509, 90371, 2201, 1168, 7910, 12453, 77, 4042, 382, 57, 40811, 869, 53977, 24788, 106405, 271, 53, 307, 5730, 3841, 3415, 1168, 7910, 12453, 77, 4042, 4864, 1095, 64, 220, 9674, 20, 117368, 321, 92602, 392, 53835, 598, 6780, 110050, 1073, 8569, 36900, 48654, 5730, 11, 15593, 4864, 3273, 67107, 7910, 52006, 5047, 72, 37524, 9509, 831, 16023, 8783, 304, 1685, 301, 275, 10176, 348, 735, 6713, 73, 34078, 125853, 114813, 65, 2201, 1168, 7910, 12453, 77, 4042, 110050, 93123, -100 ]
Your Input Please - Dash, Nedplay to be closed! Your Input Please Dash, Nedplay to be closed! Discussion in 'Online Casinos' started by dunover, Feb 23, 2018. Well, looks like there's some consolidation going on here! 32Red and Roxy Palace continue to break records, leading by example in the online casino space and ensuring it's players are enriched by having best in class support and entertainment. Any existing players that you have from the decommissioning brands will be automatically migrated over to 32Red and Roxy Palace. We advise that if you are promoting any of the soon to be decommissioned brands anywhere on your site then this is the perfect opportunity to solely focus on the two brands of 32Red and Roxy Palace that will ensure you enjoy sustained and continued growth of your player base. Your revenue share deals will not be affected by these changes, however please do ensure that any links promoting these brands are changed to 32Red or Roxy Palace links so as to get the most from your traffic. It doesn't say when, something players need to know if they are going to join any of the MG tournaments, particularly the month long accumulator, as their in play tournaments will not be transferred. It may also be a useful move now that MG download casinos are beginning to take a back seat to browser based platforms. Concentrating on the brands that have both is probably better than trying to bring the others to the browser based system. mattsgame, KasinoKing and Mouche12 like this. They literally havent changed anything in a decade or so. Their tournaments are just wallet battles, bonuses are much lower than they used to be and they still only have one provider. Only thing they have changed is withdrawal times, and that was changed to worse. So im not surprised their sister sites are closing down tbh. They have great rep though and thats pretty much the only reason i sometimes deposit there. Other than that i really see no reason why should i play at a place with 300 games when there are casinos with 1300 or more slots, casinos that offer equalized races instead of "whoever spins the most over the course of a week, month or decade wins", and ive had 30 mins cashouts from random casinos while cashout at 32red takes forever compared 2018 standards. Valhalla, The Viking, shapesy and 2 others like this. One reason that they are one of the only casinos I play at: Video Poker. MGS video poker is unrivaled . I'll wait an extra day if that's what it takes to be playing VP. As for the consolidation - the writing has been on the wall for some time. Dash never really took off, and the other brands were ones that 32Red picked up when those operators bailed from the business. PaaskeDenmark, Mouche12, orion and 1 other person like this. My once vast list of installed mg casinos is down to the last two, Nedplay was the last of the 32red brand that still offered a (monthly) 100% bonus and the only one that has seen any action from me in the last year. nikantw and KasinoKing like this. Yeah keep Roxy Palace! I wonder why ,nothing to do with it's 50x wagering on bonuses I suppose. Going to miss my 100%(£25) monthly at Nedplay. Oh well more deposits to the CR vipers then as they are a lot more generous, a free £50 every few months, 125% match bonuses and lucky day bonuses all with a 30x wager. klauskunterbunt and nikantw like this. 28th Feb may see changes for UK players regarding bonuses, especially those that trap your cash deposit with WR. The UKGC has decided that players should be able to stop gambling at a time of their choosing and withdraw a decent win, rather than be forced to lose it back by having to keep on playing. This means casinos will have to redesign the way they run promotions for UK players. As with autoplay before, some casinos may simply stop offering bonuses to UK players rather than find a different way to offer them that complies with UKGC rules. The various leaderboards run by 32Red should be safe for now, unless the UKGC decides that offering prizes based on the amount wagered does not fit with the principles of Responsible Gambling, which is a distinct possibility. Possibly but I doubt it as many already keep bonus/cash funds separate and let you withdraw if you don't use the bonus. Some like Sunbets simply award you withdrawable cash based on real-money turnover over any amount of deposits, i.e. deposit 400 max and once 25x is wagered (10k of spins) the 400 cash is paid unrestricted, although some players don't like it as it's not a bonus up front. BGO simply award free spins of which returns are withdrawable cash with no restrictions, others like my old deal at Trada simply add withdrawable cash in £2 increments as you play. Midaur give you two separate funds with bonus/real and you can for example play bonus and get it up to the max 10x conversion amount, and then over subsequent cash play convert it into a withdrawable lump sum at the original match amount, or you simply don't play the bonus and do the same as Sunbets and convert it over x-amount of cash play. So there are numerous existing bonus types which won't be affected, but naturally 32Red and the Vipers will have to revise them for UK players. I doubt they'd not offer them at all as they are a falling market (Vipers) already and to kill bonuses would exacerbate the issue. I doubt your tournaments would be affected as they are a separate buy-in with clearly defined costs and aims for the player. have just been closed. All accounts will be transfered to Roxy within 24hrs. You have an email about this. Because of the transfer you will probably find yourselves with more than one Roxy acc.! This is strictly forbidden! You must contact support and ask them to close all but one! Otherwise all your 32red group accounts will be locked. I find it annoying that I have to contact 32Red or Roxy Palace to let them know I have an account with the other casinos. They are the ones closing and migrating the accounts so I think they should be the ones to close the duplicate accounts. I play at 32 Red with my account that I always play at. To have it closed because they have migrated accounts from closed casinos to 32 Red without any input from me is disgraceful. Really doesn't inspire me to deposit there. 32Red have gone way downhill in recent years. theapple, deepsky2 and bebo67 like this. I agree. I have played at a casino where they migrated last year, and they closed any accounts accordingly. Its just pure laziness. I believe they are asking because they don't know what accounts you would like to keep. I doubt they will have time to go through every players history to check where they play the most and then guess. It could go wrong too. I haven't got any mail. I have had accounts at the others also but since I never played I asked to get them closed a couple of years back. Otherwise I would have told them. cant say i care that much, they are still stuck in 90's when they were one of best casino groups but havent changed much since. They literally havent changed anything in a decade or so. True. 32Red are one of the few casinos to take active steps in making their brand worse, which would baffle anyone really. Also true. Amazes me that no other games developer has bothered to create VP worth a damn. Blows me away too. Everyone has tunnel vision towards slots. Slots, slots, slots and more slots. That's where the money is. I also think that VP is traditionally a US game - and since the US player has been pushed out of the market who gives a toss. Multi-strike poker is supposed to becoming on line as well. That would be awesome to see, but most Europeans wouldn't even know what I'm talking about or even care. Skimming over that comment my interest was certainly piqued, as I read it as 'multi- strip' poker. Alas, not wearing my designated visual enhancers or contact lenses I soon realized it wasn't. Shame. Isn't the biggest issue that casinos/software providers have with VP is that it has a really high RTP? Why run random games at 99% RTP when you can run random games at 95% RTP? Thanks for your comment. Sorry to hear you are not happy with the process. I'll be honest here, as usual. We have been trying to make this as seamless as possible for players and also give as much notice as we can. Sadly due to delays in testing and limited resources we had to lower the bar on quality in order to get it completed before some major regulation changes would have meant we would have only had the option to lock accounts completely. We could have looked for duplicates and closed automatically, but with little notice it was decided it's better to allow a grace period so players could withdraw balances and, as Tirilej says, decide which account they want to use. You'll be surprised how some people have 'lucky accounts' etc and have a personal preference. Sorry to hear you think we have gone downhill and I am sure you have many reasons, but rest assured we are still a reputable operator who will look after our players as best as possible. Betreels Casino, KasinoKing, ternur and 1 other person like this. To be honest I had to go look that up. If I'm playing the right one (a multiplier at each level?), it looks great and I would lose entire evenings playing it.
{ "redpajama_set_name": "RedPajamaC4" }
7,322
[ 128000, 7927, 5688, 5321, 482, 37770, 11, 71099, 1387, 311, 387, 8036, 4999, 7927, 5688, 5321, 37770, 11, 71099, 1387, 311, 387, 8036, 4999, 72121, 304, 364, 20171, 78004, 6, 3940, 555, 50116, 2017, 11, 13806, 220, 1419, 11, 220, 679, 23, 627, 11649, 11, 5992, 1093, 1070, 596, 1063, 60732, 2133, 389, 1618, 4999, 843, 6161, 323, 12093, 4223, 31396, 3136, 311, 1464, 7576, 11, 6522, 555, 3187, 304, 279, 2930, 12109, 3634, 323, 23391, 433, 596, 4311, 527, 69671, 555, 3515, 1888, 304, 538, 1862, 323, 16924, 627, 8780, 6484, 4311, 430, 499, 617, 505, 279, 29602, 2796, 287, 16097, 690, 387, 9651, 73691, 927, 311, 220, 843, 6161, 323, 12093, 4223, 31396, 627, 1687, 32113, 430, 422, 499, 527, 22923, 904, 315, 279, 5246, 311 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 7927, 5688, 5321, 482, 37770, 11, 71099, 1387, 311, 387, 8036, 4999, 7927, 5688, 5321, 37770, 11, 71099, 1387, 311, 387, 8036, 4999, 72121, 304, 364, 20171, 78004, 6, 3940, 555, 50116, 2017, 11, 13806, 220, 1419, 11, 220, 679, 23, 627, 11649, 11, 5992, 1093, 1070, 596, 1063, 60732, 2133, 389, 1618, 4999, 843, 6161, 323, 12093, 4223, 31396, 3136, 311, 1464, 7576, 11, 6522, 555, 3187, 304, 279, 2930, 12109, 3634, 323, 23391, 433, 596, 4311, 527, 69671, 555, 3515, 1888, 304, 538, 1862, 323, 16924, 627, 8780, 6484, 4311, 430, 499, 617, 505, 279, 29602, 2796, 287, 16097, 690, 387, 9651, 73691, 927, 311, 220, 843, 6161, 323, 12093, 4223, 31396, 627, 1687, 32113, 430, 422, 499, 527, 22923, 904, 315, 279, 5246, 311, -100 ]
The society they live is generally very prejudicial to girls, consigning them to the kitchen alongside their mothers, giving them the menial tasks around the village or the fire circle, defining their future roles to be wife, homemaker, and mother, or, if they are lucky, they might be a healer, or a seamstress, or a craft person. If they're really, really lucky, they're royalty, a princess, although then they have no useful tasks at all as those are taken care of by the servants and nannies; they are responsible only for embroidery, french, and spinett, and of course, marrying the man of their father's choice. But our character, our intrepid exceptional girl, desires more than that. She, alone, among the dozens or hundreds of girls in her town, village, or castle, has curiosity, ambition, a sense of adventure, a sense of humor, and a streak of rebellion. She is unique -- a smart, brave, and adventurous heroine. It is fast becoming a hackneyed trope of many genres. Felicity or Josephina of the American Girl series; Alanna of the Lioness Rampant; Pai in Whale Rider; Catherine in Catherine Called Birdy; Alexa in the Dark Hills Divide. The list goes on and on. In fact, this list includes an amazing proportion of the current selections in young adult literature with girl heros (even in adult literature with female heros). I imagine most of the authors of books featuring such an exceptional girl think they are writing feminist books -- giving us inspiring role models that every girl can aspire toward. It seems me, however, their very exceptionality shoots that goal in the foot. They are more often than not a single, shining example in a society full of women who, like downtrodden sheep, follow the social norms, happily living out their lives as mothers and housewives. Anyway... the message is obvious: only unique and extrodinary girls can hope to escape the age-old routine. Of course, one could argue that the heroine is an example of why that society is a failure, but more often than not, the girl's adventure creates no change in society, not even an awareness that change might be a good thing; nor does she seek to change her society so that other girls might enjoy the same freedoms she has been enjoying during the book, she just wants to free herself from the yoke of patriarchy. Another lovely example for our young girls to follow -- hedonistic feminism, rather than one that cares about the plight of our sisters! In fact, more often than not, the reader is left with the distinct feeling at the end of the book that, having gotten over her wild ways, the heroine is now going to settle down and toe the line, marry her sweetheart and be a good wife to him and selfless mother to his children. I'd really like to see more books where women and men are equals, or at least for the most part equals, books where the heroine is smart, brave and adventurous, but that doesn't make her one of a kind. There are some where the elite men and women are pretty much equal, while the impoverished masses are traditional, which is a step in the right direction (education and leisure after all leads to empowerment), but I'd really like more of the men and women are just different genders of human and its the human that really counts, not the male or female. Of course, in historical fiction that isn't really possible, but then, possible doesn't seem to stop the writers of pop historical fiction from having girl characters whose attitudes are decidedly 20th century. But for writers of fantasy and/or sf, there is little excuse. Lets imagine new possibilities, rather than sink into the Star Trek, Star Wars, patriarchy is as inevitable as Death and Taxes. Good points, all. (Do goals have feet, though?) It's too easy to fall into tropes, including Star Trek-like settings. How hard it has become to be truly original! Characters, in fact, are almost the only ground a writer can plough thoroughly and inventively, because political/social settings have been tried every which way. Even matriarchies have been explored (I'm thinking of The Gate to Women's Country, et al.) Keep pushing us, Pamela!
{ "redpajama_set_name": "RedPajamaC4" }
6,073
[ 128000, 791, 8396, 814, 3974, 374, 8965, 1633, 34920, 7235, 311, 7724, 11, 1615, 625, 287, 1124, 311, 279, 9979, 16662, 872, 27698, 11, 7231, 1124, 279, 3026, 532, 9256, 2212, 279, 14458, 477, 279, 4027, 12960, 11, 27409, 872, 3938, 13073, 311, 387, 7555, 11, 5105, 59775, 11, 323, 6691, 11, 477, 11, 422, 814, 527, 18069, 11, 814, 2643, 387, 264, 98211, 11, 477, 264, 27494, 95290, 11, 477, 264, 11003, 1732, 13, 1442, 814, 2351, 2216, 11, 2216, 18069, 11, 814, 2351, 53817, 11, 264, 40688, 11, 8051, 1243, 814, 617, 912, 5505, 9256, 520, 682, 439, 1884, 527, 4529, 2512, 315, 555, 279, 42832, 323, 308, 94342, 26, 814, 527, 8647, 1193, 369, 85927, 11, 42293, 11, 323, 12903, 7211, 11, 323, 315, 3388 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 791, 8396, 814, 3974, 374, 8965, 1633, 34920, 7235, 311, 7724, 11, 1615, 625, 287, 1124, 311, 279, 9979, 16662, 872, 27698, 11, 7231, 1124, 279, 3026, 532, 9256, 2212, 279, 14458, 477, 279, 4027, 12960, 11, 27409, 872, 3938, 13073, 311, 387, 7555, 11, 5105, 59775, 11, 323, 6691, 11, 477, 11, 422, 814, 527, 18069, 11, 814, 2643, 387, 264, 98211, 11, 477, 264, 27494, 95290, 11, 477, 264, 11003, 1732, 13, 1442, 814, 2351, 2216, 11, 2216, 18069, 11, 814, 2351, 53817, 11, 264, 40688, 11, 8051, 1243, 814, 617, 912, 5505, 9256, 520, 682, 439, 1884, 527, 4529, 2512, 315, 555, 279, 42832, 323, 308, 94342, 26, 814, 527, 8647, 1193, 369, 85927, 11, 42293, 11, 323, 12903, 7211, 11, 323, 315, 3388, -100 ]
The House Energy and Commerce Committee, which has jurisdiction over telecommunications companies like Twitter, is now investigating Twitter CEO Jack Dorsey for lying under oath during his testimony before the committee. Twitter CEO Jack Dorsey Lied Under Oath To Congress. Shouldn't That Matter? Jack Dorsey is allowed to lie, and those who push the Trans agenda are allowed to lie, and if you push back with the truth, you eventually find you have no place on Twitter. Alexandria Ocasio-Cortez has gotten a lot of support after mentioning her apartment hunting woes. That wasn't true when Sean Duffy said something similar. Congressman Mike Gallagher joins Federalist Radio to discuss healthcare, Veterans, process reforms, and Green Bay football. Dan Crenshaw is an American hero, a patriot, and a man compelled to serve his nation beyond the sacrifice he's already given in military service. He's also quite handsome. The Democratic Party has spent two years at a crossroad. In this election it may finally choose a path. The Center for Medical Progress submitted evidence to a federal judge to back up a new accusation Planned Parenthood may have lied to Congress. A letter from four congressmen demanding Russia probe documents remain secret raises some important questions about where abuse of power is really happening in the Trump administration. Twenty-four state legislatures that ratified the Equal Rights Amendment included the seven-year limit when they voted to add the ERA to the Constitution. How are 41- to 46-year-old state 'ratifications' valid today? Critics are calling for Congress to force the popular platforms to open their codebooks. This would be bad for those companies and for consumers. Republicans need to do an end run around the media by means of millions of friendly one-on-one conversations between voters.
{ "redpajama_set_name": "RedPajamaC4" }
333
[ 128000, 791, 4783, 12634, 323, 31480, 10554, 11, 902, 706, 29101, 927, 62866, 5220, 1093, 6405, 11, 374, 1457, 24834, 6405, 12432, 7762, 25225, 8674, 369, 21078, 1234, 49042, 2391, 813, 24365, 1603, 279, 13093, 627, 25904, 12432, 7762, 25225, 8674, 445, 1142, 9636, 507, 589, 2057, 8151, 13, 12540, 77, 956, 3011, 34464, 5380, 33731, 25225, 8674, 374, 5535, 311, 10457, 11, 323, 1884, 889, 4585, 279, 4149, 18909, 527, 5535, 311, 10457, 11, 323, 422, 499, 4585, 1203, 449, 279, 8206, 11, 499, 9778, 1505, 499, 617, 912, 2035, 389, 6405, 627, 28487, 438, 4298, 507, 25295, 822, 7813, 371, 10333, 706, 17454, 264, 2763, 315, 1862, 1306, 45391, 1077, 13455, 23330, 77825, 13, 3011, 5828, 956, 837, 994, 26044, 86962, 1071, 2555, 4528, 627, 65963 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 791, 4783, 12634, 323, 31480, 10554, 11, 902, 706, 29101, 927, 62866, 5220, 1093, 6405, 11, 374, 1457, 24834, 6405, 12432, 7762, 25225, 8674, 369, 21078, 1234, 49042, 2391, 813, 24365, 1603, 279, 13093, 627, 25904, 12432, 7762, 25225, 8674, 445, 1142, 9636, 507, 589, 2057, 8151, 13, 12540, 77, 956, 3011, 34464, 5380, 33731, 25225, 8674, 374, 5535, 311, 10457, 11, 323, 1884, 889, 4585, 279, 4149, 18909, 527, 5535, 311, 10457, 11, 323, 422, 499, 4585, 1203, 449, 279, 8206, 11, 499, 9778, 1505, 499, 617, 912, 2035, 389, 6405, 627, 28487, 438, 4298, 507, 25295, 822, 7813, 371, 10333, 706, 17454, 264, 2763, 315, 1862, 1306, 45391, 1077, 13455, 23330, 77825, 13, 3011, 5828, 956, 837, 994, 26044, 86962, 1071, 2555, 4528, 627, 65963, -100 ]
GFA jabs South Africa FA again in their response to Fifa over protest The Ghana Football Association in another strongly worded statement have responded to Fifa over the allegations and protest made by the South Africa FA after their defeat to the Black Stars in the World Cup qualifier game in Cape Coast. The Ghana FA among others stated in their response to Fifa that the South African FA filed their protest wrongly, and thus should be null/void. Again, the GFA noted that SAFA did not provide any evidence in their protest or allegations and so Fifa should throw out their case. The GFA's response which was forwarded to Fifa November 20, 2021 noted that SAFA have wasted everyone's time and must be fined for tarnishing the image of Ghana and the World Cup brand. Read GFA's full statement to Fifa below; Mandatory Provision Citing Article 14 (2) of the Regulations FIFA World Cup 2022 Preliminary Competition to back its claims, the GFA argued that SAFA had failed to follow laid down procedures and timelines of lodging protest after a game. The said provision states, "Unless otherwise stipulated in this article, protests SHALL BE submitted in writing to the FIFA Match Commissioner within two hours of the match in question and followed up with a full written report, including a copy of the original protest, to be sent by email to the FIFA General Secretariat within 24hours of the end of the match, otherwise they shall be disregarded." To the GFA, since its counterpart in South Africa failed to meet the requirement of that mandatory provision, their protest should be considered as unmeritorious. READ ALSO Former Black Stars defender Samuel Inkoom joins Hearts of Oak Referee's Conduct "Wrongful & Unlawful" SAFA, had earlier called on the world football's governing body to investigate what it termed as "wrongful and unlawful conduct of the match referee and other officials, concerning match fixing, match manipulation including corruption and bribery". This was after what it (SAFA) claims were a number of questionable decisions throughout the match. Their bone of contention was the penalty decision that helped Ghana win the crucial match 1-0 at the Cape Coast Sports stadium. The spot kick was awarded when Daniel Amartey went down for what the referee Maguette Ndiaye considered as obstruction by defender Rushine de Reuck. Andre Ayew stepped up to score the penalty which sent the Black Stars through to the final stage of qualification and ended South Africa's dreams of playing at Qatar 2022. FIFA Angle On Wednesday, ​FIFA confirmed that it has received SAFA's official protest and said it would be considered by the Disciplinary Committee on November 23. FIFA subsequently wrote to the Ghana FA and asked that the latter sends a response to the petition latest by close of day (Saturday). Impose "Fine" For "Fishing Expedition" The GFA, in its official response to FIFA, further described the SAFA protest as a fishing expedition lacking in merit, and rather urged FIFA to impose a huge fine on SAFA for seeking to tarnish the World Cup brand and Ghana's image, to serve as a deterrent to others. "SAFA seeks to send the respected FIFA Disciplinary Committee on a fool's errand or fishing without any direction or evidence whatsoever….the failure to provide prima facie evidence (infact no evidence was provided whatsoever) must be punished severely by the respected Disciplinary Committee. Reputations made over years must not be allowed to be tarnished this way. Note that no mention was made of any Ghanaian officials engaged in match-fixing, corruption or betting," portions of the GFA's strongly worded response read. READ ALSO Real Madrid President, Florentino Perez tests positive for coronavirus Inaki Williams: 10 things you should know about new Ghana striker Mohammed Salisu is now ready to play for the Black Stars – Report "I'm one of the Black Stars" – Inaki Williams switches nationality to Ghana
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
1,543
[ 128000, 38, 3711, 503, 3518, 4987, 10384, 15358, 1578, 304, 872, 2077, 311, 19009, 64, 927, 8835, 198, 791, 48668, 21424, 10229, 304, 2500, 16917, 3492, 291, 5224, 617, 16846, 311, 19009, 64, 927, 279, 18873, 323, 8835, 1903, 555, 279, 4987, 10384, 15358, 1306, 872, 18506, 311, 279, 5348, 25676, 304, 279, 4435, 11098, 61747, 1847, 304, 29715, 16377, 627, 791, 48668, 15358, 4315, 3885, 11224, 304, 872, 2077, 311, 19009, 64, 430, 279, 4987, 11904, 15358, 13019, 872, 8835, 72309, 11, 323, 8617, 1288, 387, 854, 14, 1019, 627, 31485, 11, 279, 480, 3711, 10555, 430, 16998, 3711, 1550, 539, 3493, 904, 6029, 304, 872, 8835, 477, 18873, 323, 779, 19009, 64, 1288, 2571, 704, 872, 1162, 627, 791, 480, 3711, 596, 2077, 902, 574, 53346 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 38, 3711, 503, 3518, 4987, 10384, 15358, 1578, 304, 872, 2077, 311, 19009, 64, 927, 8835, 198, 791, 48668, 21424, 10229, 304, 2500, 16917, 3492, 291, 5224, 617, 16846, 311, 19009, 64, 927, 279, 18873, 323, 8835, 1903, 555, 279, 4987, 10384, 15358, 1306, 872, 18506, 311, 279, 5348, 25676, 304, 279, 4435, 11098, 61747, 1847, 304, 29715, 16377, 627, 791, 48668, 15358, 4315, 3885, 11224, 304, 872, 2077, 311, 19009, 64, 430, 279, 4987, 11904, 15358, 13019, 872, 8835, 72309, 11, 323, 8617, 1288, 387, 854, 14, 1019, 627, 31485, 11, 279, 480, 3711, 10555, 430, 16998, 3711, 1550, 539, 3493, 904, 6029, 304, 872, 8835, 477, 18873, 323, 779, 19009, 64, 1288, 2571, 704, 872, 1162, 627, 791, 480, 3711, 596, 2077, 902, 574, 53346, -100 ]
ABB and Hydrogen Optimized expand partnership, announce strategic investment The companies will leverage their respective capabilities and resources to commercialize HOI's patented RuggedCell™ water electrolysis technology. August 24, 2022 By Canadian Manufacturing Prime Minister Justin Trudeau and German Chancellor Olaf Scholz discuss the importance of green hydrogen production to the two countries' economic and energy futures. In turn, ABB Process Industries President Joachim Braun (2nd from R) and Hydrogen Optimized CEO Andrew Stuart (R) explain how ABB high-powered rectifiers support Hydrogen Optimized's RuggedCell technology in using wind power to produce hydrogen at scale. The leaders met at the German-Canadian Atlantic Renewable Hydrogen Expo in Stephenville, Newfoundland Aug. 23. (CNW Group/Hydrogen Optimized Inc.) ZURICH and OWEN SOUND — ABB and Hydrogen Optimized Inc. (HOI), a company trying to manufacture green hydrogen at scale, have signed an agreement to expand the companies' existing strategic relationship. This includes an investment by ABB into Key DH Technologies Inc. (KEY), the parent company of HOI, as they seek to accelerate the fast-emerging green hydrogen production segment with unique large-scale architecture. The financial terms of the agreement were not disclosed. The signing follows the two companies' showcase of their green hydrogen technologies at the August 23, 2022 German-Canadian Atlantic Renewable Hydrogen Expo in Stephenville, Newfoundland, which was attended by Canadian Prime Minister Justin Trudeau and German Chancellor Olaf Scholz. Hydrogen produced with low-to-zero carbon dioxide emissions is widely recognized as essential to achieving net-zero emissions by 2050. By accelerating the strategic collaboration between ABB and HOI launched in 2020, the two companies are advancing the deployment of economic large-scale green hydrogen production systems to decarbonize hard-to-abate industries that address a wide range of essential needs – energy, metals, cement, utilities, ammonia, fertilizers, and fuels for aircraft, ships, trucks and rail. The companies will leverage their respective capabilities and resources to commercialize HOI's patented RuggedCell water electrolysis technology for green hydrogen plants. Water electrolysis is the process of applying electrical energy to split water into hydrogen and oxygen. RuggedCell technology converts renewable electricity such as hydro, solar and wind power into green hydrogen for industry. "We look forward to building on our companies' two-year working relationship to pursue the enormous global opportunity of green hydrogen," said Joachim Braun, Division President, ABB Process Industries. "Following a rigorous validation of the RuggedCell technology, we are confident that, in combination with ABB's high-power rectifiers, it can become a category leader in the large-scale green hydrogen segment. Our complementary technologies will strengthen the Hydrogen Optimized value proposition and fast-track the commercialization of the RuggedCell ." "This agreement positions us for success in the large-scale segment with customers requiring installations in the hundreds of megawatts to multi-gigawatts," said Andrew T. B. Stuart, President and CEO of KEY and HOI. "ABB's global footprint, commercial relationships and technology leadership in high-power rectifiers, distributed control systems and manufacturing automation provide us with the market reach and capabilities to achieve our company's goals." Global electrolyzer capacity will reach an estimated 3,100 gigawatts by 2050, according to a June 2022 report published by DNV. The group forecasts that electricity-based green hydrogen will be the dominant form of hydrogen production by the middle of this century, accounting for 72 percent of output. The proceeds of ABB's investment into KEY, led by ABB Technology Ventures (ATV), will be used to advance HOI's intellectual property development, build up corporate capabilities for increased business activity and introduce automated manufacturing and robotics. This will reportedly accelerate the rollout of gigawatt-scale electrolyzer manufacturing. Next Hydrogen signs MoU with Black & Veatch to develop green hydrogen solutions Hyundai and Kia announce collaboration with Next Hydrogen to develop water electrolysis system HPQ launches a new green hydrogen extraction technology venture Li-Cycle and Glencore announce strategic partnership Rock Tech Lithium Imc. announces that they will provide lithium hydroxide to Mercedes-Benz AG Hydrostor selects Kiewit to advance engineering for energy storage project
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
4,845
[ 128000, 45422, 323, 40602, 4469, 31197, 1534, 9407, 15664, 11, 22203, 19092, 9341, 198, 791, 5220, 690, 33164, 872, 20081, 17357, 323, 5070, 311, 8518, 553, 31350, 40, 596, 63712, 432, 20752, 3683, 16500, 3090, 73396, 14744, 5557, 627, 32559, 220, 1187, 11, 220, 2366, 17, 3296, 12152, 42177, 198, 33406, 9675, 23278, 44809, 323, 6063, 48063, 12225, 2642, 5124, 337, 89, 4358, 279, 12939, 315, 6307, 35784, 5788, 311, 279, 1403, 5961, 6, 7100, 323, 4907, 37923, 13, 763, 2543, 11, 362, 10306, 8773, 37528, 4900, 11186, 613, 318, 70703, 320, 17, 303, 505, 432, 8, 323, 40602, 4469, 31197, 1534, 12432, 13929, 44632, 320, 49, 8, 10552, 1268, 362, 10306, 1579, 41503, 7763, 12099, 1862, 40602, 4469, 31197, 1534, 596, 432, 20752, 3683, 5557, 304, 1701 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 45422, 323, 40602, 4469, 31197, 1534, 9407, 15664, 11, 22203, 19092, 9341, 198, 791, 5220, 690, 33164, 872, 20081, 17357, 323, 5070, 311, 8518, 553, 31350, 40, 596, 63712, 432, 20752, 3683, 16500, 3090, 73396, 14744, 5557, 627, 32559, 220, 1187, 11, 220, 2366, 17, 3296, 12152, 42177, 198, 33406, 9675, 23278, 44809, 323, 6063, 48063, 12225, 2642, 5124, 337, 89, 4358, 279, 12939, 315, 6307, 35784, 5788, 311, 279, 1403, 5961, 6, 7100, 323, 4907, 37923, 13, 763, 2543, 11, 362, 10306, 8773, 37528, 4900, 11186, 613, 318, 70703, 320, 17, 303, 505, 432, 8, 323, 40602, 4469, 31197, 1534, 12432, 13929, 44632, 320, 49, 8, 10552, 1268, 362, 10306, 1579, 41503, 7763, 12099, 1862, 40602, 4469, 31197, 1534, 596, 432, 20752, 3683, 5557, 304, 1701, -100 ]
get '/drafts' do @user = login_filter required_status: false, required_roles: false @title = "我的草稿" erb :user_drafts end get '/draft/:id' do |id| user = login_filter required_status: false, required_roles: false draft = user.drafts.where(id: id).first unless draft return json ret: "error", msg: "该用户没有id为#{id}的草稿" end json ret: "success", type: draft.draft_type, content: draft.content end post '/draft/:id/delete' do |id| user = login_filter required_status: false, required_roles: false draft = user.drafts.where(id: id).first unless draft return json ret: "error", msg: "该用户没有id为#{id}的草稿" end begin draft.destroy! rescue json ret: "error", msg: "删除草稿失败" end json ret: "success" end post '/draft' do user = login_filter required_status: false, required_roles: false title = ERB::Util.h params['title'] if title.nil? || title.empty? title = "草稿" end title = title + " " + Time.now.localtime.strftime("%I:%M:%S%P") case params['type'] when 'question'.freeze then type = 0 when 'article'.freeze then type = 1 else return json ret: "error", msg: "错误的草稿类型 #{ params['type'] }" end data = params['data'] draft = Draft.new draft.title = title draft.draft_type = type draft.content = data draft.user_id = user.id if draft.valid? if user.drafts.count >= 10 oldest = user.drafts.first oldest.destroy end draft.save json ret: "success", msg: draft.id else json ret: "failed", msg: "draft save failed" end end
{ "redpajama_set_name": "RedPajamaGithub" }
4,375
[ 128000, 456, 3434, 46097, 82, 6, 656, 198, 220, 571, 882, 284, 5982, 8901, 2631, 4878, 25, 905, 11, 2631, 44161, 25, 905, 198, 220, 571, 2150, 284, 330, 98711, 105301, 83932, 702, 220, 68748, 551, 882, 92439, 82, 198, 408, 271, 456, 3434, 46097, 11567, 307, 6, 656, 765, 307, 7511, 220, 1217, 284, 5982, 8901, 2631, 4878, 25, 905, 11, 2631, 44161, 25, 905, 198, 220, 10165, 284, 1217, 962, 3017, 82, 18486, 3809, 25, 887, 570, 3983, 271, 220, 7389, 10165, 198, 262, 471, 3024, 2160, 25, 330, 850, 498, 3835, 25, 330, 76982, 20600, 81543, 307, 18184, 12297, 307, 92, 9554, 105301, 83932, 702, 220, 842, 198, 220, 3024, 2160, 25, 330, 5748, 498, 955, 25, 10165, 962, 3017, 1857, 11, 2262, 25, 10165 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 456, 3434, 46097, 82, 6, 656, 198, 220, 571, 882, 284, 5982, 8901, 2631, 4878, 25, 905, 11, 2631, 44161, 25, 905, 198, 220, 571, 2150, 284, 330, 98711, 105301, 83932, 702, 220, 68748, 551, 882, 92439, 82, 198, 408, 271, 456, 3434, 46097, 11567, 307, 6, 656, 765, 307, 7511, 220, 1217, 284, 5982, 8901, 2631, 4878, 25, 905, 11, 2631, 44161, 25, 905, 198, 220, 10165, 284, 1217, 962, 3017, 82, 18486, 3809, 25, 887, 570, 3983, 271, 220, 7389, 10165, 198, 262, 471, 3024, 2160, 25, 330, 850, 498, 3835, 25, 330, 76982, 20600, 81543, 307, 18184, 12297, 307, 92, 9554, 105301, 83932, 702, 220, 842, 198, 220, 3024, 2160, 25, 330, 5748, 498, 955, 25, 10165, 962, 3017, 1857, 11, 2262, 25, 10165, -100 ]
History and Criminology (Including Placement Year) UCAS Code: MV92 A levelAccess to HE DiplomaInternational Baccalaureate Diploma ProgrammePearson BTEC Level 3 National Extended Diploma (first teaching from September 2016)UCAS Tariff A-levelAccess to HE DiplomaInternational Baccalaureate Diploma ProgrammePearson BTEC Level 3 National Extended Diploma (first teaching from September 2016)UCAS Tariff B,B,B M:45 We are happy to consider a combination of separate IB Diploma Programmes at both Higher and Standard Level. Exact offer levels will vary depending on the range of subjects being taken at higher and standard level, and the course applied for. Please contact the Undergraduate Admissions Office for more information. Entry requirements for students studying BTEC qualifications are dependent on subjects studied. Advice can be provided on an individual basis. The standard required is generally at Distinction level. Sandwich | 2020 Join us on an intellectual journey through the past. You obtain a thorough grounding in history and criminology, and are encouraged to consider the ways in which histories of crime and the discipline of criminology overlap and influence each other. You take the module Introduction to Crime, Law and Society alongside history modules in your first year, and continue to combine modules in history and criminology in your second and third years. Our history modules explore history through the eyes of ordinary people, giving them the voice they often lacked at the time. Our criminology modules explore the nature of crime, criminal justice and punishment within wider social contexts. There range of relevant options to choose from in both disciplines means you can choose the focus of your final-year dissertation. You spend your third year on a placement gaining relevant work experience within an external business or organisation, giving you a competitive edge in the graduate job market and providing you with key contacts within the industry. Colchester Campus HistorySociology Other elementary services occupations History is a very popular subject (although numbers have fallen of late) — in 2015, over 10,000 UK students graduated in a history-related course. Obviously, there aren't 11,000 jobs as historians available every year, but history is a good, flexible degree that allows graduates to go into a wide range of different jobs, and consequently history graduates have an unemployment rate comparable to the national graduate average. Many — probably most — jobs for graduates don't ask for a particular degree to go into them and history graduates are well set to take advantage. That's why so many go into jobs in the finance industry, human resources, marketing, PR and events management, as well as the more obvious roles in education, welfare and the arts. Around one in five history graduates went into further study last year. History and teaching were the most popular further study subjects for history graduates, but law, journalism, and politics were also popular postgraduate courses. We have quite a lot of sociology graduates, although numbers fell last year. But graduates still do pretty well. Most sociology graduates go straight into work when they complete their degrees, and a lot of graduates go into jobs in social professions such as recruitment, education, community and youth work, and housing. An important option for a sociology graduate is social work - and we're short of people willing to take this challenging but rewarding career. Sociology is a flexible degree and you can find graduates from the subject in pretty much every reasonable job — obviously, you don't find many doctors or engineers, but you do find them in finance, the media, healthcare, marketing and even IT. Sociology graduates taking further study often branch out into other qualifications, like teaching, law, psychology, HR and even maths, so don't think a sociology degree restricts you to just one set of options. HistoryCriminology What's it like studying a degree in History History and Criminology (Including Foundation Year) 4.0 years | Sandwich | 2020 History and Social Anthropology History and Criminology & Criminal Justice History and Criminology
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
7,847
[ 128000, 13730, 323, 4656, 61334, 2508, 320, 84549, 78516, 9941, 340, 5576, 1950, 6247, 25, 43371, 6083, 198, 32, 2237, 6182, 311, 11947, 77131, 34746, 426, 4575, 6181, 554, 349, 77131, 47516, 92140, 942, 426, 2505, 34, 9580, 220, 18, 5165, 41665, 77131, 320, 3983, 12917, 505, 6250, 220, 679, 21, 8, 5576, 1950, 24912, 3168, 198, 32, 11852, 6182, 311, 11947, 77131, 34746, 426, 4575, 6181, 554, 349, 77131, 47516, 92140, 942, 426, 2505, 34, 9580, 220, 18, 5165, 41665, 77131, 320, 3983, 12917, 505, 6250, 220, 679, 21, 8, 5576, 1950, 24912, 3168, 198, 33, 8324, 8324, 198, 44, 25, 1774, 198, 1687, 527, 6380, 311, 2980, 264, 10824, 315, 8821, 12373, 77131, 6826, 9004, 520, 2225, 35321, 323, 12028, 9580, 13, 75580, 3085, 5990, 690 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 13730, 323, 4656, 61334, 2508, 320, 84549, 78516, 9941, 340, 5576, 1950, 6247, 25, 43371, 6083, 198, 32, 2237, 6182, 311, 11947, 77131, 34746, 426, 4575, 6181, 554, 349, 77131, 47516, 92140, 942, 426, 2505, 34, 9580, 220, 18, 5165, 41665, 77131, 320, 3983, 12917, 505, 6250, 220, 679, 21, 8, 5576, 1950, 24912, 3168, 198, 32, 11852, 6182, 311, 11947, 77131, 34746, 426, 4575, 6181, 554, 349, 77131, 47516, 92140, 942, 426, 2505, 34, 9580, 220, 18, 5165, 41665, 77131, 320, 3983, 12917, 505, 6250, 220, 679, 21, 8, 5576, 1950, 24912, 3168, 198, 33, 8324, 8324, 198, 44, 25, 1774, 198, 1687, 527, 6380, 311, 2980, 264, 10824, 315, 8821, 12373, 77131, 6826, 9004, 520, 2225, 35321, 323, 12028, 9580, 13, 75580, 3085, 5990, 690, -100 ]
The most common question I receive is "where is my tank located?" To be honest, I have no idea. If I have never been to your house before the how could I know? There are a few "tricks" though. Any single story house built before 1973 will probably have the tank located 10 feet outside the main bathroom. This tank will have a single lid in the center of the tank and two small inspection lids on each end. After 1973 you should have a dual compartment tank which will have a lid over each compartment. These lids are usually over the extreme ends of the tank. One over the end closest to the house and another one about 6 feet away from the first one.
{ "redpajama_set_name": "RedPajamaC4" }
9,021
[ 128000, 791, 1455, 4279, 3488, 358, 5371, 374, 330, 2940, 374, 856, 13192, 7559, 7673, 2057, 387, 10978, 11, 358, 617, 912, 4623, 13, 1442, 358, 617, 2646, 1027, 311, 701, 3838, 1603, 279, 1268, 1436, 358, 1440, 30, 2684, 527, 264, 2478, 330, 376, 5908, 1, 3582, 627, 8780, 3254, 3446, 3838, 5918, 1603, 220, 4468, 18, 690, 4762, 617, 279, 13192, 7559, 220, 605, 7693, 4994, 279, 1925, 15197, 13, 1115, 13192, 690, 617, 264, 3254, 27431, 304, 279, 4219, 315, 279, 13192, 323, 1403, 2678, 26767, 100078, 389, 1855, 842, 627, 6153, 220, 4468, 18, 499, 1288, 617, 264, 19091, 44598, 13192, 902, 690, 617, 264, 27431, 927, 1855, 44598, 13, 4314, 100078, 527, 6118, 927, 279, 14560, 10548, 315, 279, 13192, 13, 3861, 927 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 791, 1455, 4279, 3488, 358, 5371, 374, 330, 2940, 374, 856, 13192, 7559, 7673, 2057, 387, 10978, 11, 358, 617, 912, 4623, 13, 1442, 358, 617, 2646, 1027, 311, 701, 3838, 1603, 279, 1268, 1436, 358, 1440, 30, 2684, 527, 264, 2478, 330, 376, 5908, 1, 3582, 627, 8780, 3254, 3446, 3838, 5918, 1603, 220, 4468, 18, 690, 4762, 617, 279, 13192, 7559, 220, 605, 7693, 4994, 279, 1925, 15197, 13, 1115, 13192, 690, 617, 264, 3254, 27431, 304, 279, 4219, 315, 279, 13192, 323, 1403, 2678, 26767, 100078, 389, 1855, 842, 627, 6153, 220, 4468, 18, 499, 1288, 617, 264, 19091, 44598, 13192, 902, 690, 617, 264, 27431, 927, 1855, 44598, 13, 4314, 100078, 527, 6118, 927, 279, 14560, 10548, 315, 279, 13192, 13, 3861, 927, -100 ]
List of Highest Paying State For NYSC in Nigeria. Are you a prospective corp member? Or are you still an undergraduate and want to have an idea of highest paying NYSC states in Nigeria? Well, this article will do you much favor in listing all of the highest paying states and equally how much they pay. One of the criteria of selecting NYSC state by prospective corp members during registration during registration is definitely the stipend paid by the state. This situation often at times result in choosing or re-deploying massively to certain states that pays high, a typical example has to be Lagos state, Akwa Ibom and Previously Enugu. But you sure have to know that selecting a particular state during registration does not guarantee the posting outcome as NYSC ca choose to post to any state of their choice. Years back a greater number of state had been paying stipends to corp members serving in their state compared to what we are having now, much reason can't really be attached as to why most of these states are not paying maybe the economic situation of the nation and in some situation just personal refusal of state governors to pay thinking it is irrelevant. Several article have been written on this very topic which are far too misleading prompting us to come up with this. We put in our best of effort during this data collection and tried delivering the most accurate information to you. Here is the list of states and how much they pay. From our table above you can see the states that pay and those that does not, it changes though for instance Akwa Ibom state before now use to get a higher pay but different government with their different scale of payment. However, this is what is obtainable as at the time this post is written and we shall continuously update and make changes where necessary. People have really been misinformed on this very subject matter, we have seen several post of highest paying states in Nigeria but most of them end up giving the wrong figures prompting us to go on thorough research and come out with this article. Like I said, this never stays for long as different governors and government come in with different policy and may choose to increase, decrease, start or stop paying as the case may be. Just hoping this was helpful, you can air your view in the comment box below.
{ "redpajama_set_name": "RedPajamaC4" }
4,707
[ 128000, 861, 315, 60713, 11728, 287, 3314, 1789, 12551, 3624, 304, 29258, 627, 11787, 499, 264, 33547, 37566, 4562, 30, 2582, 527, 499, 2103, 459, 41534, 323, 1390, 311, 617, 459, 4623, 315, 8592, 12798, 12551, 3624, 5415, 304, 29258, 30, 8489, 11, 420, 4652, 690, 656, 499, 1790, 4799, 304, 15182, 682, 315, 279, 8592, 12798, 5415, 323, 18813, 1268, 1790, 814, 2343, 627, 4054, 315, 279, 13186, 315, 27397, 12551, 3624, 1614, 555, 33547, 37566, 3697, 2391, 12506, 2391, 12506, 374, 8659, 279, 43773, 408, 7318, 555, 279, 1614, 627, 2028, 6671, 3629, 520, 3115, 1121, 304, 19301, 477, 312, 6953, 2760, 287, 64807, 311, 3738, 5415, 430, 21935, 1579, 11, 264, 14595, 3187, 706, 311, 387, 77096, 1614, 11, 16762, 10196, 58597, 316, 323, 59787 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 861, 315, 60713, 11728, 287, 3314, 1789, 12551, 3624, 304, 29258, 627, 11787, 499, 264, 33547, 37566, 4562, 30, 2582, 527, 499, 2103, 459, 41534, 323, 1390, 311, 617, 459, 4623, 315, 8592, 12798, 12551, 3624, 5415, 304, 29258, 30, 8489, 11, 420, 4652, 690, 656, 499, 1790, 4799, 304, 15182, 682, 315, 279, 8592, 12798, 5415, 323, 18813, 1268, 1790, 814, 2343, 627, 4054, 315, 279, 13186, 315, 27397, 12551, 3624, 1614, 555, 33547, 37566, 3697, 2391, 12506, 2391, 12506, 374, 8659, 279, 43773, 408, 7318, 555, 279, 1614, 627, 2028, 6671, 3629, 520, 3115, 1121, 304, 19301, 477, 312, 6953, 2760, 287, 64807, 311, 3738, 5415, 430, 21935, 1579, 11, 264, 14595, 3187, 706, 311, 387, 77096, 1614, 11, 16762, 10196, 58597, 316, 323, 59787, -100 ]
Business Information, World News & Sports as it happens! Just because you're in the office doesn't mean that you have to be isolated from network coverage of news and business information. ERS Antenna Site Management can provide your office with Satellite TV programming from Dish Network. In addition, ERS Antenna Site Management can provide links to satellite broadcasts of Business TV or Corporate Broadcasts, using building-to-building data links and in-building wireless communications systems. All at competitive prices! For more information about Commercial Satellite TV, contact Stan LeMieux at [email protected] or 800-377-2929 ext. 228.
{ "redpajama_set_name": "RedPajamaC4" }
263
[ 128000, 23562, 8245, 11, 4435, 5513, 612, 13482, 439, 433, 8741, 4999, 10156, 1606, 499, 2351, 304, 279, 5274, 3250, 956, 3152, 430, 499, 617, 311, 387, 25181, 505, 4009, 10401, 315, 3754, 323, 2626, 2038, 13, 469, 11706, 6898, 15299, 13207, 9744, 649, 3493, 701, 5274, 449, 61657, 6007, 15840, 505, 49268, 8304, 627, 644, 5369, 11, 469, 11706, 6898, 15299, 13207, 9744, 649, 3493, 7902, 311, 24088, 66198, 315, 8184, 6007, 477, 36565, 33065, 82, 11, 1701, 4857, 4791, 52499, 828, 7902, 323, 304, 52499, 21401, 17320, 6067, 13, 2052, 520, 15022, 7729, 4999, 2520, 810, 2038, 922, 28943, 61657, 6007, 11, 3729, 15560, 2009, 44, 53819, 520, 46294, 31, 388, 9703, 916, 477, 220, 4728, 12, 10898, 12, 16443, 24, 1327, 13, 220, 14261, 13 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 23562, 8245, 11, 4435, 5513, 612, 13482, 439, 433, 8741, 4999, 10156, 1606, 499, 2351, 304, 279, 5274, 3250, 956, 3152, 430, 499, 617, 311, 387, 25181, 505, 4009, 10401, 315, 3754, 323, 2626, 2038, 13, 469, 11706, 6898, 15299, 13207, 9744, 649, 3493, 701, 5274, 449, 61657, 6007, 15840, 505, 49268, 8304, 627, 644, 5369, 11, 469, 11706, 6898, 15299, 13207, 9744, 649, 3493, 7902, 311, 24088, 66198, 315, 8184, 6007, 477, 36565, 33065, 82, 11, 1701, 4857, 4791, 52499, 828, 7902, 323, 304, 52499, 21401, 17320, 6067, 13, 2052, 520, 15022, 7729, 4999, 2520, 810, 2038, 922, 28943, 61657, 6007, 11, 3729, 15560, 2009, 44, 53819, 520, 46294, 31, 388, 9703, 916, 477, 220, 4728, 12, 10898, 12, 16443, 24, 1327, 13, 220, 14261, 13, -100 ]
#include <cstdio> #include <functional> #include <string> #include <vector> #include "tensorflow/cc/ops/standard_ops.h" #include "tensorflow/core/framework/graph.pb.h" #include "tensorflow/core/graph/default_device.h" #include "tensorflow/core/graph/graph_def_builder.h" #include "tensorflow/core/lib/core/threadpool.h" #include "tensorflow/core/lib/strings/stringprintf.h" #include "tensorflow/core/platform/init_main.h" #include "tensorflow/core/platform/logging.h" #include "tensorflow/core/platform/types.h" #include "tensorflow/core/public/session.h" #include "tensorflow/core/public/tensor.h" using tensorflow::string; using tensorflow::int32; namespace tensorflow { namespace example { struct Options { int num_concurrent_sessions = 10; // The number of concurrent sessions int num_concurrent_steps = 10; // The number of concurrent steps int num_iterations = 100; // Each step repeats this many times bool use_gpu = false; // Whether to use gpu in the training }; // A = [3 2; -1 0]; x = rand(2, 1); // We want to compute the largest eigenvalue for A. // repeat x = y / y.norm(); y = A * x; end GraphDef CreateGraphDef() { // TODO(jeff,opensource): This should really be a more interesting // computation. Maybe turn this into an mnist model instead? GraphDefBuilder b; using namespace ::tensorflow::ops; // NOLINT(build/namespaces) // Store rows [3, 2] and [-1, 0] in row major format. Node* a = Const({3.f, 2.f, -1.f, 0.f}, {2, 2}, b.opts()); // x is from the feed. Node* x = Const({0.f}, {2, 1}, b.opts().WithName("x")); // y = A * x Node* y = MatMul(a, x, b.opts().WithName("y")); // y2 = y.^2 Node* y2 = Square(y, b.opts()); // y2_sum = sum(y2) Node* y2_sum = Sum(y2, Const(0, b.opts()), b.opts()); // y_norm = sqrt(y2_sum) Node* y_norm = Sqrt(y2_sum, b.opts()); // y_normalized = y ./ y_norm Div(y, y_norm, b.opts().WithName("y_normalized")); GraphDef def; TF_CHECK_OK(b.ToGraphDef(&def)); return def; } string DebugString(const Tensor& x, const Tensor& y) { CHECK_EQ(x.NumElements(), 2); CHECK_EQ(y.NumElements(), 2); auto x_flat = x.flat<float>(); auto y_flat = y.flat<float>(); const float lambda = y_flat(0) / x_flat(0); return strings::Printf("lambda = %8.6f x = [%8.6f %8.6f] y = [%8.6f %8.6f]", lambda, x_flat(0), x_flat(1), y_flat(0), y_flat(1)); } void ConcurrentSteps(const Options* opts, int session_index) { // Creates a session. SessionOptions options; std::unique_ptr<Session> session(NewSession(options)); GraphDef def = CreateGraphDef(); if (options.target.empty()) { graph::SetDefaultDevice(opts->use_gpu ? "/gpu:0" : "/cpu:0", &def); } TF_CHECK_OK(session->Create(def)); // Spawn M threads for M concurrent steps. const int M = opts->num_concurrent_steps; thread::ThreadPool step_threads(Env::Default(), "trainer", M); for (int step = 0; step < M; ++step) { step_threads.Schedule([&session, opts, session_index, step]() { // Randomly initialize the input. Tensor x(DT_FLOAT, TensorShape({2, 1})); x.flat<float>().setRandom(); // Iterations. std::vector<Tensor> outputs; for (int iter = 0; iter < opts->num_iterations; ++iter) { outputs.clear(); TF_CHECK_OK( session->Run({{"x", x}}, {"y:0", "y_normalized:0"}, {}, &outputs)); CHECK_EQ(2, outputs.size()); const Tensor& y = outputs[0]; const Tensor& y_norm = outputs[1]; // Print out lambda, x, and y. std::printf("%06d/%06d %s\n", session_index, step, DebugString(x, y).c_str()); // Copies y_normalized to x. x = y_norm; } }); } TF_CHECK_OK(session->Close()); } void ConcurrentSessions(const Options& opts) { // Spawn N threads for N concurrent sessions. const int N = opts.num_concurrent_sessions; thread::ThreadPool session_threads(Env::Default(), "trainer", N); for (int i = 0; i < N; ++i) { session_threads.Schedule(std::bind(&ConcurrentSteps, &opts, i)); } } } // end namespace example } // end namespace tensorflow namespace { bool ParseInt32Flag(tensorflow::StringPiece arg, tensorflow::StringPiece flag, int32* dst) { if (arg.Consume(flag) && arg.Consume("=")) { char extra; return (sscanf(arg.data(), "%d%c", dst, &extra) == 1); } return false; } bool ParseBoolFlag(tensorflow::StringPiece arg, tensorflow::StringPiece flag, bool* dst) { if (arg.Consume(flag)) { if (arg.empty()) { *dst = true; return true; } if (arg == "=true") { *dst = true; return true; } else if (arg == "=false") { *dst = false; return true; } } return false; } } // namespace int main(int argc, char* argv[]) { tensorflow::example::Options opts; std::vector<char*> unknown_flags; for (int i = 1; i < argc; ++i) { if (string(argv[i]) == "--") { while (i < argc) { unknown_flags.push_back(argv[i]); ++i; } break; } if (ParseInt32Flag(argv[i], "--num_concurrent_sessions", &opts.num_concurrent_sessions) || ParseInt32Flag(argv[i], "--num_concurrent_steps", &opts.num_concurrent_steps) || ParseInt32Flag(argv[i], "--num_iterations", &opts.num_iterations) || ParseBoolFlag(argv[i], "--use_gpu", &opts.use_gpu)) { continue; } fprintf(stderr, "Unknown flag: %s\n", argv[i]); return -1; } // Passthrough any unknown flags. int dst = 1; // Skip argv[0] for (char* f : unknown_flags) { argv[dst++] = f; } argv[dst++] = nullptr; argc = unknown_flags.size() + 1; tensorflow::port::InitMain(argv[0], &argc, &argv); tensorflow::example::ConcurrentSessions(opts); }
{ "redpajama_set_name": "RedPajamaGithub" }
3,032
[ 128000, 271, 1085, 366, 38312, 397, 1085, 366, 50328, 397, 1085, 366, 928, 397, 1085, 366, 3295, 1363, 1085, 330, 85382, 88410, 14, 3806, 14, 20885, 22726, 870, 702, 1085, 330, 85382, 5433, 82824, 73277, 39016, 870, 702, 1085, 330, 85382, 5433, 73277, 30089, 9385, 870, 702, 1085, 330, 85382, 5433, 73277, 73277, 8001, 29632, 870, 702, 1085, 330, 85382, 5433, 8357, 5433, 73244, 10497, 870, 702, 1085, 330, 85382, 5433, 8357, 14, 19107, 55644, 2578, 870, 702, 1085, 330, 85382, 5433, 28394, 44048, 11273, 870, 702, 1085, 330, 85382, 5433, 28394, 81174, 870, 702, 1085, 330, 85382, 5433, 28394, 21009, 870, 702, 1085, 330, 85382, 5433, 22816, 55860, 870, 702, 1085, 330, 85382, 5433, 22816, 5640, 3890, 870, 1875, 985, 29187, 487, 928, 280, 985, 29187, 487 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 271, 1085, 366, 38312, 397, 1085, 366, 50328, 397, 1085, 366, 928, 397, 1085, 366, 3295, 1363, 1085, 330, 85382, 88410, 14, 3806, 14, 20885, 22726, 870, 702, 1085, 330, 85382, 5433, 82824, 73277, 39016, 870, 702, 1085, 330, 85382, 5433, 73277, 30089, 9385, 870, 702, 1085, 330, 85382, 5433, 73277, 73277, 8001, 29632, 870, 702, 1085, 330, 85382, 5433, 8357, 5433, 73244, 10497, 870, 702, 1085, 330, 85382, 5433, 8357, 14, 19107, 55644, 2578, 870, 702, 1085, 330, 85382, 5433, 28394, 44048, 11273, 870, 702, 1085, 330, 85382, 5433, 28394, 81174, 870, 702, 1085, 330, 85382, 5433, 28394, 21009, 870, 702, 1085, 330, 85382, 5433, 22816, 55860, 870, 702, 1085, 330, 85382, 5433, 22816, 5640, 3890, 870, 1875, 985, 29187, 487, 928, 280, 985, 29187, 487, -100 ]
rare and obscure or just a bunch of crap? (old multi track test tape reel from back in the day) Anything can be music because music is everything. Sorry about the distorted audio, the result of being recorded through a VHS camcorder too close to the PA system. My Friend Pat Played Here Comes The Sun, By George Harrison, So Perfectly On His New Guitar That I was Able To Overdub The Rest.
{ "redpajama_set_name": "RedPajamaC4" }
8,108
[ 128000, 81, 548, 323, 40634, 477, 1120, 264, 15860, 315, 36650, 30, 320, 820, 7447, 3839, 1296, 17401, 57382, 505, 1203, 304, 279, 1938, 8, 42033, 649, 387, 4731, 1606, 4731, 374, 4395, 627, 19701, 922, 279, 62236, 7855, 11, 279, 1121, 315, 1694, 12715, 1555, 264, 650, 12228, 6730, 66, 1382, 2288, 3345, 311, 279, 13174, 1887, 627, 5159, 11848, 7281, 75106, 5810, 54328, 578, 8219, 11, 3296, 10058, 36627, 11, 2100, 24118, 398, 1952, 5414, 1561, 47759, 3011, 358, 574, 74950, 2057, 6193, 121988, 578, 9240, 13, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 ]
[ 81, 548, 323, 40634, 477, 1120, 264, 15860, 315, 36650, 30, 320, 820, 7447, 3839, 1296, 17401, 57382, 505, 1203, 304, 279, 1938, 8, 42033, 649, 387, 4731, 1606, 4731, 374, 4395, 627, 19701, 922, 279, 62236, 7855, 11, 279, 1121, 315, 1694, 12715, 1555, 264, 650, 12228, 6730, 66, 1382, 2288, 3345, 311, 279, 13174, 1887, 627, 5159, 11848, 7281, 75106, 5810, 54328, 578, 8219, 11, 3296, 10058, 36627, 11, 2100, 24118, 398, 1952, 5414, 1561, 47759, 3011, 358, 574, 74950, 2057, 6193, 121988, 578, 9240, 13, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100 ]
Die Rainfarn-Maskenbiene (Hylaeus nigritus) ist eine solitäre Wildbienenart aus der Familie der Colletidae. Sie gehört zur Gattung der Maskenbienen und fliegt in einer Generation in Deutschland von Ende Mai bis Ende August. Sie wurde 2022 zur Wildbiene des Jahres gewählt. Merkmale Diese Maskenbiene ist mit 7 bis 9 mm Körperlänge relativ groß für ihre Gattung, sie ist schwarz und kaum behaart, die Zunge ist kurz und abgestumpft, es ist keine Sammelbehaarung vorhanden. Die Weibchen haben eine dreieckige weiße Gesichtszeichnung und lockere Haare am ersten Tergit. Männchen haben ein glänzendes, elfenbeinweißes Gesicht. Verbreitung und Lebensraum Diese Maskenbiene kommt in großen Teilen Europas vor, von Spanien über Mitteleuropa bis zum Kaukasus, Westsibirien und Kasachstan. Sie ist nordwärts bis Finnland verbreitet, nicht jedoch in Großbritannien und Schweden. Südwärts ist die Art in Italien bis zur Toskana und Marche, in Griechenland und in der Türkei nachgewiesen. Außerdem kommt sie in Marokko vor. In Deutschland ist die Art in allen Bundesländern verbreitet, jedoch in Schleswig-Holstein ausgestorben. In Österreich und der Schweiz ist sie aktuell aus allen Regionen gemeldet, in den Alpen kommt sie bis in 1600 m Höhe vor. Die Rainfarn-Maskenbiene lebt in Sand- und Kiesgruben, Steinbrüchen, in Gebieten mit Trockenmauern oder Lösswänden. Die Art wird auch im Siedlungsbereich, in Gärten und Parks gefunden. Sie gilt als nicht vom Aussterben bedroht. Sie ist in den meisten Gebieten recht häufig. Lebensweise Die Weibchen bauen ihre Nester in Gesteinsspalten, Ritzen von Steilwänden und zwischen aufeinander liegenden Steinen von Trockenmauern sowie in Rissen von Betonmauern. Dabei werden etwa 5 bis 20 dicht nebeneinander liegende Brutzellen angelegt, die mit Pollen und Nektar versorgt werden. Der Pollen wird wie bei allen Maskenbienen im Kropf transportiert. Die Rainfarn-Maskenbiene sammelt besonders gerne Pollen von Rainfarn, aber auch von anderen Korbblütlern wie Mutterkraut, Margerite, Wiesenschafgarbe etc., sie sind also oligolektisch. Die Larven überwintern als Ruhelarve. Parasiten: Die Erzwespe Coleopencyrtus arenarius parasitiert in den Nestern der Maskenbiene. Die Art wird auch von Gasteruptioniidae befallen. Einzelnachweise Colletidae (Bienen)
{ "redpajama_set_name": "RedPajamaWikipedia" }
4,533
[ 128000, 18674, 22674, 69, 1923, 5364, 1091, 268, 8385, 1994, 320, 39, 4010, 6043, 355, 83870, 1018, 355, 8, 6127, 10021, 2092, 275, 47786, 13944, 65, 32361, 472, 9608, 2761, 89637, 2761, 4349, 1169, 114405, 13, 8663, 94196, 17761, 480, 1617, 2234, 2761, 20519, 268, 65, 32361, 2073, 1344, 648, 5289, 304, 17495, 24367, 304, 46079, 6675, 52392, 43356, 15184, 52392, 6287, 13, 8663, 27201, 220, 2366, 17, 17761, 13944, 8385, 1994, 951, 98848, 23355, 84149, 382, 27814, 16400, 1604, 4815, 81615, 20519, 268, 8385, 1994, 6127, 5568, 220, 22, 15184, 220, 24, 9653, 735, 9603, 66036, 77241, 59425, 67823, 7328, 35849, 480, 1617, 2234, 11, 10112, 6127, 5817, 45804, 2073, 100125, 2824, 64, 472, 11, 2815, 1901, 14208, 6127, 72084, 2073, 671, 7114, 1538, 728, 11, 1560 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 18674, 22674, 69, 1923, 5364, 1091, 268, 8385, 1994, 320, 39, 4010, 6043, 355, 83870, 1018, 355, 8, 6127, 10021, 2092, 275, 47786, 13944, 65, 32361, 472, 9608, 2761, 89637, 2761, 4349, 1169, 114405, 13, 8663, 94196, 17761, 480, 1617, 2234, 2761, 20519, 268, 65, 32361, 2073, 1344, 648, 5289, 304, 17495, 24367, 304, 46079, 6675, 52392, 43356, 15184, 52392, 6287, 13, 8663, 27201, 220, 2366, 17, 17761, 13944, 8385, 1994, 951, 98848, 23355, 84149, 382, 27814, 16400, 1604, 4815, 81615, 20519, 268, 8385, 1994, 6127, 5568, 220, 22, 15184, 220, 24, 9653, 735, 9603, 66036, 77241, 59425, 67823, 7328, 35849, 480, 1617, 2234, 11, 10112, 6127, 5817, 45804, 2073, 100125, 2824, 64, 472, 11, 2815, 1901, 14208, 6127, 72084, 2073, 671, 7114, 1538, 728, 11, 1560, -100 ]
Q: Valid hosted GeoJSON format in QGIS I am looking to work with hosted GeoJSON data within QGIS. I have read a number of posts, such as add GeoJSON content in QGIS that shows very easily how to load GeoJSON into QGIS. I have had limited success with this process, however, for the most part I have not been able to consistently load hosted GeoJSON data into QGIS. I have tested with a few sources, including hosting my own data in Github with the same results (see the link below). I repeatedly get a not a valid data source error on load. My question, is there a standard for hosted GeoJSON data in order to load into QGIS, or are there settings that must be configured within QGIS? https://github.com/ryangarnett/geodata/blob/master/locations.geojson A: the problem is your link points to a web page on github, you need to link to the raw content. if you use curl on that url you'll see html content coming back. if you click the 'raw' button on the Github page you'll get https://raw.githubusercontent.com/ryangarnett/geodata/master/locations.geojson Just tried this in qgis 2.18.7, loading with the 'protocol'/'geojson' setting and it loads fine. EDIT If it works at home but not at work, check with your IT people. It may be that they're using a proxy. Typically browsers get set up to work with a proxy, but they may not have done that for QGIS. You can set this up in Settings > Network > Use a proxy for web access. A quick way to check is to try opening the plugin manager in your work setting. If it fails to connect, it's probably a proxy issue. See this answer for suggested settings.
{ "redpajama_set_name": "RedPajamaStackExchange" }
1,360
[ 128000, 48, 25, 7974, 21685, 33010, 5483, 3645, 304, 1229, 56389, 358, 1097, 3411, 311, 990, 449, 21685, 33010, 5483, 828, 2949, 1229, 56389, 13, 358, 617, 1373, 264, 1396, 315, 8158, 11, 1778, 439, 923, 33010, 5483, 2262, 304, 1229, 56389, 430, 5039, 1633, 6847, 1268, 311, 2865, 33010, 5483, 1139, 1229, 56389, 13, 358, 617, 1047, 7347, 2450, 449, 420, 1920, 11, 4869, 11, 369, 279, 1455, 961, 358, 617, 539, 1027, 3025, 311, 21356, 2865, 21685, 33010, 5483, 828, 1139, 1229, 56389, 13, 358, 617, 12793, 449, 264, 2478, 8336, 11, 2737, 20256, 856, 1866, 828, 304, 50023, 449, 279, 1890, 3135, 320, 4151, 279, 2723, 3770, 570, 358, 19352, 636, 264, 539, 264, 2764, 828, 2592, 1493, 389, 2865, 13, 3092, 3488, 11, 374 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 48, 25, 7974, 21685, 33010, 5483, 3645, 304, 1229, 56389, 358, 1097, 3411, 311, 990, 449, 21685, 33010, 5483, 828, 2949, 1229, 56389, 13, 358, 617, 1373, 264, 1396, 315, 8158, 11, 1778, 439, 923, 33010, 5483, 2262, 304, 1229, 56389, 430, 5039, 1633, 6847, 1268, 311, 2865, 33010, 5483, 1139, 1229, 56389, 13, 358, 617, 1047, 7347, 2450, 449, 420, 1920, 11, 4869, 11, 369, 279, 1455, 961, 358, 617, 539, 1027, 3025, 311, 21356, 2865, 21685, 33010, 5483, 828, 1139, 1229, 56389, 13, 358, 617, 12793, 449, 264, 2478, 8336, 11, 2737, 20256, 856, 1866, 828, 304, 50023, 449, 279, 1890, 3135, 320, 4151, 279, 2723, 3770, 570, 358, 19352, 636, 264, 539, 264, 2764, 828, 2592, 1493, 389, 2865, 13, 3092, 3488, 11, 374, -100 ]
In 2007/8 AMSAT-UK put considerable work into a proposal to the European Space Agency (ESA) to place an Amateur Radio payload on the mass dummy on the maiden flight of the VEGA launcher. Known as iSTAR (Integrated Suite for Teaching and Amateur Radio) it was planned to use the 29, 145, 435, 2400 and 5830 MHz Amateur-satellite Service allocations. A "flatsat" version of the satellite was developed that incorporated transponders for 435/145 and 29/145 MHz. Unfortunately despite the excellent work of those involved ESA did not go ahead with project. As part of this work David Bowman G0MRF developed a 29.45 MHz satellite receiver for use in a 29/145 MHz transponder. The concept of the board was that it should provide a 10.7 MHz output which could be used in a conventional linear transponder. In addition a 'product detector' demodulator could recover audio from many stations transmitting PSK signals (PSK31 or 63 or similar modes) on the uplink. Having decoded the signals to audio, this signal could be modulated as FM on a VHF or UHF transmitter. The intention is to provide many different simultaneous QSOs on a single FM downlink. It was a prototype which gave us some hands on experience of 29.45 MHz. Should we get the opportunity to fly something like this in the future, the knowledge gained from this circuit would allow us to quickly produce flight hardware.
{ "redpajama_set_name": "RedPajamaC4" }
8,593
[ 128000, 644, 220, 1049, 22, 14, 23, 98370, 835, 12, 25554, 2231, 24779, 990, 1139, 264, 14050, 311, 279, 7665, 11746, 16784, 320, 65652, 8, 311, 2035, 459, 39083, 13792, 7885, 389, 279, 3148, 17741, 389, 279, 74322, 11213, 315, 279, 650, 89096, 47549, 627, 49306, 439, 602, 68161, 320, 83537, 21652, 369, 45377, 323, 39083, 13792, 8, 433, 574, 13205, 311, 1005, 279, 220, 1682, 11, 220, 9591, 11, 220, 19305, 11, 220, 8273, 15, 323, 220, 23493, 15, 37594, 39083, 1355, 266, 18652, 5475, 70742, 13, 362, 330, 1517, 1900, 266, 1, 2373, 315, 279, 24088, 574, 8040, 430, 32762, 1380, 3595, 388, 369, 220, 19305, 14, 9591, 323, 220, 1682, 14, 9591, 37594, 13, 19173, 8994, 279, 9250, 990, 315, 1884, 6532, 92743, 1550, 539 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 644, 220, 1049, 22, 14, 23, 98370, 835, 12, 25554, 2231, 24779, 990, 1139, 264, 14050, 311, 279, 7665, 11746, 16784, 320, 65652, 8, 311, 2035, 459, 39083, 13792, 7885, 389, 279, 3148, 17741, 389, 279, 74322, 11213, 315, 279, 650, 89096, 47549, 627, 49306, 439, 602, 68161, 320, 83537, 21652, 369, 45377, 323, 39083, 13792, 8, 433, 574, 13205, 311, 1005, 279, 220, 1682, 11, 220, 9591, 11, 220, 19305, 11, 220, 8273, 15, 323, 220, 23493, 15, 37594, 39083, 1355, 266, 18652, 5475, 70742, 13, 362, 330, 1517, 1900, 266, 1, 2373, 315, 279, 24088, 574, 8040, 430, 32762, 1380, 3595, 388, 369, 220, 19305, 14, 9591, 323, 220, 1682, 14, 9591, 37594, 13, 19173, 8994, 279, 9250, 990, 315, 1884, 6532, 92743, 1550, 539, -100 ]
package crypto import ( "github.com/golang/protobuf/proto" "github.com/hyperledger/fabric/core/crypto/primitives" "github.com/hyperledger/fabric/core/crypto/utils" obc "github.com/hyperledger/fabric/protos" ) func (client *clientImpl) createTransactionNonce() ([]byte, error) { nonce, err := primitives.GetRandomNonce() if err != nil { client.Errorf("Failed creating nonce [%s].", err.Error()) return nil, err } return nonce, err } func (client *clientImpl) createDeployTx(chaincodeDeploymentSpec *obc.ChaincodeDeploymentSpec, uuid string, nonce []byte, tCert tCert, attrs ...string) (*obc.Transaction, error) { // Create a new transaction tx, err := obc.NewChaincodeDeployTransaction(chaincodeDeploymentSpec, uuid) if err != nil { client.Errorf("Failed creating new transaction [%s].", err.Error()) return nil, err } // Copy metadata from ChaincodeSpec tx.Metadata, err = getMetadata(chaincodeDeploymentSpec.GetChaincodeSpec(), tCert, attrs...) if err != nil { client.Errorf("Failed creating new transaction [%s].", err.Error()) return nil, err } if nonce == nil { tx.Nonce, err = primitives.GetRandomNonce() if err != nil { client.Errorf("Failed creating nonce [%s].", err.Error()) return nil, err } } else { // TODO: check that it is a well formed nonce tx.Nonce = nonce } // Handle confidentiality if chaincodeDeploymentSpec.ChaincodeSpec.ConfidentialityLevel == obc.ConfidentialityLevel_CONFIDENTIAL { // 1. set confidentiality level and nonce tx.ConfidentialityLevel = obc.ConfidentialityLevel_CONFIDENTIAL // 2. set confidentiality protocol version tx.ConfidentialityProtocolVersion = client.conf.GetConfidentialityProtocolVersion() // 3. encrypt tx err = client.encryptTx(tx) if err != nil { client.Errorf("Failed encrypting payload [%s].", err.Error()) return nil, err } } return tx, nil } func getMetadata(chaincodeSpec *obc.ChaincodeSpec, tCert tCert, attrs ...string) ([]byte, error) { //TODO this code is being commented due temporarily is not enabled attributes encryption. /* isAttributesEnabled := viper.GetBool("security.attributes.enabled") if !isAttributesEnabled { return chaincodeSpec.Metadata, nil } if tCert == nil { return nil, errors.New("Invalid TCert.") } return attributes.CreateAttributesMetadata(tCert.GetCertificate().Raw, chaincodeSpec.Metadata, tCert.GetPreK0(), attrs) */ return chaincodeSpec.Metadata, nil } func (client *clientImpl) createExecuteTx(chaincodeInvocation *obc.ChaincodeInvocationSpec, uuid string, nonce []byte, tCert tCert, attrs ...string) (*obc.Transaction, error) { /// Create a new transaction tx, err := obc.NewChaincodeExecute(chaincodeInvocation, uuid, obc.Transaction_CHAINCODE_INVOKE) if err != nil { client.Errorf("Failed creating new transaction [%s].", err.Error()) return nil, err } // Copy metadata from ChaincodeSpec tx.Metadata, err = getMetadata(chaincodeInvocation.GetChaincodeSpec(), tCert, attrs...) if err != nil { client.Errorf("Failed creating new transaction [%s].", err.Error()) return nil, err } if nonce == nil { tx.Nonce, err = primitives.GetRandomNonce() if err != nil { client.Errorf("Failed creating nonce [%s].", err.Error()) return nil, err } } else { // TODO: check that it is a well formed nonce tx.Nonce = nonce } // Handle confidentiality if chaincodeInvocation.ChaincodeSpec.ConfidentialityLevel == obc.ConfidentialityLevel_CONFIDENTIAL { // 1. set confidentiality level and nonce tx.ConfidentialityLevel = obc.ConfidentialityLevel_CONFIDENTIAL // 2. set confidentiality protocol version tx.ConfidentialityProtocolVersion = client.conf.GetConfidentialityProtocolVersion() // 3. encrypt tx err = client.encryptTx(tx) if err != nil { client.Errorf("Failed encrypting payload [%s].", err.Error()) return nil, err } } return tx, nil } func (client *clientImpl) createQueryTx(chaincodeInvocation *obc.ChaincodeInvocationSpec, uuid string, nonce []byte, tCert tCert, attrs ...string) (*obc.Transaction, error) { // Create a new transaction tx, err := obc.NewChaincodeExecute(chaincodeInvocation, uuid, obc.Transaction_CHAINCODE_QUERY) if err != nil { client.Errorf("Failed creating new transaction [%s].", err.Error()) return nil, err } // Copy metadata from ChaincodeSpec tx.Metadata, err = getMetadata(chaincodeInvocation.GetChaincodeSpec(), tCert, attrs...) if err != nil { client.Errorf("Failed creating new transaction [%s].", err.Error()) return nil, err } if nonce == nil { tx.Nonce, err = primitives.GetRandomNonce() if err != nil { client.Errorf("Failed creating nonce [%s].", err.Error()) return nil, err } } else { // TODO: check that it is a well formed nonce tx.Nonce = nonce } // Handle confidentiality if chaincodeInvocation.ChaincodeSpec.ConfidentialityLevel == obc.ConfidentialityLevel_CONFIDENTIAL { // 1. set confidentiality level and nonce tx.ConfidentialityLevel = obc.ConfidentialityLevel_CONFIDENTIAL // 2. set confidentiality protocol version tx.ConfidentialityProtocolVersion = client.conf.GetConfidentialityProtocolVersion() // 3. encrypt tx err = client.encryptTx(tx) if err != nil { client.Errorf("Failed encrypting payload [%s].", err.Error()) return nil, err } } return tx, nil } func (client *clientImpl) newChaincodeDeployUsingTCert(chaincodeDeploymentSpec *obc.ChaincodeDeploymentSpec, uuid string, attributeNames []string, tCert tCert, nonce []byte) (*obc.Transaction, error) { // Create a new transaction tx, err := client.createDeployTx(chaincodeDeploymentSpec, uuid, nonce, tCert, attributeNames...) if err != nil { client.Errorf("Failed creating new deploy transaction [%s].", err.Error()) return nil, err } // Sign the transaction // Append the certificate to the transaction client.Debugf("Appending certificate [% x].", tCert.GetCertificate().Raw) tx.Cert = tCert.GetCertificate().Raw // Sign the transaction and append the signature // 1. Marshall tx to bytes rawTx, err := proto.Marshal(tx) if err != nil { client.Errorf("Failed marshaling tx [%s].", err.Error()) return nil, err } // 2. Sign rawTx and check signature rawSignature, err := tCert.Sign(rawTx) if err != nil { client.Errorf("Failed creating signature [% x]: [%s].", rawTx, err.Error()) return nil, err } // 3. Append the signature tx.Signature = rawSignature client.Debugf("Appending signature: [% x]", rawSignature) return tx, nil } func (client *clientImpl) newChaincodeExecuteUsingTCert(chaincodeInvocation *obc.ChaincodeInvocationSpec, uuid string, attributeKeys []string, tCert tCert, nonce []byte) (*obc.Transaction, error) { /// Create a new transaction tx, err := client.createExecuteTx(chaincodeInvocation, uuid, nonce, tCert, attributeKeys...) if err != nil { client.Errorf("Failed creating new execute transaction [%s].", err.Error()) return nil, err } // Sign the transaction // Append the certificate to the transaction client.Debugf("Appending certificate [% x].", tCert.GetCertificate().Raw) tx.Cert = tCert.GetCertificate().Raw // Sign the transaction and append the signature // 1. Marshall tx to bytes rawTx, err := proto.Marshal(tx) if err != nil { client.Errorf("Failed marshaling tx [%s].", err.Error()) return nil, err } // 2. Sign rawTx and check signature rawSignature, err := tCert.Sign(rawTx) if err != nil { client.Errorf("Failed creating signature [% x]: [%s].", rawSignature, err.Error()) return nil, err } // 3. Append the signature tx.Signature = rawSignature client.Debugf("Appending signature [% x].", rawSignature) return tx, nil } func (client *clientImpl) newChaincodeQueryUsingTCert(chaincodeInvocation *obc.ChaincodeInvocationSpec, uuid string, attributeNames []string, tCert tCert, nonce []byte) (*obc.Transaction, error) { // Create a new transaction tx, err := client.createQueryTx(chaincodeInvocation, uuid, nonce, tCert, attributeNames...) if err != nil { client.Errorf("Failed creating new query transaction [%s].", err.Error()) return nil, err } // Sign the transaction // Append the certificate to the transaction client.Debugf("Appending certificate [% x].", tCert.GetCertificate().Raw) tx.Cert = tCert.GetCertificate().Raw // Sign the transaction and append the signature // 1. Marshall tx to bytes rawTx, err := proto.Marshal(tx) if err != nil { client.Errorf("Failed marshaling tx [%s].", err.Error()) return nil, err } // 2. Sign rawTx and check signature rawSignature, err := tCert.Sign(rawTx) if err != nil { client.Errorf("Failed creating signature [% x]: [%s].", rawSignature, err.Error()) return nil, err } // 3. Append the signature tx.Signature = rawSignature client.Debugf("Appending signature [% x].", rawSignature) return tx, nil } func (client *clientImpl) newChaincodeDeployUsingECert(chaincodeDeploymentSpec *obc.ChaincodeDeploymentSpec, uuid string, nonce []byte) (*obc.Transaction, error) { // Create a new transaction tx, err := client.createDeployTx(chaincodeDeploymentSpec, uuid, nonce, nil) if err != nil { client.Errorf("Failed creating new deploy transaction [%s].", err.Error()) return nil, err } // Sign the transaction // Append the certificate to the transaction client.Debugf("Appending certificate [% x].", client.enrollCert.Raw) tx.Cert = client.enrollCert.Raw // Sign the transaction and append the signature // 1. Marshall tx to bytes rawTx, err := proto.Marshal(tx) if err != nil { client.Errorf("Failed marshaling tx [%s].", err.Error()) return nil, err } // 2. Sign rawTx and check signature rawSignature, err := client.signWithEnrollmentKey(rawTx) if err != nil { client.Errorf("Failed creating signature [% x]: [%s].", rawTx, err.Error()) return nil, err } // 3. Append the signature tx.Signature = rawSignature client.Debugf("Appending signature: [% x]", rawSignature) return tx, nil } func (client *clientImpl) newChaincodeExecuteUsingECert(chaincodeInvocation *obc.ChaincodeInvocationSpec, uuid string, nonce []byte) (*obc.Transaction, error) { /// Create a new transaction tx, err := client.createExecuteTx(chaincodeInvocation, uuid, nonce, nil) if err != nil { client.Errorf("Failed creating new execute transaction [%s].", err.Error()) return nil, err } // Sign the transaction // Append the certificate to the transaction client.Debugf("Appending certificate [% x].", client.enrollCert.Raw) tx.Cert = client.enrollCert.Raw // Sign the transaction and append the signature // 1. Marshall tx to bytes rawTx, err := proto.Marshal(tx) if err != nil { client.Errorf("Failed marshaling tx [%s].", err.Error()) return nil, err } // 2. Sign rawTx and check signature rawSignature, err := client.signWithEnrollmentKey(rawTx) if err != nil { client.Errorf("Failed creating signature [% x]: [%s].", rawTx, err.Error()) return nil, err } // 3. Append the signature tx.Signature = rawSignature client.Debugf("Appending signature [% x].", rawSignature) return tx, nil } func (client *clientImpl) newChaincodeQueryUsingECert(chaincodeInvocation *obc.ChaincodeInvocationSpec, uuid string, nonce []byte) (*obc.Transaction, error) { // Create a new transaction tx, err := client.createQueryTx(chaincodeInvocation, uuid, nonce, nil) if err != nil { client.Errorf("Failed creating new query transaction [%s].", err.Error()) return nil, err } // Sign the transaction // Append the certificate to the transaction client.Debugf("Appending certificate [% x].", client.enrollCert.Raw) tx.Cert = client.enrollCert.Raw // Sign the transaction and append the signature // 1. Marshall tx to bytes rawTx, err := proto.Marshal(tx) if err != nil { client.Errorf("Failed marshaling tx [%s].", err.Error()) return nil, err } // 2. Sign rawTx and check signature rawSignature, err := client.signWithEnrollmentKey(rawTx) if err != nil { client.Errorf("Failed creating signature [% x]: [%s].", rawTx, err.Error()) return nil, err } // 3. Append the signature tx.Signature = rawSignature client.Debugf("Appending signature [% x].", rawSignature) return tx, nil } // CheckTransaction is used to verify that a transaction // is well formed with the respect to the security layer // prescriptions. To be used for internal verifications. func (client *clientImpl) checkTransaction(tx *obc.Transaction) error { if !client.isInitialized { return utils.ErrNotInitialized } if tx.Cert == nil && tx.Signature == nil { return utils.ErrTransactionMissingCert } if tx.Cert != nil && tx.Signature != nil { // Verify the transaction // 1. Unmarshal cert cert, err := primitives.DERToX509Certificate(tx.Cert) if err != nil { client.Errorf("Failed unmarshalling cert [%s].", err.Error()) return err } // TODO: verify cert // 3. Marshall tx without signature signature := tx.Signature tx.Signature = nil rawTx, err := proto.Marshal(tx) if err != nil { client.Errorf("Failed marshaling tx [%s].", err.Error()) return err } tx.Signature = signature // 2. Verify signature ver, err := client.verify(cert.PublicKey, rawTx, tx.Signature) if err != nil { client.Errorf("Failed marshaling tx [%s].", err.Error()) return err } if ver { return nil } return utils.ErrInvalidTransactionSignature } return utils.ErrTransactionMissingCert }
{ "redpajama_set_name": "RedPajamaGithub" }
9,598
[ 128000, 271, 1757, 19566, 271, 475, 2456, 197, 9948, 916, 4951, 38387, 14, 34021, 98866, 702, 197, 9948, 916, 7682, 40352, 51804, 6801, 29997, 5433, 85329, 45772, 36309, 702, 197, 9948, 916, 7682, 40352, 51804, 6801, 29997, 5433, 85329, 22665, 702, 64453, 66, 330, 5316, 916, 7682, 40352, 51804, 6801, 29997, 14, 4490, 437, 702, 696, 2900, 320, 3045, 353, 3045, 9871, 8, 1893, 8230, 91628, 368, 36023, 3867, 11, 1493, 8, 341, 197, 40693, 11, 1886, 1703, 72294, 2283, 14326, 91628, 746, 748, 1886, 976, 2139, 341, 197, 26358, 13380, 446, 9595, 6968, 40776, 24528, 82, 948, 498, 1886, 6270, 2455, 197, 862, 2139, 11, 1886, 198, 197, 633, 862, 40776, 11, 1886, 198, 633, 2900, 320, 3045, 353, 3045, 9871, 8, 1893, 70564, 32684, 63691, 1889 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 271, 1757, 19566, 271, 475, 2456, 197, 9948, 916, 4951, 38387, 14, 34021, 98866, 702, 197, 9948, 916, 7682, 40352, 51804, 6801, 29997, 5433, 85329, 45772, 36309, 702, 197, 9948, 916, 7682, 40352, 51804, 6801, 29997, 5433, 85329, 22665, 702, 64453, 66, 330, 5316, 916, 7682, 40352, 51804, 6801, 29997, 14, 4490, 437, 702, 696, 2900, 320, 3045, 353, 3045, 9871, 8, 1893, 8230, 91628, 368, 36023, 3867, 11, 1493, 8, 341, 197, 40693, 11, 1886, 1703, 72294, 2283, 14326, 91628, 746, 748, 1886, 976, 2139, 341, 197, 26358, 13380, 446, 9595, 6968, 40776, 24528, 82, 948, 498, 1886, 6270, 2455, 197, 862, 2139, 11, 1886, 198, 197, 633, 862, 40776, 11, 1886, 198, 633, 2900, 320, 3045, 353, 3045, 9871, 8, 1893, 70564, 32684, 63691, 1889, -100 ]
Starting with PHP mysqli is easy, if one has some SQL and PHP skills. To get started one needs to know about the specifics of MySQL and a few code snippets. Using MySQL stored procedures with PHP mysqli has found enough readers to begin with a "quickstart" or "how-to" series. Take this post with a grain of salt. I have nothing against Prepared Statements as such, but I dislike unreflected blind use. The prepared statement execution consists of two stages: prepare and execute. At the prepare stage a statement template is send to the database server. The server performs a syntax check and initializes server internal resources for later use. A prepared statement can be executed repeatedly. Upon every execution the current value of the bound variable is evaluated and send to the server. The statement is not parsed again. The statement template is not transferred to the server again. < Using a prepared statement is not always the most efficient way of executing a statement. A prepared statement executed only once causes more client-server round-trips than a non-prepared statement. This is why the SELECT is not run as a prepared statement above. Also, consider the use of the MySQL multi-INSERT SQL syntax for INSERTs. For the example, belows multi-INSERT requires less round-trips between the server and client than the prepared statement shown above. This behaviour differes from non-prepared statements. By default, non-prepared statements return all results as strings. This default can be changed using a connection option (hint: more blog posts coming…). If the connection option is used, there are no differences. Results from prepared statements can either be retrieved by binding output variables or by requesting a mysqli_result object. It is possible to buffer the results of a prepared statement using mysqli_stmt_store_result(). Using the mysqli_result interface this has the additional benefit of flexible client-side result set navigation. Bound variables will be escaped automatically by the server. The server inserts their escaped values at the appropriate places into the statement template before execution. Users must hint the server about the type of the bound variable for appropriate conversion, see mysqli_stmt_bind_param(). The automatic escaping of values within the server is sometimes considered as a security feature to prevent SQL injection. The same degree of security can be achieved with non-prepared statements, if input values are escaped correctly. The API does not include a client-side prepared statement emulation. The below table gives a quick comparison on server-side prepared and non-prepared statements. In the final table, the "Client-server round trips, SELECT, repeated (n) execution" has "1" for "Non-prepared statement". Shouldn't that be "n"? Can you discuss the pros/cons of returning data in binary further? Does this reduce network transfer size? Does it reduce server load (at the expense of PHP-machine load) to do the conversion? The statement "The same degree of security can be achieved with non-prepared statements, if input values are escaped correctly" should come with a big caveat that history has proved escaping is difficult to do. SQL Injection continues to appear in the top rank of security risks and identified flaws. PS as such have no to little additional security benefit. Inconvenience is another argument. What happens if the inconvenience argument is not implemented properly can be seen in PDO. And, that has been discussed to death as well numerous times.
{ "redpajama_set_name": "RedPajamaC4" }
6,358
[ 128000, 25639, 449, 13420, 10141, 374, 4228, 11, 422, 832, 706, 1063, 8029, 323, 13420, 7512, 13, 2057, 636, 3940, 832, 3966, 311, 1440, 922, 279, 49449, 315, 27436, 323, 264, 2478, 2082, 69742, 13, 12362, 27436, 9967, 16346, 449, 13420, 10141, 706, 1766, 3403, 13016, 311, 3240, 449, 264, 330, 28863, 2527, 1, 477, 330, 5269, 4791, 1, 4101, 13, 12040, 420, 1772, 449, 264, 24875, 315, 12290, 13, 358, 617, 4400, 2403, 88267, 70816, 439, 1778, 11, 719, 358, 48969, 653, 1116, 2258, 18507, 1005, 627, 791, 10235, 5224, 11572, 17610, 315, 1403, 18094, 25, 10772, 323, 9203, 13, 2468, 279, 10772, 6566, 264, 5224, 3896, 374, 3708, 311, 279, 4729, 3622, 13, 578, 3622, 27772, 264, 20047, 1817, 323, 58957, 3622, 5419, 5070, 369, 3010 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 25639, 449, 13420, 10141, 374, 4228, 11, 422, 832, 706, 1063, 8029, 323, 13420, 7512, 13, 2057, 636, 3940, 832, 3966, 311, 1440, 922, 279, 49449, 315, 27436, 323, 264, 2478, 2082, 69742, 13, 12362, 27436, 9967, 16346, 449, 13420, 10141, 706, 1766, 3403, 13016, 311, 3240, 449, 264, 330, 28863, 2527, 1, 477, 330, 5269, 4791, 1, 4101, 13, 12040, 420, 1772, 449, 264, 24875, 315, 12290, 13, 358, 617, 4400, 2403, 88267, 70816, 439, 1778, 11, 719, 358, 48969, 653, 1116, 2258, 18507, 1005, 627, 791, 10235, 5224, 11572, 17610, 315, 1403, 18094, 25, 10772, 323, 9203, 13, 2468, 279, 10772, 6566, 264, 5224, 3896, 374, 3708, 311, 279, 4729, 3622, 13, 578, 3622, 27772, 264, 20047, 1817, 323, 58957, 3622, 5419, 5070, 369, 3010, -100 ]
Jazz band incorporates diverse music Evelyn Lillemoe, The Rubicon Editor|March 3, 2019 Eloise Duncan Director of Band Bill Mayson conducts a group of students in the jazz band. Students in the high school band have a unique opportunity to be in a jazz band. Many schools have different systems for bands, making it more difficult for students to join a jazz band. "The most striking difference is that most schools have a typical concert band program overall from which members are taken to create a jazz band which often means, for instance, in some schools the concert band may have to meet in two different periods so that they don't get to actually play together until right before concert time [when] they combine," Director of Band, Bill Mayson said. Though the jazz band setup was put in place before Mayson started working here, he has seen it benefit the band significantly. "What this allows us to do with the same size of classes as other schools about our size have is we can get two complete bands because the instrumentation for jazz band is a bit more flexible than concert band and you can have a complete ensemble with 20 or sometimes even fewer players," he said. Jazz by its nature is diverse." — Bill Mayson This system gives the band an opportunity to focus on jazz, which is a very unique type of music. "Jazz by its nature is diverse," Mayson said. Mayson describes jazz as a "mix between European music, between Afro-American music, [and] between Latin music." This inclusion of so many styles of music is what makes jazz so diverse. Despite the many types of music already a part of jazz, Mayson has always put in an effort to include a greater variety in addition to classic jazz. "I have always tried to make sure that we have not just what you would call traditional jazz band music… to include funk, rock. I hate to put Latin in there as some sort of diversification because Latin has always been a part of jazz since the very beginning, but we always try to include Latin pieces as well. In addition, we do a lot of fusion… a combination of different styles of music," Mayson said. Latin has always been a part of jazz since the very beginning." Mayson has led the US jazz band since 2006. These 13 years means he has seen the jazz band at many stages. "The biggest change that I've seen is the growth of the intermediate band. In the time before I started as US band director… the intermediate jazz band was typically just a rhythm section… since then it's been growing a bit each year," he said. Though Mayson has seen the band grow and change, he hopes in the future the band will see some changes in terms of its members. "I would like to see more women in the band. Last year we had a sax section that was majority female which was great… I would like to see more of that. Ideally 50/50. That's one thing I would really like to see," Mayson said. Evelyn Lillemoe, Chief Visual Editor Evelyn Lillemoe is the Chief Visual Editor on The Rubicon. This is her fourth year on staff. Evelyn has been spending her free time during the COVID-19... Eloise Duncan, News Editor Eloise Duncan is a News Editor on The Rubicon. This is her fourth year on staff. While at home, she has kept busy by watching numerous shows and movies,...
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
6,101
[ 128000, 41, 10002, 7200, 52924, 17226, 4731, 198, 36, 899, 1910, 41578, 3516, 4748, 11, 578, 13134, 1965, 12865, 91, 28623, 220, 18, 11, 220, 679, 24, 198, 36, 385, 1082, 42409, 198, 38294, 315, 17366, 8766, 3297, 942, 74198, 264, 1912, 315, 4236, 304, 279, 34997, 7200, 627, 32052, 304, 279, 1579, 2978, 7200, 617, 264, 5016, 6776, 311, 387, 304, 264, 34997, 7200, 13, 9176, 8853, 617, 2204, 6067, 369, 21562, 11, 3339, 433, 810, 5107, 369, 4236, 311, 5249, 264, 34997, 7200, 627, 10227, 1455, 21933, 6811, 374, 430, 1455, 8853, 617, 264, 14595, 21497, 7200, 2068, 8244, 505, 902, 3697, 527, 4529, 311, 1893, 264, 34997, 7200, 902, 3629, 3445, 11, 369, 2937, 11, 304, 1063, 8853, 279, 21497, 7200, 1253, 617, 311, 3449 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 41, 10002, 7200, 52924, 17226, 4731, 198, 36, 899, 1910, 41578, 3516, 4748, 11, 578, 13134, 1965, 12865, 91, 28623, 220, 18, 11, 220, 679, 24, 198, 36, 385, 1082, 42409, 198, 38294, 315, 17366, 8766, 3297, 942, 74198, 264, 1912, 315, 4236, 304, 279, 34997, 7200, 627, 32052, 304, 279, 1579, 2978, 7200, 617, 264, 5016, 6776, 311, 387, 304, 264, 34997, 7200, 13, 9176, 8853, 617, 2204, 6067, 369, 21562, 11, 3339, 433, 810, 5107, 369, 4236, 311, 5249, 264, 34997, 7200, 627, 10227, 1455, 21933, 6811, 374, 430, 1455, 8853, 617, 264, 14595, 21497, 7200, 2068, 8244, 505, 902, 3697, 527, 4529, 311, 1893, 264, 34997, 7200, 902, 3629, 3445, 11, 369, 2937, 11, 304, 1063, 8853, 279, 21497, 7200, 1253, 617, 311, 3449, -100 ]
In this section: FDA Organization Office of the Commissioner FDA Organization Charts Office of Foods and Veterinary Medicine Office of Global Regulatory Operations and Policy Office of Operations Office of Policy, Planning, Legislation, and Analysis Steven Solomon Dr. Steven Solomon DVM Leadership Role Director - Center for Veterinary Medicine Dr. Steven Solomon was appointed Director of the Food and Drug Administration's Center for Veterinary Medicine in January 2017. Dr. Solomon previously served as the Deputy Associate Commissioner for Regulatory Affairs within the Food and Drug Administration's Office of Regulatory Affairs. He joined FDA in 1990 as a Veterinary Medical Officer in the Center for Veterinary Medicine, and has served in various policy and leadership positions in the Office of Regulatory Affairs' Office of Enforcement, Office of Regional Operations and as the Assistant Commissioner for Compliance Policy. He also served in the Office of Global Regulatory Operations and Policy. Dr. Solomon has a Doctor of Veterinary Medicine from Ohio State University and a Master's in Public Health from Johns Hopkins University. FDA Leadership Profiles About the Center for Veterinary Medicine
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
1,107
[ 128000, 644, 420, 3857, 25, 30473, 21021, 198, 24861, 315, 279, 30454, 198, 82169, 21021, 67376, 198, 24861, 315, 40160, 323, 78103, 19152, 198, 24861, 315, 8121, 69822, 25927, 323, 11216, 198, 24861, 315, 25927, 198, 24861, 315, 11216, 11, 28780, 11, 73067, 11, 323, 18825, 198, 67660, 50899, 198, 9023, 13, 24565, 50899, 423, 11435, 198, 93824, 2200, 15766, 198, 38294, 482, 5955, 369, 78103, 19152, 198, 9023, 13, 24565, 50899, 574, 21489, 10783, 315, 279, 12369, 323, 26166, 17128, 596, 5955, 369, 78103, 19152, 304, 6186, 220, 679, 22, 13, 2999, 13, 50899, 8767, 10434, 439, 279, 32724, 33468, 30454, 369, 69822, 23298, 2949, 279, 12369, 323, 26166, 17128, 596, 8410, 315, 69822, 23298, 13, 1283, 11096, 30473, 304, 220, 2550, 15, 439, 264, 78103, 13235 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 644, 420, 3857, 25, 30473, 21021, 198, 24861, 315, 279, 30454, 198, 82169, 21021, 67376, 198, 24861, 315, 40160, 323, 78103, 19152, 198, 24861, 315, 8121, 69822, 25927, 323, 11216, 198, 24861, 315, 25927, 198, 24861, 315, 11216, 11, 28780, 11, 73067, 11, 323, 18825, 198, 67660, 50899, 198, 9023, 13, 24565, 50899, 423, 11435, 198, 93824, 2200, 15766, 198, 38294, 482, 5955, 369, 78103, 19152, 198, 9023, 13, 24565, 50899, 574, 21489, 10783, 315, 279, 12369, 323, 26166, 17128, 596, 5955, 369, 78103, 19152, 304, 6186, 220, 679, 22, 13, 2999, 13, 50899, 8767, 10434, 439, 279, 32724, 33468, 30454, 369, 69822, 23298, 2949, 279, 12369, 323, 26166, 17128, 596, 8410, 315, 69822, 23298, 13, 1283, 11096, 30473, 304, 220, 2550, 15, 439, 264, 78103, 13235, -100 ]
New Avengers #6 Staff: Frank Man (E-Mail) Title: New Avengers The new Avengers found out that the breakout that set loose around 40 prisoners was a distraction for one prisoner to make an escape. Carl Lykos a.k.a. Sauron, the hypnotizing mutant that saps people's energy. Off they go to the Savage land. After a non-fatal crash, an absurd punking of Wolverine and an even more absurd hanging around naked scene the Avengers meet Sauron. Sauron gets sniped in the head and the snipers threaten to kill our heroes. Summary: Spider-Man & Spider-Woman Appear Arc: Part 6 of 'Breakout!' (1-2-3-4-5-6) Editor: Tom Brevoort Writer: Brian Michael Bendis Pencils: David Finch Inker: Danny Miki Cover Art: David Finch Reprinted In: Marvel Heroes Flip Magazine #6 The snipers seems to be working for S.H.I.E.L.D. Their point leader is Yelena Belova, another Black Widow. One of the snipers does not want to open fire on Captain America so Belova shoots him. Like a parent chiding a small child, Captain America warns Wolverine not to kill anybody. When Wolverine dives into Belove, the Cap smacks him with a well thrown shield. When his suit hits the proper charge level, Iron Man turns on a nifty device known as a "polar magnetic field". This device lifts everything that's metal off of the ground, including a frightened looking Wolverine. The scared agents scatter into the woods. Wolverine and Captain A exchange more words about killing. Jessica Drew begins to interrogate Belova for the name of the person she works for. Belova answers, "I work for the same people you work for!!" This noticably stuns Spider-woman and confuses her teammates. Wolverine decides that he wants to act out of character for a moment and wants to dice her and move on... ...However no dicing can take place since Sauron leaps into the sky and burns Belova up pretty bad. Iron man shoots Sauron, then Spider-woman, Cap throws his shield, Power man punches him and Wolverine catches him. Teamwork. What about Spider-man? Be quiet. Cap postulates that the rogue S.H.I.E.L.D. agents got to the Savage lands somehow, and that maybe the team can hitch a ride back. After a long walk it is surmised that the spider that bit Spider-man was in fact a whiney spider. The Avengers stumble upon what looks like a division of S.H.I.E.L.D. stealing vibranium using enslaved Wolverine look-alikes. Captain America and team began a battle to stop them when missile (or lasers or something) bombard the area. Agent Hill, the agent that Captain America had to pull rank with a few issues earlier, picks up the crew in a S.H.I.E.L.D. helicarrier. She tells the team that there'll be an investigation. Meanwhile the Cap and Shell-head are discussing whether Wolverine should be allowed to join their team or not. Finally Belova is burnt and bandaged in a hospital room. A mysterious voice offers her a chance to get revenge on the Avengers. She accepts. The story is starting to pick up again. A bunch of intrigue was thrown at me and some action too. Loved it. Rogue S.H.I.E.L.D. agents? Love it. Possible shady government activity? Love it. Mysterious voice that could be the same voice manipulating Jessica Drew and hiring Electro? Love it. Now what I don't love in this book is the misinterpretations of Wolverine. He's shown as a thug with nothing on his mind but eviscerating his prey. This unravels a couple decades worth of work on his developing a heart and taming the beast stuff. They might be trying to say that this takes place after his getting killed a ressuracted by the hand storyline, but that would conflict with the Uncanny X-men storyline of him and X-23 being lost in the Savage Land storyline. Let's get a grip on things Marvel. The art is tight when the Avengers leap into battle. The way that they're drawn just looks awesome. Finch has battle scenes down pat. What he doesn't have down pat however are his character models. Just about every guy looks the same. Even the enslaved people of the Savage Land looked just like a bunch of Wolverines. It pains me to give this book less than four webs. The story IS well written but this blight on Wolverine's character can't go unatoned for. Also if they insist on using an X-men on the Avengers team they need to specify where we are in the X-men storyline. The character models are also overused. If I wanted to see a bunch of the same character models, I'd pick up Web of Spider-man 117 and work my way up. Three and a half webs. Issue: New Avengers #5 Review: New Avengers #6
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
8,710
[ 128000, 3648, 44197, 674, 21, 198, 34311, 25, 9454, 2418, 320, 36, 38613, 340, 3936, 25, 1561, 44197, 198, 791, 502, 44197, 1766, 704, 430, 279, 63788, 430, 743, 20784, 2212, 220, 1272, 28240, 574, 264, 54716, 369, 832, 42950, 311, 1304, 459, 12731, 13, 22770, 16333, 57778, 264, 5314, 5973, 13, 328, 4202, 263, 11, 279, 76551, 4954, 61618, 430, 274, 2690, 1274, 596, 4907, 627, 4699, 814, 733, 311, 279, 54036, 4363, 13, 4740, 264, 2536, 2269, 4306, 10121, 11, 459, 32677, 36858, 287, 315, 84279, 323, 459, 1524, 810, 32677, 21363, 2212, 19557, 6237, 279, 44197, 3449, 328, 4202, 263, 13, 328, 4202, 263, 5334, 4224, 32821, 304, 279, 2010, 323, 279, 4224, 59935, 40250, 311, 5622, 1057, 23757, 627, 19791, 25, 29490, 31251, 612 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 3648, 44197, 674, 21, 198, 34311, 25, 9454, 2418, 320, 36, 38613, 340, 3936, 25, 1561, 44197, 198, 791, 502, 44197, 1766, 704, 430, 279, 63788, 430, 743, 20784, 2212, 220, 1272, 28240, 574, 264, 54716, 369, 832, 42950, 311, 1304, 459, 12731, 13, 22770, 16333, 57778, 264, 5314, 5973, 13, 328, 4202, 263, 11, 279, 76551, 4954, 61618, 430, 274, 2690, 1274, 596, 4907, 627, 4699, 814, 733, 311, 279, 54036, 4363, 13, 4740, 264, 2536, 2269, 4306, 10121, 11, 459, 32677, 36858, 287, 315, 84279, 323, 459, 1524, 810, 32677, 21363, 2212, 19557, 6237, 279, 44197, 3449, 328, 4202, 263, 13, 328, 4202, 263, 5334, 4224, 32821, 304, 279, 2010, 323, 279, 4224, 59935, 40250, 311, 5622, 1057, 23757, 627, 19791, 25, 29490, 31251, 612, -100 ]
Awards for All grant helped create a natural play garden. Tipton Toddlers has received a grant award of £9978 for the following project, Natural Play Pathways to Learning. We spent the grant on transforming the outdoor area for children aged 3 – 12 years. We endeavoured to transform the play space into a natural play area. The design idea incorporates natural play features such as incorporating tree trunks and boulders to encourage more exploration, imagination and inventiveness. Raised digging and planting areas for growing our own produce and a Masonry BBQ and pizza oven. We installed logs, pebble, bark boundaries to create zones. This grant will provide materials to cover over the concrete play area the children currently have.
{ "redpajama_set_name": "RedPajamaC4" }
3,288
[ 128000, 32, 4102, 369, 2052, 13500, 9087, 1893, 264, 5933, 1514, 13863, 627, 51, 11696, 263, 59683, 8910, 388, 706, 4036, 264, 13500, 10292, 315, 7083, 22694, 23, 369, 279, 2768, 2447, 11, 18955, 7199, 8092, 2336, 311, 21579, 627, 1687, 7543, 279, 13500, 389, 46890, 279, 16166, 3158, 369, 2911, 20330, 220, 18, 1389, 220, 717, 1667, 13, 1226, 29705, 402, 21020, 311, 5276, 279, 1514, 3634, 1139, 264, 5933, 1514, 3158, 13, 578, 2955, 4623, 52924, 5933, 1514, 4519, 1778, 439, 52913, 5021, 490, 15655, 323, 293, 619, 388, 311, 15253, 810, 27501, 11, 28899, 323, 17459, 13071, 13, 54831, 42200, 323, 48114, 5789, 369, 7982, 1057, 1866, 8356, 323, 264, 29927, 894, 46377, 323, 23317, 24276, 13, 1226, 10487, 18929, 11, 1069, 60980, 11, 54842 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 32, 4102, 369, 2052, 13500, 9087, 1893, 264, 5933, 1514, 13863, 627, 51, 11696, 263, 59683, 8910, 388, 706, 4036, 264, 13500, 10292, 315, 7083, 22694, 23, 369, 279, 2768, 2447, 11, 18955, 7199, 8092, 2336, 311, 21579, 627, 1687, 7543, 279, 13500, 389, 46890, 279, 16166, 3158, 369, 2911, 20330, 220, 18, 1389, 220, 717, 1667, 13, 1226, 29705, 402, 21020, 311, 5276, 279, 1514, 3634, 1139, 264, 5933, 1514, 3158, 13, 578, 2955, 4623, 52924, 5933, 1514, 4519, 1778, 439, 52913, 5021, 490, 15655, 323, 293, 619, 388, 311, 15253, 810, 27501, 11, 28899, 323, 17459, 13071, 13, 54831, 42200, 323, 48114, 5789, 369, 7982, 1057, 1866, 8356, 323, 264, 29927, 894, 46377, 323, 23317, 24276, 13, 1226, 10487, 18929, 11, 1069, 60980, 11, 54842, -100 ]
Q: Change output XML values using XSL i want my output XML to have different values. i have a table made. lets say there are many students.. input XML <?xml version="1.0" encoding="UTF-8"?> <Person> <lookuptable> <name first="Jen" ori="Jenny" /> <name first="Sam" ori="Sammy" /> </lookuptable> <Student> <Info Name="Jen" Age="20" Class="C" /> </Student> <Student> <Info Name="Sam" Age="21" Class="B" /> </Student> </Person> required output <?xml version="1.0" encoding="UTF-8"?> <Person> <lookuptable> <name first="Jen" ori="Jenny" /> <name first="Sam" ori="Sammy" /> </lookuptable> <Student> <Info Name="Jenny" Age="20" Class="C" /> </Student> <Student> <Info Name="Sammy" Age="21" Class="B" /> </Student> </Person> how can i get Jenny,Sammy, etc from the lookuptable?? meaning each place Jen occurs it should use Jenny from table. im not sure how to write the XSL. A: Define a key, use the identity transformation template plus a template for that attribute: <xsl:key name="k1" match="lookuptable/name" use="@first"/> <xsl:template match="@* | node()"> <xsl:copy> <xsl:apply-templates select="@* , node()"/> </xsl:copy> </xsl:template> <xsl:template match="Student/Info/@Name"> <xsl:attribute name="{name()}" select="key('k1', .)/@ori"/> </xsl:template>
{ "redpajama_set_name": "RedPajamaStackExchange" }
6,247
[ 128000, 48, 25, 10604, 2612, 12138, 2819, 1701, 1630, 8143, 602, 1390, 856, 2612, 12138, 311, 617, 2204, 2819, 13, 602, 617, 264, 2007, 1903, 627, 10145, 2019, 1070, 527, 1690, 4236, 35047, 1379, 12138, 198, 1340, 6591, 2373, 429, 16, 13, 15, 1, 11418, 429, 8729, 12, 23, 87090, 51096, 397, 286, 366, 7349, 7717, 481, 397, 692, 366, 609, 1176, 429, 41, 268, 1, 59735, 429, 41, 18314, 1, 2662, 692, 366, 609, 1176, 429, 24903, 1, 59735, 429, 24903, 2465, 1, 2662, 286, 694, 7349, 7717, 481, 397, 262, 366, 14428, 397, 286, 366, 1767, 4076, 429, 41, 268, 1, 13381, 429, 508, 1, 3308, 429, 34, 1, 2662, 262, 694, 14428, 397, 262, 366, 14428, 397, 286, 366, 1767, 4076, 429, 24903, 1, 13381 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 48, 25, 10604, 2612, 12138, 2819, 1701, 1630, 8143, 602, 1390, 856, 2612, 12138, 311, 617, 2204, 2819, 13, 602, 617, 264, 2007, 1903, 627, 10145, 2019, 1070, 527, 1690, 4236, 35047, 1379, 12138, 198, 1340, 6591, 2373, 429, 16, 13, 15, 1, 11418, 429, 8729, 12, 23, 87090, 51096, 397, 286, 366, 7349, 7717, 481, 397, 692, 366, 609, 1176, 429, 41, 268, 1, 59735, 429, 41, 18314, 1, 2662, 692, 366, 609, 1176, 429, 24903, 1, 59735, 429, 24903, 2465, 1, 2662, 286, 694, 7349, 7717, 481, 397, 262, 366, 14428, 397, 286, 366, 1767, 4076, 429, 41, 268, 1, 13381, 429, 508, 1, 3308, 429, 34, 1, 2662, 262, 694, 14428, 397, 262, 366, 14428, 397, 286, 366, 1767, 4076, 429, 24903, 1, 13381, -100 ]
Q: It seems that multiprocessing.pool take the same argument two times I'm using multiprocessing.pool to perform multiple integration in parallel. In this program I integrate an equation of motion for different realization of noise by generating the dW 3D array. The first part of the program is just definition of parameters and the generation of arrays needed for the calculation. I generate dW outside the function since I know that otherwise I have to reseed at each process to not obtain the same random sequence. Euler(replica) function is the function which have to be parallelize. This include a for loop over a single process for the numerical integration. The arg replica is the number of the replica of my system as stored in the "replicas" array, which is the argument passed in pool.map. import numpy as np from multiprocessing import Pool # parameters N = 30 # number of sites T = 1 # total time dt = 0.1 # time step l = 0 # initially localized state on site l e = 0.0 # site energy v = 1.0 # hopping coefficient mu, sigma = 0, 1.0 # average and variance of the gaussian distribution num_replicas = 8 # number of replicas of the system processes=2 # number of processes # identity vector which represents the diagonal of the Hamiltonian E = np.ones(N) * e # vector which represents the upper/lower diagonal terms of the Hopping Matrix and the Hamiltonian V = np.ones(N-1) * v # definition of the tight-binding Hamiltonian (tridiagonal) H = np.diag(E) + np.diag(V, k=1) + np.diag(V, k=-1) # corner elements of the Hamiltonian H[0, -1] = v H[-1, 0] = v # time array time_array = np.arange(0, T, dt) # site array site_array = np.arange(N) # initial state psi_0 = np.zeros((N), dtype=complex) psi_0[l] = 1. + 0.j #initialization of the state array Psi = np.zeros((len(time_array), N), dtype=complex) Psi[0,:] = psi_0 # replicas 1D array replicas = np.arange(0, num_replicas) # random 2D array dW = np.random.normal(mu, 1.0, (len(time_array), num_replicas, N)) * np.sqrt(dt) def Euler(replica): psi_0 = np.zeros((N), dtype=complex) psi_0[l] = 1. + 0.j psi = psi_0 for i in np.arange(1, len(time_array)): psi += -1.j * (H @ psi) * dt - 1.j * sigma * psi * dW[i,replica,:] - 0.5 * (sigma**2) * psi * dt psi /= np.sqrt(psi @ np.conj(psi)) Psi[i,:] = psi return Psi pool = Pool(processes) Psi = pool.map(Euler, replicas) Psi = np.asarray(Psi) Psi = np.swapaxes(Psi,0,1) print(Psi) Empirically I found that if num_replicas > 4 * processes as expressed in the pool.map function, it seems that two processes take the same argument, as if the same calculation is repeated two times. Instead, from 'num_replicas <= 4*processes` I get the expected result: each process is different from the others. This is not due to the generation of the random matrix dW, since each row is uncorrelated, so I ascribe this behavior to my use of multiprocessing.pool. A: I think you should initialize your psi_0 and "Psi" inside the Euler function. I tried to reproduce your results and, indeed, I found that when num_replicas > 4 * processes you get the same results from multiple processors. But I think this is due to the fact that Psi, in your case, it's a global variable. Modifying the code as following it gives different results for each num_replicas (by the way, why do you use site_array? It is not used anywhere). import numpy as np from multiprocessing import Pool # parameters N = 3 # number of sites T = 1 # total time dt = 0.1 # time step l = 0 # initially localized state on site l e = 0.0 # site energy v = 1.0 # hopping coefficient mu, sigma = 0, 1.0 # average and variance of the gaussian distribution num_replicas = 10 # number of replicas of the system processes=2 # number of processes # identity vector which represents the diagonal of the Hamiltonian E = np.ones(N) * e # vector which represents the upper/lower diagonal terms of the Hopping Matrix and the Hamiltonian V = np.ones(N-1) * v # definition of the tight-binding Hamiltonian (tridiagonal) H = np.diag(E) + np.diag(V, k=1) + np.diag(V, k=-1) # corner elements of the Hamiltonian H[0, -1] = v H[-1, 0] = v # time array time_array = np.arange(0, T, dt) ## site array #site_array = np.arange(N) # replicas 1D array replicas = np.arange(0, num_replicas) # random 2D array dW = np.random.normal(mu, 1.0, (len(time_array), num_replicas, N)) * np.sqrt(dt) #dW = np.random.normal(mu, 1.0, (len(time_array), num_replicas, N)) * np.sqrt(dt) def Euler(replica): # initial state psi_0 = np.zeros((N), dtype=complex) psi_0[l] = 1. + 0.j #initialization of the state array Psi = np.zeros((len(time_array), N), dtype=complex) Psi[0,:] = psi_0 psi_0 = np.zeros((N), dtype=complex) psi_0[l] = 1. + 0.j psi = psi_0 # print(dW[0,replica,0]) for i in np.arange(1, len(time_array)): psi += -1.j * (H @ psi) * dt - 1.j * sigma * psi * dW[i,replica,:] - 0.5 * (sigma**2) * psi * dt psi /= np.sqrt(psi @ np.conj(psi)) Psi[i,:] = psi return Psi pool = Pool(processes) Psi = pool.map(Euler, replicas) Psi = np.asarray(Psi) Psi = np.swapaxes(Psi,0,1) print(Psi) A: as @Fabrizio pointed out, Psi is shared between invocations of Euler. this is generally a bad thing to do and another example of why it's a bad idea to have "global mutable state". it's just too easy for things to break in unexpected ways the reason it fails in this case is subtle and due to the way Pool.map accumulates several results in each process before pickling them and returning them to the parent/controlling process. you can see this by setting the chunksize parameter of map to 1, causing it return results immediately and hence not overwriting intermediate results it's equivalent to the following minimal working example: from multiprocessing import Pool arr = [None] def mutate_global(i): arr[0] = i return arr with Pool(2) as pool: out = pool.map(mutate_global, range(10), chunksize=5) print(out) the last time I ran this I got: [[4], [4], [4], [4], [4], [9], [9], [9], [9], [9]] you can change the chunksize parameter to get an idea of what it's doing, or maybe run with the following version: def mutate_local(i): arr = [None] arr[0] = i return arr which "just works", and is the equlivelant to doing what @Fabrizio describes where you create Phi inside Euler rather than using a single global variable
{ "redpajama_set_name": "RedPajamaStackExchange" }
9,604
[ 128000, 48, 25, 1102, 5084, 430, 58224, 40063, 1935, 279, 1890, 5811, 1403, 3115, 358, 2846, 1701, 58224, 40063, 311, 2804, 5361, 18052, 304, 15638, 627, 644, 420, 2068, 358, 32172, 459, 24524, 315, 11633, 369, 2204, 49803, 315, 12248, 555, 24038, 279, 294, 54, 220, 18, 35, 1358, 13, 578, 1176, 961, 315, 279, 2068, 374, 1120, 7419, 315, 5137, 323, 279, 9659, 315, 18893, 4460, 369, 279, 22702, 627, 40, 7068, 294, 54, 4994, 279, 734, 2533, 358, 1440, 430, 6062, 358, 617, 311, 312, 23425, 520, 1855, 220, 1920, 311, 539, 6994, 279, 1890, 4288, 8668, 627, 36, 8646, 76256, 15677, 8, 734, 374, 279, 734, 902, 617, 311, 387, 15638, 553, 13, 1115, 2997, 264, 369, 6471, 927, 264, 3254, 1920, 369, 279, 35876 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 48, 25, 1102, 5084, 430, 58224, 40063, 1935, 279, 1890, 5811, 1403, 3115, 358, 2846, 1701, 58224, 40063, 311, 2804, 5361, 18052, 304, 15638, 627, 644, 420, 2068, 358, 32172, 459, 24524, 315, 11633, 369, 2204, 49803, 315, 12248, 555, 24038, 279, 294, 54, 220, 18, 35, 1358, 13, 578, 1176, 961, 315, 279, 2068, 374, 1120, 7419, 315, 5137, 323, 279, 9659, 315, 18893, 4460, 369, 279, 22702, 627, 40, 7068, 294, 54, 4994, 279, 734, 2533, 358, 1440, 430, 6062, 358, 617, 311, 312, 23425, 520, 1855, 220, 1920, 311, 539, 6994, 279, 1890, 4288, 8668, 627, 36, 8646, 76256, 15677, 8, 734, 374, 279, 734, 902, 617, 311, 387, 15638, 553, 13, 1115, 2997, 264, 369, 6471, 927, 264, 3254, 1920, 369, 279, 35876, -100 ]
This immaculate RETIREMENT APARTMENT located within a well designed complex built by McCarthy & Stone; it offers everything you could possibly want including convenient location, communal areas for socialising, parking facilities and a beautifully kept shared garden. This well-kept and welcoming retirement apartment is bright and airy with good size accomodation comprising of a spacious entrance hall with a large cupboard offering ample storage, lounge/diner with separate kitchen, double bedroom with built in wardrobes and shower room. The block itself, designed and built by McCarthy & Stone, offers everything you could be looking for, including an inviting communal lounge overlooking the shared garden, communal kitchen and laundry room as well parking facilities. The location is quiet but only a short distance from Brentwood town centre and Station. Access via double doors to the front of the building via an intercom system. The communal areas consist of: small kitchen, large lounge area with doors leading through to the shared garden complete with washing lines for the residents to use, there is also a laundry room and waste disposal room. Also available is a guest suite which is located on the second floor. On the ground floor is access to apartments as well as a lift to first and second floors. Large storage cupboard which houses the meters and fuse box. Door to lounge/dining area. Door to bedroom. Door to bathroom. There is a double glazed window to front, fire surround with insert electric fire, TV point, telephone point, storage heater, doors to the kitchen area. Kitchen comprises of wall and base units, roll top work surfaces, inset sink unit with single drainer and mixer tap, splash back tiling, electric oven and hob with built in microwave above, cooker hood, extractor fan and under counter fridge/freezer. Double glazed window to front. Double glazed window to front. TV point, telephone point, electric wall mounted heater. Heated towel rail, double width shower cubicle, low level flush w/c, shaver point, extractor fan, small electric heater, wall mounted mirror. This beautifully maintained un-overlooked communal garden area has flower and shrub borders, seating areas, mature trees and lawn areas. The laundry room is available to all the residents and consists of three washing machines and two tumble dryers.
{ "redpajama_set_name": "RedPajamaC4" }
3,071
[ 128000, 2028, 99238, 6468, 19003, 7618, 5441, 10314, 3065, 5441, 7559, 2949, 264, 1664, 6319, 6485, 5918, 555, 45040, 612, 14637, 26, 433, 6209, 4395, 499, 1436, 11000, 1390, 2737, 17125, 3813, 11, 57937, 5789, 369, 3674, 3876, 11, 13217, 13077, 323, 264, 32719, 8774, 6222, 13863, 627, 2028, 1664, 12, 99020, 323, 36387, 21624, 13455, 374, 10107, 323, 98063, 449, 1695, 1404, 5844, 347, 367, 46338, 315, 264, 33236, 20396, 14321, 449, 264, 3544, 87041, 10209, 42853, 5942, 11, 39032, 3529, 10670, 449, 8821, 9979, 11, 2033, 14150, 449, 5918, 304, 26741, 299, 9620, 323, 17639, 3130, 627, 791, 2565, 5196, 11, 6319, 323, 5918, 555, 45040, 612, 14637, 11, 6209, 4395, 499, 1436, 387, 3411, 369, 11, 2737, 459, 42292, 57937, 39032, 53324, 279, 6222, 13863 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 2028, 99238, 6468, 19003, 7618, 5441, 10314, 3065, 5441, 7559, 2949, 264, 1664, 6319, 6485, 5918, 555, 45040, 612, 14637, 26, 433, 6209, 4395, 499, 1436, 11000, 1390, 2737, 17125, 3813, 11, 57937, 5789, 369, 3674, 3876, 11, 13217, 13077, 323, 264, 32719, 8774, 6222, 13863, 627, 2028, 1664, 12, 99020, 323, 36387, 21624, 13455, 374, 10107, 323, 98063, 449, 1695, 1404, 5844, 347, 367, 46338, 315, 264, 33236, 20396, 14321, 449, 264, 3544, 87041, 10209, 42853, 5942, 11, 39032, 3529, 10670, 449, 8821, 9979, 11, 2033, 14150, 449, 5918, 304, 26741, 299, 9620, 323, 17639, 3130, 627, 791, 2565, 5196, 11, 6319, 323, 5918, 555, 45040, 612, 14637, 11, 6209, 4395, 499, 1436, 387, 3411, 369, 11, 2737, 459, 42292, 57937, 39032, 53324, 279, 6222, 13863, -100 ]
US gas boom lures foreign investors The foreign investment environment in the US could soon become overcrowded, as the natural gas boom draws in overseas manufacturers. In a bid to capitalise on the cheap and plentiful supply of fuel and feedstocks, investors are flocking to the country and will continue to do so for the rest of the decade, reports The Wall Street Journal. Both domestic and international companies either have or intend to invest billion of dollars in plants designed to pump out chemicals, fertilisers, plastics, metals and fuel from gas. Foreign companies, either alone or as part of a joint venture, are certainly making the most of the opportunity, as gas in the US costs a fraction of European or Asian rates, the newspaper reported. Boston Consulting Group believes international companies will invest at least $50bn (£30bn) through to the end of the decade on low-price natural gas. Undoubtedly, reasonable energy costs are making the US the ideal place for investment - a fact Commerce Secretary Penny Pritzker identified earlier in the summer. David Constable, Sasol chief executive officer, told the Wall Street Journal: "All of the experts' views show a gas price that continues to stay reasonably low, even taking into account LNG exports, and an oil price that is going to be above $100 a barrel." Petrochemicals are proving to be particularly ripe for investment, accounting for one quarter of the $160.5bn in inbound foreign direct investment in the US last year. The BISWorld's Petrochemical Manufacturing market research report recently showed the sector grew by 2.6% this year, after a period of "significant volatility" over the last five years. However, as the economy has improved, downstream demand has increased. Yet BISWord isn't convinced the worst is over, stating that domestic operators in particular will be faced with obstacles - namely rising input costs (which affect prices) and performance. Nevertheless, heightened demand and the dependence on petrochemicals nationwide mean the sector is still a strong investment proposition. Companies looking to take advantage of the gas boom in the US can always benefit from expert local knowledge. TMF Group has the global reach to help businesses of all sizes when expanding across borders and offers experts on the ground. Doing business in the US: Entity management and the Corporate Transparency Act Walking on sunshine: why businesses are choosing Florida Doing business in Canada: What you should know Payroll in the US: The devil is in the detail 5 M&A failed deals: What can you learn from them? Managing entities in the US: how to minimise risk in a changing environment UBO in the USA: reporting requirements on the horizon
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
9,902
[ 128000, 2078, 6962, 30845, 326, 1439, 7362, 15167, 198, 791, 7362, 9341, 4676, 304, 279, 2326, 1436, 5246, 3719, 88204, 9988, 11, 439, 279, 5933, 6962, 30845, 27741, 304, 25355, 17032, 627, 644, 264, 14435, 311, 6864, 1082, 389, 279, 12136, 323, 81826, 8312, 315, 10633, 323, 5510, 69127, 11, 15167, 527, 49816, 287, 311, 279, 3224, 323, 690, 3136, 311, 656, 779, 369, 279, 2800, 315, 279, 13515, 11, 6821, 578, 9935, 6825, 10139, 627, 21279, 13018, 323, 6625, 5220, 3060, 617, 477, 30730, 311, 2793, 7239, 315, 11441, 304, 11012, 6319, 311, 14155, 704, 26333, 11, 36214, 62380, 11, 68386, 11, 37182, 323, 10633, 505, 6962, 627, 59732, 5220, 11, 3060, 7636, 477, 439, 961, 315, 264, 10496, 26255, 11, 527, 7995, 3339, 279, 1455, 315 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 2078, 6962, 30845, 326, 1439, 7362, 15167, 198, 791, 7362, 9341, 4676, 304, 279, 2326, 1436, 5246, 3719, 88204, 9988, 11, 439, 279, 5933, 6962, 30845, 27741, 304, 25355, 17032, 627, 644, 264, 14435, 311, 6864, 1082, 389, 279, 12136, 323, 81826, 8312, 315, 10633, 323, 5510, 69127, 11, 15167, 527, 49816, 287, 311, 279, 3224, 323, 690, 3136, 311, 656, 779, 369, 279, 2800, 315, 279, 13515, 11, 6821, 578, 9935, 6825, 10139, 627, 21279, 13018, 323, 6625, 5220, 3060, 617, 477, 30730, 311, 2793, 7239, 315, 11441, 304, 11012, 6319, 311, 14155, 704, 26333, 11, 36214, 62380, 11, 68386, 11, 37182, 323, 10633, 505, 6962, 627, 59732, 5220, 11, 3060, 7636, 477, 439, 961, 315, 264, 10496, 26255, 11, 527, 7995, 3339, 279, 1455, 315, -100 ]
Researchers have found a technique which has already revealed that the chemical substance DDT had uncharted effects on humans, who for instance may develop asthma. The software also renders superfluous the use of tens of thousands of laboratory animals when initiating studies of a substance. (Photo: Colourbox). Now we can learn more about chemicals in the body Now it will be much easier to examine the effects of chemical substances on humans, thanks to a new computer model which compares data from all over the world. Kristoffer Lottrup friday 04. November 2011 - 14:39 The US National Research Council and the European Chemicals Agency have long been searching for new ways to study the effects of chemical substances on humans. What is needed are faster and more effective tests, and an alternative to costly animal experiments would make the process cheaper as well as saving the lives of thousands of laboratory animals. Two Danish researchers have now come up with a more efficient, less costly way of testing for chemical substances and their method has just been published in the journal Environmental Health Perspectives. Karine Audouze, PhD, a lecturer at Denmark's Technical University (DTU), and Professor Philippe Grandjean from the Department of Health Service Research at the University of Southern Denmark (SDU) have developed and tested a computer program which compares existing chemical data to give an indication of how the body reacts to a toxic substance. A smart collection of existing knowledge On the Internet there are now many international, publicly accessible databases compiled by universities or laboratories, containing information about the properties of chemicals and their effects on human genes as well as their correlation with various diseases. Apart from listing chemicals by name, the databases also provide information including synonyms for the chemicals, their chemical structures and potential health risks. The two researchers have combined these databases into a new database called ChemProt, which was developed at DTU. ChemProt links up all the information and assesses a given chemical's effects on, and bonds with, the body's proteins and in this way predicts possible health risks. The result is a computer model which can predict chemicals' toxicological consequences to humans. The name of the chemical is entered into a search box, after which it is compared to, and listed against, all the available data. Helps researchers find a specific focus According to Professor Grandjean, the computer model can make studies of chemical substances more logical and comprehensive. "The computer model links all known data together. When you want to examine a chemical, the model can compare it to everything we already know. In this way we can find out how the chemical bonds itself to specific proteins in the body and the likely consequences of this." The model can exclude a number of scenarios and point to something quite specific, which researchers can then study more closely. "This goes far beyond traditional animal experiments in which animals are given different doses of a substance so that we can see what happens," says Grandjean. Test showed correlation between DDT and autism In order to examine the usefulness of their invention, the researchers used ChemProt to examine the chemical substance DDT (dichlorodiphenytrichloroethane). DDT was once regarded as a miracle substance as it proved to be extremely effective as an insecticide. However, it has since proven highly non-biodegradable and extremely harmful to the environment as well as to humans in the long term. The substance has now been banned throughout most of the world. Earlier studies of DDT focused to a high degree on breast cancer, semen quality and its harmful effects on the development of the brain. Delving deeper into the researchers' computer model, however, also revealed links between DDT and the development of diabetes, asthma and autism. These discoveries have led the researchers to urge closer examination of DDT. The program could lead to fewer experiments on animals Although the computer model has demonstrated its effectiveness in the study of chemical substances, it is not a replacement for experiments on animals. The programme will also help to point researchers in the right direction by excluding certain scenarios and making others more probable. "The computer model should be seen as a more effective method of arousing suspicion. The program can account for some correlations, which researchers and authorities can then pursue. Following this it may naturally be necessary and very useful to carry out experiments on animals. However, by limiting the use of laboratory animals and thus rendering the process more efficient, there is much to be won," says Professor Grandjean. Read the article in Danish at videnskab.dk Scientific links Application of Computational Systems Biology to Explore Environmental Toxicity Hazards Karine Audouze's profile (Denmark's Technical University) Philippe Grandjean's profile (University of Southern Denmark) prevention health videnskab.dk diseases denmark chemistry pollution New study on the difficulties facing children of diplomats: "The hardest thing about being a diplomat's kid was, without comparison, returning home" What old graffiti can tell us about medieval people Researchers' Zone: Extreme variation in snake venom: no two bites are the same Snake venom is affected by many factors and therefore varies to a degree that makes it almost impossible to find broadly effective treatments. Living human brain in petri dishes provides unique insight into old mysteries For the first time in Denmark, researchers are examining living pieces of human brain in a laboratory.
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
367
[ 128000, 60210, 617, 1766, 264, 15105, 902, 706, 2736, 10675, 430, 279, 11742, 20278, 423, 10822, 1047, 653, 91918, 6372, 389, 12966, 11, 889, 369, 2937, 1253, 2274, 51643, 13, 578, 3241, 1101, 45382, 2307, 1517, 9373, 279, 1005, 315, 22781, 315, 9214, 315, 27692, 10099, 994, 79516, 7978, 315, 264, 20278, 13, 320, 10682, 25, 41962, 2054, 4390, 7184, 584, 649, 4048, 810, 922, 26333, 304, 279, 2547, 198, 7184, 433, 690, 387, 1790, 8831, 311, 21635, 279, 6372, 315, 11742, 33155, 389, 12966, 11, 9523, 311, 264, 502, 6500, 1646, 902, 43565, 828, 505, 682, 927, 279, 1917, 627, 76943, 26133, 22503, 376, 455, 198, 1658, 49978, 220, 2371, 13, 6841, 220, 679, 16, 482, 220, 975, 25, 2137, 198, 791, 2326, 5165, 8483, 9251, 323 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 60210, 617, 1766, 264, 15105, 902, 706, 2736, 10675, 430, 279, 11742, 20278, 423, 10822, 1047, 653, 91918, 6372, 389, 12966, 11, 889, 369, 2937, 1253, 2274, 51643, 13, 578, 3241, 1101, 45382, 2307, 1517, 9373, 279, 1005, 315, 22781, 315, 9214, 315, 27692, 10099, 994, 79516, 7978, 315, 264, 20278, 13, 320, 10682, 25, 41962, 2054, 4390, 7184, 584, 649, 4048, 810, 922, 26333, 304, 279, 2547, 198, 7184, 433, 690, 387, 1790, 8831, 311, 21635, 279, 6372, 315, 11742, 33155, 389, 12966, 11, 9523, 311, 264, 502, 6500, 1646, 902, 43565, 828, 505, 682, 927, 279, 1917, 627, 76943, 26133, 22503, 376, 455, 198, 1658, 49978, 220, 2371, 13, 6841, 220, 679, 16, 482, 220, 975, 25, 2137, 198, 791, 2326, 5165, 8483, 9251, 323, -100 ]
This set of (front/rear) leveling lift kit immediately offers increased ground clearance without the hassle of a long and drawn out installation process. The vehicle can retain the use of the stock shocks. Rear lift kit will put a slight rake back in your vehicle for hauling or towing or lifting. Featuring 100% bolt-on installation and a unique design that allows fitment without problems. The kit will not affect your factory OEM ride quality or comfort level.
{ "redpajama_set_name": "RedPajamaC4" }
5,552
[ 128000, 2028, 743, 315, 320, 7096, 10991, 277, 8, 74085, 12157, 16530, 7214, 6209, 7319, 5015, 36654, 2085, 279, 47947, 315, 264, 1317, 323, 15107, 704, 14028, 1920, 13, 578, 7458, 649, 14389, 279, 1005, 315, 279, 5708, 68260, 13, 47002, 12157, 16530, 690, 2231, 264, 8275, 76518, 1203, 304, 701, 7458, 369, 99546, 477, 89792, 477, 33510, 13, 52331, 220, 1041, 4, 32942, 10539, 14028, 323, 264, 5016, 2955, 430, 6276, 5052, 479, 2085, 5435, 13, 578, 16530, 690, 539, 7958, 701, 8803, 41862, 12141, 4367, 477, 6981, 2237, 13, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 ]
[ 2028, 743, 315, 320, 7096, 10991, 277, 8, 74085, 12157, 16530, 7214, 6209, 7319, 5015, 36654, 2085, 279, 47947, 315, 264, 1317, 323, 15107, 704, 14028, 1920, 13, 578, 7458, 649, 14389, 279, 1005, 315, 279, 5708, 68260, 13, 47002, 12157, 16530, 690, 2231, 264, 8275, 76518, 1203, 304, 701, 7458, 369, 99546, 477, 89792, 477, 33510, 13, 52331, 220, 1041, 4, 32942, 10539, 14028, 323, 264, 5016, 2955, 430, 6276, 5052, 479, 2085, 5435, 13, 578, 16530, 690, 539, 7958, 701, 8803, 41862, 12141, 4367, 477, 6981, 2237, 13, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100 ]
AMT Datasouth Corp. is a leading manufacturer and supplier of desktop barcode label and tag printers, media, label design software and other peripherals sold under our market name of Fastmark and other private label brands. AMT Datasouth Corp. serves its customers through a network of Dealers and VAR's. The company's goal is to provide efficient and cost effective printer solutions that are consistent with customer requirements and application demands. The Fastmark thermal printer line are versatile and configurable label printers providing perfect printing solutions for small, as well as large operations in virtually all industries and vertical markets.
{ "redpajama_set_name": "RedPajamaC4" }
2,147
[ 128000, 1428, 51, 423, 19907, 2969, 22621, 13, 374, 264, 6522, 14290, 323, 19353, 315, 17963, 50507, 2440, 323, 4877, 57053, 11, 3772, 11, 2440, 2955, 3241, 323, 1023, 91984, 6216, 1234, 1057, 3157, 836, 315, 17737, 4075, 323, 1023, 879, 2440, 16097, 627, 1428, 51, 423, 19907, 2969, 22621, 13, 17482, 1202, 6444, 1555, 264, 4009, 315, 79289, 323, 44608, 596, 13, 578, 2883, 596, 5915, 374, 311, 3493, 11297, 323, 2853, 7524, 23185, 10105, 430, 527, 13263, 449, 6130, 8670, 323, 3851, 18651, 627, 791, 17737, 4075, 29487, 23185, 1584, 527, 33045, 323, 44494, 2440, 57053, 8405, 4832, 18991, 10105, 369, 2678, 11, 439, 1664, 439, 3544, 7677, 304, 21907, 682, 19647, 323, 12414, 11987, 13, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 ]
[ 1428, 51, 423, 19907, 2969, 22621, 13, 374, 264, 6522, 14290, 323, 19353, 315, 17963, 50507, 2440, 323, 4877, 57053, 11, 3772, 11, 2440, 2955, 3241, 323, 1023, 91984, 6216, 1234, 1057, 3157, 836, 315, 17737, 4075, 323, 1023, 879, 2440, 16097, 627, 1428, 51, 423, 19907, 2969, 22621, 13, 17482, 1202, 6444, 1555, 264, 4009, 315, 79289, 323, 44608, 596, 13, 578, 2883, 596, 5915, 374, 311, 3493, 11297, 323, 2853, 7524, 23185, 10105, 430, 527, 13263, 449, 6130, 8670, 323, 3851, 18651, 627, 791, 17737, 4075, 29487, 23185, 1584, 527, 33045, 323, 44494, 2440, 57053, 8405, 4832, 18991, 10105, 369, 2678, 11, 439, 1664, 439, 3544, 7677, 304, 21907, 682, 19647, 323, 12414, 11987, 13, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100 ]
The Dutch National Internet Providers Management Organization (Nationale Beheersorganisatie Internet Providers, or NBIP for short) is a unique initiative of Internet providers that goes under the motto "Smarter and stronger together". The NBIP is an independent non-profit organization that contributes to a safer Internet by jointly purchasing expensive facilities that are only occasionally needed. The NBIP was established in 2002 by a group of Internet service providers, as an institute for implementing wiretapping warrants as stipulated in the Dutch Telecommunications Act. Since then, the organization has become a reliable institution with a growing number of members. In addition to wiretapping services, the NBIP also offers the well-known NaWas, one of the largest anti-DDoS systems in Europe. The NBIP attaches great importance to sharing knowledge. We conduct surveys, speak at events, inform members regularly about new developments, and organize meetings where members can swap their experiences. In addition, the NBIP consults closely with the government on its areas of interest.
{ "redpajama_set_name": "RedPajamaC4" }
7,912
[ 128000, 791, 24113, 5165, 8191, 71029, 9744, 21021, 320, 45, 38135, 2893, 383, 388, 8629, 285, 26937, 8191, 71029, 11, 477, 36079, 3378, 369, 2875, 8, 374, 264, 5016, 20770, 315, 8191, 12850, 430, 5900, 1234, 279, 63426, 330, 10902, 5408, 323, 16643, 3871, 3343, 578, 36079, 3378, 374, 459, 9678, 2536, 28926, 7471, 430, 44072, 311, 264, 30549, 8191, 555, 53258, 23395, 11646, 13077, 430, 527, 1193, 23781, 4460, 627, 791, 36079, 3378, 574, 9749, 304, 220, 1049, 17, 555, 264, 1912, 315, 8191, 2532, 12850, 11, 439, 459, 44798, 369, 25976, 9244, 83, 3713, 55688, 439, 43773, 7913, 304, 279, 24113, 13875, 44410, 3298, 627, 12834, 1243, 11, 279, 7471, 706, 3719, 264, 15062, 15244, 449, 264, 7982, 1396, 315, 3697, 13, 763, 5369, 311, 9244 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 791, 24113, 5165, 8191, 71029, 9744, 21021, 320, 45, 38135, 2893, 383, 388, 8629, 285, 26937, 8191, 71029, 11, 477, 36079, 3378, 369, 2875, 8, 374, 264, 5016, 20770, 315, 8191, 12850, 430, 5900, 1234, 279, 63426, 330, 10902, 5408, 323, 16643, 3871, 3343, 578, 36079, 3378, 374, 459, 9678, 2536, 28926, 7471, 430, 44072, 311, 264, 30549, 8191, 555, 53258, 23395, 11646, 13077, 430, 527, 1193, 23781, 4460, 627, 791, 36079, 3378, 574, 9749, 304, 220, 1049, 17, 555, 264, 1912, 315, 8191, 2532, 12850, 11, 439, 459, 44798, 369, 25976, 9244, 83, 3713, 55688, 439, 43773, 7913, 304, 279, 24113, 13875, 44410, 3298, 627, 12834, 1243, 11, 279, 7471, 706, 3719, 264, 15062, 15244, 449, 264, 7982, 1396, 315, 3697, 13, 763, 5369, 311, 9244, -100 ]
The Parish Council meets at 7.30pm every third Wednesday of the month in the Community Centre, Playing Field Lane. Members of the public are always welcome to attend and time is allotted at the start of the meeting for a public forum where any item on the Agenda can be discussed by members of the public. In the Community Centre, Playingfield Lane. Outside the DIY, junction of Cess Road and Repps Road. On the gable end of the bus shelter The Green. Outside the Village Hall, White Street.The Parish Council has a facebook page 'Martham Parish Council' . 'Like' the page to stay up to date.
{ "redpajama_set_name": "RedPajamaC4" }
4,043
[ 128000, 791, 60347, 9251, 20628, 520, 220, 22, 13, 966, 5298, 1475, 4948, 8079, 315, 279, 2305, 304, 279, 12332, 14821, 11, 40551, 8771, 27109, 13, 17384, 315, 279, 586, 527, 2744, 10788, 311, 9604, 323, 892, 374, 92643, 520, 279, 1212, 315, 279, 6574, 369, 264, 586, 12111, 1405, 904, 1537, 389, 279, 58662, 649, 387, 14407, 555, 3697, 315, 279, 586, 627, 644, 279, 12332, 14821, 11, 40551, 2630, 27109, 627, 42465, 279, 32558, 11, 49341, 315, 356, 434, 9728, 323, 1050, 60643, 9728, 627, 1966, 279, 342, 481, 842, 315, 279, 5951, 23756, 578, 7997, 627, 42465, 279, 25036, 11166, 11, 5929, 6825, 11829, 60347, 9251, 706, 264, 23795, 2199, 364, 12331, 339, 309, 60347, 9251, 6, 662, 364, 13246, 6, 279, 2199, 311, 4822 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 791, 60347, 9251, 20628, 520, 220, 22, 13, 966, 5298, 1475, 4948, 8079, 315, 279, 2305, 304, 279, 12332, 14821, 11, 40551, 8771, 27109, 13, 17384, 315, 279, 586, 527, 2744, 10788, 311, 9604, 323, 892, 374, 92643, 520, 279, 1212, 315, 279, 6574, 369, 264, 586, 12111, 1405, 904, 1537, 389, 279, 58662, 649, 387, 14407, 555, 3697, 315, 279, 586, 627, 644, 279, 12332, 14821, 11, 40551, 2630, 27109, 627, 42465, 279, 32558, 11, 49341, 315, 356, 434, 9728, 323, 1050, 60643, 9728, 627, 1966, 279, 342, 481, 842, 315, 279, 5951, 23756, 578, 7997, 627, 42465, 279, 25036, 11166, 11, 5929, 6825, 11829, 60347, 9251, 706, 264, 23795, 2199, 364, 12331, 339, 309, 60347, 9251, 6, 662, 364, 13246, 6, 279, 2199, 311, 4822, -100 ]
Unemployment Insurance and Benefits COVID-19 has created a large demand for unemployment insurance benefits. The North Carolina Division of Employment Security is the agency in charge of both state and federal unemployment benefits. Below is information about how to apply and answers to other common questions. Filing for Benefits The Division of Employment Security's website is the best way to file a new claim. Visit their site to create an account and begin the application process. Lost Wages Assistance Program The Federal Emergency Management Agency approved the North Carolina Division of Employment Security's (DES) application for grant funding for the Lost Wages Assistance program (LWA) on Aug. 21, 2020. The following requirements must be met for a person to receive the $300 in LWA: Must be eligible for at least $100 per week in unemployment benefits from programs including state unemployment insurance, Pandemic Emergency Unemployment Compensation, Pandemic Unemployment Assistance and Extended Benefits. Must be unemployed or partially unemployed due to the COVID-19 pandemic and related changes. More Information About the LWA The NC Works Career Center in Durham is currently closed to the public. However, residents can still access resources virtually. To access those resources, please visit their website. Please note that office closures do not affect access to NCWorks Online. Job Applicants can continue to receive Job Search services and create resumes. Employers can still receive Recruitment Services. Should your local NCWorks Career Center close, most services can still be accomplished online. Visit NCWorks Online. The City of Durham and its Small Business Advisory Committee are here to ensure you have all the resources you need Setting Your Business Up For Success 2023 Public Policy Series Kick Off Mastermind Group Series 1.0 Let's Build a Website! Sat, Feb 4 - Fri, Feb 10 Black Business Week Tue, Feb 7 Schedule C for Artists How to Find Your Customers Using Social Media Basic Budgeting for Small Arts Organizations How to Use LinkedIn to Grow Your Small Business
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
4,738
[ 128000, 1844, 21093, 22413, 323, 39195, 198, 79063, 12, 777, 706, 3549, 264, 3544, 7631, 369, 26690, 8276, 7720, 13, 578, 4892, 13030, 14829, 315, 41952, 8398, 374, 279, 9266, 304, 6900, 315, 2225, 1614, 323, 6918, 26690, 7720, 13, 21883, 374, 2038, 922, 1268, 311, 3881, 323, 11503, 311, 1023, 4279, 4860, 627, 37, 8138, 369, 39195, 198, 791, 14829, 315, 41952, 8398, 596, 3997, 374, 279, 1888, 1648, 311, 1052, 264, 502, 3802, 13, 19545, 872, 2816, 311, 1893, 459, 2759, 323, 3240, 279, 3851, 1920, 627, 48353, 468, 1154, 46865, 6826, 198, 791, 12411, 32708, 9744, 16784, 12054, 279, 4892, 13030, 14829, 315, 41952, 8398, 596, 320, 39087, 8, 3851, 369, 13500, 11006, 369, 279, 28351, 468, 1154, 46865, 2068, 320, 43, 27486, 8, 389 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 1844, 21093, 22413, 323, 39195, 198, 79063, 12, 777, 706, 3549, 264, 3544, 7631, 369, 26690, 8276, 7720, 13, 578, 4892, 13030, 14829, 315, 41952, 8398, 374, 279, 9266, 304, 6900, 315, 2225, 1614, 323, 6918, 26690, 7720, 13, 21883, 374, 2038, 922, 1268, 311, 3881, 323, 11503, 311, 1023, 4279, 4860, 627, 37, 8138, 369, 39195, 198, 791, 14829, 315, 41952, 8398, 596, 3997, 374, 279, 1888, 1648, 311, 1052, 264, 502, 3802, 13, 19545, 872, 2816, 311, 1893, 459, 2759, 323, 3240, 279, 3851, 1920, 627, 48353, 468, 1154, 46865, 6826, 198, 791, 12411, 32708, 9744, 16784, 12054, 279, 4892, 13030, 14829, 315, 41952, 8398, 596, 320, 39087, 8, 3851, 369, 13500, 11006, 369, 279, 28351, 468, 1154, 46865, 2068, 320, 43, 27486, 8, 389, -100 ]
It is the ideal time for bettors and professional players to maximize the chances to generate money from wagering. There are a huge selection of the wagers, famous and also leading game titles that you can use for betting, probably the most gamblers utilize poker, dice and baseball for gambling. If you are ready to use betting as your fundamental profession, then you should be an all-rounder to play a variety of sports and games for gambling. With this, you should choose togel agent (agen Togel) in places you will be able to perform betting on togel that is a fascinating game at any time. The most players and bettors believe that togel is a game that will only be enjoyed and win by all the best. They say if you do not have the excellent destiny, then you need to avoid playing the Togel with regard to money. Actually, the good good fortune matters somewhat, but not sufficient that you think that it can do not be played and won without the good success. In these days, there are hundreds of globally famous bettors and betting teams which have been playing Togel online for a long time for money. It's not a complicated or challenging thing for you to start betting on togel. Simply, you have to learn about the bingo, its enjoying methods, principles, additional information plus a little bit about the gambling. After you have collected similarly info, you will be able to begin betting upon togel as well as some other your favorite sport or gambling establishment sport. Right now, you should concentrate on the right place and the togel realtor (agen Togel) for playing wagers. Further, you should also focus on several important information and aspects that may impact the betting. First, you shouldn't rely on an uncertified and fresh gambling website where you can take part in the Togel for the sake of earnings. It has become very easy for the gamblers to choose an appropriate place or even casino for taking part in bets on togel. In addition, you shouldn't place gamble form an increased value because this can be a little bit risky. You need to focus on the experience, skills and practices. These are a few major qualities that will help you to win consistently. Finally, you should accept small bonuses as well as wins, which you can optimize with all the passage of energy. On the other side, you should also consider the reasons, reasons and facts associated with actively playing gambling on togel. First of all, the gamers and gamblers must be acquainted with togel, betting rules and wagering before to experience bets. It's the easiest and also simplest way to generate money from wagering. You should discover completely how you can play the Togel online. If you are unable to discover this game for betting and also gambling, then you need to prefer hiring an agent for betting. There are lots of gamblers and agents who offer their own gambling solutions for betting. You can employ a right realtor for betting at a few commission or even fixed rates. The players can find top real estate agents online that is an easy way to hire several professional gamblers for gambling. You should also focus on some important facts and aspects that may influence the betting. Click here to know more togel. lightside9 is using Hatena Blog. Would you like to try it too?
{ "redpajama_set_name": "RedPajamaC4" }
2,423
[ 128000, 2181, 374, 279, 10728, 892, 369, 1297, 98266, 323, 6721, 4311, 311, 35608, 279, 17393, 311, 7068, 3300, 505, 56443, 287, 13, 2684, 527, 264, 6908, 6727, 315, 279, 289, 11467, 11, 11495, 323, 1101, 6522, 1847, 15671, 430, 499, 649, 1005, 369, 26243, 11, 4762, 279, 1455, 9192, 71478, 29166, 21481, 11, 22901, 323, 20075, 369, 25725, 13, 1442, 499, 527, 5644, 311, 1005, 26243, 439, 701, 16188, 4913, 11, 1243, 499, 1288, 387, 459, 682, 12, 583, 910, 311, 1514, 264, 8205, 315, 10034, 323, 3953, 369, 25725, 13, 3161, 420, 11, 499, 1288, 5268, 13445, 301, 8479, 320, 8703, 350, 540, 301, 8, 304, 7634, 499, 690, 387, 3025, 311, 2804, 26243, 389, 13445, 301, 430, 374, 264, 27387, 1847, 520, 904, 892, 13 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 2181, 374, 279, 10728, 892, 369, 1297, 98266, 323, 6721, 4311, 311, 35608, 279, 17393, 311, 7068, 3300, 505, 56443, 287, 13, 2684, 527, 264, 6908, 6727, 315, 279, 289, 11467, 11, 11495, 323, 1101, 6522, 1847, 15671, 430, 499, 649, 1005, 369, 26243, 11, 4762, 279, 1455, 9192, 71478, 29166, 21481, 11, 22901, 323, 20075, 369, 25725, 13, 1442, 499, 527, 5644, 311, 1005, 26243, 439, 701, 16188, 4913, 11, 1243, 499, 1288, 387, 459, 682, 12, 583, 910, 311, 1514, 264, 8205, 315, 10034, 323, 3953, 369, 25725, 13, 3161, 420, 11, 499, 1288, 5268, 13445, 301, 8479, 320, 8703, 350, 540, 301, 8, 304, 7634, 499, 690, 387, 3025, 311, 2804, 26243, 389, 13445, 301, 430, 374, 264, 27387, 1847, 520, 904, 892, 13, -100 ]
Who Wrote the Bible's first 5 Books? (ii) There are still people who believe the Bible is "inerrant". This would have astonished those editors for whom inconsistencies and even contradictions were such a non-issue they made little attempt to 'iron them out'. They clearly didn't imagine they were writing the 'infallible word of God', nor should we. For example, in Exodus 6 (P source), God says to Moses "I appeared to Abraham, Isaac and Jacob .. but by my name Yahweh I did not make myself known to them". Genesis 4 (J source), however, says that long before Noah, never mind Abraham, "the name of Yahweh was first invoked". Scholars see the Pentateuch as a compilation from 4 sources, called J, E, D and P. It's generally thought the earliest was J, from around the 10th century BCE, which refers to God as Yahweh (Jahwe in German). J's God is human-like. He's a potter making the first man from clay; a paramedic breathing life into his nostrils; a garden designer, and a tailor making clothes for Adam and Eve. He shuts the door of the Ark once Noah has boarded and, after the Flood, is attracted by the delicious aroma from Noah's barbecue. According to J, Moses, whose father-in-law is Reuel, receives the Law on Mount Sinai. J's main focus is the three-fold promise to Abraham of land, descendants and blessing, provided Abraham 'walks before him and is blameless'. The next source, E, refers to God as Elohim, and belongs to the northern kingdom around its 9th century split from Judah. E's God is much more remote than J's, and communicates indirectly through dreams, divine messengers and prophets. According to E, Moses, whose father-in-law is now called Jethro, receives the Law on Mount Horeb. When the northern kingdom was eliminated by Assyria, its stories were brought south and incorporated into J as an 'auxiliary' source. Only some were used, and so E is fragmentary rather than continuous. The D source is thought to be the "Book of the Law", supposedly "found" (II Kings 22) in the late 7th century, and is now Deuteronomy – meaning Second (deutero) Law (nomos) – the Pentateuch's 5th book. Israelite 'popular' religion had continued to include other Canaanite gods, so it's no surprise that a 'reminder' of Yahweh and his Law should make an appearance. It was added to the first 4 books by the literary device of Moses 'reminding' Israel, prior to entry into Canaan, of the 'first' (J & E) giving of the Law, and so contains both similarities to, and differences from, that version. The main focus of D is centralisation. Yahweh was declared to be uniquely present in his Temple in Jerusalem, and only there could there be altars and sacrifices. The last source was P from around the 5th century, after a remnant of Israelites returned from captivity in Babylon. Its writers, the final editors, were priests. P's God is not like a human being writ large, nor does he communicate via angels or dreams. In Genesis 1, for example, he's a remote, lofty 'voice'. The main focus for the priests included the covenants between God, Noah, Abraham and Moses, and ritual observances such as the Sabbath, circumcision, and the food and 'purity' laws. To the priests we owe the description in Exodus of the 'portable temple' (the tabernacle), and the less than captivating 'legal' chapters of Leviticus. Rather than inerrant and infallible, then, the Pentateuch contains the fallible and flawed words of innumerable men (think patriarchy), writing in different places, to different audiences, with different agendas, over the course of more than 500 years. To me, this makes it all the more absorbing, intriguing and readable, except for the inevitably boring bits which guiltlessly can be skipped over. Rather than the 'word of God', it's 'words about God', provoking ideas and raising 'possibilities' rather than stating 'facts'. That it's myth and legend, rather than history, is to me a bonus rather than a turn off. I can simply enjoy, just as they come, its multicoloured collection of imaginative and dramatic tales, and find in them whatever meaning suggests itself to the receptive mind. Christianity, Hebrew Bible, Literature, Mythology, Old Testament, Poetry, Religion Deuteronomy, God, Inerrant, Legend, Moses, Myth, Pentateuch, Priests, Stories 2 responses to "Who Wrote the Bible's first 5 Books? (ii)" This is you at your best with a factual account. Apart from the modish stress on "patriarchy" ( as i used to tell students who took this tack to demonstrate their feminist credentials it is more positively interesting two of the early books of the Bible are called after women). But apart from this slight blemish-in my eyes- it is a good sound interesting blog. My thanks, Alan, for your positive remarks, though my mischievous side would suggest that this means I must have missed a mark somewhere! I'm amused at being described as 'modish' – that's an unusual adjective to come my way. I think it's noteworthy that the two books about women were of course written by men, arguably in furtherance of their masculine agendas in so doing. I also think that both sections of the Bible would have been substantially, if not radically, different if all the books had in fact been written by women. I wonder if anyone has explored that particular avenue in any depth, which would be not only thought provoking one suspects …
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
576
[ 128000, 15546, 468, 5646, 279, 17377, 596, 1176, 220, 20, 18312, 30, 320, 3893, 340, 3947, 527, 2103, 1274, 889, 4510, 279, 17377, 374, 330, 258, 618, 519, 3343, 1115, 1053, 617, 100174, 1884, 29846, 369, 8884, 92922, 323, 1524, 81523, 1051, 1778, 264, 2536, 90465, 814, 1903, 2697, 4879, 311, 364, 2534, 1124, 704, 4527, 2435, 9539, 3287, 956, 13085, 814, 1051, 4477, 279, 364, 258, 13772, 1260, 3492, 315, 4359, 518, 6463, 1288, 584, 13, 1789, 3187, 11, 304, 88942, 220, 21, 320, 47, 2592, 705, 4359, 2795, 311, 42048, 330, 40, 9922, 311, 37488, 11, 42608, 323, 25537, 5354, 719, 555, 856, 836, 83562, 906, 71, 358, 1550, 539, 1304, 7182, 3967, 311, 1124, 3343, 41888, 220, 19, 320, 41, 2592, 705, 4869, 11, 2795 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 15546, 468, 5646, 279, 17377, 596, 1176, 220, 20, 18312, 30, 320, 3893, 340, 3947, 527, 2103, 1274, 889, 4510, 279, 17377, 374, 330, 258, 618, 519, 3343, 1115, 1053, 617, 100174, 1884, 29846, 369, 8884, 92922, 323, 1524, 81523, 1051, 1778, 264, 2536, 90465, 814, 1903, 2697, 4879, 311, 364, 2534, 1124, 704, 4527, 2435, 9539, 3287, 956, 13085, 814, 1051, 4477, 279, 364, 258, 13772, 1260, 3492, 315, 4359, 518, 6463, 1288, 584, 13, 1789, 3187, 11, 304, 88942, 220, 21, 320, 47, 2592, 705, 4359, 2795, 311, 42048, 330, 40, 9922, 311, 37488, 11, 42608, 323, 25537, 5354, 719, 555, 856, 836, 83562, 906, 71, 358, 1550, 539, 1304, 7182, 3967, 311, 1124, 3343, 41888, 220, 19, 320, 41, 2592, 705, 4869, 11, 2795, -100 ]
International Medical Director/International Scientific Director Basel Headquarter Life Sciences, Bioengineering, Biology, Biomedical Engineering, Biomedical Sciences, Cancer Research, Cell Biology, Health Sciences, Clinical Medicine, Clinical Research, Diagnostics, Drug Development, Medical Engineering, Medicine Manager, Medical Doctor, President/CEO/Director/VP We believe it's urgent to deliver medical solutions right now – even as we develop innovations for the future. We are passionate about transforming patients' lives. We are courageous in both decision and action. And we believe that good business means a better world. That is why we come to work each day. We commit ourselves to scientific rigour, unassailable ethics, and access to medical innovations for all. We do this today to build a better tomorrow. We are proud of who we are, what we do, and how we do it. We are many, working as one across functions, across companies, and across the world. We are Roche. The International Medical Director (IMD)/International Scientific Director (ISD), reporting to the Group International Medical Director (GIMD) for the HER2+ Breast Cancer Franchise is a key role in the development of medical strategy and execution of the Medical and Evidence Generation Strategy for a product /group of products in HER2+ BC Franchise. The role requires strong disease specific expertise and business understanding to identify and address the relevant medical needs of clinical practice, to successfully support the cross-functional team, preferably with HER2 Franchise experience. Summary of Main Responsibilities: Accountable for the evidence generation strategy planning and execution, incl. (but not limited to) identifying medical and access gaps and needs as part of the overall medical strategy Responsible for the joint planning and execution of the Medical Strategy for the assigned product(s) / Indication(s) Evidence Generation Strategy Planning and Execution Drives and leads the strategy of the integrated evidence generation activities, incl. Roche sponsored clinical studies, Investigator Initiated Studies (IIS), RWD Accountable for evidence generation activities for the assigned product (s) / Indication(s), including risk benefit assessment and medical monitoring in all medical affairs interventional studies Takes the role of Lead Scientific Responsible and acts as a member of the Study Management Team (SMT) Assesses the needs and coordinates compassionate use of the assigned product(s) In collaboration with Global Access (GA) and appropriate Affiliates stakeholders, identifies the evidence generation needs/gaps in order to obtain and maintain patient access and integrates them into the evidence generation strategy Provides medical expertise and input into the market access, brand and lifecycle strategies and plans (e.g. Life Cycle Plans, Brand Plans, Launch Plans, Comparative Benefit Risk Assessments and other relevant documents) External Collaborations Develops, advances and maintains TAE interactions and collaborations, incl. those aimed to set up and conduct evidence generation activities Represents Roche in peer-to-peer interactions with external collaboration partners, including in patient-company interactions We are looking for a MD or PhD with relevant clinical experience (patient care decision-making) at the point of care. Specialization degree and experience in the disease area are a plus. With relevant pharmaceutical industry experience in Medical Affairs function (preferably at Global or Regional level and in HER2+ Franchise)​. You will bring: Experience in Evidence Generation within or outside the pharmaceutical industry, including protocol-writing. Experience in Compassionate Use Program/Compassionate Use Request management Understanding of business context, access and regulatory environments and trends Experienced educator/ presenter. Experience of partnership with therapeutic area experts and external organizations is strongly preferred Previous experience with launch of drugs/indications is preferred Clinical or scientific experience in the field of HER2+ Breast Cancer is a plus. Fluency in written and spoken English Functional competencies, including but not limited to, organization, prioritization and planning skills, negotiation skills, communication & presentation skills. Roche is an equal opportunity employer. Assistant Professorship (no tenure track) for Hepatology Zurich, Canton of Zürich (CH) Life Sciences Full Time Pharma jobs in Switzerland Bioengineering Full Time Pharma jobs in Switzerland Biology Full Time Pharma jobs in Switzerland Biomedical Sciences Full Time Pharma jobs in Switzerland Cell Biology Full Time Pharma jobs in Switzerland
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
7,161
[ 128000, 34746, 13235, 10783, 14, 34746, 38130, 10783, 198, 34703, 301, 11452, 33115, 198, 26833, 23199, 11, 24432, 99015, 11, 40023, 11, 12371, 61860, 17005, 11, 12371, 61860, 23199, 11, 26211, 8483, 11, 14299, 40023, 11, 6401, 23199, 11, 33135, 19152, 11, 33135, 8483, 11, 7923, 15920, 11, 26166, 11050, 11, 13235, 17005, 11, 19152, 198, 2087, 11, 13235, 19150, 11, 4900, 14, 79596, 15302, 66576, 14, 13683, 198, 1687, 4510, 433, 596, 34771, 311, 6493, 6593, 10105, 1314, 1457, 1389, 1524, 439, 584, 2274, 46045, 369, 279, 3938, 13, 1226, 527, 25429, 922, 46890, 6978, 6, 6439, 13, 1226, 527, 75748, 304, 2225, 5597, 323, 1957, 13, 1628, 584, 4510, 430, 1695, 2626, 3445, 264, 2731, 1917, 627, 4897, 374, 3249, 584, 2586, 311, 990, 1855, 1938 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 34746, 13235, 10783, 14, 34746, 38130, 10783, 198, 34703, 301, 11452, 33115, 198, 26833, 23199, 11, 24432, 99015, 11, 40023, 11, 12371, 61860, 17005, 11, 12371, 61860, 23199, 11, 26211, 8483, 11, 14299, 40023, 11, 6401, 23199, 11, 33135, 19152, 11, 33135, 8483, 11, 7923, 15920, 11, 26166, 11050, 11, 13235, 17005, 11, 19152, 198, 2087, 11, 13235, 19150, 11, 4900, 14, 79596, 15302, 66576, 14, 13683, 198, 1687, 4510, 433, 596, 34771, 311, 6493, 6593, 10105, 1314, 1457, 1389, 1524, 439, 584, 2274, 46045, 369, 279, 3938, 13, 1226, 527, 25429, 922, 46890, 6978, 6, 6439, 13, 1226, 527, 75748, 304, 2225, 5597, 323, 1957, 13, 1628, 584, 4510, 430, 1695, 2626, 3445, 264, 2731, 1917, 627, 4897, 374, 3249, 584, 2586, 311, 990, 1855, 1938, -100 ]
Chast's graphic memoir is both funny and sad. It was such an eye opener with regards to growing old and dying. Can't We Talk About Something More Pleasant? is a graphic memoir of her last years with her parents, who are in their 90s and live on their own in Brooklyn. Her parents are quite a pair – her mother is bossy, and to be honest, a little bit scary and demanding; her father is a chronic worrier, and becomes senile. They have a fear of retirement homes and refuse to talk about the inevitable. But it does happen. Her mother falls down one day and can't get out of bed, and she is the one who cooks, drives and keeps their lives together. And so they have to move into an assisted living home, and Chast has to clear out their apartment – and all the many many items they have accumulated over the years (shavers??). But wow, to first of all learn of 90-plus-year-olds living on their own. And then to read of the cost of assisted living. It was a big shock to my system. This was a hard book to read. Some of the pages were hilarious, and others were just gut wrenchingly sad. You will inevitably think of your own family and wonder what you will do when your own parents can no longer look after themselves. Everyone has a memoir in miniature in at least one piece of clothing. In Worn Stories, Emily Spivack has collected over sixty of these clothing-inspired narratives from cultural figures and talented storytellers. First-person accounts range from the everyday to the extraordinary, such as artist Marina Abramovic on the boots she wore to walk the Great Wall of China; musician Rosanne Cash on the purple shirt that belonged to her father; and fashion designer Cynthia Rowley on the Girl Scout sash that informed her business acumen. Other contributors include Greta Gerwig, Heidi Julavits, John Hodgman, Brandi Chastain, Marcus Samuelsson, Piper Kerman, Maira Kalman, Sasha Frere-Jones, Simon Doonan, Albert Maysles, Susan Orlean, Andy Spade, Paola Antonelli, David Carr, Andrew Kuo, and more. By turns funny, tragic, poignant, and celebratory, Worn Stories offers a revealing look at the clothes that protect us, serve as a uniform, assert our identity, or bring back the past–clothes that are encoded with the stories of our lives. I was excited to read this, it sounded like it would be a great read, but I think I was expecting something more in-depth but each story was just one or two pages long. Some of the stories were poignant, relating to a tragedy or a loved one, one or two were humorous, but too many were rather forgettable. And towards the end, I didn't really want to read on, although I did finish it, just to finish reading the book. Sigh. Maybe you would enjoy this more than I did, especially if you're a fan of some of the contributors, see above. I felt that the collection could have been more diverse, as a lot of the contributors were those from the art world. A Legacy – 1956 – her first novel, a work inspired by the early life of the author's father, which focuses on the brutality and anti-Semitism in the cadet schools of the German officer class. The Faces of Justice: A Traveller's report – 1961 – a description of the legal systems of England, Germany, Switzerland, and France. As It Was: Pleasures, Landscapes and Justice – 1990 – a collection of magazine pieces on various trials, including the censorship of Lady Chatterley's Lover, the trial of Jack Ruby, and the Auschwitz trial, as well as pieces on food and travel. Pleasures and Landscapes: A Traveller's Tales from Europe – a reissue of the above, removing the legal writings, and including two additional travel essays. Quicksands: A Memoir – 2005 – A memoir of the author's life, from her childhood in Berlin to her experiences in postwar Europe.
{ "redpajama_set_name": "RedPajamaC4" }
7,108
[ 128000, 1163, 561, 596, 21154, 51342, 374, 2225, 15526, 323, 12703, 13, 1102, 574, 1778, 459, 8071, 36253, 449, 24886, 311, 7982, 2362, 323, 23069, 627, 6854, 956, 1226, 19513, 10180, 25681, 4497, 64912, 30, 374, 264, 21154, 51342, 315, 1077, 1566, 1667, 449, 1077, 6699, 11, 889, 527, 304, 872, 220, 1954, 82, 323, 3974, 389, 872, 1866, 304, 26832, 13, 6385, 6699, 527, 5115, 264, 6857, 1389, 1077, 6691, 374, 13697, 88, 11, 323, 311, 387, 10978, 11, 264, 2697, 2766, 29565, 323, 26192, 26, 1077, 7126, 374, 264, 21249, 4191, 7401, 11, 323, 9221, 6252, 458, 13, 2435, 617, 264, 8850, 315, 21624, 10632, 323, 26122, 311, 3137, 922, 279, 31352, 13, 2030, 433, 1587, 3621, 13, 6385, 6691, 17503, 1523, 832, 1938, 323, 649 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 1163, 561, 596, 21154, 51342, 374, 2225, 15526, 323, 12703, 13, 1102, 574, 1778, 459, 8071, 36253, 449, 24886, 311, 7982, 2362, 323, 23069, 627, 6854, 956, 1226, 19513, 10180, 25681, 4497, 64912, 30, 374, 264, 21154, 51342, 315, 1077, 1566, 1667, 449, 1077, 6699, 11, 889, 527, 304, 872, 220, 1954, 82, 323, 3974, 389, 872, 1866, 304, 26832, 13, 6385, 6699, 527, 5115, 264, 6857, 1389, 1077, 6691, 374, 13697, 88, 11, 323, 311, 387, 10978, 11, 264, 2697, 2766, 29565, 323, 26192, 26, 1077, 7126, 374, 264, 21249, 4191, 7401, 11, 323, 9221, 6252, 458, 13, 2435, 617, 264, 8850, 315, 21624, 10632, 323, 26122, 311, 3137, 922, 279, 31352, 13, 2030, 433, 1587, 3621, 13, 6385, 6691, 17503, 1523, 832, 1938, 323, 649, -100 ]
NHTSA's pre­lim­i­nary esti­mates of safe­ty ben­e­fits of V2V tech­nol­o­gy show that just two safe­ty appli­ca­tions — Left Turn Assist (LTA) and Inter­sec­tion Move­ment Assist (IMA) – could pre­vent up to 592,000 crash­es and 1,083 lives could be saved per year. Let's give the gov­ern­ment cred­it where it's due: 30 years ago, the Fed­er­al High­way Admin­is­tra­tion (FHWA) began pro­grams designed to apply elec­tron­ic and soft­ware sys­tems to the trans­porta­tion sys­tem. Those pro­grams were first envi­sioned when the reign­ing tech­nol­o­gy was not far removed from punched cards and room-sized main­frames. The goal was to move more peo­ple more safe­ly and more effi­cient­ly over the exist­ing high­way sys­tem. Even then, it was clear that the gold­en era of high­way build­ing, if not over, soon would be, espe­cial­ly in urban areas. Only now, thir­ty years lat­er, are some of the more advanced ideas float­ed back then being real­ized. No, this is not the result of gov­ern­ment inep­ti­tude (sor­ry, lib­er­tar­i­ans). The nascent tech­nolo­gies talked of then were not pow­er­ful enough, per­va­sive enough, nor inex­pen­sive enough. Yet thanks to the per­sis­tence of FHWA, the Depart­ment of Trans­porta­tion, and the Admin­is­tra­tion under Pres­i­dent Bush, Con­gress passed the Inter­modal Sur­face Trans­porta­tion and Effi­cien­cy Act, pop­u­lar­ly known then as ISTEA. Pas­sage of the bill was only secured with tor­tur­ous bi-par­ti­san, big-state, small-state, and urban vs. rur­al nego­ti­a­tions, and maybe most impor­tant a slather­ing of pork. Right from the start, back in the ear­ly 80s, the notion of vehi­cle-to-vehi­cle com­mu­ni­ca­tion was sought after by FHWA. Now, final­ly, we are get­ting clos­er. Last week, the Depart­ment of Transportation's Nation­al High­way Traf­fic Safe­ty Admin­is­tra­tion (NHTSA) issued a notice of a pro­posed rule mak­ing that could require vehi­cles pro­duced after 2020 to be equipped with V2V tech­nol­o­gy. Not men­tioned, but quite pos­si­bly, vehi­cle-to-road­side com­mu­ni­ca­tion (V2R) might also be includ­ed in the rule mak­ing. NHTSA's pre­lim­i­nary esti­mates of safe­ty ben­e­fits show that just two safe­ty appli­ca­tions — Left Turn Assist (LTA) and Inter­sec­tion Move­ment Assist (IMA) – could pre­vent up to 592,000 crash­es and 1,083 lives could be saved per year. Put anoth­er way, V2V tech­nol­o­gy could help dri­vers avoid more than half of these types of crash­es that would oth­er­wise occur by pro­vid­ing advance warn­ing. The full ben­e­fits won't be achieved until all vehi­cles are capa­ble of com­mu­ni­cat­ing with each oth­er and with the road­side. That could be decades away, but there are many ben­e­fits even in the inter­im for cars that are equipped. The FCC is in charge of the broad­cast spec­trum and is being urged by NHTSA, and the auto­mo­bile indus­try to make band­width avail­able to V2V.
{ "redpajama_set_name": "RedPajamaC4" }
4,467
[ 128000, 45, 2607, 7934, 596, 864, 5879, 4763, 97282, 127552, 661, 1826, 72, 5879, 16862, 315, 6220, 5879, 1919, 3399, 5879, 68, 5879, 30322, 315, 650, 17, 53, 13312, 127552, 337, 5879, 78, 5879, 4680, 1501, 430, 1120, 1403, 6220, 5879, 1919, 17537, 72, 5879, 936, 50143, 919, 2001, 14043, 12268, 54349, 320, 43, 15559, 8, 323, 5783, 5879, 5132, 69705, 14903, 5879, 479, 54349, 320, 73924, 8, 1389, 1436, 864, 5879, 688, 709, 311, 220, 20128, 11, 931, 10121, 5879, 288, 323, 220, 16, 11, 25077, 6439, 1436, 387, 6924, 824, 1060, 627, 10267, 596, 3041, 279, 48725, 5879, 944, 5879, 479, 4281, 5879, 275, 1405, 433, 596, 4245, 25, 220, 966, 1667, 4227, 11, 279, 24526, 5879, 261, 5879, 278, 5234, 5879, 3195, 7735, 5879, 285 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 45, 2607, 7934, 596, 864, 5879, 4763, 97282, 127552, 661, 1826, 72, 5879, 16862, 315, 6220, 5879, 1919, 3399, 5879, 68, 5879, 30322, 315, 650, 17, 53, 13312, 127552, 337, 5879, 78, 5879, 4680, 1501, 430, 1120, 1403, 6220, 5879, 1919, 17537, 72, 5879, 936, 50143, 919, 2001, 14043, 12268, 54349, 320, 43, 15559, 8, 323, 5783, 5879, 5132, 69705, 14903, 5879, 479, 54349, 320, 73924, 8, 1389, 1436, 864, 5879, 688, 709, 311, 220, 20128, 11, 931, 10121, 5879, 288, 323, 220, 16, 11, 25077, 6439, 1436, 387, 6924, 824, 1060, 627, 10267, 596, 3041, 279, 48725, 5879, 944, 5879, 479, 4281, 5879, 275, 1405, 433, 596, 4245, 25, 220, 966, 1667, 4227, 11, 279, 24526, 5879, 261, 5879, 278, 5234, 5879, 3195, 7735, 5879, 285, -100 ]
Clipart graphics - Clipart Collection | Flower, country clipart graphics, be+clip+art+graphics+bumble+bee+honey+bee+. HddFhm proudly present clipart graphics free vector. Stop your search here! 1-24 of 2564947 in cdr, svg, jpg, png design format. Commercial use of clipart graphics is prohibited. Download now clipart graphics.
{ "redpajama_set_name": "RedPajamaC4" }
6,649
[ 128000, 21608, 472, 14515, 482, 30792, 472, 11348, 765, 43786, 11, 3224, 12607, 472, 14515, 11, 387, 10, 8133, 10, 472, 10, 32785, 10, 5490, 901, 10, 33131, 62934, 2596, 10, 33131, 10, 627, 39, 634, 37, 35401, 45909, 3118, 12607, 472, 14515, 1949, 4724, 13, 14549, 701, 2778, 1618, 0, 220, 16, 12, 1187, 315, 220, 4146, 22054, 22, 304, 89404, 11, 27950, 11, 72285, 11, 37251, 2955, 3645, 13, 28943, 1005, 315, 12607, 472, 14515, 374, 27010, 13, 8745, 1457, 12607, 472, 14515, 13, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 ]
[ 21608, 472, 14515, 482, 30792, 472, 11348, 765, 43786, 11, 3224, 12607, 472, 14515, 11, 387, 10, 8133, 10, 472, 10, 32785, 10, 5490, 901, 10, 33131, 62934, 2596, 10, 33131, 10, 627, 39, 634, 37, 35401, 45909, 3118, 12607, 472, 14515, 1949, 4724, 13, 14549, 701, 2778, 1618, 0, 220, 16, 12, 1187, 315, 220, 4146, 22054, 22, 304, 89404, 11, 27950, 11, 72285, 11, 37251, 2955, 3645, 13, 28943, 1005, 315, 12607, 472, 14515, 374, 27010, 13, 8745, 1457, 12607, 472, 14515, 13, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100 ]
During the month of April, we are looking in depth at Galatians 5:22-23 and The Fruit of the Spirit. For teaching time, Ryan will explore the Upward, Outward, and Inward aspects of our faith as displayed in this passage. In groups, students will discuss the scripture and practical applications for everyday life.
{ "redpajama_set_name": "RedPajamaC4" }
1,112
[ 128000, 16397, 279, 2305, 315, 5936, 11, 584, 527, 3411, 304, 8149, 520, 10845, 266, 5493, 220, 20, 25, 1313, 12, 1419, 323, 578, 44187, 315, 279, 17326, 13, 1789, 12917, 892, 11, 13960, 690, 13488, 279, 3216, 1637, 11, 4470, 1637, 11, 323, 763, 1637, 13878, 315, 1057, 10082, 439, 12882, 304, 420, 21765, 13, 763, 5315, 11, 4236, 690, 4358, 279, 73888, 323, 15325, 8522, 369, 18254, 2324, 13, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 ]
[ 16397, 279, 2305, 315, 5936, 11, 584, 527, 3411, 304, 8149, 520, 10845, 266, 5493, 220, 20, 25, 1313, 12, 1419, 323, 578, 44187, 315, 279, 17326, 13, 1789, 12917, 892, 11, 13960, 690, 13488, 279, 3216, 1637, 11, 4470, 1637, 11, 323, 763, 1637, 13878, 315, 1057, 10082, 439, 12882, 304, 420, 21765, 13, 763, 5315, 11, 4236, 690, 4358, 279, 73888, 323, 15325, 8522, 369, 18254, 2324, 13, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100 ]
Last Thursday my phone rang, it was the kind of call that stops you in your tracks. Kevin Bock had died. Kevin was my friend and cohort in the labor movement. I'm deeply saddened by his death and as I try to come to terms with our loss I find myself examining my own mortality and, for lack of a better term, legacy. In wondering what I'll leave behind, I am reminded of what Kevin leaves all of us with. If you're reading this and you're in Montana as an active member of the labor movement, you probably knew Kevin or would know him if you saw him. Kevin lived a typical Montana life. He had roots in Butte and Anaconda, grew up during a time when Montana's resource industry was falling apart, served proudly in the military, carried that ethic of public service on as a state employee and absolutely loved his family. And Kevin loved the union. I met Kevin almost ten years ago when he started showing up at union meetings and asking questions to better understand what the union did. He was unhappy with the direction of things and what he felt was a passive approach to leadership within his own local. He was also bothered by apathy of the members. Kevin carefully watched, learned and then started to move ahead by getting elected to the board of his local union. He again took the time to learn and understand the process. He also began to 'agitate' for change. If you knew Kevin, you know this came naturally for him. Over time Kevin became the President of his local and was also elected as Secretary Treasurer of MEA-MFT. None of these are small feats nor are they easy roles to play. Kevin was more than willing to admit that he was a Republican. He was also willing to admit that as he learned more about the work of the union and the people we represent that he understood there was a lot more to being a Republican or a Democrat. Kevin's political leanings became that of 'what's good for the worker and the union'. Kevin became the union member we seek, he viewed politics with his union membership first and his ideology second. He also questioned the union and its leadership politically when he didn't agree. Kevin unintentionally reminded me that it's good to be questioned and pushed out of a comfort zone often. It's a good thing to reexamine what we are doing to be sure we are on the right path and not the path of 'because it's what we've always done'. What I am most reminded of in Kevin's death is that I won't get to see Kevin at every training, meeting, convention, rally, picnic or gathering of union folks. That's a short list, but read it again. Kevin showed up. I'll say it again, Kevin showed up. As simple as it sounds, it's not. He believed in showing up, organizing, mobilize and agitating. Kevin's local has more than 400 members. Imagine if one fifth of his local followed his lead and showed up. Imagine if one fifth of every local followed Kevin's lead. Knowing him as well as I did, that is the legacy Kevin would want us all to live out in his honor. Kevin, my dear brother, I will miss you. May your soul drift easy to the places you love, yes Kevin I know, Disneyland. May your spirit remain here with me, with us, your inspiration is much needed as we carry out the work of the union. Thank you Quint for writing what we all have on our mind and in our hearts! I sit just down the hall from Kevins room at Department of Revenue, and I already miss his big smile so much. However, I will not forget what he started and I hope to keep it going in some small way. I was fortunate to meet my union brother Kevin about 6 years ago and our friendship has grown over the years. I will deeply miss you, your humour and your insight. To your family I can only express how awesome of a brother he was to all of us at the MEA-MFT. I will truly miss you Kevin. Stunned by this, and what an amazing tribute. Met Kevin through covering his daughter's cross country and track running for Helena High. Didn't know him well, but he was always friendly and outgoing, and very proud of her achievements. R.I.P. Kevin Bock, and condolences to his family. Be the first to find out about new articles.
{ "redpajama_set_name": "RedPajamaC4" }
3,411
[ 128000, 5966, 7950, 856, 4641, 43200, 11, 433, 574, 279, 3169, 315, 1650, 430, 18417, 499, 304, 701, 14242, 13, 16768, 426, 1197, 1047, 8636, 13, 16768, 574, 856, 4333, 323, 41944, 304, 279, 9511, 7351, 13, 358, 2846, 17693, 95017, 555, 813, 4648, 323, 439, 358, 1456, 311, 2586, 311, 3878, 449, 1057, 4814, 358, 1505, 7182, 38936, 856, 1866, 29528, 323, 11, 369, 6996, 315, 264, 2731, 4751, 11, 20160, 13, 763, 20910, 1148, 358, 3358, 5387, 4920, 11, 358, 1097, 31256, 315, 1148, 16768, 11141, 682, 315, 603, 449, 627, 2746, 499, 2351, 5403, 420, 323, 499, 2351, 304, 37105, 439, 459, 4642, 4562, 315, 279, 9511, 7351, 11, 499, 4762, 7020, 16768, 477, 1053, 1440, 1461, 422, 499, 5602, 1461, 13, 16768, 12439, 264 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 5966, 7950, 856, 4641, 43200, 11, 433, 574, 279, 3169, 315, 1650, 430, 18417, 499, 304, 701, 14242, 13, 16768, 426, 1197, 1047, 8636, 13, 16768, 574, 856, 4333, 323, 41944, 304, 279, 9511, 7351, 13, 358, 2846, 17693, 95017, 555, 813, 4648, 323, 439, 358, 1456, 311, 2586, 311, 3878, 449, 1057, 4814, 358, 1505, 7182, 38936, 856, 1866, 29528, 323, 11, 369, 6996, 315, 264, 2731, 4751, 11, 20160, 13, 763, 20910, 1148, 358, 3358, 5387, 4920, 11, 358, 1097, 31256, 315, 1148, 16768, 11141, 682, 315, 603, 449, 627, 2746, 499, 2351, 5403, 420, 323, 499, 2351, 304, 37105, 439, 459, 4642, 4562, 315, 279, 9511, 7351, 11, 499, 4762, 7020, 16768, 477, 1053, 1440, 1461, 422, 499, 5602, 1461, 13, 16768, 12439, 264, -100 ]
Q: += operator for Delegate I know that the += operator will add a method to the invocation list maintained by the Delegate base object, for example using System; class Program { delegate void MyDelegate(int n); void Foo(int n) { Console.WriteLine("n = {0}", n) } static void Main(string[] args) { MyDelegate d = new MyDelegate(Foo); d += Foo; // add Foo again d.Invoke(3); // Foo is invoked twice as Foo appears two times in invocation list } } But when I look at MSDN Delegate, MulticastDelegate I can't find any definition of the += operator. How is it that is just works? Auto-generated compiler magic? A: It's not an operator on the delegate type itself, in IL terms - it's defined in the language specification, but you wouldn't find it using reflection. The compiler turns it into a call to Delegate.Combine. The reverse operation, using - or -=, uses Delegate.Remove. At least, that's how it's implemented when C# targets .NET, as it almost always does. In theory, this is environment-specific - the language specification doesn't require that a compiler uses Delegate.Combine or Delegate.Remove, and a different environment may not have those methods. From the C# 5 specification, section 7.8.4 (addition): The binary + operator performs delegate combination when both operands are of some delegate type D. (If the operands have different delegate types, a binding-time error occurs.) If the first operand is null, the result of the operation is the value of the second operand (even if that is also null). Otherwise, if the second operand is null, then the result of the operation is the value of the first operand. Otherwise, the result of the operation is a new delegate instance that, when invoked, invokes the first operand and then invokes the second operand. For examples of delegate combination, see §7.8.5 and §15.4. Since System.Delegate is not a delegate type, operator + is not defined for it. A: It's the same as with Int32, String etc. The + operator is defined implicitly by the language. You can check the source code of Delegate, MulticastDelegate, Int32 etc. There are no overloads of operator + there, that's why it doesn't appear in the MSDN documentation. From C# language spec, section 7.8.4: The predefined addition operators are listed below. (...) • Delegate combination. Every delegate type implicitly provides the following predefined operator, where D is the delegate type: D operator +(D x, D y); There is a difference between simple types and delegates. The C# language specification doesn't require that a delegate is implemented using System.Delegate 4.2.7 Delegate types A delegate is a data structure that refers to one or more methods. For instance methods, it also refers to their corresponding object instances. The closest equivalent of a delegate in C or C++ is a function pointer, but whereas a function pointer can only reference static functions, a delegate can reference both static and instance methods. In the latter case, the delegate stores not only a reference to the method's entry point, but also a reference to the object instance on which to invoke the method. Delegate types are described in §15. Note that there is no mention of System.Delegate there. Compare it with Section 4.1.4 Simple types: C# provides a set of predefined struct types called the simple types. The simple types are identified through reserved words, but these reserved words are simply aliases for predefined struct types in the System namespace, as described in the table below. Reserved word Aliased type sbyte System.SByte byte System.Byte short System.Int16 ushort System.UInt16 int System.Int32 uint System.UInt32 long System.Int64 ulong System.UInt64 char System.Char float System.Single double System.Double bool System.Boolean decimal System.Decimal Or Section 4.2.4 The string type (...) The keyword string is simply an alias for the predefined class System.String. So resolving the + operator for delegates to Delegate.Combine is an implementation detail of C# compilers in .NET framework.
{ "redpajama_set_name": "RedPajamaStackExchange" }
3,963
[ 128000, 48, 25, 1447, 5793, 369, 41280, 358, 1440, 430, 279, 1447, 5793, 690, 923, 264, 1749, 311, 279, 29796, 1160, 18908, 555, 279, 41280, 2385, 1665, 11, 369, 3187, 198, 985, 744, 401, 1058, 6826, 198, 4352, 262, 13685, 742, 3092, 9566, 1577, 308, 629, 262, 742, 34528, 1577, 308, 340, 262, 341, 286, 5390, 6158, 446, 77, 284, 314, 15, 9737, 308, 340, 262, 557, 262, 1118, 742, 4802, 3693, 1318, 2897, 340, 262, 341, 286, 3092, 9566, 294, 284, 502, 3092, 9566, 7988, 2689, 317, 286, 294, 1447, 34528, 26, 443, 923, 34528, 1578, 271, 286, 294, 33884, 7, 18, 1237, 443, 34528, 374, 27979, 11157, 439, 34528, 8111, 1403, 3115, 304, 29796, 1160, 271, 262, 457, 633, 4071, 994, 358, 1427, 520, 72495, 45 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 48, 25, 1447, 5793, 369, 41280, 358, 1440, 430, 279, 1447, 5793, 690, 923, 264, 1749, 311, 279, 29796, 1160, 18908, 555, 279, 41280, 2385, 1665, 11, 369, 3187, 198, 985, 744, 401, 1058, 6826, 198, 4352, 262, 13685, 742, 3092, 9566, 1577, 308, 629, 262, 742, 34528, 1577, 308, 340, 262, 341, 286, 5390, 6158, 446, 77, 284, 314, 15, 9737, 308, 340, 262, 557, 262, 1118, 742, 4802, 3693, 1318, 2897, 340, 262, 341, 286, 3092, 9566, 294, 284, 502, 3092, 9566, 7988, 2689, 317, 286, 294, 1447, 34528, 26, 443, 923, 34528, 1578, 271, 286, 294, 33884, 7, 18, 1237, 443, 34528, 374, 27979, 11157, 439, 34528, 8111, 1403, 3115, 304, 29796, 1160, 271, 262, 457, 633, 4071, 994, 358, 1427, 520, 72495, 45, -100 ]
Tom Burckhardt's Arrival John YauMay 17, 2015 Tom Burckhardt, "Incognito" (2013), oil on cast plastic, 32 x40 inches (all images courtesy Tibor de Nagy) Tom Burckhardt just keeps getting better and better. In his most recent exhibition, AKA Incognito at Tibor de Nagy (May 7–June 12, 2015), there are two kinds of paintings: one group is done on cast plastic supports, with the largest ones measuring 32 x 40 inches; the other, larger in size, is done on canvas, including a recently completed two panel painting, "Gunung" (2015), which measures 60 x 96 inches. By pairing the two kinds of painting under the show's title, AKA Incognito, suggesting that something is in disguise, Burckhardt introduces an element of doubt and humor into our experience of the work: are the ones on plastic pretending to be real paintings? Does this mean the ones on canvas are real? Or are they both real and fake? In an age of rip-offs, copies and fictional memoirs, what do real and fake even mean? Burckhardt underscores these contradictions with sharp titles, such as "Schmeary Theory" (2014) and one of my favorites, "Sacrediculous" (2015), which pretty much sums up how a painter might be feeling these days. If he weren't such an imaginative, adventuresome, and interesting painter, who has been steadily moving further and further into his own territory, the whole thing could seem hokey or, worse, didactic. The cast plastic supports are thick and boxy. Burckhardt paints fat black dots on the sides suggestive of nails holding down stretched canvas, while the surfaces are uneven, as if the artist has affixed torn strips of cloth on them, like bandages. On some level, the 'bandages' evoke the works of the great Alberto Burri, who made a textured canvas out of burned plastic. Historically speaking, coming after Burri and others, Burckhardt recognizes that he is painting on the bandaged surface of an irreparably damaged thing; more importantly, he accepts his position in this chronology rather than emulating the past. Tom Burckhardt, "Three Ninety to Seven Eighty" (2014), oil on cast plastic, 32 x 40 inches In an interview I did with the artist in The Brooklyn Rail (April 2011), he characterized his cast plastic supports as "kind of like a representational sculpture." He went on to say: I really love painting, but I also want to make fun of it. I want to have that full range of experience. I don't want to be a true believer, and wear blinkers about it. I want to acknowledge its absurdity, that's the thing. It is in the painting itself that Burckhardt, who was born in 1964, distinguishes himself from other abstract artists of his generation. Rather than relying on a particular or signature process, vocabulary, message or aesthetic justification (which is what "provisional painting" has predictably become), he discovers the painting through what can only be called trial and error. He introduces an image into the work, overlaps it with something else, covers nearly everything over and starts again. While one sees the evidence of earlier stages peeking through many of his paintings, Burckhardt doesn't fetishize his pentimenti. He isn't trying to impress the viewer with his labor, which, like watching a weightlifter having to prove how much he can hoist in the air, quickly proves tiresome. Tom Burckhardt, "Odalik" (2015), oil on canvas, 48 x 60 inches Academic discourse, at least the kind you are apt to come across in the pages of journals such as Artforum, is about turning art into quantifiable meaning, an aesthetic sticker announcing political and aesthetic affiliations. Perhaps the most overt sign of Burckhardt's resistance to the incursions academic discourse has made in art is in the title "Schmeary Theory." I think there is something delightful and disturbing about looking at something that you cannot name, that in fact resists any attempt to corral it in simple, commodifiable language. And there is something even more delightful if a name is on the tip of your tongue, then suddenly seems light years away. At the very least, you might be reminded that even if you can afford to possess something, you cannot fully own it, which I think is worth remembering. Only someone who is conversant with art history can present ambiguity with such graphic clarity and painterly precision. In the humorously titled "Odalik" (2015) — a sonic combination of "odalisque" and "lick" — the white tubular form that extends down the painting's left side and along the bottom edge, before rising slightly on the right side, is a descendant of such reclining nudes as Titian's erotic "The Venus of Urbino" (1538) and Manet's harshly lit painting of a prostitute, "Olympia" (1863). Burckhardt's "nude" seems to be made of a continuous brushstroke that keeps reversing its direction. It's a fiction, of course, because no single brushstroke could remain so even and continuous, making Burkhardt's nude look like a length of white tubing discarded on a factory floor, and in this regard it is also related to the "bride" in Marcel Duchamp's "Large Glass" and Francis Picabia's mechanical portraits. Tom Burckhardt, "The Incredible Think" (2015), oil on linen, 48 x 60 inches And yet, for all its reverberations, Burckhardt's white abstract form doesn't come across as either a parody or citation. It is a white tubular form that is both redolent and chilly, reclining in front of brown shapes whose diagonal alignments suggest that they are receding in space. In their outline and palette the brown forms resemble benches or church pews. The black ground is punctuated by grid of diagonally aligned white dots, which can be read as either a night sky or printed fabric. Through articulation, placement, color choice, and a vocabulary of discovered forms, Burckhardt connects his painting to a long and distinguished tradition. The fact that it holds it own is a mark of his burgeoning mastery. In "The Incredible Think" (2015), Burckhardt's placement of a reddish band with diagonal struts along the painting's top edge suggests the stretcher bars of a painting. Are we seeing through the stretcher, or are we looking at the back of a stain painting? What about the form in the foreground, which is made of colored rectangles outlined in black, most of which are a shade of green? Is it an escapee from Michael Bay's film Tranformers (2007)? What about the building-like facades behind and below the robot-like structure? Tom Burckhardt, "Tangential Meditation" (2015), oil on linen, 60 x 48 inches In the large paintings, Burckhardt plays with the various conventions governing such genres as landscape and the figure in a landscape. The space is made out of layers that run from opaque to semi-transparent. He can combine different forms, lines, patterns, and gradated colors, as he does in "Tangential Meditation" (2015), into a solid but unidentifiable object, with recessed spaces divided into light and shadow. Nothing feels extraneous or overly elaborate. Burckhardt doesn't repeat his palette and he applies the paint in a variety of ways without making a big deal out of it. The mastery is understated, but it should be evident to anyone who slows down long enough to begin looking at the work. These paintings invite prolonged scrutiny, in which part of the pleasure is seeing how the artist has fitted disparate things together. They are as intricate as the interlocking, overlapping gears of a pocket watch, and as magical. AKA Incognito continues at Tibor de Nagy (724 Fifth Avenue, Midtown, Manhattan) through June 12. Tibor de NagyTom Burckhardt
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
6,187
[ 128000, 25763, 12649, 377, 60382, 596, 93198, 198, 13379, 816, 2933, 11356, 220, 1114, 11, 220, 679, 20, 198, 25763, 12649, 377, 60382, 11, 330, 40345, 64541, 1, 320, 679, 18, 705, 5707, 389, 6445, 12466, 11, 220, 843, 865, 1272, 15271, 320, 543, 5448, 27104, 37916, 269, 409, 30162, 88, 340, 25763, 12649, 377, 60382, 1120, 13912, 3794, 2731, 323, 2731, 13, 763, 813, 1455, 3293, 28099, 11, 362, 27542, 4953, 64541, 520, 37916, 269, 409, 30162, 88, 320, 11356, 220, 22, 4235, 28259, 220, 717, 11, 220, 679, 20, 705, 1070, 527, 1403, 13124, 315, 36692, 25, 832, 1912, 374, 2884, 389, 6445, 12466, 11815, 11, 449, 279, 7928, 6305, 30090, 220, 843, 865, 220, 1272, 15271, 26, 279, 1023, 11, 8294, 304, 1404, 11, 374 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 25763, 12649, 377, 60382, 596, 93198, 198, 13379, 816, 2933, 11356, 220, 1114, 11, 220, 679, 20, 198, 25763, 12649, 377, 60382, 11, 330, 40345, 64541, 1, 320, 679, 18, 705, 5707, 389, 6445, 12466, 11, 220, 843, 865, 1272, 15271, 320, 543, 5448, 27104, 37916, 269, 409, 30162, 88, 340, 25763, 12649, 377, 60382, 1120, 13912, 3794, 2731, 323, 2731, 13, 763, 813, 1455, 3293, 28099, 11, 362, 27542, 4953, 64541, 520, 37916, 269, 409, 30162, 88, 320, 11356, 220, 22, 4235, 28259, 220, 717, 11, 220, 679, 20, 705, 1070, 527, 1403, 13124, 315, 36692, 25, 832, 1912, 374, 2884, 389, 6445, 12466, 11815, 11, 449, 279, 7928, 6305, 30090, 220, 843, 865, 220, 1272, 15271, 26, 279, 1023, 11, 8294, 304, 1404, 11, 374, -100 ]
Where the culture conversation is happening. Users shape, share and debate their opinions on anything and everything through Top 10 lists. Culturalist.com is the place to shape, share and debate your opinions on anything and everything through Top 10 lists. Want to join the conversation? You can make your own list of the Top 10 Best Christmas Movies of All Time by selecting your favorites, ranking them in order, and publishing on Culturalist. What's this? When Jack Skellington came to Christmas Town 21 years ago, a holiday cult classic was born. When it comes to oddball adventures in gift-giving, Nightmare is hard to beat. Home Alone was the hit of the season in 1990, holding the #1 spot at the box office for twelve straight weeks and going on to spend a decade as the highest-grossing comedy of all time. It's easy to forget that Die Hard takes place at the Nakatomi Corporation's Christmas party, but it totally counts as a Christmas movie. Remember that the next time you get to pick. Yippee-ki-yay. Why settle for one Christmas movie when you can have like nine of them all smashed into 136 minutes of rom-com perfection? Christmas is all around me...and so the feeling grows. Did you get your very own Red Ryder Carbine Action 200-shot Range Model air rifle? No? Well, at least you didn't shoot your eye out. A Christmas Story captured a unique blend of humor and nostalgia that has made it a Christmastime staple for over thirty years, earning it the top spot on our list. Agree? Disagree? Come join the conversation by visiting Culturalist to see all of this year's nominees and make your own list of the Top 10 Best Christmas Movies of All Time now!
{ "redpajama_set_name": "RedPajamaC4" }
799
[ 128000, 9241, 279, 7829, 10652, 374, 12765, 13, 14969, 6211, 11, 4430, 323, 11249, 872, 18463, 389, 4205, 323, 4395, 1555, 7054, 220, 605, 11725, 627, 34, 44547, 380, 916, 374, 279, 2035, 311, 6211, 11, 4430, 323, 11249, 701, 18463, 389, 4205, 323, 4395, 1555, 7054, 220, 605, 11725, 13, 24133, 311, 5249, 279, 10652, 30, 1472, 649, 1304, 701, 1866, 1160, 315, 279, 7054, 220, 605, 7252, 10280, 27019, 315, 2052, 4212, 555, 27397, 701, 27672, 11, 23862, 1124, 304, 2015, 11, 323, 23763, 389, 41333, 380, 627, 3923, 596, 420, 30, 3277, 7762, 4923, 616, 4910, 3782, 311, 10280, 14298, 220, 1691, 1667, 4227, 11, 264, 13560, 4612, 11670, 574, 9405, 13, 3277, 433, 4131, 311, 10535, 4047, 32078, 304, 8352, 2427, 2299, 11, 75225 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 9241, 279, 7829, 10652, 374, 12765, 13, 14969, 6211, 11, 4430, 323, 11249, 872, 18463, 389, 4205, 323, 4395, 1555, 7054, 220, 605, 11725, 627, 34, 44547, 380, 916, 374, 279, 2035, 311, 6211, 11, 4430, 323, 11249, 701, 18463, 389, 4205, 323, 4395, 1555, 7054, 220, 605, 11725, 13, 24133, 311, 5249, 279, 10652, 30, 1472, 649, 1304, 701, 1866, 1160, 315, 279, 7054, 220, 605, 7252, 10280, 27019, 315, 2052, 4212, 555, 27397, 701, 27672, 11, 23862, 1124, 304, 2015, 11, 323, 23763, 389, 41333, 380, 627, 3923, 596, 420, 30, 3277, 7762, 4923, 616, 4910, 3782, 311, 10280, 14298, 220, 1691, 1667, 4227, 11, 264, 13560, 4612, 11670, 574, 9405, 13, 3277, 433, 4131, 311, 10535, 4047, 32078, 304, 8352, 2427, 2299, 11, 75225, -100 ]
Rembrandt, Rubens, Gainsborough and the Golden Age of Painting in Europe February 15 – April 26, 2015 The economic growth that swept Europe during the 17th and 18th century fueled a golden age of painting. Religious upheavals transformed the way people thought about and utilized art. Technical aspects of art making were honed and codified, as art academies grew in power. The number of artists and the number of art collectors grew exponentially during this period, as the fine arts reached an increasingly wider audience. This exhibition features more than 70 major works by master painters from the renowned collection of The Speed Art Museum in Louisville, Kentucky. Highlighting art from Italy, France, Belgium, The Netherlands, Germany, and England, this exhibit is comprised of brilliant portraits, religious paintings, landscapes, scenes of everyday life, still lifes, and interpretations of classical antiquity. Highlights include "The Princes of the Church Adoring the Eucharist" by Rubens and "Portrait of a Forty-Year-Old Woman" by Rembrandt. Also on view are works by Tiepolo, Gainsborough, Hogarth, van Dyck, Teniers, Jordaens, Tournier, Ruisdael, Mignard, Crespi, de Troy, Largillière, Boucher, Batoni, Panini and others. Some of these rare objects have never left Louisville since their acquisition by The Speed. Davidson Technologies Exhibition Sponsors: Alabama Tourism Department The Olin B. King Foundation The Jurenko Foundation Jean Wessel Templeton Dunagan Yates & Alison Plastic Surgery Center Kord Technologies Doris and Stan Minkinow Dianne and Calame Sammons Gerry and Virgil Schaffer Peggy and Bob Serio Jeanie and Bill Snoddy Additional support provided by: Alabama State Council on the Arts Alabama Media Group BBD Graphics Women's Guild of the Huntsville Museum of Art
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
5,114
[ 128000, 6728, 13781, 83, 11, 13134, 729, 11, 480, 1771, 35179, 323, 279, 18288, 13381, 315, 55143, 304, 4606, 198, 33877, 220, 868, 1389, 5936, 220, 1627, 11, 220, 679, 20, 198, 791, 7100, 6650, 430, 41323, 4606, 2391, 279, 220, 1114, 339, 323, 220, 972, 339, 9478, 59461, 264, 21411, 4325, 315, 19354, 13, 53176, 96710, 402, 1147, 24411, 279, 1648, 1274, 3463, 922, 323, 34716, 1989, 13, 27766, 13878, 315, 1989, 3339, 1051, 5954, 291, 323, 20950, 1908, 11, 439, 1989, 10623, 11288, 14264, 304, 2410, 13, 578, 1396, 315, 13820, 323, 279, 1396, 315, 1989, 52548, 14264, 75251, 2391, 420, 4261, 11, 439, 279, 7060, 19071, 8813, 459, 15098, 22622, 10877, 13, 1115, 28099, 4519, 810, 1109, 220, 2031, 3682, 4375, 555, 7491, 97953, 505 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 6728, 13781, 83, 11, 13134, 729, 11, 480, 1771, 35179, 323, 279, 18288, 13381, 315, 55143, 304, 4606, 198, 33877, 220, 868, 1389, 5936, 220, 1627, 11, 220, 679, 20, 198, 791, 7100, 6650, 430, 41323, 4606, 2391, 279, 220, 1114, 339, 323, 220, 972, 339, 9478, 59461, 264, 21411, 4325, 315, 19354, 13, 53176, 96710, 402, 1147, 24411, 279, 1648, 1274, 3463, 922, 323, 34716, 1989, 13, 27766, 13878, 315, 1989, 3339, 1051, 5954, 291, 323, 20950, 1908, 11, 439, 1989, 10623, 11288, 14264, 304, 2410, 13, 578, 1396, 315, 13820, 323, 279, 1396, 315, 1989, 52548, 14264, 75251, 2391, 420, 4261, 11, 439, 279, 7060, 19071, 8813, 459, 15098, 22622, 10877, 13, 1115, 28099, 4519, 810, 1109, 220, 2031, 3682, 4375, 555, 7491, 97953, 505, -100 ]
'; document.write(trtd); j++; } } Over 40 Birth Statistics Over 40 Book Shelf Fertility Monitors Fertility Store Stories By Age: 43y 56+y 1st child High FSH Amazon.com lists over 8,000 items under the search term "fertility" Home 44 , 45 Turned 45 & found out I am pregnant Turned 45 & found out I am pregnant Catherine McDiarmid-Watt | Sunday, March 06, 2011 | 2 comments I had used Fertile Thoughts about 4 years ago as my husband and I were trying to have a child. I have 3 children from a previous marriage. But my husband and I started trying to have our own child about 8 years ago. After 6 years and 6 miscarriages, I couldn't handle the emotional roller coaster any longer and we gave up trying to have a child. I finally got to the acceptance that we weren't going to have any more children after 2 years. I just turned 45 2 weeks ago and I just found out that I am pregnant last week. I am extremely nervous as we typically lose the baby around 6 to 8 weeks. I have already been to the RE and have started preventative measures to hold on to this one. My first beta was 343 and the second was 676. So, those numbers sound pretty good for my 33rd day. But I am understandably skeptical that this will work. The odds are not in our favour because of my age and history. Any words of encouragement would be appreciated. We aren't ready to share the news with any family or friends until we get some more positive news. Thanks! Life Begins... - Miscarriage stories of loss, hope & help Stories of Pregnancy over 44 years old - sharing stories I find online, for inspiration! You Can Get Pregnant in Your 40's - Sharing articles, discussing options & suggestions Recent Keyword Searches: Reported pregnancies past age 60, pregnant age 48, oldest woman to give birth naturally, ivf age 47, the percentage of getting pregnant at 52 Category: 44, 45 About Catherine: I am mom to three grown sons, two grandchildren and two rescue dogs. After years of raising my boys as a single mom, I remarried a wonderful man who had never had a child of his own. Unexpectedly, I found myself pregnant at 49! Sadly we lost that precious baby at 8 weeks, and decided to try again. Five more losses, turned down for donor egg, foster care and adoption due to my age and losses - we have accepted that there will be no more babies in our house. Find Catherine on Google+ - Circle us on Google+ - Join us on Facebook - Follow us on Twitter Privacy guaranteed. We'll never share your info. 7 March 2011 at 12:44:00 GMT-5 You still have a lot of young, healthy eggs along with the old ones. I know this because I am 45 1/2 yrs old and my 15 month old is asleep up stairs. I too had many miscarriages. hang in there! I will say a prayer for you. This just might be it for you, and then you will be like I was, exhilarated but exhausted doing this at our age! LOL Fingers crossed, good luck, eat healthy and be a couch potato until you pass 12 weeks. keep us posted!! manipalking says: age is an important factor to pregnancy and should be dealt carefully, such a nice article surely will help a lot of people. Inspiring article. WE LOVE COMMENTS! Don't just sit there, reading this story or article - say something! Do you believe it? Do you think it is impossible? Do you wish it was you? Do you have a story to share (it might get published!) NOTE: Comments are moderated - just to stop the spambots - and so may take up to a few hours to be approved. Catherine reserves the right to review, edit, refuse or delete any comment. Pregnant at 50, naturally I am 50 years old, and 13 weeks pregnant with my fifth child. I conceived naturally and will be 51 years old when my son is born. I am... Adrienne Barbeau - twins at 51 March 1997 -- Adrienne Barbeau is mostly known for playing in the horror movies and her role as Carol on the 1972 sitcom TV show Maude ,... Father was born when his mom was 47 I know that it can happen because my Father was born when his mother was 47 years old. She always wanted children, but it just never ha... Healthy baby at 52 I know someone who got pregnant at 52 years old. She wasn't trying to get pregnant, it was a total surprise! She said her husband ... 50y woman conceived twins naturally I was reading an interesting book, Fertility Wisdom: How Traditional Chinese Medicine Can Help Overcome In-fertility In her book, she r... Helen Fielding had 2nd baby at 48 Just read in the paper today Bridget Jones Author Helen Fielding had her second baby at 48! Helen, now 58, had her son Dashiell at 43 b... Subscribe to our stories Enter your email address below to receive updates every time we publish new content. Privacy | Disclosure Policy | Contact MY AMAZON SHOP Stories By Age (number of stories) 1st (647) 43 (775) 44 (1495) 45 (1571) 46 (1035) 47 (831) 48 (591) 49 (397) 50 (367) 51 (234) 52 (255) 53 (154) 54 (161) 55 (79) 56+ (140) Born to Love - natural baby product reviews & articles Mothers 35 Plus Flower Power Mom—The Truth About Motherhood After 40 A Child After 40 - forum Women Over 40 With High FSH High FSH Info In Season Mom She Laughed - Pregnant over 40 Motherhood Later...Than Sooner You Can Get Pregnant Over 40, Naturally! Hot Flashes, Warm Bottles Babies After 50 Pregnancy - TTC - Parenting After 50 Miscarriage, Stillbirth and Infant Loss Jewelry Want the Perfect Baby? Forget the Myths Do it with 94% Accuracy! www.PlanMyBaby.com Frugal Freebies Celebrating MLK Day with Freebies and the Best MLK Day Weekend Sales Stories of Pregnancy and Birth over 40 years old Moms in their 40s share their stories... You Can Get Pregnant in Your 40's When will menopause hit? My Frugal Baby Tips Baby Wipes: Make your own wipes recipe Life Begins... Five Miscarriages and a Baby Get Pregnant Naturally Discover How To Reverse Infertility Even If You're in Your Late 40's Fertility Books Over 40 Visit our Over 40 Bookshelf for more information about these books and more! Visit our Fertility Store for help in getting pregnant! More Stories January (4) December (7) November (2) July (2) April (2) March (1) February (5) January (8) December (4) November (3) October (6) September (7) August (13) July (13) June (11) May (15) April (13) March (12) February (3) September (13) August (17) July (12) June (11) May (17) April (5) March (1) February (21) January (22) December (15) November (8) October (4) September (2) August (2) July (3) June (2) April (1) February (1) April (5) March (7) February (2) January (2) June (6) May (4) April (21) December (1) November (11) October (20) September (20) August (30) July (25) June (27) May (28) April (24) March (26) February (21) January (23) December (28) November (28) October (25) September (21) August (30) July (7) June (9) May (19) April (22) March (25) February (20) January (26) December (15) November (23) October (20) September (19) August (21) July (28) June (17) May (26) April (27) March (26) February (24) January (28) December (28) November (29) October (27) September (28) August (29) July (31) June (29) May (30) April (28) March (31) February (15) January (20) December (17) November (28) October (22) September (19) August (8) July (10) June (23) May (68) April (78) March (104) February (92) January (122) December (128) November (99) October (38) September (11) August (57) July (56) June (161) May (190) April (209) March (95) February (276) January (325) December (354) November (332) Creative Commons Attribution-NonCommercial-NoDerivs 2.0 Canada License. Catherine is a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for sites to earn advertising fees. NOTE: All logos, company names, brands, images, trademarks and other intellectual property are the property of their respective owners. PregnancyStoriesByAge.com 2012. Simplex Timeline template designed by Webdesign Berlin Preise . Google+ Profile: +Catherine McDiarmid-Watt ~*~ Find Pregnancy Stories on Google+
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
500
[ 128000, 7112, 2246, 3921, 7779, 1320, 1237, 503, 20152, 335, 457, 1959, 220, 1272, 36127, 25647, 198, 1959, 220, 1272, 6017, 71446, 198, 37, 62587, 3206, 12170, 198, 37, 62587, 9307, 198, 93531, 3296, 13381, 25, 220, 3391, 88, 198, 3487, 44110, 198, 16, 267, 1716, 198, 12243, 435, 8758, 198, 26948, 916, 11725, 927, 220, 23, 11, 931, 3673, 1234, 279, 2778, 4751, 330, 69, 62587, 702, 7778, 220, 2096, 1174, 220, 1774, 12268, 291, 220, 1774, 612, 1766, 704, 358, 1097, 20895, 198, 19952, 291, 220, 1774, 612, 1766, 704, 358, 1097, 20895, 198, 34, 28107, 4584, 22427, 2227, 307, 13299, 1617, 765, 7418, 11, 5587, 220, 2705, 11, 220, 679, 16, 765, 220, 17, 6170, 198, 40, 1047, 1511, 435, 531, 458, 61399, 922, 220 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 7112, 2246, 3921, 7779, 1320, 1237, 503, 20152, 335, 457, 1959, 220, 1272, 36127, 25647, 198, 1959, 220, 1272, 6017, 71446, 198, 37, 62587, 3206, 12170, 198, 37, 62587, 9307, 198, 93531, 3296, 13381, 25, 220, 3391, 88, 198, 3487, 44110, 198, 16, 267, 1716, 198, 12243, 435, 8758, 198, 26948, 916, 11725, 927, 220, 23, 11, 931, 3673, 1234, 279, 2778, 4751, 330, 69, 62587, 702, 7778, 220, 2096, 1174, 220, 1774, 12268, 291, 220, 1774, 612, 1766, 704, 358, 1097, 20895, 198, 19952, 291, 220, 1774, 612, 1766, 704, 358, 1097, 20895, 198, 34, 28107, 4584, 22427, 2227, 307, 13299, 1617, 765, 7418, 11, 5587, 220, 2705, 11, 220, 679, 16, 765, 220, 17, 6170, 198, 40, 1047, 1511, 435, 531, 458, 61399, 922, 220, -100 ]
Hunchback is trending on Twitter. Popular tweets on Hunchback. Please don't make jokes about Hunchback of Notre Dame with the cathedral currently on fire. The building seriously is a major symbol of Paris and to see it be joked about while on fire is pretty insulting. 😭 The Hunchback of Notre-Dame, 1881, Luc-Olivier Merson. all I wanna do is just watch the hunchback of notre dame and cry bc I'll never see the original building in all its glory. @Natsuki_lover_2 @thetomska Well yea there have been play versions of the Hunchback story but the one Tom references is the musical based on the Disney film. Charles Laughton - The Hunchback of Notre Dame (1939). @crocsushi This was no accident. Disney's filming the live action Hunchback of Notre dame and figured CGI just wouldn't do the job. @BarackObama Nope. Just a fictional hunchback and tons of sexual abuse. @Turnsky Yeah when Hugo wrote the book, Notre Dame was in much, much worse shape, and had he never written Hunchback...Notre Dame probably would have faced demolition. @DRJK4 Too bad it's true. The French nearly destroyed it themselves after the revolution. Would have been forgotten had it not been for Napoleon & the Hunchback. Disney took it to the next level. Little of the building is original anyway. It's slowly been replaced over the centuries.
{ "redpajama_set_name": "RedPajamaC4" }
1,156
[ 128000, 39, 3265, 1445, 374, 51950, 389, 6405, 13, 32495, 24025, 389, 473, 3265, 1445, 627, 5618, 1541, 956, 1304, 32520, 922, 473, 3265, 1445, 315, 44564, 41798, 449, 279, 80250, 5131, 389, 4027, 13, 578, 4857, 14243, 374, 264, 3682, 7891, 315, 12366, 323, 311, 1518, 433, 387, 68329, 922, 1418, 389, 4027, 374, 5128, 68192, 627, 76460, 255, 578, 473, 3265, 1445, 315, 44564, 9607, 373, 11, 220, 9367, 16, 11, 14103, 24540, 34667, 1291, 386, 1293, 627, 543, 358, 33833, 656, 374, 1120, 3821, 279, 305, 3265, 1445, 315, 29449, 65867, 323, 16106, 18399, 358, 3358, 2646, 1518, 279, 4113, 4857, 304, 682, 1202, 27025, 627, 31, 45, 1900, 22227, 5677, 424, 62, 17, 571, 339, 295, 7085, 4657, 8489, 379, 12791, 1070, 617, 1027 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 39, 3265, 1445, 374, 51950, 389, 6405, 13, 32495, 24025, 389, 473, 3265, 1445, 627, 5618, 1541, 956, 1304, 32520, 922, 473, 3265, 1445, 315, 44564, 41798, 449, 279, 80250, 5131, 389, 4027, 13, 578, 4857, 14243, 374, 264, 3682, 7891, 315, 12366, 323, 311, 1518, 433, 387, 68329, 922, 1418, 389, 4027, 374, 5128, 68192, 627, 76460, 255, 578, 473, 3265, 1445, 315, 44564, 9607, 373, 11, 220, 9367, 16, 11, 14103, 24540, 34667, 1291, 386, 1293, 627, 543, 358, 33833, 656, 374, 1120, 3821, 279, 305, 3265, 1445, 315, 29449, 65867, 323, 16106, 18399, 358, 3358, 2646, 1518, 279, 4113, 4857, 304, 682, 1202, 27025, 627, 31, 45, 1900, 22227, 5677, 424, 62, 17, 571, 339, 295, 7085, 4657, 8489, 379, 12791, 1070, 617, 1027, -100 ]
Iran Human Rights (IHR); November 5, 2018: A prisoner was executed on a murder charge at Ardakan Prison on Saturday, November 3. According to HRANA, Sami' Mohtarami, 43, was convicted to qisas (retribution in kind) on a murder charge. He killed a person during a car robbery in 2015. The victim's family agreed to forgive Sami' in the condition of receiving Diya. Diya in Islamic law (Sharia) is a financial compensation paid to heirs of a victim to thus avoid a retaliation punishment. However, Sami' was a poor man and could not pay the amount. Therefore, his execution was carried out on the morning on Sunday, November 3, 2018. The Penal Code of Iran does not specifically state that convicted murderers are subject to the death penalty, but rather to "qisas" which means "retribution in kind" or retaliation. In this way, the State effectively puts the responsibility for executions for murder on the shoulders of the victim's family.
{ "redpajama_set_name": "RedPajamaC4" }
9,398
[ 128000, 62819, 11344, 10734, 320, 40, 17526, 1237, 6841, 220, 20, 11, 220, 679, 23, 25, 362, 42950, 574, 16070, 389, 264, 10102, 6900, 520, 75007, 19818, 42618, 389, 7884, 11, 6841, 220, 18, 627, 11439, 311, 23096, 39874, 11, 8388, 72, 6, 6178, 427, 640, 72, 11, 220, 3391, 11, 574, 23959, 311, 2874, 87034, 320, 265, 32240, 304, 3169, 8, 389, 264, 10102, 6900, 13, 1283, 7577, 264, 1732, 2391, 264, 1841, 44214, 304, 220, 679, 20, 627, 791, 11996, 596, 3070, 7378, 311, 44491, 8388, 72, 6, 304, 279, 3044, 315, 12588, 7923, 7911, 13, 7923, 7911, 304, 15558, 2383, 320, 2059, 10649, 8, 374, 264, 6020, 20448, 7318, 311, 91401, 315, 264, 11996, 311, 8617, 5766, 264, 61449, 25060, 13, 4452, 11, 8388, 72 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 62819, 11344, 10734, 320, 40, 17526, 1237, 6841, 220, 20, 11, 220, 679, 23, 25, 362, 42950, 574, 16070, 389, 264, 10102, 6900, 520, 75007, 19818, 42618, 389, 7884, 11, 6841, 220, 18, 627, 11439, 311, 23096, 39874, 11, 8388, 72, 6, 6178, 427, 640, 72, 11, 220, 3391, 11, 574, 23959, 311, 2874, 87034, 320, 265, 32240, 304, 3169, 8, 389, 264, 10102, 6900, 13, 1283, 7577, 264, 1732, 2391, 264, 1841, 44214, 304, 220, 679, 20, 627, 791, 11996, 596, 3070, 7378, 311, 44491, 8388, 72, 6, 304, 279, 3044, 315, 12588, 7923, 7911, 13, 7923, 7911, 304, 15558, 2383, 320, 2059, 10649, 8, 374, 264, 6020, 20448, 7318, 311, 91401, 315, 264, 11996, 311, 8617, 5766, 264, 61449, 25060, 13, 4452, 11, 8388, 72, -100 ]
Ebola is a deadly virus that is very contagious, it is so contagious that it got past around to other country's. to find out more about Ebola watch this video below. Canada started a campaign by getting a group of doctors who traveled all over the world to help others in need of medicine that can cure a disease and right now they are dealing with Ebola this group of doctors are called Doctors Without Borders. Where the Ebola outbreak of 2014 start?
{ "redpajama_set_name": "RedPajamaC4" }
582
[ 128000, 83514, 8083, 374, 264, 25114, 17188, 430, 374, 1633, 89534, 11, 433, 374, 779, 89534, 430, 433, 2751, 3347, 2212, 311, 1023, 3224, 596, 13, 311, 1505, 704, 810, 922, 48082, 3821, 420, 2835, 3770, 627, 37031, 3940, 264, 4901, 555, 3794, 264, 1912, 315, 16410, 889, 31796, 682, 927, 279, 1917, 311, 1520, 3885, 304, 1205, 315, 16088, 430, 649, 27208, 264, 8624, 323, 1314, 1457, 814, 527, 14892, 449, 48082, 420, 1912, 315, 16410, 527, 2663, 54943, 17586, 81812, 627, 9241, 279, 48082, 31188, 315, 220, 679, 19, 1212, 30, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 ]
[ 83514, 8083, 374, 264, 25114, 17188, 430, 374, 1633, 89534, 11, 433, 374, 779, 89534, 430, 433, 2751, 3347, 2212, 311, 1023, 3224, 596, 13, 311, 1505, 704, 810, 922, 48082, 3821, 420, 2835, 3770, 627, 37031, 3940, 264, 4901, 555, 3794, 264, 1912, 315, 16410, 889, 31796, 682, 927, 279, 1917, 311, 1520, 3885, 304, 1205, 315, 16088, 430, 649, 27208, 264, 8624, 323, 1314, 1457, 814, 527, 14892, 449, 48082, 420, 1912, 315, 16410, 527, 2663, 54943, 17586, 81812, 627, 9241, 279, 48082, 31188, 315, 220, 679, 19, 1212, 30, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100 ]
L'église du Sacré-Cœur de Tunis (), située dans le faubourg nord de la médina de Tunis près de Bab El Khadra, est une église catholique construite en 1899 pendant le protectorat français. Cédée au gouvernement tunisien en 1964, elle est actuellement abandonnée. Premiers édifices La construction de deux chapelles à proximité de Bab El Khadra est décidée par Charles Lavigerie le . Il s'agit de la chapelle à destination des Italiens et de la chapelle à destination des Maltais. Cette dernière devient rapidement insuffisante face à l'augmentation de la population chrétienne. Un ancien missionnaire, membre des Pères du Sacré-Cœur, le père François Miquet, décide de racheter les écuries de l'ancienne gare de tramway voisine afin d'agrandir la chapelle pour en faire une véritable église. Grâce aux fonds apportés par le père Boucher, l'édifice est achevé et béni le . La paroisse de Tunis Sacré-Cœur est créée la même année. Elle englobe les quartiers de Bab El Khadra, Halfaouine, Bab Souika, Sans Souci, Nice et Bel Air. Historique de l'église Propriété du père Miquet, l'église n'est acquise par l'archevêché qu'en 1902, lorsque le père Boucher, qui avait financé les travaux, accepte de céder ses droits en échange d'une indemnité de . Quant au père Miquet, il accepte de quitter sa congrégation pour devenir le prêtre titulaire de la paroisse. Idéalement située sur un carrefour très fréquenté et à proximité d'une forêt d'eucalyptus, l'église côtoie deux anciens cimetières musulmans et un cimetière catholique. Construite en 1899, année où le pape Léon XIII consacre chaque être humain au Sacré-Cœur, elle est tout naturellement placée sous sa protection, ce qui n'empêchera pas les fidèles de la désigner par son ancien nom de . La majorité des fidèles sont Siciliens ou Maltais. Ces derniers sont conducteurs de calèches ou de tramways avant de quitter le quartier pour tenir des commerces dans la ville européenne. Quant aux Siciliens, beaucoup d'entre eux sont chevriers. Ils descendent dans la capitale accompagnés de leur troupeau de chèvres qu'ils traient à la demande. Dans l'église, l'odeur des animaux se mêle à celle de l'encens, ce qui incite les paroissiens à surnommer leur lieu de culte . Le problème des titres de propriété étant résolu, des travaux d'agrandissements et d'embellissements peuvent être entrepris. Une statue en fonte du Sacré-Cœur de Jésus-Rédempteur est placée au-dessus de la façade principale. En 1904, on augmente la hauteur de l'église en surélevant son toit. En , on installe des cloches venues de la fonderie Paccard. Pour les accuellir, on construit un clocher latéral ayant la forme d'une tour carrée percée d'ouvertures rectangulaires et dotée d'un abat-son. En , un maître-autel en marbre prend place dans le chœur. Enfin, en 1918, on doit agrandir l'église déjà trop petite en convertissant la sacristie en bas-côté. Dix ans plus tard, les travaux reprennent pour faire face à l'afflux sans cesse croissant des fidèles. Le nouvel édifice est inauguré le : . En 1950, de nouvelles orgues sont installées et, en 1957, deux tableaux en mosaïque représentant saint Pierre et saint Paul rejoignent les éléments décoratifs de l'église. Bâtiment après l'indépendance L'indépendance de la Tunisie en 1956 provoque le départ progressif de beaucoup de familles européennes mais l'affluence reste élevée dans cette église bâtie dans un quartier populaire. Elle est finalement fermée à l'occasion du modus vivendi signé entre le gouvernement tunisien et le Vatican le . Le bâtiment est cédé gratuitement avec l'assurance qu'il ne sera utilisé qu'à des fins d'intérêt public compatibles avec son ancienne destination. L'édifice est reconverti pour abriter les services administratifs de la délégation avant d'être transformé en poste de police. Il est actuellement désaffecté. Notes et références Liens externes Sacré-Cœur Tunis Tunis
{ "redpajama_set_name": "RedPajamaWikipedia" }
101
[ 128000, 43, 31769, 6200, 1082, 3930, 23916, 43711, 7813, 89412, 409, 95777, 39204, 10109, 8047, 7010, 514, 2267, 392, 49541, 48734, 409, 1208, 35030, 2259, 409, 95777, 84364, 409, 26441, 4072, 20774, 329, 969, 11, 1826, 6316, 4046, 6200, 1082, 31747, 337, 2428, 19477, 9486, 665, 220, 9378, 24, 42844, 514, 63261, 266, 55467, 13, 356, 15433, 8047, 8065, 85182, 40280, 11716, 285, 3675, 665, 220, 5162, 19, 11, 27549, 1826, 1180, 77776, 15673, 77, 8047, 382, 42562, 4918, 4046, 67, 1104, 288, 720, 8921, 8246, 409, 26633, 38838, 37907, 3869, 22267, 99481, 409, 26441, 4072, 20774, 329, 969, 1826, 7591, 21200, 8047, 1370, 220, 15274, 445, 3030, 27197, 514, 662, 7695, 274, 6, 74972, 409, 1208, 38838, 6853, 220, 3869, 9284, 951, 1102, 8115, 729, 1880, 409 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 43, 31769, 6200, 1082, 3930, 23916, 43711, 7813, 89412, 409, 95777, 39204, 10109, 8047, 7010, 514, 2267, 392, 49541, 48734, 409, 1208, 35030, 2259, 409, 95777, 84364, 409, 26441, 4072, 20774, 329, 969, 11, 1826, 6316, 4046, 6200, 1082, 31747, 337, 2428, 19477, 9486, 665, 220, 9378, 24, 42844, 514, 63261, 266, 55467, 13, 356, 15433, 8047, 8065, 85182, 40280, 11716, 285, 3675, 665, 220, 5162, 19, 11, 27549, 1826, 1180, 77776, 15673, 77, 8047, 382, 42562, 4918, 4046, 67, 1104, 288, 720, 8921, 8246, 409, 26633, 38838, 37907, 3869, 22267, 99481, 409, 26441, 4072, 20774, 329, 969, 1826, 7591, 21200, 8047, 1370, 220, 15274, 445, 3030, 27197, 514, 662, 7695, 274, 6, 74972, 409, 1208, 38838, 6853, 220, 3869, 9284, 951, 1102, 8115, 729, 1880, 409, -100 ]
Adaptive system correction for robust Fourier ptychographic imaging Zichao Bian, Siyuan Dong, and Guoan Zheng Zichao Bian,1 Siyuan Dong,1 and Guoan Zheng1,2,* 1Biomedical Engineering, University of Connecticut, Storrs, Connecticut 06269, USA 2Electrical and Computer Engineering, University of Connecticut, Storrs, Connecticut 06269, USA *Corresponding author: [email protected] Z Bian S Dong G Zheng Zichao Bian, Siyuan Dong, and Guoan Zheng, "Adaptive system correction for robust Fourier ptychographic imaging," Opt. Express 21, 32400-32410 (2013) Aperture synthesis LED sources Phase retrieval Speckle noise Noise in imaging systems (030.4280) Image processing (100.0100) Phase retrieval (100.5070) Microscopy (170.0180) Image reconstruction techniques (170.3010) Original Manuscript: October 14, 2013 Revised Manuscript: December 4, 2013 Fourier ptychography (FP) is a recently developed imaging approach that bypasses the resolution limit defined by the lens' aperture. In current FP imaging platforms, systematic noise sources come from the intensity fluctuation of multiple LED elements and the pupil aberrations of the employed optics. These system uncertainties can significantly degrade the reconstruction quality and limit the achievable resolution, imposing a restriction on the effectiveness of the FP approach. In this paper, we report an optimization procedure that performs adaptive system correction for Fourier ptychographic imaging. Similar to the techniques used in phase retrieval, the reported procedure involves the evaluation of an image-quality metric at each iteration step, followed by the estimation of an improved system correction. This optimization process is repeated until the image-quality metric is maximized. As a demonstration, we used this process to correct for illumination intensity fluctuation, to compensate for pupil aberration of the optics, and to recover several unknown system parameters. The reported adaptive correction scheme may improve the robustness of Fourier ptychographic imaging by factoring out system imperfections and uncertainties. Nonlinear optimization approach for Fourier ptychographic microscopy Yongbing Zhang, Weixin Jiang, and Qionghai Dai Adaptive step-size strategy for noise-robust Fourier ptychographic microscopy Chao Zuo, Jiasong Sun, and Qian Chen Stable and robust frequency domain position compensation strategy for Fourier ptychographic microscopy Jian Liu, Yong Li, Weibo Wang, He Zhang, Yuhang Wang, Jiubin Tan, and Chenguang Liu Spectral multiplexing and coherent-state decomposition in Fourier ptychographic imaging Siyuan Dong, Radhika Shiradkar, Pariksheet Nanda, and Guoan Zheng Optimization of sampling pattern and the design of Fourier ptychographic illuminator Kaikai Guo, Siyuan Dong, Pariksheet Nanda, and Guoan Zheng G. Zheng, R. Horstmeyer, and C. Yang, "Wide-field, high-resolution Fourier ptychographic microscopy," Nat. Photonics 7(9), 739–745 (2013). X. Ou, R. Horstmeyer, C. Yang, and G. Zheng, "Quantitative phase imaging via Fourier ptychographic microscopy," Opt. Lett. 38(22), 4845–4848 (2013). C. J. Schwarz, Y. Kuznetsova, and S. R. Brueck, "Imaging interferometric microscopy," Opt. Lett. 28(16), 1424–1426 (2003). S. A. Alexandrov, T. R. Hillman, T. Gutzler, and D. D. Sampson, "Synthetic aperture fourier holographic optical microscopy," Phys. Rev. Lett. 97(16), 168102 (2006). V. Mico, Z. Zalevsky, P. García-Martínez, and J. García, "Synthetic aperture superresolution with multiple off-axis holograms," J. Opt. Soc. Am. A 23(12), 3162–3170 (2006). J. Di, J. Zhao, H. Jiang, P. Zhang, Q. Fan, and W. Sun, "High resolution digital holographic microscopy with a wide field of view based on a synthetic aperture technique and use of linear CCD scanning," Appl. Opt. 47(30), 5654–5659 (2008). L. Granero, V. Micó, Z. Zalevsky, and J. García, "Synthetic aperture superresolved microscopy in digital lensless Fourier holography by time and angular multiplexing of the object information," Appl. Opt. 49(5), 845–857 (2010). T. Gutzler, T. R. Hillman, S. A. Alexandrov, and D. D. Sampson, "Coherent aperture-synthesis, wide-field, high-resolution holographic microscopy of biological tissue," Opt. Lett. 35(8), 1136–1138 (2010). A. E. Tippie, A. Kumar, and J. R. Fienup, "High-resolution synthetic-aperture digital holography with digital phase and pupil correction," Opt. Express 19(13), 12027–12038 (2011). R. A. Gonsalves, "Phase retrieval and diversity in adaptive optics," Opt. Eng. 21, 215829 (1982). J. R. Fienup, "Phase-retrieval algorithms for a complicated optical system," Appl. Opt. 32(10), 1737–1746 (1993). L. Allen and M. Oxley, "Phase retrieval from series of images obtained by defocus variation," Opt. Commun. 199(1–4), 65–75 (2001). B. H. Dean and C. W. Bowers, "Diversity selection for phase-diverse phase retrieval," J. Opt. Soc. Am. A 20(8), 1490–1504 (2003). H. M. L. Faulkner and J. M. Rodenburg, "Movable aperture lensless transmission microscopy: A novel phase retrieval algorithm," Phys. Rev. Lett. 93(2), 023903 (2004). P. Bao, F. Zhang, G. Pedrini, and W. Osten, "Phase retrieval using multiple illumination wavelengths," Opt. Lett. 33(4), 309–311 (2008). M. Guizar-Sicairos and J. R. Fienup, "Phase retrieval with transverse translation diversity: a nonlinear optimization approach," Opt. Express 16(10), 7264–7278 (2008). J. Rodenburg, "Ptychography and related diffractive imaging methods," Adv. Imaging Electron Phys. 150, 87–184 (2008). P. Thibault, M. Dierolf, A. Menzel, O. Bunk, C. David, and F. Pfeiffer, "High-resolution scanning X-ray diffraction microscopy," Science 321(5887), 379–382 (2008). A. M. Maiden, J. M. Rodenburg, and M. J. Humphry, "Optical ptychography: a practical implementation with useful resolution," Opt. Lett. 35(15), 2585–2587 (2010). M. J. Humphry, B. Kraus, A. C. Hurst, A. M. Maiden, and J. M. Rodenburg, "Ptychographic electron microscopy using high-angle dark-field scattering for sub-nanometre resolution imaging," Nat. Commun. 3, 730 (2012). W. Hoppe and G. Strube, "Diffraction in inhomogeneous primary wave fields. 2. Optical experiments for phase determination of lattice interferences," Acta Crystallogr. A 25, 502–507 (1969). P. Nellist, B. McCallum, and J. Rodenburg, "Resolution beyond the'information limit'in transmission electron microscopy," Nature 374, 630–632 (1995). A. M. Maiden, M. J. Humphry, M. C. Sarahan, B. Kraus, and J. M. Rodenburg, "An annealing algorithm to correct positioning errors in ptychography," Ultramicroscopy 120, 64–72 (2012). A. Shenfield and J. M. Rodenburg, "Evolutionary determination of experimental parameters for ptychographical imaging," J. Appl. Phys. 109(12), 124510 (2011). M. Beckers, T. Senkbeil, T. Gorniak, K. Giewekemeyer, T. Salditt, and A. Rosenhahn, "Drift correction in ptychographic diffractive imaging," Ultramicroscopy 126, 44–47 (2013). F. Zhang, I. Peterson, J. Vila-Comamala, A. Diaz, F. Berenguer, R. Bean, B. Chen, A. Menzel, I. K. Robinson, and J. M. Rodenburg, "Translation position determination in ptychographic coherent diffraction imaging," Opt. Express 21(11), 13592–13606 (2013). G. Zheng, X. Ou, R. Horstmeyer, and C. Yang, "Characterization of spatially varying aberrations for wide field-of-view microscopy," Opt. Express 21(13), 15131–15143 (2013). J. R. Fienup and J. J. Miller, "Aberration correction by maximizing generalized sharpness metrics," J. Opt. Soc. Am. A 20(4), 609–620 (2003). S. T. Thurman and J. R. Fienup, "Phase retrieval with signal bias," J. Opt. Soc. Am. A 26(4), 1008–1014 (2009). P. Thibault and M. Guizar-Sicairos, "Maximum-likelihood refinement for coherent diffractive imaging," New J. Phys. 14(6), 063004 (2012). C. Audet and J. E. Dennis., "Analysis of generalized pattern searches," SIAM J. Optim. 13(3), 889–903 (2002). S. Zheng, H. Lin, J.-Q. Liu, M. Balic, R. Datar, R. J. Cote, and Y.-C. Tai, "Membrane microfilter device for selective capture, electrolysis and genomic analysis of human circulating tumor cells," J. Chromatogr. A 1162(2), 154–161 (2007). V. Elser, "Phase retrieval by iterated projections," J. Opt. Soc. Am. A 20(1), 40–55 (2003). Alexandrov, S. A. Audet, C. Balic, M. Bao, P. Bean, R. Beckers, M. Berenguer, F. Bowers, C. W. Brueck, S. R. Bunk, O. Chen, B. Cote, R. J. Datar, R. David, C. Dean, B. H. Dennis, J. E. Di, J. Diaz, A. Dierolf, M. Elser, V. Fan, Q. Faulkner, H. M. L. Fienup, J. R. García, J. García-Martínez, P. Giewekemeyer, K. Gonsalves, R. A. Gorniak, T. Granero, L. Guizar-Sicairos, M. Gutzler, T. Hillman, T. R. Hoppe, W. Horstmeyer, R. Humphry, M. J. Hurst, A. C. Jiang, H. Kraus, B. Kuznetsova, Y. Liu, J.-Q. Maiden, A. M. McCallum, B. Menzel, A. Mico, V. Micó, V. Miller, J. J. Nellist, P. Osten, W. Ou, X. Oxley, M. Pedrini, G. Peterson, I. Pfeiffer, F. Robinson, I. K. Rodenburg, J. Rodenburg, J. M. Rosenhahn, A. Salditt, T. Sampson, D. D. Sarahan, M. C. Schwarz, C. J. Senkbeil, T. Shenfield, A. Strube, G. Sun, W. Tai, Y.-C. Thibault, P. Thurman, S. T. Tippie, A. E. Vila-Comamala, J. Yang, C. Zalevsky, Z. Zhang, F. Zhang, P. Zhao, J. Zheng, G. Zheng, S. Acta Crystallogr. A (1) Adv. Imaging Electron Phys. (1) J. Appl. Phys. (1) J. Chromatogr. A (1) J. Opt. Soc. Am. A (5) Nat. Photonics (1) SIAM J. Optim. (1) Ultramicroscopy (2) Fig. 1 The flow chart of the adaptive Fourier ptychographic algorithm for intensity correction. Fig. 2 FP reconstructions with illumination uncertainty. (a1)-(a2) Input high-resolution intensity and phase profiles of the simulated complex sample. (b)-(e) FP reconstructions with different level of illumination fluctuations. Cameraman image © Massachusetts Institute of Technology. Used with permission. Fig. 3 Comparison of FP reconstructions with (a) and without (b) intensity correction. (c) The RMS error of the reconstruction versus different levels of intensity drift. Cameraman image © Massachusetts Institute of Technology. Used with permission. Fig. 4 Robustness of the reported scheme under different conditions. (a) The RMS errors of the reconstructions under extreme intensity drift. The large RMS for extreme LED intensity fluctuation may simply due to the nonlinear nature of the optimization process (b) The RMS errors of the reconstructions with different amount of additive noises. Fig. 5 Experimental validation of the reported intensity correcting scheme. (a) The low-resolution raw data of the pathology slide, with a pixel size of 2.75 µm. The reconstructed intensity (b1) and phase (b2) images without using the intensity correcting routine. The reconstructed intensity (c1) and phase (c2) images using the intensity correcting routine. 10 iterations were used in the iterative recovery process. Fig. 6 Second order pupil function recovery through optimization of the convergence index. (a) Raw data of the sample. (b) The FP reconstruction with (b) and without (c) the adaptive correction scheme. (d) The recovered pupil function. Fig. 7 Adaptive pupil correction for biological samples. (a) The raw data of a blood smear. The high-resolution recovered intensity (b1) and phase (b2) images using the adaptive correction scheme. The high-resolution recovered intensity (c1) and phase (c2) images without using the adaptive correction scheme. Fig. 8 Sample position recovery through optimization of the convergence index. (a), (b) FP reconstructions using different defocused distances. (c) The FP convergence index as a function of defocused distances. Fig. 9 LED position and central wavelength recovery through the adaptive correction scheme. (1) Convergence index= ∑ i mean( I mi ) ∑ x,y abs( I li − I mi ) ,
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
4,934
[ 128000, 2654, 28881, 1887, 27358, 369, 22514, 90054, 281, 1919, 331, 12968, 32758, 198, 57, 718, 3524, 68045, 11, 12095, 88, 10602, 53483, 11, 323, 4673, 78, 276, 77547, 198, 57, 718, 3524, 68045, 11, 16, 12095, 88, 10602, 53483, 11, 16, 323, 4673, 78, 276, 77547, 16, 11, 17, 11, 5736, 16, 37196, 61860, 17005, 11, 3907, 315, 31461, 11, 800, 269, 5544, 11, 31461, 220, 19222, 3076, 11, 7427, 198, 17, 30431, 12381, 323, 17863, 17005, 11, 3907, 315, 31461, 11, 800, 269, 5544, 11, 31461, 220, 19222, 3076, 11, 7427, 198, 9, 10803, 6961, 287, 3229, 25, 1709, 78, 276, 90488, 833, 31, 84, 5259, 12871, 198, 57, 68045, 198, 50, 53483, 198, 38, 77547, 198, 57, 718, 3524, 68045, 11, 12095, 88, 10602, 53483 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 2654, 28881, 1887, 27358, 369, 22514, 90054, 281, 1919, 331, 12968, 32758, 198, 57, 718, 3524, 68045, 11, 12095, 88, 10602, 53483, 11, 323, 4673, 78, 276, 77547, 198, 57, 718, 3524, 68045, 11, 16, 12095, 88, 10602, 53483, 11, 16, 323, 4673, 78, 276, 77547, 16, 11, 17, 11, 5736, 16, 37196, 61860, 17005, 11, 3907, 315, 31461, 11, 800, 269, 5544, 11, 31461, 220, 19222, 3076, 11, 7427, 198, 17, 30431, 12381, 323, 17863, 17005, 11, 3907, 315, 31461, 11, 800, 269, 5544, 11, 31461, 220, 19222, 3076, 11, 7427, 198, 9, 10803, 6961, 287, 3229, 25, 1709, 78, 276, 90488, 833, 31, 84, 5259, 12871, 198, 57, 68045, 198, 50, 53483, 198, 38, 77547, 198, 57, 718, 3524, 68045, 11, 12095, 88, 10602, 53483, -100 ]
Q: React Native + Firebase - Saving data in Database I have a question about storing data in the database. I'm working on some screens within an app: the login screen (where the user can access your account), the signup screen (where the user can create a new account), the screen where the user provides information (such 'Mothers name and height'), and the profile screen (where information provided by the user is displayed). My question is: how can I save this information provided by the user in Firebase Database? I'm having no problems in login screen and signup screen, however I have no idea how I can save in Firebase Database the information provided by the user in the screen where the user provides information. Can any of you guys help me with this? I know I can create a user with name, email and password using firebase auth, however I have no idea how I can save in Firebase Database the information provided by the user. And I know I can add a node but I don't know how. I read some articles but none of them talk about creating a node in Firebase. Thanks in advance! Notes: *The screen where the user provides information comes after the user creates an account on the signup screen. *If you want to see what I'm trying to do, please look at the project in GitHub: https://github.com/JoaoVRodrigues01/React-Native-Codec-App A: The best approach is in fact store all data in your firebase database. If you store only on local storage the user can delete it and lost all data that supposed to be available, or also can't share data between different users. Remember that to write/read your database node, the user must have the correctly permissions, either be logged or your database allows anonymous access. You can use react-native-firebase (https://invertase.io/react-native-firebase/#/) if you need to persist your data, so use it locally when user is offline, for instance. Hope it helps.
{ "redpajama_set_name": "RedPajamaStackExchange" }
1,688
[ 128000, 48, 25, 3676, 17118, 489, 20261, 482, 49538, 828, 304, 10199, 358, 617, 264, 3488, 922, 28672, 828, 304, 279, 4729, 627, 40, 2846, 3318, 389, 1063, 15670, 2949, 459, 917, 25, 279, 5982, 4264, 320, 2940, 279, 1217, 649, 2680, 701, 2759, 705, 279, 41148, 4264, 320, 2940, 279, 1217, 649, 1893, 264, 502, 2759, 705, 279, 4264, 1405, 279, 1217, 5825, 2038, 320, 21470, 364, 26694, 3058, 836, 323, 2673, 4670, 323, 279, 5643, 4264, 320, 2940, 2038, 3984, 555, 279, 1217, 374, 12882, 4390, 5159, 3488, 374, 25, 1268, 649, 358, 3665, 420, 2038, 3984, 555, 279, 1217, 304, 20261, 10199, 5380, 40, 2846, 3515, 912, 5435, 304, 5982, 4264, 323, 41148, 4264, 11, 4869, 358, 617, 912, 4623, 1268, 358, 649, 3665, 304 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 48, 25, 3676, 17118, 489, 20261, 482, 49538, 828, 304, 10199, 358, 617, 264, 3488, 922, 28672, 828, 304, 279, 4729, 627, 40, 2846, 3318, 389, 1063, 15670, 2949, 459, 917, 25, 279, 5982, 4264, 320, 2940, 279, 1217, 649, 2680, 701, 2759, 705, 279, 41148, 4264, 320, 2940, 279, 1217, 649, 1893, 264, 502, 2759, 705, 279, 4264, 1405, 279, 1217, 5825, 2038, 320, 21470, 364, 26694, 3058, 836, 323, 2673, 4670, 323, 279, 5643, 4264, 320, 2940, 2038, 3984, 555, 279, 1217, 374, 12882, 4390, 5159, 3488, 374, 25, 1268, 649, 358, 3665, 420, 2038, 3984, 555, 279, 1217, 304, 20261, 10199, 5380, 40, 2846, 3515, 912, 5435, 304, 5982, 4264, 323, 41148, 4264, 11, 4869, 358, 617, 912, 4623, 1268, 358, 649, 3665, 304, -100 ]
Q: How to share data between web applications? I have two web applications, say Application_1 and Application_2. Application_2 has a database table named table_2, which changes infrequently, and needs to be accessed by Application_1. Does it make sense to create a table_2 table in Application_1 and update it with an ETL task? A straightforward solution would be expose the data through a REST API in Application_2, but this will break the decoupling between both applications and introduce a new point of failure in Application_1. A: Since you tagged the question with SOA, I suspect that you're thinking the right answer might be using a service interface. Such a service interface should not expose the data, but the functionality you want to provide as a contract to be exposed by one application and consumed by the other application. As the question is being asked in the abstract, this contract could range anywhere from providing answer to a very specific lookup to an event stream notifying the consumer of changes. Either application (i.e. on either or both sides of the service interface) can make use of caching (copy of table) if they need to, but caching is an optimization that should not be prematurely applied. Either way, these applications are coupled. The ETL job you suggest will also couple the applications and probably result in a more poorly understood contract between the them than a well-designed service interface. A: The best way is to make the REST api but copy data over in a scheduled job. Sharing databases should always be avoided between solutions. Remember we don't share toothbrushes and connectionstrings. By exposing the inner workings of the db you lock the cadance of both apps to each other and neither of them can have their inner workings changed to a more appropriate technology in the future. The rest api sidesteps this problem. A: One way of doing this would be to creation an Application_3_API_service which would expose an API to both Application_1 and Application_2. All services that currently do read/write operations in Application_1 and Application_2 would now hit various endpoints exposed on Application_3_API_service. The only application with a database connection would be Application_3_API_service. +---------------+ +---------------+ | Application_1 | | Application_2 | +---------+-----+ +--------+------+ | | +---------v--------------------v------+ | Application_3_API_service | +-------------------------------------+ A: The question posed indicates that your service boundaries are wrong. The service should be self-contained, it should not expose any data or let other services operate upon its data. A service should expose behaviour instead -- just like any object. The real question is how to identify service boundaries so that the resulting services will be loosely coupled, highly cohesive and autonomous. So here is my take on it: I found it profitable to decompose problem space first using business-capability mapping technique, and then map my technical services with 1:1 relation. So my services are intrinsically autonomous and cohesive, with strictly defined single source of truth. Be wary of sharing your data via events though -- if you need it, most probably than not your boundaries are wrong. If you think you need it for your web-(or any other) interface, Backends for Frontends is the way to go. Events are for triggering sagas, not for data sharing. Probably this example would be of some interest for you.
{ "redpajama_set_name": "RedPajamaStackExchange" }
303
[ 128000, 48, 25, 2650, 311, 4430, 828, 1990, 3566, 8522, 30, 358, 617, 1403, 3566, 8522, 11, 2019, 7473, 62, 16, 323, 7473, 62, 17, 627, 5095, 62, 17, 706, 264, 4729, 2007, 7086, 2007, 62, 17, 11, 902, 4442, 4225, 70941, 11, 323, 3966, 311, 387, 25790, 555, 7473, 62, 16, 627, 22186, 433, 1304, 5647, 311, 1893, 264, 2007, 62, 17, 2007, 304, 7473, 62, 16, 323, 2713, 433, 449, 459, 469, 13778, 3465, 30, 720, 32, 31439, 6425, 1053, 387, 29241, 279, 828, 1555, 264, 26487, 5446, 304, 7473, 62, 17, 11, 719, 420, 690, 1464, 279, 1654, 283, 12127, 1990, 2225, 8522, 323, 19678, 264, 502, 1486, 315, 8060, 304, 7473, 62, 16, 382, 32, 25, 8876, 499, 38213, 279, 3488, 449, 5745, 32 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 48, 25, 2650, 311, 4430, 828, 1990, 3566, 8522, 30, 358, 617, 1403, 3566, 8522, 11, 2019, 7473, 62, 16, 323, 7473, 62, 17, 627, 5095, 62, 17, 706, 264, 4729, 2007, 7086, 2007, 62, 17, 11, 902, 4442, 4225, 70941, 11, 323, 3966, 311, 387, 25790, 555, 7473, 62, 16, 627, 22186, 433, 1304, 5647, 311, 1893, 264, 2007, 62, 17, 2007, 304, 7473, 62, 16, 323, 2713, 433, 449, 459, 469, 13778, 3465, 30, 720, 32, 31439, 6425, 1053, 387, 29241, 279, 828, 1555, 264, 26487, 5446, 304, 7473, 62, 17, 11, 719, 420, 690, 1464, 279, 1654, 283, 12127, 1990, 2225, 8522, 323, 19678, 264, 502, 1486, 315, 8060, 304, 7473, 62, 16, 382, 32, 25, 8876, 499, 38213, 279, 3488, 449, 5745, 32, -100 ]
Otopharynx argyrosoma е вид лъчеперка от семейство Цихлиди (Cichlidae). Разпространение Видът е разпространен в Малави, Мозамбик и Танзания. Източници Otopharynx
{ "redpajama_set_name": "RedPajamaWikipedia" }
76
[ 128000, 46, 3565, 71, 661, 24244, 1417, 88, 3714, 7942, 22918, 74020, 26539, 34694, 6148, 67124, 7753, 13433, 20879, 104255, 77628, 1482, 101398, 67745, 11320, 100469, 320, 34, 718, 75, 114405, 3677, 115842, 8164, 103332, 35682, 17618, 720, 16604, 48262, 34694, 1830, 22918, 39479, 8164, 103332, 35682, 5372, 5927, 122857, 125082, 11, 45458, 20219, 24697, 10124, 38822, 7740, 51418, 7486, 9136, 39280, 382, 114600, 107984, 23446, 15458, 4815, 46, 3565, 71, 661, 24244, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 ]
[ 46, 3565, 71, 661, 24244, 1417, 88, 3714, 7942, 22918, 74020, 26539, 34694, 6148, 67124, 7753, 13433, 20879, 104255, 77628, 1482, 101398, 67745, 11320, 100469, 320, 34, 718, 75, 114405, 3677, 115842, 8164, 103332, 35682, 17618, 720, 16604, 48262, 34694, 1830, 22918, 39479, 8164, 103332, 35682, 5372, 5927, 122857, 125082, 11, 45458, 20219, 24697, 10124, 38822, 7740, 51418, 7486, 9136, 39280, 382, 114600, 107984, 23446, 15458, 4815, 46, 3565, 71, 661, 24244, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100 ]
Kristin Arnorsdottir-Edwards and her nominee Rosie Townend. Rosie will receive a carrier suitable for her baby's age and stage. I hope she enjoys using it and passes it on in turn to someone else who needs it, so it can keep on giving. Can Kristin or Rosie get in touch soon to discuss her carrying needs – thank you! Thank you everyone who entered, there were some lovely stories (and some sad ones) – the winner was chosen by random.org from numbers assigned to all FB comments, emails and blog comments (one per person). I wish there was a carrier for everyone!
{ "redpajama_set_name": "RedPajamaC4" }
2,119
[ 128000, 76943, 258, 36194, 1105, 67, 1751, 404, 12, 2782, 4102, 323, 1077, 29311, 97867, 14298, 408, 627, 75120, 648, 690, 5371, 264, 19115, 14791, 369, 1077, 8945, 596, 4325, 323, 6566, 13, 358, 3987, 1364, 32838, 1701, 433, 323, 16609, 433, 389, 304, 2543, 311, 4423, 775, 889, 3966, 433, 11, 779, 433, 649, 2567, 389, 7231, 627, 6854, 27973, 258, 477, 97867, 636, 304, 5916, 5246, 311, 4358, 1077, 15691, 3966, 1389, 9901, 499, 4999, 13359, 499, 5127, 889, 10862, 11, 1070, 1051, 1063, 17104, 7493, 320, 438, 1063, 12703, 6305, 8, 1389, 279, 13946, 574, 12146, 555, 4288, 2726, 505, 5219, 12893, 311, 682, 33021, 6170, 11, 14633, 323, 5117, 6170, 320, 606, 824, 1732, 570, 358, 6562, 1070, 574, 264, 19115, 369, 5127, 0 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 76943, 258, 36194, 1105, 67, 1751, 404, 12, 2782, 4102, 323, 1077, 29311, 97867, 14298, 408, 627, 75120, 648, 690, 5371, 264, 19115, 14791, 369, 1077, 8945, 596, 4325, 323, 6566, 13, 358, 3987, 1364, 32838, 1701, 433, 323, 16609, 433, 389, 304, 2543, 311, 4423, 775, 889, 3966, 433, 11, 779, 433, 649, 2567, 389, 7231, 627, 6854, 27973, 258, 477, 97867, 636, 304, 5916, 5246, 311, 4358, 1077, 15691, 3966, 1389, 9901, 499, 4999, 13359, 499, 5127, 889, 10862, 11, 1070, 1051, 1063, 17104, 7493, 320, 438, 1063, 12703, 6305, 8, 1389, 279, 13946, 574, 12146, 555, 4288, 2726, 505, 5219, 12893, 311, 682, 33021, 6170, 11, 14633, 323, 5117, 6170, 320, 606, 824, 1732, 570, 358, 6562, 1070, 574, 264, 19115, 369, 5127, 0, -100 ]
Tigers On Opium - "I May Sound Like a Drunk... But I Feel Like a Matador" Hailing from Portland, OR, Tigers On Opium bring a level of rock we don't cover all that often here at If It's Too Loud..., but would if it was this great. Their latest single, "I May Sound Like a Drunk... But I Feel Like a Matador," is an epically huge hard rock song that occasionally crosses the border into metal, but never quite stays long. Their press release refers to them as "stoner rock," which I can't argue since there are some heavy early Queens of the Stone Age influences here deeper than just the verbose song title. "I May Sound Like a Drunk... But I Feel Like a Matador" is what you would get if Refused and The Hives rocked so hard on tour that they merged into a single entity. You can listen to "I May Sound Like a Drunk... But I Feel Like a Matador" below. Their upcoming EP, 503-420-6669, will be out January 22 on Forbidden Place Records. For more on Tigers On Opium, check out their website. I May Sound Like A Drunk... But I Feel Like A Matador by Tigers On Opium Labels: 503-420-6669, forbidden place records, i may sound like a drunk... but i feel like a matador, Ken Sears, tigers on opium
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
1,783
[ 128000, 51, 33214, 1952, 10901, 2411, 482, 330, 40, 3297, 14936, 9086, 264, 2999, 3200, 1131, 2030, 358, 32833, 9086, 264, 7011, 5477, 702, 39, 14612, 505, 23947, 11, 2794, 11, 40816, 1952, 10901, 2411, 4546, 264, 2237, 315, 7091, 584, 1541, 956, 3504, 682, 430, 3629, 1618, 520, 1442, 1102, 596, 25619, 80648, 40868, 719, 1053, 422, 433, 574, 420, 2294, 13, 11205, 5652, 3254, 11, 330, 40, 3297, 14936, 9086, 264, 2999, 3200, 1131, 2030, 358, 32833, 9086, 264, 7011, 5477, 1359, 374, 459, 4248, 2740, 6908, 2653, 7091, 5609, 430, 23781, 50535, 279, 3973, 1139, 9501, 11, 719, 2646, 5115, 27656, 1317, 13, 11205, 3577, 4984, 19813, 311, 1124, 439, 330, 7876, 261, 7091, 1359, 902, 358, 649, 956, 18046, 2533, 1070, 527, 1063, 8987 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 51, 33214, 1952, 10901, 2411, 482, 330, 40, 3297, 14936, 9086, 264, 2999, 3200, 1131, 2030, 358, 32833, 9086, 264, 7011, 5477, 702, 39, 14612, 505, 23947, 11, 2794, 11, 40816, 1952, 10901, 2411, 4546, 264, 2237, 315, 7091, 584, 1541, 956, 3504, 682, 430, 3629, 1618, 520, 1442, 1102, 596, 25619, 80648, 40868, 719, 1053, 422, 433, 574, 420, 2294, 13, 11205, 5652, 3254, 11, 330, 40, 3297, 14936, 9086, 264, 2999, 3200, 1131, 2030, 358, 32833, 9086, 264, 7011, 5477, 1359, 374, 459, 4248, 2740, 6908, 2653, 7091, 5609, 430, 23781, 50535, 279, 3973, 1139, 9501, 11, 719, 2646, 5115, 27656, 1317, 13, 11205, 3577, 4984, 19813, 311, 1124, 439, 330, 7876, 261, 7091, 1359, 902, 358, 649, 956, 18046, 2533, 1070, 527, 1063, 8987, -100 ]
Clearly East Freo wants nothing to do with the city of freo. So now we wait to see how the government reacts to more bad news to on their crumbling amalgamation process. I wouldn't go as far as saying its a crumbing process. It was a tremendous effort for the people of East Fremantle and those that made the effort and ran the campaign against amalgamating with Fremantle. It took a lot of money and effort from all those involved. You couldn't really argue with the content of the advertisements and their criticisms of Fremantle and its council, specifically the Mayor. Maybe the Minster will take on board the inclination of the residents of East Fremantle and re-arrange the amalgamation of East Fremantle, Palmyra and Bicton. He should possibly look at the way that the City of Fremantle is being run. Ultimately it may go to another vote or an amalgamation with Cockburn may occur with East Fremantle, Bicton and Palmyra going to Melville. This would make more sense as Palmyra and Bicton were already part of Melville. Only time will tell and it will be interesting to see what does occur. The real question is what were EF residents, voting against the amalgamation its self or the idea of the current council of Fremantle running east freo?
{ "redpajama_set_name": "RedPajamaC4" }
4,843
[ 128000, 75471, 6460, 7730, 78, 6944, 4400, 311, 656, 449, 279, 3363, 315, 3541, 78, 627, 4516, 1457, 584, 3868, 311, 1518, 1268, 279, 3109, 69945, 311, 810, 3958, 3754, 311, 389, 872, 89417, 90865, 27279, 1920, 627, 40, 8434, 956, 733, 439, 3117, 439, 5605, 1202, 264, 1589, 33546, 1920, 13, 1102, 574, 264, 28040, 5149, 369, 279, 1274, 315, 6460, 68310, 519, 273, 323, 1884, 430, 1903, 279, 5149, 323, 10837, 279, 4901, 2403, 90865, 309, 1113, 449, 68310, 519, 273, 13, 1102, 3952, 264, 2763, 315, 3300, 323, 5149, 505, 682, 1884, 6532, 13, 1472, 7846, 956, 2216, 18046, 449, 279, 2262, 315, 279, 43749, 323, 872, 63836, 315, 68310, 519, 273, 323, 1202, 15177, 11, 11951, 279, 22868, 627, 22105, 279, 3468, 3751, 690 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 75471, 6460, 7730, 78, 6944, 4400, 311, 656, 449, 279, 3363, 315, 3541, 78, 627, 4516, 1457, 584, 3868, 311, 1518, 1268, 279, 3109, 69945, 311, 810, 3958, 3754, 311, 389, 872, 89417, 90865, 27279, 1920, 627, 40, 8434, 956, 733, 439, 3117, 439, 5605, 1202, 264, 1589, 33546, 1920, 13, 1102, 574, 264, 28040, 5149, 369, 279, 1274, 315, 6460, 68310, 519, 273, 323, 1884, 430, 1903, 279, 5149, 323, 10837, 279, 4901, 2403, 90865, 309, 1113, 449, 68310, 519, 273, 13, 1102, 3952, 264, 2763, 315, 3300, 323, 5149, 505, 682, 1884, 6532, 13, 1472, 7846, 956, 2216, 18046, 449, 279, 2262, 315, 279, 43749, 323, 872, 63836, 315, 68310, 519, 273, 323, 1202, 15177, 11, 11951, 279, 22868, 627, 22105, 279, 3468, 3751, 690, -100 ]
"On the Var" by Sir Winston Churchill, oil on canvas, 30 by 25 inches. Collection of the family of the late Julian Sandys; © Churchill Heritage Limited, Heather James Fine Art. Sir Winston Churchill is an iconic giant. He was a renowned statesman, a two-time British prime minister, a Nobel Prize-winning author—and perhaps even a savior of Western civilization. However, most people don't know he was also a painter—and few have had the chance to see his art. This makes The Paintings of Sir Winston Churchill, on display at Heather James Fine Art in Palm Desert through May 30, a rare treat. Churchill (Nov. 30, 1874-Jan. 24, 1965) was born into one of the great aristocratic families of Great Britain, the Spencers; another Spencer was Princess Diana. His father was a politician, and his mother was an American-born British socialite. Winston joined the British Army and was elected to Parliament in 1900. Churchill began painting in 1915, after stepping down as the political head of the British Navy. He was a self-taught artist, but because of his stature, he was able to befriend many of the top British painters. He was always modest about his work—but successfully entered several competitions under assumed names. He painted in the Impressionist style and preferred to paint outdoors. It's estimated that he produced about 500 paintings over a 40-year period. He never sold his work and only gave paintings as gifts to his friends and relatives. Most of his work remains in the museum at Chartwell. There are a few pieces in other museums, with the remaining paintings in private collections, including those of Queen Elizabeth II, Franklin Roosevelt, Harry Truman and Dwight Eisenhower. The value of Churchill's art has risen dramatically over the years. A painting originally given to Clare Booth Luce, "Chartwell Landscape With Sheep," sold for 1 million pounds in 2007. The 11 paintings on display at Heather James Fine Art are from the 1920s to 1940s, from the collection of the late Julian Sandys, Churchill's eldest grandchild and Duncan's father. I asked Chip Tom, a curator for Heather James Fine Art, how the exhibit came to the valley. I made several visits to the gallery to spend some time with these paintings. The hand of the artist is palpable; they are very honest works. There are areas that speak of technical brilliance and artistic insight, but Churchill doesn't try to hide the struggle and frustration when he didn't get it quite right. As an amateur painter myself, I found this encouraging. There are nine landscapes, a seascape and a still life in the collection. "On the Var," from 1935, is the largest and most polished. It reads as a tribute to Cezanne—but there is an area in the foreground, depicting a small stream, that was obviously problematic for Churchill. In "Lake Near Breccles in Autumn," also painted in the 1930s, he had no such problem: The surface and reflections of the water are rendered in confident and fluid brushstrokes reminiscent of Monet's waterlilies. We will never know exactly how painting influenced Churchill's role as a statesman, leader and writer. However, we do know painting was important enough to him that once he picked up a brush, he never traveled without his paint box, canvases and easel. The exhibit The Paintings of Sir William Churchill is on display through Wednesday, May 30, at Heather James Fine Art, 45188 Portola Ave., in Palm Desert. For more information, call 760-346-8926, or visit www.heatherjames.com.
{ "redpajama_set_name": "RedPajamaC4" }
3,794
[ 128000, 99703, 279, 8909, 1, 555, 17177, 48208, 58274, 11, 5707, 389, 10247, 11, 220, 966, 555, 220, 914, 15271, 13, 11348, 315, 279, 3070, 315, 279, 3389, 38897, 8847, 1065, 26, 7388, 58274, 34243, 19439, 11, 47363, 7957, 31253, 5277, 627, 51290, 48208, 58274, 374, 459, 27373, 14880, 13, 1283, 574, 264, 37048, 5415, 1543, 11, 264, 1403, 7394, 8013, 10461, 13015, 11, 264, 48078, 32293, 27875, 3229, 17223, 8530, 1524, 264, 274, 5758, 315, 11104, 36017, 627, 11458, 11, 1455, 1274, 1541, 956, 1440, 568, 574, 1101, 264, 30581, 17223, 2478, 617, 1047, 279, 6140, 311, 1518, 813, 1989, 13, 1115, 3727, 578, 17646, 826, 315, 17177, 48208, 58274, 11, 389, 3113, 520, 47363, 7957, 31253, 5277, 304, 33578, 43286, 1555, 3297, 220, 966, 11, 264 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 99703, 279, 8909, 1, 555, 17177, 48208, 58274, 11, 5707, 389, 10247, 11, 220, 966, 555, 220, 914, 15271, 13, 11348, 315, 279, 3070, 315, 279, 3389, 38897, 8847, 1065, 26, 7388, 58274, 34243, 19439, 11, 47363, 7957, 31253, 5277, 627, 51290, 48208, 58274, 374, 459, 27373, 14880, 13, 1283, 574, 264, 37048, 5415, 1543, 11, 264, 1403, 7394, 8013, 10461, 13015, 11, 264, 48078, 32293, 27875, 3229, 17223, 8530, 1524, 264, 274, 5758, 315, 11104, 36017, 627, 11458, 11, 1455, 1274, 1541, 956, 1440, 568, 574, 1101, 264, 30581, 17223, 2478, 617, 1047, 279, 6140, 311, 1518, 813, 1989, 13, 1115, 3727, 578, 17646, 826, 315, 17177, 48208, 58274, 11, 389, 3113, 520, 47363, 7957, 31253, 5277, 304, 33578, 43286, 1555, 3297, 220, 966, 11, 264, -100 ]
China Ranch sells date palms of all sizes, from starter trees in 15 gallon pots, priced at $50.00, to large specimen trees priced according to their size. Generally the best time to plant palms is in the warm weather, which here in the Mojave desert means April through September. All of our prices listed are FOB at China Ranch, we do not transport trees. For larger trees there is a $50.00 per tree digging and loading fee to be added to the prices listed below. The photos shown here are representative samples of the sizes and prices of the trees we offer, for specific information about numbers of trees available please call our office number listed on this website. Our inventory can change frequently as trees are sold and others become available. Full payment is required at the time of pick up. Young date palms rooted in 15 gallon pots in our nursery, priced at $50.00 each. We usually have both male and female trees available. ready to be shipped to another date grower. We sell these type of trees bare root in larger quantities for $50.00 each. A nice tree that will trim out to have about 6 feet of clean trunk, priced at $1000.00. A large, healthy specimen, priced at $2,000.00. We have a limited number of these larger trees.
{ "redpajama_set_name": "RedPajamaC4" }
6,487
[ 128000, 23078, 42982, 31878, 2457, 75818, 315, 682, 12562, 11, 505, 27795, 12690, 304, 220, 868, 50680, 51131, 11, 33705, 520, 400, 1135, 13, 410, 11, 311, 3544, 58184, 12690, 33705, 4184, 311, 872, 1404, 13, 44493, 279, 1888, 892, 311, 6136, 75818, 374, 304, 279, 8369, 9282, 11, 902, 1618, 304, 279, 90437, 525, 24521, 3445, 5936, 1555, 6250, 13, 2052, 315, 1057, 7729, 10212, 527, 435, 21257, 520, 5734, 42982, 11, 584, 656, 539, 7710, 12690, 13, 1789, 8294, 12690, 1070, 374, 264, 400, 1135, 13, 410, 824, 5021, 42200, 323, 8441, 11307, 311, 387, 3779, 311, 279, 7729, 10212, 3770, 627, 791, 7397, 6982, 1618, 527, 18740, 10688, 315, 279, 12562, 323, 7729, 315, 279, 12690, 584, 3085, 11, 369, 3230, 2038, 922, 5219, 315 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 23078, 42982, 31878, 2457, 75818, 315, 682, 12562, 11, 505, 27795, 12690, 304, 220, 868, 50680, 51131, 11, 33705, 520, 400, 1135, 13, 410, 11, 311, 3544, 58184, 12690, 33705, 4184, 311, 872, 1404, 13, 44493, 279, 1888, 892, 311, 6136, 75818, 374, 304, 279, 8369, 9282, 11, 902, 1618, 304, 279, 90437, 525, 24521, 3445, 5936, 1555, 6250, 13, 2052, 315, 1057, 7729, 10212, 527, 435, 21257, 520, 5734, 42982, 11, 584, 656, 539, 7710, 12690, 13, 1789, 8294, 12690, 1070, 374, 264, 400, 1135, 13, 410, 824, 5021, 42200, 323, 8441, 11307, 311, 387, 3779, 311, 279, 7729, 10212, 3770, 627, 791, 7397, 6982, 1618, 527, 18740, 10688, 315, 279, 12562, 323, 7729, 315, 279, 12690, 584, 3085, 11, 369, 3230, 2038, 922, 5219, 315, -100 ]
As one of the most popular products that we offer here at Tuffa Tanks, the bunded steel tank is both versatile in its uses and is of the highest quality possible. As we design and manufacture all of our tanks in-house, we can guarantee a high standard like no other and deliver you the customer service you deserve at the same time. No matter what your need is, we can supply ready-made or bespoke bunded tank solutions for your business. We work with the most experienced and skilled steel workers and fabricators to ensure your Tuffa tank is the only one you will ever need. Why Choose Bunded Steel Tanks? The bunded steel tank is popular because it is one of the safest, securest ways of storing oil, diesel and other fuels, across a broad range of industries and sectors. What does bunded mean? Simply put, it is a tank that has an extra layer of security that is 110% the size of the original tank, to ensure any accidents or leaks are contained safely. In addition to that extra level of security; our tanks also minimise the risk of spillages, wastage and are cost-effective in the long term. Our bunded tanks are safe to store above or below ground and can withstand extreme weather conditions safely. Our bunded steel tanks are manufactured to adhere to tank regulations, to comply with Oil Storage Regulations and are available in a variety of capacities and colours to suit your needs. While bunded tanks are very popular in steel, we also manufacture steel and plastic combination tanks, as per your specific requirements. Who Uses Bunded Steel Tanks? There are many situations across a variety of industries that would require a bunded tank. Domestic uses include heating oil for the home, fuel and diesel storage for business, petrol stations, farms and airports; among many others. We have a range of fire protected tanks, too, that are extremely useful when the risk of fire is higher than normal. These bunded steel tanks are the best way to ensure that your tank is compliant with all building regulations. For more information on our range of bunded steel tanks, please visit our website, take a look at the tanks you require or contact our customer service team for any further assistance.
{ "redpajama_set_name": "RedPajamaC4" }
6,125
[ 128000, 2170, 832, 315, 279, 1455, 5526, 3956, 430, 584, 3085, 1618, 520, 350, 1386, 64, 83881, 11, 279, 10581, 291, 9699, 13192, 374, 2225, 33045, 304, 1202, 5829, 323, 374, 315, 279, 8592, 4367, 3284, 13, 1666, 584, 2955, 323, 30847, 682, 315, 1057, 26951, 304, 37002, 11, 584, 649, 15803, 264, 1579, 5410, 1093, 912, 1023, 323, 6493, 499, 279, 6130, 2532, 499, 23528, 520, 279, 1890, 892, 627, 2822, 5030, 1148, 701, 1205, 374, 11, 584, 649, 8312, 5644, 27975, 477, 76649, 10581, 291, 13192, 10105, 369, 701, 2626, 13, 1226, 990, 449, 279, 1455, 10534, 323, 26611, 9699, 7487, 323, 13354, 3046, 311, 6106, 701, 350, 1386, 64, 13192, 374, 279, 1193, 832, 499, 690, 3596, 1205, 627, 10445, 22991, 30708, 291, 12783, 83881 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 2170, 832, 315, 279, 1455, 5526, 3956, 430, 584, 3085, 1618, 520, 350, 1386, 64, 83881, 11, 279, 10581, 291, 9699, 13192, 374, 2225, 33045, 304, 1202, 5829, 323, 374, 315, 279, 8592, 4367, 3284, 13, 1666, 584, 2955, 323, 30847, 682, 315, 1057, 26951, 304, 37002, 11, 584, 649, 15803, 264, 1579, 5410, 1093, 912, 1023, 323, 6493, 499, 279, 6130, 2532, 499, 23528, 520, 279, 1890, 892, 627, 2822, 5030, 1148, 701, 1205, 374, 11, 584, 649, 8312, 5644, 27975, 477, 76649, 10581, 291, 13192, 10105, 369, 701, 2626, 13, 1226, 990, 449, 279, 1455, 10534, 323, 26611, 9699, 7487, 323, 13354, 3046, 311, 6106, 701, 350, 1386, 64, 13192, 374, 279, 1193, 832, 499, 690, 3596, 1205, 627, 10445, 22991, 30708, 291, 12783, 83881, -100 ]
Snake Eater In SNAKE EATER, Lorenzo Lamas plays a cop named Soldier Kelly. And it seems like that's his given name, because even his sister calls him that. I don't know if having that name subconsciously affected him or not, but he did grow up to become a soldier in the elite "Snake Eater" unit of the Marines. And he must be proud of this 'cause he always wears a belt buckle with a snake on it. In 1989, while the rest of the world is busy listening to "Batdance" and trying to decide whether to watch Arsenio Hall or Pat Sajak, Soldier's stateside doing undercover drug busts. We first meet him alone in a crack house singing "Kumbaya" and ranting to himself to make the stakeout guys in the car outside uncomfortable. If you're ever trying not to get spied on by the cops, by the way, take a quick look around for two middle aged guys wearing ties sitting in a car all day drinking coffee and eating sandwiches. In this case they're out there listening on the wire, one wondering who the fuck this crazy new guy is, the other running down Soldier's full Just How Badass Is He? bio: "He was a marine. One of the elite… Y'know, you gotta be one tough sonofabitch to make it in the Snake Eaters, and from what I hear this guy Kelly, he was one of the best: tough, imaginative, and a real fighter." Or as the trailer narrator puts it, he's a "one man justice squad." A little later he gets a Just How Rebellious Is He?: "The Marines are right, you can't take orders! You're an oddball! You're some kinda nutcase! Turn in your badge, you're on suspension!" This opening undercover scene is a great introduction to the character, not just because of that explanatory dialogue, but for at least three other reasons: 1. When a gangster's moll wants to check him for a wire he convinces her to take her clothes off too and have sex with him right then and there. 2. He lets his partners believe the wire was hidden up his butt, even though it was in a special hairpiece. 3. He takes out 2 guys with booby traps, including hundreds of nails that pop out of the floor and a net that catches humans like they're animals. The irreverent introduction to Soldier continues as a motorcycle crash sends him flying head first into the outdoor seating area of his favorite biker bar hangout. And then some big asshole who carries around a pair of pliers and a necklace of human teeth wants to fight him for it. His friends decide not to intervene. The movie has a sense of humor that's not really executed as well as it could be, but it's still fun. The dark side comes in out on a lake boat where a family of inbred psychopaths harass a non-inbred family of three on their boat, blow up the parents and kidnap the daughter. We come to learn this was Soldier's family, so him being on suspension turns out to be a lucky break. He won't have to build up his vacation hours to go on a rescue and revenge mission. So Soldier goes tracking his sister, quickly gets into some scuffles with the inbreds, finds a girlfriend, etc. An old ex-biker converts Soldier's Harley to a jet ski without his permission. At first he's mad, but obviously it comes in handy. I mean, who couldn't use one of those? Weirdly, there's a part where one of the kidnappers tries to get the sister to eat a snake. He doesn't even know there's a Snake Eater after him, so it's just a coincidence. But she doesn't eat it, so the title is not a double meaning. (SPOILER) Once all the revenge and everything is over with Soldier goes back to his job of being a cop who plays by his own rules. He terrorizes an arsonist played by Horshack from Welcome Back Kotter. The end. There's a real good end credits song with lyrics like "Soldier, where's your sister / Can you hear her helpless cries? / The only light to guide you now / Is the fire in your eyes." The script is by Michael Paseornek & John Dunning, two major figures in Canadian exploitation cinema. Dunning co-founded the company Cinepix, which made this and most other Canadian genre movies. It later turned into Lionsgate, which Paseornek is the president of. I gotta say, Lamas is pretty good in this. He's pretty funny. I guess he's supposed to be sort of the Mel Gibson in LETHAL WEAPON type of funny-crazy-guy-cop. He gets a few intentional laughs. I remember Lamas from that TV show Renegade, when he was more of a muscly, long-haired Fabio lookin motherfucker. In this one he reminded me more of Treat Williams and Scott Foley (the younger guy on The Unit, I believe he might've also been on that show Felicity but it's hard to say for sure). Hopefully soon those three will play a father-brother-son bounty hunting team. Of course the movie is cheesy and ridiculous, made up of the laziest action movie cliches with little attempt at authenticity. But it's pretty knowing about it, its kinda tongue in cheek. That's arguably a bad thing, it might be funnier if it was dead serious. But it's an enjoyable movie. The only real problem is that the last 2/3 doesn't live up to the great opening section. I guess that makes it the WALL-E of late '80s Canadian action. Motorcycle Gang Baseketball bikers Canadian Cinepix inbreds Lorenzo Lamas This entry was posted on Wednesday, April 25th, 2012 at 10:59 pm and is filed under Action, Reviews. You can follow any responses to this entry through the RSS 2.0 feed. You can skip to the end and leave a response. Pinging is currently not allowed. « The Innkeepers Next Post EL GRINGO trailer » 42 Responses to "Snake Eater" April 26th, 2012 at 12:14 am That VHS cover is too beautiful. Soldier Kelly's ability to bed Cutie McScarChest within about 1 minute is his most impressive attribute in my opinion, slightly more impressive than his ability to don his pants in the split second it takes the film to cut when the bad guys arrive. Good review, Vern. Always nice to see a rare new addition to the "inbreds" tag. I better go rewatch WALL-E to verify whether your concluding theory holds up. ShootMcKay I rank part 2 and 3 in the SNAKE EATER saga a bit higher than this on.Especially part 3 where Soldier teams up with Cowboy.They have some good male-bonding shit in that one. Amazing Larry Actually, there WAS a time when soldiers ate snakes. Not as a first choice, mind you… it pertained to their survival skills. I found an HTML link about 5 years ago to an old Life Magazine article about Green Beret advisers in Vietnam back in '62. One of the pics showed a soldier with a (dead) snake cut open and putting a piece of snakemeat in his mouth. And of course, as with any strange critter you wouldn't ever actually sample yourself, the caption claimed that it "tasted like chicken". Thanks to the advent of MRE's (the military equivalent of Lunchables), I'm guessing that snake is no longer the meal du jour, even under the most dire of circumstances. Which brings me to Sunny Point #2. With this snake-eating business in mind, it occurred to me that (in Avatar) the humans on Pandora could've easily subjugated the N'avi population had they gifted them with some form of restaurant chain that had drive-thru (or ride-thru and/or fly-thru, as horses and dragons were the preferred form of transport). Think about it: there you are, a badass N'avi warrior… out on the perimeter, kickin' Sky People ass & takin' names. Bein' a dude; workin' it. After a hard day of keeping it N'avi-real, you return to Hometree, walk through the columns, and there's your wife. She doesn't ask how your day was, or make you a martini, or drag you off to a nook in the tree for a quick hummer. No, instead she just hands you a bow & arrow with this LOOK on her face that says "Dinner ain't gonna hunt itself; have at it, Skippy". Having takeout at one's disposal would alleviate all that. Everybody's happy. And when it comes time for gentrification in the Hometree 'hood, the N'avi don't have a big hissy fit. They just pack their shit and go where the food is. I was gonna write the obligatory macho retort "There is only ONE snake, and that's Plissken!", but this seemed like a better tangent. Explosive Action Yeah, the opening scene in Snakeeater was great, but then it all went down hill with the redneck theme that was just… weird. The same happens with the sequel; Snakeeater ends up in a psycho ward playing wheelchair death-sports. That's no joke. I've not made it to the third film yet. Please do check out my thoughts on the first two films on my blog! I love the opening too. The part where Soldier reads his own obituary over the wire is hilarious. "Cause of death: Excessive masturbation due to excessive boredom while waiting for a drug bust!" They broke the mold when they made Lamas. RBatty024 The tagline reads, "As Dirty as Dirty Harry, As Dangerous as Deliverance." This is a little confusing. I assume the first part is referring to Soldier Kelly, but who is "as Dangerous as Deliverance." Is this referring to the bad guys, or maybe the movie itself? Or is Soldier Kelly also supposed to be as dangerous as deliverance? If that is so, then is he as dangerous as Burt Reynolds, or maybe he's as dangerous as those Appalachian people who raped the city slicker. They should have put more thought into this tagline. I'm not sure it makes sense. Sternshein I don't want to go off on a quick little soapbox but this review reminded me of the replies to the Innkeepers. Sometimes the people around here are so quick to sound smart that they forget this is a website that reviews movies like Snake Eater. Stop taking yourselves so darn seriously and let's start having some fun around here. Thank you. And which Snake Eater features Bam Bam Bigelow? That would be SNAKE EATER III: DIE SNAKE EATER DIE. I hope you stick with the series, Vern. The sequels are even better than the original. The second one has rooftop wheelchair jousting and the third one has an electrified toilet. It's the LORD OF THE RINGS of Canadian B-action trilogies. I love how fuckin inventive Soldier kills off people in the sequels. Lika a psychotic MacGyver. So there is this new movie coming out this weekend called Safe. It looks ok but then I learned the fight choreographer was JJ Perry and the director is Boaz Yakin AND James Hong is in it. There is even a reviewer who said it had the most jaw dropping fight's in years which leads me to believe he hasn't seen The Raid. pegsman That's the new Statham movie, so I guess we all know what we're getting. Is it possible to stay on topic? Broddie This review was a long time coming. Good to see Vern has come around to reviewing the SNAKE EATER oeuvre. As Mr. Majestyk and ShootMcKay pointed out the sequels do a better job at upping the irreverence but without always winking and nudging. Number 2 is interesting because it's the only time I remember a vigilante character willfully check himself into a nut house. It's a warped combination of a DEATH WISH (in the sense of taking out drug pushers) sequel with a bit of FIRST BLOOD (though not as much FB-ness as the original) and ONE FLEW OVER THE CUCKOO'S NEST. Horshack even manages to return. Sternshein – That would be SNAKE EATER III. Ah crap Mr. Majestyk already answered that. I should read through the entire thread before continuing to post more often. But yeah SEIII is most effective & my favorite of the 3 cause it's Lamas' respond to Bosworth's STONE COLD in many respects. I'm trying to remember if ACE VENTURA also deserves some credit for having a protagonist check into a mental institution. Maybe, yeah I guess. But Ace isn't as funny as Snake Eater. Plus he's a Pet Detective and not a vigilante cop. That's why I say "some credit." We all know it's just a matter of time til Detective Ace pisses off the brass with his loose cannand has to turn in his badge & gun. We all know it's just a matter of time til Detective Ace pisses off the brass with his loose cannon antics and has to turn in his badge & gun. Uh oh, my modified iPad-laptop-iPhone internet device is tripping over itself. I'll just give work & talkbacking a break while I go watch THE RAID again. If Vern completes the trilogy here, I'll be jealous b/c I don't have access to SNAKE EATER 2: THE TWO TOWERS any longer, and don't remember it well, and I've never seen SNAKE EATER 3: RETURN OF THE KING. Shoot, I'd love to stay on topic but until Vern creates a message board we have to assume the latest topic is also for discussing other things that aren't necessarily related but are something that readers might like to know about. Outlaw Vern Sternshein – Clubside, the ridiculously generous web guy, is looking into setting up message boards for me, but until then I prefer you talk about miscellaneous shit on this post: https://outlawvern.com/2012/03/27/seagalogy-updated-and-expanded-edition/ which I designated as the new potpourri. I'm excited about SAFE but I feel like there's more to discuss about SNAKE EATER here. Plus, if I don't lay down some type of boundaries then it's anarchy and every god damn thread is taken over by Batman and Michael Bay. April 26th, 2012 at 12:01 pm May Crom always bless youtube. They have everything. http://www.youtube.com/watch?v=ubrA650sosY There it is in all it's glory, SNAKE EATER 2: WHEELCHAIR GLADIATORS. The famous power ballad instrumental fueled c-level action setpiece complete with wheelchair roundhouse kicks. As someone from a different part of this amazing planet I managed to get ahold of all the movies through*cough*cough* (if you know what I mean). No legal ways,sadly. I´d definitely pay for a trilogy pack of awesome proportions IF available. Well worth your time this series is. you know what else was going on in 1989? I was being born, that's what also, as a gamer, I can't hear snake eater without thinking "IIIIIIIIIIIIII'M STILLLLLLLLLLLLL IN A DREAAAAAAAAAAAM, SNAKE EATEEEEER!!!" http://www.youtube.com/watch?v=_CbFAZ2ztlE It's a dope series. When I was a kid I liked it a lot cause it was like a weird hybrid of a Cannon Film and a Troma feature. I was the type of kid that still saw some soul in movies like this. To me it's about effort and embracing what you have. As the series goes on they just get into it more and just treat it as doing their work. It has a certain charm in that sense. No matter how absurd and over the top it gets it embraces that and strives for a competent job at it and that's admirable. It's like the BEST OF THE BEST series in that term at least the first 3 except I think BotB does it better overall SE series is still worth the time if you ask me. SNAKE EATER sure is a weird series of movies. I really like Lorenzo Lamas, but here he is really let loose as opposed to Tv-Lamas where he is supposed to be a "renegade", but it is hard to be a renegade within network-standards. He still need to maintain some form of good guy aspect on television which is bullshit as far as I am concerned. If you call a show RENEGADE, that is what we want you chickenshit network executives pussy assholes. You hear me?!! Also, Lorenzo Lamas was the only bright spot in that awful shark vs octopus movie from Asylum films. I enjoyed his agency asshole performance more than the promised main event… I tuned away from RENEGADE the minute I realized that it wasn't the continuing adventures of Soldier Kelly. Missed opportunity if you ask me. Lamas could've pulled a Paul Reubens and just played that character forever. In TV shows, musicals, advertisements etc. It's no SHARKTOPUS, I'll give you that, but Megashark jumping out of the water and biting a 747 was pretty awesome. I also liked how they only had about eight special effects shots so they just reused them over and over again. Soldier Kelly does not fit in within TV standards I am afraid. As irony would have it he is much more of a renegade than Reno Raines. Also, to bring it on home, has anyone seen the Gary Daniels flick HAWK'S VENGEANCE. It's another pre-Lionsgate Canadian action venture. Daniels plays a British Marine who has a stepbrother who's a Canadian cop named (wait for it) Soldier. Is this an unofficial SNAKE EATER spinoff? And if so, why am I so goddamn excited about the prospect of an extended SNAKE EATER universe? Majestyk – that scene were the shark jumped 10000 feet (or whatever) to bite a passenger airplane was actually funny but reusing effect shots is never funny. They even reused establishing shots! That is just retarded… *correction* I am in a grumpy mood which prohibits me from appreciating even the stupediest of shit that might be looked at as funny but in my mind i just idiotic at the moment. Griff — When I heard the title of this movie, I too first thought of Metal Gear Solid 3. I don't play many video games anymore, and that series has still stuck with me over the years. I have to admit that I've never heard of these Snake Eater movies. Were these popular back in the day, or something? Did you have to be Canadian to have seen them? I do remember Lorenzo Lamas from commercials for Renegade, and they always mentioned his name as if he were some big draw for the viewer, but I honestly had no clue who he was back then. RBatty024 – I'm not Canadian but I wouldn't doubt that many Canadians have indeed seen it. In my case the video store was literally just around the corner from where I lived. At 2 bucks a rental and rent 2 and get 1 rental free deals I used to live there for most of the late 80's to late 90's. Rented anything that I thought had a cool videotape cover or had a familiar face on the cover. You saw the VHS cover for SNAKE EATER up there. If you're a 6 yr old kid would you NOT want to rent that movie upon seeing a giant fucking snake wrapped around a guy with a gun? that's why I saw SNAKE EATER. SNAKE EATER II also became a cable TV staple when I was a kid. So my exposure came from all that. I don't know if they were ever super popular but I think it's safe to say most people who've seen them or know about them have done so because they used to be loyal videostore customers. It's probably the same reason they know who Don THE DRAGON Wilson is and know about Full Moon's feature catalog. They spend a lot of time in video stores and rented shit that just looked awesome or interesting. Personally, I will never forget the poster for SNAKE EATER II: NERDS IN PARADISE because of the unlikely sight of Larry B. Scott wearing a bowler hat and a red trenchcoat (okay, maybe that part isn't so unlikely) and toting a sawed-off shotgun (that part sure is, though). That shit hung in my neighborhood video store for like three or four years. I don't know why I didn't just ask them for it. That's how I got my much beloved (and long mourned) RETURN OF SWAMP THING poster. Delbert Grady According to my 1998 Videohound book, football hall of famer Larry Csonka is in this. I can only assume his acting is not up to par with his former grid iron glory. May 4th, 2012 at 2:33 pm Been working on an Arabic language review of Peter Bergen's new book, MANHUNT, and I thought I'd share this passage, which immediately follows a quick rundown of the components of JSOC: ***The top officers who ran the U.S. military were often suspicious of the "snake eaters" in Special Operations, whom they tended to regard as cowboys.*** Okay, one more little MANHUNT passage, this one about a real-life Captain America Fuck Yeah to commemorate opening day for AVENGERS: ***[Under the command of Admiral McRaven,] the rate of missions in which Special Operations forces captured or killed their targets in Afghanistan or Iraq — soared from 35 percent to more than 80 percent. The amount of punishment JSOC was inflicting on the Taliban can be gauged by the fact that during this period, the average age of Taliban commanders in Afghanistan declined from thirty-five to twenty-five. McRaven is a strapping, dark-haired, blue-eyed Texan in his mid-fifties. . . . A battle-hardened colleague says McRaven reminds him of the comic-book superhero Captain America, while another says he "is reputed to be the smartest SEAL that ever lived. He is physically tough, compassionate, and can drive a knife through your ribs in a nanosecond." Even as a three-star admiral, McRaven went out with his teams on snatch-and-grab missions about once a month in Afghanistan.*** Not all badass motherfuckers are in the movies. McRaven…..Damn! If you are born with a name like that, you better turn out badass. Sounds like this guy filled his quota on that plentiful. Shit, man, I didn't even think of that, ShootMcKay. Good call. Translation protocol is usually to phonetically translate tricky English names, but in this case that would be boring, so I'm going to look for a way to write the Arabic equivalent of "Admiral McAngryBlackBadassBirdOfDeath" somehow.
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
4,598
[ 128000, 84520, 469, 977, 198, 644, 328, 7476, 3472, 469, 19706, 11, 74500, 445, 29189, 11335, 264, 6293, 7086, 53529, 19178, 13, 1628, 433, 5084, 1093, 430, 596, 813, 2728, 836, 11, 1606, 1524, 813, 13219, 6880, 1461, 430, 13, 358, 1541, 956, 1440, 422, 3515, 430, 836, 1207, 444, 71888, 11754, 1461, 477, 539, 11, 719, 568, 1550, 3139, 709, 311, 3719, 264, 27202, 304, 279, 21342, 330, 84520, 469, 977, 1, 5089, 315, 279, 51889, 13, 1628, 568, 2011, 387, 12691, 315, 420, 364, 1593, 568, 2744, 38400, 264, 19671, 81095, 449, 264, 26332, 389, 433, 627, 644, 220, 3753, 24, 11, 1418, 279, 2800, 315, 279, 1917, 374, 13326, 14624, 311, 330, 59500, 99975, 1, 323, 4560, 311, 10491, 3508, 311, 3821, 1676, 12021, 822 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 84520, 469, 977, 198, 644, 328, 7476, 3472, 469, 19706, 11, 74500, 445, 29189, 11335, 264, 6293, 7086, 53529, 19178, 13, 1628, 433, 5084, 1093, 430, 596, 813, 2728, 836, 11, 1606, 1524, 813, 13219, 6880, 1461, 430, 13, 358, 1541, 956, 1440, 422, 3515, 430, 836, 1207, 444, 71888, 11754, 1461, 477, 539, 11, 719, 568, 1550, 3139, 709, 311, 3719, 264, 27202, 304, 279, 21342, 330, 84520, 469, 977, 1, 5089, 315, 279, 51889, 13, 1628, 568, 2011, 387, 12691, 315, 420, 364, 1593, 568, 2744, 38400, 264, 19671, 81095, 449, 264, 26332, 389, 433, 627, 644, 220, 3753, 24, 11, 1418, 279, 2800, 315, 279, 1917, 374, 13326, 14624, 311, 330, 59500, 99975, 1, 323, 4560, 311, 10491, 3508, 311, 3821, 1676, 12021, 822, -100 ]
Happily married couple considers divorce to pay for daughter's health care costs The Texas couple says it's the only way to help their daughter's skyrocketing health care bills. Get the latest from TODAY July 11, 2018, 12:24 PM UTC / Source: TODAY By Eun Kyung Kim Jake and Maria Grey are happily married with two children. But they're considering a divorce, for the sake of one of their kids. The Texas couple say it's the only way their developmentally disabled daughter can qualify for Medicaid and get the health care she needs. This happily married couple is considering divorce to afford disabled child's health care July 11, 201802:36 The Greys got married nine years ago on a Florida beach. They have since become the proud parents of two daughters, 2-year-old Fairen and 6-year-old Brighton, who was born with a rare genetic disorder, Wolf-Hirschhorn syndrome. Developmentally still a newborn, Brighton requires around-the-clock attention. "She will not be able to be on her own ever and requires 24/7 care," Maria Grey said. Trending stories,celebrity news and all the best of TODAY. The couple has tried to get Medicaid to help with spiraling medical costs but Jake earns too much — $40,000 — for the family to qualify. The Greys applied for state assistance but don't expect to get it because of where they fall on the list. "We're No. 60,000," Maria said. "You try anything when it comes to your child," says Maria Grey, with daughter Brighton. TODAY That's why the couple is contemplating divorce. It would allow Maria to become a single, unemployed mother and qualify her for Medicaid. The couple said it may be the only way the family could get the help they need to care for Brighton. "We shouldn't have to make that sacrifice to get our child Medicaid," Maria Grey said. Jake Grey, an Army veteran, said the family has private health insurance but they still spend about $15,000 every year out of pocket. "It's drowning us to try to keep up with her medical expenses," he said. "We've done everything we can do to try to keep her afloat, and we're going to reach a point where we can't do it and we won't have another option. We don't know what to do." Jake and Maria Grey got married nine years ago.TODAY The couple said they have heard of other families in the same heartbreaking dilemma. "We are not looking for charity, we're not looking for money or donations. We don't want a GoFundMe — we don't want any of that," Maria said. "I need the state to step up and give us the benefits that we need. The Greys say they're going public with their struggle to help raise awareness about their predicament and encourage others in a similar situation to speak up. They say they'll do whatever necessary to help their daughter. "She is a pure and beautiful soul," Maria said. "We're lucky to have that and I wouldn't change that for anything."
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
9,969
[ 128000, 39, 680, 1570, 12502, 5743, 32238, 25549, 311, 2343, 369, 10003, 596, 2890, 2512, 7194, 198, 791, 8421, 5743, 2795, 433, 596, 279, 1193, 1648, 311, 1520, 872, 10003, 596, 75722, 287, 2890, 2512, 19123, 627, 1991, 279, 5652, 505, 41362, 198, 29527, 220, 806, 11, 220, 679, 23, 11, 220, 717, 25, 1187, 5975, 28503, 611, 8922, 25, 41362, 198, 1383, 469, 359, 23727, 2234, 13818, 198, 95336, 323, 23880, 26769, 527, 37875, 12502, 449, 1403, 2911, 13, 2030, 814, 2351, 13126, 264, 25549, 11, 369, 279, 25491, 315, 832, 315, 872, 6980, 627, 791, 8421, 5743, 2019, 433, 596, 279, 1193, 1648, 872, 4500, 750, 8552, 10003, 649, 26456, 369, 34129, 323, 636, 279, 2890, 2512, 1364, 3966, 627, 2028, 37875, 12502, 5743, 374, 13126 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 39, 680, 1570, 12502, 5743, 32238, 25549, 311, 2343, 369, 10003, 596, 2890, 2512, 7194, 198, 791, 8421, 5743, 2795, 433, 596, 279, 1193, 1648, 311, 1520, 872, 10003, 596, 75722, 287, 2890, 2512, 19123, 627, 1991, 279, 5652, 505, 41362, 198, 29527, 220, 806, 11, 220, 679, 23, 11, 220, 717, 25, 1187, 5975, 28503, 611, 8922, 25, 41362, 198, 1383, 469, 359, 23727, 2234, 13818, 198, 95336, 323, 23880, 26769, 527, 37875, 12502, 449, 1403, 2911, 13, 2030, 814, 2351, 13126, 264, 25549, 11, 369, 279, 25491, 315, 832, 315, 872, 6980, 627, 791, 8421, 5743, 2019, 433, 596, 279, 1193, 1648, 872, 4500, 750, 8552, 10003, 649, 26456, 369, 34129, 323, 636, 279, 2890, 2512, 1364, 3966, 627, 2028, 37875, 12502, 5743, 374, 13126, -100 ]
MENTOR was assigned with re-designing the organziational structure and HR framework of a waste management group. The project scope involved revision of job descriptions for over 35 key functions, alignment of HR policies and procedures and development of KPIs. We successfully helped to restructure current policies and develop a performance management system based on best practices. In addition, we developed both the quality management and health and safety environment policy as well as procedure manuals. Operational procedures and the environmental plan were reformatted and reviewed to ensure alignment with the new policy and procedure manuals.
{ "redpajama_set_name": "RedPajamaC4" }
735
[ 128000, 5441, 878, 574, 12893, 449, 312, 47117, 287, 279, 2942, 8510, 1697, 6070, 323, 23096, 12914, 315, 264, 12571, 6373, 1912, 13, 578, 2447, 7036, 6532, 24493, 315, 2683, 28887, 369, 927, 220, 1758, 1401, 5865, 11, 17632, 315, 23096, 10396, 323, 16346, 323, 4500, 315, 735, 1932, 82, 13, 1226, 7946, 9087, 311, 312, 7993, 1510, 10396, 323, 2274, 264, 5178, 6373, 1887, 3196, 389, 1888, 12659, 627, 644, 5369, 11, 584, 8040, 2225, 279, 4367, 6373, 323, 2890, 323, 7296, 4676, 4947, 439, 1664, 439, 10537, 56294, 13, 90396, 16346, 323, 279, 12434, 3197, 1051, 15180, 12400, 323, 22690, 311, 6106, 17632, 449, 279, 502, 4947, 323, 10537, 56294, 13, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 ]
[ 5441, 878, 574, 12893, 449, 312, 47117, 287, 279, 2942, 8510, 1697, 6070, 323, 23096, 12914, 315, 264, 12571, 6373, 1912, 13, 578, 2447, 7036, 6532, 24493, 315, 2683, 28887, 369, 927, 220, 1758, 1401, 5865, 11, 17632, 315, 23096, 10396, 323, 16346, 323, 4500, 315, 735, 1932, 82, 13, 1226, 7946, 9087, 311, 312, 7993, 1510, 10396, 323, 2274, 264, 5178, 6373, 1887, 3196, 389, 1888, 12659, 627, 644, 5369, 11, 584, 8040, 2225, 279, 4367, 6373, 323, 2890, 323, 7296, 4676, 4947, 439, 1664, 439, 10537, 56294, 13, 90396, 16346, 323, 279, 12434, 3197, 1051, 15180, 12400, 323, 22690, 311, 6106, 17632, 449, 279, 502, 4947, 323, 10537, 56294, 13, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100 ]
Benue State University Institutional Repository Benue State University Institutional Repository > Faculty of Social Science > Sociology > Please use this identifier to cite or link to this item: http://bsuir.bsum.edu.ng:8080/jspui/handle/11409/527 Title: SOCIO-ECONOMIC FACTORS INFLUENCING UTILIZATION OF MANUAL SCREW PRESS TECHNOLOGY FOR GARI PRODUCTION IN KWARA STATE, NIGERIA Authors: ADEGBOLA, ADETAYO JACOB Keywords: SOCIO-ECONOMIC FACTORS, UTILIZATION OF MANUAL SCREW, PRESS TECHNOLOGY, GARI PRODUCTION, KWARA STATE, NIGERIA Issue Date: Mar-2019 Abstract: This study investigated socio-economic determinants of utilization of manual screw press for cassava mash dehydration for gari production in four local government areas across the Agricultural Development Project (ADP) zones in Kwara state. Using multistage sampling technique and a semi-structured questionnaire as instrument, data for the study were collected from a sample of three hundred and eighty four (384) gari processors who use the screw press in the state. The study revealed that the level of awareness of other improved dehydrating technologies for cassava mash among the respondents is low. However, level of utilization of the screw press was high. Multiple regression analysis show that a correlation (R=0.678) exist between utilization of the screw press and the independent variables which include age, household size, level of education, years of processing experience, extension visits, and income from gari processing. R2 value of 0.460 indicates that about 46% of the variation in utilization was explained by socio-economic variables included in the regression model. F-value (F-calculated) is 53.59 which is greater than F-critical value (F-tabulated) of 1.96 at 0.05 significant level; therefore, there is significant relationship between socioeconomic characteristics investigated and utilization of the manual screw press. Three variables significantly influenced the decision of the respondents to utilize the manual screw press: age, level of experience, and income; the most important predicator was income with a Beta value of 0.699. Also, respondents had a better output, income, and standard of living after utilization. Furthermore, calculated Z of mean of output (2.15), Z of mean of income (2.12), and Z of mean of standard of living (2.0) were greater than the critical value (Table value) of 1.96 at 5% level of probability and therefore the alternative hypothesis that utilization of screw press has significant effect on output, income, and standard of living of respondents was accepted. Conclusively, it was recommended among others that research, extension, and policy makers consider the significant determinants identified in the study seriously if increased utilization is to be achieved by cassava processors and others similar to them in the study area and the region. URI: http://bsuir.bsum.edu.ng:8080/jspui/handle/11409/527 Appears in Collections: Sociology ADEGBOLA THESIS.pdf 64.83 MB Adobe PDF View/Open
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
532
[ 128000, 25584, 361, 3314, 3907, 98984, 27475, 198, 25584, 361, 3314, 3907, 98984, 27475, 6235, 95767, 315, 9983, 10170, 6235, 50, 2168, 2508, 6235, 5618, 1005, 420, 13110, 311, 39396, 477, 2723, 311, 420, 1537, 25, 1795, 1129, 1302, 21581, 960, 1264, 12871, 44007, 25, 11770, 15, 4537, 2203, 2005, 7682, 3397, 14, 8011, 2545, 14, 22369, 198, 3936, 25, 38750, 3895, 13737, 5910, 52893, 59643, 10022, 2006, 6254, 52, 16624, 1753, 69207, 50125, 3083, 93523, 7683, 94252, 74919, 88634, 52532, 4716, 480, 16412, 5421, 48646, 2006, 735, 46558, 32, 23233, 11, 452, 1953, 643, 5987, 198, 58990, 25, 362, 1170, 5494, 91121, 11, 362, 84682, 3097, 46, 622, 1741, 21257, 198, 44942, 25, 38750, 3895, 13737, 5910, 52893, 59643, 10022, 11, 69207, 50125, 3083, 93523, 7683, 94252 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 25584, 361, 3314, 3907, 98984, 27475, 198, 25584, 361, 3314, 3907, 98984, 27475, 6235, 95767, 315, 9983, 10170, 6235, 50, 2168, 2508, 6235, 5618, 1005, 420, 13110, 311, 39396, 477, 2723, 311, 420, 1537, 25, 1795, 1129, 1302, 21581, 960, 1264, 12871, 44007, 25, 11770, 15, 4537, 2203, 2005, 7682, 3397, 14, 8011, 2545, 14, 22369, 198, 3936, 25, 38750, 3895, 13737, 5910, 52893, 59643, 10022, 2006, 6254, 52, 16624, 1753, 69207, 50125, 3083, 93523, 7683, 94252, 74919, 88634, 52532, 4716, 480, 16412, 5421, 48646, 2006, 735, 46558, 32, 23233, 11, 452, 1953, 643, 5987, 198, 58990, 25, 362, 1170, 5494, 91121, 11, 362, 84682, 3097, 46, 622, 1741, 21257, 198, 44942, 25, 38750, 3895, 13737, 5910, 52893, 59643, 10022, 11, 69207, 50125, 3083, 93523, 7683, 94252, -100 ]
A wag once said to me 'there are three religions in Nepal; Hinduism, Buddhism and Tourism'. In the immediate aftermath of the Earthquake the first two gave solace in the face of disaster. Now it is the turn of the latter to give hope, and much needed tourism-dollars, to fund the longer term rebuild. To make the case for 'destination Nepal', here is a collection of pictures from photographer Anton Jankovoy who is a much-needed friend of this mysterious land nestled in the Himalayas. The captions tell you where you can visit, but these stunning images really demonstrate WHY you should visit Nepal.. All images on this gallery are copyright of Anton Jankovoy, and were taken from an original Facebook gallery here.
{ "redpajama_set_name": "RedPajamaC4" }
4,181
[ 128000, 32, 65425, 3131, 1071, 311, 757, 364, 19041, 527, 2380, 44230, 304, 50064, 26, 36142, 2191, 11, 61324, 323, 52652, 4527, 763, 279, 14247, 40696, 315, 279, 9420, 67818, 279, 1176, 1403, 6688, 2092, 580, 304, 279, 3663, 315, 21426, 13, 4800, 433, 374, 279, 2543, 315, 279, 15629, 311, 3041, 3987, 11, 323, 1790, 4460, 32083, 1773, 980, 1590, 11, 311, 3887, 279, 5129, 4751, 32593, 627, 1271, 1304, 279, 1162, 369, 364, 18481, 50064, 518, 1618, 374, 264, 4526, 315, 9364, 505, 29867, 17958, 622, 1201, 869, 2303, 889, 374, 264, 1790, 69875, 4333, 315, 420, 26454, 4363, 89777, 304, 279, 76438, 98440, 13, 578, 78888, 3371, 499, 1405, 499, 649, 4034, 11, 719, 1521, 20441, 5448, 2216, 20461, 82794, 499, 1288, 4034, 50064, 35047 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 32, 65425, 3131, 1071, 311, 757, 364, 19041, 527, 2380, 44230, 304, 50064, 26, 36142, 2191, 11, 61324, 323, 52652, 4527, 763, 279, 14247, 40696, 315, 279, 9420, 67818, 279, 1176, 1403, 6688, 2092, 580, 304, 279, 3663, 315, 21426, 13, 4800, 433, 374, 279, 2543, 315, 279, 15629, 311, 3041, 3987, 11, 323, 1790, 4460, 32083, 1773, 980, 1590, 11, 311, 3887, 279, 5129, 4751, 32593, 627, 1271, 1304, 279, 1162, 369, 364, 18481, 50064, 518, 1618, 374, 264, 4526, 315, 9364, 505, 29867, 17958, 622, 1201, 869, 2303, 889, 374, 264, 1790, 69875, 4333, 315, 420, 26454, 4363, 89777, 304, 279, 76438, 98440, 13, 578, 78888, 3371, 499, 1405, 499, 649, 4034, 11, 719, 1521, 20441, 5448, 2216, 20461, 82794, 499, 1288, 4034, 50064, 35047, -100 ]
Kendži Mijazawa (宮沢 賢治 nebo 宮澤 賢治 Miyazawa Kenji, * 27. srpen 1896) byl japonský básník a autor dětské literatury, pocházející z města Hanamaki v prefektuře Iwate. Byl také učitelem zemědělských věd, vegetariánem, cellistou, oddaným buddhistou a utopickým společenským aktivistou. Jeho nejznámějšími díly jsou Ginga Tecudó no Joru (Noc na trati Mléčné dráhy), Kaze no Matasaburo (Větrný Matasaburó), Sero hiki Góšu (Cellista Goš), Futago no hoši (Hvězdy dvojčata) a Cučigami to kicune (Božstvo země a liška). Po přečtení Lotosové sútry Kendži konvertoval k Ničirenovskému buddhismu a vstoupil do Kokučúkai, nacionalistické organizace ničirenovského buddhismu. Jeho víra a sociální postoje způsobily odtržení od jeho zámožné rodiny a obzvláště od jeho otce. Přesto, nedlouho po jeho smrti, jeho rodina k ničirenovskému buddhismu konvertovala také. Založil Rasu čidžin kjókai (Asociace farmářů Rasu, 羅須地人協会), aby zlepšil situaci rolníků v prefektuře Iwate. Ovládal jazyk esperanto a do tohoto jazyka také přeložil několik svých básní. V roce 1933 zemřel na pneumonii. Jako básník byl za svého života téměř neznámý a slavným se stal až posmrtně. Velký zájem o jeho dílo se projevil v polovině 90. let. V roce 1982 bylo v jeho rodném městě otevřeno muzeum věnované jeho životu a dílu. Mnoho jeho příběhů pro děti bylo zadaptováno jako anime. Mnoho jeho básní tanka a básní volného verše, které byly přeloženy do mnoha jazyků, je populárních dodnes. Život Narodil se ve městě Hanamaki, v prefektuře Iwate, jakožto nejstarší syn z bohaté rodiny majitelů zastavárny. Rodiče byli oddanými věřícími sekty Čisté země, jak bylo zvykem mezi farmáři v této oblasti. Od roku 1898 jeho otec organizoval pravidelné schůze v místě, kde kázali mnichové a buddhističtí myslitelé a Kendži se svojí mladší sestrou se těchto schůzek účastnili již od útlého věku. Oblast jeho mládí byla zchudlým rýžovým regionem a on vyrůstal v obavách své rodiny o sociální status a toho jak vydělat peníze. Od mládí byl nadšeným studentem přírodovědy. Jako náctiletý v sobě objevil zájem o poezii, když se dostal pod vliv místního básníka Takubokua Išikawy. Poté, co dokončil nižší střední školu, pomáhal v otcově zastavárně. V roce 1918 skládal básně typu tanka a měl již napsané dva příběhy pro děti. Na vyšší střední, poté co přečetl Lotosovou sútru, konvertoval k sektě Hokke, což mu v budoucnu způsobilo rozepře s otcem. Roku 1918 vychodil Vysokou školu zemědělskou a lesnickou v Morioce (盛岡高等農林学校 Morioka Kōtō Nōrin Gakkō, dnes fakulta agrikultury na univerzitě v Iwate). Toho roku se také stal vegetariánem. Jelikož byl bystrým studentem, získal pozici speciálního výzkumného studenta geologie. Začal se zajímat o výzkum půdy a umělých hnojiv. Později v tomto roce se jel s matkou podívat do Tokia za svou sestrou Toši, která onemocněla, zatímco studovala na Japonské ženské univerzitě (日本女子大学 Nihon džoši daigaku). Domů se navrátil poté, co se jeho sestra na začátku následujícího roku uzdravila. Kvůli svým rozdílným náboženským názorům a nechuti k rodinnému podnikání v zastavárně se v lednu 1921 rozhodl opustit Hanamaki a vydal se do Tokia. Zde se připojil k organizaci Kikučúkai Tanaky Čigakua a několik měsíců strávil kázaním ničirenovského buddhismu na ulicích. Po osmi měsících v Tokiu se znovu pustil do psaní příběhů pro děti, tentokrát velice plodně, jelikož byl ovlivněn dalším mnichem Takačijo Čijóem, který ho odradil od kněžství a přesvědčil ho, že jeho víra poslouží nejlépe pokud se ji pokusí promítnout do své profese. Poté se, kvůli obnovení nemoci jeho sestry, vrátil zpět do Hanamaki a stal se zde učitelem na zemědělské škole. 27. listopadu 1922 jeho sestra Toši podlehla své nemoci ve věku 24 let. Ztráta milované sestry byla pro Kendžiho šokem, ze kterého se nikdy plně nevzpamatoval. V den její smrti složil tři básně se souhrnným názvem Musei Dókoku (無声慟哭). Pracoval jako učitel zemědělských věd na Vyšší střední zemědělské škole v Hanamaki (花巻農学校). Díky půjčkám a podpoře od výrobce nattó mohl v dubnu 1924 vydat sbírku poezie nazvanou Haru to šura (Jaro a démon, 春と修羅). V prosinci toho samého roku také vlastním nákladem vydal svou sbírku dětských příběhů Čúmon no ói rjóriten (Hostinec mnoha objednávek, 注文の多い料理店). Přestože se ani jedné z nich nedostalo většího komerčního úspěchu - byly převážně ignorovány – získaly si pozornost básníků Kótaróa Takamury a Šinpeje Kusana, kteří jeho dílo obdivovali a představili ho literárnímu světu. Jako učitele ho studenti vnímali jako velmi nadšeného, i když lehce podivínského, jelikož si stál za tím, že je nejlepší učit se přímými zkušenostmi. Často bral studenty mimo školu, ne kvůli zácviku nebo praxi, ale jen kvůli příjemným vycházkám do hor a na pole. Také po nich chtěl, aby hráli divadelní představení, která si sami napíší. V roce 1926 se vzdal svého postu učitele a stal se farmářem, aby mohl svými teoretickými znalostmi zemědělských věd pomáhat ostatním farmářům ve zchudlém severovýchodním regionu. Ostatní farmáře také seznámil se základy kulturního života jako jsou například hudba, poezie a vše ostatní, o čem si myslel, že by mohlo zlepšit jejich životy. Pomocí svého gramofonu je obeznámil s klasickou hudbou přehráváním skladeb Beethovena, Schuberta, Wagnera a Debussyho. V srpnu 1926 založil Rasu čidžin kjókai (Asociace farmářů Rasu, 羅須地人協会). Zavedl nové zemědělské techniky a odolnější zrna rýže. V odlehlém domě své rodiny, kde tou dobou pobýval, vyučoval agronomii mladíky z blízkých farmářských rodin. Rasu čidžin kjókai se také podílela na literárních přednesech, divadelních hrách, hudbě a ostatních kulturních událostech. Byla rozpuštěna po dvou letech, v roce 1928, kdy se Japonsko začalo obracet k militarismu. Ale ne všichni farmáři jeho snahy oceňovali. Brali ho jako člověka z města, který si na farmáře spíše jen hraje, případně si někteří stěžovali, že Kendžiho hnojiva nemají požadovaný efekt. Kendži byl zastáncem přírodních hnojiv, zatímco mnozí dávali přednost západním chemickým zázrakům, a i v případě kdy zklamaly, mnozí z toho stále vinili Kendžiho. Sympatie mu také mohl ubírat fakt, že byl stále částečně ekonomicky závislý na svém otci, kterému se mnoho farmářů zadlužilo v případě špatné úrody. Zatímco jeho zběhnutí k Lotosové sektě sypalo další sůl do rány, jelikož farmáři v této oblasti, stejně jako jeho otec, byli přívrženci Sekty čisté země. V roce 1926 se naučil esperanto a pokusil se do něj přeložit několik svých japonských básní. Tyto překlady byly publikovány roku 1953, dlouho po jeho smrti. Projevoval jen pramalý zájem o lásku nebo sex, ať už v osobním životě nebo v literárním díle. Kendžiho blízký přítel Tokuja Seki o něm napsal, že zemřel jako panic. Nemoc a smrt Kendži onemocněl v létě roku 1928 a na konci roku se toto onemocnění rozvinulo v akutní pneumonii. Jeho striktní vegetariánství mu neumožnilo příjem výživově hodnotnější stravy, která byla potřebná kvůli jeho zhoršujícímu se zdraví. Mnoho let trpěl zánětem pohrudnice, což ho mnohdy zneschopnilo na řadu měsíců. Jeho zdraví se víceméně zlepšilo dostatečně na to, aby mohl provozovat konzultační práce v kamenolomu v roce 1931. Zlepšení bylo ale pouze kratičké, již v září toho roku při návštěvě Tokia se mu pneumonie znovu vrátila a musel se vrátit do svého rodného města. Na podzim 1933 se jeho nemoc zdánlivě zlepšila dostatečně na to, aby mohl ze dveří svého domu pozorovat místní šintoistický průvod. Toho využila skupinka místních farmářů a zapředla s ním hodinovou debatu o hnojivech. Zřejmě kvůli vyčerpání z dlouhého rozhovoru s farmáři Kendži následující den zemřel. Na smrtelné posteli ještě svého otce požádal, aby vytiskl a rozdal tisíc kopií Lotosové sútry. Byl rodinou pohřben v rodinné svatyni Andžódži, ale poté, kdy v roce 1951 rodina konvertovala k ničirenovskému buddhismu, přesunuli jeho ostatky do ničirenského chrámu Šinšódži. Odkazy Externí odkazy Reference Literatura WINKELHÖFEROVÁ, Vlasta. Slovník japonské literatury. Praha: Libri, 2008. . Japonští básníci Japonští spisovatelé Narození 27. srpna Narození v roce 1896 Narození v prefektuře Iwate Úmrtí 21. září Úmrtí v roce 1933 Úmrtí v prefektuře Iwate Zemřelí na zápal plic Muži Japonští vědci 20. století
{ "redpajama_set_name": "RedPajamaWikipedia" }
346
[ 128000, 42, 408, 106485, 386, 3251, 1394, 14406, 320, 106496, 111338, 110124, 95, 71005, 100872, 125677, 119506, 110124, 95, 71005, 67559, 1394, 14406, 14594, 7910, 11, 353, 220, 1544, 13, 19499, 2821, 220, 9378, 21, 8, 101302, 503, 26862, 111489, 81451, 103487, 264, 27865, 103579, 2641, 103770, 7080, 2693, 88, 11, 3273, 331, 1995, 46894, 122703, 1167, 108015, 21296, 309, 14966, 348, 19257, 17588, 84, 100871, 358, 86, 349, 13, 116874, 101969, 112121, 635, 3516, 108407, 101390, 4835, 127777, 116151, 11, 13294, 2850, 11644, 336, 11, 2849, 380, 283, 11, 10535, 276, 100434, 24385, 21843, 283, 264, 8791, 454, 111929, 102409, 729, 74, 100434, 50283, 380, 283, 382, 41, 2701, 78, 100884, 107583, 109291, 8318, 102503, 398, 101062, 75846, 64, 93587, 664, 1832, 912, 622, 66105, 320, 45 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 42, 408, 106485, 386, 3251, 1394, 14406, 320, 106496, 111338, 110124, 95, 71005, 100872, 125677, 119506, 110124, 95, 71005, 67559, 1394, 14406, 14594, 7910, 11, 353, 220, 1544, 13, 19499, 2821, 220, 9378, 21, 8, 101302, 503, 26862, 111489, 81451, 103487, 264, 27865, 103579, 2641, 103770, 7080, 2693, 88, 11, 3273, 331, 1995, 46894, 122703, 1167, 108015, 21296, 309, 14966, 348, 19257, 17588, 84, 100871, 358, 86, 349, 13, 116874, 101969, 112121, 635, 3516, 108407, 101390, 4835, 127777, 116151, 11, 13294, 2850, 11644, 336, 11, 2849, 380, 283, 11, 10535, 276, 100434, 24385, 21843, 283, 264, 8791, 454, 111929, 102409, 729, 74, 100434, 50283, 380, 283, 382, 41, 2701, 78, 100884, 107583, 109291, 8318, 102503, 398, 101062, 75846, 64, 93587, 664, 1832, 912, 622, 66105, 320, 45, -100 ]
<?php $valid_extensions = array('jpeg', 'jpg', 'png', 'gif', 'bmp'); // valid extensions $path = 'uploads/'; // upload directory if(isset($_FILES['image'])) { $img = $_FILES['image']['name']; $tmp = $_FILES['image']['tmp_name']; // get uploaded file's extension $ext = strtolower(pathinfo($img, PATHINFO_EXTENSION)); // can upload same image using rand function //$final_image = 'adi'.$img; $extension=end(explode(".", $ext)); $newfilename=$_POST['idi']; // check's valid format if(in_array($ext, $valid_extensions)) { $path = 'uploads/' .$newfilename; if(move_uploaded_file($tmp,$path )) { echo "<img src='$path' />"; } } else { echo 'invalid'; } } ?>
{ "redpajama_set_name": "RedPajamaGithub" }
9,538
[ 128000, 1340, 1230, 271, 3, 1930, 61598, 284, 1358, 493, 32021, 518, 364, 18458, 518, 364, 14395, 518, 364, 34286, 518, 364, 53796, 4772, 443, 2764, 20300, 198, 74049, 284, 364, 19936, 14, 7112, 443, 8298, 6352, 271, 333, 11580, 4104, 20821, 681, 1843, 20084, 517, 197, 85520, 284, 3401, 20821, 681, 1843, 4274, 609, 3945, 197, 66399, 284, 3401, 20821, 681, 1843, 4274, 5284, 1292, 3945, 2451, 197, 322, 636, 23700, 1052, 596, 9070, 198, 197, 3, 428, 284, 39914, 5698, 2801, 703, 1931, 11, 27871, 6775, 38112, 1125, 1602, 197, 322, 649, 8298, 1890, 2217, 1701, 10598, 734, 198, 197, 21207, 12085, 5060, 284, 364, 2836, 7622, 1931, 401, 3, 12709, 62621, 5580, 71844, 65317, 400, 428, 1125, 46984, 8570, 17682, 3019, 681, 12558, 663, 5322 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 1340, 1230, 271, 3, 1930, 61598, 284, 1358, 493, 32021, 518, 364, 18458, 518, 364, 14395, 518, 364, 34286, 518, 364, 53796, 4772, 443, 2764, 20300, 198, 74049, 284, 364, 19936, 14, 7112, 443, 8298, 6352, 271, 333, 11580, 4104, 20821, 681, 1843, 20084, 517, 197, 85520, 284, 3401, 20821, 681, 1843, 4274, 609, 3945, 197, 66399, 284, 3401, 20821, 681, 1843, 4274, 5284, 1292, 3945, 2451, 197, 322, 636, 23700, 1052, 596, 9070, 198, 197, 3, 428, 284, 39914, 5698, 2801, 703, 1931, 11, 27871, 6775, 38112, 1125, 1602, 197, 322, 649, 8298, 1890, 2217, 1701, 10598, 734, 198, 197, 21207, 12085, 5060, 284, 364, 2836, 7622, 1931, 401, 3, 12709, 62621, 5580, 71844, 65317, 400, 428, 1125, 46984, 8570, 17682, 3019, 681, 12558, 663, 5322, -100 ]
(function() { module.exports = { engines: {}, engine: function(extension) { var _base; extension = extension.replace(/^\./, ''); return (_base = this.engines)[extension] || (_base[extension] = (function() { switch (extension) { case "styl": case "stylus": return "stylus"; case "jade": return "jade"; case "eco": return "eco"; case "haml": return "haml"; case "hamlc": return "hamlcoffee"; case "ejs": return "ejs"; case "coffee": case "coffeescript": case "coffee-script": return "coffee"; case "less": return "less"; case "mu": case "mustache": return "mustache"; case "hbs": case "handlebars": return "handlebars"; case "md": case "mkd": case "markdown": case "mdown": return "markdown"; } })()); }, enginesFor: function(path) { var engine, engines, extension, extensions, _i, _len; engines = []; extensions = path.split("/"); extensions = extensions[extensions.length - 1]; extensions = extensions.split(".").slice(1); for (_i = 0, _len = extensions.length; _i < _len; _i++) { extension = extensions[_i]; engine = this.engine(extension); if (engine) { engines.push(engine); } } return engines; }, render: function(options, callback) { var engines, iterate, path, string, _this = this; path = options.path; string = options.string || require('fs').readFileSync(path, 'utf-8'); engines = options.engines || this.enginesFor(path); iterate = function(engine, next) { return _this[engine](string, options, function(error, output) { if (error) { return next(error); } else { string = output; return next(); } }); }; return this._async(engines, iterate, function(error) { return callback.call(_this, error, string); }); }, compile: function(options, callback) { var engine, result, template; engine = require(options.engine === 'haml' ? 'hamljs' : options.engine); template = options.template || options.content; result = engine.compile(template); return result; }, stylus: function(content, options, callback) { var engine, path, preprocessor, result, _this = this; result = ""; path = options.path; preprocessor = options.preprocessor || this.stylus.preprocessor; if (preprocessor) { content = preprocessor.call(this, content, options); } engine = require('stylus'); engine.render(content, options, function(error, data) { result = data; if (error && path) { error.message = error.message.replace(/\n$/, ", " + path + "\n"); } if (callback) { return callback.call(_this, error, result); } }); return result; }, jade: function(content, options, callback) { var path, preprocessor, result, _this = this; result = ""; path = options.path; preprocessor = options.preprocessor || this.jade.preprocessor; if (preprocessor) { content = preprocessor.call(this, content, options); } require("jade").render(content, options, function(error, data) { result = data; if (error && path) { error.message += ", " + path; } if (callback) { return callback.call(_this, error, result); } }); return result; }, haml: function(content, options, callback) { var result; result = require('hamljs').render(content, options || {}); if (callback) { callback.call(this, null, result); } return result; }, hamlcoffee: function(content, options, callback) { var result; result = require('haml-coffee').compile(content, options || {})(options.locals); if (callback) { callback.call(this, null, result); } return result; }, ejs: function(content, options, callback) { var error, result; result = ""; error = null; try { result = require("ejs").render(content, options); } catch (e) { error = e; result = null; } if (callback) { callback.call(this, error, result); } return result; }, eco: function(content, options, callback) { var result; result = require("eco").render(content, options.locals); if (callback) { callback.call(this, null, result); } return result; }, coffee: function(content, options, callback) { var error, path, preprocessor, result; result = ""; path = options.path; if (!options.hasOwnProperty("bare")) { options.bare = true; } preprocessor = options.preprocessor || this.coffee.preprocessor; if (preprocessor) { content = preprocessor.call(this, content, options); } try { result = require("coffee-script").compile(content, options); } catch (e) { result = null; error = e; if (path) { error.message += ", " + path; } } if (callback) { callback.call(this, error, result); } return result; }, coffeekup: function(content, options, callback) { var result; result = require("coffeekup").render(content, options); if (callback) { callback.call(this, null, result); } return result; }, less: function(content, options, callback) { var engine, parser, path, result, _this = this; result = ""; path = options.path; options.filename = path; options.paths || (options.paths = []); options.paths = ["."].concat(options.paths); engine = require("less"); parser = new engine.Parser(options); try { parser.parse(content, function(error, tree) { var message; if (error) { if (path) { error.message += ", " + path; } } else { try { result = tree.toCSS(); } catch (e) { error = e; } } if (error) { message = error.message + ", " + path; } if (callback) { return callback.call(_this, message, result); } }); } catch (error) { callback.call(this, error.message += ", " + path, ""); } return result; }, mustache: function(content, options, callback) { var error, path, preprocessor, result; path = options.path; error = null; preprocessor = options.preprocessor || this.constructor.preprocessor; if (preprocessor) { content = preprocessor.call(this, content, options); } try { result = require("mustache").to_html(content, options.locals); } catch (e) { error = e; result = null; if (path) { error.message += ", " + path; } } if (callback) { callback.call(this, error, result); } return result; }, handlebars: function(content, options, callback) { var error, result; error = null; try { result = require("handlebars").compile(content)(options.locals || {}); } catch (e) { error = e; } if (callback) { return callback.call(this, error, result); } }, markdown: function(content, options, callback) { var error, preprocessor, result; error = null; preprocessor = options.preprocessor || this.constructor.preprocessor; if (preprocessor) { content = preprocessor.call(this, content, options); } try { result = require("markdown").parse(content); } catch (e) { error = e; } if (callback) { callback.call(this, error, result); } return result; }, yui: function(content, options, callback) { var error, path, result; path = options.path; error = null; try { result = require("./vendor/cssmin").cssmin(content); } catch (e) { error = e; if (path) { error.message += ", " + path; } } if (callback) { callback.call(this, error, result); } return result; }, cleanCSS: function(content, options, callback) { var error, path, result; path = options.path; error = null; try { result = require("clean-css").process(content); } catch (e) { error = e; if (path) { error.message += ", " + path; } } if (callback) { callback.call(this, error, result); } return result; }, uglifyjs: function(content, options, callback) { var ast, compressor, error, parser, path, result; path = options.path; error = null; parser = require("uglify-js").parser; compressor = require("uglify-js").uglify; try { ast = parser.parse(content); ast = compressor.ast_mangle(ast); ast = compressor.ast_squeeze(ast); result = compressor.gen_code(ast); } catch (e) { error = e; if (path) { error.message += ", " + path; } } if (callback) { callback.call(this, error, result); } return result; }, _async: function(array, iterator, callback) { var completed, iterate; if (!array.length) { return callback(); } completed = 0; iterate = function() { return iterator(array[completed], function(error) { if (error) { callback(error); return callback = function() {}; } else { completed += 1; if (completed === array.length) { return callback(); } else { return iterate(); } } }); }; return iterate(); } }; }).call(this);
{ "redpajama_set_name": "RedPajamaGithub" }
6,364
[ 128000, 2993, 368, 1504, 220, 4793, 7587, 284, 341, 262, 21787, 25, 14915, 262, 4817, 25, 734, 76823, 8, 341, 415, 767, 721, 3231, 280, 415, 9070, 284, 9070, 7125, 92989, 1761, 11, 26315, 415, 471, 5570, 3231, 284, 420, 91513, 1572, 6758, 12709, 60, 1393, 5570, 3231, 58, 12709, 60, 284, 320, 1723, 368, 341, 286, 3480, 320, 12709, 8, 341, 692, 1162, 330, 86688, 4764, 692, 1162, 330, 86688, 355, 4764, 310, 471, 330, 86688, 355, 886, 692, 1162, 330, 73, 1037, 4764, 310, 471, 330, 73, 1037, 886, 692, 1162, 330, 55397, 4764, 310, 471, 330, 55397, 886, 692, 1162, 330, 5721, 75, 4764, 310, 471, 330, 5721, 75, 886, 692, 1162, 330, 5721, 17704, 4764, 310, 471, 330, 5721, 75, 79217, 886, 692, 1162 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 2993, 368, 1504, 220, 4793, 7587, 284, 341, 262, 21787, 25, 14915, 262, 4817, 25, 734, 76823, 8, 341, 415, 767, 721, 3231, 280, 415, 9070, 284, 9070, 7125, 92989, 1761, 11, 26315, 415, 471, 5570, 3231, 284, 420, 91513, 1572, 6758, 12709, 60, 1393, 5570, 3231, 58, 12709, 60, 284, 320, 1723, 368, 341, 286, 3480, 320, 12709, 8, 341, 692, 1162, 330, 86688, 4764, 692, 1162, 330, 86688, 355, 4764, 310, 471, 330, 86688, 355, 886, 692, 1162, 330, 73, 1037, 4764, 310, 471, 330, 73, 1037, 886, 692, 1162, 330, 55397, 4764, 310, 471, 330, 55397, 886, 692, 1162, 330, 5721, 75, 4764, 310, 471, 330, 5721, 75, 886, 692, 1162, 330, 5721, 17704, 4764, 310, 471, 330, 5721, 75, 79217, 886, 692, 1162, -100 ]
Mandela's Grandson to Honor Ahed Tamimi with Award for Her Bravery in Resisting Israeli Oppression August 8, 2018 August 8, 2018 by Edward Morgan "Ahed' like most Palestinian youth living under occupation' are fearless in their protest against the occupation and witness daily how their parents are humiliated and stripped of their dignity at the hands of the IDF. " — Zwelivelile Mandela, Nelson Mandela's grandson by Whitney Webb CAPE TOWN, SOUTH AFRICA — After her release from an Israeli prison on Sunday, renowned Palestinian teen-activist Ahed Tamimi has been invited to South Africa to receive an award honoring the 17-year-old for her bravery and continued resistance to the Israeli military occupation of Palestine's West Bank. The award was announced by Zwelivelile "Mandla" Mandela, chief of the Mvezo Traditional Council and the grandson of Nelson Mandela. Mandela, speaking during celebrations marking the 100th anniversary of his grandfather's birth, hailed Tamimi as a "symbol of Palestinian resistance" and doubled down on his commitment to "continue to support and rally others to join in the Boycott, Divestment and Sanctions (BDS) campaign to isolate Apartheid Israel until Palestine is free." Mandela has advocated for Tamimi in the past, such as when he wrote to South African President Cyril Ramaphosa following the Palestinian youth's arrest last December. In that letter, Mandela stated: Ahed' like most Palestinian youth living under occupation' are fearless in their protest against the occupation and witness daily how their parents are humiliated and stripped of their dignity at the hands of the IDF. They also see first-hand how innocent children — often innocent bystanders — are bullied' brutalised and beaten." "Now Ahed needs us to stand up for her. We demand that Ahed and all Palestinian children are released from Israeli prisons now," Mandela continued, adding that "These children are our children just as their struggle is our struggle." Mandela has also worked to bring attention to the plight of Palestinian child-prisoners kept in Israeli jails. Current estimates by the Addameer prisoner support group suggest that, of the approximately 5,900 Palestinian political prisoners currently being held in Israeli jails, 291 are children. Considering Mandela's rhetoric and the nature of Tamimi's activism, it seems doubtful that Israel's government would grant her permission to travel to accept the award, given that even Israeli media has called the teen "Israel's ongoing PR disaster." However, Israel's government has given the young activist permission to leave the country in the past, as Tamimi did visit South Africa last year prior to her arrest. Her visit was part of the Shamsaan Pals4Peace tour, a South African initiative hosted by several local Palestinian solidarity organizations. During her time there, Tamimi spoke of Mandela and other resistance icons, stating that she didn't "want to copy Mandela or Ghandi," but instead wanted "to learn from them how to liberate us." Notably, in addition to Zwelivelile Mandela's promise of an award in her honor, Tamimi has also been nominated for the Tipperary Peace Award for her activism. Top Photo | Zwelivelile "Mandla" Mandela speaks outside Parliament during a protest in Cape Town, South Africa against increased Israeli "security" measures at the Al-Aqsa Mosque in Jerusalem, July 26, 2017. Ashraf Hendricks | GroundUp Whitney Webb is a staff writer for MintPress News and a contributor to Ben Swann's Truth in Media. Her work has appeared on Global Research, the Ron Paul Institute and 21st Century Wire, among others. She has also made radio and TV appearances on RT and Sputnik. She currently lives with her family in southern Chile. Categories Awakening, Consciousness, Disclosure, Education, Full Disclosure, Illuminati, Jesuits, Leadership Articles, News, Newsletters, NWO, Teachings, Truth Post navigation According To The "Buffett Indicator", The Stock Market Is More Primed For A Crash Than It Has Ever Been Before
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
8,596
[ 128000, 44, 438, 8458, 596, 10517, 942, 311, 43044, 16770, 291, 29988, 25877, 449, 17768, 369, 6385, 3320, 25727, 304, 1838, 11330, 16286, 29710, 11433, 198, 32559, 220, 23, 11, 220, 679, 23, 6287, 220, 23, 11, 220, 679, 23, 555, 22653, 23809, 198, 1, 25797, 291, 6, 1093, 1455, 22596, 12822, 5496, 1234, 30747, 6, 527, 93111, 304, 872, 8835, 2403, 279, 30747, 323, 11550, 7446, 1268, 872, 6699, 527, 2854, 54873, 323, 37779, 315, 872, 38929, 520, 279, 6206, 315, 279, 72655, 13, 330, 2001, 64265, 301, 21169, 458, 88430, 11, 27562, 88430, 596, 66955, 198, 1729, 67197, 55488, 198, 61992, 350, 7736, 11, 80715, 362, 10725, 32101, 2001, 4740, 1077, 4984, 505, 459, 16286, 9527, 389, 7418, 11, 37048, 22596, 9562, 12, 9035, 380, 16770 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 44, 438, 8458, 596, 10517, 942, 311, 43044, 16770, 291, 29988, 25877, 449, 17768, 369, 6385, 3320, 25727, 304, 1838, 11330, 16286, 29710, 11433, 198, 32559, 220, 23, 11, 220, 679, 23, 6287, 220, 23, 11, 220, 679, 23, 555, 22653, 23809, 198, 1, 25797, 291, 6, 1093, 1455, 22596, 12822, 5496, 1234, 30747, 6, 527, 93111, 304, 872, 8835, 2403, 279, 30747, 323, 11550, 7446, 1268, 872, 6699, 527, 2854, 54873, 323, 37779, 315, 872, 38929, 520, 279, 6206, 315, 279, 72655, 13, 330, 2001, 64265, 301, 21169, 458, 88430, 11, 27562, 88430, 596, 66955, 198, 1729, 67197, 55488, 198, 61992, 350, 7736, 11, 80715, 362, 10725, 32101, 2001, 4740, 1077, 4984, 505, 459, 16286, 9527, 389, 7418, 11, 37048, 22596, 9562, 12, 9035, 380, 16770, -100 ]
Congress to probe Trump's wiretap claim Capitol Hillbillies, FUBAR, News, White House Supporters of President Donald Trump gather outside Mar-a-Lago, Saturday, March 4, 2017, in Palm Beach, Fla. (AP Photo/Alex Brandon) Key members of Congress say they will honor President Donald Trump's request to investigate his unsubstantiated claim that Barack Obama overstepped his authority as president and had Trump's telephones tapped during the election campaign. A U.S. official said the FBI has asked the Justice Department to dispute Trump's allegation, though no such statement has been issued. Obama's intelligence director also said no such action was ever carried out. Trump's startling claim of presidential abuse of power, made without evidence in a series of tweets early Saturday, capped a week in which the positive reaction to his address to Congress quickly evaporated amid the swirl of allegations — and revelations — about contacts between Trump aides and Russia's ambassador to the U.S., both during and after a presidential election Russia is believed to have meddled in. Trump is said to be frustrated by his senior advisers' inability to tamp down the Russia issue. Compounding the situation was the revelation last week that former U.S. senator and now Attorney General Jeff Sessions, an early Trump campaign supporter, had met twice with the Russian official but didn't disclose that to lawmakers when he was asked about it during his Senate confirmation hearing. Separately, an Indiana newspaper reported that Vice President Mike Pence used personal email to conduct state business when he was governor of Indiana. The revelation recalled the use of personal email by Trump's 2016 opponent, Hillary Clinton, when she was secretary of state. The issue dogged Clinton for most of the presidential campaign. "It's sort of like getting nibbled to death by ducks," said Rutgers political science professor Ross Baker. The House and Senate intelligence committees, and the FBI, are investigating the contacts, and Trump demanded Sunday that they broaden the scope of their inquiries into Russian meddling in the 2016 election to include Obama's potential abuse of his executive powers. Senate Intelligence Committee Chairman Richard Burr, R-N.C., said in a statement that the panel "will follow the evidence where it leads, and we will continue to be guided by the intelligence and facts as we compile our findings." Rep. Devin Nunes, R-Calif., chairman of the House Intelligence Committee, said in a statement that the committee "will make inquiries into whether the government was conducting surveillance activities on any political party's campaign officials or surrogates." Trump's request carries some risk, particularly if the committees unearth damaging information about him or his associates. Committee Democrats will have access to the information and could wield anything negative against the president. Asking Congress to conduct a much broader investigation than originally envisioned also ensures the Russia issue will hang over the White House for months. Trump claimed in a series of unsubstantiated tweets Saturday that his predecessor had tried to undermine him by tapping the telephones at Trump Tower, the New York skyscraper where Trump based his campaign and transition operations, and maintains a home. Obama's director of national intelligence, James Clapper, said nothing matching Trump's claims had taken place. "Absolutely, I can deny it," said Clapper, who left government when Trump took office. Other Obama representatives also denied Trump's allegation, which the FBI has asked the Justice Department to dispute, a U.S. official told The Associated Press on Sunday. The official wasn't authorized to discuss the request by name and spoke on condition of anonymity. The department, however, has issued no such statement. DOJ spokeswoman Sarah Isgur Flores declined to comment Sunday, and an FBI spokesman also did not comment. The New York Times reported that senior American officials say FBI Director James Comey has argued that the Justice Department must correct the claim because it falsely insinuates that the FBI broke the law. White House press secretary Sean Spicer said Trump's instruction to Congress was based on "very troubling" reports "concerning potentially politically motivated investigations immediately ahead of the 2016 election." He did not elaborate. Spicer said the White House wants the congressional committees to "exercise their oversight authority to determine whether executive branch investigative powers were abused in 2016." He said there would be no further comment until the investigations are completed. Spicer's chief deputy, Sarah Huckabee Sanders, said she thinks Trump is "going off of information that he's seen that has led him to believe that this is a very real potential." Josh Earnest, who was Obama's White House press secretary, said presidents do not have authority to unilaterally order the wiretapping of American citizens, as Trump has alleged was done to him. FBI investigators and Justice Department officials must seek approval from a federal judge for such a step. Earnest accused Trump of leveling the allegation to distract from the attention being given to the Russia issue. Democrats on the House Judiciary Committee said they will ask the White House for details about reports of contacts between the White House and the Justice Department concerning the FBI's review of whether the Russian government unlawfully influenced the U.S. presidential election. Trump said in the tweets that he had "just found out" about being wiretapped. Unclear was whether he was referring to having learned through a briefing, a conversation or a media report. The president in the past has tweeted about unsubstantiated and provocative reports he reads on blogs or conservative websites. The tweets stood out, given the gravity of the charge and the sharp personal attack on the former president. Trump spoke as recently as last month about how much he likes Obama and how much they get along, despite their differences. "How low has President Obama gone to tapp my phones during the very sacred election process. This is Nixon/Watergate. Bad (or sick) guy!" he tweeted, misspelling 'tap.' Obama spokesman Kevin Lewis said a "cardinal rule" of the Obama administration was not to interfere in Justice Department investigations. Lewis said neither Obama nor any White House official had ever ordered surveillance on any U.S. citizen. "Any suggestion otherwise is simply false," Lewis said. Clapper appeared on NBC's "Meet the Press," and Sanders and Earnest were on ABC's "This Week." Associated Press writer Eric Tucker in Washington contributed to this report. Follow Darlene Superville at https://twitter.com/dsupervilleap Copyright © 2017 The Associated Press. All Rights Reserved 3 thoughts on "Congress to probe Trump's wiretap claim" Danny Adams And, oh look over here – more releases from Wikileaks! And ones that claim CIA officials pretended to be Russian hackers! Everybody pay attention to that now! Glenn Klotz He's obviously getting worried about Russiagate. Once his taxes are released it will be all over for him and he knows it. Dale Anderson Trump is angry because his staff didn't push back hard enough. He then wakes early Saturday morning and decides to literally show everyone exactly how it is done. End result? His administration gets deeper in the brown stuff they were hoping his speech to Congress would distance themselves from. One wonders if he spends his nights tossing and turning over these trivialities.
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
3,383
[ 128000, 65963, 311, 22477, 3420, 596, 9244, 31147, 3802, 198, 13199, 27094, 8270, 30742, 552, 11, 435, 4594, 946, 11, 5513, 11, 5929, 4783, 198, 8075, 388, 315, 4900, 9641, 3420, 9762, 4994, 2947, 7561, 8288, 6438, 11, 7884, 11, 5587, 220, 19, 11, 220, 679, 22, 11, 304, 33578, 13011, 11, 54297, 13, 320, 2599, 11064, 10576, 2635, 32866, 340, 1622, 3697, 315, 8151, 2019, 814, 690, 16044, 4900, 9641, 3420, 596, 1715, 311, 19874, 813, 80304, 4811, 10234, 3802, 430, 24448, 7250, 927, 5455, 7069, 813, 11447, 439, 4872, 323, 1047, 3420, 596, 8122, 17144, 49523, 2391, 279, 6355, 4901, 13, 362, 549, 815, 13, 4033, 1071, 279, 14160, 706, 4691, 279, 12007, 6011, 311, 26086, 3420, 596, 58494, 11, 3582, 912, 1778, 5224, 706, 1027 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 65963, 311, 22477, 3420, 596, 9244, 31147, 3802, 198, 13199, 27094, 8270, 30742, 552, 11, 435, 4594, 946, 11, 5513, 11, 5929, 4783, 198, 8075, 388, 315, 4900, 9641, 3420, 9762, 4994, 2947, 7561, 8288, 6438, 11, 7884, 11, 5587, 220, 19, 11, 220, 679, 22, 11, 304, 33578, 13011, 11, 54297, 13, 320, 2599, 11064, 10576, 2635, 32866, 340, 1622, 3697, 315, 8151, 2019, 814, 690, 16044, 4900, 9641, 3420, 596, 1715, 311, 19874, 813, 80304, 4811, 10234, 3802, 430, 24448, 7250, 927, 5455, 7069, 813, 11447, 439, 4872, 323, 1047, 3420, 596, 8122, 17144, 49523, 2391, 279, 6355, 4901, 13, 362, 549, 815, 13, 4033, 1071, 279, 14160, 706, 4691, 279, 12007, 6011, 311, 26086, 3420, 596, 58494, 11, 3582, 912, 1778, 5224, 706, 1027, -100 ]
Q: How to loop to import several csv files as different DataFrames and each of the imported DataFrames has its file name or at least part of it This is my first post. I want to loop or iterate in a directory to import each of the files as a separate DataFrame with a name similar (at least with the numeration) to the name of its file. After a lot of research I still do not know how to do it. Obviously I am a very beginner :-) My code is: Main_folder = os.getcwd() Folders = os.listdir('.') for file in Folders: data= pd.read_csv(file, sep="\t", header=0) data.columns=data.columns.str.strip() where for instance Folders is a list of files names including the file extension. e.g.: Folders=['01_load.TXT', '02_load.TXT', '03_load.TXT'] What I need is just to import all files to my work space such: Load_01=pd.read_csv('01_load.TXT', sep="\t", header=0) Load_02=pd.read_csv('02_load.TXT', sep="\t", header=0) but in a loop since I have many files. A: You can use a dictionary: data = {} for file in os.listdir('.'): data[file] = pd.read_csv(file, sep="\t", header=0) data[file].columns = data[file].columns.str.strip() Then you access each dataframe as a key of the dictionary, for example: data['01_load.TXT'] It is possible to set variable variable names and access them, but it's not adviced or a good practice. A: When create objects in a loop you can't give them explicit names. But, you can add them to a data structure that associates them with a relevant name. I would recommend a dictionary here. So, for example, you can do this: Folders=['01_load.TXT', '02_load.TXT', '03_load.TXT'] # These should be called filenames not folders but anyway. data_frames = {} # Initialise a dictionary for filename in Folders: df = pd.read_csv(filename, sep='\t', header=False) data_frames[filename] = df # Now you can access any of the dataframes by the filename by using the dictionary: # Let's say you want the df associated with 02_load.TXT df = data_frames['02_load.TXT'] print(df.head())
{ "redpajama_set_name": "RedPajamaStackExchange" }
4,505
[ 128000, 48, 25, 2650, 311, 6471, 311, 1179, 3892, 13448, 3626, 439, 2204, 2956, 35145, 323, 1855, 315, 279, 25973, 2956, 35145, 706, 1202, 1052, 836, 477, 520, 3325, 961, 315, 433, 1115, 374, 856, 1176, 1772, 13, 358, 1390, 311, 6471, 477, 30729, 304, 264, 6352, 311, 1179, 1855, 315, 279, 3626, 439, 264, 8821, 46886, 449, 264, 836, 4528, 320, 266, 3325, 449, 279, 8015, 367, 8, 311, 279, 836, 315, 1202, 1052, 627, 6153, 264, 2763, 315, 3495, 358, 2103, 656, 539, 1440, 1268, 311, 656, 433, 13, 36530, 358, 1097, 264, 1633, 50048, 92941, 720, 5159, 2082, 374, 512, 6334, 15626, 284, 220, 2709, 47574, 746, 93879, 284, 2709, 33576, 493, 49420, 2000, 1052, 304, 435, 33220, 512, 262, 828, 28, 7900, 4217, 14347 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 48, 25, 2650, 311, 6471, 311, 1179, 3892, 13448, 3626, 439, 2204, 2956, 35145, 323, 1855, 315, 279, 25973, 2956, 35145, 706, 1202, 1052, 836, 477, 520, 3325, 961, 315, 433, 1115, 374, 856, 1176, 1772, 13, 358, 1390, 311, 6471, 477, 30729, 304, 264, 6352, 311, 1179, 1855, 315, 279, 3626, 439, 264, 8821, 46886, 449, 264, 836, 4528, 320, 266, 3325, 449, 279, 8015, 367, 8, 311, 279, 836, 315, 1202, 1052, 627, 6153, 264, 2763, 315, 3495, 358, 2103, 656, 539, 1440, 1268, 311, 656, 433, 13, 36530, 358, 1097, 264, 1633, 50048, 92941, 720, 5159, 2082, 374, 512, 6334, 15626, 284, 220, 2709, 47574, 746, 93879, 284, 2709, 33576, 493, 49420, 2000, 1052, 304, 435, 33220, 512, 262, 828, 28, 7900, 4217, 14347, -100 ]
Extra control lysate for the AlphaLISA SureFire Ultra phospho-NFκB (Ser536) assay. These controls are already provided in the AlphaLISA SureFire Ultra phospho-NFκB assay kit, but can also be ordered separately. This control lysate is intended for use with the AlphaLISA SureFire Ultra phospho-NFκB p65 (Ser536) assay kit, or for use as a control for those running orthogonal or secondary assays along with the SureFire assay. This control lysate was prepared from HeLa cells, cultured to confluence in T175 flasks in 10% FBS containing medium for 3 days, then treated with 50 ng/mL TNFα and 20 ng/mL Calyculin A for 10 minutes and lysed in 10mL of 1X SureFire Ultra Lysis buffer.
{ "redpajama_set_name": "RedPajamaC4" }
8,365
[ 128000, 11873, 2585, 84495, 349, 369, 279, 25737, 43, 35301, 23371, 17111, 29313, 33088, 78, 11500, 37, 68437, 33, 320, 32845, 21600, 8, 65033, 13, 4314, 11835, 527, 2736, 3984, 304, 279, 25737, 43, 35301, 23371, 17111, 29313, 33088, 78, 11500, 37, 68437, 33, 65033, 16530, 11, 719, 649, 1101, 387, 11713, 26214, 627, 2028, 2585, 84495, 349, 374, 10825, 369, 1005, 449, 279, 25737, 43, 35301, 23371, 17111, 29313, 33088, 78, 11500, 37, 68437, 33, 281, 2397, 320, 32845, 21600, 8, 65033, 16530, 11, 477, 369, 1005, 439, 264, 2585, 369, 1884, 4401, 95680, 477, 14580, 99592, 3235, 449, 279, 23371, 17111, 65033, 13, 1115, 2585, 84495, 349, 574, 10235, 505, 1283, 8921, 7917, 11, 89948, 311, 390, 41116, 304, 350, 10005, 1344, 4707, 304, 220, 605 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 11873, 2585, 84495, 349, 369, 279, 25737, 43, 35301, 23371, 17111, 29313, 33088, 78, 11500, 37, 68437, 33, 320, 32845, 21600, 8, 65033, 13, 4314, 11835, 527, 2736, 3984, 304, 279, 25737, 43, 35301, 23371, 17111, 29313, 33088, 78, 11500, 37, 68437, 33, 65033, 16530, 11, 719, 649, 1101, 387, 11713, 26214, 627, 2028, 2585, 84495, 349, 374, 10825, 369, 1005, 449, 279, 25737, 43, 35301, 23371, 17111, 29313, 33088, 78, 11500, 37, 68437, 33, 281, 2397, 320, 32845, 21600, 8, 65033, 16530, 11, 477, 369, 1005, 439, 264, 2585, 369, 1884, 4401, 95680, 477, 14580, 99592, 3235, 449, 279, 23371, 17111, 65033, 13, 1115, 2585, 84495, 349, 574, 10235, 505, 1283, 8921, 7917, 11, 89948, 311, 390, 41116, 304, 350, 10005, 1344, 4707, 304, 220, 605, -100 ]
The Mad Lancers Won a Stabby Award! I am delighted to report that my latest powder mage novella, The Mad Lancers, won a Stabby Award! For those of you that don't know, the Stabby Awards are the yearly tradition of my favorite online community, /r/fantasy. They give out Stabbies for a bunch of different categories, including Best Debut Novel, which was won by Promise of Blood in 2013. The Mad Lancers, a story that explores the history of the Fatrastan war hero Mad Ben Styke, won Best Novella this year. I couldn't be happier or more grateful to the fans. Thanks guys!
{ "redpajama_set_name": "RedPajamaC4" }
4,900
[ 128000, 791, 9671, 445, 32842, 43549, 264, 800, 79736, 17768, 4999, 40, 1097, 35072, 311, 1934, 430, 856, 5652, 17138, 52903, 6747, 6985, 11, 578, 9671, 445, 32842, 11, 2834, 264, 800, 79736, 17768, 0, 1789, 1884, 315, 499, 430, 1541, 956, 1440, 11, 279, 800, 79736, 23488, 527, 279, 45370, 14135, 315, 856, 7075, 2930, 4029, 11, 611, 81, 6801, 98037, 13, 2435, 3041, 704, 800, 12806, 552, 369, 264, 15860, 315, 2204, 11306, 11, 2737, 7252, 1611, 8248, 53976, 11, 902, 574, 2834, 555, 7451, 315, 20671, 304, 220, 679, 18, 627, 791, 9671, 445, 32842, 11, 264, 3446, 430, 41424, 279, 3925, 315, 279, 26417, 81, 561, 276, 4208, 12084, 9671, 7505, 47665, 441, 11, 2834, 7252, 4723, 6985, 420, 1060, 13, 358, 7846, 956 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 791, 9671, 445, 32842, 43549, 264, 800, 79736, 17768, 4999, 40, 1097, 35072, 311, 1934, 430, 856, 5652, 17138, 52903, 6747, 6985, 11, 578, 9671, 445, 32842, 11, 2834, 264, 800, 79736, 17768, 0, 1789, 1884, 315, 499, 430, 1541, 956, 1440, 11, 279, 800, 79736, 23488, 527, 279, 45370, 14135, 315, 856, 7075, 2930, 4029, 11, 611, 81, 6801, 98037, 13, 2435, 3041, 704, 800, 12806, 552, 369, 264, 15860, 315, 2204, 11306, 11, 2737, 7252, 1611, 8248, 53976, 11, 902, 574, 2834, 555, 7451, 315, 20671, 304, 220, 679, 18, 627, 791, 9671, 445, 32842, 11, 264, 3446, 430, 41424, 279, 3925, 315, 279, 26417, 81, 561, 276, 4208, 12084, 9671, 7505, 47665, 441, 11, 2834, 7252, 4723, 6985, 420, 1060, 13, 358, 7846, 956, -100 ]
Tag Archives: trademarks "So this is the Day of The Dead" from "We All Lose One Another" by Jason Collett Trial of the Century! For most Americans, those words conjure two letters—O.J. But for the past week or so, O.J. arguably has been upstaged by an unlikely figure—Dan Aykroyd. That's right, Dan Aykroyd–one of Saturday Night Live's original "Not Ready For Prime Time Players" who won the fame as the staccato pitchman in SNL's "Bass-O-Matic" infomercial parody, and who cemented his place in comedy's pantheon with the original "Ghostbusters" and "Blues Brothers" films. That Dan Aykroyd has evolved into a trademark crusader for his real-life brand of vodka called "Crystal Head," sold in a distinctive skull-shaped bottle: As with most things, success breeds imitators. For Crystal Head, imitation came in the form of rival KAH brand of tequila, also packaged in skull shaped bottles. Unlike Aykroyd's brand, those skulls were opaque, brightly colored affairs: KAH founder Kim Brandi claimed that Mexico's iconic Day of The Dead imagery had inspired her skull design. Aykroyd and his business partner Globefill, Inc., didn't buy it. They sued for trademark infringement back in 2010. But in a 2013 trial, Brandi beat back Aykroyd's infringement claim. She testified that she hadn't even seen Aykroyd's skull bottles. And the jury bought it. Dan Aykroyd didn't give up. He and his lawyers appealed and won a new trial. That new trial, which unfolded last week in a California courtroom, featured showmanship, skullduggery, and scandal worthy of one of Aykroyd's big-budget Hollywood movies. Aykroyd cast himself in the role of star witness for the prosecution. Wielding a tape measure, Aykroyd systematically compared the features, angles, and dimensions of his skull bottle to Brandi's. He also testified that confusion in the marketplace was threatening his brand. Claiming to have found a broken glass inside a KAH bottle, Aykroyd told the jury: "I thought, even more reason for me to be concerned about source. What if someone got hurt? And for someone to think we have a product on the market that's inferior to our vodka, that's unacceptable." Aykroyd also testified that KAH tequila "obviously" was a confusingly similar copycat: "I really couldn't count about how many people who have come and asked us about our new tequila in the skull bottle. We had to say, 'It's not ours.'" Brandi, for her part, argued that Aykroyd shouldn't be able to block all skull shaped liquor bottles, especially ones like Brandi's, whose bright colors evoked iconic Mexican imagery. And Brandi stuck to her story, insisting that she hadn't seen Aykroyd's skull bottles when decided on the Day of The Dead theme for her tequila bottles. She brushed-aside the similarities Aykroyd had pointed out as "coincidence." That's when the real drama happened. In a finale worth of Perry Mason, Aykroyd's legal team unveiled a bombshell—the guy Brandi hired to design her bottles. This surprise witness testified that Brandi handed him one of Aykroyd's skull bottles and told him to make a plaster cast of it so that she could model her design on Aykroyd's distinctive skull container. Armed with this testimony, Aykroyd's lawyer told the jury that Brandi had lied. Four hours later, the jury returned its verdict—guilty as charged. So now, seven years after the story began, Dan Aykroyd and his legal team are close to achieving their perfect ending. All that remains is for the Judge to decide the remedy. That phase of the case is still to come. For now, Aykroyd has the satisfaction of knowing that, at least for now, justice delayed is not justice denied. The name of the case is Globefill Inc. v. Elements Spirits Inc., 2:10-cv-02034, U.S. District Court for the Central District of California. Quote of the day: "Alas, poor Yorick! I knew him, Horatio, a fellow of infinite jest, of most excellent fancy. He hath bore me on his back a thousand times, and now how abhorr'd in my imagination it is! My gorge rises at it." Hamlet by W. Shakespeare Filed under IP, Right of Publicity Tagged as Dan Aykroyd, KAS tequila, Skull bottle, trademarks Guitar Wars – Martin Fights to Save Wildlife and Its Brand "Please Papa can I go. Down to Richmond to the traveling show. Please Papa don't you say I can't. I just want to see the elephant." See The Elephant, music and lyrics by James McMurtry. I'm not a lucky person. I've never won the lottery, not even a five-dollar scratch-off. And when it comes to art, I'd have better luck at a raffle drawing than drawing an object, portrait, or thing. But this past weekend, I found myself in front of a booth run by Martin Guitar being invited to enter a contest that would require both luck and artistic talent to win. For those not familiar with the hierarchy of guitar-dom, C.F. Martin & Co. of Nazareth, PA. occupies the pinnacle of the acoustic guitar realm. (For those really not familiar with these six and 12 string instruments, "acoustics" are the hollow wooden ones). The contest seemed simple—it was part of Martin's "Draw an Elephant, Save an Elephant" campaign directed to raising awareness for the plight of that endangered species. The connection between elephants and guitars seemed a bit obscure, considering that the pachyderms are more likely to stomp on a guitar than to fingerpick one. But who was I to scoff at a worthy cause? Besides, I've been tuned-in to the evils and perils of poaching elephants in the jungle ever since watching Tarzan and the Ivory Hunters at a 25-cent Saturday matinee back in the day. As it turns out, Martin Guitar has a long history of environmental stewardship. Years ago, Martin Guitar substituted a synthetic for the ivory used on its instruments. To enter this contest, #Save Elephant, all you had to do was draw an elephant and you were eligible to win a prize. Pretty simple. But to me, it was daunting. I had been kicked out of remedial art class in elementary school. So my "flight" instincts kicked-in. But the folks running Martin's booth were friendly, and my son, a graphic designer, egged me on. I decided to give it a shot. After all, we were at The Newport Folk Festival, we'd been enjoying energetic and passionate performances across three stages strategically placed around an old fortress that once protected Rhode Island from pirates and non-musical British invasions. The sun shone and spirits were high. And I was surrounded by an array of gorgeous C.F. Martin guitars—the same brand made by this family company since 1833 and played by legends and musical greats for over a century. Hank Williams strummed a Martin model D-28 that Neil Young now owns and plays in concert. Woody Guthrie owned several Martins. And Bob Dylan played a Martin guitar before famously picking up an electric Fender Stratocaster at Newport 50 years ago this past week, shattering the folk music world, prompting boos from the crowd, and changing popular music forever. (A 50th anniversary tribute to this seminal moment from 1965 capped this year's Newport weekend. The infamous Fender was on hand, strummed by Taylor Goldsmith, a member of the indie-folk band Dawes, leading a soaring version of Maggie's Farm, backed by keyboard legend Al Kooper who played the same organ lines when Dylan performed that song five decades earlier.) Martin was offering one prize per hour, and for all I knew, a guitar could have been one of them. So rather than succumb to my inhibitions and phobias, I reached for a pen and began drawing my elephant. I won't say it was elegant. I won't say is was attractive. But my drawing definitely captures a certain elephantine essence. I eschewed cubism and abstract expressionism for my own brand of post-modern realism, that is to say, you'd have no trouble recognizing the trunk, ears, tusks, and stumpy legs of my elephant masterpiece. I signed my work, filled out the entry information, and went back to enjoying music and Newport Harbor breeze. About an hour later, my cell phone rang. It was a call from "Allentown, PA." Not knowing anyone from that part of the Keystone State, and being in the middle of a migration from one festival stage to the next, I almost declined the call. But instinct urged me to answer. "This is Martin Guitars. You're our twelve-o'clock winner," the caller said. I froze, disrupting the stampede of festival foot traffic, then I headed to the Martin Guitar booth. There I met Skip, who congratulated me and showed me a table piled with prizes. No, the guitars weren't part of the contest. But I got to select a t-shirt with the original Martin logo and lettering, direct from the company archives: Admiring the logo, I mentioned that when I'm not attending music festivals and concerts, I'm a trademark lawyer, and told him about my interest in brands and their histories. We then discussed, how, as with many brands, the Martin logo and iconography have evolved. But the essence of Martin's brand identity has remained constant through the use of the C.F. Martin name, and through continuous use of Martin's simple, iconic, headstock design: I then learned from Skip that Martin Guitar was no stranger to intellectual property battles. A few years ago, on a visit to China, the company's sixth-generation CEO, Chris Martin, discovered a collection of guitars that looked like genuine Martins, but were actually poorly made counterfeits. (Where a genuine Martin takes weeks to make by hand and may sell for several thousands of dollars, the Chinese company was mass-producing its ersatz Martins and selling them for a few hundred dollars each). It turned out that another company had registered Martin's trademark in China, and was hijacking Martin's reputation under the protection of Chinese law. (Michael Jordan faces similarly vexing copycats of his name and the "Jumpman" logo.) Martin took action, registering the shape of its iconic headstock as a trademark in the United States Patent and Trademark Office: (Registration No. 3,048,307). Martin also recruited Pennsylvania Senator Robert Casey to come to its aid. But the problems Martin faced in China stem from that country's legal system. Chinese trademark law protect the first company to file for a mark in that country, even if that company is hijacking a brand that's famous elsewhere in the world. And the law in China lets that company sue if the Real McCoy tries to sell its genuine goods in China. Martin Guitar's experience in China highlights the need for companies with strong U.S. brands and worldwide reputations to take preemptive action. Brand owners need to be proactive, aggressive, and creative. They should consider trademark registrations for key brand names, logos, and shapes in key countries, especially ones like China with reputations for counterfeiting. Like Martin Guitar, don't just register words, look at products shapes and designs, which can also qualify for protection under trademark and patent law. And be vigilant. Otherwise, like the elephants that gave rise to this story, a famous trademark may be prone to poaching, which can weaken a brand, and in rare cases, drive it to the point of extinction. And the last thing anyone needs is another crude drawing from me trying to save another endangered species. QUOTE OF THE DAY: "Sometimes the nicest thing to do with a guitar is just look at it." Thom Yorke. Tagged as #AlKooper, #BobDylan, #elephants, #HankWilliams, #JamesMcMurtry, #MartinGuitars, #NeilYoung, #NewportFolFestival, #Tarzan, #ThomYorke, Dawes, trademarks Beer TM Today, Gone Tommorow: IPA Spat Goes Flat "The room was humming harder, As the ceiling flew away, When we called out for another drink, The waiter brought a tray." A Whiter Shade of Pale by Keith Reid, Gary Brooker (recorded by Procol Harum) Surprise turned to Schadenfreude last week in trademark land when micro-brewer Lagunitas sued micro-legend Sierra Nevada for trademark infringement. The mark at issue? IPA–a common acronym for the style of beer called "India Pale Ale." For years, Lagunitas's IPA packages featured the letters IPA in large, highly stylized script. And Lagunitas saw red when Sierra Nevada changed the packages for its IPA to put those letters front and center: Scores of brewers offer up their takes on this hoppy variety of pale ale. And many call it "IPA." So the odds that any one company could snag "IPA" as a trademark would seem long at best–not the makings of a good bar bet. But those long odds did not deter Lagunitas. In its lawsuit, the company focused on style, not substance. According to Lagunitas's complaint in Federal court, the letters IPA weren't the issue. Sierra Nevada's offense was copying the large-letter format and style of Lagunitas's IPA logo. But in this era where microbreweries are giving the beer establishment a run for its money and craft beer isn't just for hipsters anymore, the nuances of trademark law sometimes can get lost on the blogosphere. Rather than stirring up sympathy, the lawsuit sparked a brew-haha of criticism, with Twitter and other social media sites overflowing with outrage over the idea that one brewer could monopolize IPA. So even though that wasn't Lagunitas's aim, the brewer responded to the backlash with contrition reminiscent of a morning-after dose of reality. In a Twitter post, owner Tony Magee wrote: "Today, I was seriously schooled . . . Tomorrow morning we'll drop the infringement suit.[and] get back to answering other questions." So Lagunitaas learned a valuable lesson. When it comes to IP rights for IPA, size apparently doesn't matter. QUOTE OF THE DAY: "I am a firm believer in the people. If given the truth, they can be depended upon to meet any national crisis. The great point is to bring them the real facts, and beer." Abraham Lincoln Filed under IP, trademarks, Uncategorized Tagged as beer, India Pale Ale, IPA, Lagunitas, Sierra Nevada, trademarks Onward Trademark Soldiers? Newsboys Cannot Stop the Rap Music "Lately I've been thinking / What would the world do without the news / You wouldn't know when wars were started / Or when they ended, win or lose." Newspapers by Stan Ridgway Yesterday's IP blogosphere brought news of another battle of the bands involving trademark rights. Christian rockers the Newsboys did not turn the other cheek when they discovered a rap duo performing as New Boyz. They sued. And they lost. Bigtime. Oh, the Newsboys got their day in court all right, but it lasted just about one day, with the judge tossing the complaint as legally deficient. The Newsboys claimed that the rappers' name New Boyz would confuse and confound the music buying audience. They railed that the New Boyz songs were sexually charged. They pointed to their own 1991 album title "Boys will be Boyz" as evidence that the groups' names were too close for comfort. And the band that had honed its reputation in the realm of Christian Rock insisted that their music was not just for the religious set; they claimed "cross-over" appeal to the same "demographic" that listens to and downloads New Boyz allegedly salacious songs. But the secular audience who mattered–the judge–was not buying it. He granted the New Boyz's motion to dismiss the trademark infringement charges as implausible, concluding that the Newsboys' "factual allegations of customer confusion do not include any factual allegations of confusion about the source of each band's marketed music." Influencing the court's ruling was the focus of the Newsboys' federal trademark registration–"live musical performances of a religious nature." The two groups market their music to two distinctly different crowds, making the Newsboys claims of confusion and damage to reputation apocryphal, according to the court. In short, the judge hewed to the ancient adage "live and let live," and stopped the trademark fight on a TKO–failure to plead enough facts to get to round 2. This case joins a line of music themed trademark cases allowing similar names to coexist when used for different genres. Perhaps the granddaddy of all is Sunenblick v. MCA Records, Inc., 895 F. Supp. 616 (S.D.N.Y. 1995), aff'd, 101 F.3d 684 (2d Cir. 1996): where the jazz record label Uptown Records lost its trademark battle against popular rap record label Uptown, with the court concluding that the urban music geography was big enough for two Uptowns. And of course, we only have to scan the bins of the few remaining brick and mortar record stores to see that bands with similar names often coexist without sparking nasty trademark battles. Pop-rocker Bryan Adams rubs shoulders with Alt. Country Rocker Ryan Adams, while The Who and The Guess Who have played in peace for nearly six decades. So, while the ending of the Newsboys' story may seem abrupt, the result, at least for now, seems to be in tune with history. If there's a moral to the story, it may be this, it's one thing for a band to claim that its music has crossover appeal, it's another thing to prove it. QUOTE OF THE DAY: "In the case of news, we should always wait for the sacrament of confirmation." Voltaire Filed under trademarks, Uncategorized Tagged as Bryan ADams, New Boyz, Newsboys, Ryan Adams, Stan Ridgway, The Guess Who, The Who, trademarks, Uptown Records The End: Death of a Door Likely Prevents Future Jams "You and I travel to the beat of a different drum." Different Drum, by Michael Nesmith In a week dominated by devastation in the Nation's tornado alley, it was easy to miss the news that Ray Manzarek, keyboardist for the Doors, had died. While Jim Morrison defined the Doors' image with his flamboyant stage presence and apocalyptic lyrics, Manzarek defined the band's sound, lending baroque classical flourishes to the definitive Doors song Light My Fire and propulsive jazz inflected stylings to many other of the band's hits. While Manzarek is best remembered for his music, his obituary also contains a Softrights-worthy footnote about a long simmering, and sometimes roiling, trademark dispute over rights in the Doors name, As reported in Billboard back in 2008, the four members of the Doors, Morrison, Manzarek, guitarist Robby Krieger, and drummer John Densmore, signed a pact in 1970 that gave each of them veto power over any business deal. According to Billboard, the four Doors inked that agreement after a nasty battle about whether to let Buick use "Light My Fire" in a television commercial, After Jim Morrison died in 1974, the remaining Doors remained largely, well, dormant. But in 2002, Manzarek and Krieger itched to return to the stage. They tried coaxing Densmore to reunite the band. Densmore declined. And though he took no issue with Ray and Robby performing the band's music, using the Doors name was another story. "You can't call yourselves the Doors because you can't have the Doors without Jim Morrison," Densmore's lawyer was quoted as saying. And when lawyers are quoted, that means only one thing–a lawsuit. Yes, despite Densmore's protest, Manzarek and Krieger hit the road calling themselves the Doors of the 21st Century. The tour reportedly earned them $3.2 million, none of which they shared with Densmore or Morrison's estate. So Densmore and Morrison's representative sued and won, blocking further use of the Doors name and getting over $5 million in damages and costs. Manzarek and Krieger continued to perform together, calling themselves Riders On The Storm, and later, Manzarek and Krieger, with Densmore continuing to be the lone holdout to any commercial use of the Doors name or music (he reportedly vetoed a $15 million deal to use "Light My Fire" in a Cadillac commercial). Shortly before Manzarek's death, however, Densmore hinted publicly that the three surviving members might at last reunite. But with the drummer finally singing a different tune, fate, not a court, has intervened to shut the Doors. QUOTE OF THE DAY: "There are things known and things unknown and in between are the doors." Jim Morrison Tagged as Buick, Cadillac, Doors, Jim Morrison, John Densmore, Light My FIre, Ray Mazarek, Robby Krieger, trademarks Owner With His Head In the Sand?: Redskins Name Controversy Returns "Old enough now to change your name. When so many love you is it the same?" Cowgirl In The Sand by Neil Young Dan Snyder, owner of the Washington Redskins, (the capital's storied NFL franchise), is no trademark neophyte. An entrepreneur since his college days, Snyder has lifted the Redskins franchise to become one of the most valuable teams in sports. Snyder reaps a fortune selling jerseys and other merchandise emblazoned with the REDSKINS name and logo–a profile of a Native American man. So with these invaluable trademarks fueling the engine of his success, it's no surprise that Snyder waited until all of Washington's trademark professionals flocked to arch rival Dallas before opening the latest chapter in the ongoing controversy over the REDSKINS name. While lawyers from private practice and the USPTO were convening convivially in the shadow of Jerry's Jones' opulent new Texas stadium, Snyder defiantly declared to USA TODAY–"We will NEVER change the Redskins name." Long simmering charges that the name is racist and disparaging to Native Americans bounce off Snyder like raindrops beading off a freshly waxed car. He insists that the name only refers to his football team, and has lost any disparaging or barbaric connotations it once may have had. And public opinion polls are like the buffet table at the Club Level of Fed EX Field–there is something for everyone, with surveys supporting each sides' take on the name. So Snyder would rather fight than switch. And the fight over the federal trademark registration for REDSKINS, once thought to be over, has returned. Back in 1992, Native American groups and individuals petitioned the USPTO to cancel the REDSKINS trademark, alleging that the name is disparaging. The Lanham Act, the federal trademark statute, forbids registration for disparaging marks. The petitioners won round one, but ultimately lost on a procedural issue; the reviewing courts ruled that they had waited too long to bring their challenges. The Supreme Court declined to take up the issue. Now, however, there's a fresh case. This time the petitioners are younger and claim that they could not have acted sooner. The new case is again pending before the Trademark Trial and Appeal Board (TTAB). The TTAB, however, only has the power to cancel the REDSKINS federal trademark registration, not stop the team from using the name. Losing the TTAB case would be a setback, and could affect the team's rights in dealing with counterfeit merchandise, especially imports. But is wouldn't be a mortal blow; it would not force the REDSKINS to change their name. For the petitioners and their supporter, the real issue goes beyond whether Snyder gets to keep his certificate of registration. One can easily think of several antiquated and pejorative nicknames for ethnic or racial groups that would be offensive if used as the name of a sports franchise. How is REDSKINS any different, opponents of the name ask? Abe Pollin, the beloved civic leader and owner of city's basketball franchise had no qualms about changing its name from the Bullets to the Wizards when he felt that naming a team after a lethal projective sent the wrong message in a city then plagued by gun violence. And surely, measures could be taken to honor tradition and preserve the essence of the football team's brand while eliminating a term that some, perhaps even many, find offensive. Who remembers that the KNICKS are really the Knickerbockers and the METS really the Metropolitans? What would be lost in the long run by similarly calling Snyder's team simply the SKINS? Snyder, however, insists his conscience is clear and that the name will "NEVER" change. It may be good business. But whether it's right is a question that trademark law can't answer. QUOTE OF THE DAY: "People who work together will win, whether it be against complex football defenses, or the problems of modern society." Vince Lombardi Filed under copyright, trademarks, Uncategorized Tagged as Abe Pollin, Bullets, cancellation, Cowboys, Dallas, Dan Snyder, DC, INTA, Jerry Jone, Knicks, Mets, Redskins, trademarks, TTAB, Washington, WIzards INTA The Great Wide Open "Have you ever seen Dallas from a DC-9 at night?" Dallas by The Flatlanders When you think of Dallas, many images snap to mind. The grainy, jarring frames of Abraham Zapruder's home movie, Lee Harvey Oswald doubled over from the blast from Jack Ruby's pistol, Tom Landry stalking the sidelines of the Cotton Bowl in his suit, tie, and hat, the portrait of Jock Ewing hanging over Miss Ellie's mantle at Southfork, Tony Romo's smirk, Larry Hagman's devilish grin as JR Ewing over two generations of Dallas, the soap opera. Trademarks, however, are not top of mind when you land at DFW or Love Field, not even as you make your way to the flagship Nieman Marcus in downtown Big D. But here in Dallas this week in May, almost 10,000 trademark professionals–in-house corporate lawyers, outside counsel, Internet and domain name specialists, and flocks of experts and service providers–have descended on Dallas for the 135th International Trademark Association Annual Meeting. Trademarks and Texas have come a long way since 1888 when the first annual meeting took place. Then, a "brand" in Texas literally meant a symbol seared into the hide of a cow. And justice was meted out by Judge Roy Bean, whose "Law West of the Pecos" entailed more hangings than injunctions for trademark infringement. (We shudder to think of how Judge Bean would have dealt with such devious hombres as counterfeiters and cyber squatters). And those first INTA attendees back in 1888 would marvel at the range of topics swirling around INTA 2013–social media, fluid trademarks, gtdls, and the "food explosion" and other trendy subjects speak to the complexities and challenges of our brand-centric modern era. Dallas has been hospitable and impressive. And steeped in history, from the life size sculpture of a long horn cattle drive that speaks to Texas' Lonesome Dove days to the Texas Book Depository that reminds us of a dark day in November fifty years ago. Having grown up in Lawrence NJ, I naturally gravitated to the Hotel Lawrence, a venerable establishment that makes up in friendly staff what it lacks in luxury. It's just a block from Dealey Plaza, and sleeping in the vicinity of JFK's final ride has conjured up some fitful dreams while rekindling interest in the "single bullet theory" and other conspiracies that seldom haunt my thoughts back home. Yes, as those Texas troubadours The Flatlanders sing, Dallas is a beautiful sight, and a haunting one too. QUOTE OF THE DAY: "Hang 'em first and try 'em later." Judge Roy Bean. Filed under copyright, IP, Right of Publicity, trademarks Tagged as Dallas, INTA, trademarks
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
8,682
[ 128000, 5786, 38329, 25, 42134, 198, 48058, 420, 374, 279, 6187, 315, 578, 15371, 1, 505, 330, 1687, 2052, 61789, 3861, 13596, 1, 555, 18984, 4349, 28163, 198, 83023, 315, 279, 28200, 0, 1789, 1455, 9053, 11, 1884, 4339, 16898, 554, 1403, 12197, 2345, 46, 3587, 13, 2030, 369, 279, 3347, 2046, 477, 779, 11, 507, 3587, 13, 36659, 706, 1027, 709, 267, 3359, 555, 459, 17821, 7216, 2345, 39125, 24852, 74, 3433, 67, 627, 4897, 596, 1314, 11, 11824, 24852, 74, 3433, 67, 4235, 606, 315, 7884, 13120, 11406, 596, 4113, 330, 2688, 32082, 1789, 12801, 4212, 25640, 1, 889, 2834, 279, 33651, 439, 279, 357, 4575, 4428, 9846, 1543, 304, 18407, 43, 596, 330, 33, 395, 24540, 5364, 780, 1, 4225, 316, 8150, 67265, 11, 323 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 5786, 38329, 25, 42134, 198, 48058, 420, 374, 279, 6187, 315, 578, 15371, 1, 505, 330, 1687, 2052, 61789, 3861, 13596, 1, 555, 18984, 4349, 28163, 198, 83023, 315, 279, 28200, 0, 1789, 1455, 9053, 11, 1884, 4339, 16898, 554, 1403, 12197, 2345, 46, 3587, 13, 2030, 369, 279, 3347, 2046, 477, 779, 11, 507, 3587, 13, 36659, 706, 1027, 709, 267, 3359, 555, 459, 17821, 7216, 2345, 39125, 24852, 74, 3433, 67, 627, 4897, 596, 1314, 11, 11824, 24852, 74, 3433, 67, 4235, 606, 315, 7884, 13120, 11406, 596, 4113, 330, 2688, 32082, 1789, 12801, 4212, 25640, 1, 889, 2834, 279, 33651, 439, 279, 357, 4575, 4428, 9846, 1543, 304, 18407, 43, 596, 330, 33, 395, 24540, 5364, 780, 1, 4225, 316, 8150, 67265, 11, 323, -100 ]
We have learned that these eight-sided coddlers, previously designed "UM48" were made by Henckels, in Germany. Your web browser will redirect you to that page in ten seconds, or click on this link to go there now. This page was last modified on Friday, 25-Jan-2013 20:35:30 EST .
{ "redpajama_set_name": "RedPajamaC4" }
8,993
[ 128000, 1687, 617, 9687, 430, 1521, 8223, 50858, 20950, 8910, 388, 11, 8767, 6319, 330, 2864, 2166, 1, 1051, 1903, 555, 13370, 377, 2053, 11, 304, 10057, 627, 7927, 3566, 7074, 690, 6559, 499, 311, 430, 2199, 304, 5899, 6622, 11, 477, 4299, 389, 420, 2723, 311, 733, 1070, 1457, 627, 2028, 2199, 574, 1566, 11041, 389, 6740, 11, 220, 914, 67552, 12, 679, 18, 220, 508, 25, 1758, 25, 966, 26963, 662, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 ]
[ 1687, 617, 9687, 430, 1521, 8223, 50858, 20950, 8910, 388, 11, 8767, 6319, 330, 2864, 2166, 1, 1051, 1903, 555, 13370, 377, 2053, 11, 304, 10057, 627, 7927, 3566, 7074, 690, 6559, 499, 311, 430, 2199, 304, 5899, 6622, 11, 477, 4299, 389, 420, 2723, 311, 733, 1070, 1457, 627, 2028, 2199, 574, 1566, 11041, 389, 6740, 11, 220, 914, 67552, 12, 679, 18, 220, 508, 25, 1758, 25, 966, 26963, 662, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100 ]
The Civil Aviation Authority (CAA) is investigating the cause of a light aircraft crash that has left three people dead. The aircraft went missing yesterday. It was en route to Rand Airport near Germiston, east of Johannesburg.
{ "redpajama_set_name": "RedPajamaC4" }
3
[ 128000, 791, 16803, 50047, 22677, 320, 29733, 8, 374, 24834, 279, 5353, 315, 264, 3177, 14467, 10121, 430, 706, 2163, 2380, 1274, 5710, 13, 578, 14467, 4024, 7554, 13985, 13, 1102, 574, 665, 6149, 311, 24916, 21348, 3221, 37835, 59919, 11, 11226, 315, 86641, 13, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 ]
[ 791, 16803, 50047, 22677, 320, 29733, 8, 374, 24834, 279, 5353, 315, 264, 3177, 14467, 10121, 430, 706, 2163, 2380, 1274, 5710, 13, 578, 14467, 4024, 7554, 13985, 13, 1102, 574, 665, 6149, 311, 24916, 21348, 3221, 37835, 59919, 11, 11226, 315, 86641, 13, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100 ]
Juan José Enríquez Gómez, plus connu comme Juanjo, né à Madrid (Espagne) le et mort à Murcie le , est un footballeur espagnol qui jouait au poste de défenseur central. Biographie Joueur Juanjo est un défenseur central rugueux qui débute en première division dans les rangs de l'UD Salamanque lors de la saison 1974-1975. Après trois saisons à Salamanque, Juanjo est recruté en 1977 par le FC Barcelone. Il débute avec le Barça lors de la de championnat face à la Real Sociedad en entrant sur le terrain à la place de Toño de la Cruz. Cette saison-là, Juanjo joue 13 matchs de championnat avec le Barça entraîné par Rinus Michels. Après une deuxième saison avec Barcelone, Juanjo est recruté par le Recreativo de Huelva en 1979. En 1981, il rejoint l'Atlético de Madrid où il reste jusqu'en 1984. Avec l'Atlético, il joue une centaine de matchs de championnat. Juanjo passe ensuite dans les rangs du Lorca Deportiva CF et CD Cieza. Entraîneur Juanjo entraîne, entre autres, l'Unión Balompédica Conquense, le Granada CF, le Getafe CF et la Ciudad de Murcia. Lien externe Références Naissance en septembre 1950 Naissance à Madrid Footballeur espagnol Joueur de l'UD Salamanque Joueur du FC Barcelone Joueur du Recreativo de Huelva Joueur de l'Atlético de Madrid Entraîneur espagnol de football Entraîneur du Getafe CF Entraîneur du Grenade CF Décès en août 2015 Décès à 64 ans
{ "redpajama_set_name": "RedPajamaWikipedia" }
487
[ 128000, 93077, 44365, 2998, 81, 2483, 42221, 480, 1832, 83256, 11, 5636, 4635, 84, 22299, 29604, 7453, 11, 38605, 3869, 25048, 320, 78054, 24812, 8, 514, 220, 1880, 10237, 3869, 15356, 25134, 514, 1174, 1826, 653, 4579, 65, 5164, 324, 16948, 3326, 337, 7930, 28068, 1339, 8065, 92146, 409, 47371, 1137, 324, 8792, 382, 37196, 3257, 648, 271, 41, 72266, 4815, 93077, 7453, 1826, 653, 47371, 1137, 324, 8792, 29742, 361, 2249, 7930, 7591, 65, 1088, 665, 55133, 13096, 7010, 3625, 43200, 82, 409, 326, 6, 4760, 8375, 13005, 593, 37953, 409, 1208, 80091, 220, 4468, 19, 12, 4468, 20, 13, 5186, 12416, 56321, 829, 19941, 3869, 8375, 13005, 593, 11, 29604, 7453, 1826, 1421, 70546, 978, 665, 220, 4468, 22, 1370, 514, 16396, 4821, 3757, 606, 13 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 93077, 44365, 2998, 81, 2483, 42221, 480, 1832, 83256, 11, 5636, 4635, 84, 22299, 29604, 7453, 11, 38605, 3869, 25048, 320, 78054, 24812, 8, 514, 220, 1880, 10237, 3869, 15356, 25134, 514, 1174, 1826, 653, 4579, 65, 5164, 324, 16948, 3326, 337, 7930, 28068, 1339, 8065, 92146, 409, 47371, 1137, 324, 8792, 382, 37196, 3257, 648, 271, 41, 72266, 4815, 93077, 7453, 1826, 653, 47371, 1137, 324, 8792, 29742, 361, 2249, 7930, 7591, 65, 1088, 665, 55133, 13096, 7010, 3625, 43200, 82, 409, 326, 6, 4760, 8375, 13005, 593, 37953, 409, 1208, 80091, 220, 4468, 19, 12, 4468, 20, 13, 5186, 12416, 56321, 829, 19941, 3869, 8375, 13005, 593, 11, 29604, 7453, 1826, 1421, 70546, 978, 665, 220, 4468, 22, 1370, 514, 16396, 4821, 3757, 606, 13, -100 ]
Aficionados of face furniture, necklaces and rings alike will be sure to find something that tickles their fancy from Saskia Diez. Looking to dial up the drama with a bold, sculptured ear cuff? Check! Keen for a dainty piece to wear day in, day out? There's plenty where that came from – and more besides. Dreamt up in her Munich atelier and manifested in partnership with local artisans, Saskia's elegant designs look to the realms of art and industrial design for inspiration, allowing us to experiment with new and numerous ways to accessorize all areas. Satisfying our penchant for all-important adornings, Saskia invited us for a closer look at her design-led decor to recount the story behind her aesthetic. What inspires you to create? Is it one particular thing or many factors that influence your work? Dancing serves as a big inspiration for the new collection; you can see it through the movement and lightness of the pieces, and the way they're entwined and tangled. They simply dance with you! During the autumn, while I was designing, I had St. Vincent's latest album 'Masseducation' on repeat – I realise now that my jewellery really personifies her character. She's an exact mix of very strong yet also very fragile, and you can see that in my work. My friends are all creative forces – writers, architects, artists and musicians – so they're a constant inspiration too, and I'm always uplifted by their energy. If inspiration comes from everywhere, what does the creative process look like for you? How are your concepts born? It's a complete mix. I like to experiment and dabble with different designs to keep my work interesting – it's a case of welcoming ideas when they come into my mind. The hardest part is sifting through them and working out whether one leads somewhere or not. Typically, I'll run with a couple of ideas together, which I manage to shape into a collection. My design process is very emotional and intimate, and the creations are really very dependent on my mood. They can be colourful and bold to reflect happiness, or they can be more fragile and delicate; when you're creating a collection, you have to remember that you're catering to a spectrum of different people, so designing in this style really works to my benefit in appealing to different personalities. Run us through the materials you work with. Pearls seem to feature heavily! I predominantly work with sterling silver; if I'm creating delicate gold pieces I'll use 18 carat, but for those bolder looks I'll start with sterling silver before plating it with 18-carat gold. I work with recycled materials, which is very common in jewellery. In terms of pearls, they're synonymous with that word for me – it's always satisfying to work on interpretations of what jewellery means on a personal level. Sadly, an effect of global warming is that the oceans are getting dirtier and increasing in temperature, which isn't conducive to high-grade pearls. As such, I'll generally opt for freshwater varieties. I don't think people would be so aware of it, but the consequences of global warming are certainly evident for me in respect to sourcing. Other than that, I try to keep things local – the company I source my gold and silver from is only two blocks away from me. I really value and respect the importance of knowing who I'm working with.
{ "redpajama_set_name": "RedPajamaC4" }
2,913
[ 128000, 55439, 14222, 5670, 315, 3663, 14891, 11, 13272, 77688, 323, 25562, 27083, 690, 387, 2771, 311, 1505, 2555, 430, 9525, 645, 872, 27555, 505, 49746, 689, 8574, 89, 13, 21815, 311, 28960, 709, 279, 20156, 449, 264, 14265, 11, 27863, 3149, 2487, 75523, 30, 4343, 0, 6706, 268, 369, 264, 294, 18773, 6710, 311, 10051, 1938, 304, 11, 1938, 704, 30, 2684, 596, 11510, 1405, 430, 3782, 505, 1389, 323, 810, 28858, 627, 65454, 83, 709, 304, 1077, 47304, 520, 68249, 323, 79754, 304, 15664, 449, 2254, 100130, 11, 49746, 689, 596, 26861, 14769, 1427, 311, 279, 77563, 315, 1989, 323, 13076, 2955, 369, 20343, 11, 10923, 603, 311, 9526, 449, 502, 323, 12387, 5627, 311, 45484, 553, 682, 5789, 627, 50, 7630, 7169, 1057, 99780, 369 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 55439, 14222, 5670, 315, 3663, 14891, 11, 13272, 77688, 323, 25562, 27083, 690, 387, 2771, 311, 1505, 2555, 430, 9525, 645, 872, 27555, 505, 49746, 689, 8574, 89, 13, 21815, 311, 28960, 709, 279, 20156, 449, 264, 14265, 11, 27863, 3149, 2487, 75523, 30, 4343, 0, 6706, 268, 369, 264, 294, 18773, 6710, 311, 10051, 1938, 304, 11, 1938, 704, 30, 2684, 596, 11510, 1405, 430, 3782, 505, 1389, 323, 810, 28858, 627, 65454, 83, 709, 304, 1077, 47304, 520, 68249, 323, 79754, 304, 15664, 449, 2254, 100130, 11, 49746, 689, 596, 26861, 14769, 1427, 311, 279, 77563, 315, 1989, 323, 13076, 2955, 369, 20343, 11, 10923, 603, 311, 9526, 449, 502, 323, 12387, 5627, 311, 45484, 553, 682, 5789, 627, 50, 7630, 7169, 1057, 99780, 369, -100 ]
500,000 SME owners rely on their business to fund their retirement More than half-a-million self-employed professionals are relying on their business to fund their retirement, with just one-third currently paying into a private pension scheme, according to new research from Aegon's 2016 Retirement Readiness Report. The study estimates 630,000 self-employed people in the UK look upon their business as their pension pot and plan to rely on the potential sale of their business to cover their overheads later in life. Nearly two-thirds believe that only half or less of their retirement income will be made up of a private or former workplace pension scheme. However, those self-employed who are making pension provisions appear to be more engaged than the general public, with more money set aside in their pension pots than the average employee. Self-employed staff have £40,400 saved in their pensions on average; £5,200 more than the average across the rest of the employed population. Additionally, self-employed professionals have greater savings ambitions when it comes to their annual retirement income, anticipating income of £45,700 compared to the UK average of £38,000. Recent amendments to the state pension have benefitted the self-employed who reach retirement age on or after 6th April 2016, who are now entitled to receive up to £155.65 a week, rather than the previous maximum basic state pension entitlement of £119.30 a week. Steven Cameron, pensions director, Aegon, said: "Our research shows the self-employed have particular needs and aspirations when it comes to saving for retirement. "There's … a significant gap between saving behaviours and very ambitious expectations for retirement, with the self-employed expecting to not only retire earlier, but also receive more income in retirement than payroll employees. "There are real risks in assuming that your business can fund you through retirement."
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
2,291
[ 128000, 2636, 11, 931, 79867, 7980, 17631, 389, 872, 2626, 311, 3887, 872, 21624, 198, 7816, 1109, 4376, 7561, 46149, 659, 88984, 15749, 527, 39661, 389, 872, 2626, 311, 3887, 872, 21624, 11, 449, 1120, 832, 30277, 5131, 12798, 1139, 264, 879, 28781, 13155, 11, 4184, 311, 502, 3495, 505, 362, 797, 263, 596, 220, 679, 21, 70289, 4557, 1918, 8423, 627, 791, 4007, 17989, 220, 18660, 11, 931, 659, 88984, 1274, 304, 279, 6560, 1427, 5304, 872, 2626, 439, 872, 28781, 3419, 323, 3197, 311, 17631, 389, 279, 4754, 6412, 315, 872, 2626, 311, 3504, 872, 32115, 82, 3010, 304, 2324, 627, 64445, 1403, 45726, 4510, 430, 1193, 4376, 477, 2753, 315, 872, 21624, 8070, 690, 387, 1903, 709, 315, 264, 879, 477, 4846, 27465, 28781, 13155 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 2636, 11, 931, 79867, 7980, 17631, 389, 872, 2626, 311, 3887, 872, 21624, 198, 7816, 1109, 4376, 7561, 46149, 659, 88984, 15749, 527, 39661, 389, 872, 2626, 311, 3887, 872, 21624, 11, 449, 1120, 832, 30277, 5131, 12798, 1139, 264, 879, 28781, 13155, 11, 4184, 311, 502, 3495, 505, 362, 797, 263, 596, 220, 679, 21, 70289, 4557, 1918, 8423, 627, 791, 4007, 17989, 220, 18660, 11, 931, 659, 88984, 1274, 304, 279, 6560, 1427, 5304, 872, 2626, 439, 872, 28781, 3419, 323, 3197, 311, 17631, 389, 279, 4754, 6412, 315, 872, 2626, 311, 3504, 872, 32115, 82, 3010, 304, 2324, 627, 64445, 1403, 45726, 4510, 430, 1193, 4376, 477, 2753, 315, 872, 21624, 8070, 690, 387, 1903, 709, 315, 264, 879, 477, 4846, 27465, 28781, 13155, -100 ]
The Gucci Brand , founded in 1921 in Florence, is still one of the most sought-after Italian fashion companies in the world. Now eyeing offers you the beautiful Gucci Sunglasses , produced by the new Kering Eyewear manufacturer, at an affordable price for everyone. Buy online Sunglasses Gucci GG0540S - 003 Havana, at the best Price of the web, many models and colo.. Buy online Sunglasses Gucci GG0539S - 004 Havana, at the best Price of the web, many models and colo.. Buy online Sunglasses Gucci GG0538S - 006 Gold, at the best Price of the web, many models and colors.. Buy online Sunglasses Gucci GG0537S - 002 Gold, at the best Price of the web, many models and colors.. Buy online Sunglasses Gucci GG0535S - 003 Havana, at the best Price of the web, many models and colo.. Buy online Sunglasses Gucci GG0533SA - 003 Black, at the best Price of the web, many models and colo.. Buy online Sunglasses Gucci GG0529S - 004 Gold, at the best Price of the web, many models and colors.. Buy online Sunglasses Gucci GG0528S - 008 Gold, at the best Price of the web, many models and colors.. Buy online Sunglasses Gucci GG0525S - 005 Havana, at the best Price of the web, many models and colo.. Buy online Sunglasses Gucci GG0522S - 005 Ivory, at the best Price of the web, many models and color.. Buy online Sunglasses Gucci GG0518SA - 004 Grey, at the best Price of the web, many models and color.. Buy online Sunglasses Gucci GG0518S - 002 Havana, at the best Price of the web, many models and colo.. Buy online Sunglasses Gucci GG0517S - 006 Light-blue, at the best Price of the web, many models and .. Buy online Sunglasses Gucci GG0516S - 001 Black, at the best Price of the web, many models and color.. Buy online Sunglasses Gucci GG0515S - 003 Black, at the best Price of the web, many models and color.. Buy online Sunglasses Gucci GG0514S - 005 Black, at the best Price of the web, many models and color.. Buy online Sunglasses Gucci GG0511S - 002 Black, at the best Price of the web, many models and color.. Buy online Sunglasses Gucci GG0510S - 002 Black, at the best Price of the web, many models and color.. Buy online Sunglasses Gucci GG0499S - 001 Black, at the best Price of the web, many models and color.. Buy online Sunglasses Gucci GG0498S - 001 Black, at the best Price of the web, many models and color..
{ "redpajama_set_name": "RedPajamaC4" }
1,731
[ 128000, 791, 4673, 57808, 16835, 1174, 18538, 304, 220, 5926, 16, 304, 48606, 11, 374, 2103, 832, 315, 279, 1455, 16495, 45673, 15155, 11401, 5220, 304, 279, 1917, 627, 7184, 8071, 287, 6209, 499, 279, 6366, 4673, 57808, 60671, 34968, 1174, 9124, 555, 279, 502, 735, 4776, 44511, 99228, 14290, 11, 520, 459, 17049, 3430, 369, 5127, 627, 17940, 2930, 60671, 34968, 4673, 57808, 57798, 25230, 15, 50, 482, 220, 6268, 86975, 11, 520, 279, 1888, 8650, 315, 279, 3566, 11, 1690, 4211, 323, 1400, 78, 35047, 17940, 2930, 60671, 34968, 4673, 57808, 57798, 25210, 24, 50, 482, 220, 8759, 86975, 11, 520, 279, 1888, 8650, 315, 279, 3566, 11, 1690, 4211, 323, 1400, 78, 35047, 17940, 2930, 60671, 34968, 4673, 57808, 57798, 25210, 23, 50, 482, 220 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 791, 4673, 57808, 16835, 1174, 18538, 304, 220, 5926, 16, 304, 48606, 11, 374, 2103, 832, 315, 279, 1455, 16495, 45673, 15155, 11401, 5220, 304, 279, 1917, 627, 7184, 8071, 287, 6209, 499, 279, 6366, 4673, 57808, 60671, 34968, 1174, 9124, 555, 279, 502, 735, 4776, 44511, 99228, 14290, 11, 520, 459, 17049, 3430, 369, 5127, 627, 17940, 2930, 60671, 34968, 4673, 57808, 57798, 25230, 15, 50, 482, 220, 6268, 86975, 11, 520, 279, 1888, 8650, 315, 279, 3566, 11, 1690, 4211, 323, 1400, 78, 35047, 17940, 2930, 60671, 34968, 4673, 57808, 57798, 25210, 24, 50, 482, 220, 8759, 86975, 11, 520, 279, 1888, 8650, 315, 279, 3566, 11, 1690, 4211, 323, 1400, 78, 35047, 17940, 2930, 60671, 34968, 4673, 57808, 57798, 25210, 23, 50, 482, 220, -100 ]
P22Cezanne-AltTwo is a trademark of P22 type foundry, Inc. Tecnica Slab Bold Alternate is a trademark of Graviton. Nunanunong Demo Poemhaiku. 2012-2014. All Rights Reserved. - Tulip Font Agreement -- Installation and Use: You may install and use this font on your computer and use it in non-commercial projects.- Reproduction and Distribution: You may not reproduce and distribute any copies of the SOFTWARE PRODUCT.- Restrictions on Alteration: You may not rename, edit or create any derivative works from the SOFTWARE PRODUCT.Tulip Font is free for personal use only.If you want to use this font for commercial use, including non-profit, please use contact: [email protected] to purchase a license from me. Copyright (c) Typographer Mediengestaltung, 1999. All rights reserved. Volute ist eine Versal-Antiqua aus der Zeit der Jahrhunderwende mit vollem Zeichensatz. Geeignet fuer nostalgische Plakate etc.
{ "redpajama_set_name": "RedPajamaC4" }
4,657
[ 128000, 47, 1313, 34, 10333, 20991, 12, 27108, 11874, 374, 264, 32464, 315, 393, 1313, 955, 1766, 894, 11, 4953, 627, 51, 31667, 3074, 6995, 370, 47102, 75824, 374, 264, 32464, 315, 2895, 44210, 263, 627, 45, 65734, 359, 647, 29623, 14128, 336, 4317, 39342, 13, 220, 679, 17, 12, 679, 19, 13, 2052, 10734, 15516, 627, 12, 43316, 575, 9757, 23314, 1198, 40245, 323, 5560, 25, 1472, 1253, 4685, 323, 1005, 420, 3381, 389, 701, 6500, 323, 1005, 433, 304, 2536, 74144, 7224, 12898, 3402, 17158, 323, 35009, 25, 1472, 1253, 539, 23645, 323, 16822, 904, 11236, 315, 279, 8730, 39183, 12898, 93075, 389, 43951, 367, 25, 1472, 1253, 539, 30174, 11, 4600, 477, 1893, 904, 32905, 4375, 505, 279, 8730, 39183, 844, 360, 575, 9757, 374 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 47, 1313, 34, 10333, 20991, 12, 27108, 11874, 374, 264, 32464, 315, 393, 1313, 955, 1766, 894, 11, 4953, 627, 51, 31667, 3074, 6995, 370, 47102, 75824, 374, 264, 32464, 315, 2895, 44210, 263, 627, 45, 65734, 359, 647, 29623, 14128, 336, 4317, 39342, 13, 220, 679, 17, 12, 679, 19, 13, 2052, 10734, 15516, 627, 12, 43316, 575, 9757, 23314, 1198, 40245, 323, 5560, 25, 1472, 1253, 4685, 323, 1005, 420, 3381, 389, 701, 6500, 323, 1005, 433, 304, 2536, 74144, 7224, 12898, 3402, 17158, 323, 35009, 25, 1472, 1253, 539, 23645, 323, 16822, 904, 11236, 315, 279, 8730, 39183, 12898, 93075, 389, 43951, 367, 25, 1472, 1253, 539, 30174, 11, 4600, 477, 1893, 904, 32905, 4375, 505, 279, 8730, 39183, 844, 360, 575, 9757, 374, -100 ]
Dangerous Places for Shipping A tour of Cape Cod shipwrecks In Dangerous Places for Shipping By Jack Sheedy - The Barnstable Patriot The waters and sands around Cape Cod form the final resting place for hundreds of shipwrecks that occurred here over the past four centuries. Dangerous shoals and bars along the backside of the peninsula snagged so many of these hapless vessels that 13 lifesaving stations were built to aid shipwrecked mariners. Eventually, the opening of the Cape Cod Canal in 1914 allowed vessels to avoid the treacherous Atlantic coastline and significantly reduced the number of disasters. In fact, it is said that if all the vessels that came to woe here were lined up bow to stern they would form an unbroken chain from Monomoy to Provincetown. Many of these wrecks have become lost over time beneath the unceasing rhythms of sea and sand. Others were picked over so thoroughly by Cape Codders of old that they no longer exist intact, but rather in pieces – perhaps as a door in a house or as boards forming an old barn. A shipwreck along the shore in those days was a bounty from the sea to be scavenged by the locals. Nothing was left to waste. Yet, some memorable Cape wrecks, or pieces left behind from those wrecks, can still be viewed today – if you know where to look. And you won't even need scuba gear. To commence any tour of Cape Cod shipwrecks, one should start at the very beginning with the Cape's first recorded shipwreck – the Sparrow-Hawk, which grounded off Nauset Beach in 1626. Not only are her English elm keel and oak ribs viewable today, but these timbers are in remarkably good condition given their antiquity and the fact that they were exposed to the elements for more than 200 years. The story of the Sparrow-Hawk mirrors that of the Mayflower – a voyage across the Atlantic Ocean in search of a new life in a new world. Like the Mayflower, the Sparrow-Hawk arrived at Cape Cod, north of her intended destination at Virginia, and like the Mayflower, headed south along the coastline. Unlike Captain Christopher Jones of the Mayflower, though, who realized the dangers of the shoals along the outer Cape and promptly turned his vessel around for the safety of Provincetown Harbor, the captain of the Sparrow-Hawk eventually wrecked his vessel. All hands survived, spending the winter with the Pilgrims in Plymouth. As for the wreck, it was said to be burned to the waterline by Natives and her remains became sanded in until they were discovered in the 1860s and exhumed to go on display around New England. The ship's skeletal timbers later landed at Pilgrim Hall in Plymouth, and are now on loan to the Cape Cod Maritime Museum in Hyannis, where they can be viewed. Another museum in Barnstable that holds a remnant of an impressive shipwreck is the Centerville Historical Museum. On exhibit is the ship's wheel from the 291-foot paddlewheel steamer, Portland, which sank during a terrible storm in November 1898 with some 175 people on board. Wreckage from this disaster washed up all along the Lower Cape coastline, ending up in private homes and, eventually, in museums around the Cape, such as at the Jericho House Barn Museum in Dennis, where a Portland deck post is on display. Provincetown's Macmillan Wharf is home to the Expedition Whydah Sea Lab & Learning Center, where artifacts can be seen from the wreck of the pirate ship, Whydah, which foundered off Wellfleet in 1717. The vessel was under the command of legendary pirate "Black" Sam Bellamy, who, as lore suggests, romanced an Eastham woman named Maria Hallett before setting off to make his fortune through piracy. During his return voyage to the area, Bellamy ran into a storm and his prize Whydah wrecked just off his former lover's coast. Previous : Diver tells of sunken treasure in Malacca Next : Swedish archaeologists push for shipwreck excavati... shipwreck museum Greece opens first underwater museum Emerging from the crystal-clear turquoise waters of the Aegean Sea, Hans-Juergen Fercher has just returned from his fourth dive... Underwater museum of Alonissos opens soon The underwater archaeological site off the island of Alonissos, the Peristera Shipwreck, will open to visitors on June 1, 2021. Hawaiian King's treasures lost in shipwreck 191 years ago A museum in Hawaii is preparing to open a treasure-trove of artifacts from the shipwreck of a royal yacht sunk off the coast of Kauai 191 years ago. World's longest Viking shipwreck to be exhibited in Denmark Longest Viking shipwreck ever found is set to arrive in Copenhagen this summer Underwater art exhibit from Vandenberg shipwreck An Austrian artist's photos developed an otherworldly patina after four months submerged on a Key West shipwreck.
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
9,517
[ 128000, 98315, 788, 45836, 369, 24907, 198, 32, 7364, 315, 29715, 34777, 8448, 86, 265, 14895, 198, 644, 74132, 45836, 369, 24907, 198, 1383, 7762, 3005, 9497, 482, 578, 23229, 29092, 68031, 198, 791, 21160, 323, 70163, 2212, 29715, 34777, 1376, 279, 1620, 41219, 2035, 369, 11758, 315, 8448, 86, 265, 14895, 430, 10222, 1618, 927, 279, 3347, 3116, 24552, 627, 98315, 788, 72619, 1147, 323, 16283, 3235, 279, 1203, 3002, 315, 279, 66495, 72902, 3640, 779, 1690, 315, 1521, 46900, 1752, 31080, 430, 220, 1032, 49785, 2370, 17789, 1051, 5918, 311, 12576, 8448, 86, 25662, 291, 3678, 40799, 13, 38274, 11, 279, 8736, 315, 279, 29715, 34777, 53748, 304, 220, 7529, 19, 5535, 31080, 311, 5766, 279, 4353, 11252, 788, 23179, 80944, 323, 12207, 11293, 279, 1396 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 98315, 788, 45836, 369, 24907, 198, 32, 7364, 315, 29715, 34777, 8448, 86, 265, 14895, 198, 644, 74132, 45836, 369, 24907, 198, 1383, 7762, 3005, 9497, 482, 578, 23229, 29092, 68031, 198, 791, 21160, 323, 70163, 2212, 29715, 34777, 1376, 279, 1620, 41219, 2035, 369, 11758, 315, 8448, 86, 265, 14895, 430, 10222, 1618, 927, 279, 3347, 3116, 24552, 627, 98315, 788, 72619, 1147, 323, 16283, 3235, 279, 1203, 3002, 315, 279, 66495, 72902, 3640, 779, 1690, 315, 1521, 46900, 1752, 31080, 430, 220, 1032, 49785, 2370, 17789, 1051, 5918, 311, 12576, 8448, 86, 25662, 291, 3678, 40799, 13, 38274, 11, 279, 8736, 315, 279, 29715, 34777, 53748, 304, 220, 7529, 19, 5535, 31080, 311, 5766, 279, 4353, 11252, 788, 23179, 80944, 323, 12207, 11293, 279, 1396, -100 ]
power stretcher roberts case lowes crain. power stretcher carpet for sale australia rental uk. power stretcher carryg how to use a for carpet roberts case menards rental. power stretcher er case carpet vs knee kicker spike. power stretcher roberts case carpet for sale australia head. power stretcher rental uk carpet vs knee kicker menards. power stretcher lowes roberts head case. power stretcher crain case rental home depot. power stretcher ems stryker pro for sale rental home depot. power stretcher head case rental uk. power stretcher carpet rental lowes menards calgary. power stretcher lowes for sale uk. power stretcher how to use a for carpet rental sale uk. power stretcher roberts head vs knee kicker carpet. power stretcher or knee kicker how to use a for carpet rental calgary. power stretcher stryker pro for sale case carpet head. power stretcher por oppose wll wh br cross crpet n in tck or knee kicker roberts case crain. power stretcher vs knee kicker carpet rental lowes menards. power stretcher head rental uk crain case. power stretcher carpet lowes rental uk stryker pro for sale.
{ "redpajama_set_name": "RedPajamaC4" }
290
[ 128000, 13477, 27277, 9211, 89993, 82, 1162, 97927, 1589, 467, 627, 13477, 27277, 9211, 28954, 369, 6412, 44332, 19160, 15012, 627, 13477, 27277, 9211, 6920, 70, 1268, 311, 1005, 264, 369, 28954, 89993, 82, 1162, 3026, 2402, 19160, 627, 13477, 27277, 9211, 2781, 1162, 28954, 6296, 22095, 87276, 37393, 627, 13477, 27277, 9211, 89993, 82, 1162, 28954, 369, 6412, 44332, 2010, 627, 13477, 27277, 9211, 19160, 15012, 28954, 6296, 22095, 87276, 3026, 2402, 627, 13477, 27277, 9211, 97927, 89993, 82, 2010, 1162, 627, 13477, 27277, 9211, 1589, 467, 1162, 19160, 2162, 45719, 627, 13477, 27277, 9211, 991, 82, 610, 88, 7197, 463, 369, 6412, 19160, 2162, 45719, 627, 13477, 27277, 9211, 2010, 1162, 19160, 15012, 627, 13477, 27277, 9211, 28954, 19160, 97927, 3026, 2402, 1652, 34588, 627, 13477 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 13477, 27277, 9211, 89993, 82, 1162, 97927, 1589, 467, 627, 13477, 27277, 9211, 28954, 369, 6412, 44332, 19160, 15012, 627, 13477, 27277, 9211, 6920, 70, 1268, 311, 1005, 264, 369, 28954, 89993, 82, 1162, 3026, 2402, 19160, 627, 13477, 27277, 9211, 2781, 1162, 28954, 6296, 22095, 87276, 37393, 627, 13477, 27277, 9211, 89993, 82, 1162, 28954, 369, 6412, 44332, 2010, 627, 13477, 27277, 9211, 19160, 15012, 28954, 6296, 22095, 87276, 3026, 2402, 627, 13477, 27277, 9211, 97927, 89993, 82, 2010, 1162, 627, 13477, 27277, 9211, 1589, 467, 1162, 19160, 2162, 45719, 627, 13477, 27277, 9211, 991, 82, 610, 88, 7197, 463, 369, 6412, 19160, 2162, 45719, 627, 13477, 27277, 9211, 2010, 1162, 19160, 15012, 627, 13477, 27277, 9211, 28954, 19160, 97927, 3026, 2402, 1652, 34588, 627, 13477, -100 ]
Save-On Meats & Funky Winkerbean's By David Look Save-On Meats (43 W Hastings St.) has got to be the biggest full service butcher in the city. Unabashed by the tongues, legs, thighs, butts, rumps and roasts all over the place, it operates like a mecca of death for the meat eater. I lived on their five dollar rib-eye steaks all summer long, and with each pre-BBQ visit, I would remind myself that an appointment with the yellow awninged lunch counter at the back had to be a mandatory autumn event. Rumors about the enormity of their one pound burger eventually led to me standing under the East Side grocery store's neon-pig-marquee with a bravado generally reserved for Sunday dinner in a suit. The sandwich board sign from the bar next door, Funky Winkerbean's Pub (sluttily advertising $1.50 glasses of beer) didn't go unnoticed either. So I knew I was in for a potential overdose of exorbitant portions and low prices served in a unique and possibly vile environment. Nothing could excite this food and drink critic more. The proximity of the seating at the Save-On Meats Coffee Shop is, well, let's call it intimate. The U shaped counters put you face to face with some of the East Side's finest. Whether it's single occupancy hotel dwellers, homeless people who have scraped together enough change to get a coffee or snot nosed journalists looking for an experience, everyone is happy, it seems, when food is in abundance. I found the atmosphere at the rear of Save-On jovial. The guy sitting across from me seemed borderline ecstatic as he proceeded to pour an entire cup of sugar all over his french fries, devouring them before I even had a chance to order a Coke. Everyone seemed to know each other and would nod in recognition or shout salutations across the yellow counters. The menu is very simple, and incredibly cheap. Burgers, toasted sandwiches, the obligatory all day breakfast and Chow Mein – that's it. I opted for the cheeseburger. With drink, my entire meal came to just under $6.00, tax and tip included. The burger was double-pattied, had bacon, lettuce, tomato, onion, and came with a ton of fries. It was near impossible to finish. Seeing me laboring through the last few bites must have been too much for the woman that approached me, doing the meth shake while blurting out "are you going to finish that or what!?" Before I could even react she was quickly escorted out the door. It gave me that last little bit of appreciation for what I had just experienced; one of the cheapest, and best burgers in the city. I dedicated the last few fries to her. Sure, food brings people together, but nothing creates a sense of community like the drink. This was apparent not five minutes after I sat down inside Funky Winkerbean's Pub (35 W Hastings St.), just after my visit to Save-On Meats. I was half way through my first bottle of Kokanee when I could hear a woman screaming behind me, "get the fuck away from me! I don't even know who the fuck you are!" as a very large man in sweatpants ran sheepishly up the main isle, and out the door. I had walked past Winkberbean's several times throughout the summer and found that the sunlight always shrouded the interior in an ominous obscurity that, mixed with the unsavory looking characters smoking out front, was all that was needed to create an intimidating scene. I was actually pretty disappointed by the appearance of Funky Winkerbean's when I finally did walk in. It was surprisingly clean, and the red walls with the half nude flapper girls that adorned them helped to create a kind of calculated aesthetic. Still, the collection of old men and women who looked like men quietly contemplating their golden fluids like crystal balls revealing an unfruitful past, mixed with AC/DC and The Tragically Hip on heavy rotation, gave away the fact that Funky's was indeed a dive bar. Six or seven bottles into act two of my Save-On/Funky Winkerbean's evening, our sweat-panted hero made a return appearance. He was clearly drunk – the kind of drunk that had his head cocked back onto his shoulders with his eyes closed to the ceiling one minute, and over-enthusiastically pumping his fist and yelling out the lyrics to AC/DC's "Have A Drink On Me" the next. His presence was gigantic and dangerously unpredictable. He started maneuvering about the room, stopping at various tables to high-five everyone. At one point he completely missed his target and went down face first into a table of empty draft glasses. I left shortly after that with a decent drunk on that couldn't have cost more than $20.00, and a mandate to find something slightly dirtier in the future. The zero block of West Hastings Street and its immediate surroundings formed the social and economic center of Vancouver for decades. The area's steady decline has been well documented, but what of the businesses that are still legitimately operating here? My visit to Save-On Meats and Funky Winkerbean's Pub left me with a ground-beef induced, beer soaked feeling that while the clientele has certainly changed, there still is a community, and it revolves around other things than rock cocaine and crystal meth. It's in our most basic necessities: Food, drink, and a drunken high-five sent crashing to the floor.
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
3,647
[ 128000, 8960, 67454, 2206, 1900, 612, 40710, 88, 468, 42212, 17937, 596, 198, 1383, 6941, 9372, 198, 8960, 67454, 2206, 1900, 320, 3391, 468, 79844, 800, 6266, 706, 2751, 311, 387, 279, 8706, 2539, 2532, 76194, 304, 279, 3363, 13, 1252, 370, 13883, 555, 279, 89435, 11, 14535, 11, 60611, 11, 719, 2641, 11, 436, 12055, 323, 938, 12019, 682, 927, 279, 2035, 11, 433, 27149, 1093, 264, 757, 25445, 315, 4648, 369, 279, 13339, 87135, 13, 358, 12439, 389, 872, 4330, 18160, 20735, 47797, 4179, 10011, 682, 7474, 1317, 11, 323, 449, 1855, 864, 7826, 33, 48, 4034, 11, 358, 1053, 24928, 7182, 430, 459, 18101, 449, 279, 14071, 1384, 1251, 291, 16163, 5663, 520, 279, 1203, 1047, 311, 387, 264, 23911, 42774, 1567, 13, 46332, 1105 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 8960, 67454, 2206, 1900, 612, 40710, 88, 468, 42212, 17937, 596, 198, 1383, 6941, 9372, 198, 8960, 67454, 2206, 1900, 320, 3391, 468, 79844, 800, 6266, 706, 2751, 311, 387, 279, 8706, 2539, 2532, 76194, 304, 279, 3363, 13, 1252, 370, 13883, 555, 279, 89435, 11, 14535, 11, 60611, 11, 719, 2641, 11, 436, 12055, 323, 938, 12019, 682, 927, 279, 2035, 11, 433, 27149, 1093, 264, 757, 25445, 315, 4648, 369, 279, 13339, 87135, 13, 358, 12439, 389, 872, 4330, 18160, 20735, 47797, 4179, 10011, 682, 7474, 1317, 11, 323, 449, 1855, 864, 7826, 33, 48, 4034, 11, 358, 1053, 24928, 7182, 430, 459, 18101, 449, 279, 14071, 1384, 1251, 291, 16163, 5663, 520, 279, 1203, 1047, 311, 387, 264, 23911, 42774, 1567, 13, 46332, 1105, -100 ]
User data will be backed up to the new storage. Snapshots on the old storage are retained and compacted following the retention policy. Note: After changing the storage assigned to a user, the first backup is a full backup. Thereafter, all backups are incremental in nature. The user must have installed inSync client 5.2 or later or inSync Companion App 3.3 or later. You cannot map users to storage to which they were once assigned. Note: If you want to change storage for your users but have inSync Share license, contact Druva Support for a new license with disabled inSync Share. Before uploading this new license, delete all guests. If you do not delete guests, they will continue to appear on the Manage Users page.
{ "redpajama_set_name": "RedPajamaC4" }
568
[ 128000, 1502, 828, 690, 387, 22126, 709, 311, 279, 502, 5942, 627, 62971, 28734, 389, 279, 2362, 5942, 527, 35363, 323, 17251, 291, 2768, 279, 38231, 4947, 627, 9290, 25, 4740, 10223, 279, 5942, 12893, 311, 264, 1217, 11, 279, 1176, 16101, 374, 264, 2539, 16101, 13, 2684, 10924, 11, 682, 60766, 527, 53399, 304, 7138, 627, 791, 1217, 2011, 617, 10487, 304, 12430, 3016, 220, 20, 13, 17, 477, 3010, 477, 304, 12430, 70075, 1883, 220, 18, 13, 18, 477, 3010, 627, 2675, 4250, 2472, 3932, 311, 5942, 311, 902, 814, 1051, 3131, 12893, 627, 9290, 25, 1442, 499, 1390, 311, 2349, 5942, 369, 701, 3932, 719, 617, 304, 12430, 12037, 5842, 11, 3729, 423, 2739, 6723, 9365, 369, 264, 502, 5842, 449, 8552, 304, 12430, 12037 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 1502, 828, 690, 387, 22126, 709, 311, 279, 502, 5942, 627, 62971, 28734, 389, 279, 2362, 5942, 527, 35363, 323, 17251, 291, 2768, 279, 38231, 4947, 627, 9290, 25, 4740, 10223, 279, 5942, 12893, 311, 264, 1217, 11, 279, 1176, 16101, 374, 264, 2539, 16101, 13, 2684, 10924, 11, 682, 60766, 527, 53399, 304, 7138, 627, 791, 1217, 2011, 617, 10487, 304, 12430, 3016, 220, 20, 13, 17, 477, 3010, 477, 304, 12430, 70075, 1883, 220, 18, 13, 18, 477, 3010, 627, 2675, 4250, 2472, 3932, 311, 5942, 311, 902, 814, 1051, 3131, 12893, 627, 9290, 25, 1442, 499, 1390, 311, 2349, 5942, 369, 701, 3932, 719, 617, 304, 12430, 12037, 5842, 11, 3729, 423, 2739, 6723, 9365, 369, 264, 502, 5842, 449, 8552, 304, 12430, 12037, -100 ]
New handbags fall at your waist; they're not too low and not too high. Luxury handbags are your perfect everyday expression! We offer unique handbags in distinctive expressions from designers who are inspired by the latest worldwide fashions and materials.
{ "redpajama_set_name": "RedPajamaC4" }
5,273
[ 128000, 3648, 1450, 53494, 4498, 520, 701, 29142, 26, 814, 2351, 539, 2288, 3428, 323, 539, 2288, 1579, 13, 52350, 1450, 53494, 527, 701, 4832, 18254, 7645, 0, 1226, 3085, 5016, 1450, 53494, 304, 35947, 24282, 505, 26897, 889, 527, 14948, 555, 279, 5652, 15603, 282, 1003, 919, 323, 7384, 13, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256, 128256 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 ]
[ 3648, 1450, 53494, 4498, 520, 701, 29142, 26, 814, 2351, 539, 2288, 3428, 323, 539, 2288, 1579, 13, 52350, 1450, 53494, 527, 701, 4832, 18254, 7645, 0, 1226, 3085, 5016, 1450, 53494, 304, 35947, 24282, 505, 26897, 889, 527, 14948, 555, 279, 5652, 15603, 282, 1003, 919, 323, 7384, 13, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100 ]
The Nexus 5 is a phone that's coming in for a lot of attention right now and after the huge popularity of the Nexus 4 smartphone, many people are hoping for more big things from the Nexus 5. We've heard conflicting rumors of specs so far but to be frank at this stage it looks like nobody is really sure. While we wait we caught a look at an envisioning of the Nexus 5 from a dream team with every aspect customizable and thought it was interesting enough to share with readers while we wait for something more concrete about the real deal. We'll just update you with the latest we heard on the Nexus 5 which fitted with news some time ago from Google's Senior VP of Engineering who said that future Nexus devices could have "insanely great cameras." The newest source claimed that the camera of the Nexus 5 smartphone would be a 9-megapixel CCD camera but others were disappointed that these latest so-called leaked specs also showed no expandable storage again (the same as for the Nexus 4) and no full HD display. However of course as with all such leaks these details cannot be verified. Back to today's Nexus 5 look then and when accurate news about devices we're really looking forward to is so thin on the ground we enjoy looking at concept designs as they can give us a great idea of what could be on offer. Recently we gave you a look at a Nexus 5 concept, which we thought looked pretty good and came with some imagined specs, which were not too over the top. Today though we've come across a new concept design for the Nexus 5 and we think the design of this one is even better, although the specs are indeed the stuff of dreams. This Nexus 5 rendering comes from D. Saif and shows a really sleek device with miniscule bezels leaving the phone's front as virtually all display with not a millimeter wasted. Many have speculated that the next Nexus pure vanilla Google Android phone will once again be produced by LG but Saif wastes no time pondering this and for his mockup has decided that this is dream team project between HTC, LG, Motorola, Sharp and Sony. Listed specs for this dream Nexus 5 include Android 5.0 Key Lime Pie (okay so that one's pretty realistic), with Ultra HD display, UltraPixel camera, Qualcomm Snapdragon 800 CPU, 4GB of RAM, 256GB of internal storage and a 5000 mAh battery. The design is a collaboration between Sharp and LG, the camera by HTC and Sony and hardware customization by the Motorola X team. Finally it has been designed by Google and comes with a $299 price tag. A really interesting aspect of this concept Nexus 5 is that every aspect of the phone would be customizable putting control into the consumers hands. This means a choice of different megapixel cameras, different internal storage options, battery capacities and RAM. We think this would be really appealing to most potential Nexus 5 customers as aspects of a smartphone that are important to one owner may not be as important to another owner. What are your thoughts on a completely customizable Nexus 5? Do you imagine that the above manufacturers might ever come together to produce a Google Nexus device? Let us know by sending your comments. looks like a april fool article… lol.. it would be nice if you could choose an octa-core processor with that 256GB storage, and an 8GB RAM. Or something redonqulus lol. I would so get that. All I want in a NEXUS 5 PHONE is CDMA . Why the hell would you want CDMA? SIM is so much more hassle-free. You will probably never see another CDMA Nexus phone again. GSM phones don't really need any involvement from the carrier. CDMA phones require direct involvement and control from the carrier which means the carrier will want to be in charge of updates which we all know how bad that worked out for the Galaxy Nexus on Verizon and Sprint. Jimster, it is a secret. You are not on the NTK list . What's a secret? What are you talking about? NTK list? The April fools are the ones who have time to write these stupid crapola articles. Get a reap job. I'll pay them an extra 200 dollars to the $299.99 price tag, that's how bad I feel because I'm ripping them off. Sometimes, dreams are just that. Ugly? Really? I think it looks great. Only problem is the bottom bezel is way to big. Make that bottom bezel the same size as the left and right bezel and they really have something. Really is too bad it's fake. I wish that was real. I'd love to have a phone with a 5,000mAh battery. Then maybe a it would last a full day of heavy usage on a single change instead of about the 6 hours that most phones get today. Screw gorilla glass, go DRAGONTAIL!!!! Sized based naming convention? Don't you realize that is just a coincidence? The Nexus 4 wasn't a 4″ phone. If the next Nexus phone is called the Nexus 5 it would be for the same reason the Nexus 4 got it's name. The "Nexus 5" will be the FIFTH Nexus phone. Also, it is "Google IS…." not "Google ARE….". Sorry but I just couldn't help but say something. That mistake irritates me so much. 5000 mAH battery? You've got to be kidding me. Why? Too hard to believe that a phone might actually have a decent sized battery? A 5000 math battery would make the phone huge. In fact all of these specs while they make me drool are completely unrealistic. 4 GB ram? 256 GB storage? Its a nice fairy tale but let's move on to the real thing. Fast forward to now, where current, or soon to be released ( ~4 months from now) flagships are coming with 3GB of ram, and people can use 128GB MicroSD cards in their devices, along with phablets like the Note 3 packing 3,000+ mAh batteries. Still think it's a fairy tale for such things to happen?
{ "redpajama_set_name": "RedPajamaC4" }
590
[ 128000, 791, 41122, 220, 20, 374, 264, 4641, 430, 596, 5108, 304, 369, 264, 2763, 315, 6666, 1314, 1457, 323, 1306, 279, 6908, 23354, 315, 279, 41122, 220, 19, 22234, 11, 1690, 1274, 527, 16026, 369, 810, 2466, 2574, 505, 279, 41122, 220, 20, 13, 1226, 3077, 6755, 52133, 35492, 315, 33347, 779, 3117, 719, 311, 387, 26875, 520, 420, 6566, 433, 5992, 1093, 19093, 374, 2216, 2771, 13, 6104, 584, 3868, 584, 10791, 264, 1427, 520, 459, 48146, 287, 315, 279, 41122, 220, 20, 505, 264, 8063, 2128, 449, 1475, 13189, 63174, 323, 3463, 433, 574, 7185, 3403, 311, 4430, 449, 13016, 1418, 584, 3868, 369, 2555, 810, 14509, 922, 279, 1972, 3568, 627, 1687, 3358, 1120, 2713, 499, 449, 279, 5652, 584, 6755, 389, 279, 41122 ]
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 791, 41122, 220, 20, 374, 264, 4641, 430, 596, 5108, 304, 369, 264, 2763, 315, 6666, 1314, 1457, 323, 1306, 279, 6908, 23354, 315, 279, 41122, 220, 19, 22234, 11, 1690, 1274, 527, 16026, 369, 810, 2466, 2574, 505, 279, 41122, 220, 20, 13, 1226, 3077, 6755, 52133, 35492, 315, 33347, 779, 3117, 719, 311, 387, 26875, 520, 420, 6566, 433, 5992, 1093, 19093, 374, 2216, 2771, 13, 6104, 584, 3868, 584, 10791, 264, 1427, 520, 459, 48146, 287, 315, 279, 41122, 220, 20, 505, 264, 8063, 2128, 449, 1475, 13189, 63174, 323, 3463, 433, 574, 7185, 3403, 311, 4430, 449, 13016, 1418, 584, 3868, 369, 2555, 810, 14509, 922, 279, 1972, 3568, 627, 1687, 3358, 1120, 2713, 499, 449, 279, 5652, 584, 6755, 389, 279, 41122, -100 ]